`
`UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`
`SPEIR TECHNOLOGIES LTD.,
`
`
`
`
`
`
`
`Plaintiff,
`
`
`
`
`
`Case No. 6:22-cv-00077-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`
`
`
`
`v.
`
`APPLE INC.,
`
`
`
`
`
`
`
`Defendant.
`
`
`
`
`
`PLAINTIFF SPEIR TECHNOLOGIES LTD.’S RESPONSE TO DEFENDANT’S
`MOTION TO DISMISS CLAIMS OF DIRECT INFRINGEMENT
`OF U.S. PATENT NO. 7,765,399
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 2 of 17
`
`TABLE OF CONTENTS
`
`
`I.
`
`INTRODUCTION ................................................................................................................. 1
`
`II. LEGAL STANDARD ............................................................................................................ 2
`
`III. ARGUMENT ......................................................................................................................... 3
`
`A. Speir Sufficiently Alleges The Claimed Trusted Operating System ............................ 3
`
`B. Speir Sufficiently Alleges The Claimed Data Links..................................................... 5
`
`C. Speir Sufficiently Alleges The Claimed Human/Machine Interfaces........................... 7
`
`i.
`
`TouchID and/or FaceID are secure HMIs .............................................................8
`
`ii. There is a secure HMI for enabling bi-directional communication between
`the user and secure user processor ......................................................................10
`
`iii. There is exclusive exchange of secret information between the user and
`secure user processor through the secure HMI ...................................................11
`
`IV. CONCLUSION .................................................................................................................... 12
`
`
`
`i
`
`
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 3 of 17
`
`Cases
`
`TABLE OF AUTHORITIES
`
`Ashcroft v. Iqbal,
`556 U.S. 662 (2009) .................................................................................................................... 2
`
`Bell Atl. Corp. v. Twombly,
`550 U.S. 544 (2007) .................................................................................................................... 2
`
`Bot M8 LLC v. Sony Corp. of Am.,
`4 F.4th 1342 (Fed. Cir. 2021) ..................................................................................................... 3
`
`CPC Pat. Techs. Pty Ltd. v. Apple Inc.,
`No. 6:21-CV-00165-ADA, 2022 WL 118955 (W.D. Tex. Jan. 12, 2022) ......................... 3, 4, 6
`
`In re Bill of Lading Transmission & Processing Sys. Pat. Litig.,
`681 F.3d 1323 (Fed. Cir. 2012) .............................................................................................. 1, 4
`
`K-Tech Telecomms., Inc. v. Time Warner Cable, Inc.,
`714 F.3d 1277 (Fed. Cir. 2013) .............................................................................................. 1, 6
`
`Lone Star Fund V (U.S.), L.P. v. Barclays Bank PLC,
`594 F.3d 383 (5th Cir. 2010) ...................................................................................................... 2
`
`Nalco Co. v. Chem-Mod, LLC,
`883 F.3d 1337 (Fed. Cir. 2018) .......................................................................................... 1, 2, 8
`
`Panasonic Corp. v. Magna Int’l, Inc.,
`No. 6:21-CV-00319-ADA, 2022 WL 174513 (W.D. Tex. Jan. 19, 2022) ................................. 5
`
`Parity Networks, LLC v. Cisco Sys., Inc.,
`No. 6:19-CV-00207-ADA, 2019 WL 3940952 (W.D. Tex. July 26, 2019) ............................... 2
`
`Unification Techs. LLC v. Dell Techs., Inc.,
`No. 6:20-CV-00499-ADA, 2021 WL 1343188 (W.D. Tex. Jan. 28, 2021) ............................... 9
`
`United Servs. Auto. Ass’n v. PNC Bank N.A.,
`No. 2:21-CV-00246-JRG, 2022 WL 739521 (E.D. Tex. Jan. 14, 2022) .................................... 4
`
`USC IP P’ship, L.P. v. Facebook, Inc.,
`No. 6:20-CV-00555-ADA, 2021 WL 3134260 (W.D. Tex. July 23, 2021) ..................... 2, 6, 10
`
`Rules
`
`Fed. R. Civ. P. 12(b)(6)................................................................................................................... 2
`
`Fed. R. Civ. P. 15(a)(2) ................................................................................................................... 3
`
`
`
`
`ii
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 4 of 17
`
`I.
`
`INTRODUCTION
`
`The Court should deny Defendant Apple Inc.’s (“Apple”) motion to dismiss Plaintiff Speir
`
`Technologies Ltd.’s (“Speir”) claim for direct infringement of U.S. Patent No. 7,765,399 (“the
`
`’399 Patent”) (Dkt. No. 13, “Mot.”).
`
`Speir’s Amended Complaint (Dkt. No. 8, “Am. Compl.”) provides detailed notice of its
`
`theory of Apple’s direct infringement of exemplary claim 1 of the ’399 Patent. Apple seeks a
`
`complaint with expert report-level detail based on highly confidential information it possesses
`
`about the operation of its own products. But Speir need not “prove its case at the pleading stage.”
`
`In re Bill of Lading Transmission & Processing Sys. Pat. Litig., 681 F.3d 1323, 1339 (Fed. Cir.
`
`2012). Rather, “[t]he complaint must place the ‘potential infringer ... on notice of what activity ...
`
`is being accused of infringement.’” Nalco Co. v. Chem-Mod, LLC, 883 F.3d 1337, 1350 (Fed. Cir.
`
`2018) (citation omitted). As such, the “purpose of a motion to dismiss is to test the sufficiency of
`
`the complaint, not to decide the merits.” Id. (citation omitted) (emphasis in original).
`
`Apple cannot meaningfully contest that it is on notice of Speir’s theory of infringement.
`
`Instead, Apple disputes whether there is infringement based on the exemplary publicly-available
`
`evidence cited by Speir and its construction and interpretation of discrete sub-limitations of the
`
`asserted claims—issues that are not appropriate on a motion to dismiss. See Nalco, 883 F.3d at
`
`1349 (“Defendants’ arguments boil down to objections to [Plaintiff’s] proposed claim construction
`
`... a dispute not suitable for resolution on a motion to dismiss.”). The issues raised by Apple
`
`require discovery into the inner workings of Apple’s Secure Enclave—an aspect of the Accused
`
`Products for which Apple releases limited public information and that is not amenable to reverse
`
`engineering because it is specifically designed to keep sensitive user data secure. See K-Tech
`
`Telecomms., Inc. v. Time Warner Cable, Inc., 714 F.3d 1277, 1286 (Fed. Cir. 2013) (“A defendant
`
`cannot shield itself from a complaint for direct infringement by operating in such secrecy that the
`
`
`
`1
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 5 of 17
`
`filing of a complaint itself is impossible.”). Because Speir’s Amended Complaint plausibly alleges
`
`a claim for direct infringement of the ’399 Patent, Apple’s motion should be denied in its entirety.
`
`Additionally, while Speir’s pleadings are sufficient, any alleged ambiguities have been
`
`resolved in its preliminary infringement contentions, which have been served on Apple
`
`contemporaneously herewith. See, e.g., Parity Networks, LLC v. Cisco Sys., Inc., No. 6:19-CV-
`
`00207-ADA, 2019 WL 3940952, at *2 (W.D. Tex. July 26, 2019) (“[T]he Court finds that
`
`Plaintiff’s pleadings are sufficient and that any deficiencies will necessarily be addressed when
`
`Plaintiff serves its infringement contentions as is required.”). To that end, any issues raised in the
`
`instant motion are moot, and Apple’s motion to dismiss should be denied. Alternatively, the Court
`
`should grant Speir leave to amend its Amended Complaint to remedy any alleged deficiencies.
`
`II.
`
`LEGAL STANDARD
`
`Federal Rule of Civil Procedure 12(b)(6) requires that a complaint contain sufficient factual
`
`matter, if accepted as true, to “state a claim to relief that is plausible on its face.” Ashcroft v. Iqbal,
`
`556 U.S. 662, 678 (2009) (citation omitted). “The court’s task is to determine whether the plaintiff
`
`has stated a legally cognizable claim that is plausible, not to evaluate the plaintiff’s likelihood of
`
`success.” USC IP P’ship, L.P. v. Facebook, Inc., No. 6:20-CV-00555-ADA, 2021 WL 3134260,
`
`at *1 (W.D. Tex. July 23, 2021) (quoting Lone Star Fund V (U.S.), L.P. v. Barclays Bank PLC,
`
`594 F.3d 383, 387 (5th Cir. 2010)). “The plausibility standard ‘does not impose a probability
`
`requirement at the pleading stage; it simply calls for enough fact to raise a reasonable expectation
`
`that discovery will reveal evidence’ to support the plaintiff’s allegations.” Nalco Co., 883 F.3d at
`
`1350 (quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 556 (2007)).1
`
`
`1 Speir disagrees that there is some amorphous heightened pleading standard in patent cases
`involving hardware and software, as advocated by Apple. Mot. at 2, 5, 13-14. Indeed, Apple’s
`cited authority makes clear that “[a] plaintiff is not required to plead infringement on an element-
`by-element basis” and that a plaintiff “need not prove its case at the pleading stage.” Bot M8 LLC
`
`
`
`2
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 6 of 17
`
`Further, Federal Rule of Civil Procedure 15(a)(2) provides that the court should “freely”
`
`grant leave to amend a pleading “when justice so requires.” Fed. R. Civ. P. 15(a)(2). To that end,
`
`this Court has granted patentee’s leave to amend a complaint alleging direct infringement to add
`
`additional factual allegations in the face of a motion to dismiss. See, e.g., CPC Pat. Techs. Pty
`
`Ltd. v. Apple Inc., No. 6:21-CV-00165-ADA, 2022 WL 118955, at *2 (W.D. Tex. Jan. 12, 2022).
`
`III.
`
`ARGUMENT
`
`A.
`
`Speir Sufficiently Alleges The Claimed Trusted Operating System
`
`Representative claim 1 of the ’399 Patent recites (1) a “secure user processor” comprising
`
`“a trusted operating system executing on said trusted microprocessor,” (2) a “non-secure user
`
`processor” comprising “an untrusted operating system executing on said untrusted
`
`microprocessor,” and (3) a “cryptographic engine” comprising “a trusted operating system
`
`executing on said trusted cryptographic processor.” ’399 Patent, Claim 1. Speir alleges sufficient
`
`factual support to raise a plausible inference that these limitations are practiced by the Accused
`
`Products. See Am. Compl. ¶¶ 53-55. Apple does not contest that Speir has sufficiently alleged
`
`the existence of a trusted operating system utilized by the secure user processor (i.e., “sepOS”)
`
`and an untrusted operating system utilized by the non-secure user processor (i.e., “iOS”). Mot. at
`
`9. Rather, Apple maintains that (1) the ’399 Patent requires three separate operating systems and
`
`(2) Speir somehow fails to allege the existence of a third operating system utilized by the
`
`cryptographic engine. Id. at 7. Apple is wrong.
`
`As an initial matter, Apple’s argument is predicated on claim construction. Specifically,
`
`Apple’s motion requires that the Court construe the claims of the ’399 Patent and hold that the
`
`
`v. Sony Corp. of Am., 4 F.4th 1342, 1352 (Fed. Cir. 2021) (internal citation and quotation omitted).
`As detailed herein, Speir’s detailed allegations, made on an element-by-element basis, more than
`satisfy Federal Rule of Civil Procedure 8’s pleading requirements.
`
`
`
`3
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 7 of 17
`
`claims require three entirely separate and distinct operating systems—one for each of the three
`
`claimed processors. Mot. at 7-8. But “claim construction at the pleading stage—with no claim
`
`construction processes undertaken—[i]s inappropriate.” In re Bill of Lading, 681 F.3d at 1343
`
`n.13. Rather, to the extent any claim interpretation is required, courts “afford claims their broadest
`
`possible construction at this stage of the proceedings.” Id.; see also United Servs. Auto. Ass’n v.
`
`PNC Bank N.A., No. 2:21-CV-00246-JRG, 2022 WL 739521, at *2 (E.D. Tex. Jan. 14, 2022)
`
`(“PNC is asking the court to construe the claims, and the Court is unwilling to engage in, what is
`
`effectively, claim construction at this early stage.”).
`
`The ’399 Patent does not require that the “trusted operating system” utilized by the “secure
`
`user processor” be entirely separate and distinct from the “trusted operating system” utilized by
`
`the “cryptographic engine.” To that end, and as Apple acknowledges (Mot. at 10), the trusted
`
`operating system may comprise of the “sepOS” and be utilized by both the Secure Enclave
`
`Processor (the “secure processor”) and the Secure Enclave AES Engine (the “cryptographic
`
`engine”)—which is a plausible construction of the claims. See, e.g., CPC Pat. Techs., 2022 WL
`
`118955, at *3 (“[T]he Court finds that Plaintiff’s claim construction is plausible, so Plaintiff need
`
`not plead infringement of the claimed duration. The inherent and plausibly pleaded construction
`
`entitles Plaintiff to a Markman hearing.”). And Speir has put Apple on notice that the “sepOS”
`
`operating system may satisfy claim 1’s requirement that both the secure user processor and the
`
`cryptographic engine work with a “trusted operating system.” See Am. Compl. ¶ 55 (identifying
`
`Apple’s customized version of the L4 microkernel, also referred to as “sepOS,” in connection with
`
`the cryptographic engine’s operating system).2
`
`
`2 While Apple acknowledges that the sepOS may be considered the trusted operating system for
`both the “secure user processor” and “cryptographic processor” (Mot. at 10), Speir has elaborated
`
`
`
`4
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 8 of 17
`
`Alternatively, to the extent an entirely separate and distinct third “operating system” is
`
`required, Speir alleges that the exemplary “iPhone 13 contains a Secure Enclave AES Engine and
`
`a trusted operating system.” Am. Compl. ¶ 55. For factual support, Speir cites to documentation
`
`provided by Apple explaining the Secure Enclave AES Engine. Id. For example, Apple’s
`
`materials provide that the Secure Enclave AES Engine is “used to perform cryptography” and that
`
`“[t]he AES Engine supports hardware and software keys.” Id. Based on the documentation cited
`
`by Speir, Apple is on notice that Speir alleges that there is a trusted operating system utilized by
`
`the Secure Enclave AES Engine, for example, for purposes of performing cryptography.
`
`Apple does not meaningfully refute Speir’s allegations other than to assert that no such
`
`operating system exists on the Secure Enclave AES Engine because it is “a simple ‘hardware
`
`block’ component.” Mot. at 11. However, Apple’s “say-so” on whether there is a separate
`
`operating system for the Secure Enclave AES Engine is a factual dispute that will be explored
`
`during discovery. Rather, on a motion to dismiss, all allegations are accepted as true and Speir “is
`
`not required to provide evidence of infringement at the pleading stage.” Panasonic Corp. v. Magna
`
`Int’l, Inc., No. 6:21-CV-00319-ADA, 2022 WL 174513, at *2 (W.D. Tex. Jan. 19, 2022).
`
`Because Speir has plausibly alleged that the Secure Enclave AES Engine (“cryptographic
`
`engine”) utilizes an operating system (for example, to perform cryptography), Apple’s motion
`
`should be denied on this basis.
`
`B.
`
`Speir Sufficiently Alleges The Claimed Data Links
`
`Claim 1 of the ’399 Patent recites “a second data communication link communicating data
`
`between said non-secure processor and said cryptographic engine.” Speir alleges that the
`
`
`in
`theory
`this
`further on
`contemporaneously herewith.
`
`its preliminary
`
`infringement contentions served on Apple
`
`
`
`5
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 9 of 17
`
`exemplary “iPhone 13 contains a data communication link between the Application Processor and
`
`the Secure Enclave AES Engine.” Am. Compl. ¶ 57. Speir also cites to exemplary evidence from
`
`Apple that plausibly suggests the existence of the data communication link between the
`
`Application Processor (“non-secure processor”) and
`
`the Secure Enclave AES Engine
`
`(“cryptographic engine”). Id. For example, Apple’s materials explain that:
`
`The Application Processor then sends the sepOS image to the Secure Enclave Boot
`ROM. After copying the sepOS image into the Secure Enclave protected memory,
`the Secure Enclave Boot ROM checks the cryptographic hash and signature of the
`image to verify that the sepOS is authorised to run on the device.
`
`Id. (emphasis added). Speir’s allegations also explain that the Secure Enclave AES Engine is what
`
`performs cryptography in the Secure Enclave—meaning information sent from the Application
`
`Processor is communicated to the Secure Enclave AES Engine. Id. As such, Speir has sufficiently
`
`alleged the existence of a communication link between the Application Processor (the “non-secure
`
`processor”) and the Secure Enclave AES Engine (the “cryptographic engine”) with factual support.
`
`To the extent Apple contends that there may be some overlap between the first
`
`communication link (between the Secure Enclave Processor and Secure Enclave AES Engine) and
`
`the second communication link (between the Application Processor and Secure Enclave AES
`
`Engine) (Mot. at 12), those are issues of claim construction and proof. While claim construction
`
`is not appropriate on a motion to dismiss, there is nothing in the ’399 Patent that precludes partial
`
`overlap in the two data communications links. See CPC Pat. Techs., 2022 WL 118955, at *3.
`
`Further, “a plaintiff should not be barred at the dismissal stage ‘when the operation of [the accused
`
`product] is not ascertainable without discovery.’” USC IP P’ship, L.P., 2021 WL 3134260, at *2
`
`(quoting K-Tech Telecomms., 714 F.3d at 1286). Here, the information needed to ascertain the
`
`exact scope of the communication link between the Application Processor and Secure Enclave
`
`AES Engine requires discovery as it relates to the inner workings of Apple’s Secure Enclave.
`
`
`
`6
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 10 of 17
`
`Because Speir has plausibly alleged the existence of a communication link between the
`
`Application Processor and Secure Enclave AES Engine, Apple’s motion should be denied.
`
`C.
`
`Speir Sufficiently Alleges The Claimed Human/Machine Interfaces
`
`Speir alleges the existence of two human-machine interfaces (“HMI(s)”). Claim 1 of the
`
`’399 Patent recites:
`
`(1)
`
`“a secure human/machine interface configured for enabling bi-directional
`
`communication of classified information exclusively between a user and said secure user
`
`processor” and
`
`(2)
`
`“a non-secure human/machine interface distinct from said secure human/machine
`
`interface and configured for enabling bi-directional communication of unclassified
`
`information exclusively between said user and said non-secure user processor”
`
`’399 Patent, Claim 1 (emphasis added). Speir alleges that the Accused Products (such as the
`
`iPhone 13) contain (1) TouchID and/or FaceID to allow for communication of secure information
`
`between the user and the Secure Enclave Processor (i.e., the “secure” HMI) and (2) the touchscreen
`
`(and related software/hardware) allow the user to communicate non-secure information with the
`
`Application Processor (i.e., the “non-secure” HMI). See Am. Compl. ¶¶ 58, 59. Apple cannot
`
`credibly argue that it lacks notice of Speir’s infringement theory.
`
`Rather than contest the sufficiency of notice, Apple quibbles over Speir’s exemplary
`
`evidence as to three discrete aspects of the secure HMI claim elements: (1) whether, in fact,
`
`Apple’s TouchID and/or FaceID operate as a secure HMI; (2) whether TouchID and/or FaceID
`
`enable, in fact, bi-directional communication of secure information; and (3) whether there is, in
`
`fact, exchange of information “exclusively” between a user and the Secure Enclave Processor.
`
`Mot. at 13-16.
`
`
`
`7
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 11 of 17
`
`i. TouchID and/or FaceID are secure HMIs
`
`Apple is wrong that TouchID and/or FaceID are not “interfaces, as the term is used in the
`
`’399 Patent.” Mot. at 14. The ’399 Patent provides that secure HMI “devices are known in the art
`
`and typically can include one or more features to ensure trusted communications between the user
`
`and the secure processor ….” ’399 Patent at 7:41-44; see id. at 7:44-45 (“The secure HMI 308 can
`
`provide a trusted path to applications executing on secure processor 302.”). For example, the ’399
`
`Patent contemplates that the secure HMI “can be comprised of several components” and “can
`
`include one or more input devices which allow a user to input control commands and input data.”
`
`Id. at 7:60–8:13. However, the ’399 Patent notes the secure HMI is “not limited in this regard”
`
`and, instead, contemplates that the secure HMI can be “implemented in a variety of ways that are
`
`known to those skilled in the art.” Id.
`
`Speir cites exemplary evidence that confirms that TouchID and FaceID utilize
`
`“components” (such as biometric sensors) to ensure secure communications between the user and
`
`the Secure Enclave Processor:
`
`Apple’s biometric security architecture relies on a strict separation of
`responsibilities between the biometric sensor and the Secure Enclave, and a secure
`connection between the two. The sensor captures the biometric image and securely
`transmits it to the Secure Enclave.
`
`See Am. Compl. ¶ 58 (emphasis added). That is, TouchID and FaceID both utilize “biometric
`
`sensor[s]” that communicate data from the user directly and securely to the Secure Enclave.
`
`Speir’s allegations provide more than sufficient notice to Apple of this theory. See, e.g., Nalco
`
`Co., 883 F.3d at 1350 (patentee’s “pleading clearly exceeds the minimum requirements under Rule
`
`12(b)(6), especially as ‘the Federal Rules of Civil Procedure do not require a plaintiff to plead facts
`
`establishing that each element of an asserted claim is met.’”) (citation omitted).
`
`
`
`8
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 12 of 17
`
`Apple appears to contend that TouchID and FaceID are somehow not secure HMI’s
`
`because it purports that they share hardware with a non-secure HMI. Mot. at 14. This issue of
`
`“distinctness” is one of claim construction and proof—not an issue about adequate notice. See,
`
`e.g., Unification Techs. LLC v. Dell Techs., Inc., No. 6:20-CV-00499-ADA, 2021 WL 1343188,
`
`at *3 (W.D. Tex. Jan. 28, 2021) (noting defendant’s arguments were “premature assertions that are
`
`best addressed in claim construction or non-infringement positions.”).
`
`Regardless, Apple is wrong. For example, Apple argues that FaceID cannot be a secure
`
`HMI because it uses a “camera.” Mot. at 14. But Apple fails to explain whether the camera
`
`utilized by FaceID is the same camera system used for non-secure purposes. To the contrary, Speir
`
`cites evidence that suggests that a distinct infrared camera system is used for FaceID:
`
`After the TrueDepth camera confirms the presence of an attentive face, it projects
`and reads thousands of infrared dots to form a depth map of the face along with a
`2D infrared image. This data is used to create a sequence of 2D images and depth
`maps which are digitally signed and sent to the Secure Enclave.
`
`
`Am. Compl. ¶ 58 (citing https://support.apple.com/en-in/guide/security/sec067eb0c9e/web). As
`
`noted by this evidence, FaceID utilizes a TrueDepth camera that communicates with the Secure
`
`Enclave.
`
`
`
`Apple is also wrong that TouchID cannot qualify as the secure HMI because it purportedly
`
`shares the “home button.” Mot. at 14. As Apple’s documents explain, TouchID utilizes its own
`
`distinct biometric sensor:
`
`When the fingerprint sensor detects the touch of a finger, it triggers the advanced
`imaging array to scan the finger and sends the scan to the Secure Enclave. The
`channel used to secure this connection varies, depending on whether the Touch ID
`sensor is built into the device with the Secure Enclave or is located in a separate
`peripheral.
`
`*
`
`*
`
`*
`
`Communication between the Secure Enclave and the built-in Touch ID sensor takes
`place over a serial peripheral interface bus. The processor forwards the data to the
`Secure Enclave but can’t read it.
`
`
`
`9
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 13 of 17
`
`
`Am. Compl. ¶ 58 (citing https://support.apple.com/en-in/guide/security/sec067eb0c9e/web). In
`
`other words, TouchID utilizes its own distinct fingerprint sensor that communicates with the secure
`
`user processor.
`
`For these reasons, Speir has plausibly alleged that TouchID and/or FaceID qualify as the
`
`claimed secure HMI and Apple’s motion should be denied on this basis.
`
`ii. There is a secure HMI for enabling bi-directional communication
`
`between the user and secure user processor
`
`
`
`Claim 1 of the ’399 Patent recites a secure HMI configured for enabling “bi-directional
`
`communication” of secure information between the user and the secure processor. Apple purports
`
`that Speir “does not identify any classified data communicated both from the user to the Secure
`
`Enclave Processor and from the Secure Enclave Processor to the user.” Mot. at 15. Again, Apple
`
`is not contesting that it is on notice of Speir’s infringement theory—it simply contests Speir’s
`
`exemplary evidence. But “a plaintiff is not required to prove its case at the pleading stage….”
`
`USC IP P’ship, L.P., 2021 WL 3134260, at *2.
`
`
`
`Apple is also incorrect; Speir’s exemplary evidence supports a plausible inference that
`
`there is bi-directional communication between the user and Secure Enclave (“secure user
`
`processor”) through the use of TouchID and/or FaceID. For example, Speir cites to the following:
`
`The sensor captures the biometric image and securely transmits it to the Secure
`Enclave. During enrolment, the Secure Enclave processes, encrypts and stores the
`corresponding Touch ID and Face ID template data. During matching, the Secure
`Enclave compares incoming data from the biometric sensor against the stored
`templates to determine whether to unlock the device or respond that a match is valid
`(for Apple Pay, in-app and other uses of Touch ID and Face ID).
`
`Am. Compl. ¶ 58. Apple’s documents (cited in the Amended Complaint) further explain:
`
`When the fingerprint sensor detects the touch of a finger, it triggers the advanced
`imaging array to scan the finger and sends the scan to the Secure Enclave.
`
`
`
`10
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 14 of 17
`
`*
`
`*
`
`*
`
`During enrolment, the resulting map of nodes is stored in an encrypted format that
`can be read only by the Secure Enclave as a template to compare against for future
`matches, but without any identity information.
`
`*
`
`*
`
`*
`
`After the TrueDepth camera confirms the presence of an attentive face, it projects
`and reads thousands of infrared dots to form a depth map of the face along with a
`2D infrared image. This data is used to create a sequence of 2D images and depth
`maps which are digitally signed and sent to the Secure Enclave. To counter both
`digital and physical spoofs, the TrueDepth camera randomises the sequence of 2D
`images and depth map captures and projects a device-specific random pattern. A
`portion of the Secure Neural Engine — protected within the Secure Enclave —
`transforms this data into a mathematical representation and compares that
`representation with the enrolled facial data.
`
`
`Id. (citing https://support.apple.com/en-in/guide/security/sec067eb0c9e/web). As this evidence
`
`suggests, data is exchanged between the TouchID and FaceID sensors and the Secure Enclave
`
`Processor for purposes of finding a match between the sensor data and the data stored in the Secure
`
`Enclave. It is inherent that the “matching” process will either result in a match or not a match,
`
`which will be communicated by the Secure Enclave and ultimately back to the user. As such,
`
`Speir has plausibly alleged that there is “bi-directional” communication of secure data between the
`
`user and secure user processor, and Apple’s motion should be denied.
`
`iii. There is exclusive exchange of secret information between the user
`
`and secure user processor through the secure HMI
`
` Finally, Apple advances claim construction arguments concerning the use of the term
`
`“exclusive” by claim 1 of the ’399 Patent. Specifically, claim 1 recites that the secure HMI is
`
`configured for enabling “bi-directional communication of classified information exclusively
`
`between a user and said secure user processor.” ’399 Patent, Claim 1 (emphasis added). Apple
`
`construes this language to mean that TouchID and/or FaceID cannot be secure HMIs because a
`
`user can enter a passcode on the touchscreen, which can operate as a non-secure HMI depending
`
`
`
`11
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 15 of 17
`
`on its mode of operation. Mot. at 15-16. But Apple does not contest that it is on notice that Speir
`
`alleges that TouchID and/or FaceID enable bi-directional communication “exclusively” between
`
`the user and Secure Enclave Processor. Nor can it—Apple’s own materials make clear that the
`
`TouchID and FaceID sensors exclusively communicate data from the user to and from the Secure
`
`Enclave. See, e.g., Am. Compl. ¶ 58 (“Apple’s biometric security architecture relies on a strict
`
`separation of responsibilities between the biometric sensor and the Secure Enclave, and a secure
`
`connection between the two.”) (emphasis added); see also id. (citing https://support.apple.com/en-
`
`in/guide/security/sec067eb0c9e/web) (“Communication between the Secure Enclave and the built-
`
`in Touch ID sensor takes place over a serial peripheral interface bus.”).
`
`Further, whether there are other potential secure HMIs (for example, when the touch-screen
`
`is operating in a password entry mode) is inapposite at the pleading stage. And Speir’s theory is
`
`consistent with the cited prosecution history. There, the applicant merely stated that the Mauro
`
`reference (U.S. Patent No. 7,047,405) was inapplicable because the ’399 Patent requires “bi-
`
`directional communications between a user of the computer system … and a secure user processor
`
`is exclusively enabled via a secure human/machine interface that is distinct from an unsecure
`
`human/machine interface.” Dkt. No. 13-2 at 12. That is, the ’399 Patent requires a secure HMI
`
`configured for enabling bi-directional communication with the secure user processor that is distinct
`
`from the non-secure HMI. Because Speir has sufficiently alleged the existence of a secure HMI
`
`(e.g., TouchID and FaceID) that enables bi-directional communications exclusively between the
`
`user and Secure Enclave Processor, Apple’s motion should be denied.
`
`IV.
`
`CONCLUSION
`
`For at least the reasons stated above, Apple’s motion should be denied in its entirety.
`
`Alternatively, Speir should be granted leave to amend its allegations concerning direct
`
`infringement of the ’399 Patent.
`
`
`
`12
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 16 of 17
`
`Dated: April 19, 2022
`
`
`
`
`
`
`
`Respectfully submitted,
`
`/s/ Brett E. Cooper
`
`
`
`
`
`Reza Mirzaie (CA SBN 246953)
`rmirzaie@raklaw.com
`Marc A. Fenster (CA SBN 181067)
`mfenster@raklaw.com
`Brett E. Cooper (NY SBN SBN 4011011)
`bcooper@raklaw.com
`Seth Hasenour (TX SBN 24059910)
`shasenour@raklaw.com
`Drew B. Hollander (NY SBN 5378096)
`dhollander@raklaw.com
`
`RUSS AUGUST & KABAT
`12424 Wilshire Blvd. 12th Floor
`Los Angeles, CA 90025
`Phone: (310) 826-7474
`Facsimile: (310) 826-6991
`
`Attorneys for Plaintiff Speir Technologies
`Limited
`
`
`
`13
`
`
`
`
`
`
`
`
`
`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 17 of 17
`
`CERTIFICATE OF SERVICE
`
`I hereby certify that the counsel of record who are deemed to have consented to electronic
`
`service are being served on April 19, 2022 with a copy of this document via the Court’s ECF
`
`system.
`
`
`
`
`
`
`
`
`
`
`
`
`
`/s/ Brett E. Cooper
`Brett E. Cooper
`
`
`
`14
`
`
`
`
`
`
`