`
`UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`
`
`AIRE TECHNOLOGY LTD.,
`
`
`
`
`
`
`
`Plaintiff,
`
`
`
`
`
`Case No. 6:21-cv-01101-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`
`
`
`
`v.
`
`APPLE INC.,
`
`
`
`
`
`
`
`
`
`
`
`Defendant.
`
`
`
`PLAINTIFF AIRE TECHNOLOGY LTD.’S SUR-REPLY
`CLAIM CONSTRUCTION BRIEF
`
`
`
`
`Case 6:21-cv-01101-ADA Document 49 Filed 07/28/22 Page 2 of 20
`
`TABLE OF CONTENTS
`
`I.
`
`INTRODUCTION ................................................................................................................... 1
`
`II. DISPUTED TERMS ................................................................................................................ 1
`
`A. U.S. Patent No. 8,174,360 (“the ’360 Patent”) .................................................................... 1
`
`i. “a measuring device…” ................................................................................................... 1
`
`1. The claim confirms the term has structural meaning .................................................. 1
`
`2. The specification confirms the term has a structural meaning .................................... 2
`
`3. The prosecution history confirms the term has structural meaning ............................. 3
`
`4. The extrinsic evidence confirms the term has structural meaning .............................. 3
`
`5. The claim is not indefinite ........................................................................................... 4
`
`ii. “a control signal,” Claim 1, 11, and 15 ........................................................................... 5
`
`iii. “bandwidth,” Claim 2 ..................................................................................................... 5
`
`B. U.S. Patent No. 8,205,249 (“the ’249 Patent”) .................................................................... 6
`
`i. “an inherently relatively lower quality and an inherently relatively higher quality from
`a security perspective”, Claims 1 and 10 ............................................................................. 6
`
`1. The ’249 Patent specification teaches the meaning of the phrase ............................... 6
`
`2. Apple engages in the wrong indefiniteness inquiry ..................................................... 9
`
`a. The breadth of the claims do not render them indefinite ...................................... 10
`
`b. Apple’s “unanswered questions” are all answered ............................................... 10
`
`3. In the alternative, the Court should construe the disputed phrase ............................. 12
`
`ii. “the portable data carrier is arranged to perform a user authentication . . . to confirm
`the authentication to a terminal, and . . . to create quality information . . . and to attach
`such quality information . . . ”, Claim 10 .......................................................................... 13
`
`C. U.S. Patent No. 8,581,706 (“the ’706 Patent”) .................................................................. 15
`
`i. “security module”, Claim 18 ......................................................................................... 15
`
`III.
`
`CONCLUSION ................................................................................................................. 15
`
`
`
`i
`
`
`
`Case 6:21-cv-01101-ADA Document 49 Filed 07/28/22 Page 3 of 20
`
`Cases
`
`TABLE OF AUTHORITIES
`
`Blitzsafe Tex., LLC v. Subaru Corp.,
`No. 2:17-CV-00421-JRG-RSP, 2018 WL 6504174 (E.D. Tex. Dec. 11, 2018) ......................... 2
`
`CCS Fitness, Inc. v. Brunswick Corp.,
`288 F.3d 1359 (Fed. Cir. 2002) ................................................................................................. 10
`
`Cisco Sys., Inc. v. Int’l Trade Comm’n, 873 F.3d 1354, 1361 (Fed. Cir. 2017) ............................ 15
`
`Danfoss Power Sols. Inc. v. DeltaTech Controls,
`No. 16-CV-3111 (NEB/DTS), 2019 WL 1517615 (D. Minn. Apr. 8, 2019) ............................ 13
`
`DDR Holdings, LLC v. Hotels.com, L.P.,
`773 F.3d 1245 (Fed. Cir. 2014) ............................................................................................... 7, 8
`
`Dyfan, LLC v. Target Corp.,
`28 F.4th 1360 (Fed. Cir. 2022) .................................................................................................... 3
`
`Ergo Licensing LLC v. CareFusion 303, Inc.,
`673 F.3d 1361 (Fed. Cir. 2012) ................................................................................................... 3
`
`Greenberg v. Ethicon Endo-Surgery, Inc.,
`91 F.3d 1580 (Fed. Cir. 1996) ..................................................................................................... 3
`
`Hologic, Inc. v. SenoRx, Inc.,
`639 F.3d 1329 (Fed. Cir. 2011) ................................................................................................. 13
`
`Inventio AG v. ThyssenKrupp Elevator Ams. Corp.,
`649 F.3d 1350 (Fed. Cir. 2011) ................................................................................................... 2
`
`Invitrogen Corp. v. Biocrest Mfg., L.P.,
`424 F.3d 1374 (Fed. Cir. 2005) ................................................................................................. 10
`
`Irdeto Access, Inc. v. Echostar Satellite Corp.,
`383 F.3d 1295 (Fed. Cir. 2004) ................................................................................................. 13
`
`Nature Simulation Sys. Inc. v. Autodesk, Inc.,
`23 F.4th 1334 (Fed. Cir. 2022) .................................................................................................... 6
`
`Nevro Corp. v. Bos. Sci. Corp.,
`955 F.3d 35 (Fed. Cir. 2020) ....................................................................................................... 6
`
`Niazi Licensing Corp. v. St. Jude Med. S.C., Inc.,
`30 F.4th 1339 (Fed. Cir. 2022) .................................................................................................. 10
`
`Nystrom v. TREX Co.,
`424 F.3d 1136, 1145 (Fed. Cir. 2005) ....................................................................................... 13
`
`
`
`ii
`
`
`
`Case 6:21-cv-01101-ADA Document 49 Filed 07/28/22 Page 4 of 20
`
`Pelican Int’l Inc. v. Hobie Cat Comp.,
`No. 20-cv-2390-BAS-MSB, 2022 WL 298959 (S.D. Cal. Feb. 1, 2022) ................................... 3
`
`R2 Sols. LLC v. Deezer SA,
`No. 4:21-cv-90, 2022 WL 36240 (E.D. Tex. Jan. 4, 2022) ......................................................... 4
`
`Rexnord Corp. v. Laitram Corp.,
`274 F.3d 1336 (Fed. Cir. 2001) ................................................................................................. 14
`
`Ruckus Wireless, Inc. v. Innovative Wireless Sols., LLC,
`824 F.3d 999 (Fed. Cir. 2016) ................................................................................................... 13
`
`Sonix Tech. Co. v. Publ’ns Int’l, Ltd.,
`844 F.3d 1370 (Fed. Cir. 2017) ........................................................................................... 6, 7, 8
`
`Sonrai Memory Ltd. v. Oracle Corp.,
`No. 1:22-CV-94-LY, 2022 WL 800730 (W.D. Tex. Mar. 16, 2022) .......................................... 1
`
`
`
`
`
`
`
`iii
`
`
`
`Case 6:21-cv-01101-ADA Document 49 Filed 07/28/22 Page 5 of 20
`
`I.
`
`INTRODUCTION
`
`Plaintiff Aire Technology Ltd. (“Aire”) submits this sur-reply claim construction brief in
`
`response to Apple’s Reply Claim Construction Brief (Dkt. No. 42, “Reply”).
`
`II.
`
`DISPUTED TERMS
`
`A.
`
`U.S. Patent No. 8,174,360 (“the ’360 Patent”)
`
`i.
`
`“a measuring device…”
`
`Each of Apple’s quibbles with Aire’s arguments is meritless. Apple cannot meet its burden
`
`to overcome the presumption that 112(6) does not apply in light of the claims, specification,
`
`prosecution history, and extrinsic evidence.
`
`1. The claim confirms the term has structural meaning
`
`Apple does not dispute that the claim recites three structural components that interact with
`
`each other: (1) “transmission oscillator,” (2) “communication element,” and (3) “switching
`
`apparatus.” In light of the interaction of the structural components recited in the claim, Apple is
`
`wrong that the claim does not describe how the measuring device interacts with other components
`
`in a way that informs the structural character of the measuring device. Reply at 4. Specifically,
`
`the claim recites (1) that the “measuring device” monitors the frequency or impedance of the
`
`“transmission oscillator,” (2) that the “measuring device” outputs a control signal to the “switching
`
`apparatus,” and (3) that the “switching apparatus” is connected to the “measuring device.” Thus,
`
`the claim recites the measuring device’s input, output, and connections. See Sonrai Memory Ltd.
`
`v. Oracle Corp., No. 1:22-CV-94-LY, 2022 WL 800730, at *9 (W.D. Tex. Mar. 16, 2022)
`
`(“Structure may also be provided by describing the claim limitation’s operation, such as its input,
`
`output, or connections.”) (citation omitted).
`
`Moreover, the claim recites how the “measuring device” operates to achieve its objectives:
`
`
`
`1
`
`
`
`Case 6:21-cv-01101-ADA Document 49 Filed 07/28/22 Page 6 of 20
`
`it ascertains a change of the frequency or impedance of the transmission oscillator and then outputs
`
`a control signal to the switching apparatus. Apple cannot distinguish the numerous cases that hold
`
`that terms are not governed by 112(6) under these circumstances. See Dkt. No. 33 (“Resp. Br.”)
`
`at 6-7. For example, in Inventio the Federal Circuit held that the term “modernizing device”
`
`denoted sufficient structure based on surrounding claim language that “delineate the components
`
`that the modernizing device is connected to, describe how the modernizing device interacts with
`
`those components, and describe the processing that the modernizing device performs.” Inventio
`
`AG v. ThyssenKrupp Elevator Ams. Corp., 649 F.3d 1350, 1359 (Fed. Cir. 2011).1 This is not a
`
`case where the claim merely recites “a measuring device for measuring” without providing any
`
`structural limitations on the “device.”
`
`2. The specification confirms the term has a structural meaning
`
`As was the case in Inventio, the specification here supports the conclusion that the claimed
`
`“measuring device” is not a purely functional limitation. Inventio, 649 F.3d at 1358-59. For
`
`example, Figures 2, 5, and 7 provide detailed depictions of the circuitry and components that
`
`comprise the “measuring device.” The figures further illustrate the connections and interaction
`
`with the other three claimed structural components. The figures also depict the inputs and outputs
`
`of the “measuring device.” Thus, Apple is wrong to suggest that the specification merely describes
`
`the “measuring device” as “any collection of circuits or software programs.” Reply at 2. Apple is
`
`also incorrect that the specification does not “state how such software programs are configured.”
`
`Id. at 2, n.2. Rather, the flow charts in Figures 3 and 4 provide algorithms that a POSITA would
`
`
`1 Apple’s footnote that Williamson eliminated the “strong” presumption based on the absence of
`the word “means” (Reply at 3 n.3) is irrelevant because courts continue to apply the reasoning set
`forth in Inventio and the strength of the presumption does not impact the analysis here. See, e.g.,
`Blitzsafe Tex., LLC v. Subaru Corp., No. 2:17-CV-00421-JRG-RSP, 2018 WL 6504174, at *24
`(E.D. Tex. Dec. 11, 2018).
`
`
`
`2
`
`
`
`Case 6:21-cv-01101-ADA Document 49 Filed 07/28/22 Page 7 of 20
`
`understand in the context of a software implementation. See Ergo Licensing LLC v. CareFusion
`
`303, Inc., 673 F.3d 1361, 1365 (Fed. Cir. 2012) (“An algorithm may be expressed in any
`
`understandable terms including as a mathematical formula, in prose, or as a flow chart, or in any
`
`other manner that provides sufficient structure.”).2 Thus, Apple’s attempt to distinguish Dyfan
`
`falls flat, and the fact the “measuring device” may be implemented in software does not mean that
`
`it is governed by 112(6). See Dyfan, LLC v. Target Corp., 28 F.4th 1360, 1369 (Fed. Cir. 2022).
`
`3. The prosecution history confirms the term has structural
`meaning
`
`Apple cannot dispute that neither the Examiner nor Applicant ever contended that the term
`
`
`
`was governed by 112(6). Reply at 3. Indeed, Apple’s argument only confirms that the Examiner
`
`applied the plain and ordinary meaning and did not attempt to compare the corresponding structure
`
`in the specification to the structure identified in the alleged prior art—if the Examiner thought the
`
`term “measuring device” did not provide sufficient structure, then the Examiner would have been
`
`obligated to identify and compare the corresponding structure under 112(6).
`
`4. The extrinsic evidence confirms the term has structural meaning
`
`Dr. Brogioli’s declaration citing multiple dictionary definitions provides further evidence
`
`that “measuring device” is a known term that describes a class of structures. First, Apple’s
`
`argument that the definition of the noun measuring device “is a description of function” is
`
`meritless. Reply at 2. The “Federal Circuit has repeatedly condoned the use of dictionaries to
`
`determine if a disputed term has achieved recognition as a noun denoting structure, even [where]
`
`the noun is derived from the function performed.” Pelican Int’l Inc. v. Hobie Cat Comp., No. 20-
`
`cv-2390-BAS-MSB, 2022 WL 298959, at *8 (S.D. Cal. Feb. 1, 2022) (citing Greenberg v. Ethicon
`
`
`2 All emphasis added unless stated otherwise.
`
`
`
`3
`
`
`
`Case 6:21-cv-01101-ADA Document 49 Filed 07/28/22 Page 8 of 20
`
`Endo-Surgery, Inc., 91 F.3d 1580, 1583 (Fed. Cir. 1996) (“Dictionary definitions make clear that
`
`the noun ‘detent’ denotes a type of device with a generally understood meaning in the mechanical
`
`arts, even though the definitions are expressed in functional terms.”)). Second, Apple’s
`
`argument that the claimed “measuring device” “does not ‘show’ anything” is also not persuasive—
`
`the claimed “measuring device” shows (i.e., “gives indication or record of”)3 a change in the
`
`frequency or impedance.
`
`5. The claim is not indefinite
`
`Should the Court find the presumption against 112(6) is overcome, Apple cannot meet its
`
`burden to prove by clear and convincing evidence that the claims are indefinite for lack of
`
`corresponding structure. At a minimum, Figures 3 and 4 (along with the associated descriptions
`
`in the specification) provide corresponding structure in the form of a “flow chart” that the
`
`specification clearly links to the claimed “measuring device.” ’360 Patent at 6:50-67; 7:36-8:6.
`
`For example, the specification plainly states that the “measuring unit 46” (illustrated in Figure 2)
`
`monitors the frequency or impedance of the transmission oscillator in resonance. Id. at 6:53-62.
`
`Apple’s expert testimony is not credible. For example, Apple’s expert did not even bother
`
`to consider or review the exemplary “measuring device” the patent identifies “in the stated German
`
`patent application DE 102 06 676.” ’360 Patent at 4:14-16; Ex. 14 (Caloyannides Depo. Tr.) at
`
`114:1 – 115:16. At most, Apple appears to raise an enablement or written description argument
`
`with respect to the modified PLL implementation described in Figures 5 and 7. See R2 Sols. LLC
`
`v. Deezer SA, No. 4:21-cv-90, 2022 WL 36240, at *21 (E.D. Tex. Jan. 4, 2022) (“Defendants’
`
`argument appears to be more akin to a challenge as to the adequacy of written description or
`
`
`3 See, e.g., Merriam-Webster defining “show” to mean “5: to give indication or record of.” Ex. 15
`(https://www.merriam-webster.com/dictionary/show).
`
`
`
`4
`
`
`
`Case 6:21-cv-01101-ADA Document 49 Filed 07/28/22 Page 9 of 20
`
`enablement, which are not at issue in these claim construction proceedings.”). But even Apple’s
`
`expert admitted that Figure 5 can detect a change in frequency through the resulting phase change
`
`using the phase locked loop implementation. Ex. 14 (Caloyannides Depo. Tr.) at 113:9-19. Thus,
`
`the specification describes and illustrates several different embodiments of the “measuring
`
`device,” and Apple’s argument fails.
`
`ii.
`
`“a control signal,” Claim 1, 11, and 15
`
`Aire does not seek to read the word “control” out of the claims; rather, it is Apple that seeks
`
`to redefine the notion of “control” to require “command.” Reply at 5. But Apple cannot identify
`
`any evidence that suggests the term should be redefined. Moreover, Apple still refuses to explain
`
`why such a change is necessary or what the impact of the change actually means in terms of the
`
`scope of the claim. Nor could Apple’s expert explain the impact of construing the term to require
`
`“a command” in his deposition. Ex. 14 (Caloyannides Depo. Tr.) at 125:19 – 126:25.
`
`
`
`Apple misrepresents the prosecution history by arguing that the applicant “equat[ed] the
`
`claimed control signal to a ‘power down command.’” Reply at 5. As explained in Aire’s Response,
`
`the cited statement was not even made with respect to the term “control signal.” Resp. Br. at 10.
`
`Moreover, Apple’s argument is nonsensical because the claimed “control signal” is used in the
`
`context of switching on the communication element—not for a “power down command.”
`
`
`
`Finally, Apple’s IPR further contradicts its construction here. While Apple’s IPR expressly
`
`addressed Apple’s proposed construction for the term “measuring device,” Apple did not even
`
`bother to notify the Board about its proposed construction for the term “control signal.” Ex. 16 at
`
`13-15 (Apple’s ’360 IPR). Nor did Apple apply its proposed construction to the alleged prior art.
`
`iii.
`
`“bandwidth,” Claim 2
`
`In an effort to limit the number of disputes before the Court, the parties have agreed that
`
`
`
`5
`
`
`
`Case 6:21-cv-01101-ADA Document 49 Filed 07/28/22 Page 10 of 20
`
`the term “bandwidth” in Claim 2 of the ’360 Patent means a “range of frequencies available for
`
`communication.”
`
`B.
`
`U.S. Patent No. 8,205,249 (“the ’249 Patent”)
`
`i.
`
`“an inherently relatively lower quality and an inherently
`relatively higher quality from a security perspective”, Claims 1
`and 10
`
`Apple engages in the wrong indefiniteness analysis by insisting that the ’249 Patent “does
`
`
`
`not provide an exclusive definition” for the disputed phrase and repeatedly veers into an
`
`impermissible “unanswered questions” inquiry regarding the disputed claim scope. See Nature
`
`Simulation Sys. Inc. v. Autodesk, Inc., 23 F.4th 1334, 1340 (Fed. Cir. 2022) (“The district court
`
`applied an incorrect standard of ‘unanswered questions’ and a flawed analysis of validity.”). But
`
`“[d]efiniteness does not require that a potential infringer be able to determine ex ante if a particular
`
`act infringes the claims.” Nevro Corp. v. Bos. Sci. Corp., 955 F.3d 35, 40 (Fed. Cir. 2020). The
`
`relevant inquiry is whether “a patent’s claims, viewed in light of the specification and prosecution
`
`history, inform those skilled in the art about the scope of the invention with reasonable certainty.”
`
`Sonix Tech. Co. v. Publ’ns Int’l, Ltd., 844 F.3d 1370, 1377 (Fed. Cir. 2017). And, here, the ’249
`
`Patent specification and prosecution history inform a POSITA of the scope of Claims 1 and 10
`
`with reasonable certainty. See Resp. Br. at 13-19; Smith Decl. ¶¶ 13-20.4
`
`1. The ’249 Patent specification teaches the meaning of the phrase
`
`The ’249 Patent specification “provides an objective baseline through which to interpret
`
`the claims.” Sonix Tech. Co., 844 F.3d at 1378. For example, the ’249 Patent specification
`
`
`4 Apple misrepresents that Aire “agrees that the claim language recites subjective terms of degree”
`and that Aire does not “dispute that the relative quality of an authentication method is viewpoint
`dependent and context specific.” Reply at 7 n.5. Not so. Aire’s position is that—to the extent the
`phrase is a term of degree—the intrinsic evidence provides objective criteria for a POSITA to
`ascertain the meaning of the disputed phrase.
`
`
`
`6
`
`
`
`Case 6:21-cv-01101-ADA Document 49 Filed 07/28/22 Page 11 of 20
`
`consistently teaches that the “inherently relatively higher quality” authentication method is one
`
`that “presupposes the personal presence of the user,” such as through the use of a biometric method
`
`like a fingerprint, while the “inherently relatively lower quality” methods are taught as knowledge-
`
`based methods (such as a password or PIN) because “the knowledge can have been acquired by
`
`an unauthorized user.” See Resp. Br. at 14-17. The ’249 Patent specification further delineates
`
`examples of what types of authentication methods may fall within each category—for example,
`
`by explaining that the “higher” quality biometric methods may be based on “physiological
`
`features, such as facial features, features of the eye or fingerprints, or behavior-based features,
`
`such as speech or writing sequences expressed by the voice or by writing operations.” ’249 Patent
`
`at 2:59-63. The ’249 Patent specification also provides examples of the “lower” quality methods,
`
`such as a knowledge-based PIN. 5 Id. at 3:25-29.
`
`There is no “subjective” aspect to this dichotomy: either a method presupposes the
`
`presence of the user (such as a biometric), in which case it is the “inherently relatively higher
`
`quality” method, or a method does not presuppose the user (such as a knowledge-based method
`
`like a PIN), in which case it is the “inherently relatively lower quality” method. Smith Decl. ¶¶
`
`13-18; Ex. 17 (Smith Depo. Tr.) at 25:15-26:9. This determination is made through the “objective”
`
`criteria of whether the authentication method presupposes the presence of the user (i.e., a biometric
`
`method) or can otherwise be shared (i.e., a knowledge-based method). Id. Thus, to the extent the
`
`disputed phrase “may be a term of degree, it is not ‘purely subjective.’” Sonix Tech. Co., 844 F.3d
`
`at 1378; see also DDR Holdings, LLC v. Hotels.com, L.P., 773 F.3d 1245, 1260 (Fed. Cir. 2014)
`
`
`5 Aire disagrees that the specification provides a “single example” for the disputed phrase. The
`’249 Patent consistently characterizes the “higher” quality methods as biometrics and the “lower”
`quality methods as knowledge-based methods in multiple instances and across all figures. See
`’249 Patent at 1:31-56, 3:21-33, 3:55-61, 4:5-8, 5:31-37.
`
`
`
`7
`
`
`
`Case 6:21-cv-01101-ADA Document 49 Filed 07/28/22 Page 12 of 20
`
`(for “terms of degree, specific and unequivocal examples may be sufficient to provide a skilled
`
`artisan with clear notice of what is claimed.”).
`
`Likewise, this case is not like Interval Licensing because the disputed phrase is not
`
`“subjective” and viewpoint dependent. Reply at 8. “Interval Licensing involved terms that were
`
`subjective in the sense that they turned on a person’s tastes or opinion.” Sonix Tech. Co., 844 F.3d
`
`at 1378. But this is not a situation where the meaning of the disputed phrase “‘depend[s] solely
`
`on the unrestrained, subjective opinion of a particular individual purportedly practicing the
`
`invention,’ without sufficient guidance in the specification to provide objective direction to one of
`
`skill in the art.” DDR Holdings, 773 F.3d at 1260 (citation omitted).
`
`Apple’s instance that the ’249 Patent’s use of the words “[f]or example” or “here” does not
`
`inject uncertainty into the comparison between the “lower” and “higher” authentication methods.
`
`Reply at 8-9. First, Apple relies on the use of “[f]or example” in the following sentence:
`
`For example, in a purse application it can be provided that an amount of money
`below a limiting value can be withdrawn from an account after PIN authentication,
`while amounts of money above the limiting value can only be withdrawn after
`authentication by means of a biometric feature.
`
`Reply at 8 (citing ’249 Patent at 1:43-56). This passage is an “example” of an application of the
`
`use of the different categories of authentication methods in connection with differing monetary
`
`thresholds—i.e., the use of the “lower” knowledge-based PIN for low monetary thresholds and the
`
`“higher” biometric authentication for higher monetary thresholds. This exemplary application
`
`hardly casts doubt on the breadth of the claim scope.
`
`Apple next takes issue with the following discussion of the claimed portable data carrier:
`
`It expediently supports at least one knowledge-based authentication method, e.g. a
`PIN check, and at least one biometric method, within which a biometric feature of
`the user 30 to be presented at the terminal 14 is checked. The biometric method
`inherently constitutes the higher-quality one here, since it presupposes the personal
`presence of the user 30; this is not ensured in the knowledge-based method since
`
`
`
`8
`
`
`
`Case 6:21-cv-01101-ADA Document 49 Filed 07/28/22 Page 13 of 20
`
`the knowledge can have been acquired by an unauthorized user.
`
`Reply at 8; ’249 Patent at 3:21-33. The word “here” is clarifying that the biometric method is the
`
`higher-quality authentication method because “it presupposes the personal presence of the user.”
`
`See Ex. 17 (Smith Depo. Tr.) 46:4-15 (“the biometric … is the example of a technique that
`
`presupposes the presence of the user.”).
`
`Finally, the cited portions of the prosecution history only further define the objective
`
`criteria. Reply at 9. For example, in explaining that the portable data carrier “may support at least
`
`one knowledge-based authentication method (a PIN check), and at least one biometric method[,]”
`
`the Applicant was explaining that the portable data carrier may also have additional knowledge
`
`and biometric-based methods, but supports at least one of each method. Reply at 9 (citing Dkt.
`
`No. 31-8 at -755). Notably, Apple omits that in the very next sentence the Applicant explains:
`
`“Obviously, the biometric method inherently constitutes a higher quality method of authentication
`
`as compared with the knowledge-based authentication method….” Id. Apple’s other cited portion
`
`of the prosecution history supports the categorical dichotomy: “[T]he terminal 14 checks how
`
`authentication is to be effected (e.g., knowledge-based or biometrically).” Id. That is, the terminal
`
`checks if the authentication is effected via a knowledge-based or biometric-based authentication
`
`method. As such, the prosecution history enforces the teachings of the “lower” and “higher”
`
`authentication methods as those that presuppose the personal presence of the user (such as a
`
`biometric) and those that do not (such as knowledge-based).
`
`2. Apple engages in the wrong indefiniteness inquiry
`
`Apple attempts to muster up “unanswered questions” about the scope of Claims 1 and 10
`
`and create a “zone of uncertainty” by arguing that the ’249 Patent does not answer all the
`
`hypothetical questions it can possibly concoct. Reply at 9-11. However, “a patentee need not
`
`
`
`9
`
`
`
`Case 6:21-cv-01101-ADA Document 49 Filed 07/28/22 Page 14 of 20
`
`define his invention with mathematical precision in order to comply with the definiteness
`
`requirement.” Invitrogen Corp. v. Biocrest Mfg., L.P., 424 F.3d 1374, 1384 (Fed. Cir. 2005).
`
`Regardless, the supposed issues identified by Apple are in fact “answered” by the teachings of the
`
`specification, prosecution history, and understanding of a POSITA.
`
`a. The breadth of the claims do not render them indefinite
`
`Apple argues that Claims 1 and 10 are written in a manner that is broader than a comparison
`
`between the “lower” and “higher” knowledge-based and biometric authentication methods. Reply
`
`at 9. “But a claim is not indefinite just because it is broad.” Niazi Licensing Corp. v. St. Jude
`
`Med. S.C., Inc., 30 F.4th 1339, 1347 (Fed. Cir. 2022). Specifically, Apple is wrong that because
`
`the claims contemplate that the portable data carrier is arranged to perform “different quality
`
`authentication methods,” then they are impermissibly broad. Reply at 9. While the ’249 Patent
`
`consistently describes the “lower” and “higher” categories of authentication methods, the ’249
`
`Patent expressly provides examples of methods that may fall within either of the categories—for
`
`example, the ’249 Patent contemplates the use of a litany of possible biometric methods, any one
`
`of which would fall in the “inherently relatively higher quality” category. See, e.g., ’249 Patent at
`
`2:59-63. Further, the “case law makes clear that a patentee need not ‘describe in the specification
`
`every conceivable and possible future embodiment of his invention.’” CCS Fitness, Inc. v.
`
`Brunswick Corp., 288 F.3d 1359, 1366 (Fed. Cir. 2002) (citation omitted). As such, Apple is
`
`wrong that the claims are somehow indefinite because the Applicant could have written claims
`
`that expressly defined the “lower” and “higher” authentication methods in the claims.6
`
`b. Apple’s “unanswered questions” are all answered
`
`
`6 Apple’s reliance on dependent claims 3 and 5 is unpersuasive. Those dependent claims simply
`clarify which authentication method was used in a particular electronic transaction.
`
`
`
`10
`
`
`
`Case 6:21-cv-01101-ADA Document 49 Filed 07/28/22 Page 15 of 20
`
`Apple is still wrong that its “token-based” authentication methods cast doubt on the validity
`
`of Claims 1 and 10. Apple’s insistence that the ’249 Patent does not address the use of a “token
`
`separate from the portable data carrier,” such as “a key fob with a code that changes every 60
`
`seconds” is a red herring. Reply at 11. As Apple notes, a “key fob” is not the portable data carrier.
`
`But the ’249 Patent requires that the portable data carrier “perform different user authentication
`
`methods”—something Apple’s expert agrees with. Ex. 18 (Black Depo. Tr.) at 29:10-19.7 To that
`
`end, Apple’s example (that contemplates entering a “code” provided from some external “fob”) is
`
`simply an act of executing a knowledge-based authentication method. Both experts (Drs. Smith
`
`and Black) had no issue applying this hypothetical to the ’249 Patent and Apple’s expert (Dr.
`
`Black) confirmed that the “PIN is just coming from something else, th[e] random one-time
`
`password-generator.” See Ex. 18 (Black Depo. Tr.) at 26:17 – 28:3; see also Ex. 17 (Smith Depo.
`
`Tr.) at 51:17 – 52:4, 52:11-16 (Dr. Smith: “the token is basically a knowledge based at the point
`
`where you get the passkey or whatever it is from the fob, so both of those would fall underneath
`
`the same category of an inherently relatively lower quality technique.”).
`
`
`
`Next, Apple complains that Aire is unable to address its “multi-factor authentication
`
`(MFA)” method hypotheticals. Reply at 11. Not so. When Apple posed its MFA examples to Dr.
`
`Smith, he explained exactly how a POSITA would understand an MFA method requiring
`
`fingerprints entered in a specific order in the context of the ’249 Patent: “[T]he question to ask is:
`
`Does the technique require or presuppose the presence of the user? And so the answer is: Yes, it
`
`does.” Ex. 17 (Smith Depo. Tr.) at 62:7-20. So, as to Apple’s example, Dr. Smith explained that
`
`
`7 Indeed, Dr. Smith reinforced that the portable data carrier is itself “something you have” and may
`itself be considered a “token-based user authentication method”—meaning Apple’s attempt to
`insert uncertainty with its token-based hypotheticals makes little sense here. Ex. 18 (Black Depo.
`Tr.) at 17:19 – 18:17.
`
`
`
`11
`
`
`
`Case 6:21-cv-01101-ADA Document 49 Filed 07/28/22 Page 16 of 20
`
`this example would fall into the “inherently relatively higher quality” category because “it
`
`presupposes the presence of the user.” Id. at 62:21 – 63:13. Additionally, because it is the portable
`
`data carrier that must perform the authentication, Apple still fails to explain how entering a
`
`fingerprint into a separate key fob works or has any relevance to the ’249 Patent claims. Reply at
`
`12; see also Ex. 18 (Black Depo. Tr.) at 28:4 – 29:9 (“if authentication is complete when you scan
`
`your fingerprint on a fob, it’s separate from anything in the claimed invention.”). And, to the
`
`extent the fingerprint scan data is merely relayed from the fob to the portable data carrier, then it
`
`is the same category of authentication as directly using a fingerprint.
`
`Finally, Apple’s argument that the ’249 Patent fails to provide “any guideposts for
`
`comparing different authentication methods within the same category” is unpersuasive. Reply at
`
`12. The ’249 Patent is concerned with distinguishing the two categories