`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`_______________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________
`
`
`FITBIT, INC.,
`
`Petitioner,
`
`v.
`
`PHILIPS NORTH AMERICA LLC,
`
`Patent Owner.
`
`_______________
`
`Case IPR2020-007831
`Patent 7,088,233 B2
`_______________
`
`________________________________________
`PATENT OWNER SUR-REPLY TO
`PETITIONER’S REPLY TO PATENT OWNER’S RESPONSE
`
`
`1 Garmin International, Inc., Garmin USA, Inc., and Garmin Ltd., who filed
`a petition in IPR2020-00910, has been joined as petitioner in this
`proceeding.
`
`
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`TABLE OF CONTENTS
`
` I.
`II.
`1.
`2.
`III. THE PETITION FAILS TO DEMONSTRATE THE
`A.
`B.
`C.
`D.
`E.
`F.
`G.
`H.
`IV. CONCLUSION .............................................................................................. 24
`
`INTRODUCTION ........................................................................................... 1
`
`CLAIM CONSTRUCTION ............................................................................ 1
`
`“security mechanism governing information transmitted
`between the first personal device and the second device” .......... 1
`
`“data input/output port” ............................................................ 10
`
`UNPATENTABILITY OF THE CLAIMS ................................................... 11
`
`The Challenged Claims are Patentable Over Jacobsen ....................... 11
`
`The Challenged Claims are Patentable Over Say ............................... 14
`
`The Challenged Claims are Patentable Over the Combination of
`Say and Jacobsen ................................................................................. 18
`
`Claim 14 is Patentable over the Asserted Prior Art ............................ 20
`
`Claim 13 is Patentable over the Combination of Jacobsen, Say,
`and Quy ............................................................................................... 20
`
`Claims 24-25 are Patentable over the Combination of Jacobsen,
`Say, and Geva ...................................................................................... 21
`
`Claim 26 is Patentable Over any Combination With Reber ............... 22
`
`Claims 15-16, and 22 are Patentable Over the Combination of
`Say and Gabai ...................................................................................... 23
`
`
`
`
`
`
`
`
`
`i
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`I.
`
`INTRODUCTION
`Petitioner’s Reply (“Reply”) ignores that the claimed invention requires “a
`
`security mechanism governing information transmitted between the first
`
`personal device and the second device,” and not merely any generic “security
`
`mechanism”. At base, Petitioner’s arguments ignore the plain and ordinary meaning
`
`of most of the recited claim language and merely interpret the claim as applying any
`
`form of security. Petitioner’s unreasonably broad interpretation is inconsistent with
`
`the intrinsic record and unsupported in the Petition itself, and should be rejected.
`
`II. CLAIM CONSTRUCTION
`1.
`“security mechanism governing information transmitted
`between the first personal device and the second device”
`Petitioner purports to agree with the Board’s institution decision declining
`
`construction of this term, yet repeatedly advocates for a meaning that ignores the
`
`fact that the claimed “security mechanism” must govern information transmitted
`
`between devices. Petitioner’s Reply is replete with arguments as to how the use of
`
`encryption, as a concept, might constitute a “security mechanism,” without
`
`acknowledging that the claims require significantly more. Ex. 1001, claim 1.
`
`Petitioner does not even attempt to justify this unreasonably broad construction and
`
`instead, as detailed further below, attempts to confuse the issue by citing Dr.
`
`Martin’s testimony on how one might implement various “security mechanisms.”
`
`1
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`Despite Petitioner’s focus on the construction for this term advanced in Patent
`
`Owner’s Preliminary Response, neither Patent Owner’s Response (“POR”) nor Dr.
`
`Martin’s declaration rely on that originally proposed construction to distinguish the
`
`prior art. See POR at 20, 28-29, 34-37; Ex. 2026 at 16-17; see also Ex. 1076, 91:5-
`
`17. Both the POR and Dr. Martin’s declaration rely solely on the plain meaning of
`
`the words used in the claim, while pointing out that Petitioner’s unreasonably broad
`
`construction renders much of the claim language superfluous. See POR at 21-23.
`
`Indeed, according to Petitioner’s expert, the term should be construed so broadly that
`
`smashing a device with a hammer would constitute the requisite “security
`
`mechanism governing information transmitted between the first personal device and
`
`the second device”—even though in that situation there would be no information
`
`transmitted. See POR at 22-23 (citing Ex. 2026 at ¶74).
`
`There is no credence to Petitioner’s suggestion—made for the first time in
`
`reply—that the term might somehow require a subjective interpretation. See Reply
`
`at 2-3. To the contrary, the cases relied on by Petitioner are inapposite and actually
`
`support the application of the plain and ordinary meaning here. In Homeland
`
`Housewares, LLC v. Whirlpool Corp., the Court found the term “predetermined
`
`settling speed” to be entitled to its plain and ordinary meaning of “determined
`
`beforehand”, despite the fact that in practice any specific predetermined settling
`
`speed might be empirically determined through testing as suggested by the
`
`2
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`specification. See Homeland Housewares, LLC v. Whirlpool Corp., 865 F.3d 1372,
`
`1375-76 (Fed. Cir. 2017). Meanwhile in Cochlear Bone Anchored Sols. AB v.
`
`Oticon Med. AB, the Federal Circuit again endorsed the plain and ordinary meaning
`
`of the term, rejecting a construction of “adapted to” that would incorporate
`
`“accounting for the mechanics of the skull” into the claims. See Cochlear Bone
`
`Anchored Sols. AB v. Oticon Med. AB, 958 F.3d 1348, 1356 (Fed. Cir. 2020). In
`
`both Homeland Housewares and Cochlear Bone, the Federal Circuit endorsed a
`
`plain meaning despite the fact that the claim could be implemented in myriad
`
`different ways. These cases acknowledge that, under a plain and ordinary meaning,
`
`a variety of implementation may read on the claim, but that a range in
`
`implementation choices should not dictate the construction of the term—consistent
`
`with Dr. Martin’s testimony.
`
`Petitioner’s attacks on Dr. Martin’s testimony with respect to “security
`
`mechanisms” are without merit. Dr. Martin repeatedly pointed to the specific
`
`examples provided in the specification as a way of explaining that in a given
`
`implementation, a security mechanism governing information transmitted between
`
`devices could take different forms depending on the threats to be protected against.
`
`See e.g., Ex. 1076, 97:16 (“Yes. I think the security mechanism depends. And, again,
`
`it’s in the specification. As we talked about, there’s the example of Figure 5, but
`
`there’s also the example of transmitting information unencrypted but with
`
`3
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`authorization. And then as- there’s the whole list of possible embodiments of the
`
`security mechanism, the embodiments of security -- sorry let me look back at it --
`
`in Column 13 that we’ve walked through before.”) (emphasis added). Likewise, in
`
`Dr. Martin’s declaration, he notes that his opinion as to the meaning of the claim
`
`terms is based on how one with ordinary skill in the art would have understood the
`
`term “at the time of the invention in the context of the specification….” Ex. 2026 at
`
`15. Petitioner’s claim that Dr. Martin did not refer to the specification or proper
`
`timeline is therefore incorrect.
`
`Nor does Dr. Martin’s testimony somehow evidence a “subjective”
`
`interpretation of the term “untethered” from its plain and ordinary meaning. To the
`
`contrary, Dr. Martin’s opinions—as evidenced by both his declaration and
`
`deposition—have been unequivocal with
`
`respect
`
`to how
`
`the specific
`
`implementations of the prior art fail to disclose a “security mechanism governing
`
`information transmitted between the first personal device and the second device”
`
`based on the plain meaning of those words. See, e.g., Ex. 2026 at 35-36, 44-45; Ex.
`
`1076, 196:17-197:23, 251:5-20. It should be unsurprising that one may implement
`
`any invention, including the claimed invention, in a myriad of ways and one might
`
`use a “security mechanism” appropriate to guard against any specific threats of
`
`concern for a given implementation. That does not, however, suggest any ambiguity
`
`4
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`with respect to what a “security mechanism” is, nor is there any real dispute as to
`
`what might count as a “security mechanism” here.
`
`What Petitioner characterizes as Dr. Martin’s incorporation of “nebulous and
`
`shifting limitations into the term,” shows that Dr. Martin was merely discussing an
`
`implementation of a hypothetical security mechanism. Dr. Martin was asked
`
`“What is the plain and ordinary meaning of the phrase ‘security mechanism
`
`governing information transmitted between the first personal device and the second
`
`device.’”2 Ex. 1076, 95:14-18. Dr. Martin responded, not with any “shifting”
`
`manner, but by reiterating how one would implement an exemplary system as
`
`previously discussed3 during the deposition: “So again, as I’ve said, the security
`
`mechanisms depend upon what you’re trying to protect against. And so - and so you
`
`have to take that into account as part of the meaning. And then the - there also needs
`
`to be information that’s transmitted between the first personal device and the second
`
`device.” Id. at 95:21-96:5. Immediately following this answer, Dr. Martin was
`
`asked “So is it your opinion that the ordinary meaning of the phrase ‘security
`
`mechanism governing information transmitted between the first personal device and
`
`the second device’ changes depending upon what you’re trying to protect against?”
`
`
`2 The question was appropriately objected to, as it called for a legal
`conclusion, and was also ambiguous.
`3 See Ex. 1076 at 29:2-30:24
`
`5
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`Id. at 96:7-12. The form of this question was also appropriately objected to as it
`
`mischaracterized Dr. Martin’s prior testimony. Dr. Martin, once again, reiterated
`
`his response in the context of the prior hypothetical: “So, you know, as I’ve said, the
`
`security mechanisms depend upon what your threat model is. And so depending
`
`upon, you know, what you're trying to accomplish and what the threats are to that
`
`would determine what security mechanisms you would have in place.” Id. at
`
`96:15-22 (emphasis added).
`
`Just a few questions after these exchanges, Dr. Martin was asked: “So you
`
`can’t tell me today sitting here what the plain and ordinary meaning of the phrase
`
`‘security mechanism governing information transmitted between the first personal
`
`device and the second device’ is until I tell you what you’re trying to protect
`
`against?” Id. at 98:17-23. The form of this question was appropriately objected to
`
`as it was vague and confusing in context, and again misstated Dr. Martin’s prior
`
`testimony. Dr. Martin replied that “Yes. That’s correct. The form of the security
`
`mechanism is going to depend upon, you know, what the threats are that you’re
`
`trying to protect against.” Id. at 99:1-5 (emphasis added). Here, Dr. Martin again
`
`simply stresses the truism that the particular form of “security mechanism” chosen
`
`for a particular implementation would depend on the threats facing the designer.
`
`What is more, other portions of Dr. Martin’s transcript only serve to confirm
`
`that Dr. Martin was repeatedly using an exemplary implementation throughout his
`
`6
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`deposition when explaining how security mechanisms could work. For example, in
`
`one portion, Dr. Martin is asked “But what from - you know, the particular
`
`embodiment that could accomplish the figure and meet the security mechanism
`
`limitation depend on the application or the threat that you’re trying to protect against;
`
`is that fair to say?” Ex. 1076, 126:20-25. The form of this question was
`
`appropriately objected to as it was vague and confusing. Dr. Martin does not respond
`
`(as Petitioner alleges) by saying that the meaning of security mechanism changes
`
`based on the threat level, but instead he responds by discussing how different
`
`security mechanisms could be implemented depending on the threat levels faced:
`
`Well, as I’ve said before, like, depending upon what
`you’re trying to - you have different threats that you’re
`trying to protect against, and your security mechanism
`would depend on those threats. So in this particular case,
`you know, I don’t want bystander B to be able to dispense
`medication, but I want responding personnel RP to be able
`to dispense medication, you know, again, looking at that
`paragraph before. So given that particular example, given
`that particular example, the -- so the first embodiment of
`encryption by itself would not accomplish that -- that
`capability of preventing B from -- bystander B from
`dispensing medication while allowing RP to dispense
`medication. But, you know, having security keys, the third
`example there would permit it. So all those data flows in
`Figure 5 could be done without -- if I didn’t care about
`7
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`eavesdropping, if I didn’t care about somebody who is
`wandering by from listening to all of this data that’s
`flowing back and forth -- okay? -- then I wouldn’t need to
`encrypt the data channels -- okay? -- the data flows, the
`lines that are shown in there. But I would want that -- you
`know, the -- I could use that security key from the central
`agency and provide that to the responding personnel.
`
`Id. at 127:13-128:15.
`In yet another portion of his deposition, Dr. Martin was asked repeated
`
`questions (all appropriately objected to) regarding a POSITA’s understanding of the
`
`term “security mechanism.” See Ex. 1076, 63:6-67:5. Dr. Martin’s consistent
`
`answer to each of these questions again uses an exemplary implementation as a
`
`framework for his answers. In fact, in his answer to the last of these questions, Dr.
`
`Martin makes it abundantly clear that he was referring to an implementation of the
`
`security mechanism, not any ambiguity as to what would qualify as a security
`
`mechanism: “So you would want to understand what your -- what you’re trying to
`
`protect against before you design the security mechanisms.” Id. at 67:2-5 (emphasis
`
`added).
`
`Similarly, Petitioner quotes Dr. Martin as saying “depend[s] upon [] the
`
`alternative application area that you’re contemplating,” but fails to provide the entire
`
`quote which demonstrates that this is in reference yet again to a hypothetical
`
`implementation of a security mechanism: “You know, as we’ve -- as we’ve said
`8
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`several times before, you know, the choice of security mechanisms that you’re going
`
`to implement is going to depend upon the application.” Id. at 139:5-10 (emphasis
`
`added); Reply at 2.
`
`Finally, Petitioner also cites Dr. Martin’s response to the following
`
`confusing—and objected to—question: “Q. And when you say the security
`
`mechanism depends, you’re saying the ordinary meaning of security mechanism
`
`depends on the threat you’re trying to protect against?” Ex.1076, 98:5-9. The
`
`question is vague, ambiguous, and confusing for a number of reasons, as it purports
`
`to take Dr. Martin’s prior explanation of the truism that any implementation of a
`
`“security mechanism” “depends” on the threats to be protected against and purports
`
`to frame it as what the “ordinary meaning” of the claim term “security
`
`mechanism”—a legal question—should be. While Dr. Martin answered “Yes.
`
`That’s correct,” this particular exchange does more to evidence the nebulous,
`
`untethered, and shifting approach of Petitioner’s questioning at deposition than any
`
`genuine ambiguity on Dr. Martin’s part as to what would and would not qualify as a
`
`“security mechanism” as claimed in light of the specification.
`
`Petitioner also accuses Dr. Martin of incorporating the requirement that a
`
`“security mechanism” have “multiple levels of authorization” into the construction
`
`of “security mechanism”—yet that argument finds no basis in fact. While Dr. Martin
`
`talked about the specification’s discussion of multiple levels of authorization in
`
`9
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`discussing the context of the invention, neither Patent Owner nor Dr. Martin have
`
`advocated for a construction of the term that requires multiple levels of authorization
`
`nor is that a basis on which the POR or Dr. Martin distinguish any prior art.
`
`2.
` “data input/output port”
`As the Board recognized in the decision granting institution, the ’233 patent
`
`consistently draws a distinction between local area wireless communication and
`
`communication via data ports, as illustrated in Figures 4A and 4C. The
`
`embodiments of Figures 4A and 4C (and their accompanying descriptions) plainly
`
`demonstrate a difference in usage throughout the specification. Additionally, the
`
`’233 patent indicates that the data ports 160 “may include, but are not limited to:
`
`serial, parallel, USB, etc.” while separately and distinctly discussing wireless
`
`communication channels. Ex. 1001, 3:48-49
`
`Petitioner further alleges that “data input/output port” should not be construed
`
`as distinguished from a local wireless communication because there is no express
`
`disclosure of an embodiment of a PMD with both, as required by the claims.
`
`However, that argument has no bearing on whether the terms mean something
`
`different—the specification reflects that they do even were no such embodiment
`
`expressly disclosed. What is more, the specification does describe a device (MDI
`
`600) that contemplates both a data port 160 and LAW 330 for communication as
`
`different things, consistent with the rest of the specification, and also describes (in
`
`10
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`the combination of Fig. 4A and 4C) the option of using either a data port or wireless
`
`communication. A POSITA would understand that, given these options, the PMD
`
`could include both.
`
`III. THE PETITION FAILS TO DEMONSTRATE THE
`UNPATENTABILITY OF THE CLAIMS
`A.
`The Challenged Claims are Patentable Over Jacobsen
`Petitioner’s Reply largely relies on attacking a strawman by arguing that
`
`Patent Owner relies on claim construction arguments that Patent Owner never made.
`
`While Patent Owner and Dr. Martin relied (appropriately) on the specification
`
`and its examples when discussing the context of the claims and goals of the invention
`
`(such as providing multiple layers of security), the reason Jacobsen fails to disclose
`
`a “security mechanism governing information transmitted between the first personal
`
`device and the second device” is that Jacobsen fails to disclose a security mechanism
`
`that “governs information transmitted between a first device and a second device.”
`
`As explained at length in Patent Owner’s Response, Jacobsen cannot meet the
`
`limitation because no information is actually transmitted when the self-disabling
`
`means (the purported “security mechanism”) is used. POR at 18-29. This argument
`
`is premised on nothing more than the plain meaning of the words, and not a particular
`
`construction of the term, but the result is nonetheless consistent with the goals of the
`
`claimed invention and exemplary embodiments as described in the specification.
`
`11
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`Petitioner also notes how Dr. Martin opined that “encryption alone” could in
`
`certain applications constitute a “security mechanism”—an argument raised
`
`repeatedly throughout the reply—but this is not an accurate description of Dr.
`
`Martin’s testimony. First, this argument has nothing to do with the fact that
`
`Jacobsen’s self-disabling means cannot “govern information transmitted” between
`
`devices because no information is transmitted. Second, it is misleading. The
`
`exchange from Dr. Martin’s deposition that Petitioner cites to is a confusing line of
`
`questioning where Dr. Martin pushes back on the hypothetical implementation being
`
`discussed. See Ex. 1076, 153:20-158:19. Not only was it the questioning attorney
`
`who made the assertion purportedly attributed to Dr. Martin, but Dr. Martin
`
`repeatedly made the disclaimer that encryption would be a security mechanism that
`
`only protected against eavesdropping:
`
`Q. Yeah, what I’m asking is the next step which is then -
`- so encryption alone would satisfy the security
`mechanism of Claim 1; is that correct?
`
`[Objection to form.]
`THE WITNESS: If the application that you’re applying
`Claim 1 to was just worried about eavesdropping, then,
`yes, that would satisfy.
`
`Ex. 1076, 158:10-19; see also id. at 156:4-11; 156: 23-157:7; 157:15-18; 158:4-8
`
`(all confirming that encryption would suffice as a security mechanism to address
`
`12
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`eavesdropping). Petitioner’s argument on this point is further addressed in the
`
`discussion of Say in Section III.B below.
`
`Having recognized the fatal error in relying on Jacobsen’s self-disabling
`
`means as satisfying the term “security mechanism governing information
`
`transmitted between the first personal device and the second device,” Petitioner now
`
`argues—for the first time in reply—that the term “information transmitted” does not
`
`require that information actually be transmitted and points to the specification of the
`
`’233 Patent’s reference to “security keys” and “biometrics. First, this is a new claim
`
`construction argument raised for the first time in reply and has thus been waived.
`
`Second, the examples cited to, while concerning authorization, also require the
`
`actual transmission of information. Third, to the extent the specification did describe
`
`some semblance of self-disabling means akin to that of Jacobsen, that is not what
`
`was claimed in the claims at issue—which requires information transmitted.
`
`Petitioner goes on to argue that Jacobsen’s “self-disabling means” does
`
`govern information transmitted between the first personal device and the second
`
`device because if a user enters a password incorrectly once, they would have another
`
`opportunity to do so before the device is disabled. However, even this feature of
`
`Jacobsen is untethered to any information transmitted between the devices. To the
`
`contrary, this “first password” scenario only further demonstrates how such a
`
`password is focused on the device itself and not the information transmitted.
`
`13
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`Petitioner also further argues that Dr. Paradiso’s unreasonably broad
`
`understanding of the term—such that smashing a device with a hammer constitutes
`
`a “security mechanism governing information transmitted between the first personal
`
`device and the second device,” is “irrelevant.” Reply at 15. To the contrary, the
`
`relevance is manifest as it conclusively demonstrates the unreasonably broad
`
`approach Petitioner has taken.
`
`B.
`The Challenged Claims are Patentable Over Say
`Petitioner’s arguments with respect to Say once again demonstrate a myopic
`
`focus on “security mechanism” while ignoring the specific requirement that it
`
`“govern[] information transmitted between the first personal device and the second
`
`device.” Petitioner also makes the same strawman argument with respect to claim
`
`construction addressed above with respect to Jacobsen.
`
`The fundamental problem with Petitioner’s reliance on Say—uncorrected in
`
`Reply—is that Say’s purported “security” disclosures are divorced from “governing
`
`information transmitted between the first personal device and the second device.”
`
`Say’s “unique identification code,” remains an identifier whereas Say’s device-to-
`
`device encryption is designed to avoid cross talk and is not about governing the
`
`information transmitted, as discussed at length in Patent Owner’s Response. (See
`
`POR at 34-41.)
`
` Instead, these techniques are focused on enabling the
`
`communication between specific devices regardless of the information transmitted
`
`14
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`between them. Petitioner does not actually dispute this point, but rather argues that
`
`under its unreasonably broad construction of the claim, Say’s disclosure meets the
`
`limitation.
`
`Petitioner again mischaracterizes Dr. Martin’s testimony as supporting the
`
`notion that “encryption alone would satisfy the security mechanism of Claim 1.”
`
`(Reply at 18.) However, as explained above, the cited testimony does not support
`
`this assertion. It was Petitioner’s counsel who asserted that encryption alone would
`
`satisfy the term, and Dr. Martin responded by merely explaining that some form of
`
`encryption could suffice to prevent eavesdropping (see Ex. 1076, 153:20-158:19,
`
`and Section III.A, above). The remaining Martin testimony cited by Petitioner only
`
`further demonstrates that Dr. Martin considers encryption to be—in general terms—
`
`a form of “security mechanism”, but not that it would always in every conceivable
`
`implementation satisfy the limitations of the claims. See Ex. 1076, 68:19-69:17;
`
`131:11-132:11. Indeed, Dr. Martin’s opening declaration describes at length how
`
`Say’s encryption, which is focused on avoiding cross talk, would not “govern
`
`information transmitted between the first personal device and the second device”
`
`despite literally being a form of encryption.4 Ex. 2026 at ¶¶ 88-98; see also POR at
`
`
`4 It should be noted that most of these questions were also objected to
`because they were vague and confusing in context, often unclear whether
`Petitioner’s attorney was intending to refer to a “security mechanism”, generally,
`
`15
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`34-41. To be clear, Patent Owner’s argument, as stressed in the Patent Owner
`
`Response (see POR at 11) is not that encryption can never be used such that it would
`
`constitute a “security mechanism” that “governs information transmitted between
`
`the first personal device and the second device.” Patent Owner’s argument has been
`
`that the simple disclosure of the broad concept of encryption—on its own—does not
`
`suffice to specifically disclose the claimed element. Indeed, Say is a perfect example
`
`of such a situation where encryption was used in a manner that does not govern
`
`information transmitted between the devices.
`
`Indeed, Dr. Martin’s testimony at deposition was unequivocal on this point,
`
`as he explained that while encryption of a communications link might provide
`
`protection from, say, eavesdropping, it does not provide protection in the form of
`
`“governing information transmitted” between devices as required by the claims.
`
`(See Ex. 1076, 68:6-69:20). This testimony is also consistent with Dr. Martin’s
`
`declaration, which explained how the concept of encryption alone would not provide
`
`a security mechanism that governed information transmitted between the first and
`
`second personal device. See Ex. 2026 at 44 (“Accordingly Say’s use of encryption
`
`
`or a “security mechanism” that “govern[s] information transmitted between the
`first personal device and the second device” as required by the claims. See, e.g.,
`Ex. 1076 at 53:3-7, 56:2-7, 95:14-18, 96:7-12.
`
`16
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`does not govern information transmitted between two devices.”) (emphasis in
`
`original).
`
`Petitioner also attempts to distinguish Say by arguing that its “identification
`
`codes” may be entered by a user. That argument, however, does not change the fact
`
`that Say contemplates them as being used merely for identification and not as a form
`
`of security (whether or not user selected). That the specification of the ’233 patent
`
`may disclose using codes for security does not change what Say actually discloses.
`
`See POR at 32-36. Say does not, for example, describe using a code as some form
`
`of device access or self-disabling means, though if it did, then that would further fail
`
`to disclose a “security mechanism governing information transmitted between the
`
`first device and the second device” for the same reasons a similar disclosure fails to
`
`disclose the element as discussed with respect to Jacobsen. It was Petitioner’s
`
`counsel who posed a hypothetical during Dr. Martin’s deposition that suggested
`
`implementing Say in a manner similar to this (“Q. And let’s say the patient selects
`
`an identification code, and that identification code is different from the identification
`
`codes of other sensor control units. . . .” Ex. 1076, 248:17-21), but Say itself does
`
`not actually disclose such an embodiment.
`
`Petitioner also objects to Patent Owner’s reliance on the plain meaning of
`
`“between” in distinguishing Say’s use of encryption in only one direction, however,
`
`Petitioner does not actually explain how—if at all—this is inconsistent with the
`
`17
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`commonly understood meaning of the word “between.” Petitioner’s reliance on
`
`“sending a command” (see Reply at 20) misses the point, as the act of sending a
`
`command is not a security mechanism but rather an example of information
`
`transmitted that would, itself, be governed by a security mechanism. Patent Owner
`
`also disagrees with Petitioner’s assertion that the accused security mechanism in
`
`district court only affects communications in one direction, but that dispute has no
`
`bearing on the issues to be decided by the Board here.
`
`C.
`
`The Challenged Claims are Patentable Over the Combination of
`Say and Jacobsen
`Petitioner purports to justify the combination of Jacobsen and Say,
`
`overlooking the deficiencies of its original petition, by arguing that the risk of
`
`captured soldiers demonstrates a need to apply Say’s encryption to communications
`
`with the wrist unit of Jacobsen. As an initial matter, Patent Owner reiterates that the
`
`proposed combination fails to disclose a “security mechanism governing
`
`information transmitted between the first personal device and the second device” for
`
`all the same reasons that the references, individually, fail to disclose the same.
`
`Additionally, Petitioner overplays the significance that the hypothetical
`
`capture of a soldier would play in any potential motivation to combine Jacobsen and
`
`Say. For example, in support of its point, Petitioner cites the following testimony
`
`by Dr. Martin (Ex. 1076 at 179:9-17) which acknowledges the truism that not giving
`
`away the position of soldiers in the battlefield is simply important to avoid. This
`18
`
`
`
`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`testimony, however, provides no motivation to combine the one-way encryption of
`
`a communication link in Say, which is designed to avoid cross talk and not govern
`
`information transmitted, into Jacobsen.
`
`Indeed, Say’s communication link encryption would have no effect in
`
`protecting the location of other soldiers’ wrist units after capture—it would only
`
`avoid cross talk on the communications links. Something else, like the Jacobsen
`
`device-disabling means would be required to protect against the threat of disclosing
`
`the location of other soldiers via equipment on the body of a captured soldier. Yet,
`
`such a disabling means would not “govern information transmitted from the first
`
`personal device to the second device,” as stressed repeatedly by Dr. Martin at
`
`deposition:
`
`So this self-disabling means, means there’s no information
`to be transmitted. I’ve disabled the device, okay? So once
`it’s disabled there’s no information to be transmitted.
`And, you know, as I’ve said in the report, the claim
`language says there’s -- governing -- I'm sorry. Let me
`make sure I’m not misquoting the claim language to you.
`You know,
`it’s governing
`information
`transmitted
`between the first personal