`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`AUSTIN DIVISION
`
`IDENTITY SECURITY LLC,
`
`Plaintiff,
`
`v.
`
`APPLE INC.
`
`Defendant.
`
`Civil Action No. 1:22-CV-00058-ADA
`
`Jury Trial Demanded
`
`DAUBERT/MOTION TO STRIKE CERTAIN OPINIONS AND TESTIMONY OF
`DR. STEPHEN WICKER
`
`PUBLIC VERSION
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 2 of 35
`
`
`
`TABLE OF CONTENTS
`
`Page
`
`I.
`
`II.
`
`III.
`
`IV.
`
`V.
`
`VI.
`
`The Court should strike opinions asserting obviousness against dependent
`claims without assessing whether the asserted combinations read on
`limitations from the underlying independent claims. ..........................................................2
`
`The Court should strike Dr. Wicker’s conclusory and generic motivations to
`combine, some of which are copy-pasted from generic public sources. .............................5
`
`The Court should strike Dr. Wicker’s insufficient motivations to combine
`Crypto iButton and Klein. ....................................................................................................8
`
`The Court should preclude Dr. Wicker from relying on unreliable litigation
`calculations that Apple withheld until the final hours of discovery. .................................14
`
`The Court should prohibit Dr. Wicker from relying on analysis Apple failed to
`disclose during a 30(b)(6) deposition. ...............................................................................16
`
`The Court should prohibit misleading testimony portraying statements about
`other Dallas Semiconductor products not asserted as prior art as statements
`describing features of the Crypto iButton prior art system. ...............................................19
`
`VII. The Court should prohibit Dr. Wicker from basing invalidity analysis on
`characterizations of Identity Security’s infringement positions. .......................................21
`
`VIII. The Court should prohibit Dr. Wicker from relying on or parroting
`uncorroborated statements from Mr. Bolan regarding the Crypto iButton. .......................25
`
`
`
`
`
`
`
`
`
`i
`
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 3 of 35
`
`
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Cases
`
`ActiveVideo Networks, Inc. v. Verizon Commc’ns, Inc.,
`694 F.3d 1312 (Fed. Cir. 2012)........................................................................................ passim
`
`Adasa Inc. v. Avery Dennison Corp.,
`No. 6:17-CV-01685-MK, 2023 WL 3775332 (D. Or. June 2, 2023) ........................................8
`
`Asia Vital Components Co. v. Asetek Danmark A/S,
`377 F. Supp. 3d 990 (N.D. Cal. 2019) .....................................................................................14
`
`Brazos River Auth. v. GE Ionics, Inc.,
`469 F.3d 416 (5th Cir. 2006) ...................................................................................................18
`
`Core Wireless Licensing S.A.R.L. v. LG Elecs., Inc.,
`No. 2:14-CV-911-JRG-RSP, 2016 WL 4718963 (E.D. Tex. July 12, 2016) ..........................22
`
`Daubert v. Merrell Dow Pharm., Inc.,
`509 U.S. 579 (1993) ...................................................................................................................2
`
`Deering v. Winona Harvester Works,
`155 U.S. 286 (1894) .................................................................................................................26
`
`Dow Chem. Co. v. Mee Indus., Inc.,
`341 F.3d 1370 ..........................................................................................................................26
`
`Entropic Commc’ns LLC v. Charter Commc’ns Inc.,
`2023 WL 8535212 (E.D. Tex. Dec. 1, 2023), report and recommendation
`adopted 2023 WL 8534481 ...................................................................................10, 12, 13, 22
`
`Function Media, L.L.C. v. Google, Inc.,
`No. 2:07-CV-279-CE, 2010 WL 276093 (E.D. Tex. Jan. 15, 2010) .......................................18
`
`Genband U.S. LLC v. Metaswitch Networks Corp.,
`2015 WL 12911530 (E.D. Tex. Sept. 30, 2015) ................................................................21, 22
`
`Grain Processing Corp. v. Am. Maize-Prod. Co.,
`840 F.2d 902 (Fed. Cir. 1988)..................................................................................................12
`
`Ierardi v. Lorillard, Inc.,
`1991 WL 158911 (E.D. Pa. Aug. 13, 1991) ............................................................................19
`
`In re Kahn,
`441 F.3d 977 (Fed. Cir. 2006)................................................................................................3, 8
`
`ii
`
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 4 of 35
`
`
`
`InTouch Techs., Inc. v. VGO Commc’ns. Inc.,
`751 F.3d 1327 (Fed. Cir. 2014)..........................................................................................12, 13
`
`Kinetic Concepts, Inc. v. Smith & Nephew, Inc.,
`688 F.3d 1342 (Fed. Cir. 2012)..........................................................................................10, 11
`
`KSR Int’l Co. v. Teleflex Inc.,
`550 U.S. 398 (2007) ......................................................................................................... passim
`
`Lacks Indus., Inc. v. McKechnie Vehicle Components USA, Inc.,
`322 F.3d 1335 (Fed. Cir. 2003)................................................................................................29
`
`Metalcraft of Mayville, Inc. v. The Toro Co.,
`848 F.3d 1358 (Fed. Cir. 2017)......................................................................................9, 13, 14
`
`Microsoft Corp. v. Enfish, LLC,
`662 Fed. App'x. 981 (Fed. Cir. 2016) ......................................................................................11
`
`Moore v. Ashland Chem. Inc.,
`151 F.3d 269 (5th Cir. 1998) .....................................................................................................1
`
`Papst Licensing GmbH & Co., KG v. Samsung Elecs. Co., Ltd,
`403 F. Supp. 3d 571 (E.D. Tex. 2019) .....................................................................................12
`
`Parthenon Unified Memory Architecture LLC v. Apple Inc.,
`No. 2:15-CV-621-JRG-RSP, 2016 WL 7743510 (E.D. Tex. Sept. 21, 2016) .........................22
`
`Procter & Gamble Co. v. Teva Pharm. USA, Inc.,
`566 F.3d 989 (Fed. Cir. 2009)....................................................................................................9
`
`Securus Techs., Inc. v. Glob. Tel*Link Corp.,
`701 F. App'x 971 (Fed. Cir. 2017) ...........................................................................................11
`
`Sims v. Kia Motors of Am., Inc.,
`839 F.3d 393 (5th Cir. 2016) .....................................................................................................1
`
`Super Future Equities, Inc. v. Wells Fargo Bank Minn., N.A.,
`2007 WL 4410370 (N.D. Tex. Dec. 14, 2007) ........................................................................19
`
`TiVo, Inc. v. Echostar Commc’ns Corp.,
`516 F.3d 1290 (Fed. Cir. 2008)..........................................................................................22, 23
`
`Woodland Trust v. Flowertree Nursery, Inc.,
`148 F.3d 1368 (Fed. Cir. 1998)....................................................................................26, 27, 29
`
`iii
`
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 5 of 35
`
`
`
`Rules
`
`Fed. R. Civ. P. 26 ...........................................................................................................................14
`
`Fed. R. Civ. P. 30(b)(6)............................................................................................................18, 19
`
`Fed. R. Evid. 702 .................................................................................................................1, 21, 22
`
`
`
`
`
`iv
`
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 6 of 35
`
`
`
`Plaintiff Identity Security LLC (“Identity Security”) hereby moves the Court to exclude
`
`certain opinions and related testimony of Dr. Stephen Wicker, who submitted two reports on behalf
`
`of Apple addressing inter alia the validity and infringement of the asserted claims of U.S. Patent
`
`Nos. 7,493,497 (the “’497 Patent”), 8,020,008 (the “’008 Patent”), 8,489,895 (the “’895 Patent”),
`
`and 9,507,948 (the “’948 Patent” and collectively, the “Asserted Patents”). See Exhibit A (“Wicker
`
`Opening Report”); Exhibit B (“Wicker Rebuttal Report”).
`
`Dr. Wicker addresses an enormous range of topics and issues in his reports, which
`
`collectively span about 1,500 pages. Identity Security does not generally contest Dr. Wicker’s
`
`credentials. Nor does Identity Security seek to strike the vast majority of the opinions that he has
`
`offered in this matter—or even all those opinions that fall short of relevant thresholds for expert
`
`testimony. However, several of Dr. Wicker’s specific opinions in his reports are material and fall
`
`well below established thresholds of expert testimony—for example those that assert obviousness
`
`while failing to address multiple claim limitations, copy-paste generic motivations to combine
`
`from public reference materials, or rely on new evidence undisclosed during discovery.
`
`Accordingly, Identity Security therefore files this targeted motion seeking to strike specific
`
`opinions that are unfit for the jury.
`
`As the Court knows, the proponent of expert testimony bears the burden of establishing
`
`that (1) the expert is qualified; (2) the evidence is relevant; and (3) the evidence is reliable. Sims
`
`v. Kia Motors of Am., Inc., 839 F.3d 393, 400 (5th Cir. 2016); see also Moore v. Ashland Chem.
`
`Inc., 151 F.3d 269, 276 (5th Cir. 1998). Expert testimony is admissible only if it “is based on
`
`sufficient facts or data,” “is the product of reliable principles and methods,” and “the expert’s
`
`opinion reflects a reliable application of the principles and methods to the facts of the case.” Fed.
`
`1
`
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 7 of 35
`
`
`
`R. Evid. 702; see also Daubert v. Merrell Dow Pharm., Inc., 509 U.S. 579, 597 (1993). Relevant
`
`factual and legal background is provided in line below.
`
`I.
`
`The Court should strike opinions asserting obviousness against dependent claims
`without assessing whether the asserted combinations read on limitations from the
`underlying independent claims.
`
`Dr. Wicker opines that U.S. Patent No. 6,213,391 (“Lewis,” Ex. F) in combination with
`
`French Publication No. 2,776,153 (“Gerard,” Ex. G) or in combination with Gerard, U.S. Patent
`
`No. 5,940,510 (“Curry,” Ex. H), and U.S. Patent No. 7,096,370 (“Klein,” Ex. I, and collectively,
`
`the “Lewis Combinations”) renders obvious Claim 4 of the ’497 Patent and Claim 3 of the ’008
`
`Patent, which are dependent claims generally adding an “input/output port” limitation to Claim 1
`
`of the respective patents. See Wicker Opening Report (Ex. A) ¶¶ 414–29; 666–700. While
`
`Dr. Wicker asserts that Lewis discloses an input/output port, he never asserts or opines that the
`
`Lewis Combinations disclose any of the independent claim limitations from which the pertinent
`
`claims rely. In other words, Dr. Wicker failed to assess almost all of the pertinent claim limitations
`
`necessary to support his opinion that the Lewis Combinations render obvious the relevant claims.
`
`The Court should prohibit Dr. Wicker from offering these unsupported invalidity opinions to the
`
`jury.
`
`Dr. Wicker’s opinions regarding the Lewis Combinations fall short of established standards
`
`for expert testimony. Experts offering an obviousness opinion must “explain how specific
`
`references could be combined, which combination(s) of elements in specific references would
`
`yield a predictable result, [and] how any specific combination would operate or read on the asserted
`
`claims.” ActiveVideo Networks, Inc. v. Verizon Commc’ns, Inc., 694 F.3d 1312, 1327 (Fed. Cir.
`
`2012) (affirming grant of JMOL on obviousness based on the failure to testify to these factors).
`
`When it comes to obviousness, the “analysis should be made explicit,” as “obviousness grounds
`
`cannot be sustained by mere conclusory statements; instead, there must be some articulated
`2
`
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 8 of 35
`
`
`
`reasoning with some rational underpinning to support the legal conclusion of obviousness.” KSR
`
`Int’l Co. v. Teleflex Inc., 550 U.S. 398, 418 (2007) (second quote quoting In re Kahn, 441 F.3d
`
`977, 988 (Fed. Cir. 2006)). Here, Dr. Wicker fails to explain “how [the Lewis Combinations]
`
`would … read on the asserted claims” by declining to even mention or discuss all the claim
`
`limitations coming from the relevant independent claims. Dr. Wicker cannot short-circuit the
`
`analysis when he and Apple bear the burden. This failure renders his opinions conclusory,
`
`unsupported, and unreliable.
`
`To be sure, Dr. Wicker opines elsewhere in his report that other asserted references
`
`excluding Lewis render obvious the pertinent independent claims. (E.g., he opines that Gerard
`
`anticipates or Gerard, Curry, and Klein render obvious independent Claim 1 of the ’497 Patent and
`
`subsequently that Gerard plus Lewis or plus Lewis, Curry, and Klein renders obvious dependent
`
`Claim 4 of that patent.) But Dr. Wicker does not incorporate those opinions as part of his analysis
`
`of the separate Lewis Combinations. Nor could he. Dr. Wicker was required to “explain how
`
`specific references could be combined.” ActiveVideo, 694 F.3d at 1327. Dr. Wicker is clear in his
`
`report that the Lewis Combinations would utilize the hardware of Lewis. As for Lewis and Gerard,
`
`he says: “It would have been obvious to a POSITA to implement the encryption method of Gerard
`
`onto the hardware of Lewis.” ¶ 418; see also ¶ 421 (“A POSITA would have expected success in
`
`implementing Gerard’s functionality using Lewis’s hardware due to the similarity between the
`
`references. Because Lewis already teaches functionality of receiving and encrypting biometric data
`
`and for communicating with external devices, no significant hardware modifications would have
`
`been required to support Gerard’s method of encrypting a single owner’s biometric data a [sic]
`
`processor’s serial number as the encryption key.”). Dr. Wicker’s proposed combination of Lewis
`
`with Gerard, Curry, and Klein similarly applies the encryption of those references to Lewis’s
`
`3
`
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 9 of 35
`
`
`
`hardware. E.g., Wicker Opening Report ¶ 685 (“It would have been obvious to a POSITA to
`
`implement the encryption method of Gerard, Curry, and Klein onto the hardware of Lewis.”);
`
`¶ 687 (“It would have been obvious to a POSITA to implement the encryption methods of Gerard,
`
`Curry, and Klein onto Lewis’s hardware regardless of whether the encryption method uses the
`
`serial number as a key or to derive a key. The advantages of Lewis are achieved regardless of what
`
`specific encryption key is used as all methods of encryption applied to Lewis’s hardware would
`
`receive the benefits of being applied in more scenarios.”). In other words, Dr. Wicker’s analysis
`
`of the Lewis Combinations relies on the encryption methods of Gerard (or Gerard, Curry, and
`
`Klein) and the hardware of Lewis.
`
`Despite advancing combinations based on the hardware of Lewis, Dr. Wicker never once
`
`attempts to show how the hardware of Lewis reads on the various hardware limitations (or any
`
`other) described in independent Claims 1 of the ’497 and ’008 Patents—e.g., “memory” in both
`
`patents, a “microprocessor” with a “microprocessor identity” or “microprocessor identity
`
`information” in both patents, a “PROM” in Claim 1 of the ’497 Patent, or “encoding, using the
`
`microprocessor” in Claim 1 of the ’008 Patent. Dr. Wicker cannot opine that a combination
`
`utilizing the hardware of Lewis renders obvious these dependent claims without ever assessing
`
`how the hardware of Lewis reads on most of the pertinent limitations from the independent claims.
`
`Because Dr. Wicker fails to assess whether the Lewis Combinations read on claim
`
`limitations that are part of Claim 4 of the ’497 Patent and Claim 3 of the ’008 Patent, his opinions
`
`that the Lewis Combinations render those claims obvious (¶¶ 414–429, 666–700) should be
`
`stricken from his report and Dr. Wicker should be prohibited from testifying that the Lewis
`
`Combinations render obvious Claim 4 of the ’497 Patent and Claim 3 of the ’008 Patent.
`
`4
`
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 10 of 35
`
`
`
`II.
`
`The Court should strike Dr. Wicker’s conclusory and generic motivations to combine,
`some of which are copy-pasted from generic public sources.
`
`Dr. Wicker’s various combination grounds generally offer purported motivations to
`
`combine but then end with a capstone paragraph of conclusory and generic motivations to combine
`
`(as if to preserve arguments). This section seeks to strike these cursory boilerplate paragraphs
`
`purporting to offer additional rationales (but not the actual paragraphs of analysis the precede
`
`them). For instance, Apple asserts the Dallas Semiconductor Cryptographic iButton (“Crypto
`
`iButton”) system as prior art to the patents-in-suit. In particular, Apple and its expert contend that
`
`the Crypto iButton in view of Klein and U.S. Patent No. 5,764,888 (“Bolan,” Ex. J) renders the
`
`asserted claims obvious. After offering several other purported motivations to combine (discussed
`
`below), Dr. Wicker asserts that Crypto iButton and Klein and Crypto iButton and Bolan would be
`
`combined based on paragraphs predominately copy-pasted from the Manual of Patent Examining
`
`Procedures (MPEP)1. In particular, the material highlighted below is copied directly from the
`
`MPEP:
`
`
`
`
`1 Available at https://www.uspto.gov/web/offices/pac/mpep/s2143.html.
`5
`
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 11 of 35
`
`
`
`Wicker Opening Report ¶ 7932; see also ¶ 783 (copying same language). Here is the relevant
`
`language from MPEP § 2143:
`
`
`
`When shown the MPEP language, Dr. Wicker admitted that “(A) through (E) from this document
`
`are quoted verbatim without quotation marks as (A) through (E) in paragraph 793.” Wicker Dep.
`
`Tr. 174:24–175:2; see also id. at 177:1–4 (admitting that paragraph 783 “is just another example
`
`of the same list copy/pasted into the report”). Dr. Wicker then suggested that “[i]t would seem to
`
`me that this was something that counsel drafted.” Id. at 175:16–17. Testimony that is “generic and
`
`bears no relation to any specific combination of prior art elements” has been found to be
`
`“insufficient for a reasonable jury to support a determination of obviousness.” ActiveVideo
`
`Networks, Inc. v. Verizon Communications, Inc., 694 F.3d 1312, 1328 (Fed. Cir. 2012). An expert
`
`plainly cannot rely on verbatim recitations of generic public materials to show obviousness. That
`
`extremely unreliable methodology would not assist the jury in its decision in this case.
`
`
`
`No better, the Wicker report similarly ends every other motivation-to-combine analysis in
`
`the report with the same list copy-pasted in paragraphs 783 and 793 offered as a medley of one-
`
`sentence opinions. See Wicker Report ¶¶ 420, 442, 486, 492, 676, 682, 688, 716, 722, 728, 1391,
`
`
`2 The pertinent section describes purported motivations to combine Crypto iButton and
`Klein. Counsel assumes that, right before the highlights, this paragraph should say “with the
`teaching of Klein” rather than “with the teachings of Bolan.” This typo, likely and ironically caused
`by copy-pasting the nearly identical paragraph 783 discussing Bolan as paragraph 793, only further
`demonstrates the conclusory and generic nature of this opinion.
`6
`
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 12 of 35
`
`
`
`1397. (Indeed, that Dr. Wicker asserts all of the exact same theories in favor of every combination
`
`in his report independently demonstrates that his analysis is conclusory and unsupported.)
`
`Dr. Wicker’s analysis of motivations to combine Gerard, Curry, Klein, and U.S. Patent
`
`No. 6,668,323 (“Challener,” Ex. K) is representative. Paragraphs 707 through 727 offer a variety
`
`of purported motivations to combine these references that are not challenged in this motion. But
`
`then Paragraph 728 (reproduced below) purports to provide “further” grounds of analysis that take
`
`the exact same A–E arguments again literally copy-pasted in paragraphs 783 and 793 and merely
`
`make a couple of minor tweaks for a hitlist of single-sentence opinions:
`
`[A] A POSITA would have been motivated to combine Gerard with Challener to
`use a password encrypted by the serial number to authenticate the owner because it
`combines known prior art elements, encrypting digital identity data with a
`microprocessor identity and authenticating an owner with a password that is
`encrypted. [B] A POSITA would have further been motivated to combine Gerard
`with Challener to use a password encrypted by the serial number to authenticate the
`owner because it is a simple substitution of one known element, authenticating an
`owner based on biometric data such as a photograph or fingerprint, with another,
`authenticating an owner with an encrypted password. [C] A POSITA would have
`further been motivated to combine Gerard with Challener to improve a similar
`device in the same way. [D] A POSITA would have further been motivated to
`combine Gerard with Challener to use a password encrypted by the serial number
`to authenticate the owner because it applies a known technique, authenticating an
`owner with an encrypted password, to a known device, the device of Gerard, ready
`for improvement to yield the predictable result of increasing the security of the
`device. [E] A POSITA would have further been motivated to combine Gerard with
`Challener to use a password encrypted by the serial number to authenticate the
`owner because it would have been obvious to try as there are a finite number of
`identified, predictable solution for methods of authenticating the owner of a device
`with a reasonable expectation of success.
`
`As can be seen by the overlaid A–E lettering, paragraph 728 merely asserts one-sentence
`
`recitations of the MPEP obviousness rationales in the same order as those copy-pasted in
`
`paragraphs 783 and 793. Some of these one-sentence opinions are even incomplete or add only the
`
`reference names to the rote MPEP language. (E.g., “A POSITA would have further been motivated
`
`to combine Gerard with Challener to improve a similar device in the same way.”) All of them are
`
`7
`
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 13 of 35
`
`
`
`cursory and unsupported, lacking any meaningful substantive analysis (or even a second sentence
`
`of support). The same is true of paragraphs throughout the report that apply this exact same one-
`
`sentence medley asserting the same purported rationales in the same order without any meaningful
`
`analysis. See Wicker Report ¶¶ 420, 442, 486, 492, 676, 682, 688, 716, 722, 728, 1391, 1397.
`
`When it comes to obviousness, the “analysis should be made explicit,” as “obviousness
`
`grounds cannot be sustained by mere conclusory statements; instead, there must be some
`
`articulated reasoning with some rational underpinning to support the legal conclusion of
`
`obviousness.” KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 418 (2007) (second quote quoting In
`
`re Kahn, 441 F.3d 977, 988 (Fed. Cir. 2006)); see also Adasa Inc. v. Avery Dennison Corp., No.
`
`6:17-CV-01685-MK, 2023 WL 3775332, at *7 (D. Or. June 2, 2023) (“Mere conclusory
`
`statements are insufficient; there must be some articulated reasoning with some rational
`
`underpinning to support the legal conclusion of obviousness. Such conclusory testimony is
`
`unhelpful to a lay jury in avoiding the pitfalls of hindsight that belie a determination of
`
`obviousness.” (cleaned up)). Dr. Wicker’s one-sentence checklist of additional motivations
`
`asserted for each combination falls far short of that—and any reasonable—standard. Dr. Wicker
`
`should not be permitted to offer these half-baked and cursory opinions to the jury.
`
`For these reasons, the Court should strike paragraphs 420, 442, 486, 492, 676, 682, 688,
`
`716, 722, 728, 783, 793, 1391, and 1397 of Dr. Wicker’s opening report.
`
`III. The Court should strike Dr. Wicker’s insufficient motivations to combine Crypto
`iButton and Klein.
`
`As described above, Dr. Wicker asserts that the Crypto iButton in view of Klein and Bolan
`
`renders the asserted claims obvious. The Court should strike this testimony because Dr. Wicker
`
`8
`
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 14 of 35
`
`
`
`fails to offer any sufficient motivation to combine Crypto iButton and Klein.3
`
`A party seeking to invalidate a patent on the basis of obviousness must show “by clear and
`
`convincing evidence that a skilled artisan would have been motivated to combine the teachings of
`
`the prior art references to achieve the claimed invention, and that the skilled artisan would have
`
`had a reasonable expectation of success in doing so.” Procter & Gamble Co. v. Teva Pharm. USA,
`
`Inc., 566 F.3d 989, 994 (Fed. Cir. 2009). Thus, an obviousness opinion must “explain why a person
`
`of ordinary skill in the art would have combined elements from specific references in the way the
`
`claimed invention does.” ActiveVideo Networks, Inc. v. Verizon Commc’ns, Inc., 694 F.3d 1312,
`
`1328 (Fed. Cir. 2012) (emphasis in original; citing KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398,
`
`418 (2007)). “In determining whether there would have been a motivation to combine prior art
`
`references to arrive at the claimed invention, it is insufficient to simply conclude the combination
`
`would have been obvious without identifying any reason why a person of skill in the art would
`
`have made the combination.” Metalcraft of Mayville, Inc. v. The Toro Co., 848 F.3d 1358, 1366
`
`(Fed. Cir. 2017). Dr. Wicker’s analysis falls short of that bar in assessing motivations to combine
`
`the Crypto iButton (asserted system prior art) and Klein as part of the combination of Crypto
`
`iButton, Klein, and Bolan.
`
`
`3 Apple asserts only one ground based on the Crypto iButton as an alleged prior art system—
`namely, Crypto iButton in combination with both Bolan and Klein. See Exhibit C (Apple
`identifying grounds for trial); Wicker Tr. 172:17–20 (Q: “The only ground including iButton is a
`combination of three items: the cryptographic iButton, Bolan and Klein, Correct?” A: “That is
`correct.”). In his report, Dr. Wicker assesses motivations to combine Crypto iButton with Bolan
`separately from those to combine Crypto iButton with Klein. (He never asserts motivations to
`combine all three references.) Here, Identity Security focuses on the failure to show a motivation
`to combine Crypto iButton with Klein, as this alone renders the asserted three-part combination
`unsupported, although similar deficiencies would apply to the purported motivation to combine
`Crypto iButton with Bolan.
`
`9
`
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 15 of 35
`
`
`
`For the bulk of his analysis, Dr. Wicker merely asserts that “Crypto iButton and Klein
`
`relate to the same subject matter” and offers six purported “example[s]”: that both (1) “relate to a
`
`device that performs cryptographic operations,” ¶ 785, (2) “relate to the use of a microprocessor
`
`identity within the microprocessor device,” ¶ 786, (3) “relate to data that identifies the owner of
`
`the device,” ¶¶ 787–88, (4) “relate to biometric authentication,” ¶ 789, (5) “relate to encryption of
`
`data,” ¶ 790, and (6) “utilized a microprocessor identity in cryptographic operations,” ¶ 791. Even
`
`assuming arguendo that each of these were true, that the Crypto iButton and Klein relate to certain
`
`subject matters does not in any way “explain why a person of ordinary skill in the art would have
`
`combined elements from specific references in the way the claimed invention does.” ActiveVideo,
`
`694 F.3d at 1328. (Indeed, Dr. Wicker entirely fails to explain what elements would be combined
`
`or how they would be combined—his report simply argues that various references independently
`
`disclose any given claim limitation.)
`
`That two references may “relate to the same subject matter” says nothing about whether a
`
`POSITA would have a motivation to combine those references. In the Entopic case, for example,
`
`Magistrate Judge Payne described that “[m]erely stating that references focus on ‘very much the
`
`same problem;’ are ‘both focused on the same signal areas;’ and both ‘focused on the same area
`
`of technology’ … is deficient” because “there is no explanation of how or why a skilled artisan
`
`would combine the references.” Entropic Commc’ns LLC v. Charter Commc’ns Inc., 2023 WL
`
`8535212, at *3 (E.D. Tex. Dec. 1, 2023) (recommending granting summary judgment of no
`
`invalidity based on failure to offer a motivation to combine), report and recommendation adopted
`
`2023 WL 8534481 (Gilstrap, J.); see also Kinetic Concepts, Inc. v. Smith & Nephew, Inc., 688
`
`F.3d 1342, 1369 (Fed. Cir. 2012) (holding that “[t]he record is devoid of any reason someone
`
`would combine these references” despite that “both of these references independently accomplish
`
`10
`
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 16 of 35
`
`
`
`similar functions, namely, draining fluids.”); id. at 1362–1366 (describing that the references all
`
`relate to treating types of wounds); Securus Techs., Inc. v. Glob. Tel*Link Corp., 701 F. App'x
`
`971, 977 (Fed. Cir. 2017) (“We agree with the Board that a broad characterization of Susen and
`
`Gainsboro as both falling within the same alleged field of ‘telecommunications monitoring and
`
`control,’ without more, is not enough for Securus to meet its burden of presenting a sufficient
`
`rationale to support an obviousness conclusion. See, e.g., Microsoft Corp. v. Enfish, LLC, 662 Fed.
`
`App’x. 981, 990 (Fed. Cir. 2016) (“[The] Board correctly concluded that [the petitioner] did not
`
`articulate a sufficient motivation to combine. With respect to [certain challenged claims], [the
`
`petitioner] gave no reason for the motivation of a person of ordinary skill to combine [the two
`
`references] except that the references were directed to the same art or same techniques....”). Such
`
`short-cut logic would lead to the conclusion that any and all combinations of elements known in
`
`this broad field would automatically be obvious, without the need for any further analysis.”).
`
`Even if merely relating to similar “subject matter” were a motivation to combine (it isn’t),
`
`Dr. Wicker’s analysis reeks of impermissible hindsight bias. All six purported similarities
`
`identified by Dr. Wicker track limitations of the Asserted Claims:
`
`Wicker Asserted “Subject Matter”
` “a device
`that performs cryptographic
`operations,” ¶ 785
` “the use of a microprocessor identity within the
`microprocessor device,” ¶ 786
` “encryption of data,” ¶ 790
` “utilize[ing] a microprocessor
`cryptographic operations,” ¶ 791
` “data that identifies the owner of the device,”
`¶¶ 787–88
`
`identity
`
`in
`
` “biometric authentication,” ¶ 789
`
`11
`
`
`Exemplary Claim Limitation
`’497 Patent Claim 1: “wherein the digital
`identity
`data
`is
`bound
`to
`the
`microprocessor identity by encrypting the
`digital identity data using an algorithm that
`uses the microprocessor identity”
`
`’497 Patent Claim 1: “digital identity data,
`wherein the digital identity data identifies
`an owner of the digital identity device”
`’948 Patent Claim 1: “digital identity data
`that identifies an owner of the digital
`identity device”; “wherein
`the digital
`identity data comprises an owner’s
`biometric information”
`
`
`
`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 17 of 35
`
`
`
`But a motivation to combine—even if relating to similar subject matters were somehow considered
`
`a motivation—must not be framed “through the elements of the claimed invention.” Papst
`
`Licensing GmbH & Co., KG v. Samsung Elecs. Co., Ltd, 403 F. Supp. 3d 571, 597 (E.D. Tex.
`
`2019). Instead, “[c]are must be taken to avoid hindsight reconstruction by using the patent in suit
`
`as a guide through the maze of prior art references, combining the right references in the right way
`
`so as to achieve the result of the claims in suit.” Grain Processing Corp. v. Am. Maize-Prod. Co.,
`
`840 F.2d 902, 907 (Fed. Cir.