throbber
Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 1 of 35
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`AUSTIN DIVISION
`
`IDENTITY SECURITY LLC,
`
`Plaintiff,
`
`v.
`
`APPLE INC.
`
`Defendant.
`
`Civil Action No. 1:22-CV-00058-ADA
`
`Jury Trial Demanded
`
`DAUBERT/MOTION TO STRIKE CERTAIN OPINIONS AND TESTIMONY OF
`DR. STEPHEN WICKER
`
`PUBLIC VERSION
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 2 of 35
`
`
`
`TABLE OF CONTENTS
`
`Page
`
`I. 
`
`II. 
`
`III. 
`
`IV. 
`
`V. 
`
`VI. 
`
`The Court should strike opinions asserting obviousness against dependent
`claims without assessing whether the asserted combinations read on
`limitations from the underlying independent claims. ..........................................................2 
`
`The Court should strike Dr. Wicker’s conclusory and generic motivations to
`combine, some of which are copy-pasted from generic public sources. .............................5 
`
`The Court should strike Dr. Wicker’s insufficient motivations to combine
`Crypto iButton and Klein. ....................................................................................................8 
`
`The Court should preclude Dr. Wicker from relying on unreliable litigation
`calculations that Apple withheld until the final hours of discovery. .................................14 
`
`The Court should prohibit Dr. Wicker from relying on analysis Apple failed to
`disclose during a 30(b)(6) deposition. ...............................................................................16 
`
`The Court should prohibit misleading testimony portraying statements about
`other Dallas Semiconductor products not asserted as prior art as statements
`describing features of the Crypto iButton prior art system. ...............................................19 
`
`VII.  The Court should prohibit Dr. Wicker from basing invalidity analysis on
`characterizations of Identity Security’s infringement positions. .......................................21 
`
`VIII.  The Court should prohibit Dr. Wicker from relying on or parroting
`uncorroborated statements from Mr. Bolan regarding the Crypto iButton. .......................25 
`
`
`
`
`
`
`
`
`
`i
`
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 3 of 35
`
`
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Cases
`
`ActiveVideo Networks, Inc. v. Verizon Commc’ns, Inc.,
`694 F.3d 1312 (Fed. Cir. 2012)........................................................................................ passim
`
`Adasa Inc. v. Avery Dennison Corp.,
`No. 6:17-CV-01685-MK, 2023 WL 3775332 (D. Or. June 2, 2023) ........................................8
`
`Asia Vital Components Co. v. Asetek Danmark A/S,
`377 F. Supp. 3d 990 (N.D. Cal. 2019) .....................................................................................14
`
`Brazos River Auth. v. GE Ionics, Inc.,
`469 F.3d 416 (5th Cir. 2006) ...................................................................................................18
`
`Core Wireless Licensing S.A.R.L. v. LG Elecs., Inc.,
`No. 2:14-CV-911-JRG-RSP, 2016 WL 4718963 (E.D. Tex. July 12, 2016) ..........................22
`
`Daubert v. Merrell Dow Pharm., Inc.,
`509 U.S. 579 (1993) ...................................................................................................................2
`
`Deering v. Winona Harvester Works,
`155 U.S. 286 (1894) .................................................................................................................26
`
`Dow Chem. Co. v. Mee Indus., Inc.,
`341 F.3d 1370 ..........................................................................................................................26
`
`Entropic Commc’ns LLC v. Charter Commc’ns Inc.,
`2023 WL 8535212 (E.D. Tex. Dec. 1, 2023), report and recommendation
`adopted 2023 WL 8534481 ...................................................................................10, 12, 13, 22
`
`Function Media, L.L.C. v. Google, Inc.,
`No. 2:07-CV-279-CE, 2010 WL 276093 (E.D. Tex. Jan. 15, 2010) .......................................18
`
`Genband U.S. LLC v. Metaswitch Networks Corp.,
`2015 WL 12911530 (E.D. Tex. Sept. 30, 2015) ................................................................21, 22
`
`Grain Processing Corp. v. Am. Maize-Prod. Co.,
`840 F.2d 902 (Fed. Cir. 1988)..................................................................................................12
`
`Ierardi v. Lorillard, Inc.,
`1991 WL 158911 (E.D. Pa. Aug. 13, 1991) ............................................................................19
`
`In re Kahn,
`441 F.3d 977 (Fed. Cir. 2006)................................................................................................3, 8
`
`ii
`
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 4 of 35
`
`
`
`InTouch Techs., Inc. v. VGO Commc’ns. Inc.,
`751 F.3d 1327 (Fed. Cir. 2014)..........................................................................................12, 13
`
`Kinetic Concepts, Inc. v. Smith & Nephew, Inc.,
`688 F.3d 1342 (Fed. Cir. 2012)..........................................................................................10, 11
`
`KSR Int’l Co. v. Teleflex Inc.,
`550 U.S. 398 (2007) ......................................................................................................... passim
`
`Lacks Indus., Inc. v. McKechnie Vehicle Components USA, Inc.,
`322 F.3d 1335 (Fed. Cir. 2003)................................................................................................29
`
`Metalcraft of Mayville, Inc. v. The Toro Co.,
`848 F.3d 1358 (Fed. Cir. 2017)......................................................................................9, 13, 14
`
`Microsoft Corp. v. Enfish, LLC,
`662 Fed. App'x. 981 (Fed. Cir. 2016) ......................................................................................11
`
`Moore v. Ashland Chem. Inc.,
`151 F.3d 269 (5th Cir. 1998) .....................................................................................................1
`
`Papst Licensing GmbH & Co., KG v. Samsung Elecs. Co., Ltd,
`403 F. Supp. 3d 571 (E.D. Tex. 2019) .....................................................................................12
`
`Parthenon Unified Memory Architecture LLC v. Apple Inc.,
`No. 2:15-CV-621-JRG-RSP, 2016 WL 7743510 (E.D. Tex. Sept. 21, 2016) .........................22
`
`Procter & Gamble Co. v. Teva Pharm. USA, Inc.,
`566 F.3d 989 (Fed. Cir. 2009)....................................................................................................9
`
`Securus Techs., Inc. v. Glob. Tel*Link Corp.,
`701 F. App'x 971 (Fed. Cir. 2017) ...........................................................................................11
`
`Sims v. Kia Motors of Am., Inc.,
`839 F.3d 393 (5th Cir. 2016) .....................................................................................................1
`
`Super Future Equities, Inc. v. Wells Fargo Bank Minn., N.A.,
`2007 WL 4410370 (N.D. Tex. Dec. 14, 2007) ........................................................................19
`
`TiVo, Inc. v. Echostar Commc’ns Corp.,
`516 F.3d 1290 (Fed. Cir. 2008)..........................................................................................22, 23
`
`Woodland Trust v. Flowertree Nursery, Inc.,
`148 F.3d 1368 (Fed. Cir. 1998)....................................................................................26, 27, 29
`
`iii
`
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 5 of 35
`
`
`
`Rules
`
`Fed. R. Civ. P. 26 ...........................................................................................................................14
`
`Fed. R. Civ. P. 30(b)(6)............................................................................................................18, 19
`
`Fed. R. Evid. 702 .................................................................................................................1, 21, 22
`
`
`
`
`
`iv
`
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 6 of 35
`
`
`
`Plaintiff Identity Security LLC (“Identity Security”) hereby moves the Court to exclude
`
`certain opinions and related testimony of Dr. Stephen Wicker, who submitted two reports on behalf
`
`of Apple addressing inter alia the validity and infringement of the asserted claims of U.S. Patent
`
`Nos. 7,493,497 (the “’497 Patent”), 8,020,008 (the “’008 Patent”), 8,489,895 (the “’895 Patent”),
`
`and 9,507,948 (the “’948 Patent” and collectively, the “Asserted Patents”). See Exhibit A (“Wicker
`
`Opening Report”); Exhibit B (“Wicker Rebuttal Report”).
`
`Dr. Wicker addresses an enormous range of topics and issues in his reports, which
`
`collectively span about 1,500 pages. Identity Security does not generally contest Dr. Wicker’s
`
`credentials. Nor does Identity Security seek to strike the vast majority of the opinions that he has
`
`offered in this matter—or even all those opinions that fall short of relevant thresholds for expert
`
`testimony. However, several of Dr. Wicker’s specific opinions in his reports are material and fall
`
`well below established thresholds of expert testimony—for example those that assert obviousness
`
`while failing to address multiple claim limitations, copy-paste generic motivations to combine
`
`from public reference materials, or rely on new evidence undisclosed during discovery.
`
`Accordingly, Identity Security therefore files this targeted motion seeking to strike specific
`
`opinions that are unfit for the jury.
`
`As the Court knows, the proponent of expert testimony bears the burden of establishing
`
`that (1) the expert is qualified; (2) the evidence is relevant; and (3) the evidence is reliable. Sims
`
`v. Kia Motors of Am., Inc., 839 F.3d 393, 400 (5th Cir. 2016); see also Moore v. Ashland Chem.
`
`Inc., 151 F.3d 269, 276 (5th Cir. 1998). Expert testimony is admissible only if it “is based on
`
`sufficient facts or data,” “is the product of reliable principles and methods,” and “the expert’s
`
`opinion reflects a reliable application of the principles and methods to the facts of the case.” Fed.
`
`1
`
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 7 of 35
`
`
`
`R. Evid. 702; see also Daubert v. Merrell Dow Pharm., Inc., 509 U.S. 579, 597 (1993). Relevant
`
`factual and legal background is provided in line below.
`
`I.
`
`The Court should strike opinions asserting obviousness against dependent claims
`without assessing whether the asserted combinations read on limitations from the
`underlying independent claims.
`
`Dr. Wicker opines that U.S. Patent No. 6,213,391 (“Lewis,” Ex. F) in combination with
`
`French Publication No. 2,776,153 (“Gerard,” Ex. G) or in combination with Gerard, U.S. Patent
`
`No. 5,940,510 (“Curry,” Ex. H), and U.S. Patent No. 7,096,370 (“Klein,” Ex. I, and collectively,
`
`the “Lewis Combinations”) renders obvious Claim 4 of the ’497 Patent and Claim 3 of the ’008
`
`Patent, which are dependent claims generally adding an “input/output port” limitation to Claim 1
`
`of the respective patents. See Wicker Opening Report (Ex. A) ¶¶ 414–29; 666–700. While
`
`Dr. Wicker asserts that Lewis discloses an input/output port, he never asserts or opines that the
`
`Lewis Combinations disclose any of the independent claim limitations from which the pertinent
`
`claims rely. In other words, Dr. Wicker failed to assess almost all of the pertinent claim limitations
`
`necessary to support his opinion that the Lewis Combinations render obvious the relevant claims.
`
`The Court should prohibit Dr. Wicker from offering these unsupported invalidity opinions to the
`
`jury.
`
`Dr. Wicker’s opinions regarding the Lewis Combinations fall short of established standards
`
`for expert testimony. Experts offering an obviousness opinion must “explain how specific
`
`references could be combined, which combination(s) of elements in specific references would
`
`yield a predictable result, [and] how any specific combination would operate or read on the asserted
`
`claims.” ActiveVideo Networks, Inc. v. Verizon Commc’ns, Inc., 694 F.3d 1312, 1327 (Fed. Cir.
`
`2012) (affirming grant of JMOL on obviousness based on the failure to testify to these factors).
`
`When it comes to obviousness, the “analysis should be made explicit,” as “obviousness grounds
`
`cannot be sustained by mere conclusory statements; instead, there must be some articulated
`2
`
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 8 of 35
`
`
`
`reasoning with some rational underpinning to support the legal conclusion of obviousness.” KSR
`
`Int’l Co. v. Teleflex Inc., 550 U.S. 398, 418 (2007) (second quote quoting In re Kahn, 441 F.3d
`
`977, 988 (Fed. Cir. 2006)). Here, Dr. Wicker fails to explain “how [the Lewis Combinations]
`
`would … read on the asserted claims” by declining to even mention or discuss all the claim
`
`limitations coming from the relevant independent claims. Dr. Wicker cannot short-circuit the
`
`analysis when he and Apple bear the burden. This failure renders his opinions conclusory,
`
`unsupported, and unreliable.
`
`To be sure, Dr. Wicker opines elsewhere in his report that other asserted references
`
`excluding Lewis render obvious the pertinent independent claims. (E.g., he opines that Gerard
`
`anticipates or Gerard, Curry, and Klein render obvious independent Claim 1 of the ’497 Patent and
`
`subsequently that Gerard plus Lewis or plus Lewis, Curry, and Klein renders obvious dependent
`
`Claim 4 of that patent.) But Dr. Wicker does not incorporate those opinions as part of his analysis
`
`of the separate Lewis Combinations. Nor could he. Dr. Wicker was required to “explain how
`
`specific references could be combined.” ActiveVideo, 694 F.3d at 1327. Dr. Wicker is clear in his
`
`report that the Lewis Combinations would utilize the hardware of Lewis. As for Lewis and Gerard,
`
`he says: “It would have been obvious to a POSITA to implement the encryption method of Gerard
`
`onto the hardware of Lewis.” ¶ 418; see also ¶ 421 (“A POSITA would have expected success in
`
`implementing Gerard’s functionality using Lewis’s hardware due to the similarity between the
`
`references. Because Lewis already teaches functionality of receiving and encrypting biometric data
`
`and for communicating with external devices, no significant hardware modifications would have
`
`been required to support Gerard’s method of encrypting a single owner’s biometric data a [sic]
`
`processor’s serial number as the encryption key.”). Dr. Wicker’s proposed combination of Lewis
`
`with Gerard, Curry, and Klein similarly applies the encryption of those references to Lewis’s
`
`3
`
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 9 of 35
`
`
`
`hardware. E.g., Wicker Opening Report ¶ 685 (“It would have been obvious to a POSITA to
`
`implement the encryption method of Gerard, Curry, and Klein onto the hardware of Lewis.”);
`
`¶ 687 (“It would have been obvious to a POSITA to implement the encryption methods of Gerard,
`
`Curry, and Klein onto Lewis’s hardware regardless of whether the encryption method uses the
`
`serial number as a key or to derive a key. The advantages of Lewis are achieved regardless of what
`
`specific encryption key is used as all methods of encryption applied to Lewis’s hardware would
`
`receive the benefits of being applied in more scenarios.”). In other words, Dr. Wicker’s analysis
`
`of the Lewis Combinations relies on the encryption methods of Gerard (or Gerard, Curry, and
`
`Klein) and the hardware of Lewis.
`
`Despite advancing combinations based on the hardware of Lewis, Dr. Wicker never once
`
`attempts to show how the hardware of Lewis reads on the various hardware limitations (or any
`
`other) described in independent Claims 1 of the ’497 and ’008 Patents—e.g., “memory” in both
`
`patents, a “microprocessor” with a “microprocessor identity” or “microprocessor identity
`
`information” in both patents, a “PROM” in Claim 1 of the ’497 Patent, or “encoding, using the
`
`microprocessor” in Claim 1 of the ’008 Patent. Dr. Wicker cannot opine that a combination
`
`utilizing the hardware of Lewis renders obvious these dependent claims without ever assessing
`
`how the hardware of Lewis reads on most of the pertinent limitations from the independent claims.
`
`Because Dr. Wicker fails to assess whether the Lewis Combinations read on claim
`
`limitations that are part of Claim 4 of the ’497 Patent and Claim 3 of the ’008 Patent, his opinions
`
`that the Lewis Combinations render those claims obvious (¶¶ 414–429, 666–700) should be
`
`stricken from his report and Dr. Wicker should be prohibited from testifying that the Lewis
`
`Combinations render obvious Claim 4 of the ’497 Patent and Claim 3 of the ’008 Patent.
`
`4
`
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 10 of 35
`
`
`
`II.
`
`The Court should strike Dr. Wicker’s conclusory and generic motivations to combine,
`some of which are copy-pasted from generic public sources.
`
`Dr. Wicker’s various combination grounds generally offer purported motivations to
`
`combine but then end with a capstone paragraph of conclusory and generic motivations to combine
`
`(as if to preserve arguments). This section seeks to strike these cursory boilerplate paragraphs
`
`purporting to offer additional rationales (but not the actual paragraphs of analysis the precede
`
`them). For instance, Apple asserts the Dallas Semiconductor Cryptographic iButton (“Crypto
`
`iButton”) system as prior art to the patents-in-suit. In particular, Apple and its expert contend that
`
`the Crypto iButton in view of Klein and U.S. Patent No. 5,764,888 (“Bolan,” Ex. J) renders the
`
`asserted claims obvious. After offering several other purported motivations to combine (discussed
`
`below), Dr. Wicker asserts that Crypto iButton and Klein and Crypto iButton and Bolan would be
`
`combined based on paragraphs predominately copy-pasted from the Manual of Patent Examining
`
`Procedures (MPEP)1. In particular, the material highlighted below is copied directly from the
`
`MPEP:
`
`
`
`
`1 Available at https://www.uspto.gov/web/offices/pac/mpep/s2143.html.
`5
`
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 11 of 35
`
`
`
`Wicker Opening Report ¶ 7932; see also ¶ 783 (copying same language). Here is the relevant
`
`language from MPEP § 2143:
`
`
`
`When shown the MPEP language, Dr. Wicker admitted that “(A) through (E) from this document
`
`are quoted verbatim without quotation marks as (A) through (E) in paragraph 793.” Wicker Dep.
`
`Tr. 174:24–175:2; see also id. at 177:1–4 (admitting that paragraph 783 “is just another example
`
`of the same list copy/pasted into the report”). Dr. Wicker then suggested that “[i]t would seem to
`
`me that this was something that counsel drafted.” Id. at 175:16–17. Testimony that is “generic and
`
`bears no relation to any specific combination of prior art elements” has been found to be
`
`“insufficient for a reasonable jury to support a determination of obviousness.” ActiveVideo
`
`Networks, Inc. v. Verizon Communications, Inc., 694 F.3d 1312, 1328 (Fed. Cir. 2012). An expert
`
`plainly cannot rely on verbatim recitations of generic public materials to show obviousness. That
`
`extremely unreliable methodology would not assist the jury in its decision in this case.
`
`
`
`No better, the Wicker report similarly ends every other motivation-to-combine analysis in
`
`the report with the same list copy-pasted in paragraphs 783 and 793 offered as a medley of one-
`
`sentence opinions. See Wicker Report ¶¶ 420, 442, 486, 492, 676, 682, 688, 716, 722, 728, 1391,
`
`
`2 The pertinent section describes purported motivations to combine Crypto iButton and
`Klein. Counsel assumes that, right before the highlights, this paragraph should say “with the
`teaching of Klein” rather than “with the teachings of Bolan.” This typo, likely and ironically caused
`by copy-pasting the nearly identical paragraph 783 discussing Bolan as paragraph 793, only further
`demonstrates the conclusory and generic nature of this opinion.
`6
`
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 12 of 35
`
`
`
`1397. (Indeed, that Dr. Wicker asserts all of the exact same theories in favor of every combination
`
`in his report independently demonstrates that his analysis is conclusory and unsupported.)
`
`Dr. Wicker’s analysis of motivations to combine Gerard, Curry, Klein, and U.S. Patent
`
`No. 6,668,323 (“Challener,” Ex. K) is representative. Paragraphs 707 through 727 offer a variety
`
`of purported motivations to combine these references that are not challenged in this motion. But
`
`then Paragraph 728 (reproduced below) purports to provide “further” grounds of analysis that take
`
`the exact same A–E arguments again literally copy-pasted in paragraphs 783 and 793 and merely
`
`make a couple of minor tweaks for a hitlist of single-sentence opinions:
`
`[A] A POSITA would have been motivated to combine Gerard with Challener to
`use a password encrypted by the serial number to authenticate the owner because it
`combines known prior art elements, encrypting digital identity data with a
`microprocessor identity and authenticating an owner with a password that is
`encrypted. [B] A POSITA would have further been motivated to combine Gerard
`with Challener to use a password encrypted by the serial number to authenticate the
`owner because it is a simple substitution of one known element, authenticating an
`owner based on biometric data such as a photograph or fingerprint, with another,
`authenticating an owner with an encrypted password. [C] A POSITA would have
`further been motivated to combine Gerard with Challener to improve a similar
`device in the same way. [D] A POSITA would have further been motivated to
`combine Gerard with Challener to use a password encrypted by the serial number
`to authenticate the owner because it applies a known technique, authenticating an
`owner with an encrypted password, to a known device, the device of Gerard, ready
`for improvement to yield the predictable result of increasing the security of the
`device. [E] A POSITA would have further been motivated to combine Gerard with
`Challener to use a password encrypted by the serial number to authenticate the
`owner because it would have been obvious to try as there are a finite number of
`identified, predictable solution for methods of authenticating the owner of a device
`with a reasonable expectation of success.
`
`As can be seen by the overlaid A–E lettering, paragraph 728 merely asserts one-sentence
`
`recitations of the MPEP obviousness rationales in the same order as those copy-pasted in
`
`paragraphs 783 and 793. Some of these one-sentence opinions are even incomplete or add only the
`
`reference names to the rote MPEP language. (E.g., “A POSITA would have further been motivated
`
`to combine Gerard with Challener to improve a similar device in the same way.”) All of them are
`
`7
`
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 13 of 35
`
`
`
`cursory and unsupported, lacking any meaningful substantive analysis (or even a second sentence
`
`of support). The same is true of paragraphs throughout the report that apply this exact same one-
`
`sentence medley asserting the same purported rationales in the same order without any meaningful
`
`analysis. See Wicker Report ¶¶ 420, 442, 486, 492, 676, 682, 688, 716, 722, 728, 1391, 1397.
`
`When it comes to obviousness, the “analysis should be made explicit,” as “obviousness
`
`grounds cannot be sustained by mere conclusory statements; instead, there must be some
`
`articulated reasoning with some rational underpinning to support the legal conclusion of
`
`obviousness.” KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 418 (2007) (second quote quoting In
`
`re Kahn, 441 F.3d 977, 988 (Fed. Cir. 2006)); see also Adasa Inc. v. Avery Dennison Corp., No.
`
`6:17-CV-01685-MK, 2023 WL 3775332, at *7 (D. Or. June 2, 2023) (“Mere conclusory
`
`statements are insufficient; there must be some articulated reasoning with some rational
`
`underpinning to support the legal conclusion of obviousness. Such conclusory testimony is
`
`unhelpful to a lay jury in avoiding the pitfalls of hindsight that belie a determination of
`
`obviousness.” (cleaned up)). Dr. Wicker’s one-sentence checklist of additional motivations
`
`asserted for each combination falls far short of that—and any reasonable—standard. Dr. Wicker
`
`should not be permitted to offer these half-baked and cursory opinions to the jury.
`
`For these reasons, the Court should strike paragraphs 420, 442, 486, 492, 676, 682, 688,
`
`716, 722, 728, 783, 793, 1391, and 1397 of Dr. Wicker’s opening report.
`
`III. The Court should strike Dr. Wicker’s insufficient motivations to combine Crypto
`iButton and Klein.
`
`As described above, Dr. Wicker asserts that the Crypto iButton in view of Klein and Bolan
`
`renders the asserted claims obvious. The Court should strike this testimony because Dr. Wicker
`
`8
`
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 14 of 35
`
`
`
`fails to offer any sufficient motivation to combine Crypto iButton and Klein.3
`
`A party seeking to invalidate a patent on the basis of obviousness must show “by clear and
`
`convincing evidence that a skilled artisan would have been motivated to combine the teachings of
`
`the prior art references to achieve the claimed invention, and that the skilled artisan would have
`
`had a reasonable expectation of success in doing so.” Procter & Gamble Co. v. Teva Pharm. USA,
`
`Inc., 566 F.3d 989, 994 (Fed. Cir. 2009). Thus, an obviousness opinion must “explain why a person
`
`of ordinary skill in the art would have combined elements from specific references in the way the
`
`claimed invention does.” ActiveVideo Networks, Inc. v. Verizon Commc’ns, Inc., 694 F.3d 1312,
`
`1328 (Fed. Cir. 2012) (emphasis in original; citing KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398,
`
`418 (2007)). “In determining whether there would have been a motivation to combine prior art
`
`references to arrive at the claimed invention, it is insufficient to simply conclude the combination
`
`would have been obvious without identifying any reason why a person of skill in the art would
`
`have made the combination.” Metalcraft of Mayville, Inc. v. The Toro Co., 848 F.3d 1358, 1366
`
`(Fed. Cir. 2017). Dr. Wicker’s analysis falls short of that bar in assessing motivations to combine
`
`the Crypto iButton (asserted system prior art) and Klein as part of the combination of Crypto
`
`iButton, Klein, and Bolan.
`
`
`3 Apple asserts only one ground based on the Crypto iButton as an alleged prior art system—
`namely, Crypto iButton in combination with both Bolan and Klein. See Exhibit C (Apple
`identifying grounds for trial); Wicker Tr. 172:17–20 (Q: “The only ground including iButton is a
`combination of three items: the cryptographic iButton, Bolan and Klein, Correct?” A: “That is
`correct.”). In his report, Dr. Wicker assesses motivations to combine Crypto iButton with Bolan
`separately from those to combine Crypto iButton with Klein. (He never asserts motivations to
`combine all three references.) Here, Identity Security focuses on the failure to show a motivation
`to combine Crypto iButton with Klein, as this alone renders the asserted three-part combination
`unsupported, although similar deficiencies would apply to the purported motivation to combine
`Crypto iButton with Bolan.
`
`9
`
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 15 of 35
`
`
`
`For the bulk of his analysis, Dr. Wicker merely asserts that “Crypto iButton and Klein
`
`relate to the same subject matter” and offers six purported “example[s]”: that both (1) “relate to a
`
`device that performs cryptographic operations,” ¶ 785, (2) “relate to the use of a microprocessor
`
`identity within the microprocessor device,” ¶ 786, (3) “relate to data that identifies the owner of
`
`the device,” ¶¶ 787–88, (4) “relate to biometric authentication,” ¶ 789, (5) “relate to encryption of
`
`data,” ¶ 790, and (6) “utilized a microprocessor identity in cryptographic operations,” ¶ 791. Even
`
`assuming arguendo that each of these were true, that the Crypto iButton and Klein relate to certain
`
`subject matters does not in any way “explain why a person of ordinary skill in the art would have
`
`combined elements from specific references in the way the claimed invention does.” ActiveVideo,
`
`694 F.3d at 1328. (Indeed, Dr. Wicker entirely fails to explain what elements would be combined
`
`or how they would be combined—his report simply argues that various references independently
`
`disclose any given claim limitation.)
`
`That two references may “relate to the same subject matter” says nothing about whether a
`
`POSITA would have a motivation to combine those references. In the Entopic case, for example,
`
`Magistrate Judge Payne described that “[m]erely stating that references focus on ‘very much the
`
`same problem;’ are ‘both focused on the same signal areas;’ and both ‘focused on the same area
`
`of technology’ … is deficient” because “there is no explanation of how or why a skilled artisan
`
`would combine the references.” Entropic Commc’ns LLC v. Charter Commc’ns Inc., 2023 WL
`
`8535212, at *3 (E.D. Tex. Dec. 1, 2023) (recommending granting summary judgment of no
`
`invalidity based on failure to offer a motivation to combine), report and recommendation adopted
`
`2023 WL 8534481 (Gilstrap, J.); see also Kinetic Concepts, Inc. v. Smith & Nephew, Inc., 688
`
`F.3d 1342, 1369 (Fed. Cir. 2012) (holding that “[t]he record is devoid of any reason someone
`
`would combine these references” despite that “both of these references independently accomplish
`
`10
`
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 16 of 35
`
`
`
`similar functions, namely, draining fluids.”); id. at 1362–1366 (describing that the references all
`
`relate to treating types of wounds); Securus Techs., Inc. v. Glob. Tel*Link Corp., 701 F. App'x
`
`971, 977 (Fed. Cir. 2017) (“We agree with the Board that a broad characterization of Susen and
`
`Gainsboro as both falling within the same alleged field of ‘telecommunications monitoring and
`
`control,’ without more, is not enough for Securus to meet its burden of presenting a sufficient
`
`rationale to support an obviousness conclusion. See, e.g., Microsoft Corp. v. Enfish, LLC, 662 Fed.
`
`App’x. 981, 990 (Fed. Cir. 2016) (“[The] Board correctly concluded that [the petitioner] did not
`
`articulate a sufficient motivation to combine. With respect to [certain challenged claims], [the
`
`petitioner] gave no reason for the motivation of a person of ordinary skill to combine [the two
`
`references] except that the references were directed to the same art or same techniques....”). Such
`
`short-cut logic would lead to the conclusion that any and all combinations of elements known in
`
`this broad field would automatically be obvious, without the need for any further analysis.”).
`
`Even if merely relating to similar “subject matter” were a motivation to combine (it isn’t),
`
`Dr. Wicker’s analysis reeks of impermissible hindsight bias. All six purported similarities
`
`identified by Dr. Wicker track limitations of the Asserted Claims:
`
`Wicker Asserted “Subject Matter”
` “a device
`that performs cryptographic
`operations,” ¶ 785
` “the use of a microprocessor identity within the
`microprocessor device,” ¶ 786
` “encryption of data,” ¶ 790
` “utilize[ing] a microprocessor
`cryptographic operations,” ¶ 791
` “data that identifies the owner of the device,”
`¶¶ 787–88
`
`identity
`
`in
`
` “biometric authentication,” ¶ 789
`
`11
`
`
`Exemplary Claim Limitation
`’497 Patent Claim 1: “wherein the digital
`identity
`data
`is
`bound
`to
`the
`microprocessor identity by encrypting the
`digital identity data using an algorithm that
`uses the microprocessor identity”
`
`’497 Patent Claim 1: “digital identity data,
`wherein the digital identity data identifies
`an owner of the digital identity device”
`’948 Patent Claim 1: “digital identity data
`that identifies an owner of the digital
`identity device”; “wherein
`the digital
`identity data comprises an owner’s
`biometric information”
`
`

`

`Case 1:22-cv-00058-ADA Document 171 Filed 02/23/24 Page 17 of 35
`
`
`
`But a motivation to combine—even if relating to similar subject matters were somehow considered
`
`a motivation—must not be framed “through the elements of the claimed invention.” Papst
`
`Licensing GmbH & Co., KG v. Samsung Elecs. Co., Ltd, 403 F. Supp. 3d 571, 597 (E.D. Tex.
`
`2019). Instead, “[c]are must be taken to avoid hindsight reconstruction by using the patent in suit
`
`as a guide through the maze of prior art references, combining the right references in the right way
`
`so as to achieve the result of the claims in suit.” Grain Processing Corp. v. Am. Maize-Prod. Co.,
`
`840 F.2d 902, 907 (Fed. Cir.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket