throbber
Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 1 of 17
`
`UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`
`SPEIR TECHNOLOGIES LTD.,
`
`
`
`
`
`
`
`Plaintiff,
`
`
`
`
`
`Case No. 6:22-cv-00077-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`
`
`
`
`v.
`
`APPLE INC.,
`
`
`
`
`
`
`
`Defendant.
`
`
`
`
`
`PLAINTIFF SPEIR TECHNOLOGIES LTD.’S RESPONSE TO DEFENDANT’S
`MOTION TO DISMISS CLAIMS OF DIRECT INFRINGEMENT
`OF U.S. PATENT NO. 7,765,399
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 2 of 17
`
`TABLE OF CONTENTS
`
`
`I.
`
`INTRODUCTION ................................................................................................................. 1
`
`II. LEGAL STANDARD ............................................................................................................ 2
`
`III. ARGUMENT ......................................................................................................................... 3
`
`A. Speir Sufficiently Alleges The Claimed Trusted Operating System ............................ 3
`
`B. Speir Sufficiently Alleges The Claimed Data Links..................................................... 5
`
`C. Speir Sufficiently Alleges The Claimed Human/Machine Interfaces........................... 7
`
`i.
`
`TouchID and/or FaceID are secure HMIs .............................................................8
`
`ii. There is a secure HMI for enabling bi-directional communication between
`the user and secure user processor ......................................................................10
`
`iii. There is exclusive exchange of secret information between the user and
`secure user processor through the secure HMI ...................................................11
`
`IV. CONCLUSION .................................................................................................................... 12
`
`
`
`i
`
`
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 3 of 17
`
`Cases
`
`TABLE OF AUTHORITIES
`
`Ashcroft v. Iqbal,
`556 U.S. 662 (2009) .................................................................................................................... 2
`
`Bell Atl. Corp. v. Twombly,
`550 U.S. 544 (2007) .................................................................................................................... 2
`
`Bot M8 LLC v. Sony Corp. of Am.,
`4 F.4th 1342 (Fed. Cir. 2021) ..................................................................................................... 3
`
`CPC Pat. Techs. Pty Ltd. v. Apple Inc.,
`No. 6:21-CV-00165-ADA, 2022 WL 118955 (W.D. Tex. Jan. 12, 2022) ......................... 3, 4, 6
`
`In re Bill of Lading Transmission & Processing Sys. Pat. Litig.,
`681 F.3d 1323 (Fed. Cir. 2012) .............................................................................................. 1, 4
`
`K-Tech Telecomms., Inc. v. Time Warner Cable, Inc.,
`714 F.3d 1277 (Fed. Cir. 2013) .............................................................................................. 1, 6
`
`Lone Star Fund V (U.S.), L.P. v. Barclays Bank PLC,
`594 F.3d 383 (5th Cir. 2010) ...................................................................................................... 2
`
`Nalco Co. v. Chem-Mod, LLC,
`883 F.3d 1337 (Fed. Cir. 2018) .......................................................................................... 1, 2, 8
`
`Panasonic Corp. v. Magna Int’l, Inc.,
`No. 6:21-CV-00319-ADA, 2022 WL 174513 (W.D. Tex. Jan. 19, 2022) ................................. 5
`
`Parity Networks, LLC v. Cisco Sys., Inc.,
`No. 6:19-CV-00207-ADA, 2019 WL 3940952 (W.D. Tex. July 26, 2019) ............................... 2
`
`Unification Techs. LLC v. Dell Techs., Inc.,
`No. 6:20-CV-00499-ADA, 2021 WL 1343188 (W.D. Tex. Jan. 28, 2021) ............................... 9
`
`United Servs. Auto. Ass’n v. PNC Bank N.A.,
`No. 2:21-CV-00246-JRG, 2022 WL 739521 (E.D. Tex. Jan. 14, 2022) .................................... 4
`
`USC IP P’ship, L.P. v. Facebook, Inc.,
`No. 6:20-CV-00555-ADA, 2021 WL 3134260 (W.D. Tex. July 23, 2021) ..................... 2, 6, 10
`
`Rules
`
`Fed. R. Civ. P. 12(b)(6)................................................................................................................... 2
`
`Fed. R. Civ. P. 15(a)(2) ................................................................................................................... 3
`
`
`
`
`ii
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 4 of 17
`
`I.
`
`INTRODUCTION
`
`The Court should deny Defendant Apple Inc.’s (“Apple”) motion to dismiss Plaintiff Speir
`
`Technologies Ltd.’s (“Speir”) claim for direct infringement of U.S. Patent No. 7,765,399 (“the
`
`’399 Patent”) (Dkt. No. 13, “Mot.”).
`
`Speir’s Amended Complaint (Dkt. No. 8, “Am. Compl.”) provides detailed notice of its
`
`theory of Apple’s direct infringement of exemplary claim 1 of the ’399 Patent. Apple seeks a
`
`complaint with expert report-level detail based on highly confidential information it possesses
`
`about the operation of its own products. But Speir need not “prove its case at the pleading stage.”
`
`In re Bill of Lading Transmission & Processing Sys. Pat. Litig., 681 F.3d 1323, 1339 (Fed. Cir.
`
`2012). Rather, “[t]he complaint must place the ‘potential infringer ... on notice of what activity ...
`
`is being accused of infringement.’” Nalco Co. v. Chem-Mod, LLC, 883 F.3d 1337, 1350 (Fed. Cir.
`
`2018) (citation omitted). As such, the “purpose of a motion to dismiss is to test the sufficiency of
`
`the complaint, not to decide the merits.” Id. (citation omitted) (emphasis in original).
`
`Apple cannot meaningfully contest that it is on notice of Speir’s theory of infringement.
`
`Instead, Apple disputes whether there is infringement based on the exemplary publicly-available
`
`evidence cited by Speir and its construction and interpretation of discrete sub-limitations of the
`
`asserted claims—issues that are not appropriate on a motion to dismiss. See Nalco, 883 F.3d at
`
`1349 (“Defendants’ arguments boil down to objections to [Plaintiff’s] proposed claim construction
`
`... a dispute not suitable for resolution on a motion to dismiss.”). The issues raised by Apple
`
`require discovery into the inner workings of Apple’s Secure Enclave—an aspect of the Accused
`
`Products for which Apple releases limited public information and that is not amenable to reverse
`
`engineering because it is specifically designed to keep sensitive user data secure. See K-Tech
`
`Telecomms., Inc. v. Time Warner Cable, Inc., 714 F.3d 1277, 1286 (Fed. Cir. 2013) (“A defendant
`
`cannot shield itself from a complaint for direct infringement by operating in such secrecy that the
`
`
`
`1
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 5 of 17
`
`filing of a complaint itself is impossible.”). Because Speir’s Amended Complaint plausibly alleges
`
`a claim for direct infringement of the ’399 Patent, Apple’s motion should be denied in its entirety.
`
`Additionally, while Speir’s pleadings are sufficient, any alleged ambiguities have been
`
`resolved in its preliminary infringement contentions, which have been served on Apple
`
`contemporaneously herewith. See, e.g., Parity Networks, LLC v. Cisco Sys., Inc., No. 6:19-CV-
`
`00207-ADA, 2019 WL 3940952, at *2 (W.D. Tex. July 26, 2019) (“[T]he Court finds that
`
`Plaintiff’s pleadings are sufficient and that any deficiencies will necessarily be addressed when
`
`Plaintiff serves its infringement contentions as is required.”). To that end, any issues raised in the
`
`instant motion are moot, and Apple’s motion to dismiss should be denied. Alternatively, the Court
`
`should grant Speir leave to amend its Amended Complaint to remedy any alleged deficiencies.
`
`II.
`
`LEGAL STANDARD
`
`Federal Rule of Civil Procedure 12(b)(6) requires that a complaint contain sufficient factual
`
`matter, if accepted as true, to “state a claim to relief that is plausible on its face.” Ashcroft v. Iqbal,
`
`556 U.S. 662, 678 (2009) (citation omitted). “The court’s task is to determine whether the plaintiff
`
`has stated a legally cognizable claim that is plausible, not to evaluate the plaintiff’s likelihood of
`
`success.” USC IP P’ship, L.P. v. Facebook, Inc., No. 6:20-CV-00555-ADA, 2021 WL 3134260,
`
`at *1 (W.D. Tex. July 23, 2021) (quoting Lone Star Fund V (U.S.), L.P. v. Barclays Bank PLC,
`
`594 F.3d 383, 387 (5th Cir. 2010)). “The plausibility standard ‘does not impose a probability
`
`requirement at the pleading stage; it simply calls for enough fact to raise a reasonable expectation
`
`that discovery will reveal evidence’ to support the plaintiff’s allegations.” Nalco Co., 883 F.3d at
`
`1350 (quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 556 (2007)).1
`
`
`1 Speir disagrees that there is some amorphous heightened pleading standard in patent cases
`involving hardware and software, as advocated by Apple. Mot. at 2, 5, 13-14. Indeed, Apple’s
`cited authority makes clear that “[a] plaintiff is not required to plead infringement on an element-
`by-element basis” and that a plaintiff “need not prove its case at the pleading stage.” Bot M8 LLC
`
`
`
`2
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 6 of 17
`
`Further, Federal Rule of Civil Procedure 15(a)(2) provides that the court should “freely”
`
`grant leave to amend a pleading “when justice so requires.” Fed. R. Civ. P. 15(a)(2). To that end,
`
`this Court has granted patentee’s leave to amend a complaint alleging direct infringement to add
`
`additional factual allegations in the face of a motion to dismiss. See, e.g., CPC Pat. Techs. Pty
`
`Ltd. v. Apple Inc., No. 6:21-CV-00165-ADA, 2022 WL 118955, at *2 (W.D. Tex. Jan. 12, 2022).
`
`III.
`
`ARGUMENT
`
`A.
`
`Speir Sufficiently Alleges The Claimed Trusted Operating System
`
`Representative claim 1 of the ’399 Patent recites (1) a “secure user processor” comprising
`
`“a trusted operating system executing on said trusted microprocessor,” (2) a “non-secure user
`
`processor” comprising “an untrusted operating system executing on said untrusted
`
`microprocessor,” and (3) a “cryptographic engine” comprising “a trusted operating system
`
`executing on said trusted cryptographic processor.” ’399 Patent, Claim 1. Speir alleges sufficient
`
`factual support to raise a plausible inference that these limitations are practiced by the Accused
`
`Products. See Am. Compl. ¶¶ 53-55. Apple does not contest that Speir has sufficiently alleged
`
`the existence of a trusted operating system utilized by the secure user processor (i.e., “sepOS”)
`
`and an untrusted operating system utilized by the non-secure user processor (i.e., “iOS”). Mot. at
`
`9. Rather, Apple maintains that (1) the ’399 Patent requires three separate operating systems and
`
`(2) Speir somehow fails to allege the existence of a third operating system utilized by the
`
`cryptographic engine. Id. at 7. Apple is wrong.
`
`As an initial matter, Apple’s argument is predicated on claim construction. Specifically,
`
`Apple’s motion requires that the Court construe the claims of the ’399 Patent and hold that the
`
`
`v. Sony Corp. of Am., 4 F.4th 1342, 1352 (Fed. Cir. 2021) (internal citation and quotation omitted).
`As detailed herein, Speir’s detailed allegations, made on an element-by-element basis, more than
`satisfy Federal Rule of Civil Procedure 8’s pleading requirements.
`
`
`
`3
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 7 of 17
`
`claims require three entirely separate and distinct operating systems—one for each of the three
`
`claimed processors. Mot. at 7-8. But “claim construction at the pleading stage—with no claim
`
`construction processes undertaken—[i]s inappropriate.” In re Bill of Lading, 681 F.3d at 1343
`
`n.13. Rather, to the extent any claim interpretation is required, courts “afford claims their broadest
`
`possible construction at this stage of the proceedings.” Id.; see also United Servs. Auto. Ass’n v.
`
`PNC Bank N.A., No. 2:21-CV-00246-JRG, 2022 WL 739521, at *2 (E.D. Tex. Jan. 14, 2022)
`
`(“PNC is asking the court to construe the claims, and the Court is unwilling to engage in, what is
`
`effectively, claim construction at this early stage.”).
`
`The ’399 Patent does not require that the “trusted operating system” utilized by the “secure
`
`user processor” be entirely separate and distinct from the “trusted operating system” utilized by
`
`the “cryptographic engine.” To that end, and as Apple acknowledges (Mot. at 10), the trusted
`
`operating system may comprise of the “sepOS” and be utilized by both the Secure Enclave
`
`Processor (the “secure processor”) and the Secure Enclave AES Engine (the “cryptographic
`
`engine”)—which is a plausible construction of the claims. See, e.g., CPC Pat. Techs., 2022 WL
`
`118955, at *3 (“[T]he Court finds that Plaintiff’s claim construction is plausible, so Plaintiff need
`
`not plead infringement of the claimed duration. The inherent and plausibly pleaded construction
`
`entitles Plaintiff to a Markman hearing.”). And Speir has put Apple on notice that the “sepOS”
`
`operating system may satisfy claim 1’s requirement that both the secure user processor and the
`
`cryptographic engine work with a “trusted operating system.” See Am. Compl. ¶ 55 (identifying
`
`Apple’s customized version of the L4 microkernel, also referred to as “sepOS,” in connection with
`
`the cryptographic engine’s operating system).2
`
`
`2 While Apple acknowledges that the sepOS may be considered the trusted operating system for
`both the “secure user processor” and “cryptographic processor” (Mot. at 10), Speir has elaborated
`
`
`
`4
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 8 of 17
`
`Alternatively, to the extent an entirely separate and distinct third “operating system” is
`
`required, Speir alleges that the exemplary “iPhone 13 contains a Secure Enclave AES Engine and
`
`a trusted operating system.” Am. Compl. ¶ 55. For factual support, Speir cites to documentation
`
`provided by Apple explaining the Secure Enclave AES Engine. Id. For example, Apple’s
`
`materials provide that the Secure Enclave AES Engine is “used to perform cryptography” and that
`
`“[t]he AES Engine supports hardware and software keys.” Id. Based on the documentation cited
`
`by Speir, Apple is on notice that Speir alleges that there is a trusted operating system utilized by
`
`the Secure Enclave AES Engine, for example, for purposes of performing cryptography.
`
`Apple does not meaningfully refute Speir’s allegations other than to assert that no such
`
`operating system exists on the Secure Enclave AES Engine because it is “a simple ‘hardware
`
`block’ component.” Mot. at 11. However, Apple’s “say-so” on whether there is a separate
`
`operating system for the Secure Enclave AES Engine is a factual dispute that will be explored
`
`during discovery. Rather, on a motion to dismiss, all allegations are accepted as true and Speir “is
`
`not required to provide evidence of infringement at the pleading stage.” Panasonic Corp. v. Magna
`
`Int’l, Inc., No. 6:21-CV-00319-ADA, 2022 WL 174513, at *2 (W.D. Tex. Jan. 19, 2022).
`
`Because Speir has plausibly alleged that the Secure Enclave AES Engine (“cryptographic
`
`engine”) utilizes an operating system (for example, to perform cryptography), Apple’s motion
`
`should be denied on this basis.
`
`B.
`
`Speir Sufficiently Alleges The Claimed Data Links
`
`Claim 1 of the ’399 Patent recites “a second data communication link communicating data
`
`between said non-secure processor and said cryptographic engine.” Speir alleges that the
`
`
`in
`theory
`this
`further on
`contemporaneously herewith.
`
`its preliminary
`
`infringement contentions served on Apple
`
`
`
`5
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 9 of 17
`
`exemplary “iPhone 13 contains a data communication link between the Application Processor and
`
`the Secure Enclave AES Engine.” Am. Compl. ¶ 57. Speir also cites to exemplary evidence from
`
`Apple that plausibly suggests the existence of the data communication link between the
`
`Application Processor (“non-secure processor”) and
`
`the Secure Enclave AES Engine
`
`(“cryptographic engine”). Id. For example, Apple’s materials explain that:
`
`The Application Processor then sends the sepOS image to the Secure Enclave Boot
`ROM. After copying the sepOS image into the Secure Enclave protected memory,
`the Secure Enclave Boot ROM checks the cryptographic hash and signature of the
`image to verify that the sepOS is authorised to run on the device.
`
`Id. (emphasis added). Speir’s allegations also explain that the Secure Enclave AES Engine is what
`
`performs cryptography in the Secure Enclave—meaning information sent from the Application
`
`Processor is communicated to the Secure Enclave AES Engine. Id. As such, Speir has sufficiently
`
`alleged the existence of a communication link between the Application Processor (the “non-secure
`
`processor”) and the Secure Enclave AES Engine (the “cryptographic engine”) with factual support.
`
`To the extent Apple contends that there may be some overlap between the first
`
`communication link (between the Secure Enclave Processor and Secure Enclave AES Engine) and
`
`the second communication link (between the Application Processor and Secure Enclave AES
`
`Engine) (Mot. at 12), those are issues of claim construction and proof. While claim construction
`
`is not appropriate on a motion to dismiss, there is nothing in the ’399 Patent that precludes partial
`
`overlap in the two data communications links. See CPC Pat. Techs., 2022 WL 118955, at *3.
`
`Further, “a plaintiff should not be barred at the dismissal stage ‘when the operation of [the accused
`
`product] is not ascertainable without discovery.’” USC IP P’ship, L.P., 2021 WL 3134260, at *2
`
`(quoting K-Tech Telecomms., 714 F.3d at 1286). Here, the information needed to ascertain the
`
`exact scope of the communication link between the Application Processor and Secure Enclave
`
`AES Engine requires discovery as it relates to the inner workings of Apple’s Secure Enclave.
`
`
`
`6
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 10 of 17
`
`Because Speir has plausibly alleged the existence of a communication link between the
`
`Application Processor and Secure Enclave AES Engine, Apple’s motion should be denied.
`
`C.
`
`Speir Sufficiently Alleges The Claimed Human/Machine Interfaces
`
`Speir alleges the existence of two human-machine interfaces (“HMI(s)”). Claim 1 of the
`
`’399 Patent recites:
`
`(1)
`
`“a secure human/machine interface configured for enabling bi-directional
`
`communication of classified information exclusively between a user and said secure user
`
`processor” and
`
`(2)
`
`“a non-secure human/machine interface distinct from said secure human/machine
`
`interface and configured for enabling bi-directional communication of unclassified
`
`information exclusively between said user and said non-secure user processor”
`
`’399 Patent, Claim 1 (emphasis added). Speir alleges that the Accused Products (such as the
`
`iPhone 13) contain (1) TouchID and/or FaceID to allow for communication of secure information
`
`between the user and the Secure Enclave Processor (i.e., the “secure” HMI) and (2) the touchscreen
`
`(and related software/hardware) allow the user to communicate non-secure information with the
`
`Application Processor (i.e., the “non-secure” HMI). See Am. Compl. ¶¶ 58, 59. Apple cannot
`
`credibly argue that it lacks notice of Speir’s infringement theory.
`
`Rather than contest the sufficiency of notice, Apple quibbles over Speir’s exemplary
`
`evidence as to three discrete aspects of the secure HMI claim elements: (1) whether, in fact,
`
`Apple’s TouchID and/or FaceID operate as a secure HMI; (2) whether TouchID and/or FaceID
`
`enable, in fact, bi-directional communication of secure information; and (3) whether there is, in
`
`fact, exchange of information “exclusively” between a user and the Secure Enclave Processor.
`
`Mot. at 13-16.
`
`
`
`7
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 11 of 17
`
`i. TouchID and/or FaceID are secure HMIs
`
`Apple is wrong that TouchID and/or FaceID are not “interfaces, as the term is used in the
`
`’399 Patent.” Mot. at 14. The ’399 Patent provides that secure HMI “devices are known in the art
`
`and typically can include one or more features to ensure trusted communications between the user
`
`and the secure processor ….” ’399 Patent at 7:41-44; see id. at 7:44-45 (“The secure HMI 308 can
`
`provide a trusted path to applications executing on secure processor 302.”). For example, the ’399
`
`Patent contemplates that the secure HMI “can be comprised of several components” and “can
`
`include one or more input devices which allow a user to input control commands and input data.”
`
`Id. at 7:60–8:13. However, the ’399 Patent notes the secure HMI is “not limited in this regard”
`
`and, instead, contemplates that the secure HMI can be “implemented in a variety of ways that are
`
`known to those skilled in the art.” Id.
`
`Speir cites exemplary evidence that confirms that TouchID and FaceID utilize
`
`“components” (such as biometric sensors) to ensure secure communications between the user and
`
`the Secure Enclave Processor:
`
`Apple’s biometric security architecture relies on a strict separation of
`responsibilities between the biometric sensor and the Secure Enclave, and a secure
`connection between the two. The sensor captures the biometric image and securely
`transmits it to the Secure Enclave.
`
`See Am. Compl. ¶ 58 (emphasis added). That is, TouchID and FaceID both utilize “biometric
`
`sensor[s]” that communicate data from the user directly and securely to the Secure Enclave.
`
`Speir’s allegations provide more than sufficient notice to Apple of this theory. See, e.g., Nalco
`
`Co., 883 F.3d at 1350 (patentee’s “pleading clearly exceeds the minimum requirements under Rule
`
`12(b)(6), especially as ‘the Federal Rules of Civil Procedure do not require a plaintiff to plead facts
`
`establishing that each element of an asserted claim is met.’”) (citation omitted).
`
`
`
`8
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 12 of 17
`
`Apple appears to contend that TouchID and FaceID are somehow not secure HMI’s
`
`because it purports that they share hardware with a non-secure HMI. Mot. at 14. This issue of
`
`“distinctness” is one of claim construction and proof—not an issue about adequate notice. See,
`
`e.g., Unification Techs. LLC v. Dell Techs., Inc., No. 6:20-CV-00499-ADA, 2021 WL 1343188,
`
`at *3 (W.D. Tex. Jan. 28, 2021) (noting defendant’s arguments were “premature assertions that are
`
`best addressed in claim construction or non-infringement positions.”).
`
`Regardless, Apple is wrong. For example, Apple argues that FaceID cannot be a secure
`
`HMI because it uses a “camera.” Mot. at 14. But Apple fails to explain whether the camera
`
`utilized by FaceID is the same camera system used for non-secure purposes. To the contrary, Speir
`
`cites evidence that suggests that a distinct infrared camera system is used for FaceID:
`
`After the TrueDepth camera confirms the presence of an attentive face, it projects
`and reads thousands of infrared dots to form a depth map of the face along with a
`2D infrared image. This data is used to create a sequence of 2D images and depth
`maps which are digitally signed and sent to the Secure Enclave.
`
`
`Am. Compl. ¶ 58 (citing https://support.apple.com/en-in/guide/security/sec067eb0c9e/web). As
`
`noted by this evidence, FaceID utilizes a TrueDepth camera that communicates with the Secure
`
`Enclave.
`
`
`
`Apple is also wrong that TouchID cannot qualify as the secure HMI because it purportedly
`
`shares the “home button.” Mot. at 14. As Apple’s documents explain, TouchID utilizes its own
`
`distinct biometric sensor:
`
`When the fingerprint sensor detects the touch of a finger, it triggers the advanced
`imaging array to scan the finger and sends the scan to the Secure Enclave. The
`channel used to secure this connection varies, depending on whether the Touch ID
`sensor is built into the device with the Secure Enclave or is located in a separate
`peripheral.
`
`*
`
`*
`
`*
`
`Communication between the Secure Enclave and the built-in Touch ID sensor takes
`place over a serial peripheral interface bus. The processor forwards the data to the
`Secure Enclave but can’t read it.
`
`
`
`9
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 13 of 17
`
`
`Am. Compl. ¶ 58 (citing https://support.apple.com/en-in/guide/security/sec067eb0c9e/web). In
`
`other words, TouchID utilizes its own distinct fingerprint sensor that communicates with the secure
`
`user processor.
`
`For these reasons, Speir has plausibly alleged that TouchID and/or FaceID qualify as the
`
`claimed secure HMI and Apple’s motion should be denied on this basis.
`
`ii. There is a secure HMI for enabling bi-directional communication
`
`between the user and secure user processor
`
`
`
`Claim 1 of the ’399 Patent recites a secure HMI configured for enabling “bi-directional
`
`communication” of secure information between the user and the secure processor. Apple purports
`
`that Speir “does not identify any classified data communicated both from the user to the Secure
`
`Enclave Processor and from the Secure Enclave Processor to the user.” Mot. at 15. Again, Apple
`
`is not contesting that it is on notice of Speir’s infringement theory—it simply contests Speir’s
`
`exemplary evidence. But “a plaintiff is not required to prove its case at the pleading stage….”
`
`USC IP P’ship, L.P., 2021 WL 3134260, at *2.
`
`
`
`Apple is also incorrect; Speir’s exemplary evidence supports a plausible inference that
`
`there is bi-directional communication between the user and Secure Enclave (“secure user
`
`processor”) through the use of TouchID and/or FaceID. For example, Speir cites to the following:
`
`The sensor captures the biometric image and securely transmits it to the Secure
`Enclave. During enrolment, the Secure Enclave processes, encrypts and stores the
`corresponding Touch ID and Face ID template data. During matching, the Secure
`Enclave compares incoming data from the biometric sensor against the stored
`templates to determine whether to unlock the device or respond that a match is valid
`(for Apple Pay, in-app and other uses of Touch ID and Face ID).
`
`Am. Compl. ¶ 58. Apple’s documents (cited in the Amended Complaint) further explain:
`
`When the fingerprint sensor detects the touch of a finger, it triggers the advanced
`imaging array to scan the finger and sends the scan to the Secure Enclave.
`
`
`
`10
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 14 of 17
`
`*
`
`*
`
`*
`
`During enrolment, the resulting map of nodes is stored in an encrypted format that
`can be read only by the Secure Enclave as a template to compare against for future
`matches, but without any identity information.
`
`*
`
`*
`
`*
`
`After the TrueDepth camera confirms the presence of an attentive face, it projects
`and reads thousands of infrared dots to form a depth map of the face along with a
`2D infrared image. This data is used to create a sequence of 2D images and depth
`maps which are digitally signed and sent to the Secure Enclave. To counter both
`digital and physical spoofs, the TrueDepth camera randomises the sequence of 2D
`images and depth map captures and projects a device-specific random pattern. A
`portion of the Secure Neural Engine — protected within the Secure Enclave —
`transforms this data into a mathematical representation and compares that
`representation with the enrolled facial data.
`
`
`Id. (citing https://support.apple.com/en-in/guide/security/sec067eb0c9e/web). As this evidence
`
`suggests, data is exchanged between the TouchID and FaceID sensors and the Secure Enclave
`
`Processor for purposes of finding a match between the sensor data and the data stored in the Secure
`
`Enclave. It is inherent that the “matching” process will either result in a match or not a match,
`
`which will be communicated by the Secure Enclave and ultimately back to the user. As such,
`
`Speir has plausibly alleged that there is “bi-directional” communication of secure data between the
`
`user and secure user processor, and Apple’s motion should be denied.
`
`iii. There is exclusive exchange of secret information between the user
`
`and secure user processor through the secure HMI
`
` Finally, Apple advances claim construction arguments concerning the use of the term
`
`“exclusive” by claim 1 of the ’399 Patent. Specifically, claim 1 recites that the secure HMI is
`
`configured for enabling “bi-directional communication of classified information exclusively
`
`between a user and said secure user processor.” ’399 Patent, Claim 1 (emphasis added). Apple
`
`construes this language to mean that TouchID and/or FaceID cannot be secure HMIs because a
`
`user can enter a passcode on the touchscreen, which can operate as a non-secure HMI depending
`
`
`
`11
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 15 of 17
`
`on its mode of operation. Mot. at 15-16. But Apple does not contest that it is on notice that Speir
`
`alleges that TouchID and/or FaceID enable bi-directional communication “exclusively” between
`
`the user and Secure Enclave Processor. Nor can it—Apple’s own materials make clear that the
`
`TouchID and FaceID sensors exclusively communicate data from the user to and from the Secure
`
`Enclave. See, e.g., Am. Compl. ¶ 58 (“Apple’s biometric security architecture relies on a strict
`
`separation of responsibilities between the biometric sensor and the Secure Enclave, and a secure
`
`connection between the two.”) (emphasis added); see also id. (citing https://support.apple.com/en-
`
`in/guide/security/sec067eb0c9e/web) (“Communication between the Secure Enclave and the built-
`
`in Touch ID sensor takes place over a serial peripheral interface bus.”).
`
`Further, whether there are other potential secure HMIs (for example, when the touch-screen
`
`is operating in a password entry mode) is inapposite at the pleading stage. And Speir’s theory is
`
`consistent with the cited prosecution history. There, the applicant merely stated that the Mauro
`
`reference (U.S. Patent No. 7,047,405) was inapplicable because the ’399 Patent requires “bi-
`
`directional communications between a user of the computer system … and a secure user processor
`
`is exclusively enabled via a secure human/machine interface that is distinct from an unsecure
`
`human/machine interface.” Dkt. No. 13-2 at 12. That is, the ’399 Patent requires a secure HMI
`
`configured for enabling bi-directional communication with the secure user processor that is distinct
`
`from the non-secure HMI. Because Speir has sufficiently alleged the existence of a secure HMI
`
`(e.g., TouchID and FaceID) that enables bi-directional communications exclusively between the
`
`user and Secure Enclave Processor, Apple’s motion should be denied.
`
`IV.
`
`CONCLUSION
`
`For at least the reasons stated above, Apple’s motion should be denied in its entirety.
`
`Alternatively, Speir should be granted leave to amend its allegations concerning direct
`
`infringement of the ’399 Patent.
`
`
`
`12
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 16 of 17
`
`Dated: April 19, 2022
`
`
`
`
`
`
`
`Respectfully submitted,
`
`/s/ Brett E. Cooper
`
`
`
`
`
`Reza Mirzaie (CA SBN 246953)
`rmirzaie@raklaw.com
`Marc A. Fenster (CA SBN 181067)
`mfenster@raklaw.com
`Brett E. Cooper (NY SBN SBN 4011011)
`bcooper@raklaw.com
`Seth Hasenour (TX SBN 24059910)
`shasenour@raklaw.com
`Drew B. Hollander (NY SBN 5378096)
`dhollander@raklaw.com
`
`RUSS AUGUST & KABAT
`12424 Wilshire Blvd. 12th Floor
`Los Angeles, CA 90025
`Phone: (310) 826-7474
`Facsimile: (310) 826-6991
`
`Attorneys for Plaintiff Speir Technologies
`Limited
`
`
`
`13
`
`
`
`
`
`
`
`

`

`Case 6:22-cv-00077-ADA Document 27 Filed 04/19/22 Page 17 of 17
`
`CERTIFICATE OF SERVICE
`
`I hereby certify that the counsel of record who are deemed to have consented to electronic
`
`service are being served on April 19, 2022 with a copy of this document via the Court’s ECF
`
`system.
`
`
`
`
`
`
`
`
`
`
`
`
`
`/s/ Brett E. Cooper
`Brett E. Cooper
`
`
`
`14
`
`
`
`
`
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket