throbber

`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`_______________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________
`
`
`FITBIT, INC.,
`
`Petitioner,
`
`v.
`
`PHILIPS NORTH AMERICA LLC,
`
`Patent Owner.
`
`_______________
`
`Case IPR2020-007831
`Patent 7,088,233 B2
`_______________
`
`________________________________________
`PATENT OWNER SUR-REPLY TO
`PETITIONER’S REPLY TO PATENT OWNER’S RESPONSE
`
`
`1 Garmin International, Inc., Garmin USA, Inc., and Garmin Ltd., who filed
`a petition in IPR2020-00910, has been joined as petitioner in this
`proceeding.
`
`
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`TABLE OF CONTENTS
`
` I. 
`II. 
`1. 
`2. 
`III.  THE PETITION FAILS TO DEMONSTRATE THE
`A. 
`B. 
`C. 
`D. 
`E. 
`F. 
`G. 
`H. 
`IV.  CONCLUSION .............................................................................................. 24 
`
`INTRODUCTION ........................................................................................... 1 
`
`CLAIM CONSTRUCTION ............................................................................ 1 
`
`“security mechanism governing information transmitted
`between the first personal device and the second device” .......... 1 
`
`“data input/output port” ............................................................ 10 
`
`UNPATENTABILITY OF THE CLAIMS ................................................... 11 
`
`The Challenged Claims are Patentable Over Jacobsen ....................... 11 
`
`The Challenged Claims are Patentable Over Say ............................... 14 
`
`The Challenged Claims are Patentable Over the Combination of
`Say and Jacobsen ................................................................................. 18 
`
`Claim 14 is Patentable over the Asserted Prior Art ............................ 20 
`
`Claim 13 is Patentable over the Combination of Jacobsen, Say,
`and Quy ............................................................................................... 20 
`
`Claims 24-25 are Patentable over the Combination of Jacobsen,
`Say, and Geva ...................................................................................... 21 
`
`Claim 26 is Patentable Over any Combination With Reber ............... 22 
`
`Claims 15-16, and 22 are Patentable Over the Combination of
`Say and Gabai ...................................................................................... 23 
`
`
`
`
`
`
`
`
`
`i
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`I.
`
`INTRODUCTION
`Petitioner’s Reply (“Reply”) ignores that the claimed invention requires “a
`
`security mechanism governing information transmitted between the first
`
`personal device and the second device,” and not merely any generic “security
`
`mechanism”. At base, Petitioner’s arguments ignore the plain and ordinary meaning
`
`of most of the recited claim language and merely interpret the claim as applying any
`
`form of security. Petitioner’s unreasonably broad interpretation is inconsistent with
`
`the intrinsic record and unsupported in the Petition itself, and should be rejected.
`
`II. CLAIM CONSTRUCTION
`1.
`“security mechanism governing information transmitted
`between the first personal device and the second device”
`Petitioner purports to agree with the Board’s institution decision declining
`
`construction of this term, yet repeatedly advocates for a meaning that ignores the
`
`fact that the claimed “security mechanism” must govern information transmitted
`
`between devices. Petitioner’s Reply is replete with arguments as to how the use of
`
`encryption, as a concept, might constitute a “security mechanism,” without
`
`acknowledging that the claims require significantly more. Ex. 1001, claim 1.
`
`Petitioner does not even attempt to justify this unreasonably broad construction and
`
`instead, as detailed further below, attempts to confuse the issue by citing Dr.
`
`Martin’s testimony on how one might implement various “security mechanisms.”
`
`1
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`Despite Petitioner’s focus on the construction for this term advanced in Patent
`
`Owner’s Preliminary Response, neither Patent Owner’s Response (“POR”) nor Dr.
`
`Martin’s declaration rely on that originally proposed construction to distinguish the
`
`prior art. See POR at 20, 28-29, 34-37; Ex. 2026 at 16-17; see also Ex. 1076, 91:5-
`
`17. Both the POR and Dr. Martin’s declaration rely solely on the plain meaning of
`
`the words used in the claim, while pointing out that Petitioner’s unreasonably broad
`
`construction renders much of the claim language superfluous. See POR at 21-23.
`
`Indeed, according to Petitioner’s expert, the term should be construed so broadly that
`
`smashing a device with a hammer would constitute the requisite “security
`
`mechanism governing information transmitted between the first personal device and
`
`the second device”—even though in that situation there would be no information
`
`transmitted. See POR at 22-23 (citing Ex. 2026 at ¶74).
`
`There is no credence to Petitioner’s suggestion—made for the first time in
`
`reply—that the term might somehow require a subjective interpretation. See Reply
`
`at 2-3. To the contrary, the cases relied on by Petitioner are inapposite and actually
`
`support the application of the plain and ordinary meaning here. In Homeland
`
`Housewares, LLC v. Whirlpool Corp., the Court found the term “predetermined
`
`settling speed” to be entitled to its plain and ordinary meaning of “determined
`
`beforehand”, despite the fact that in practice any specific predetermined settling
`
`speed might be empirically determined through testing as suggested by the
`
`2
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`specification. See Homeland Housewares, LLC v. Whirlpool Corp., 865 F.3d 1372,
`
`1375-76 (Fed. Cir. 2017). Meanwhile in Cochlear Bone Anchored Sols. AB v.
`
`Oticon Med. AB, the Federal Circuit again endorsed the plain and ordinary meaning
`
`of the term, rejecting a construction of “adapted to” that would incorporate
`
`“accounting for the mechanics of the skull” into the claims. See Cochlear Bone
`
`Anchored Sols. AB v. Oticon Med. AB, 958 F.3d 1348, 1356 (Fed. Cir. 2020). In
`
`both Homeland Housewares and Cochlear Bone, the Federal Circuit endorsed a
`
`plain meaning despite the fact that the claim could be implemented in myriad
`
`different ways. These cases acknowledge that, under a plain and ordinary meaning,
`
`a variety of implementation may read on the claim, but that a range in
`
`implementation choices should not dictate the construction of the term—consistent
`
`with Dr. Martin’s testimony.
`
`Petitioner’s attacks on Dr. Martin’s testimony with respect to “security
`
`mechanisms” are without merit. Dr. Martin repeatedly pointed to the specific
`
`examples provided in the specification as a way of explaining that in a given
`
`implementation, a security mechanism governing information transmitted between
`
`devices could take different forms depending on the threats to be protected against.
`
`See e.g., Ex. 1076, 97:16 (“Yes. I think the security mechanism depends. And, again,
`
`it’s in the specification. As we talked about, there’s the example of Figure 5, but
`
`there’s also the example of transmitting information unencrypted but with
`
`3
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`authorization. And then as- there’s the whole list of possible embodiments of the
`
`security mechanism, the embodiments of security -- sorry let me look back at it --
`
`in Column 13 that we’ve walked through before.”) (emphasis added). Likewise, in
`
`Dr. Martin’s declaration, he notes that his opinion as to the meaning of the claim
`
`terms is based on how one with ordinary skill in the art would have understood the
`
`term “at the time of the invention in the context of the specification….” Ex. 2026 at
`
`15. Petitioner’s claim that Dr. Martin did not refer to the specification or proper
`
`timeline is therefore incorrect.
`
`Nor does Dr. Martin’s testimony somehow evidence a “subjective”
`
`interpretation of the term “untethered” from its plain and ordinary meaning. To the
`
`contrary, Dr. Martin’s opinions—as evidenced by both his declaration and
`
`deposition—have been unequivocal with
`
`respect
`
`to how
`
`the specific
`
`implementations of the prior art fail to disclose a “security mechanism governing
`
`information transmitted between the first personal device and the second device”
`
`based on the plain meaning of those words. See, e.g., Ex. 2026 at 35-36, 44-45; Ex.
`
`1076, 196:17-197:23, 251:5-20. It should be unsurprising that one may implement
`
`any invention, including the claimed invention, in a myriad of ways and one might
`
`use a “security mechanism” appropriate to guard against any specific threats of
`
`concern for a given implementation. That does not, however, suggest any ambiguity
`
`4
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`with respect to what a “security mechanism” is, nor is there any real dispute as to
`
`what might count as a “security mechanism” here.
`
`What Petitioner characterizes as Dr. Martin’s incorporation of “nebulous and
`
`shifting limitations into the term,” shows that Dr. Martin was merely discussing an
`
`implementation of a hypothetical security mechanism. Dr. Martin was asked
`
`“What is the plain and ordinary meaning of the phrase ‘security mechanism
`
`governing information transmitted between the first personal device and the second
`
`device.’”2 Ex. 1076, 95:14-18. Dr. Martin responded, not with any “shifting”
`
`manner, but by reiterating how one would implement an exemplary system as
`
`previously discussed3 during the deposition: “So again, as I’ve said, the security
`
`mechanisms depend upon what you’re trying to protect against. And so - and so you
`
`have to take that into account as part of the meaning. And then the - there also needs
`
`to be information that’s transmitted between the first personal device and the second
`
`device.” Id. at 95:21-96:5. Immediately following this answer, Dr. Martin was
`
`asked “So is it your opinion that the ordinary meaning of the phrase ‘security
`
`mechanism governing information transmitted between the first personal device and
`
`the second device’ changes depending upon what you’re trying to protect against?”
`
`
`2 The question was appropriately objected to, as it called for a legal
`conclusion, and was also ambiguous.
`3 See Ex. 1076 at 29:2-30:24
`
`5
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`Id. at 96:7-12. The form of this question was also appropriately objected to as it
`
`mischaracterized Dr. Martin’s prior testimony. Dr. Martin, once again, reiterated
`
`his response in the context of the prior hypothetical: “So, you know, as I’ve said, the
`
`security mechanisms depend upon what your threat model is. And so depending
`
`upon, you know, what you're trying to accomplish and what the threats are to that
`
`would determine what security mechanisms you would have in place.” Id. at
`
`96:15-22 (emphasis added).
`
`Just a few questions after these exchanges, Dr. Martin was asked: “So you
`
`can’t tell me today sitting here what the plain and ordinary meaning of the phrase
`
`‘security mechanism governing information transmitted between the first personal
`
`device and the second device’ is until I tell you what you’re trying to protect
`
`against?” Id. at 98:17-23. The form of this question was appropriately objected to
`
`as it was vague and confusing in context, and again misstated Dr. Martin’s prior
`
`testimony. Dr. Martin replied that “Yes. That’s correct. The form of the security
`
`mechanism is going to depend upon, you know, what the threats are that you’re
`
`trying to protect against.” Id. at 99:1-5 (emphasis added). Here, Dr. Martin again
`
`simply stresses the truism that the particular form of “security mechanism” chosen
`
`for a particular implementation would depend on the threats facing the designer.
`
`What is more, other portions of Dr. Martin’s transcript only serve to confirm
`
`that Dr. Martin was repeatedly using an exemplary implementation throughout his
`
`6
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`deposition when explaining how security mechanisms could work. For example, in
`
`one portion, Dr. Martin is asked “But what from - you know, the particular
`
`embodiment that could accomplish the figure and meet the security mechanism
`
`limitation depend on the application or the threat that you’re trying to protect against;
`
`is that fair to say?” Ex. 1076, 126:20-25. The form of this question was
`
`appropriately objected to as it was vague and confusing. Dr. Martin does not respond
`
`(as Petitioner alleges) by saying that the meaning of security mechanism changes
`
`based on the threat level, but instead he responds by discussing how different
`
`security mechanisms could be implemented depending on the threat levels faced:
`
`Well, as I’ve said before, like, depending upon what
`you’re trying to - you have different threats that you’re
`trying to protect against, and your security mechanism
`would depend on those threats. So in this particular case,
`you know, I don’t want bystander B to be able to dispense
`medication, but I want responding personnel RP to be able
`to dispense medication, you know, again, looking at that
`paragraph before. So given that particular example, given
`that particular example, the -- so the first embodiment of
`encryption by itself would not accomplish that -- that
`capability of preventing B from -- bystander B from
`dispensing medication while allowing RP to dispense
`medication. But, you know, having security keys, the third
`example there would permit it. So all those data flows in
`Figure 5 could be done without -- if I didn’t care about
`7
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`eavesdropping, if I didn’t care about somebody who is
`wandering by from listening to all of this data that’s
`flowing back and forth -- okay? -- then I wouldn’t need to
`encrypt the data channels -- okay? -- the data flows, the
`lines that are shown in there. But I would want that -- you
`know, the -- I could use that security key from the central
`agency and provide that to the responding personnel.
`
`Id. at 127:13-128:15.
`In yet another portion of his deposition, Dr. Martin was asked repeated
`
`questions (all appropriately objected to) regarding a POSITA’s understanding of the
`
`term “security mechanism.” See Ex. 1076, 63:6-67:5. Dr. Martin’s consistent
`
`answer to each of these questions again uses an exemplary implementation as a
`
`framework for his answers. In fact, in his answer to the last of these questions, Dr.
`
`Martin makes it abundantly clear that he was referring to an implementation of the
`
`security mechanism, not any ambiguity as to what would qualify as a security
`
`mechanism: “So you would want to understand what your -- what you’re trying to
`
`protect against before you design the security mechanisms.” Id. at 67:2-5 (emphasis
`
`added).
`
`Similarly, Petitioner quotes Dr. Martin as saying “depend[s] upon [] the
`
`alternative application area that you’re contemplating,” but fails to provide the entire
`
`quote which demonstrates that this is in reference yet again to a hypothetical
`
`implementation of a security mechanism: “You know, as we’ve -- as we’ve said
`8
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`several times before, you know, the choice of security mechanisms that you’re going
`
`to implement is going to depend upon the application.” Id. at 139:5-10 (emphasis
`
`added); Reply at 2.
`
`Finally, Petitioner also cites Dr. Martin’s response to the following
`
`confusing—and objected to—question: “Q. And when you say the security
`
`mechanism depends, you’re saying the ordinary meaning of security mechanism
`
`depends on the threat you’re trying to protect against?” Ex.1076, 98:5-9. The
`
`question is vague, ambiguous, and confusing for a number of reasons, as it purports
`
`to take Dr. Martin’s prior explanation of the truism that any implementation of a
`
`“security mechanism” “depends” on the threats to be protected against and purports
`
`to frame it as what the “ordinary meaning” of the claim term “security
`
`mechanism”—a legal question—should be. While Dr. Martin answered “Yes.
`
`That’s correct,” this particular exchange does more to evidence the nebulous,
`
`untethered, and shifting approach of Petitioner’s questioning at deposition than any
`
`genuine ambiguity on Dr. Martin’s part as to what would and would not qualify as a
`
`“security mechanism” as claimed in light of the specification.
`
`Petitioner also accuses Dr. Martin of incorporating the requirement that a
`
`“security mechanism” have “multiple levels of authorization” into the construction
`
`of “security mechanism”—yet that argument finds no basis in fact. While Dr. Martin
`
`talked about the specification’s discussion of multiple levels of authorization in
`
`9
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`discussing the context of the invention, neither Patent Owner nor Dr. Martin have
`
`advocated for a construction of the term that requires multiple levels of authorization
`
`nor is that a basis on which the POR or Dr. Martin distinguish any prior art.
`
`2.
` “data input/output port”
`As the Board recognized in the decision granting institution, the ’233 patent
`
`consistently draws a distinction between local area wireless communication and
`
`communication via data ports, as illustrated in Figures 4A and 4C. The
`
`embodiments of Figures 4A and 4C (and their accompanying descriptions) plainly
`
`demonstrate a difference in usage throughout the specification. Additionally, the
`
`’233 patent indicates that the data ports 160 “may include, but are not limited to:
`
`serial, parallel, USB, etc.” while separately and distinctly discussing wireless
`
`communication channels. Ex. 1001, 3:48-49
`
`Petitioner further alleges that “data input/output port” should not be construed
`
`as distinguished from a local wireless communication because there is no express
`
`disclosure of an embodiment of a PMD with both, as required by the claims.
`
`However, that argument has no bearing on whether the terms mean something
`
`different—the specification reflects that they do even were no such embodiment
`
`expressly disclosed. What is more, the specification does describe a device (MDI
`
`600) that contemplates both a data port 160 and LAW 330 for communication as
`
`different things, consistent with the rest of the specification, and also describes (in
`
`10
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`the combination of Fig. 4A and 4C) the option of using either a data port or wireless
`
`communication. A POSITA would understand that, given these options, the PMD
`
`could include both.
`
`III. THE PETITION FAILS TO DEMONSTRATE THE
`UNPATENTABILITY OF THE CLAIMS
`A.
`The Challenged Claims are Patentable Over Jacobsen
`Petitioner’s Reply largely relies on attacking a strawman by arguing that
`
`Patent Owner relies on claim construction arguments that Patent Owner never made.
`
`While Patent Owner and Dr. Martin relied (appropriately) on the specification
`
`and its examples when discussing the context of the claims and goals of the invention
`
`(such as providing multiple layers of security), the reason Jacobsen fails to disclose
`
`a “security mechanism governing information transmitted between the first personal
`
`device and the second device” is that Jacobsen fails to disclose a security mechanism
`
`that “governs information transmitted between a first device and a second device.”
`
`As explained at length in Patent Owner’s Response, Jacobsen cannot meet the
`
`limitation because no information is actually transmitted when the self-disabling
`
`means (the purported “security mechanism”) is used. POR at 18-29. This argument
`
`is premised on nothing more than the plain meaning of the words, and not a particular
`
`construction of the term, but the result is nonetheless consistent with the goals of the
`
`claimed invention and exemplary embodiments as described in the specification.
`
`11
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`Petitioner also notes how Dr. Martin opined that “encryption alone” could in
`
`certain applications constitute a “security mechanism”—an argument raised
`
`repeatedly throughout the reply—but this is not an accurate description of Dr.
`
`Martin’s testimony. First, this argument has nothing to do with the fact that
`
`Jacobsen’s self-disabling means cannot “govern information transmitted” between
`
`devices because no information is transmitted. Second, it is misleading. The
`
`exchange from Dr. Martin’s deposition that Petitioner cites to is a confusing line of
`
`questioning where Dr. Martin pushes back on the hypothetical implementation being
`
`discussed. See Ex. 1076, 153:20-158:19. Not only was it the questioning attorney
`
`who made the assertion purportedly attributed to Dr. Martin, but Dr. Martin
`
`repeatedly made the disclaimer that encryption would be a security mechanism that
`
`only protected against eavesdropping:
`
`Q. Yeah, what I’m asking is the next step which is then -
`- so encryption alone would satisfy the security
`mechanism of Claim 1; is that correct?
`
`[Objection to form.]
`THE WITNESS: If the application that you’re applying
`Claim 1 to was just worried about eavesdropping, then,
`yes, that would satisfy.
`
`Ex. 1076, 158:10-19; see also id. at 156:4-11; 156: 23-157:7; 157:15-18; 158:4-8
`
`(all confirming that encryption would suffice as a security mechanism to address
`
`12
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`eavesdropping). Petitioner’s argument on this point is further addressed in the
`
`discussion of Say in Section III.B below.
`
`Having recognized the fatal error in relying on Jacobsen’s self-disabling
`
`means as satisfying the term “security mechanism governing information
`
`transmitted between the first personal device and the second device,” Petitioner now
`
`argues—for the first time in reply—that the term “information transmitted” does not
`
`require that information actually be transmitted and points to the specification of the
`
`’233 Patent’s reference to “security keys” and “biometrics. First, this is a new claim
`
`construction argument raised for the first time in reply and has thus been waived.
`
`Second, the examples cited to, while concerning authorization, also require the
`
`actual transmission of information. Third, to the extent the specification did describe
`
`some semblance of self-disabling means akin to that of Jacobsen, that is not what
`
`was claimed in the claims at issue—which requires information transmitted.
`
`Petitioner goes on to argue that Jacobsen’s “self-disabling means” does
`
`govern information transmitted between the first personal device and the second
`
`device because if a user enters a password incorrectly once, they would have another
`
`opportunity to do so before the device is disabled. However, even this feature of
`
`Jacobsen is untethered to any information transmitted between the devices. To the
`
`contrary, this “first password” scenario only further demonstrates how such a
`
`password is focused on the device itself and not the information transmitted.
`
`13
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`Petitioner also further argues that Dr. Paradiso’s unreasonably broad
`
`understanding of the term—such that smashing a device with a hammer constitutes
`
`a “security mechanism governing information transmitted between the first personal
`
`device and the second device,” is “irrelevant.” Reply at 15. To the contrary, the
`
`relevance is manifest as it conclusively demonstrates the unreasonably broad
`
`approach Petitioner has taken.
`
`B.
`The Challenged Claims are Patentable Over Say
`Petitioner’s arguments with respect to Say once again demonstrate a myopic
`
`focus on “security mechanism” while ignoring the specific requirement that it
`
`“govern[] information transmitted between the first personal device and the second
`
`device.” Petitioner also makes the same strawman argument with respect to claim
`
`construction addressed above with respect to Jacobsen.
`
`The fundamental problem with Petitioner’s reliance on Say—uncorrected in
`
`Reply—is that Say’s purported “security” disclosures are divorced from “governing
`
`information transmitted between the first personal device and the second device.”
`
`Say’s “unique identification code,” remains an identifier whereas Say’s device-to-
`
`device encryption is designed to avoid cross talk and is not about governing the
`
`information transmitted, as discussed at length in Patent Owner’s Response. (See
`
`POR at 34-41.)
`
` Instead, these techniques are focused on enabling the
`
`communication between specific devices regardless of the information transmitted
`
`14
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`between them. Petitioner does not actually dispute this point, but rather argues that
`
`under its unreasonably broad construction of the claim, Say’s disclosure meets the
`
`limitation.
`
`Petitioner again mischaracterizes Dr. Martin’s testimony as supporting the
`
`notion that “encryption alone would satisfy the security mechanism of Claim 1.”
`
`(Reply at 18.) However, as explained above, the cited testimony does not support
`
`this assertion. It was Petitioner’s counsel who asserted that encryption alone would
`
`satisfy the term, and Dr. Martin responded by merely explaining that some form of
`
`encryption could suffice to prevent eavesdropping (see Ex. 1076, 153:20-158:19,
`
`and Section III.A, above). The remaining Martin testimony cited by Petitioner only
`
`further demonstrates that Dr. Martin considers encryption to be—in general terms—
`
`a form of “security mechanism”, but not that it would always in every conceivable
`
`implementation satisfy the limitations of the claims. See Ex. 1076, 68:19-69:17;
`
`131:11-132:11. Indeed, Dr. Martin’s opening declaration describes at length how
`
`Say’s encryption, which is focused on avoiding cross talk, would not “govern
`
`information transmitted between the first personal device and the second device”
`
`despite literally being a form of encryption.4 Ex. 2026 at ¶¶ 88-98; see also POR at
`
`
`4 It should be noted that most of these questions were also objected to
`because they were vague and confusing in context, often unclear whether
`Petitioner’s attorney was intending to refer to a “security mechanism”, generally,
`
`15
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`34-41. To be clear, Patent Owner’s argument, as stressed in the Patent Owner
`
`Response (see POR at 11) is not that encryption can never be used such that it would
`
`constitute a “security mechanism” that “governs information transmitted between
`
`the first personal device and the second device.” Patent Owner’s argument has been
`
`that the simple disclosure of the broad concept of encryption—on its own—does not
`
`suffice to specifically disclose the claimed element. Indeed, Say is a perfect example
`
`of such a situation where encryption was used in a manner that does not govern
`
`information transmitted between the devices.
`
`Indeed, Dr. Martin’s testimony at deposition was unequivocal on this point,
`
`as he explained that while encryption of a communications link might provide
`
`protection from, say, eavesdropping, it does not provide protection in the form of
`
`“governing information transmitted” between devices as required by the claims.
`
`(See Ex. 1076, 68:6-69:20). This testimony is also consistent with Dr. Martin’s
`
`declaration, which explained how the concept of encryption alone would not provide
`
`a security mechanism that governed information transmitted between the first and
`
`second personal device. See Ex. 2026 at 44 (“Accordingly Say’s use of encryption
`
`
`or a “security mechanism” that “govern[s] information transmitted between the
`first personal device and the second device” as required by the claims. See, e.g.,
`Ex. 1076 at 53:3-7, 56:2-7, 95:14-18, 96:7-12.
`
`16
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`does not govern information transmitted between two devices.”) (emphasis in
`
`original).
`
`Petitioner also attempts to distinguish Say by arguing that its “identification
`
`codes” may be entered by a user. That argument, however, does not change the fact
`
`that Say contemplates them as being used merely for identification and not as a form
`
`of security (whether or not user selected). That the specification of the ’233 patent
`
`may disclose using codes for security does not change what Say actually discloses.
`
`See POR at 32-36. Say does not, for example, describe using a code as some form
`
`of device access or self-disabling means, though if it did, then that would further fail
`
`to disclose a “security mechanism governing information transmitted between the
`
`first device and the second device” for the same reasons a similar disclosure fails to
`
`disclose the element as discussed with respect to Jacobsen. It was Petitioner’s
`
`counsel who posed a hypothetical during Dr. Martin’s deposition that suggested
`
`implementing Say in a manner similar to this (“Q. And let’s say the patient selects
`
`an identification code, and that identification code is different from the identification
`
`codes of other sensor control units. . . .” Ex. 1076, 248:17-21), but Say itself does
`
`not actually disclose such an embodiment.
`
`Petitioner also objects to Patent Owner’s reliance on the plain meaning of
`
`“between” in distinguishing Say’s use of encryption in only one direction, however,
`
`Petitioner does not actually explain how—if at all—this is inconsistent with the
`
`17
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`commonly understood meaning of the word “between.” Petitioner’s reliance on
`
`“sending a command” (see Reply at 20) misses the point, as the act of sending a
`
`command is not a security mechanism but rather an example of information
`
`transmitted that would, itself, be governed by a security mechanism. Patent Owner
`
`also disagrees with Petitioner’s assertion that the accused security mechanism in
`
`district court only affects communications in one direction, but that dispute has no
`
`bearing on the issues to be decided by the Board here.
`
`C.
`
`The Challenged Claims are Patentable Over the Combination of
`Say and Jacobsen
`Petitioner purports to justify the combination of Jacobsen and Say,
`
`overlooking the deficiencies of its original petition, by arguing that the risk of
`
`captured soldiers demonstrates a need to apply Say’s encryption to communications
`
`with the wrist unit of Jacobsen. As an initial matter, Patent Owner reiterates that the
`
`proposed combination fails to disclose a “security mechanism governing
`
`information transmitted between the first personal device and the second device” for
`
`all the same reasons that the references, individually, fail to disclose the same.
`
`Additionally, Petitioner overplays the significance that the hypothetical
`
`capture of a soldier would play in any potential motivation to combine Jacobsen and
`
`Say. For example, in support of its point, Petitioner cites the following testimony
`
`by Dr. Martin (Ex. 1076 at 179:9-17) which acknowledges the truism that not giving
`
`away the position of soldiers in the battlefield is simply important to avoid. This
`18
`
`

`

`IPR2020-00783
`
`
`
`Patent Owner Sur-Reply
`
`testimony, however, provides no motivation to combine the one-way encryption of
`
`a communication link in Say, which is designed to avoid cross talk and not govern
`
`information transmitted, into Jacobsen.
`
`Indeed, Say’s communication link encryption would have no effect in
`
`protecting the location of other soldiers’ wrist units after capture—it would only
`
`avoid cross talk on the communications links. Something else, like the Jacobsen
`
`device-disabling means would be required to protect against the threat of disclosing
`
`the location of other soldiers via equipment on the body of a captured soldier. Yet,
`
`such a disabling means would not “govern information transmitted from the first
`
`personal device to the second device,” as stressed repeatedly by Dr. Martin at
`
`deposition:
`
`So this self-disabling means, means there’s no information
`to be transmitted. I’ve disabled the device, okay? So once
`it’s disabled there’s no information to be transmitted.
`And, you know, as I’ve said in the report, the claim
`language says there’s -- governing -- I'm sorry. Let me
`make sure I’m not misquoting the claim language to you.
`You know,
`it’s governing
`information
`transmitted
`between the first personal

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket