`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`AUSTIN DIVISION
`
`
`
`IDENTITY SECURITY LLC,
`
`
`Plaintiff,
`
`
`Civil Action No. 1:22:CV-00058-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`
`v.
`
`
`
`
`APPLE INC.,
`
`
`
`
`
`
`Defendant.
`
`
`
`
`
`
`
`
`
`
`
`DEFENDANT APPLE INC.’S OPPOSITION TO PLAINTIFF’S MOTION FOR
`PARTIAL SUMMARY JUDGMENT OF NO INVALIDITY
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 2 of 16
`
`TABLE OF CONTENT
`
`
`
`Page
`
`INTRODUCTION ...............................................................................................................1
`
`ARGUMENT .......................................................................................................................1
`
`A.
`
`B.
`
`C.
`
`D.
`
`Apple Has Provided A Thorough Analysis Of A Motivation To Combine
`And A Reasonable Expectation Of Success In Combining The Crypto
`iButton With Klein. ..................................................................................................1
`
`Dr. Wicker Explained How Gerard Discloses Or Renders Obvious
`“Encoding” and “Encrypting” “Using The Microprocessor.” .................................4
`
`The Feasibility Of “Dehashing” Is Irrelevant To Any Obviousness Analysis
`Apple Has Provided Regarding Gullman and Padgett. ............................................6
`
`Apple Has Thoroughly Explained How The Lewis Combinations Render
`Claim 4 Of The ’497 Patent And Claim 3 Of The ’008 Patent Obvious. ................8
`
`CONCLUSION ..................................................................................................................10
`
`
`
`I.
`
`II.
`
`III.
`
`
`i
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 3 of 16
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`
`
`
`Cases
`
`Commonwealth Sci. & Indus. Rsch. Organisation v. Buffalo Tech. (USA), Inc.,
` 542 F.3d 1363 (Fed. Cir. 2008).......................................................................................... 3
`
`Keynetik, Inc. v. Samsung Elecs. Co., Ltd.,
`2023 WL 2003932 (Fed. Cir. 2023).................................................................................... 4
`
`
`
`
`
`
`
`ii
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 4 of 16
`
`
`
`
`
`TABLE OF EXHIBITS
`
`Exhibit No.
`
`Description
`
`
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`Dallas Semiconductor, Application Note 97, Features, Advantages, and
`Benefits of Button Based Security [APL-IDENTITY_00673467]
`
`Expert Report of Samuel H. Russ,Ph.D., dated November 29, 2023
`(highlighted)
`
`Excerpted Deposition Transcript of Aureliano Tan, Jr., dated August 17,
`2023 (highlighted)
`
`Excerpted Deposition Transcript of Samuel Russ, dated January 24, 2024
`(highlighted)
`
`Automatic Identification Data Book, Dallas Semiconductor, (1995-1996),
`[APL-IDENTITY_01931581]
`
`iii
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 5 of 16
`
`
`I.
`
`INTRODUCTION
`
`
`
`
`
`Plaintiff’s motions for partial summary judgment should be denied because they
`
`mischaracterize the record and ignore disputed questions of material fact.
`
`II.
`
`ARGUMENT
`
`A.
`
`Apple Has Provided A Thorough Analysis Of A Motivation To Combine And
`A Reasonable Expectation Of Success In Combining The Crypto iButton With
`Klein.
`The Court should reject Plaintiff’s motion because there is a genuine dispute of material
`
`fact as to the motivation to combine the Crypto iButton and Klein. As explained in Apple’s
`
`opposition (“Wicker Daubert Opp.”) (filed concurrently) to Plaintiff’s Daubert motion (D.I. 168),
`
`Dr. Wicker performed a robust analysis of the motivation to combine the Crypto iButton and Klein.
`
`Wicker Daubert Opp. at 7-13. Plaintiff’s motion is predicated primarily on its motion to strike Dr.
`
`Wicker’s opinions under Daubert and should be rejected for the same reasons set forth in Apple’s
`
`Daubert opposition. In particular, Dr. Wicker explains that both the Crypto iButton and Klein are
`
`directed to the same technological field, seek to address the same problems, and employ strikingly
`
`similar technological approaches to solving those problems. Ex. 9 [Wicker Open. Rpt.] ¶¶ 785-
`
`795.
`
`For example, Dr. Wicker explained that both the Crypto iButton and Klein use unique
`
`hardware identifiers in cryptographic operations. Ex. A [APL-IDENTITY_ 00673467] (“Each
`
`Button contains a unique and unalterable 64-bit identification number that is lasered into each
`
`silicon chip contained inside the Button’s tamperproof case. The identification number can be used
`
`for registration, audit and security purposes.”); Ex. 7 [Klein] at 3:38-41 (“In the application of
`
`FIG. 1, this memory location 18 may advantageously store an identification code. The stored
`
`identification code may be used to derive, at least 40 in part, the key 16 which is used in the
`
`encryption process.”). As Dr. Wicker explained, Klein states that its “encryption system [can] be
`
`
`
`1
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 6 of 16
`
`
`created with relatively minor modifications to currently existing integrated circuits,” and identifies
`
`
`
`integrated circuits from Dallas Semiconductor—the maker of the iButton—based on their unique
`
`identification numbers. Ex. 9 [Wicker Open. Rpt.] ¶ 792 (citing Ex. 7 [Klein] at 6:31-44 (“
`
`individual EPROM, EEPROM and ROM memories which include pre-programmed identification
`
`codes are available commercially from Dallas Semiconductor . . . . These devices include a unique
`
`48 bit serial number in a ROM storage location which may be utilized as the memory location
`
`which stores the hardware identifier 64.”)). Klein further describes that Dallas Semiconductor
`
`chips have “a serial I/O interface for reading the identification code,” and the “encryption logic”
`
`of his invention “may interface over [such] a serial bus to [access] the hardware identifier.” Ex. 7
`
`[Klein] at 6:48-54. As one example, the iButton serial number may be used to “seed an encryption
`
`algorithm.” See Ex. 9 [Wicker Open. Rpt.] ¶ 791 (citing Ex. E [APL-IDENTITY_01931581 at
`
`_01931614]).1 Thus, Klein’s own disclosure establishes a motivation to combine its encryption
`
`system with Dallas Semiconductor’s iButton hardware identifier and is evidence in the record that
`
`creates a genuine dispute of material fact.
`
`Dr. Wicker also describes the advantages a POSITA would look to gain by incorporating
`
`the teachings of Klein into an existing system having the iButton’s hardware number, which
`
`include improving the security of a system by requiring both user input and the hardware identifier
`
`to derive an encryption key. Ex. 9 [Wicker Open. Rpt.] ¶¶ 489-90 (incorporated by reference at ¶
`
`794) (discussing motivation to modify Gerard and Curry with Klein); see also Wicker Daubert
`
`Opp. at 8-9.2 Dr. Wicker explains that Klein’s solution improves security by preventing a
`
`
`1 Apple’s Daubert opposition addresses additional support for Dr. Wicker’s statement that the
`Crypto iButton’s serial number can be used to “seed an encryption algorithm.” Wicker Daubert
`Opp. at 19, n.5.
`2 Dr. Wicker also describes that Curry is a Dallas Semiconductor iButton patent disclosing its
`unique serial number or hardware identifier. Ex. 9 [Wicker Open. Rpt.] ¶¶ 232-233, 266-272.
`
`2
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 7 of 16
`
`
`malicious actor with physical access to a device—and the hardware identifier alone—from
`
`
`
`decrypting device contents. Id. Rather, determining the encryption key would also require the
`
`user input used to derive the key. Id.
`
`Thus, contrary to Plaintiff’s allegations, Dr. Wicker has reviewed and analyzed substantial
`
`evidence in support of his motivation to combine analysis and obviousness conclusions with
`
`respect to Crypto iButton and Klein. Because Dr. Wicker's opinions are admissible for the reasons
`
`explained in Apple's Wicker Daubert opposition (Opp. at 7-13), that evidence creates a genuine
`
`dispute of material fact, such that summary judgment is inappropriate. Commonwealth Sci. &
`
`Indus. Rsch. Organisation v. Buffalo Tech. (USA), Inc., 542 F.3d 1363, 1376 (Fed. Cir. 2008)
`
`(reversing summary judgment of non-obviousness where there was “a factual issue as to the
`
`motivation to combine prior art references”). Accordingly, because the Court should deny
`
`Plaintiff’s Daubert motion, the Court should also deny this motion.
`
`Furthermore, Dr. Wicker cites disclosures from Klein that establish a reasonable
`
`expectation of success. As Dr. Wicker states Klein “teaches that its encryption system can readily
`
`b[e] combined with a Dallas Semiconductor pre-programmed serial number or hardware
`
`identifier.” Ex. 9 [Wicker Open. Rpt.] ¶ 792. Indeed, Klein specifically notes that an advantage
`
`of its system “is that it may be created with relatively minor modifications to currently existing
`
`integrated circuits.” Ex. 7 [Klein] at 6:31-33. Those “currently existing integrated circuits”
`
`include “individual EPROM, EEPROM and ROM memories which include pre-programmed
`
`identification codes [that] are available commercially from Dallas Semiconductor.” Id. at 6:40-
`
`43. Dr. Wicker explains that Klein’s encryption system could be “readily combined” with Dallas
`
`Semiconductor hardware including a pre-programmed serial number, like the Crypto iButton, and
`
`quotes the specific disclosures from Klein that state such a combination could be created “with
`
`3
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 8 of 16
`
`
`relatively minor modifications.” Ex. 9 [Wicker Open Rpt.] ¶ 792. That shows that a POSITA
`
`
`
`would reasonably expect to succeed based on Klein’s disclosure. See Keynetik, Inc. v. Samsung
`
`Elecs. Co., Ltd., 2023 WL 2003932, at *2 (Fed. Cir. 2023) (finding expert testimony “detailing the
`
`modified function of the code and that implementing such a modification would be ‘simple’ and
`
`‘straightforward’ was sufficient to establish a reasonable expectation of success.”). As such, Dr.
`
`Wicker set forth sufficient evidence to materially dispute Plaintiff’s allegation that there is no
`
`reasonable expectation of success in combining the Crypto iButton with Klein.
`
`The Court should deny Plaintiff’s motion for partial summary judgment.
`
`B.
`
`Dr. Wicker Explained How Gerard Discloses Or Renders Obvious “Encoding”
`and “Encrypting” “Using The Microprocessor.”
`The Court should deny Plaintiff’s motion for partial summary judgment because Gerard
`
`anticipates the ’008 and ’948 patents, including the limitations directed to “using the
`
`microprocessor.” As Dr. Wicker opines, Gerard discloses “using the microprocessor” to provide a
`
`chip serial number used as the encryption key. Ex. 9 [Wicker Open. Rpt.] ¶¶ 361-366; 397-401.
`
`The ’008 and ’948 patents each include a claim limitation that states “wherein the digital
`
`identity data is bound to the microprocessor identity device by [encoding/encrypting], using the
`
`microprocessor, the digital identity data using an algorithm that uses the microprocessor identity
`
`information.” ’008 patent at claim 1; ’948 patent at claim 1. The Court has construed these terms
`
`to have their plain and ordinary meaning. D.I. 77 at 12. Plaintiff argues that Gerard does not
`
`disclose these limitations because the process of encrypting digital identity data with the
`
`microprocessor identity occurs on a separate computer. Mot. at 5. However, Gerard discloses that
`
`encrypting digital identity data requires the step of using the microprocessor to retrieve and
`
`transmit the chip serial number used as the encryption key. Ex. 11 [Gerard] at 9:36-10:3 (“The
`
`method as claimed in claim 1 or 2, wherein, prior to the identification information being encrypted
`
`4
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 9 of 16
`
`
`(14), it comprises a step of reading a serial number of the chip stored inalterably by the storage
`
`
`
`means (34) [of electronic chip (30)], this serial number being unique, and using this serial number
`
`as an encryption key.”) (emphasis added); see also id. at 4:7-9 (“transponder chip . . . comprising
`
`computing means such as a microprocessor core”); 9:10-12 (“electronic chip (30), comprising
`
`storage means (34) and contactless transmission and reception means (32) for transmitting the
`
`stored information."); 9:24-27 (“chip (30) comprises computing means which authorize access to
`
`all or some of the storage means (34)”). In short, Gerard discloses that the encryption process
`
`includes using the microprocessor for access to the chip serial number used to generate an
`
`encryption key.
`
`Similarly, in its infringement analysis, Plaintiff asserts that these claim terms are broad
`
`enough to encompass using the accused microprocessor as a precursor to the encryption of digital
`
`identity data. For example, Plaintiff alleges that the Secure Enclave Processor (“SEP”) meets the
`
`claimed “microprocessor.” Ex. B [Russ Open Rpt.] ¶ 411. And Plaintiff asserts that the Accused
`
`Products infringe the asserted patents when the SEP generates encryption keys using the accused
`
`microprocessor identity—apart from any encryption of digital identity data using those keys. See,
`
`e.g., Ex. B [Russ Open. Rpt.] ¶¶ 608 (describing processes outside of the encryption of alleged
`
`digital identity data), 664 (same).
`
`Thus, under Plaintiff’s broad interpretation —where “using the microprocessor” can
`
`include processes involved in generating an encryption key—Gerard discloses the ’008 and ’948
`
`claim limitations by using its microprocessor to provide the serial number to the computer for
`
`generating an encryption key.3 Such analysis of Gerard under Plaintiff’s interpretation is
`
`
`3 For the same reason, Plaintiff’s citation to the Patent Office’s December 22, 2023 Notice of Intent
`to Issue Reexamination Certificate—which came out after Dr. Wicker served his opening report
`
`
`5
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 10 of 16
`
`
`admissible expert testimony, as discussed in the Wicker Daubert opposition (Opp. at 19-22). As
`
`
`
`such, a genuine dispute of material fact remains as to whether Gerard discloses this limitation.
`
`The Court should deny Plaintiff’s motion for partial summary judgment.
`
`C.
`
`The Feasibility Of “Dehashing” Is Irrelevant To Any Obviousness Analysis
`Apple Has Provided Regarding Gullman and Padgett.
`Dr. Wicker opines that a combination of Gullman, Padgett, and Klein renders each asserted
`
`claim obvious. In his report, Dr. Wicker describes why a POSITA would have been motivated to
`
`combine the references and how they disclose each claim limitation. Whether or not “dehashing”
`
`is possible is entirely irrelevant to Dr. Wicker’s obviousness opinion. Plaintiff’s motion
`
`misinterprets Dr. Wicker’s invalidity opinion with respect to Padgett and should be denied.
`
`Dr. Wicker explains that all Asserted Claims are rendered obvious by Gullman in view of
`
`Padgett and Klein. Gullman describes a method of biometric authentication. Ex. 12 [Gullman] at
`
`Abstract. In Gullman’s system, a user can enroll with a device through a sensor that captures
`
`biometric data, such as a fingerprint, and stores it as a “template.” Id. at 5:57-60; Ex. 9 [Wicker
`
`Open. Rpt.] ¶ 259. When the user would like to authenticate him- or herself, the user can reenter
`
`the biometric data, such as a fingerprint. Ex. 12 [Gullman] at 6:9-13; Ex. 9 [Wicker Open. Rpt.]
`
`¶ 259. The device then compares the entered data to the template to generate a correlation factor
`
`(a number indicating the level of similarity between the entered and previously stored data). Ex.
`
`12 [Gullman] at 6:13-17; Ex. 9 [Wicker Open. Rpt.] ¶ 259. The device then generates a token that
`
`includes the correlation factor, a fixed code, and a timestamp, and encrypts them. Ex. 12
`
`
`on November 29, 2023—is misplaced. The Patent Office noted that while Gerard taught the
`“actual encryption being performed by an external computer,” Gerard also taught that the
`microprocessor “teaches pre-encryption activity by reading out the serial number used for the
`encryption.” Ex. 18 at 6-7. If, as Plaintiff alleges, pre-encryption activity such as using a
`microprocessor identity as a seed for generating an encryption key satisfies the claims for
`infringement, so too does pre-encryption activity such as reading out the serial number used for
`the encryption. In any event, that is a material factual dispute that should go to the jury.
`
`6
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 11 of 16
`
`
`[Gullman] at 6:30-34; Ex. 9 [Wicker Open. Rpt.] ¶ 259. The user can then input the token into an
`
`
`
`external device, such as an ATM, which can decrypt the token and use the correlation factor and
`
`the fixed code to determine whether to grant the user access. Ex. 12 [Gullman] at 6:35-42; Ex. 9
`
`[Wicker Open. Rpt.] ¶ 259.
`
`Padgett similarly describes a method of authenticating a user based on biometric data. Ex.
`
`13 [Padgett] at Abstract; Ex. 9 [Wicker Open. Rpt.] ¶ 285. In Padgett’s system, a user can enroll
`
`biometric data into a terminal that transmits the data in the form of an encrypted message to a
`
`certificate authority that stores the data. Ex. 13 [Padgett] at 2:52-65; Ex. 9 [Wicker Open. Rpt.] ¶
`
`285. Later, when the user would like to authenticate a transaction, the user can retransmit his or
`
`her biometric data to the certificate authority who compares the newly entered data to the enrolled
`
`data and determines whether there is a match. Ex. 13 [Padgett] at 2:65-3:10; Ex. 9 [Wicker Open.
`
`Rpt.] ¶ 285.
`
`Dr. Wicker explained that a POSITA would have been motivated to modify Gullman in
`
`view of Padgett. In particular, Gullman discloses that its security token is computed from—but
`
`does not actually include—the biometric input, like a fingerprint image. Ex. 12 [Gullman] at 6:30-
`
`34. Padgett teaches an encrypted message that in fact includes the biometric input. Ex. 13
`
`[Padgett] at 2:52-65. Thus, Dr. Wicker opined that a POSITA would have been motivated to
`
`modify Gullman such that Gullman’s security token would include the biometric input itself (rather
`
`than only a value derived from the biometric input), just like Padgett’s encrypted message. Ex. 9
`
`[Wicker Open Rpt.] ¶ 1389 (“A POSITA would have been motivated to modify the security
`
`apparatus of Gullman with the teachings of Padgett to include the biometric input in its security
`
`token to allow the recipient of the security token to verify the accuracy of the authentication
`
`process.”).
`
`7
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 12 of 16
`
`
`
`
`
`Plaintiff’s discussion of dehashing is irrelevant to whether there is a genuine dispute of
`
`material fact regarding obviousness over Gullman in view of Padgett and Klein. The proposed
`
`combination does not rely on any dehashing. Dr. Wicker explained that for this combination two
`
`modifications to Gullman would need to be made. “First, the encrypted security token” disclosed
`
`in Gullman “would include the owner’s biometric input,” like the encrypted message in Padgett.
`
`Id. ¶ 1390. “Second, the security apparatus would transfer the owner’s biometric template for use
`
`in the comparison/authentication operation.” Id. ¶ 1390. Nothing in this process relies on any
`
`dehashing or depends on the feasibility of dehashing. Even if one were to credit Plaintiff’s
`
`argument that Padgett describes a dehashing process that is not technically feasible, that bears no
`
`relation to Dr. Wicker’s obviousness analysis because Dr. Wicker does not propose using the
`
`dehashing process in the combination with Gullman. Dr. Wicker has provided a thorough analysis
`
`of a system combining Gullman with certain techniques in Padgett (i.e., including the biometric
`
`data itself in the data that is to be encrypted and transmitted) and explains why a POSITA would
`
`have been motivated to combine the two. His proposed combination discloses each limitation of
`
`the Asserted Patents. Thus, there remains a genuine dispute of material fact as to the validity of
`
`the Asserted Patents.
`
`The Court should deny Plaintiff’s motion for partial summary judgment.
`
`D.
`
`Apple Has Thoroughly Explained How The Lewis Combinations Render
`Claim 4 Of The ’497 Patent And Claim 3 Of The ’008 Patent Obvious.
`Plaintiff ignores the substance of Dr. Wicker’s invalidity analysis to make its argument that
`
`Apple has not provided evidence that the Lewis Combinations4 render claim 4 of the ’497 patent
`
`and claim 3 of the ’008 patent obvious. Plaintiff argues that Dr. Wicker fails to explain how the
`
`
`4 The “Lewis Combinations” refer to two grounds of invalidity analyzed by Dr. Wicker: Gerard in
`view of Lewis, and Gerard in view of Curry, Klein, and Lewis. Ex. 9 [Wicker Open. Rpt.] at
`Sections VI.B.2, VI.B.5.
`
`8
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 13 of 16
`
`
`“hardware of Lewis” satisfies the various claim limitations. As set forth in the Wicker Daubert
`
`
`
`opposition (Opp. at 1-4), Dr. Wicker provided detailed analysis of the Lewis Combinations satisfy
`
`each claim limitation, including how Lewis itself satisfies the “input/output port” limitation.
`
`Dependent claim 4 of the ’497 patent and claim 3 of the ’008 patent each recite “an
`
`input/output port.” ’497 patent claim 4 depends on claims 1 and 3 of the ’497 patent, and ’008
`
`patent claim 3 depends on claims 1 and 2 of the ’008 patent.
`
`Dr. Wicker outlined a complete theory of invalidity of claim 4 of the ’497 patent and claim
`
`3 of the ’008 patent. First, Dr. Wicker opined that both Gerard and Gerard in view of Curry and
`
`Klein rendered claims 1 and 3 of the ’497 patent and claims 1 and 2 of the ’008 patent obvious.
`
`Ex. 9 [Wicker Open. Rpt.] at Section VI.B.4. Dr. Wicker provided a detailed analysis explaining
`
`how each limitation of those claims were disclosed by the references and explained why a POSITA
`
`would have been motivated to combine Gerard, Curry, and Klein. Id. To address the input/output
`
`port limitation, Dr. Wicker further opined that it would have been obvious to combine Gerard and
`
`Lewis as well as Gerard, Curry, Klein, and Lewis and that these combinations render claim 4 of
`
`the ’497 patent and claim 3 of the ’008 patent obvious. Id. at Section VI.B.5. Dr. Wicker then
`
`explained how Lewis discloses the use of an input/output port. Id. ¶¶ 690-700. This testimony
`
`from Dr. Wicker creates a genuine dispute of material fact.
`
`Plaintiff’s fixation on the “hardware of Lewis” is misplaced. The only “hardware of
`
`Lewis” relevant to and addressed by Dr. Wicker’s analysis is the input/output port. Dr. Wicker
`
`explained that the devices described by Gerard, Curry, and Klein could have been modified to use
`
`input/output ports—a component both Mr. Tan and Dr. Russ admitted were conventional at the
`
`time of the alleged invention. Ex. C [Tan Tr.] at 142:21-23 (“Q. You didn’t invent the idea of an
`
`input/output port? A. Agree.”); Ex. D [Russ Tr.] at 279:10-15 (“Q. Mr. Tan didn't invent the idea
`
`9
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 14 of 16
`
`
`of an input/output port, correct? A. He did not invent an input/output port. Q. Input/output ports
`
`
`
`were known before the alleged invention, correct? A. Input/output ports were known.”). In
`
`particular, Dr. Wicker explained that “implementing Lewis’s input/output port retains the security
`
`benefits of Gerard while expanding the possible applications.” Ex. 9 [Wicker Open. Rpt.] ¶¶ 418,
`
`685. He explained that “[a] POSITA would have further found it obvious to combine the method
`
`encryption of Gerard with Lewis’s hardware to include input/output ports because it combines
`
`known elements,” and that it would have been “a simple substitution” to swap Gerard’s “antenna”
`
`with Lewis’s “input/output port” as a way to interface with external devices. Ex. 9 [Wicker Open.
`
`Rpt.] ¶¶ 420, 688. Thus, Dr. Wicker provided the rationale for modifying Gerard or the
`
`Gerard/Curry/Klein combination to use an input/output port (like in Lewis) for communicating
`
`with external devices rather than Gerard’s antenna. This is routine obviousness analysis. That Dr.
`
`Wicker did not copy-paste his analysis of the independent claim limitation under the Lewis
`
`subheading does not mean that he did not conduct that analysis.
`
`The Court should deny Plaintiff’s motion for partial summary judgment.
`
`III. CONCLUSION
`
`For the foregoing reasons, Apple respectfully requests that this Court deny Plaintiff’s
`
`motions for summary judgment of no invalidity.
`
`
`
`10
`
`
`
`
`
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 15 of 16
`
`Dated: March 8, 2024
`
`By:
`
`
`
`
`
`/s/ Regan J. Rundio
`Brian C. Nash (TX Bar No. 24051103)
`Regan J. Rundio (TX Bar No. 24122087)
`300 Colorado Street, Suite 1800
`Austin, TX 78701
`Telephone: 512.617.0650
`BNash@mofo.com
`RRundio@mofo.com
`
`John M. Desmarais (pro hac vice)
`Cosmin Maier (pro hac vice)
`Leslie M. Spencer (pro hac vice)
`Michael Wueste (pro hac vice)
`Joze Welsh (pro hac vice)
`Eli Balsam (pro hac vice)
`Amy Wann (pro hac vice)
`Asim Zaidi (pro hac vice)
`
`Desmarais LLP
`230 Park Avenue
`New York, NY 10169
`Tel: 212-351-3400
`Fax: 212-351-3401
`jdesmarais@desmaraisllp.com
`cmaier@desmaraisllp.com
`lspencer@desmaraisllp.com
`mwueste@desmaraisllp.com
`jwelsh@desmaraisllp.com
`ebalsam@desmaraisllp.com
`awann@desmaraisllp.com
`azaidi@desmaraisllp.com
`
`Jeffrey T. Quilici
`TX State Bar No. 24083696
`ORRICK, HERRINGTON &
`SUTCLIFFE LLP
`300 W. 6th Street, Suite 1850
`Austin, TX 78701
`Tel: (512) 582-6950
`Fax: (512) 582-6949
`jquilici@orrick.com
`
`Attorneys for Defendant Apple Inc.
`
`
`
`11
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 16 of 16
`
`
`
`CERTIFICATE OF SERVICE
`
`The undersigned hereby certifies that the foregoing sealed document and all attachments
`
`thereto are being served via email on all counsel of record on this March 8, 2024.
`
`/s/ Regan J. Rundio
`Regan J. Rundio
`
`12
`
`