throbber

`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`FITBIT, INC.,
`Petitioner
`
`v.
`
`PHILIPS NORTH AMERICA LLC
`Patent Owner
`
`
`
`
`IPR2020-007831
`Patent No. 7,088,233
`
`
`
`
`PETITIONER’S REPLY TO
`PATENT OWNER’S RESPONSE
`
`
`
`
`
`
`
`
`
`
`
`1 Garmin International, Inc. Garmin USA, Inc., and Garmin Ltd., who
`filed a petition in IPR2020-00910, has been joined as a petitioner in this
`proceeding.
`
`
`
`

`

`I.
`
`INTRODUCTION
`Patent Owner’s Response (“POR”) relies on claim interpretations that
`
`improperly import limitations into the claims and inconsistent treatment of the prior
`
`art. Patent Owner’s (“PO”) arguments do not rebut the evidence demonstrating
`
`unpatentability explained in the Petition.
`
`II. CLAIM CONSTRUCTION
`A.
`“security mechanism governing information transmitted between
`the first personal device and the second device”
`1.
`Board’s construction is correct
`Petitioner agrees there is “no need to construe [this] phrase[.]” (Paper 12
`
`(“ID”), 15.) With ordinary language, the phrase describes what the “security
`
`mechanism” does and where it is located. The asserted prior art discloses this
`
`limitation under any reasonable interpretation. (E.g., Paper 1 (“Petition”), 20-21,
`
`36-38, 59-60.) Construction of this term is not “necessary to resolve the underlying
`
`controversy.” Toyota Motor Corp. v. Cellport Sys., Inc., IPR2015-00633, Paper No.
`
`11 at 16 (Aug. 14, 2015); Nidec Motor Corp. v. Zhongshan Broad Ocean Motor Co.,
`
`868 F.3d 1013, 1017 (Fed. Cir. 2017).
`
`As the Board noted, “the use of passwords or encryption” in the ’233 patent
`
`“can be used to secure information transmitted between personal device 100 and
`
`other points on the network.” (ID, 14-15 (citing Ex.1001, 8:12–22, 13:25–67).) In
`
`fact, use of security keys, authorization, and encryption by the claimed “security
`
`
`
`1
`
`

`

`mechanism” is recited by dependent claims. (Ex.1001, claims 2-4; id., 8:12-22
`
`(password/security code).)
`
`2.
`PO’s construction is unsupported by evidence
`PO’s views of “security mechanism” and its alleged distinction from the prior
`
`art are premised on the testimony of its expert, Dr. Martin. (POR, 8-11, citing
`
`Ex.2026.) Highlighted by his cross-examination testimony, Dr. Martin on one hand
`
`confirms he is interpreting the term under its ordinary meaning by a POSITA at the
`
`relevant timeframe—not PO’s proposed construction for the term (Ex.1076, 91:5-
`
`95:13; Ex.2026 ¶39)—yet on the other hand imports nebulous and shifting
`
`limitations into the term by opining that its purported ordinary meaning “depend[s]
`
`on what you’re trying to protect against” in a particular application (Ex.1076, 95:14-
`
`96:5).
`
`Dr. Martin’s interpretation of the term is untethered from a POSITA’s
`
`understanding in view of the specification at the patent’s effective filing date, and
`
`instead applies an “ordinary meaning of security mechanism [that] depends on the
`
`threat you’re trying to protect against” without reference to the specification or
`
`proper timeframe. (See id., 96:7-99:5; see also id., 63:6-64:25 (meaning “depend[s]
`
`upon the application that you’re trying to do”), 126:20-129:17 (“security mechanism
`
`would depend upon those threats [you’re trying to protect against]”), 138:19-140:15
`
`(“depend[s] upon [] the alternative application area that you’re contemplating”),
`
`
`
`2
`
`

`

`151:14-153:18, 65:15-67:5 (need to understand “what you’re trying to protect
`
`against before you design the security mechanism”).) Dr. Martin’s conditional
`
`interpretation that relies on the subjective intended purpose of the mechanism is
`
`contrary to established claim construction principles, which further supports why
`
`PO’s arguments should be rejected. See Homeland Housewares, LLC v. Whirlpool
`
`Corp., 865 F.3d 1372, 1375-76 (Fed. Cir. 2017) (construction for “predetermined
`
`settling speed” that required the speed to be “determined for each use, depending on
`
`the particular blender or the individual contents of the blender” was “incorrect”);
`
`Cochlear Bone Anchored Sols. AB v. Oticon Med. AB, 958 F.3d 1348, 1356 (Fed.
`
`Cir. 2020) (rejecting notion claims required “particular intent or objective of a
`
`hearing-aid designer or manufacturer”).
`
`Moreover, even under his application-dependent interpretation, Dr. Martin
`
`opined that in certain applications, “encryption alone would satisfy the security
`
`mechanism of Claim 1.” (See Ex.1076, 153:20-158:19 (if “only thing you’re trying
`
`to protect against [is] eavesdropping of the transmissions by random passerby[s] ...
`
`and you’re just trying to give your location to [] two other devices, then encryption
`
`would prevent the eavesdropping”), see also id., 68:19-69:17, 131:11-132:11,
`
`126:20-128:15 (same for “security keys”); Ex.2025, 132:25-133:4, Ex.2023, 13-15,
`
`POR 11.) Dr. Martin also conceded in other applications, multiple embodiments of
`
`security and “multiple levels of access would not necessarily be required. (Ex.1076,
`
`
`
`3
`
`

`

`150:2-153:18; id., 129:19-132:19, 67:7-70:15 (similar); see Ex.1001, 13:41-54.) Dr.
`
`Martin’s testimony undermines PO’s reliance on Dr. Martin to contend that
`
`encryption cannot ever “govern or control [information] transmission.” (POR, 10
`
`(citing Ex.2007, ¶33).)
`
`Despite attempts to sometimes import “multiple levels of authorization” into
`
`the “security mechanism,” Dr. Martin also admitted that “multiple levels” of
`
`authorization “could encompass having full access and no access to a device”—“you
`
`either have access or you don’t ... that’s multiple levels.” (Ex.1076, 62:8-63:4.) A
`
`security mechanism which provides full or no access to a device is disclosed by the
`
`prior art. (Pet., 36-38, 59-60, 66-70.)
`
`3.
`PO’s attempts to distinguish prior art are unsupported
`PO attempts to distinguish “encryption of the contents of the signal” from
`
`“encryption of signals.” (POR, 11.) But the specification does not distinguish
`
`between encryption of a signal and encryption of the signal contents. Instead, the
`
`specification and claims expressly include “encryption” within the scope of the
`
`“security mechanism.” (Ex.1001, 13:41-46, claim 2.) PO appears to infer its
`
`distinction from Figure 5 and its expert’s opinions. (POR, 10-11.) But PO and Dr.
`
`Martin concede that Figure 5 is but one exemplary “embodiment” (POR, 10;
`
`Ex.1001, 11:46-49, 13:31-32) and “claim 1 is not limited to that” (Ex.1076, 83:20-
`
`84:4; id., 60:2-19, 114:2-23).
`
`
`
`4
`
`

`

`PO also suggests the security mechanism, when implemented via a password,
`
`must be limited to one that provides multiple levels or “a particular level of access.”
`
`(PO, 8.) Such features are not claimed and thus PO’s improper attempt to import
`
`subject matter into the claims should be rejected. Abbott Labs. v. Sandoz, Inc., 566
`
`F.3d 1282, 1288 (Fed. Cir. 2009). Indeed, during cross-examination, while Dr.
`
`Martin initially opined the “security mechanism” required “multiple levels of
`
`authorization and prioritization” because that is “the way the abstract describes it”
`
`(Ex.1076, 58:4-59:14), he later conceded such features were not required by the
`
`specification (id., 70:2-71:8) and that “multiple levels of access would not
`
`necessarily be required” to meet claim 1 (id., 151:14-153:18). Dr. Martin agreed
`
`that the specification does not identify security—much less “multiple levels of
`
`authorization”—in the summary of invention, nor does it list it as a benefit provided
`
`by the patent. (Id., 71:10-73:22.)
`
`Ultimately, Dr. Martin’s inability to provide an understanding of how a
`
`POSITA would have understood “security mechanism” and to support his opinions
`
`in the specification is inconsistent with his opinion that the “security mechanism” is
`
`a “key patentable advance of the ’233 patent” (id., 47:21-49:1) and undermines PO’s
`
`arguments regarding the term (POR, 4-5, 8-11). His inability to do so is all the more
`
`jarring given he conceded that “security mechanisms for different kind of threats
`
`were known.” (Ex.1076, 56:2-57:7.)
`
`
`
`5
`
`

`

`B.
` “wireless communication”
`The Board adopted PO’s construction for this term. (ID, 13.) PO concedes
`
`that “construction of this term may not be necessary” (POR, 12) and thus has waived
`
`further reliance on its POPR arguments. Trial Practice Guide at 52; In re Nuvasive,
`
`Inc., 842 F.3d 1376, 1381 (Fed. Cir. 2016). The Board should disregard any later
`
`attempt by PO to rely on such POPR arguments. On this record, the prior art’s
`
`disclosure of the claimed “wireless communication” features under any reasonable
`
`interpretation is undisputed (see Pet., 32-36, 54-59), and the Board need not construe
`
`the term to resolve any controversies.
`
`C.
`“Data I/O port”
`Neither party suggested a construction for “data input/output port[s]” recited
`
`in claim 14, which the Board construed (ID, 15) to require the “data input/output
`
`port” to be “separate from” claim 1’s “wireless communication module” (id., 38-
`
`39.) The Board’s construction and resulting analysis of Petitioner’s challenges to
`
`claim 14 should be reconsidered because the specification does not support the
`
`Board’s conclusions. See Power Mosfet Techs., L.L.C. v. Siemens AG, 378 F.3d
`
`1396, 1410 (Fed. Cir. 2004) (“where neither the plain meaning nor the patent itself
`
`commands a difference in scope between two terms, they may be construed
`
`identically”).
`
`
`
`6
`
`

`

`The Board relies on the alleged “distinction between local area wireless
`
`communication and communication via data ports, as illustrated in Figures 4A and
`
`4C.” (ID, 38-39 (citing Ex.1001, Figs. 4A, 4C, 3:47-49, 3:54-57, 4:14-16, 4:25-27).)
`
`But neither those portions—nor any other portion of the ’233 patent—describes the
`
`claimed arrangement of claim 14, where a first personal device has a data I/O port
`
`that communicates with a second device’s data I/O port and a short-range wireless
`
`communication module
`
`that
`
`is compatible with a short-range wireless
`
`communication module of the second device. (Ex.1001, claims 1, 14.)
`
`The column 3 disclosures cited by the Board relate to an embodiment of
`
`[personal medical device] PMD 100 shown in Figure 2. (Id., 3:18-19.) While there
`
`is an “option[]” that PMD 100 includes a data I/O port and wireless communication
`
`module (id., 3:47-49, 3:54-57), no communication between PMD 100 and a second
`
`device via the data I/O port or wireless module 300 like that recited in claim 14 is
`
`disclosed.
`
`Figure 4A (annotated below) shows a PMD 100 communicating with Personal
`
`Wireless Device (PWD) 500 using local area wireless (LAW) 330. (Id., 4:14-16.)
`
`
`
`7
`
`

`

`
`
`While PWD 500 includes LAW 330 “compatible with LAW 330 in PMD 100,” the
`
`personal device does not include a data I/O port like claim 14. (Id.; Ex.1076, 226:14-
`
`229:13, 238:14-239:10 (Dr. Martin confirming neither figure nor specification
`
`describes features).)
`
`Figure 4C (annotated below) shows (1) a PMD 100 communicating with
`
`Medical Device Interface (MDI) 600 using data ports 160 and (2) a PWD 500
`
`communicating with MDI 600 using LAW 330. (Id., 4:25-31.)
`
`PMD 100 does not include a wireless communications module (LAW 330) and PWD
`
`500 does not include a data port 160. Moreover, MDI 600 is an interface without a
`
`
`
`
`
`8
`
`

`

`data port 160 or LAW 330 that communicate with the same [personal/second]
`
`device, as recited in claim 14. (Id.; Ex.1076, 229:14-232:9, 237:10-238:13 (Dr.
`
`Martin confirming neither
`
`figure nor specification describes
`
`features).)
`
`Accordingly, the Board’s construction requiring claim 14’s data I/O ports to be
`
`separate from the wireless communication module lacks support in the patent’s
`
`disclosure. See Regents of Univ. of Cal. v. Dakocytomation Cal, Inc., 517 F.3d 1364,
`
`1375 (Fed. Cir. 2008) (claims exclude “repetitive sequences” even though recited by
`
`dependent claims).
`
`Petitioner’s prior art mappings are consistent with claim 14’s plain language,
`
`which does not preclude the claimed data I/O ports from being the same data I/O
`
`ports
`
`the Board recognizes would necessarily be present
`
`in a wireless
`
`communications module. (ID, 39.) This interpretation is also consistent with PO’s
`
`view in district court (and inconsistent with PO’s agreement with the Board here).
`
`(POR, 29-31, Ex.1076, 225:19-226:2; Ex.1075, 17-18, 39 (identifying “Bluetooth
`
`Low Energy (BLE) technology to sync with the accused Fitbit tracker” for both
`
`claim 1’s short-range bi-directional wireless communications module and claim 14’s
`
`data I/O port); Ex.1076, 232:10-237:2.)
`
`Nor do Petitioner’s prior art mappings render claim 14’s data I/O port
`
`superfluous to the wireless communications module. “[T]he use of two terms in a
`
`claim requires that they connote different meanings, not that they necessarily refer
`
`
`
`9
`
`

`

`to two different structures.” Applied Med. Res. Corp. v. U.S. Surgical Corp., 448
`
`F.3d 1324, 1333 n.3 (Fed. Cir. 2006). The specification does not require the
`
`component separation of the Board/PO’s construction—indeed, claim 14 in light of
`
`the specification contemplates use of data I/O ports within claim 1’s wireless
`
`communication modules, but not the arrangement contemplated by the Board/PO.
`
`See Dakocytomation, 517 F.3d at 1375 (claim differentiation presumptions “will be
`
`overcome by a contrary construction dictated by the written description”). The
`
`Petition explains how the body-LAN communication modules of Jacobsen and Say’s
`
`transmitter/receiver or transceiver communication ports include data I/O ports. (See
`
`Pet., 43-44, 65-66.) The Board should reconsider its construction of claim 14, and
`
`confirm Petitioner’s mappings and evidence demonstrating unpatentability of the
`
`claim.
`
`III. PO’S ARGUMENTS DO NOT REBUT THE EVIDENCE OF
`UNPATENTABILITY
`A. Claims 1, 7-10
`1.
`Jacobsen
`For Jacobsen, PO’s only argument is that Jacobsen does not disclose the
`
`“security mechanism.” (POR, 18-29.) But as discussed in section II.A, PO’s
`
`position hinges on an effective construction unsupported by the ’233 patent’s claims
`
`or specification, and does not rebut Petitioner’s evidence of unpatentability.
`
`
`
`10
`
`

`

`First, PO seeks to import notions of a requirement for an additional layer of
`
`security tied to Figure 5 that can distinguish between “authorizing a person’s access”
`
`to a device and “authentication of a device.” (POR 19-20.) But such
`
`interpretation—which relies on the patent’s abstract and Figure 5 (Ex.1076, 59:4-
`
`14)—is found nowhere in the claims and is contrary to well established claim
`
`construction principles. See Phillips v. AWH Corp., 415 F.3d 1303, 1323 (Fed. Cir.
`
`2005) (“[A]lthough the specification often describes very specific embodiments of
`
`the invention, we have repeatedly warned against confining the claims to those
`
`embodiments.”). Further, PO’s expert, who provides the only evidence supporting
`
`PO’s position (POR 20 (citing only Ex.2026 ¶¶72-73)), conceded (1) this additional
`
`layer of security “would not necessarily be required” (Ex.1076, 150:2-153:18; id.,
`
`86:14-25 (“There might be security mechanisms that cannot accomplish Figure 5
`
`that could meet Claim 1.”), 88:2-21) and (2) is not described in Figure 5 (id., 104:4-
`
`105:5 (admitting additional layer of security “is not shown as an explicit element of
`
`Figure 5”)). In district court, PO’s expert has conceded “that patent’s also talking
`
`about controlling the access to the device.” (Ex.2025, 134:8-22 (emphasis added).)
`
`PO’s attempt to import a limitation requiring the “security mechanism” to
`
`authorize access by users as opposed to devices conflicts with the plain language of
`
`the claims, which focus on devices, not users: “a security mechanism governing
`
`information transmitted between the first personal device and the second device.”
`
`
`
`11
`
`

`

`(Ex.1001, 15:9-12.) Further, the specification makes clear only “some measure of
`
`security” is required and describes “possible embodiments of security” that are “not
`
`meant to be exclusive.” (Id., 13:27-30, 13:41-42.) One “possible embodiment”
`
`includes “a number of strategies [that] may be employed for authorization,” none of
`
`which draws a distinction between authorizing persons and devices. (Id., 13:41-46,
`
`13:55-56.) Dependent claim 3 highlights that the “security mechanism” in claim 1
`
`is not specific to authorizing users (as opposed to devices), reciting only that “the
`
`security mechanism “employs authorization by the first personal device.” (Id.,
`
`15:12-16.)
`
`This suggests that PO’s attempt to read in a specific flavor of authorization or
`
`authentication to the “security mechanism” is unsupported as a matter of law. See
`
`Intellectual Ventures I LLC v. T-Mobile USA, Inc., 902 F.3d 1372, 1377-78 (Fed.
`
`Cir. 2018) (reversing construction that limited term to embodiment in specification
`
`and was inconsistent with “plain language of claim[s]” and broader scope suggested
`
`by dependent claims). The presumption is supported by PO’s expert, who opined
`
`the “security mechanism,” in certain applications, could be provided by “encryption
`
`alone.” (Ex.1076, 153:20-158:19; section II.A.2.) PO’s attempt to rewrite the
`
`claims and import limitations from the abstract should be disregarded.
`
`Regardless, Jacobsen discloses the “security mechanism” under its ordinary
`
`meaning, and under every interpretation advanced by PO in this proceeding (POR,
`
`
`
`12
`
`

`

`8-11, 18-20.) Each device in Jacobsen’s system may include “self-disabling
`
`means,” software disabling the device on entry of multiple incorrect passwords.
`
`(Pet., 37-38.) A POSITA would have understood Jacobsen’s password software,
`
`which leads to device disablement, to be a mechanism governing information
`
`transmitted between devices. (Id., 37-38 (citing Ex.1002, ¶87[1h], Exs. 1041-1042);
`
`POR, 13 (“‘govern’ [] means to control”).) PO’s expert conceded that an
`
`unauthorized user (e.g., an enemy combatant) who entered multiple incorrect
`
`passwords would have caused disablement of Jacobsen’s wrist sensor/display unit,
`
`which would have prevented the user from accessing information available through
`
`it. (Ex.1076, 185:2-190:13, 218:18-223:4.) Further, entry of a correct or incorrect
`
`passcode would not only determine whether a user could access information
`
`available through that device, but also whether that device would function to
`
`communicate information with the second device. (Id., 190:15-191:19, 217:2-
`
`218:3.)
`
`To the extent PO contends Jacobsen does not disclose the “security
`
`mechanism” based on an alleged distinction between authorizing a person’s access
`
`to a device over a network and authenticating a device across a network (POR 20),
`
`PO’s expert conceded Jacobsen’s “self-disabling means” achieves device
`
`disablement/enablement and user authorization. Thus, Jacobsen discloses a security
`
`mechanism that “governs information transmitted between the first personal device
`
`
`
`13
`
`

`

`and the second device” even under PO’s desired interpretation, which requires an
`
`additional layer of security beyond what is recited by the claims and described in the
`
`specification.
`
`PO’s other arguments are inapposite. PO contends Jacobsen’s password
`
`software does not govern information transmitted, because a disabled device would
`
`not transmit information. (POR, 21.) First, the specification describes several
`
`security methods that would prevent transmission of information—“security keys”
`
`“held by a central agency” or needed to “release information,” strategies for
`
`“authorization and authentication,” including “biometrics” (Ex.1001, 13:50-56), and
`
`“request[s] for access to a responsible third party” (id., 14:7-8).
`
`Second, PO’s attempt to distinguish Jacobsen by contending that information
`
`must “actually be transmitted” to be the “security mechanism” (PO, 21) elevates a
`
`verb tense out of context within the full limitation—importing a condition found
`
`nowhere in the specification—and is inconsistent with its expert’s opinions. Each
`
`Jacobsen device is capable of providing (and does provide) access control via
`
`software that disables the device upon entry of an incorrect password or some other
`
`code, and thus “govern[s] information transmitted” as claimed. (Pet., 36-38;
`
`Ex.1005, 15:5-10.) PO’s position is also inconsistent with its expert’s testimony,
`
`who opined that encryption (a possible “embodiment of security” (Ex.1001, 13:41-
`
`46)) did not “govern[] information transmitted” because it could not account for
`
`
`
`14
`
`

`

`where you “didn’t want that information to be transmitted at all” (Ex.2025, 133:6-
`
`134:22).
`
`Third, PO’s argument ignores aspects of Jacobsen’s “self-disabling means.”
`
`As PO’s expert admitted, entering the incorrect password once in Jacobsen’s
`
`password software prevents access to information, but does not disable the device;
`
`correct password entry on the subsequent attempt authorizes the user to access all
`
`information available through the device. (Ex.1076, 213:5-216:9, 219:25-223:4.)
`
`Thus, Jacobsen’s software can secure a device without fully disabling it, rendering
`
`PO’s grammar-based argument moot on a factual basis in addition to being
`
`unsupported in the intrinsic evidence and under well-established legal principles.
`
`PO’s twist of Dr. Paradiso’s response to PO counsel’s hammer-smashing
`
`hypothetical is irrelevant. Dr. Paradiso never testified that smashing a device with
`
`a hammer was the “security mechanism” as PO alleges. (POR, 9.) Instead, he
`
`merely responded to counsel’s hypothetical example under the framed context of
`
`whether “disabling a device [would] govern the transmission of information.”
`
`(Ex.2030, 62:24-63:2.) None of Petitioner’s grounds rely on hammer-smashing for
`
`the “security mechanism.” (Pet., 36-38, 59-60, 66-70.) PO’s claim 26-based
`
`argument is also irrelevant since Petitioner’s grounds do not rely on the prior art
`
`communications module power switch for the “security mechanism.” (Id.; POR, 9.)
`
`And as described above, PO’s expert conceded Jacobsen’s “self-disabling means”
`
`
`
`15
`
`

`

`might not lead to full device disablement (Ex.1076, 214:21-216:9), which makes
`
`PO’s hammer-smashing device analogy even less relevant.
`
`Likewise, PO’s suggestion that Jacobsen’s “self-disabling means” would only
`
`be important (and used) for leader/medic control units (POR, 24-26) does not trump
`
`express disclosure that “each device may contain a self-disabling means” via, for
`
`example, “the wrong password” “entered for more than one attempt” to “ensure that
`
`none of the devices may be used against the soldiers if captured” (Pet., 37 (citing
`
`Ex.1006, 15:5-10)) and PO’s expert’s admission that Jacobsen discloses the “self-
`
`disabling means” on all devices (Ex.1076, 167:5-169:23). PO’s theory also misses
`
`that Jacobsen teaches the display 204 of the wrist sensor/display unit can provide
`
`“the position or physiological status of other soldiers” (Ex.1005, 9:25-29 (emphasis
`
`added)), which Dr. Martin conceded would be important if the soldier were captured
`
`(Ex.1076, 178:13-184:19).
`
`PO’s suggestion that password entry by a soldier using a “pair of buttons” is
`
`impractical (POR 26-27) does not negate disclosure that each device allows for
`
`password entry as explained above (Ex.1005, 15:5-14). Moreover, PO’s expert
`
`conceded POSITAs would have understood “passwords could be entered into
`
`devices without many buttons.” (Ex.1076, 169:25-171:20.) He agreed the
`
`specification explains that entering passcodes using two keys can be implemented
`
`in “standard” devices (id. (citing Ex.1001, 8:19-22)), and conceded his ultimate
`
`
`
`16
`
`

`

`opinion on password entry in Jacobsen was from his perspective, not a POSITAs
`
`(Ex.1076, 171:14-20 (it would “just seem[] impractical to me.” (emphasis added))).
`
`2.
`Say
`Similar to Jacobsen, PO’s only argument for Say is failure to disclose the
`
`claimed “security mechanism.” (POR, 34-42.) For reasons similar to those
`
`explained above in Sections II.A/III.A.1, PO’s argument relies on an effective
`
`construction for the term that is unsupported by the claims or specification, and does
`
`not rebut Petitioner’s evidence of unpatentability.
`
`First, PO contends that Say’s encryption from the sensor control unit
`
`(first personal device) to the receiver/display unit (second device) (Pet., 60) does not
`
`disclose the “security mechanism” because there is “no connection between the
`
`encryption ... and the information itself,” and no ability to “distinguish[]”
`
`“access/authorization” by one device from another. (POR, 37.) To support these
`
`additional limitations on the “security mechanism” PO cites to no intrinsic evidence,
`
`only its expert’s declaration. (Id. (citing Ex.2026 ¶91).)
`
`But the specification explains that (1) “standard encryption algorithms” are
`
`contemplated—not just encryption methods specifically connected to the data being
`
`transmitted and able to distinguish between devices—and (2) encryption
`
`encompasses
`
`the function of “making
`
`it essentially
`
`impossible for
`
`the
`
`unsophisticated interceptor to interpret the data”—similar to Say’s “encrypt[ing] the
`
`
`
`17
`
`

`

`datastream” and then using a “key to decipher the decrypted data signal” as one way
`
`to reduce “crosstalk.” (Ex.1001, 13:43-46; Pet., 60.) The dependent claims further
`
`emphasize PO’s effort to import limitations, reciting mere “encrypt[ing] the
`
`information” without the additional requirements alleged by PO. (Section II.A.;
`
`Ex.1001, claim 2.)
`
`PO’s only support for its position—Dr. Martin (POR, 37)—opined that in
`
`certain applications, “encryption alone would satisfy the security mechanism of
`
`Claim 1.” (Id., 153:20-158:19 , 68:19-69:17, 131:11-132:11.)2 Dr. Martin also
`
`conceded that if “all that I’m worried about is not allowing a passerby to
`
`eavesdrop”—e.g., the same goal described in the specification of “making it
`
`essentially impossible for the unsophisticated interceptor to interpret the data”
`
`(Ex.1001, 13:43-46)—then “encrypting the information would prevent that passerby
`
`from eavesdropping on it.” (Ex.1076, 267:10-268:3; accord id., 268:5-269:11 (“If
`
`all you’re worried about is . . . encrypting the communication links, . . . then Say’s
`
`encryption would encrypt the communication links”).)
`
`For Dr. Martin’s attempted comparison of Say’s encryption to a public
`
`website, Dr. Martin admitted his analogy was “not taken from the ’233” patent.
`
`
`
`2 Dr. Martin’s admission renders PO’s contention that Say’s encryption “would not
`
`work” in Figure 5 (POR 38-39) to be irrelevant. See section III.A.1.
`
`
`
`18
`
`

`

`(Ex.1076, 256:13-19.) When pressed on its relevance to claim 1, he admitted the
`
`security mechanism he described was “a security mechanism around that particular
`
`example” of “do I want people to be able to see this comment or not see this
`
`comment” and conceded it “is an analogy, and there’s always a problem with taking
`
`an analogy too far.” (Id., 263:13-264:17, 265:15-25.)
`
`For Say’s identification codes, PO seeks to characterize them as “identif[ying]
`
`the device itself” rather than “describ[ing] a code entered by a user.” (POR 35-36.)
`
`As with encryption, PO relies only Dr. Martin to support this contention. (Id., 36
`
`(citing Ex.2026 ¶89).) Again, this phantom distinction is unsupported by the patent.
`
`For example, dependent claim 3 broadly recites “authorization by the device,” not
`
`the user. (Ex.1001, 15:14-16.) Dependent claim 4 recites a “key entered by the user
`
`of the first personal device.” (Id., 15:16-19.) Moreover, PO’s argument is
`
`unsupported: Say discloses the identification code “may be selected by the patient”
`
`(Pet., 60 (citing Ex.1006, 49:15-37)), with which Dr. Martin agreed (Ex.1076, 248:3-
`
`249:10).
`
`PO’s contention that Say’s ID codes do not “authoriz[e] access to transmitted
`
`information”—which relies on Dr. Martin (POR, 36)—also lacks support. Dr.
`
`Martin conceded that by programming a matching identification code into the
`
`receiver/display (second device), the device would have access to all the transmitted
`
`data, and without that code, it would not. (Ex.1076, 249:12-251:4.) He also
`
`
`
`19
`
`

`

`admitted that while data transmitted between the Say devices could be “accessed,”
`
`the data would not be “used” or “displayed” without being programmed with the
`
`correct identification code, (id., 254:23-255:13), similar to the “public/private key
`
`system” described in the patent, where information can be communicated, but “both
`
`keys [are] required for decoding an encrypted message” (Ex.1001, 13:60-14:6).
`
`PO’s additional arguments are unpersuasive. PO’s contention that Say does
`
`not disclose encryption in both directions (POR, 40-41) imports a meaning of
`
`“between” inconsistent with the patent. For example, Figure 5 describes a security
`
`mechanism between a first personal device (PMD 100) and second device (PWD
`
`600) by “sending a command” from the second to the first device. (Ex.1001, 13:31-
`
`36, Fig. 5.) Further, in district court, PO’s accused security mechanism only affects
`
`communication in one direction. (See Ex.1075, 10.)
`
`3.
`Jacobsen-Say
`PO’s arguments based on the “security mechanism” and claim 14 (POR, 42)
`
`are misplaced for the same reasons explained in Sections II-IV. PO’s additional
`
`argument a POSITA would not have “look[ed] to encrypt communications between
`
`Jacobsen’s wrist unit 18 and soldier unit 50” (POR, 42) misunderstands the prior art
`
`
`
`20
`
`

`

`and ignores Petitioner’s evidence demonstrating obviousness. (Pet., 66-70;
`
`Ex.1002, ¶¶103-110.)3
`
`PO acknowledges Jacobsen’s concern with enemies “accessing location
`
`information for several” soldiers (POR, 44), yet alleges a POSITA would not have
`
`encrypted communications between a soldier’s wrist unit and soldier unit because if
`
`that soldier was captured, the enemy would already know that soldier’s location.
`
`(POR, 42-43.) This argument ignores that a soldier’s wrist unit can display “the
`
`position or physiological status of other soldiers” (Ex.1005, 9:24-29), which PO’s
`
`expert admitted would be “important to prevent an enemy combatant from learning”
`
`(Ex.1076, 178:13-179:17). This feature depends on communications between the
`
`soldier and wrist unit—the soldier unit receives geolocation data of other soldiers,
`
`which would have been transmitted to the wrist unit for display. (Ex.1005, 6:66-7:4,
`
`9:24-29.)
`
`PO also contends a POSITA would have found encrypting transmissions
`
`disadvantageous due to “additional power consumption and potentially increas[ing]
`
`a soldier’s electronic signature.” (POR, 43-44.) First, a “potential increase” is an
`
`
`
`3 PO’s argument based on use of “could” instead of “would” in Dr. Paradiso’s
`
`declaration (POR 45-46) ignores the substantive content of the declaration (Ex.1002
`
`¶¶105-09), and its inclusion highlights the weakness of PO’s position.
`
`
`
`21
`
`

`

`effective admission this concern is only hypothetical and may not exist. Second, any
`
`additional power consumption would have been negligible. PO’s expert admitted
`
`the communications between the wrist and soldier unit would be “much lower power
`
`transmissions” compared to those from the soldier unit to the medic or command
`
`(Ex.1076, 181:25-183:13.) Third, the communications modules are both
`
`outfitted with “power management” components:
`
`
`
`Figure 4A (cropped, annotated).
`
`Jacobsen describes managing power draw by
`
`powering components periodically for only short periods and discloses that
`
`“hardware and software power control measures are used” (Ex.1005, 12:19-20),
`
`which would have mitigated additional power consumption associated with
`
`encrypting communications between the soldier and wrist unit-
`
`Thus, PO’s
`
`22
`
`

`

`contention that encrypting transmission would have “detract[ed] from Jacobsen’s
`
`communications capabilities” is inconsistent with Jacobsen’s disclosure. (Id.; POR,
`
`44.)
`
`Likewise, PO’s assertion of speculation (POR, 45-46) cannot be reconciled
`
`with Dr. Paradiso’s testimony, which explains that adding encryption would have
`
`avoided interference problems in some implementations. (Id., ¶¶105-06, 108-09.)
`
`B. Claim 14
`Despite taking a different position in district court (Section II.C), PO latched
`
`onto the Board’s preliminary finding that Jacobsen and/or Say does

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket