throbber
Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 1 of 16
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`AUSTIN DIVISION
`
`
`
`IDENTITY SECURITY LLC,
`
`
`Plaintiff,
`
`
`Civil Action No. 1:22:CV-00058-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`
`v.
`
`
`
`
`APPLE INC.,
`
`
`
`
`
`
`Defendant.
`
`
`
`
`
`
`
`
`
`
`
`DEFENDANT APPLE INC.’S OPPOSITION TO PLAINTIFF’S MOTION FOR
`PARTIAL SUMMARY JUDGMENT OF NO INVALIDITY
`
`

`

`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 2 of 16
`
`TABLE OF CONTENT
`
`
`
`Page
`
`INTRODUCTION ...............................................................................................................1
`
`ARGUMENT .......................................................................................................................1
`
`A.
`
`B.
`
`C.
`
`D.
`
`Apple Has Provided A Thorough Analysis Of A Motivation To Combine
`And A Reasonable Expectation Of Success In Combining The Crypto
`iButton With Klein. ..................................................................................................1
`
`Dr. Wicker Explained How Gerard Discloses Or Renders Obvious
`“Encoding” and “Encrypting” “Using The Microprocessor.” .................................4
`
`The Feasibility Of “Dehashing” Is Irrelevant To Any Obviousness Analysis
`Apple Has Provided Regarding Gullman and Padgett. ............................................6
`
`Apple Has Thoroughly Explained How The Lewis Combinations Render
`Claim 4 Of The ’497 Patent And Claim 3 Of The ’008 Patent Obvious. ................8
`
`CONCLUSION ..................................................................................................................10
`
`
`
`I.
`
`II.
`
`III.
`
`
`i
`
`

`

`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 3 of 16
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`
`
`
`Cases
`
`Commonwealth Sci. & Indus. Rsch. Organisation v. Buffalo Tech. (USA), Inc.,
` 542 F.3d 1363 (Fed. Cir. 2008).......................................................................................... 3
`
`Keynetik, Inc. v. Samsung Elecs. Co., Ltd.,
`2023 WL 2003932 (Fed. Cir. 2023).................................................................................... 4
`
`
`
`
`
`
`
`ii
`
`

`

`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 4 of 16
`
`
`
`
`
`TABLE OF EXHIBITS
`
`Exhibit No.
`
`Description
`
`
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`Dallas Semiconductor, Application Note 97, Features, Advantages, and
`Benefits of Button Based Security [APL-IDENTITY_00673467]
`
`Expert Report of Samuel H. Russ,Ph.D., dated November 29, 2023
`(highlighted)
`
`Excerpted Deposition Transcript of Aureliano Tan, Jr., dated August 17,
`2023 (highlighted)
`
`Excerpted Deposition Transcript of Samuel Russ, dated January 24, 2024
`(highlighted)
`
`Automatic Identification Data Book, Dallas Semiconductor, (1995-1996),
`[APL-IDENTITY_01931581]
`
`iii
`
`

`

`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 5 of 16
`
`
`I.
`
`INTRODUCTION
`
`
`
`
`
`Plaintiff’s motions for partial summary judgment should be denied because they
`
`mischaracterize the record and ignore disputed questions of material fact.
`
`II.
`
`ARGUMENT
`
`A.
`
`Apple Has Provided A Thorough Analysis Of A Motivation To Combine And
`A Reasonable Expectation Of Success In Combining The Crypto iButton With
`Klein.
`The Court should reject Plaintiff’s motion because there is a genuine dispute of material
`
`fact as to the motivation to combine the Crypto iButton and Klein. As explained in Apple’s
`
`opposition (“Wicker Daubert Opp.”) (filed concurrently) to Plaintiff’s Daubert motion (D.I. 168),
`
`Dr. Wicker performed a robust analysis of the motivation to combine the Crypto iButton and Klein.
`
`Wicker Daubert Opp. at 7-13. Plaintiff’s motion is predicated primarily on its motion to strike Dr.
`
`Wicker’s opinions under Daubert and should be rejected for the same reasons set forth in Apple’s
`
`Daubert opposition. In particular, Dr. Wicker explains that both the Crypto iButton and Klein are
`
`directed to the same technological field, seek to address the same problems, and employ strikingly
`
`similar technological approaches to solving those problems. Ex. 9 [Wicker Open. Rpt.] ¶¶ 785-
`
`795.
`
`For example, Dr. Wicker explained that both the Crypto iButton and Klein use unique
`
`hardware identifiers in cryptographic operations. Ex. A [APL-IDENTITY_ 00673467] (“Each
`
`Button contains a unique and unalterable 64-bit identification number that is lasered into each
`
`silicon chip contained inside the Button’s tamperproof case. The identification number can be used
`
`for registration, audit and security purposes.”); Ex. 7 [Klein] at 3:38-41 (“In the application of
`
`FIG. 1, this memory location 18 may advantageously store an identification code. The stored
`
`identification code may be used to derive, at least 40 in part, the key 16 which is used in the
`
`encryption process.”). As Dr. Wicker explained, Klein states that its “encryption system [can] be
`
`
`
`1
`
`

`

`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 6 of 16
`
`
`created with relatively minor modifications to currently existing integrated circuits,” and identifies
`
`
`
`integrated circuits from Dallas Semiconductor—the maker of the iButton—based on their unique
`
`identification numbers. Ex. 9 [Wicker Open. Rpt.] ¶ 792 (citing Ex. 7 [Klein] at 6:31-44 (“
`
`individual EPROM, EEPROM and ROM memories which include pre-programmed identification
`
`codes are available commercially from Dallas Semiconductor . . . . These devices include a unique
`
`48 bit serial number in a ROM storage location which may be utilized as the memory location
`
`which stores the hardware identifier 64.”)). Klein further describes that Dallas Semiconductor
`
`chips have “a serial I/O interface for reading the identification code,” and the “encryption logic”
`
`of his invention “may interface over [such] a serial bus to [access] the hardware identifier.” Ex. 7
`
`[Klein] at 6:48-54. As one example, the iButton serial number may be used to “seed an encryption
`
`algorithm.” See Ex. 9 [Wicker Open. Rpt.] ¶ 791 (citing Ex. E [APL-IDENTITY_01931581 at
`
`_01931614]).1 Thus, Klein’s own disclosure establishes a motivation to combine its encryption
`
`system with Dallas Semiconductor’s iButton hardware identifier and is evidence in the record that
`
`creates a genuine dispute of material fact.
`
`Dr. Wicker also describes the advantages a POSITA would look to gain by incorporating
`
`the teachings of Klein into an existing system having the iButton’s hardware number, which
`
`include improving the security of a system by requiring both user input and the hardware identifier
`
`to derive an encryption key. Ex. 9 [Wicker Open. Rpt.] ¶¶ 489-90 (incorporated by reference at ¶
`
`794) (discussing motivation to modify Gerard and Curry with Klein); see also Wicker Daubert
`
`Opp. at 8-9.2 Dr. Wicker explains that Klein’s solution improves security by preventing a
`
`
`1 Apple’s Daubert opposition addresses additional support for Dr. Wicker’s statement that the
`Crypto iButton’s serial number can be used to “seed an encryption algorithm.” Wicker Daubert
`Opp. at 19, n.5.
`2 Dr. Wicker also describes that Curry is a Dallas Semiconductor iButton patent disclosing its
`unique serial number or hardware identifier. Ex. 9 [Wicker Open. Rpt.] ¶¶ 232-233, 266-272.
`
`2
`
`

`

`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 7 of 16
`
`
`malicious actor with physical access to a device—and the hardware identifier alone—from
`
`
`
`decrypting device contents. Id. Rather, determining the encryption key would also require the
`
`user input used to derive the key. Id.
`
`Thus, contrary to Plaintiff’s allegations, Dr. Wicker has reviewed and analyzed substantial
`
`evidence in support of his motivation to combine analysis and obviousness conclusions with
`
`respect to Crypto iButton and Klein. Because Dr. Wicker's opinions are admissible for the reasons
`
`explained in Apple's Wicker Daubert opposition (Opp. at 7-13), that evidence creates a genuine
`
`dispute of material fact, such that summary judgment is inappropriate. Commonwealth Sci. &
`
`Indus. Rsch. Organisation v. Buffalo Tech. (USA), Inc., 542 F.3d 1363, 1376 (Fed. Cir. 2008)
`
`(reversing summary judgment of non-obviousness where there was “a factual issue as to the
`
`motivation to combine prior art references”). Accordingly, because the Court should deny
`
`Plaintiff’s Daubert motion, the Court should also deny this motion.
`
`Furthermore, Dr. Wicker cites disclosures from Klein that establish a reasonable
`
`expectation of success. As Dr. Wicker states Klein “teaches that its encryption system can readily
`
`b[e] combined with a Dallas Semiconductor pre-programmed serial number or hardware
`
`identifier.” Ex. 9 [Wicker Open. Rpt.] ¶ 792. Indeed, Klein specifically notes that an advantage
`
`of its system “is that it may be created with relatively minor modifications to currently existing
`
`integrated circuits.” Ex. 7 [Klein] at 6:31-33. Those “currently existing integrated circuits”
`
`include “individual EPROM, EEPROM and ROM memories which include pre-programmed
`
`identification codes [that] are available commercially from Dallas Semiconductor.” Id. at 6:40-
`
`43. Dr. Wicker explains that Klein’s encryption system could be “readily combined” with Dallas
`
`Semiconductor hardware including a pre-programmed serial number, like the Crypto iButton, and
`
`quotes the specific disclosures from Klein that state such a combination could be created “with
`
`3
`
`

`

`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 8 of 16
`
`
`relatively minor modifications.” Ex. 9 [Wicker Open Rpt.] ¶ 792. That shows that a POSITA
`
`
`
`would reasonably expect to succeed based on Klein’s disclosure. See Keynetik, Inc. v. Samsung
`
`Elecs. Co., Ltd., 2023 WL 2003932, at *2 (Fed. Cir. 2023) (finding expert testimony “detailing the
`
`modified function of the code and that implementing such a modification would be ‘simple’ and
`
`‘straightforward’ was sufficient to establish a reasonable expectation of success.”). As such, Dr.
`
`Wicker set forth sufficient evidence to materially dispute Plaintiff’s allegation that there is no
`
`reasonable expectation of success in combining the Crypto iButton with Klein.
`
`The Court should deny Plaintiff’s motion for partial summary judgment.
`
`B.
`
`Dr. Wicker Explained How Gerard Discloses Or Renders Obvious “Encoding”
`and “Encrypting” “Using The Microprocessor.”
`The Court should deny Plaintiff’s motion for partial summary judgment because Gerard
`
`anticipates the ’008 and ’948 patents, including the limitations directed to “using the
`
`microprocessor.” As Dr. Wicker opines, Gerard discloses “using the microprocessor” to provide a
`
`chip serial number used as the encryption key. Ex. 9 [Wicker Open. Rpt.] ¶¶ 361-366; 397-401.
`
`The ’008 and ’948 patents each include a claim limitation that states “wherein the digital
`
`identity data is bound to the microprocessor identity device by [encoding/encrypting], using the
`
`microprocessor, the digital identity data using an algorithm that uses the microprocessor identity
`
`information.” ’008 patent at claim 1; ’948 patent at claim 1. The Court has construed these terms
`
`to have their plain and ordinary meaning. D.I. 77 at 12. Plaintiff argues that Gerard does not
`
`disclose these limitations because the process of encrypting digital identity data with the
`
`microprocessor identity occurs on a separate computer. Mot. at 5. However, Gerard discloses that
`
`encrypting digital identity data requires the step of using the microprocessor to retrieve and
`
`transmit the chip serial number used as the encryption key. Ex. 11 [Gerard] at 9:36-10:3 (“The
`
`method as claimed in claim 1 or 2, wherein, prior to the identification information being encrypted
`
`4
`
`

`

`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 9 of 16
`
`
`(14), it comprises a step of reading a serial number of the chip stored inalterably by the storage
`
`
`
`means (34) [of electronic chip (30)], this serial number being unique, and using this serial number
`
`as an encryption key.”) (emphasis added); see also id. at 4:7-9 (“transponder chip . . . comprising
`
`computing means such as a microprocessor core”); 9:10-12 (“electronic chip (30), comprising
`
`storage means (34) and contactless transmission and reception means (32) for transmitting the
`
`stored information."); 9:24-27 (“chip (30) comprises computing means which authorize access to
`
`all or some of the storage means (34)”). In short, Gerard discloses that the encryption process
`
`includes using the microprocessor for access to the chip serial number used to generate an
`
`encryption key.
`
`Similarly, in its infringement analysis, Plaintiff asserts that these claim terms are broad
`
`enough to encompass using the accused microprocessor as a precursor to the encryption of digital
`
`identity data. For example, Plaintiff alleges that the Secure Enclave Processor (“SEP”) meets the
`
`claimed “microprocessor.” Ex. B [Russ Open Rpt.] ¶ 411. And Plaintiff asserts that the Accused
`
`Products infringe the asserted patents when the SEP generates encryption keys using the accused
`
`microprocessor identity—apart from any encryption of digital identity data using those keys. See,
`
`e.g., Ex. B [Russ Open. Rpt.] ¶¶ 608 (describing processes outside of the encryption of alleged
`
`digital identity data), 664 (same).
`
`Thus, under Plaintiff’s broad interpretation —where “using the microprocessor” can
`
`include processes involved in generating an encryption key—Gerard discloses the ’008 and ’948
`
`claim limitations by using its microprocessor to provide the serial number to the computer for
`
`generating an encryption key.3 Such analysis of Gerard under Plaintiff’s interpretation is
`
`
`3 For the same reason, Plaintiff’s citation to the Patent Office’s December 22, 2023 Notice of Intent
`to Issue Reexamination Certificate—which came out after Dr. Wicker served his opening report
`
`
`5
`
`

`

`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 10 of 16
`
`
`admissible expert testimony, as discussed in the Wicker Daubert opposition (Opp. at 19-22). As
`
`
`
`such, a genuine dispute of material fact remains as to whether Gerard discloses this limitation.
`
`The Court should deny Plaintiff’s motion for partial summary judgment.
`
`C.
`
`The Feasibility Of “Dehashing” Is Irrelevant To Any Obviousness Analysis
`Apple Has Provided Regarding Gullman and Padgett.
`Dr. Wicker opines that a combination of Gullman, Padgett, and Klein renders each asserted
`
`claim obvious. In his report, Dr. Wicker describes why a POSITA would have been motivated to
`
`combine the references and how they disclose each claim limitation. Whether or not “dehashing”
`
`is possible is entirely irrelevant to Dr. Wicker’s obviousness opinion. Plaintiff’s motion
`
`misinterprets Dr. Wicker’s invalidity opinion with respect to Padgett and should be denied.
`
`Dr. Wicker explains that all Asserted Claims are rendered obvious by Gullman in view of
`
`Padgett and Klein. Gullman describes a method of biometric authentication. Ex. 12 [Gullman] at
`
`Abstract. In Gullman’s system, a user can enroll with a device through a sensor that captures
`
`biometric data, such as a fingerprint, and stores it as a “template.” Id. at 5:57-60; Ex. 9 [Wicker
`
`Open. Rpt.] ¶ 259. When the user would like to authenticate him- or herself, the user can reenter
`
`the biometric data, such as a fingerprint. Ex. 12 [Gullman] at 6:9-13; Ex. 9 [Wicker Open. Rpt.]
`
`¶ 259. The device then compares the entered data to the template to generate a correlation factor
`
`(a number indicating the level of similarity between the entered and previously stored data). Ex.
`
`12 [Gullman] at 6:13-17; Ex. 9 [Wicker Open. Rpt.] ¶ 259. The device then generates a token that
`
`includes the correlation factor, a fixed code, and a timestamp, and encrypts them. Ex. 12
`
`
`on November 29, 2023—is misplaced. The Patent Office noted that while Gerard taught the
`“actual encryption being performed by an external computer,” Gerard also taught that the
`microprocessor “teaches pre-encryption activity by reading out the serial number used for the
`encryption.” Ex. 18 at 6-7. If, as Plaintiff alleges, pre-encryption activity such as using a
`microprocessor identity as a seed for generating an encryption key satisfies the claims for
`infringement, so too does pre-encryption activity such as reading out the serial number used for
`the encryption. In any event, that is a material factual dispute that should go to the jury.
`
`6
`
`

`

`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 11 of 16
`
`
`[Gullman] at 6:30-34; Ex. 9 [Wicker Open. Rpt.] ¶ 259. The user can then input the token into an
`
`
`
`external device, such as an ATM, which can decrypt the token and use the correlation factor and
`
`the fixed code to determine whether to grant the user access. Ex. 12 [Gullman] at 6:35-42; Ex. 9
`
`[Wicker Open. Rpt.] ¶ 259.
`
`Padgett similarly describes a method of authenticating a user based on biometric data. Ex.
`
`13 [Padgett] at Abstract; Ex. 9 [Wicker Open. Rpt.] ¶ 285. In Padgett’s system, a user can enroll
`
`biometric data into a terminal that transmits the data in the form of an encrypted message to a
`
`certificate authority that stores the data. Ex. 13 [Padgett] at 2:52-65; Ex. 9 [Wicker Open. Rpt.] ¶
`
`285. Later, when the user would like to authenticate a transaction, the user can retransmit his or
`
`her biometric data to the certificate authority who compares the newly entered data to the enrolled
`
`data and determines whether there is a match. Ex. 13 [Padgett] at 2:65-3:10; Ex. 9 [Wicker Open.
`
`Rpt.] ¶ 285.
`
`Dr. Wicker explained that a POSITA would have been motivated to modify Gullman in
`
`view of Padgett. In particular, Gullman discloses that its security token is computed from—but
`
`does not actually include—the biometric input, like a fingerprint image. Ex. 12 [Gullman] at 6:30-
`
`34. Padgett teaches an encrypted message that in fact includes the biometric input. Ex. 13
`
`[Padgett] at 2:52-65. Thus, Dr. Wicker opined that a POSITA would have been motivated to
`
`modify Gullman such that Gullman’s security token would include the biometric input itself (rather
`
`than only a value derived from the biometric input), just like Padgett’s encrypted message. Ex. 9
`
`[Wicker Open Rpt.] ¶ 1389 (“A POSITA would have been motivated to modify the security
`
`apparatus of Gullman with the teachings of Padgett to include the biometric input in its security
`
`token to allow the recipient of the security token to verify the accuracy of the authentication
`
`process.”).
`
`7
`
`

`

`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 12 of 16
`
`
`
`
`
`Plaintiff’s discussion of dehashing is irrelevant to whether there is a genuine dispute of
`
`material fact regarding obviousness over Gullman in view of Padgett and Klein. The proposed
`
`combination does not rely on any dehashing. Dr. Wicker explained that for this combination two
`
`modifications to Gullman would need to be made. “First, the encrypted security token” disclosed
`
`in Gullman “would include the owner’s biometric input,” like the encrypted message in Padgett.
`
`Id. ¶ 1390. “Second, the security apparatus would transfer the owner’s biometric template for use
`
`in the comparison/authentication operation.” Id. ¶ 1390. Nothing in this process relies on any
`
`dehashing or depends on the feasibility of dehashing. Even if one were to credit Plaintiff’s
`
`argument that Padgett describes a dehashing process that is not technically feasible, that bears no
`
`relation to Dr. Wicker’s obviousness analysis because Dr. Wicker does not propose using the
`
`dehashing process in the combination with Gullman. Dr. Wicker has provided a thorough analysis
`
`of a system combining Gullman with certain techniques in Padgett (i.e., including the biometric
`
`data itself in the data that is to be encrypted and transmitted) and explains why a POSITA would
`
`have been motivated to combine the two. His proposed combination discloses each limitation of
`
`the Asserted Patents. Thus, there remains a genuine dispute of material fact as to the validity of
`
`the Asserted Patents.
`
`The Court should deny Plaintiff’s motion for partial summary judgment.
`
`D.
`
`Apple Has Thoroughly Explained How The Lewis Combinations Render
`Claim 4 Of The ’497 Patent And Claim 3 Of The ’008 Patent Obvious.
`Plaintiff ignores the substance of Dr. Wicker’s invalidity analysis to make its argument that
`
`Apple has not provided evidence that the Lewis Combinations4 render claim 4 of the ’497 patent
`
`and claim 3 of the ’008 patent obvious. Plaintiff argues that Dr. Wicker fails to explain how the
`
`
`4 The “Lewis Combinations” refer to two grounds of invalidity analyzed by Dr. Wicker: Gerard in
`view of Lewis, and Gerard in view of Curry, Klein, and Lewis. Ex. 9 [Wicker Open. Rpt.] at
`Sections VI.B.2, VI.B.5.
`
`8
`
`

`

`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 13 of 16
`
`
`“hardware of Lewis” satisfies the various claim limitations. As set forth in the Wicker Daubert
`
`
`
`opposition (Opp. at 1-4), Dr. Wicker provided detailed analysis of the Lewis Combinations satisfy
`
`each claim limitation, including how Lewis itself satisfies the “input/output port” limitation.
`
`Dependent claim 4 of the ’497 patent and claim 3 of the ’008 patent each recite “an
`
`input/output port.” ’497 patent claim 4 depends on claims 1 and 3 of the ’497 patent, and ’008
`
`patent claim 3 depends on claims 1 and 2 of the ’008 patent.
`
`Dr. Wicker outlined a complete theory of invalidity of claim 4 of the ’497 patent and claim
`
`3 of the ’008 patent. First, Dr. Wicker opined that both Gerard and Gerard in view of Curry and
`
`Klein rendered claims 1 and 3 of the ’497 patent and claims 1 and 2 of the ’008 patent obvious.
`
`Ex. 9 [Wicker Open. Rpt.] at Section VI.B.4. Dr. Wicker provided a detailed analysis explaining
`
`how each limitation of those claims were disclosed by the references and explained why a POSITA
`
`would have been motivated to combine Gerard, Curry, and Klein. Id. To address the input/output
`
`port limitation, Dr. Wicker further opined that it would have been obvious to combine Gerard and
`
`Lewis as well as Gerard, Curry, Klein, and Lewis and that these combinations render claim 4 of
`
`the ’497 patent and claim 3 of the ’008 patent obvious. Id. at Section VI.B.5. Dr. Wicker then
`
`explained how Lewis discloses the use of an input/output port. Id. ¶¶ 690-700. This testimony
`
`from Dr. Wicker creates a genuine dispute of material fact.
`
`Plaintiff’s fixation on the “hardware of Lewis” is misplaced. The only “hardware of
`
`Lewis” relevant to and addressed by Dr. Wicker’s analysis is the input/output port. Dr. Wicker
`
`explained that the devices described by Gerard, Curry, and Klein could have been modified to use
`
`input/output ports—a component both Mr. Tan and Dr. Russ admitted were conventional at the
`
`time of the alleged invention. Ex. C [Tan Tr.] at 142:21-23 (“Q. You didn’t invent the idea of an
`
`input/output port? A. Agree.”); Ex. D [Russ Tr.] at 279:10-15 (“Q. Mr. Tan didn't invent the idea
`
`9
`
`

`

`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 14 of 16
`
`
`of an input/output port, correct? A. He did not invent an input/output port. Q. Input/output ports
`
`
`
`were known before the alleged invention, correct? A. Input/output ports were known.”). In
`
`particular, Dr. Wicker explained that “implementing Lewis’s input/output port retains the security
`
`benefits of Gerard while expanding the possible applications.” Ex. 9 [Wicker Open. Rpt.] ¶¶ 418,
`
`685. He explained that “[a] POSITA would have further found it obvious to combine the method
`
`encryption of Gerard with Lewis’s hardware to include input/output ports because it combines
`
`known elements,” and that it would have been “a simple substitution” to swap Gerard’s “antenna”
`
`with Lewis’s “input/output port” as a way to interface with external devices. Ex. 9 [Wicker Open.
`
`Rpt.] ¶¶ 420, 688. Thus, Dr. Wicker provided the rationale for modifying Gerard or the
`
`Gerard/Curry/Klein combination to use an input/output port (like in Lewis) for communicating
`
`with external devices rather than Gerard’s antenna. This is routine obviousness analysis. That Dr.
`
`Wicker did not copy-paste his analysis of the independent claim limitation under the Lewis
`
`subheading does not mean that he did not conduct that analysis.
`
`The Court should deny Plaintiff’s motion for partial summary judgment.
`
`III. CONCLUSION
`
`For the foregoing reasons, Apple respectfully requests that this Court deny Plaintiff’s
`
`motions for summary judgment of no invalidity.
`
`
`
`10
`
`

`

`
`
`
`
`
`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 15 of 16
`
`Dated: March 8, 2024
`
`By:
`
`
`
`
`
`/s/ Regan J. Rundio
`Brian C. Nash (TX Bar No. 24051103)
`Regan J. Rundio (TX Bar No. 24122087)
`300 Colorado Street, Suite 1800
`Austin, TX 78701
`Telephone: 512.617.0650
`BNash@mofo.com
`RRundio@mofo.com
`
`John M. Desmarais (pro hac vice)
`Cosmin Maier (pro hac vice)
`Leslie M. Spencer (pro hac vice)
`Michael Wueste (pro hac vice)
`Joze Welsh (pro hac vice)
`Eli Balsam (pro hac vice)
`Amy Wann (pro hac vice)
`Asim Zaidi (pro hac vice)
`
`Desmarais LLP
`230 Park Avenue
`New York, NY 10169
`Tel: 212-351-3400
`Fax: 212-351-3401
`jdesmarais@desmaraisllp.com
`cmaier@desmaraisllp.com
`lspencer@desmaraisllp.com
`mwueste@desmaraisllp.com
`jwelsh@desmaraisllp.com
`ebalsam@desmaraisllp.com
`awann@desmaraisllp.com
`azaidi@desmaraisllp.com
`
`Jeffrey T. Quilici
`TX State Bar No. 24083696
`ORRICK, HERRINGTON &
`SUTCLIFFE LLP
`300 W. 6th Street, Suite 1850
`Austin, TX 78701
`Tel: (512) 582-6950
`Fax: (512) 582-6949
`jquilici@orrick.com
`
`Attorneys for Defendant Apple Inc.
`
`
`
`11
`
`

`

`Case 1:22-cv-00058-ADA Document 200 Filed 03/15/24 Page 16 of 16
`
`
`
`CERTIFICATE OF SERVICE
`
`The undersigned hereby certifies that the foregoing sealed document and all attachments
`
`thereto are being served via email on all counsel of record on this March 8, 2024.
`
`/s/ Regan J. Rundio
`Regan J. Rundio
`
`12
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket