throbber
Case 1:22-cv-00058-ADA Document 1 Filed 05/03/21 Page 1 of 15
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`IDENITY SECURITY LLC,
`
`Plaintiff,
`v.
`
`APPLE, INC.
`
`
`Defendant.
`
`Civil Action No. 6:21-CV-460
`
`Jury Trial Demanded
`
`PLAINTIFF’S ORIGINAL COMPLAINT FOR
`PATENT INFRINGEMENT AND JURY DEMAND
`
`Plaintiff Identity Security LLC (“Identity Security” or “Plaintiff”) files this Original
`
`
`
`
`
`
`
`
`Complaint for Patent Infringement and Jury Demand against Defendant Apple, Inc. (“Apple” or
`
`“Defendant”), alleging as follows:
`
`The Parties
`
`1.
`
`Plaintiff Identity Security LLC is a Texas limited liability company having its
`
`principal place of business at 1310 Welch Street, Unit A, Houston, Texas 77006.
`
`2.
`
`Identity Security is the owner of U.S. Patent No. 7,493,497, U.S. Patent No.
`
`8,020,008, U.S. Patent No. 8,489,895, and U.S. Patent No. 9,507,948 (collectively, the “Patents-
`
`in-Suit”).
`
`3.
`
`Defendant Apple Inc. is a California corporation with a principal place of business
`
`at One Apple Park Way, Cupertino, California 95014. Apple can be served through its registered
`
`agent, CT Corporation System, 818 W. Seventh Street, Suite 930, Los Angeles, California, 90017.
`
`4.
`
`Apple is registered to do business in Texas and has regular and established places
`
`of business in this District, including at 3121 Palm Way, Austin, Texas, 2901 S. Capital of Texas
`
`Hwy., Austin, Texas,12535 Riata Vista Circle, Austin, Texas, and 5501 West Parmer Lane, Austin,
`
`Texas. Apple employs thousands of people at these locations in Texas. Upon information and
`
`
`
`1
`
`

`

`Case 1:22-cv-00058-ADA Document 1 Filed 05/03/21 Page 2 of 15
`
`belief, work done at these Apple locations in Texas includes work related to device security and
`
`Apple’s Secure Enclave.
`
`5.
`
`Apple has placed or contributed to placing infringing products, including iPhones,
`
`iPads, Apple Watches, and MacBook computers, into the stream of commerce via an established
`
`distribution channel knowing or understanding that such products would be sold and used in the
`
`United States, including in the Western District of Texas.
`
`6.
`
`On information and belief, Apple also has derived substantial revenues from
`
`infringing acts in the Western District of Texas, including from the sale and use of infringing
`
`products, including iPhones, iPads, Apple Watches, and MacBook computers.
`
`Jurisdiction and Venue
`
`7.
`
`This is an action for patent infringement arising under the patent laws of the United
`
`States, Title 35 of the United States Code. This Court has subject matter jurisdiction under 28
`
`U.S.C. §§ 1331 and 1338(a).
`
`8.
`
`This Court has specific personal jurisdiction over Apple because Apple conducts
`
`business in the State of Texas and in this District. Plaintiff’s causes of action arise from Apple’s
`
`contacts with and activities in the State of Texas and in this District. Upon information and belief,
`
`Apple has committed acts of infringement within the State of Texas and within this District by
`
`directly and/or indirectly making, using, selling, offering to sell, or importing products that infringe
`
`one or more claims of the Patents-in-Suit.
`
`9.
`
`Defendant has committed acts within this District giving rise to this action and has
`
`established sufficient minimum contacts with the State of Texas such that the exercise of
`
`jurisdiction would not offend traditional notions of fair play and substantial justice.
`
`
`
`2
`
`

`

`Case 1:22-cv-00058-ADA Document 1 Filed 05/03/21 Page 3 of 15
`
`10.
`
`Venue is proper in this District under 28 U.S.C. § 1391(b), (c), and 1400(d) because
`
`(1) Defendant has done and continues to do business in this District, (2) Defendant has a regular
`
`and established place of business in this District, and (3) Defendant has committed and continues
`
`to commit acts of patent infringement in this District by using, selling, offering to sell, or importing
`
`products that infringe one or more claims of the Patents-in-Suit. In particular, Apple maintains
`
`regular and established places of business in this District, including, at 3121 Palm Way, Austin,
`
`Texas, 2901 S. Capital of Texas Hwy., Austin, Texas, 12535 Riata Vista Circle, Austin, Texas,
`
`and 5501 West Parmer Lane, Austin, Texas. Apples carries out its business from these physical
`
`locations.
`
`The Patents-in-Suit
`
`11.
`
`Identity Security is the owner of U.S. Patent No. 7,493,497 (“the ’497 Patent”)
`
`titled “Digital Identity Device,” a true and correct copy of which is attached as Exhibit 1. The U.S.
`
`Patent and Trademark Office duly issued the ’497 Patent on February 17, 2009. The ’497 Patent
`
`is valid and enforceable.
`
`12.
`
`Identity Security is the owner of U.S. Patent No. 8,020,008 (“the ’008 Patent”),
`
`titled “Microprocessor Identity Device,” a true and correct copy of which is attached as Exhibit 2.
`
`The U.S. Patent and Trademark Office duly issued the ’008 Patent on September 13, 2011. The
`
`’008 Patent is valid and enforceable.
`
`13.
`
`Identity Security is the owner of U.S. Patent No. 8,489,895 (“the ’895 Patent”),
`
`titled “Microprocessor Identity Device,” a true and correct copy of which is attached as Exhibit 3.
`
`The U.S. Patent and Trademark Office duly issued the ’895 Patent on July 16, 2013. The ’895
`
`Patent is valid and enforceable.
`
`
`
`3
`
`

`

`Case 1:22-cv-00058-ADA Document 1 Filed 05/03/21 Page 4 of 15
`
`14.
`
`Identity Security is the owner of U.S. Patent No. 9,507,948 (“the ’948 Patent”),
`
`titled “Digital Identity Device,” a true and correct copy of which is attached as Exhibit 4. The U.S.
`
`Patent and Trademark Office duly issued the ’948 Patent on November 29, 2016. The ’948 Patent
`
`is valid and enforceable.
`
`Background
`
`15.
`
`The claims of the Patents-in-Suit disclose a novel and unconventional means of
`
`improving the privacy and security of digital information on a digital device using a unique
`
`microprocessor identity device, which is used to create a unique digital identity for the user. The
`
`combination of the unique microprocessor identity and digital identity for the user can be used to
`
`secure communications between parties and grant various levels of permission, as well as
`
`authenticate the identity of the users. See, e.g., Exhibit 1 at 1:13-17.
`
`16.
`
`Claim 1 of the ’497 Patent is representative. Claim 1 states:
`
`1. A digital identity device, comprising:
`
` a
`
` microprocessor comprising a microprocessor identity that uniquely identifies the
`microprocessor, wherein the microprocessor comprises an on-die Programmable Read-
`Only Memory (PROM) and the microprocessor identity is etched into the PROM;
`
`digital identity data, wherein the digital identity data identifies an owner of the digital
`identity device, wherein the digital identity data comprises a name of the owner;
`
` a
`
` memory configured to store at least the digital identity data, wherein the microprocessor
`identity is an alpha-numeric value, and
`
`wherein the digital identity data is bound to the microprocessor identity by encrypting the
`digital identity data using an algorithm that uses the microprocessor identity.
`
`Under claim 1 of the ’497 Patent, the microprocessor is uniquely identified using an alpha-
`
`
`
`numeric value that is etched, or programmed, into a programmable read-only memory or PROM.
`
`Further, the digital identity data corresponding to the user or owner is encrypted using an algorithm
`
`that uses the unique microprocessor identity. In other words, the unique microprocessor identity
`
`
`
`4
`
`

`

`Case 1:22-cv-00058-ADA Document 1 Filed 05/03/21 Page 5 of 15
`
`can be used as a cipher to protect the owner’s identity and authenticate the user, thereby permitting
`
`authorized used of the device.
`
`17.
`
`Claim 1 of the ’008 Patent states:
`
`1. A microprocessor identity device, comprising:
`
`
`a microprocessor;
`
`microprocessor identity information that uniquely identifies the microprocessor
`identity device
`
`digital identity data that identifies an owner of the microprocessor identity device;
`and
`
`and a memory operatively connected to the microprocessor and configured to store
`the digital identity data and the microprocessor identity information,
`
`wherein the digital identity data is bound to the microprocessor identity device by
`encoding, using the microprocessor, the digital identity data using an algorithm that
`uses the microprocessor identity information.
`
`
`Claim 5 of the ’895 states:
`
`5. A microprocessor identity device, comprising:
`
`
`a microprocessor;
`
`microprocessor identity information that uniquely identifies the microprocessor
`identity device;
`
`and digital identity data that identifies an owner of the microprocessor identity
`device, the digital identity data being bound to the microprocessor identity device,
`wherein the digital identity data includes a password provided by the owner, and
`wherein the digital identity data is bound to the microprocessor identity device using
`an encryption algorithm and the microprocessor identity information.
`
`
`Claim 1 of the ’948 patent discloses a similar invention tied to biometric information. The claim
`
`1. A digital identity device comprising:
`
` a
`
` microprocessor, wherein microprocessor identity information uniquely identifies the
`microprocessor;
`
`5
`
`states:
`
`
`
`

`

`Case 1:22-cv-00058-ADA Document 1 Filed 05/03/21 Page 6 of 15
`
`
`digital identity data that identifies an owner of the digital identity device,
`
`wherein the digital identity data is bound to the microprocessor by encrypting, using
`the microprocessor, the digital identity data using an algorithm that uses the
`microprocessor identity information,
`
`wherein the microprocessor reads the digital identity data,
`
`wherein the digital identity data comprises an owner's biometric information, and
`
`wherein the owner's biometric information comprises a fingerprint.
`
`18.
`
`Uniquely identifying the microprocessor and then creating a unique digital identity
`
`wherein the digital identity is bound to the microprocessor using encryption, among other aspects
`
`of the invention, provides a novel approach to securing digital transactions. The microprocessor
`
`identity is unique to that device and distinguishes that device from others like it in the world. See,
`
`e.g., Ex. 1 at 3: 63-65.
`
`19.
`
`Apple infringes at least claim 1 of the ’497 Patent, claim 1 of the ’008 Patent, claim
`
`5 of the ’895 Patent, and claim 1 of the ’948 Patent by making, using, selling, offering for sale,
`
`and/or importing into the United States products that incorporate Apple’s Secure Enclave.
`
`Attached as Exhibits 5-8 are claim charts showing infringement by Apple’s Secure Enclave
`
`processor of at least one claim from each of the Patents-in-Suit.
`
`20.
`
` “The Secure Enclave is a system on chip (SoC) that is included on all recent iPhone,
`
`iPad, Apple Watch, Apple TV and HomePod devices, and on a Mac with Apple silicon as well as those
`
`with the Apple T2 Security Chip. … The Secure Enclave also provides the foundation for the secure
`
`generation and storage of the keys necessary for encrypting data at rest, and it protects and evaluates the
`
`biometric data for Touch ID and Face ID.” See https://support.apple.com/guide/security/hardware-
`
`security-overview-secf020d1074/1/web/1. Apple describes the Secure Enclave as “a hardware-based
`
`key manager that’s isolated from the main processor to provide an extra layer of security.” See
`
`
`
`6
`
`

`

`Case 1:22-cv-00058-ADA Document 1 Filed 05/03/21 Page 7 of 15
`
`https://developer.apple.com/documentation/security/certificate_key_and_trust_services/keys/storing_k
`
`eys_in_the_secure_enclave. Apple described the benefits of using the Secure Enclave to developers:
`
`“When you store a private key in the Secure Enclave, you never actually handle the key, making it
`
`difficult for the key to become compromised. Instead, you instruct the Secure Enclave to create the key,
`
`securely store it, and perform operations with it. You receive only the output of these operations, such as
`
`encrypted data or a cryptographic signature verification outcome.” Id.
`
`21.
`
`The Secure Enclave was introduced as part of the Apple A7 processor in the iPhone 5S
`
`in September 2013. Since then, several Apple Products have used the Secure Enclave, namely:
`
`•
`
`•
`
`iPhone 5S and later
`
`iPad Air or later
`
`• MacBook Pro computers with TouchBar that contain the Apple T1 Chip
`
`•
`
`Intel-based Mac computers that contain the Apple T2 Security Chip
`
`• Mac computers with Apple silicon
`
`• Apple TV HD or later
`
`• Apple Watch Series 1 or later
`
`• HomePod and HomePod mini
`
`(“the
`
`Infringing
`
`Products”).
`
`https://support.apple.com/guide/security/secure-enclave-
`
`sec59b0b31ff/web. Apple leverages the Secure Enclave in several applications and features. For
`
`example, the Secure Enclave plays a role in managing the authentication process and enabling
`
`payment transaction to proceed in Apple Pay. https://support.apple.com/guide/security/apple-pay-
`
`component-security-sec2561eb018/1/web/1. With Apple’s Touch ID security:
`
`When the fingerprint sensor detects the touch of a finger, it triggers the advanced
`imaging array to scan the finger and sends the scan to the Secure Enclave.
`Communication between the processor and the Touch ID sensor takes place over a
`serial peripheral interface bus. The processor forwards the data to the Secure
`
`
`
`7
`
`

`

`Case 1:22-cv-00058-ADA Document 1 Filed 05/03/21 Page 8 of 15
`
`Enclave but can’t read it. It’s encrypted and authenticated with a session key that’s
`negotiated using a shared key provisioned for each Touch ID sensor and its
`corresponding Secure Enclave at the factory.
`
`https://support.apple.com/guide/security/touch-id-and-face-id-security-sec067eb0c9e/1/web/1.
`
`
`22.
`
`Similarly, Face ID data is sent to the Secure Enclave. “A portion of the Secure Neural
`
`Engine—protected within the Secure Enclave—transforms this data into a mathematical representation
`
`and compares that representation to the enrolled facial data.” Id.
`
`23.
`
`Security of computers and mobile devices is paramount. As mobile devices and
`
`computers (including smart watches and tablets) have come to dominate our daily lives, the need
`
`to keep them secure becomes ever more critical. “Mobile security involves protecting portable
`
`devices such as laptops, tablets, smart watches, and phones against cyber threats. Today, the need
`
`for protection is more critical because we store a lot of sensitive data on these devices. Studies
`
`show that mobile banking is one of the top three most used apps by Americans. The case is similar
`
`in other countries especially in the developing and emerging markets. Most individuals and small
`
`businesses also use their smartphones and laptops to login into their emails and social media pages.
`
`With each day that passes, we are adding some data to our digital footprints through our mobile
`
`devices,
`
`making
`
`it
`
`easy
`
`for
`
`hackers
`
`to
`
`target
`
`us.”
`
`See
`
`https://www.whatmobile.net/Opinion/article/mobile-security-important.
`
`24.
`
`As another reporter put it, “Having a mobile phone has become a large part of our
`
`everyday life. Many underestimate the value a phone truly holds when it comes to the information
`
`it stores. Your phone has your entire life on it.” https://blog.rsisecurity.com/importance-of-mobile-
`
`security/. This is not an exaggeration. In addition to email and social media accounts, mobile
`
`phones and computers contain sensitive personal and financial information as well as applications
`
`that permit users to access their bank accounts, credit card accounts, and mobile payment options.
`
`That data must be protected.
`
`
`
`8
`
`

`

`Case 1:22-cv-00058-ADA Document 1 Filed 05/03/21 Page 9 of 15
`
`25.
`
`The claimed invention makes it more difficult for hackers to obtain sensitive
`
`information by, among other benefits, providing protection that is linked to the device’s hardware,
`
`e.g., the processor, which is given its own unique identifier. From there, the unique identifier can
`
`be used as a key against which other identifiers can be checked, encrypted, or otherwise protected.
`
`Count One: Infringement of U.S. Patent No. 7,493,497
`
`Plaintiff restates and incorporates by reference the allegations made in the
`
`26.
`
`preceding paragraphs as though fully set forth herein.
`
`27.
`
`Apple has infringed, and is continuing to infringe, literally or under the doctrine of
`
`equivalents, at least claim 1 of the ’497 Patent by making, using, selling, and/or offering for sale
`
`the Infringing Products in the United States, in violation of 35 U.S.C. § 271(a). Likewise,
`
`Defendant Apple has infringed, and is continuing to infringe, literally or under the doctrine of
`
`equivalents, at least claim 1 of the ’497 Patent by importing the Infringing Products into the United
`
`States.
`
`28.
`
`An example of Apple’s infringement by the Secure Enclave is found in Exhibit 5
`
`to this Complaint. By way of example, the digital identity devices, i.e., the Infringing Products,
`
`each comprise a microprocessor, the Secure Enclave, comprising a microprocessor identity that
`
`uniquely identifies the microprocessor, wherein the microprocessor comprises an on-die
`
`Programmable Read-Only Memory (PROM) and the microprocessor identity is etched into the
`
`PROM. The Secure Enclave is a coprocessor and is provisioned during fabrication with its own
`
`unique ID, which is an AES-256 bit key, i.e., an alpha-numeric value, fused to the coprocessor.
`
`The Infringing Products also each comprise digital identity data in the form of passcode, Touch
`
`ID, or Face ID data. Such data identify the owner of the device, including the name of the owner,
`
`which can be the name of an individual, the name of a company or organization, or other
`
`
`
`9
`
`

`

`Case 1:22-cv-00058-ADA Document 1 Filed 05/03/21 Page 10 of 15
`
`identifying data. The digital identity data is stored in memory in or only available to the Secure
`
`Enclave and is bound to the Secure Enclave’s unique ID by encrypting the data with a key
`
`entangled with the unique ID. The foregoing description is based on publicly available information
`
`and a reasonable investigation of the structure and operation of the Infringing Products. Plaintiff
`
`reserves the right to modify this description, including, for example, on the basis of information
`
`about the Infringing Products that it obtains during discovery.
`
`29.
`
`30.
`
`Apple has had knowledge of the ’497 Patent at least as of the date of this Complaint.
`
`Apple’s direct infringement has damaged and continues to damage Plaintiff in an
`
`amount yet to be determined, but at no less than a reasonable royalty.
`
`Count Two: Infringement of U.S. Patent No. 8,020,008
`
`Plaintiff restates and incorporates by reference the allegations made in the
`
`31.
`
`preceding paragraphs as though fully set forth herein.
`
`32.
`
`Apple has infringed, and is continuing to infringe, literally or under the doctrine of
`
`equivalents, at least claims 1, 2, 4, 6, and 7 of the ’008 Patent by making, using, selling, and/or
`
`offering for sale the Infringing Products in the United States, in violation of 35 U.S.C. § 271(a).
`
`Likewise, Defendant Apple has infringed, and is continuing to infringe, literally or under the
`
`doctrine of equivalents, at least claims 1, 2, 4, 6, and 7 of the ’008 Patent by importing the
`
`Infringing Products into the United States.
`
`33.
`
`An example of Apple’s infringement by the Secure Enclave is found in Exhibit 6
`
`to this Complaint. By way of example, the Infringing Products contain a microprocessor identity
`
`device, the Secure Enclave, that comprise a microprocessor wherein microprocessor identity
`
`information uniquely identifies the microprocessor identity device. The Secure Enclave is a
`
`coprocessor and is provisioned during fabrication with its own unique ID, which is an AES-256
`
`
`
`10
`
`

`

`Case 1:22-cv-00058-ADA Document 1 Filed 05/03/21 Page 11 of 15
`
`bit key, i.e., an alpha-numeric value. The Infringing Products also each comprise digital identity
`
`data in the form of passcode, Touch ID, or Face ID data that identify the owner of the device,
`
`including the name of the owner, which can be the name of an individual, the name of a company
`
`or organization, or other identifying data. The Secure Enclave also includes a memory operatively
`
`connected to the microprocessor that stores the digital identity data and the microprocessor identity
`
`information, wherein the digital identity data are bound to the microprocessor identity device by
`
`encoding, using the microprocessor, the digital identity data using an algorithm that uses the
`
`microprocessor identity information. The digital identity data are bound to the Secure Enclave’s
`
`unique ID by encrypting the data with a key entangled with the unique ID. The foregoing
`
`description is based on publicly available information and a reasonable investigation of the
`
`structure and operation of the Infringing Products. Plaintiff reserves the right to modify this
`
`description, including, for example, on the basis of information about the Infringing Products that
`
`it obtains during discovery.
`
`34.
`
`35.
`
`Apple has had knowledge of the ’008 Patent at least as of the date of this Complaint.
`
`Apple’s direct infringement has damaged and continues to damage Plaintiff in an
`
`amount yet to be determined, but at no less than a reasonable royalty.
`
`Count Three: Infringement of U.S. Patent No. 8,489,895
`
`Plaintiff restates and incorporates by reference the allegations made in the
`
`36.
`
`preceding paragraphs as though fully set forth herein.
`
`37.
`
`Apple has infringed, and is continuing to infringe, literally or under the doctrine of
`
`equivalents, at least claim 5 of the ’895 Patent by making, using, selling, and/or offering for sale
`
`the Infringing Products in the United States, in violation of 35 U.S.C. § 271(a). Likewise,
`
`Defendant Apple has infringed, and is continuing to infringe, literally or under the doctrine of
`
`
`
`11
`
`

`

`Case 1:22-cv-00058-ADA Document 1 Filed 05/03/21 Page 12 of 15
`
`equivalents, at least claim 1 of the ’895 Patent by importing the Infringing Products into the United
`
`States.
`
`38.
`
`An example of Apple’s infringement by the Secure Enclave is found in Exhibit 7
`
`to this Complaint. By way of example, the Infringing Products contain a microprocessor identity
`
`device, the Secure Enclave, that comprise a microprocessor wherein microprocessor identity
`
`information uniquely identifies the microprocessor identity device. The Secure Enclave is a
`
`coprocessor and is provisioned during fabrication with its own unique ID, which is an AES-256
`
`bit key, i.e., an alpha-numeric value. The Infringing Products also each comprise digital identity
`
`data in the form of passcode, Touch ID, or Face ID data that identify the owner of the device,
`
`including the name of the owner, which can be the name of an individual, the name of a company
`
`or organization, or other identifying data. The passcode, Touch ID, and Face ID can be viewed as
`
`passwords provided by the owner. The Secure Enclave also includes a memory operatively
`
`connected to the microprocessor that stores the digital identity data and the microprocessor identity
`
`information, wherein the digital identity data is bound to the microprocessor identity device by
`
`encoding, using the microprocessor, the digital identity data using an algorithm that uses the
`
`microprocessor identity information. The foregoing description is based on publicly available
`
`information and a reasonable investigation of the structure and operation of the Infringing
`
`Products. Plaintiff reserves the right to modify this description, including, for example, on the basis
`
`of information about the Infringing Products that it obtains during discovery.
`
`39.
`
`40.
`
`Apple has had knowledge of the ’895 Patent at least as of the date of this Complaint.
`
`Apple’s direct infringement has damaged and continues to damage Plaintiff in an
`
`amount yet to be determined, but at no less than a reasonable royalty.
`
`
`
`
`
`12
`
`

`

`Case 1:22-cv-00058-ADA Document 1 Filed 05/03/21 Page 13 of 15
`
`Count Four: Infringement of U.S. Patent No. 9,507,948
`
`Plaintiff restates and incorporates by reference the allegations made in the
`
`41.
`
`preceding paragraphs as though fully set forth herein.
`
`42.
`
`Apple has infringed, and is continuing to infringe, literally or under the doctrine of
`
`equivalents, at least claim 1 of the ’948 Patent by making, using, selling, and/or offering for sale
`
`the Infringing Products in the United States, in violation of 35 U.S.C. § 271(a). Likewise,
`
`Defendant Apple has infringed, and is continuing to infringe, literally or under the doctrine of
`
`equivalents, at least claim 1 of the ’948 Patent by importing the Infringing Products into the United
`
`States.
`
`43.
`
`An example of Apple’s infringement by the Secure Enclave is found in Exhibit 8
`
`to this Complaint. By way of example, the digital identity devices, i.e., the Infringing Products,
`
`each comprise a microprocessor, the Secure Enclave, wherein microprocessor identity information
`
`uniquely identifies the microprocessor. The Secure Enclave is a coprocessor and is provisioned
`
`during fabrication with its own unique ID, which is an AES-256 bit key, i.e., an alpha-numeric
`
`value. The Infringing Products also each comprise digital identity data in the form of Touch ID
`
`data that identify the owner of the device, including the name of the owner, which can be the name
`
`of an individual, the name of a company or organization, or other identifying data. The digital
`
`identity data is bound to the Secure Enclave’s unique ID by encrypting the data with a key
`
`entangled with the unique ID. The Secure Enclave reads the digital identity data, which comprises
`
`biometric information, i.e., fingerprint data. The foregoing description is based on publicly
`
`available information and a reasonable investigation of the structure and operation of the Infringing
`
`Products. Plaintiff reserves the right to modify this description, including, for example, on the basis
`
`of information about the Infringing Products that it obtains during discovery.
`
`
`
`13
`
`

`

`Case 1:22-cv-00058-ADA Document 1 Filed 05/03/21 Page 14 of 15
`
`44.
`
`45.
`
`Apple has had knowledge of the ’948 Patent at least as of the date of this Complaint.
`
`Apple’s direct infringement has damaged and continues to damage Plaintiff in an
`
`amount yet to be determined, but at no less than a reasonable royalty.
`
`Jury Demand
`
`46.
`
`Plaintiff demands a jury trial for all issues deemed to be triable by jury.
`
`Prayer for Relief
`
`
`
`Based on the foregoing, Plaintiff respectfully requests that this Court grant the relief set
`
`forth below:
`
`a.
`
`A judgment that Defendant Apple has directly infringed, either literally or under
`
`the doctrine of equivalents, and continues to directly infringe, one or more claims of the ’497
`
`Patent, the ’008 Patent, the ’895 Patent, and the ’948 Patent;
`
`b.
`
`A judgment and order requiring Defendant Apple to pay Plaintiff damages under
`
`35 U.S.C. § 284, and supplemental damages for any continuing post-verdict infringement through
`
`entry of the final judgment with an accounting as needed;
`
`c.
`
`A judgment and order requiring Defendant Apple to pay Plaintiff pre-judgment and
`
`post-judgment interest on the damages awarded;
`
`d.
`
`e.
`
`A judgment and order awarding a compulsory ongoing royalty;
`
`A judgment granting a preliminary and permanent injunction that restrains and
`
`enjoins Defendant Apple, its officers, directors, employees, agents, servants, parents, subsidiaries,
`
`successors, assigns, and all those in privity, concert or participation with them from infringing the
`
`Patents-in-Suit.
`
`f.
`
`Such other and further relief as the Court deems just and equitable.
`
`
`
`
`
`14
`
`

`

`Case 1:22-cv-00058-ADA Document 1 Filed 05/03/21 Page 15 of 15
`
`Dated: May 3, 2021
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Respectfully submitted,
`
`SUSMAN GODFREY LLP
`
`
`
`_____/s/ John P. Lahad ________________
`John P. Lahad
`jlahad@susmangodfrey.com
`Texas Bar No. 24068095
`Brian D. Melton
`bmelton@susmangodfrey.com
`Texas Bar No. 24010620
`Matt Wood
`mwood@susmangodfrey.com
`Texas Bar No. 24110548
`1000 Louisiana Street, Suite 5100
`Houston, Texas 77002
`Tel: (713) 651-9366
`Fax: (713) 654-6666
`
`Attorneys for Plaintiff Identity Security LLC
`
`
`
`15
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket