`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Exhibit 12
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 2 of 23
`
`UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`
`Plaintiff,
`
`
`
`v.
`
`Defendants.
`
`Plaintiff,
`
`Defendant.
`
`Plaintiff,
`
`
`
`
`
`v.
`
`
`
`
`
`v.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`AIRE TECHNOLOGY LTD.,
`
`
`
`
`
`SAMSUNG ELECTRONICS CO., LTD. and
`SAMSUNG ELECTRONICS AMERICA, INC.,
`
`
`
`AIRE TECHNOLOGY LTD.,
`
`
`
`
`
`APPLE INC.
`
`
`
`AIRE TECHNOLOGY LTD.,
`
`
`
`
`
`GOOGLE LLC,
`
`
`
`
`
`Case No. 6:21-cv-955-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`Case No. 6:21-cv-1101-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`Case No. 6:21-cv-1104-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`
`Defendant.
`
`
`
`
`
`
`
`DECLARATION OF DR. HUGH SMITH IN SUPPORT OF
`AIRE’S RESPONSIVE CLAIM CONSTRUCTION BRIEF
`
`
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 3 of 23
`
`INTRODUCTION
`
`I, Hugh Smith, Ph.D hereby declare and state as follows:
`
`I.
`
`
`1.
`
`I have been retained by Plaintiff Aire Technology Ltd. (“Aire”) to provide my
`
`opinions as to the scope and meaning of certain terms and phrases appearing in U.S. Patent No.
`
`8,205,249 (“the ’249 Patent”) as a person of ordinary skill in the art at the time of the inventions
`
`(“POSITA”). I understand that Defendants Samsung Electronics Co., Ltd. and Samsung
`
`Electronics America, Inc. (“Samsung”), Apple Inc. (“Apple”), and Google LLC (“Google”)
`
`(collectively, “Defendants”) have offered constructions for certain terms and phrases for the ’249
`
`Patent. I have reviewed those constructions and provide my opinions on those constructions
`
`herein.
`
`2.
`
`In rendering my opinions, I have reviewed the ’249 Patent and the respective file
`
`history, as well as the extrinsic evidence offered by Defendants. My opinions are further based
`
`upon over 40 years of education, training, research, knowledge, and personal and professional
`
`experience in the relevant art.
`
`3.
`
`I reserve the right, if permitted by the Court, to supplement and/or amend my
`
`opinions in this declaration based on future positions taken by Defendants, their experts, additional
`
`documents, testimony, or other information provided by the Defendants or their witnesses, any
`
`orders from the Court, or as otherwise necessary.
`
`4.
`
`A detailed record of my professional qualifications, including a list of publications,
`
`awards, professional activities, and recent testimony either at trial or at deposition, has been
`
`provided to Defendants and is attached hereto as Exhibit 1. I also included a list of cases in the
`
`last five years that I have testified by trial or deposition.
`
`5.
`
`I am a tenured full professor in the Department of Computer Engineering at the
`
`
`
`1
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 4 of 23
`
`California Polytechnic State University. I also served as Director of the Cal Poly Computer
`
`Engineering Program, both in 2009-2013 and again in 2016-2017. I received my B.S. degree in
`
`Computer Science from Xavier University in 1985. I received my M.S. degree in Computer
`
`Science from Michigan State University in 1994 with a research focus on parallel and distributed
`
`computing. I received my Ph.D. in Computer Science in 1999 with a research focus on networking
`
`and the transmission of video over the Internet from Michigan State University.
`
`6.
`
`Upon receiving my PhD, I joined the faculty of the Cal Poly Department of
`
`Computer Science in 2000 and moved to Cal Poly’s newly created Department of Computer
`
`Engineering in 2021. I have been teaching and doing research on computer networks, network
`
`security, distributed systems, embedded systems, programming and robotics for the last 22 years.
`
`I have developed and taught courses including an introduction to computer networks, advanced
`
`computer networks, graduate level computer networks, embedded systems and robotics, and
`
`digital design and microcontrollers. Course activities included both hardware and software, the
`
`theoretical aspects of computer networks, security (including both privacy and authentication),
`
`wired and wireless networks, and the implementation of protocol layers from the physical to the
`
`application layer. As part of my teaching, I cover topics including privacy and authentication from
`
`both a theoretical perspective as well as using these technologies in the real-world.
`
`7.
`
`I have over 40 years of experience in computer engineering and computer science.
`
`In addition to my educational and teaching/research experience, I have professional experience in
`
`computer system design and implementation. From 2011 to 2013, I developed, implemented, and
`
`sold an Android App called Lockmenu. I was a Group Manager, Senior Systems Analyst/Project
`
`Manager, and Systems Analyst for the Procter and Gamble Company from 1985-1992. I managed
`
`all aspects of a large distributed Purchasing and Inventory Control system, which included over
`
`
`
`2
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 5 of 23
`
`2,000 users, processed over $250 million in yearly purchases, and tracked over $60 million in
`
`inventory. I led a support team, designed and developed application software, managed capacity
`
`planning, and on-going maintenance. Before that, I was a Programmer Analyst at the Merrell Dow
`
`Research Institute from 1983-1985.
`
`8.
`
` I have reviewed the ’249 Patent and its prosecution history, and the subject matter
`
`of the ’249 Patent is within the scope of my education and experience.
`
`9.
`
`I have been asked to provide my opinion as to the construction of certain terms and
`
`phrases in the tables below, from the standpoint of a POSITA at the time of the respective
`
`inventions.
`
`10.
`
`In my opinion, a POSITA would have at the time of the invention either (1) a
`
`bachelor’s degree in computer science or computer engineering including experience in system
`
`security and authentication and one to two years of work experience in systems involving security
`
`and authentication or (2) equivalent work experience in the design and/or implementation of
`
`systems involving security and authentication. As reflected in the level of ordinary skill, a person
`
`of ordinary skill can have “equivalent education and work experience.” Thus, more education
`
`could substitute for experience, and more experience (e.g., when combined with training), could
`
`substitute for formal college education of the person of ordinary skill in the art. When performing
`
`my analysis that led to my opinions, I apply this standard.
`
`11.
`
`I am being compensated by Aire at a rate of $700/hour for my work in this matter.
`
`My compensation is not tied to the outcome of the case and I have no financial interest in the
`
`outcome of the case.
`
`12.
`
`In forming my opinions, I have considered a variety of facts and materials. These
`
`include all of the materials cited herein in this declaration. I have also relied on my more than 25
`
`
`
`3
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 6 of 23
`
`years of experience as a person of ordinary skill in the art in the field. I have also reviewed the
`
`’249 Patent, its file history, and other extrinsic evidence cited herein.
`
`U.S. PATENT NO. 8,205,249
`
`II.
`
`
`Aire’s Proposed Construction Defendants’ Proposed
`Construction
`Indefinite
`
`
`Plain and ordinary meaning
`
`Disputed Phrase
`
`“an inherently relatively
`lower quality and an
`inherently relatively
`higher quality from a
`security perspective”,
`Claims 1 and 10
`
`
`
`
`
`13.
`
`I understand that the parties dispute whether the phrase “an inherently relatively
`
`lower quality and an inherently relatively higher quality from a security perspective” in Claims 1
`
`and 10 of the ’249 Patent is indefinite. I agree with Aire that no construction is necessary and that
`
`the phrase is understood under its plain and ordinary meaning. I disagree with Defendants that the
`
`phrase is indefinite.
`
`14.
`
`A POSITA would understand the meaning of the phrase “an inherently relatively
`
`lower quality and an inherently relatively higher quality from a security perspective” with
`
`reasonable certainty in light of the guidance provided by the ’249 Patent claims, specification, and
`
`prosecution history. The disputed phrase requires (1) at least two different authentication methods
`
`and (2) that they differ in their quality from a security perspective. The claims provide a standard
`
`by which the difference in security quality is to be measured: the different authentication methods
`
`are compared to one another, with one method being of an “inherently relatively lower quality” in
`
`comparison to the other method comprising of a “inherently relatively higher quality.”
`
`Additionally, the ’249 Patent provides objective criteria for determining whether a particular
`
`method is of “lower” or “higher” quality from a security perspective—namely, that the “lower”
`
`
`
`4
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 7 of 23
`
`quality method comprise of a knowledge-based authentication method (e.g., PIN), whereas the
`
`“higher” quality method comprise of a biometric-based authentication method (e.g., fingerprint).
`
`15.
`
`The ’249 Patent provides sufficient support to inform a POSITA with reasonable
`
`certainty of the authentication methods that are “inherently relatively” lower or higher quality from
`
`a security perspective. For example, the ’249 Patent specification explains the following:
`
`It preferably supports at least two authentication methods of different order with
`regard to the quality of authentication. It expediently supports at least one
`knowledge-based authentication method, e.g. a PIN check, and at least one
`biometric method, within which a biometric feature of the user 30 to be presented
`at the terminal 14 is checked. The biometric method inherently constitutes the
`higher-quality one here, since it presupposes the personal presence of the user 30;
`this is not ensured in the knowledge-based method since the knowledge can have
`been acquired by an unauthorized user.
`
`
`’249 Patent at 3:24-33.1 According to this embodiment, the “knowledge-based” method (e.g., a
`
`PIN) is the inherently lower quality method in comparison to the “biometric” method, which
`
`constitutes the inherently higher quality method. See also ’249 Patent at 3:58-62 (“it will
`
`hereinafter be assumed that the chip card 20 supports two authentication methods, namely a PIN
`
`check as a knowledge-based, inherently low-quality method, and a fingerprint check as a
`
`biometric, inherently higher-quality method.”). The ’249 Patent also teaches in this embodiment
`
`that the “biometric” is “inherently” of “higher-quality” because “it presupposes the personal
`
`presence of the user,” whereas the “knowledge-based method” is “inherently” of “lower-quality”
`
`because “the knowledge can have been acquired by an unauthorized user.” ’249 Patent at 3:24-
`
`33; see also 1:31-36 (“The intended introduction of biometric features for user authentication
`
`obtains a further improvement of the trustworthiness of an electronic signature compared to the
`
`hitherto usual PIN authentication, because it guarantees that the signature card can only be used in
`
`
`1 All emphasis added unless stated otherwise.
`
`
`
`5
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 8 of 23
`
`the presence of a definite person entitled to do so.”).
`
`16.
`
`The ’249 Patent provides further examples that define the objective criteria for both
`
`the “inherently relatively lower quality” and “inherently relatively higher quality” authentication
`
`methods. For example, the “inherently relatively higher quality” authentication methods are
`
`consistently described in the context of “biometric” authentication methods. See, e.g., ’249 Patent
`
`at 3:24-33, 3:58-62, 5:31-38. The ’249 Patent explains that the “biometric” authentication method
`
`may include “detecting physiological features, such as facial features, features of the eye or
`
`fingerprints, or behavior-based features, such as speech or writing sequences expressed by the
`
`voice or by writing operations.” ’249 Patent at 2:59-63.
`
`17.
`
`In connection with its discussion of the “biometric” authentication methods, the
`
`’249 Patent references Chapter 8.1.2 of “Handbuch der Chipkarten” (hereinafter “Chip Card
`
`Manual”), W. Rankl, W. Effing, 3rd edition, 1999. ’249 Patent at 1:12-14, 2:67 – 3:2. I have
`
`reviewed Chapter 8.1.2 of the “Chip Card Manual” and agree that it teaches “different types and
`
`the implementation of biometric authentication methods.” For example, Chapter 8.1.2 explains
`
`that “[a] biometric identification method is a method that can unambiguously identify a person by
`
`means of unique, individual biological features.” Chip Card Manual at 499. Additionally, the
`
`“Chip Card Manual” explains that “[b]iometric features are usually not modifiable, which is
`
`precisely what makes them attractive for the unambiguous identification of persons.” Chip Card
`
`Manual at 500. Chapter 8.1.2 further provides a discussion of different authentication methods:
`
`
`
`6
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 9 of 23
`
`
`
`Chip Card Manual at 500. Each of these biometric authentication methods are further detailed
`
`therein. Chip Card Manual at 504-510. Thus, the ’249 Patent specification provides objective
`
`criteria concerning the “inherently relatively higher quality” authentication methods, which are
`
`taught as “biometric” authentication methods.
`
`18.
`
`The ’249 Patent contrasts the “higher” quality biometric authentication methods
`
`with “lower” quality authentication methods that are knowledge-based, such as a password or PIN.
`
`See, e.g., ’249 Patent at 1:62 – 2:3, 3:29-33, 3:58-62. The ’249 Patent explains that knowledge-
`
`based methods, for example, are inherently “lower” quality to biometric authentication methods
`
`because “the knowledge can have been acquired by an unauthorized user.” Id. at 3:31-33. Further,
`
`Chapter 8.1.2 of the “Chip Card Manual” also explains that “biometric features cannot be
`
`transferred to another person as easily as PINs” and “[t]his means that the actual person is
`
`identified, rather than a secret shared by the user and the system operator.” See Chip Card Manual
`
`at 499. This discussion underscores that a knowledge-based authentication is of inherently lower
`
`quality than a biometric method. As such, the ’249 Patent specification also provides clear,
`
`objective criteria concerning the “inherently relatively lower quality” authentication methods,
`
`which are taught as knowledge-based authentication methods.
`
`
`
`7
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 10 of 23
`
`19.
`
`The prosecution history also sheds light on the meaning of the “lower” and “higher”
`
`quality authentication methods taught in the ’249 Patent. For example, on multiple occasions the
`
`patentee clarified that the “lower” quality authentication methods are premised on knowledge-
`
`based authentication methods, while the “higher” quality authentication methods are premised on
`
`biometric authentication methods:
`
`Different authentication methods provide different levels of protection. For
`example, a PIN check as a knowledge-based method is an inherently low-
`quality method while a fingerprint check as a biometric check method is an
`inherently higher-quality method (see page 5, lines 25 30 of the originally filed
`specification and the amended specification filed on May 18, 2009). The PIN
`check is a lower quality authentication method since a user merely needs to
`gain knowledge of the PIN to be successfully authenticated. A biometric check
`method is a higher quality method since it would be more difficult for a user
`to duplicate a fingerprint in order to be authenticated and thus, the check
`“presupposes the personal presence of the user” (see specification, page 5, lines
`3-5).
`
`See U.S. Patent App. No. 10/531,259, March 30, 2011 Applicant Remarks; see also U.S. Patent
`
`App. No. 10/531,259, May 27, 2010 Applicant Remarks (“The portable data carrier itself is set up
`
`to perform at least one but expediently a plurality of different quality user authentication methods,
`
`preferably at least two different authentication methods having a different order of security. For
`
`example, it may support at least one knowledge-based authentication method (a PIN check), and
`
`at least one biometric method. Obviously, the biometric method inherently constitutes a higher
`
`quality method of authentication as compared with the knowledge-based authentication
`
`method (id., page 5, first paragraph).”). The patentee’s statements during prosecution reinforce
`
`the ’249 Patent’s teachings concerning the scope of the “inherently relatively higher” and
`
`“inherently relatively lower” authentication methods.
`
`20.
`
`I disagree with Defendants that the patentee’s addition of the word “inherently” to
`
`the ’249 Patent specification and claims adds confusion as to the meaning of the disputed phrase.
`
`
`
`8
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 11 of 23
`
`Defendants’ Brief at 18-19. A review of the amendments and corresponding explanation reveals
`
`that the patentee further clarified the scope of the claim. For example, the patentee amended Claim
`
`10 as follows:
`
`10. (Currently Amended) A portable data carrier for performing a security-
`establishing operation within a secure electronic transaction and arranged to
`perform different quality user authentication methods, wherein the difference in
`quality of user authentication varies between an inherently relatively lower quality
`and an inherently relatively higher quality from a security perspective, whereby the
`portable data carrier is arranged to perform a user authentication using one of said
`implemented user authentication methods and the portable data carrier is arranged
`to confirm the authentication to a terminal, and wherein the data carrier is arranged
`to create quality information about said stating how the authentication of the user
`was performed by the used user authentication method used and to attach such
`quality information to the result of the security establishing operation.
`
`See U.S. Patent App. No. 10/531,259, May 18, 2009 Amendments. The patentee explained that
`
`the amendments clarified the distinction between the categories of authentication methods utilized
`
`by the claimed inventions:
`
`Claim 1 has been amended to clarify the intended meaning of the claim without
`affecting the scope of the claim as previously presented. The difference in
`quality of the user authentication specifically is clarified by denoting that the
`quality may be inherently a relatively lower quality or inherently a relatively
`higher quality from a security perspective. Support for the amendment is found
`on page 5, last paragraph wherein the terms “low-quality” and “higher-quality” are
`used to describe two authentication methods. The word “inherently” has been
`added for clarification to indicate that the method itself inherently provides
`less security or more security depending on the nature of the method (e.g.,
`biometric versus PIN). The objective of the amendment is to better define the
`inherent nature of the user authentication method from a security perspective.
`
`See U.S. Patent App. No. 10/531,259, May 18, 2009 Applicant Remarks. This explanation was
`
`provided in the context of an obviousness objection based on art that taught that the user may use
`
`one of different authentication methods—however, the prior art did not teach that the different
`
`authentication methods utilized by the user differed in quality from a security perspective and that
`
`information regarding the quality of the method used is attached to the result of the security
`
`
`
`9
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 12 of 23
`
`establishing operation. May 18, 2009 Applicant Remarks at 8. To that end, the patentee added
`
`the language in the context of broader amendments to clarify that the two authentication methods
`
`must be “inherently” distinct from a security perspective.
`
`21.
`
`I also disagree with Defendants’ other arguments that the disputed phrase does not
`
`define the scope of the “inherently relatively lower” and “inherently relatively higher”
`
`authentication methods. For example, Defendants argue that the ’249 Patent “does not enable a
`
`POSITA to determine, for example, whether a token-based method is of inherently higher or lower
`
`(or equivalent) quality than a knowledge-based method.” Defendants’ Brief at 16. According to
`
`the Defendants, a “token-based” method is “something you have,” such as “a key fob or ID badge.”
`
`Defendants’ Brief at 14. But a “token-based” method does not make sense in the context of the
`
`claimed portable data carrier because the portable data carrier is in and of itself “something you
`
`have.” The ’249 Patent contemplates that merely possessing the portable data carrier (the “token,”
`
`as defined by Defendants) is not sufficient—there needs to be another category of authentication
`
`(e.g., knowledge-based and/or biometric authentication) used in connection with the portable data
`
`carrier. See ’249 Patent at 1:65 – 2:3. The patentee made this point in distinguishing the prior art
`
`during prosecution of the ’249 Patent:
`
`While Russo mentions the use of smart cards in the written description of the
`published application, the smart cards are used to support a specific
`authentication method during user authentication (using something you have)
`but none of the data carriers is arranged to perform different quality user
`authentication methods and to perform user authentication using one of the
`different user authentication methods.
`
`See U.S. Patent App. No. 10/531,259, May 27, 2010 Applicant Remarks. As this passage explains,
`
`the ’249 Patent contemplates that a “token-based” method is not sufficient and that there needs to
`
`be another category of authentication tied to the token.
`
`22.
`
`I also disagree with Defendants’ argument that the ’249 Patent lacks “whether any
`
`
`
`10
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 13 of 23
`
`given authentication method is of inherently relatively higher or lower (or equivalent) quality than
`
`any other method within the same category,” such as two biometric methods. Defendants’ Brief
`
`at 16. This argument is unpersuasive because the use of two methods within the same category is
`
`not the distinction required by the ’249 Patent. Instead, the claims require a comparison between
`
`authentication methods that differ inherently from a security perspective, for example knowledge-
`
`based vs. biometric-based authentication methods. To that end, the ’249 Patent treats biometric
`
`methods as the “inherently relatively higher quality” methods and are contrasted with lower-
`
`quality knowledge-based authentication methods.
`
`23.
`
`I also find Defendants’ argument that the ’249 Patent does not provide guidance on
`
`how to treat as to “multi-category” authentication methods unpersuasive. Defendants’ Brief at 16.
`
`For example, Defendants argue that the ’249 Patent fails to provide “guidance on how to determine
`
`if a given multi-category authentication method (e.g., fingerprints entered in a specific order) is of
`
`inherently relatively higher or lower (or the same) quality as another multi-category method (e.g.,
`
`fingerprint entered into a key fob), or as a single category method.” Defendants’ Brief at 16. But
`
`the ’249 Patent contemplates that the use of “fingerprints” (whether in a specific order or not) is
`
`considered a “biometric” method of “inherently higher quality” from a security perspective. See
`
`’249 Patent at 2:59-63, 3:58-62. Further, as explained above, the “token-based” methods described
`
`by Defendants are unpersuasive in light of the teachings of the ’249 Patent. For these reasons,
`
`Defendants’ “multi-factor” authentication examples do not add any uncertainty to the contours of
`
`the ’249 Patent.
`
`24.
`
`I also disagree with Defendants’ argument that the ’249 Patent’s teachings that
`
`“biometrics are inherently more secure than knowledge-based methods” by arguing that this is
`
`“incompatible with a POSITA’s understanding.” Defendants’ Brief at 16-17. Based on my
`
`
`
`11
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 14 of 23
`
`understanding of the ’249 Patent claims, specification, and prosecution history, the ’249 Patent’s
`
`teachings that the “biometric” authentication methods are “inherently relatively higher quality”
`
`when compared to knowledge-based authentication methods is taught with reasonable certainty.
`
`Whether there may be instances where one biometric method is more secure than another biometric
`
`method or whether there are instances where a biometric is not used in accordance with its intended
`
`use (for example, using facial recognition or fingerprint input on someone who is “sleeping” or
`
`“unconscious”) does not bear on the ultimate issue of whether the ’249 Patent teaches that
`
`“biometric” authentication methods constitute those with “inherently relatively higher quality”
`
`from a security perspective with reasonable certainty within the context of the ’249 Patent.
`
` declare under the penalty of perjury under the laws of the United States that the above is
`
` I
`
`true and correct.
`
`Executed on this 9th day of June, 2022 in San Luis Obispo CA.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`By: _____________________________
`
`
`
`Hugh Smith, Ph.D.
`
`
`
`12
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 15 of 23
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Exhibit 1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 16 of 23
`Hugh M. Smith, Ph.D.
`hms@husmith.com
`(805) 550-8023
`
`
`
`
`I.
`
`Education
`
`Ph.D. in Computer Science November 1999
`Michigan State University, College of Engineering
`Dissertation Title: Multicast Videoconferencing over Internet Style Networks
`
`Masters of Science in Computer Science, December 1994
`Michigan State University, College of Engineering
`Research Focus: Parallel and Distributed Computing
`
`
`
`Bachelors of Science in Computer Science, May, 1985
`Xavier University, College of Arts and Science
`
`
`II. Academic Experience:
`
`9/16-6/17, 9/09 – 6/13, Director of the Cal Poly Computer Engineering Program
` Associate Director of the Computer Engineering Program, 2007-2009
`
`9/21-present, Department of Computer Engineering, California Polytechnic State University
`1/00 – 9/21, Department of Computer Science, California Polytechnic State University
` Tenured Full Professor in the Department of Computer Science/Computer Engineering
` Awarded the Computer Engineering Program Most User Friendly Award (“In recognition
`of your commitment and dedication to student success), 2015
` Awarded the Computer Science Department Professor of the Year, 2006
` Awarded the College of Engineering/TRW Teaching in Excellence award, 2002.
` Awarded the Computer Engineering Program Instructor of the Year, 2002.
` Awarded the Computer Engineering Program Lab Instructor of the Year, 2001.
` Laboratory Manager for the Cal Poly Advanced Networking Laboratory, 2001-2007
` Developed and taught the senior level Computer Networks I and Networks II courses.
`Course activities included the theoretical aspects of computer networks, security, wired
`and wireless networks, and the implementation of protocol layers from the physical to
`application layer. Courses include reinforcement of these concepts through socket
`programming and hands-on networking experience (routers/switches) in Cal Poly’s
`Advanced Networking Laboratory.
` Developed and taught the Graduate Level Computer Networks course. This course
`involves the study and analysis of the theory and implementation of both academic and
`industry research of computer networks.
` Taught the Introduction to Computer Science, System Programming, and Digital
`Electronics Computer Engineering Program courses.
`
`
`
`March 22, 2022
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 17 of 23
`
`Dr. Hugh M. Smith
`
`
`5/98 – 7/98, Instructor, Department of Computer Science and Engineering, Michigan State
`University
` Taught the “Algorithms and Computing” course, which covered an introduction to
`computer science and programming in C++.
`
`
`9/92 – 5/96, Teaching Assistant, Department of Computer Science and Engineering, Michigan
`State University
` Courses included Object Oriented Programming and Computer Architecture
`
`
`III. Professional Experience:
`
`3/10 – 6/13, Android Mobile Phone App Development
` Developed and released the Android App Lockmenu (www.lockmenu.com)
` Managed the design, implementation, testing, marketing and patent submission for
`the Lockmenu app.
`
`12/03 – present, Intellectual Property Consulting
` Worked as a IP Expert Witness on hardware and software related cases. Work
`included both infringement and invalidity analysis.
` Wrote expert reports and testified in both depositions and trials
`
`
`7/00 – 8/00, Faculty Employment, Cisco Systems
` Responsibilities included development of a process for setting up Advanced Networking
`Labs at teaching universities.
`
`
`9/95 – 5/98, Research Assistant, Department of Computer Science and Engineering, Michigan
`State University
` Researched issues involved in the transmission and control of multicast video over
`heterogeneous networks.
` Addressed issues in controlling multicast video using various compression algorithms
`(MPEG, Motion JPEG) over ATM and Ethernet networks.
`
`
`5/93 – 8/93, Research Assistant, Department of Computer Science and Engineering, Michigan
`State University
` Researched issues in developing AI systems to provide real-time diagnostics tools.
`
`5/85 – 8/92 The Procter and Gamble Company, Cincinnati, Ohio
`9/90 - 8/92, Group Manager,
`5/89 - 9/90, Senior Systems Analyst/Project Manager
`5/85 - 5/89, Systems Analyst
` Managed all aspects of a large distributed Purchasing and Inventory Control system,
`which included over 2,000 users, processed over $250 million in yearly purchases, and
`tracked over $60 million in inventory.
` Managed five-person support team that involved recruiting, training, performance
`appraisals and development plans.
`
`
`
`
`
`(2/5)
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 18 of 23
`
`Dr. Hugh M. Smith
`
` Led a division wide effort as a Project Manager to develop a decentralized quality
`monitoring information system.
` Coordinated hardware and software upgrades, capacity planning, and on-going
`maintenance as a computer System Manager.
`
`
`5/83 – 5/85, Programmer Analyst, Merrell Dow Research Institute, Cincinnati, Ohio
` Responsible for system development and support.
`
`
`
`
`IV. Research related activities
`
`
`
`
` Presented the paper titled: An Embedded System Design Experience for First Year
`Computing Majors, at the 8th annual FYEE Conference, Columbus Ohio, August 2016.
`
` Presented the paper titled: Microcontroller Based Introduction to Computer Engineering, at
`the 7th annual FYEE Conference, Roanoke VA, August 2015.
`
`
` Presented the paper titled: Toward a common host interface for network processor at the
`2003 IASTED International Conference on Communications, Internet, & Information
`Technology (CIIT) Scottsdale, AZ, November 2003.
` Conference session chair for the “Information Systems and the Internet III – Systems
`Architectures” session
`
`
` General Conference Program Committee, IEEE International Conference on
`Communications (ICC), 2003
`
` Presented the paper titled: Effective Call Admission Control for Video Phone Applications at
`the International Conference on Networking (ICON’03) in Sydney Australia, September
`2003.
`
` Presented the paper titled: Feedback Scalability for Multicast Videoconferencing at the
`International Conference on Networking (ICN’01) in Colmar France in July 2001.
`
` Presented the paper titled: Fair Link Sharing with Layered Multicast Videoconferencing at
`the IEEE GLOBECOM in San Francisco in November 2000.
`
` Presented the paper titled: Pattern Smoothing for Compressed Video Transmission at the
`IEEE International Conference on Communications (ICC ’97) in Montreal Canada in June
`1997.
`
` Patent Application t