throbber
Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 1 of 19
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`AUSTIN DIVISION
`
`IDENITY SECURITY LLC,
`
`Plaintiff,
`v.
`
`APPLE, INC.
`
`
`Defendant.
`
`Civil Action No. 1:22-cv-00058-LY
`
`Jury Trial Demanded
`
`PLAINTIFF’S FIRST AMENDED COMPLAINT FOR
`PATENT INFRINGEMENT AND JURY DEMAND
`
`Plaintiff Identity Security LLC (“Identity Security” or “Plaintiff”) files this First Amended
`
`
`
`
`
`
`
`
`Complaint for Patent Infringement and Jury Demand against Defendant Apple, Inc. (“Apple” or
`
`“Defendant”), alleging as follows:
`
`The Parties
`
`1.
`
`Plaintiff Identity Security LLC is a Texas limited liability company having its
`
`principal place of business at 1310 Welch Street, Unit A, Houston, Texas 77006.
`
`2.
`
`Identity Security is the owner of U.S. Patent No. 7,493,497, U.S. Patent No.
`
`8,020,008, U.S. Patent No. 8,489,895, and U.S. Patent No. 9,507,948 (collectively, the “Patents-
`
`in-Suit”).
`
`3.
`
`Defendant Apple Inc. is a California corporation with a principal place of business
`
`at One Apple Park Way, Cupertino, California 95014. Apple can be served through its registered
`
`agent, CT Corporation System, 818 W. Seventh Street, Suite 930, Los Angeles, California, 90017.
`
`Apple admitted this allegation in its Answer. D.I. 18 at ¶4.
`
`4.
`
`Apple is registered to do business in Texas and has regular and established places
`
`of business in this District, including at 3121 Palm Way, Austin, Texas, 2901 S. Capital of Texas
`
`Hwy., Austin, Texas,12535 Riata Vista Circle, Austin, Texas, and 5501 West Parmer Lane, Austin,
`
`
`
`1
`
`

`

`Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 2 of 19
`
`Texas. Apple employs thousands of people at these locations in Texas. Upon information and
`
`belief, work done at these Apple locations in Texas includes work related to device security and
`
`the Secure Enclave. Apple admitted these allegations in its Answer. D.I. 18 at ¶4.
`
`5.
`
`Apple has placed or contributed to placing infringing products, including iPhones,
`
`iPads, Apple Watches, and MacBook computers, into the stream of commerce via an established
`
`distribution channel knowing or understanding that such products would be sold and used in the
`
`United States, including in the Western District of Texas.
`
`6.
`
`On information and belief, Apple also has derived substantial revenues from
`
`infringing acts in the Western District of Texas, including from the sale and use of infringing
`
`products, including iPhones, iPads, Apple Watches, and MacBook computers.
`
`Jurisdiction and Venue
`
`7.
`
`This is an action for patent infringement arising under the patent laws of the United
`
`States, Title 35 of the United States Code. This Court has subject matter jurisdiction under 28
`
`U.S.C. §§ 1331 and 1338(a). Apple admitted in its Answer that this Court has subject matter
`
`jurisdiction. D.I. 18 at ¶7.
`
`8.
`
`This Court has specific personal jurisdiction over Apple because Apple conducts
`
`business in the State of Texas and in this District. Plaintiff’s causes of action arise from Apple’s
`
`contacts with and activities in the State of Texas and in this District. Upon information and belief,
`
`Apple has committed acts of infringement within the State of Texas and within this District by
`
`directly and/or indirectly using, selling, offering to sell, or importing products that infringe one or
`
`more claims of the Patents-in-Suit. Apple admitted in its Answer that this Court has personal
`
`jurisdiction over Apple for purposes of this action. D.I. 18 at ¶8.
`
`
`
`
`
`2
`
`

`

`Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 3 of 19
`
`9.
`
`Defendant has committed acts within this District giving rise to this action and has
`
`established sufficient minimum contacts with the State of Texas such that the exercise of
`
`jurisdiction would not offend traditional notions of fair play and substantial justice.
`
`10.
`
`Venue is proper in this District under 28 U.S.C. § 1391(b), (c), and 1400(b) because
`
`(1) Defendant has done and continues to do business in this District, (2) Defendant has a regular
`
`and established place of business in this District, and (3) Defendant has committed acts of patent
`
`infringement in this District by using, selling, offering to sell, or importing products that infringe
`
`one or more claims of the Patents-in-Suit. In particular, Apple maintains regular and established
`
`places of business in this District, including, at 3121 Palm Way, Austin, Texas, 2901 S. Capital of
`
`Texas Hwy., Austin, Texas, 12535 Riata Vista Circle, Austin, Texas, and 5501 West Parmer Lane,
`
`Austin, Texas. Apples carries out its business from these physical locations. Apple admitted in its
`
`Answer that it has offices located at 12535 Riata Vista Circle, Austin, Texas and 5501 West Parmer
`
`Lane, Austin, Texas and that it has stores located at 3121 Palm Way, Austin, Texas and 2901 S.
`
`Capital of Texas Hwy, Austin, Texas. D.I. 18 at ¶10.
`
`The Patents-in-Suit
`
`11.
`
`Identity Security is the owner of U.S. Patent No. 7,493,497 (“the ’497 Patent”)
`
`titled “Digital Identity Device,” a true and correct copy of which is attached as Exhibit 1. The U.S.
`
`Patent and Trademark Office duly issued the ’497 Patent on February 17, 2009. The ’497 Patent
`
`is valid and enforceable.
`
`12.
`
`Identity Security is the owner of U.S. Patent No. 8,020,008 (“the ’008 Patent”),
`
`titled “Microprocessor Identity Device,” a true and correct copy of which is attached as Exhibit 2.
`
`The U.S. Patent and Trademark Office duly issued the ’008 Patent on September 13, 2011. The
`
`’008 Patent is valid and enforceable.
`
`
`
`3
`
`

`

`Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 4 of 19
`
`13.
`
`Identity Security is the owner of U.S. Patent No. 8,489,895 (“the ’895 Patent”),
`
`titled “Microprocessor Identity Device,” a true and correct copy of which is attached as Exhibit 3.
`
`The U.S. Patent and Trademark Office duly issued the ’895 Patent on July 16, 2013. The ’895
`
`Patent is valid and enforceable.
`
`14.
`
`Identity Security is the owner of U.S. Patent No. 9,507,948 (“the ’948 Patent”),
`
`titled “Digital Identity Device,” a true and correct copy of which is attached as Exhibit 4. The U.S.
`
`Patent and Trademark Office duly issued the ’948 Patent on November 29, 2016. The ’948 Patent
`
`is valid and enforceable.
`
`Background
`
`15.
`
`The claims of the Patents-in-Suit disclose a novel and unconventional means of
`
`improving the privacy and security of digital information on a digital device using a unique
`
`microprocessor identity device, which will be used to create a unique digital identity for the user.
`
`The combination of the unique microprocessor identity and digital identity for the user can be used
`
`to secure communications between parties and grant various levels of permission, as well as
`
`authenticate identities of the users. See, e.g., Exhibit 1 at 1:13-17.
`
`16.
`
`Claim 1 of the ’497 Patent is representative. Claim 1 states:
`
`1. A digital identity device, comprising:
`
` a
`
` microprocessor comprising a microprocessor identity that uniquely identifies the
`microprocessor, wherein the microprocessor comprises an on-die Programmable Read-
`Only Memory (PROM) and the microprocessor identity is etched into the PROM;
`
`digital identity data, wherein the digital identity data identifies an owner of the digital
`identity device, wherein the digital identity data comprises a name of the owner;
`
` a
`
` memory configured to store at least the digital identity data, wherein the microprocessor
`identity is an alpha-numeric value, and
`
`wherein the digital identity data is bound to the microprocessor identity by encrypting the
`digital identity data using an algorithm that uses the microprocessor identity.
`
`
`
`4
`
`

`

`Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 5 of 19
`
`
`
`Under claim 1 of the ’497 Patent, the microprocessor is uniquely identified using an alpha-
`
`numeric value that is etched, or programmed, into a programmable read-only memory or PROM.
`
`Further, the digital identity data corresponding to the user or owner is encrypted using an algorithm
`
`that uses the unique microprocessor identity. In other words, the unique microprocessor identity
`
`can be used as a cipher to protect the owner’s identity and authenticate the user, thereby permitting
`
`authorized used of the device.
`
`17.
`
`Claim 1 of the ’008 Patent states:
`
`1. A microprocessor identity device, comprising:
`
`
`a microprocessor;
`
`microprocessor identity information that uniquely identifies the microprocessor
`identity device;
`
`digital identity data that identifies an owner of the microprocessor identity device;
`and
`
` a
`
` memory operatively connected to the microprocessor and configured to store the
`digital identity data and the microprocessor identity information,
`
`wherein the digital identity data is bound to the microprocessor identity device by
`encoding, using the microprocessor, the digital identity data using an algorithm that
`uses the microprocessor identity information.
`
`
`Claim 5 of the ’895 Patent states:
`
`5. A microprocessor identity device, comprising:
`
`
`a microprocessor;
`
`microprocessor identity information that uniquely identifies the microprocessor
`identity device;
`
`and digital identity data that identifies an owner of the microprocessor identity
`device, the digital identity data being bound to the microprocessor identity device,
`wherein the digital identity data includes a password provided by the owner, and
`wherein the digital identity data is bound to the microprocessor identity device using
`an encryption algorithm and the microprocessor identity information.
`
`
`
`5
`
`

`

`Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 6 of 19
`
`
`Claim 1 of the ’948 Patent discloses a similar invention tied to biometric information. The claim
`
`states:
`
`1. A digital identity device comprising:
`
` a
`
` microprocessor, wherein microprocessor identity information uniquely identifies the
`microprocessor;
`
`digital identity data that identifies an owner of the digital identity device,
`
`wherein the digital identity data is bound to the microprocessor by encrypting, using
`the microprocessor, the digital identity data using an algorithm that uses the
`microprocessor identity information,
`
`wherein the microprocessor reads the digital identity data,
`
`wherein the digital identity data comprises an owner's biometric information, and
`
`wherein the owner's biometric information comprises a fingerprint.
`
`18.
`
`Unique identification of the microprocessor and then creating a unique digital
`
`identity wherein the digital identity is bound to the microprocessor using encryption, among other
`
`aspects of the invention, provides a novel approach to securing digital transactions. The
`
`microprocessor identity is unique to that device and distinguishes that device from others like it in
`
`the world. See, e.g., Ex. 1 at 3: 63-65.
`
`19.
`
`Apple infringes at least claims 1, 3, 4, and 12 of the ’497 Patent, claims 1, 2, 3, 6,
`
`7, and 9 of the ’008 Patent, claim 5 of the ’895 Patent, and claim 1 of the ’948 Patent by using,
`
`making, selling, offering for sale, and/or importing into the United States products that incorporate
`
`Apple’s Secure Enclave. Attached as Exhibits 5-8 are claim charts showing infringement by
`
`Apple’s Secure Enclave processor of at least one claim from each of the Patents-in-Suit.
`
`20.
`
` “The Secure Enclave is a system on chip (SoC) that is included on all recent iPhone,
`
`iPad, Apple Watch, Apple TV and HomePod devices, and on a Mac with Apple silicon as well as those
`
`
`
`6
`
`

`

`Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 7 of 19
`
`with the Apple T2 Security Chip. … The Secure Enclave also provides the foundation for the secure
`
`generation and storage of the keys necessary for encrypting data at rest, and it protects and evaluates the
`
`biometric data for Touch ID and Face ID.” See https://support.apple.com/guide/security/hardware-
`
`security-overview-secf020d1074/1/web/1. Apple describes the Secure Enclave as “a hardware-based
`
`key manager that’s isolated from the main processor to provide an extra layer of security.” See
`
`https://developer.apple.com/documentation/security/certificate_key_and_trust_services/keys/storing_k
`
`eys_in_the_secure_enclave. Apple described the benefits of using the Secure Enclave to developers:
`
`“When you store a private key in the Secure Enclave, you never actually handle the key, making it
`
`difficult for the key to become compromised. Instead, you instruct the Secure Enclave to create the key,
`
`securely store it, and perform operations with it. You receive only the output of these operations, such as
`
`encrypted data or a cryptographic signature verification outcome.” Id.
`
`21.
`
`The Secure Enclave was introduced as part of the Apple A7 processor in the iPhone 5S
`
`in September 2013. Since then, several Apple Products have used the Secure Enclave, namely:
`
`
`
`
`
`iPhone 5s and later
`
`iPad models with A7 SoC or later
`
` MacBook Pro computers with TouchBar (2016, 2017) that contain the Apple T1 Chip
`
`
`
`Intel-based Mac computers that contain the Apple T2 Security Chip
`
` Mac computers with Apple silicon
`
` Apple TV HD or later
`
` All Apple Watch models
`
` HomePod and HomePod mini
`
` Apple Magic Keyboard with Touch ID
`
` Any other Apple product that uses or relies on the Secure Enclave processor
`
`
`
`7
`
`

`

`Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 8 of 19
`
`https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/web.
`
`(“the
`
`Infringing
`
`Products”). Apple leverages the Secure Enclave in several applications and features. For example,
`
`the Secure Enclave plays a role in managing the authentication process and enabling payment
`
`transaction
`
`to proceed
`
`in Apple Pay. https://support.apple.com/guide/security/apple-pay-
`
`component-security-sec2561eb018/1/web/1. With Apple’s Touch ID security:
`
`When the fingerprint sensor detects the touch of a finger, it triggers the advanced
`imaging array to scan the finger and sends the scan to the Secure Enclave. The
`channel used to secure this connection varies, depending on whether the Touch
`ID sensor is built into the device with the Secure Enclave or is located in a
`separate peripheral.
`
`***
`
`Communication between the processor and the Touch ID sensor takes place over a
`serial peripheral interface bus. The processor forwards the data to the Secure
`Enclave but can’t read it. It’s encrypted and authenticated with a session key that’s
`negotiated using a shared key provisioned for each Touch ID sensor and its
`corresponding Secure Enclave at the factory.
`
`https://support.apple.com/guide/security/touch-id-and-face-id-security-sec067eb0c9e/1/web/1. In
`
`its Answer, Apple admitted that the that Secure Enclave was introduced in the Apple A7 System-
`
`On-A-Chip (“SOC”) in September 2013. D.I. 18 at ¶21. Apple further admitted that Secure
`
`Enclave hardware is included in: iPhone 5S or later, iPad Air or later, MacBook Pro computers
`
`with Touch Bar (2016 and 2017) that contain the Apple T1 Chip, Intel-based Mac computers that
`
`contain the Apple T2 Security Chip, Mac computers with Apple silicon, Apple TV HD or later,
`
`Apple Watch Series 1 or later, HomePod, and HomePod mini. Id.
`
`22.
`
`Similarly, Face ID data is sent to the Secure Enclave. “A portion of the Secure Neural
`
`Engine—protected within the Secure Enclave—transforms this data into a mathematical representation
`
`and compares that representation to the enrolled facial data.” Id.
`
`
`
`8
`
`

`

`Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 9 of 19
`
`23.
`
`Security of computers and mobile devices is paramount. As mobile devices and
`
`computers (including smart watches and tablets) have come to dominate our daily lives, the need
`
`to keep them secure becomes ever more critical. “Mobile security involves protecting portable
`
`devices such as laptops, tablets, smart watches, and phones against cyber threats. Today, the need
`
`for protection is more critical because we store a lot of sensitive data on these devices. Studies
`
`show that mobile banking is one of the top three most used apps by Americans. The case is similar
`
`in other countries especially in the developing and emerging markets. Most individuals and small
`
`businesses also use their smartphones and laptops to login into their emails and social media pages.
`
`With each day that passes, we are adding some data to our digital footprints through our mobile
`
`devices,
`
`making
`
`it
`
`easy
`
`for
`
`hackers
`
`to
`
`target
`
`us.”
`
`See
`
`https://www.whatmobile.net/Opinion/article/mobile-security-important. In its Answer, Apple
`
`admitted that that the security of computers and mobile devices is important. D.I. 18 at ¶23.
`
`24.
`
`As another reporter put it, “Having a mobile phone has become a large part of our
`
`everyday life. Many underestimate the value a phone truly holds when it comes to the information
`
`it stores. Your phone has your entire life on it.” See https://blog.rsisecurity.com/importance-of-
`
`mobile-security/. This is not an exaggeration. In addition to email and social media accounts,
`
`mobile phones and computers contain sensitive personal and financial information as well as
`
`applications that permit users to access their bank accounts, credit card accounts, and mobile
`
`payment options. That data must be protected.
`
`25.
`
`The claimed invention makes it more difficult for hackers to obtain sensitive
`
`information by, among other benefits, providing protection that is linked to the device’s hardware,
`
`e.g., the processor, which is given its own unique identifier. From there, the unique identifier can
`
`be used as a key against which other identifiers can be checked, encrypted, or otherwise protected.
`
`
`
`9
`
`

`

`Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 10 of 19
`
`Count One: Infringement of U.S. Patent No. 7,493,497
`
`Plaintiff restates and incorporates by reference the allegations made in the
`
`26.
`
`preceding paragraphs as though fully set forth herein.
`
`27.
`
`Apple has infringed, and is continuing to infringe, literally or under the doctrine of
`
`equivalents, at least claims 1, 3, 4, and 12 of the ’497 Patent by making, using, selling, and/or
`
`offering for sale the Infringing Products in the United States, in violation of 35 U.S.C. § 271(a).
`
`Likewise, Defendant Apple has infringed, and is continuing to infringe, literally or under the
`
`doctrine of equivalents, at least claims 1, 3, 4, and 12 of the ’497 Patent by importing the Infringing
`
`Products into the United States.
`
`28.
`
`An example of Apple’s infringement by the Secure Enclave is found in Exhibit 5
`
`to this Complaint. By way of example, the digital identity devices, i.e., the Infringing Products,
`
`each comprise a microprocessor, the Secure Enclave, comprising a microprocessor identity that
`
`uniquely identifies the microprocessor, wherein the microprocessor comprises an on-die
`
`Programmable Read-Only Memory (PROM) and the microprocessor identity is etched into the
`
`PROM. The Secure Enclave is a coprocessor and is provisioned during fabrication with its own
`
`unique ID, which is an AES-256 bit key, i.e., an alpha-numeric value, fused to the coprocessor.
`
`The Infringing Products also each comprise digital identity data in the form of passcode, Touch
`
`ID, or Face ID data. Such data identify the owner of the device, including the name of the owner,
`
`which can be the name of an individual, the name of a company or organization, or other
`
`identifying data. The digital identity data is stored in memory in or only available to the Secure
`
`Enclave and is bound to the Secure Enclave’s unique ID by encrypting the data with a key
`
`entangled with the unique ID. Moreover, each of the Infringing Products includes an interface
`
`configured to enable it to communicate with external devices, and that interface may be an
`
`
`
`10
`
`

`

`Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 11 of 19
`
`input/output port. The foregoing description is based on publicly available information and a
`
`reasonable investigation of the structure and operation of the Infringing Products. Plaintiff reserves
`
`the right to modify this description, including, for example, on the basis of information about the
`
`Infringing Products that it obtains during discovery.
`
`29.
`
`Apple has had knowledge of the ’497 Patent at least as of the date of the Original
`
`Complaint. Since then, Apple has induced infringement of the ’497 Patent by actively encouraging
`
`third parties to infringe the asserted claims of the ’497 Patent. Apple has repeatedly extolled the
`
`benefits of its security infrastructure across its product line from iPhones to MacBooks to Apple
`
`Watches, including and especially the benefits of the Secure Enclave. Despite knowledge that the
`
`Secure Enclave infringes the claims of the ’497 Patent, Apple intentionally continued to sell and
`
`offer for sale Infringing Products with the Secure Enclave functionality activated by default.
`
`Moreover, by its design of the Infringing Products, Apple encourages third parties to use FaceID,
`
`TouchID, password protections, and other functionality making use of the Secure Enclave when
`
`using the Infringing Products. In that sense, Apple has taken certain affirmative acts—e.g., selling,
`
`offering for sale, importing the Infringing Products—to bring out the commission by others of acts
`
`of infringement, i.e., use of the Secure Enclave or similar functionality. Apple undertook these
`
`affirmative acts with the knowledge that the induced acts constitute infringement of the ’497
`
`Patent.
`
`30.
`
`Apple’s direct and indirect infringement has damaged Plaintiff in an amount yet to
`
`be determined, but at no less than a reasonable royalty.
`
`Count Two: Infringement of U.S. Patent No. 8,020,008
`
`Plaintiff restates and incorporates by reference the allegations made in the
`
`31.
`
`preceding paragraphs as though fully set forth herein.
`
`
`
`11
`
`

`

`Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 12 of 19
`
`32.
`
`Apple has infringed, and is continuing to infringe, literally or under the doctrine of
`
`equivalents, at least claims 1, 2, 3, 6, 7, and 9 of the ’008 Patent by making, using, selling, and/or
`
`offering for sale the Infringing Products in the United States, in violation of 35 U.S.C. § 271(a).
`
`Likewise, Defendant Apple has infringed, and is continuing to infringe, literally or under the
`
`doctrine of equivalents, at least claims 1, 2, 3, 6, 7, and 9 of the ’008 Patent by importing the
`
`Infringing Products into the United States.
`
`33.
`
`An example of Apple’s infringement by the Secure Enclave is found in Exhibit 6
`
`to this Complaint. By way of example, the Infringing Products contain a microprocessor identity
`
`device, the Secure Enclave, that comprise a microprocessor wherein microprocessor identity
`
`information uniquely identifies the microprocessor identity device. The Secure Enclave is a
`
`coprocessor and is provisioned during fabrication with its own unique ID, which is an AES-256
`
`bit key, i.e., an alpha-numeric value. The Infringing Products also each comprise digital identity
`
`data in the form of passcode, Touch ID, or Face ID data that identify the owner of the device,
`
`including the name of the owner, which can be the name of an individual, the name of a company
`
`or organization, or other identifying data. The Secure Enclave also includes a memory operatively
`
`connected to the microprocessor that stores the digital identity data and the microprocessor identity
`
`information, wherein the digital identity data are bound to the microprocessor identity device by
`
`encoding, using the microprocessor, the digital identity data using an algorithm that uses the
`
`microprocessor identity information. The digital identity data are bound to the Secure Enclave’s
`
`unique ID by encrypting the data with a key entangled with the unique ID. Moreover, each of the
`
`Infringing Products includes an interface configured to enable it to communicate with external
`
`devices, and that interface may be an input/output port. The foregoing description is based on
`
`publicly available information and a reasonable investigation of the structure and operation of the
`
`
`
`12
`
`

`

`Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 13 of 19
`
`Infringing Products. Plaintiff reserves the right to modify this description, including, for example,
`
`on the basis of information about the Infringing Products that it obtains during discovery.
`
`34.
`
`Apple has had knowledge of the ’008 Patent at least as of the date of the Original
`
`Complaint. Since then, Apple has induced infringement of the ’008 Patent by actively encouraging
`
`third parties to infringe the asserted claims of the ’008 Patent. Apple has repeatedly extolled the
`
`benefits of its security infrastructure across its product line from iPhones to MacBooks to Apple
`
`Watches, including and especially the benefits of the Secure Enclave. Despite knowledge that the
`
`Secure Enclave infringes the claims of the ’008 Patent, Apple intentionally continued to sell and
`
`offer for sale Infringing Products with the Secure Enclave functionality activated by default.
`
`Moreover, by its design of the Infringing Products, Apple encourages third parties to use FaceID,
`
`TouchID, password protections, and other functionality making use of the Secure Enclave when
`
`using the Infringing Products. In that sense, Apple has taken certain affirmative acts—e.g., selling,
`
`offering for sale, importing the Infringing Products—to bring out the commission by others of acts
`
`of infringement, i.e., use of the Secure Enclave or similar functionality. Apple undertook these
`
`affirmative acts with the knowledge that the induced acts constitute infringement of the ’008
`
`Patent.
`
`35.
`
`Apple’s direct infringement has damaged Plaintiff in an amount yet to be
`
`determined, but at no less than a reasonable royalty.
`
`Count Three: Infringement of U.S. Patent No. 8,489,895
`
`Plaintiff restates and incorporates by reference the allegations made in the
`
`36.
`
`preceding paragraphs as though fully set forth herein.
`
`37.
`
`Apple has infringed, and is continuing to infringe, literally or under the doctrine of
`
`equivalents, at least claim 5 of the ’895 Patent by making, using, selling, and/or offering for sale
`
`
`
`13
`
`

`

`Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 14 of 19
`
`the Infringing Products in the United States, in violation of 35 U.S.C. § 271(a). Likewise,
`
`Defendant Apple has infringed, and is continuing to infringe, literally or under the doctrine of
`
`equivalents, at least claim 1 of the ’895 Patent by importing the Infringing Products into the United
`
`States.
`
`38.
`
`An example of Apple’s infringement by the Secure Enclave is found in Exhibit 7
`
`to this Complaint. By way of example, the Infringing Products contain a microprocessor identity
`
`device, the Secure Enclave, that comprise a microprocessor wherein microprocessor identity
`
`information uniquely identifies the microprocessor identity device. The Secure Enclave is a
`
`coprocessor and is provisioned during fabrication with its own unique ID, which is an AES-256
`
`bit key, i.e., an alpha-numeric value. The Infringing Products also each comprise digital identity
`
`data in the form of passcode, Touch ID, or Face ID data that identify the owner of the device,
`
`including the name of the owner, which can be the name of an individual, the name of a company
`
`or organization, or other identifying data. The passcode, Touch ID, and Face ID can be viewed as
`
`passwords provided by the owner. The Secure Enclave also includes a memory operatively
`
`connected to the microprocessor that stores the digital identity data and the microprocessor identity
`
`information, wherein the digital identity data is bound to the microprocessor identity device by
`
`encoding, using the microprocessor, the digital identity data using an algorithm that uses the
`
`microprocessor identity information. The foregoing description is based on publicly available
`
`information and a reasonable investigation of the structure and operation of the Infringing
`
`Products. Plaintiff reserves the right to modify this description, including, for example, on the basis
`
`of information about the Infringing Products that it obtains during discovery.
`
`39.
`
`Apple has had knowledge of the ’895 Patent at least as of the date of the Original
`
`Complaint. Since then, Apple has induced infringement of the ’895 Patent by actively encouraging
`
`
`
`14
`
`

`

`Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 15 of 19
`
`third parties to infringe the asserted claims of the ’895 Patent. Apple has repeatedly extolled the
`
`benefits of its security infrastructure across its product line from iPhones to MacBooks to Apple
`
`Watches, including and especially the benefits of the Secure Enclave. Despite knowledge that the
`
`Secure Enclave infringes the claims of the ’895 Patent, Apple intentionally continued to sell and
`
`offer for sale Infringing Products with the Secure Enclave functionality activated by default.
`
`Moreover, by its design of the Infringing Products, Apple encourages third parties to use FaceID,
`
`TouchID, password protections, and other functionality making use of the Secure Enclave when
`
`using the Infringing Products. In that sense, Apple has taken certain affirmative acts—e.g., selling,
`
`offering for sale, importing the Infringing Products—to bring out the commission by others of acts
`
`of infringement, i.e., use of the Secure Enclave or similar functionality. Apple undertook these
`
`affirmative acts with the knowledge that the induced acts constitute infringement of the ’895
`
`Patent.
`
`40.
`
`Apple’s direct infringement has damaged Plaintiff in an amount yet to be
`
`determined, but at no less than a reasonable royalty.
`
`Count Four: Infringement of U.S. Patent No. 9,507,948
`
`Plaintiff restates and incorporates by reference the allegations made in the
`
`41.
`
`preceding paragraphs as though fully set forth herein.
`
`42.
`
`Apple has infringed, and is continuing to infringe, literally or under the doctrine of
`
`equivalents, at least claim 1 of the ’948 Patent by making, using, selling, and/or offering for sale
`
`the Infringing Products in the United States, in violation of 35 U.S.C. § 271(a). Likewise,
`
`Defendant Apple has infringed, and is continuing to infringe, literally or under the doctrine of
`
`equivalents, at least claim 1 of the ’948 Patent by importing the Infringing Products into the United
`
`States.
`
`
`
`15
`
`

`

`Case 1:22-cv-00058-LY Document 91 Filed 03/17/23 Page 16 of 19
`
`43.
`
`An example of Apple’s infringement by the Secure Enclave is found in Exhibit 8
`
`to this Complaint. By way of example, the digital identity devices, i.e., the Infringing Products,
`
`each comprise a microprocessor, the Secure Enclave, wherein microprocessor identity information
`
`uniquely identifies the microprocessor. The Secure Enclave is a coprocessor and is provisioned
`
`during fabrication with its own unique ID, which is an AES-256 bit key, i.e., an alpha-numeric
`
`value. The Infringing Products also each comprise digital identity data in the form of Touch ID
`
`data that identify the owner of the device, including the name of the owner, which can be the name
`
`of an individual, the name of a company or organization, or other identifying data. The digital
`
`identity data is bound to the Secure Enclave’s unique ID by encrypting the data with a key
`
`entangled with the unique ID. The Secure Enclave reads the digital identity data, which comprises
`
`biometric information, i.e., fingerprint data. The foregoing description is based on publicly
`
`available information and a reasonable investigation of the structure and operation of the Infringing
`
`Products. Plaintiff reserves the right to modify this description, including, for example, on the basis
`
`of information about the Infringing Products that it obtains during discovery.
`
`44.
`
`Apple has had knowledge of the ’948 Patent at least as of the date of the Original
`
`Complaint. Since then, Apple has induced infringement of the ’948 Patent by actively encouraging
`
`third parties to infringe the asserted claims of the ’948 Patent. Apple has repeatedly extolled the
`
`benefits of its security infrastructure across its product line from iPhones to MacBooks to Apple
`
`Watches, including and especially the benefits of the Secure Enclave. Despite knowledge that the
`
`Secure Enclave infringes the claims of the ’948 Patent,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket