throbber

`
`THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`AUSTIN DIVISION
`
`
` CARBYNE BIOMETRICS, LLC,
`Plaintiff,
`v.
`APPLE INC.,
`Defendant.
`
`Civil Action No. 1:23-cv-00324-ADA
`
`JURY TRIAL
`
`PLAINTIFF CARBYNE BIOMETRICS, LLC’S RESPONSE TO DEFENDANT APPLE,
`INC.’S RULE 12(B)(6) MOTION TO DISMISS THE COMPLAINT FOR FAILURE TO
`STATE A CLAIM UNDER 35 U.S.C. § 101
`
`Case 1:23-cv-00324-ADA Document 30 Filed 06/14/23 Page 1 of 27
`
`
`
`
`
`
`
`
`i
`TABLE OF CONTENTS
`I. INTRODUCTION ........................................................................................................... 1
`II. LEGAL STANDARD ..................................................................................................... 1
`A. Rule 12(b)(6) Motion to Dismiss .......................................................................... 1
`B. Patent Eligibility Under 35 U.S.C. § 101 .............................................................. 2
`III. ARGUMENT .................................................................................................................. 3
`A. Apple Has Not Met Its Burden of Proving the Two
`Allegedly “Representative Claims” Are Representative of
`Every Asserted Claim in the Patents. .................................................................... 4
`1. The Authentication Patents contain distinct limitations. ............................ 5
`2. The Fraud Reduction Patent s contain distinct
`limitations. ............................................................................................... 7
`B. The Authentication & Fraud Reduction Patents Claim
`Eligible Subject Matter......................................................................................... 9
`1. The Authen tication Patents claim eligible subject
`matter. ...................................................................................................... 9
`a) Alice Step One: The asserted claims solve
`computer problems and improve computer
`capabilities and are not abstract. .................................................... 9
`b) Alice Step Two: As alleged in the
`Complaint, the claims of the Authentication
`Patents recite inventive concepts. ................................................ 13
`2. The Fraud Reduction Patents claim eligible subject
`matter. .................................................................................................... 14
`a) Alice Step One: The Fraud Reduction
`Claims solve computer problems and
`improve computer capabilities and are not
`abstract. ...................................................................................... 15
`b) Alice Step Two: As alleged in the
`Complaint, the Fraud Reduction Claims
`recite inventive concepts. ............................................................ 19
`IV. CONCLUSION ............................................................................................................. 20
`Case 1:23-cv-00324-ADA Document 30 Filed 06/14/23 Page 2 of 27
`
`
`
`
`
`
`
`
`ii
`TABLE OF AUTHORITIES
` Page(s)
`CASES
`Aatrix Software, Inc. v. Green Shades Software, Inc.,
`882 F.3d 1121 (Fed. Cir. 2018) .............................................................................. 2, 4, 13, 20
`Alice Corp. Pty. Ltd. v. CLS Bank Int’l,
`573 U.S. 208 (2014) ........................................................................................................... 2,3
`Amdocs (Israel) Ltd. v. Openet Telecom, Inc.,
`841 F.3d 1288 (Fed. Cir. 2016) ........................................................................................ 9, 14
`AML IP, LLC v. ALDI, Inc.,
`No. 6:21-cv-00605-ADA, Dkt. 40 (W.D. Tex. Oct. 20, 2022) (Albright, J.) ........................... 2
`Ancora Techs., Inc. v. HTC Am., Inc.,
`908 F.3d 1343 (Fed. Cir. 2018) .................................................................................... 3, 9, 16
`BASCOM Glob. Internet Servs. v. AT&T Mobility LLC,
`827 F.3d 1341 (Fed. Cir. 2016) ...................................................................................... 14, 20
`Bell Atl. Corp. v. Twombly,
`550 U.S. 544 (2007) .............................................................................................................. 1
`Berkheimer v. HP Inc.,
`881 F.3d 1360 (Fed. Cir. 2018) .......................................................................................... 3, 5
`Cellspin Soft, Inc. v. Fitbit, Inc.,
`927 F.3d 1306 (Fed. Cir. 2019) .................................................................................... 2, 3, 19
`CosmoKey Sols. GmbH & Co. KG v. Duo Sec. LLC,
`15 F.4th 1091 (Fed. Cir. 2021) ............................................................................................ 19
`CyberSource Corp. v. Retail Decisions, Inc.,
`654 F.3d 1366 (Fed. Cir. 2011) ............................................................................................ 17
`Elec. Commc’n Techs., LLC v. ShoppersChoice.com, LLC,
`958 F.3d 1178 (Fed. Cir. 2020) ............................................................................................ 12
`Enfish, LLC v. Microsoft Corp.,
`822 F.3d 1327 (Fed. Cir. 2016) ........................................................................................ 3, 11
`FairWarning IP, LLC v. Iatrci Systems, Inc.,
`839 F.3d 1089 (Fed. Cir. 2016) ............................................................................................ 17
`Grecia Est. Holdings LLC v. Meta Platforms, Inc.,
`605 F. Supp. 3d 905 (W.D. Tex. 2022) (Albright, J.) ............................................................. 4
`Case 1:23-cv-00324-ADA Document 30 Filed 06/14/23 Page 3 of 27
`
`
`
`
`
`
`
`
`iii
`Illumina, Inc. v. Ariosa Diagnostics, Inc.,
`967 F.3d 1319 (Fed. Cir. 2020) .............................................................................................. 2
`In re Katrina Canal Breaches Litig.,
`495 F.3d 191 (5th Cir. 2007) ................................................................................................. 2
`Mytee Prods. v. Harris Rsch., Inc.,
`439 F. App’x 882 (Fed. Cir. 2011) ....................................................................................... 20
`PPS Data, LLC v. Jack Henry & Assocs., Inc.,
`404 F. Supp. 3d 1021 (E.D. Tex. 2019) ............................................................................. 4, 5
`Prism Techs. LLC v. T-Mobile USA, Inc,
`696 F. App’x 1014 (Fed. Cir. 2017) ............................................................................... 11, 12
`SRI Int’l, Inc. v. Cisco Sys., Inc.,
`930 F.3d 1295 (Fed. Cir. 2019) .................................................................................. 9, 11, 16
`TecSec, Inc., v. Adobe Inc.,
`978 F.3d 1278 (Fed. Cir. 2020) ..................................................................................... passim
`Universal Secure Registry v. Apple, Inc.,
`10 F.4th (Fed. Cir. 2021) ............................................................................................... 12, 17
`Visual Memory LLC v. NVIDIA Corp.,
`867 F.3d 1253 (Fed. Cir. 2017) ............................................................................................ 19
`STATUTES
`35 U.S.C. § 101 .................................................................................................................. passim
`35 U.S.C. § 112 ......................................................................................................................... 19
`35 U.S.C. § 282 ........................................................................................................................... 4
`OTHER AUTHORITIES
`Fed. R. Civ. P. 12(b) ........................................................................................................... 1, 2, 3
`
`Case 1:23-cv-00324-ADA Document 30 Filed 06/14/23 Page 4 of 27
`
`
`
`
`
`
`
`
`iv
`TABLE OF ABBREVIATIONS
`
`TERM DEFINITION
`Carbyne Plaintiff Carbyne Biometrics, LLC
`Apple Defendant Apple, Inc.
`’512 Patent U.S. Patent No. 10,929,512 (Dkt. 1-1)
`’105 Patent U.S. Patent No. 11,475,105 (Dkt. 1-2)
`’138 Patent U.S. Patent No. 11,514,138 (Dkt. 1-3)
`’010 Patent U.S. Patent No. 9,972,010 (Dkt. 1-4)
`’656 Patent U.S. Patent No. 10,713,656 (Dkt. 1-5)
`’886 Patent U.S. Patent No. 11,526,886 (Dkt. 1-6)
`Asserted Patents ’512, ’105, ’138, ’010, ’656, and ’886 Patents
`Authentication Patents ’512, ’105, and ’138 Patents
`Authentication Claims Claims 1, 3, 7-8, 10-13, 15, 19, and 22-25 of the ’138 Patent, claims
`1, 9, 11, 18, 28, and 35 of the ’105 Patent, and claims 1- 4, 10- 14,
`and 20-21 of the ’512 Patent
`Fraud Reduction Patents ’010, ’656, and ’886 Patents
`Fraud Reduction Claims Claims 1, 5 -6, 9, 13 -14, 17, and 21-22 of the ’010 Patent; claims 1,
`4, 7-10, 13, and 16- 19 of the ’656 Patent, and claims 1- 2, 4-7, 9-11,
`12, 14, 18, and 20 of the ’886 Patent
`Asserted Claims Authentication Claims and Fraud Reduction Claims
`Motion or Mot. Apple’s Motion to Dismiss (Dkt. 14)
`
`TABLE OF EXHIBITS
`
`EXHIBIT DESCRIPTION
`1 Samsung Electronics Co., LTD. et al v. RightQuestion, LLC,
`IPR2022-00251, Paper 17 ( PTAB Jun. 09, 2022) (Final Writte n
`Decision denying institution)
`Case 1:23-cv-00324-ADA Document 30 Filed 06/14/23 Page 5 of 27
`
`
`
`
`
`
`
`
`1
`I. INTRODUCTION
`Apple’s Motion to Dismiss should be d enied for several independent reasons. First ,
`Apple has provided no meaningful analysis to support conflating the sixty-three Asserted Claims
`across the six Asserted Patents into two allegedly representative claims. The six Asserted Patents
`fall into two t echnology areas: the ’512, ’105, and ’138 Patents are the “Authentication Patents”
`and the ’010, ’656, and ’886 Patents are the “Fraud Reduction Patents.” With no basis or
`analysis, Apple asserts that claim 13 of the ’138 Patent is representative of the thirty-one asserted
`claims of the three Authentication Patents and claim 9 of the ’010 Patent is representative of the
`thirty-two asserted claims of the three Fraud Reduction Patents . There is no agreement on
`representativeness, Apple has not shown its proposed claims are representative, and the Asserted
`Claims have substantial differences. Second , Carbyne’s well-pleaded allegations establish that
`the claims of the Asserted Patents recite unconventional improvements to user -authentication
`and computer fraud -reduction technologies. Apple’s Alice step one arguments rely on reducing
`the claims of the Asserted P atents to a level of abstraction that is divorced from the claim
`language—exactly what the Supreme Court and the Federal Circuit instruct against. Third , while
`this Court need not reach step two of the Alice test, Apple’s arguments there fail as well because
`they amount only to unsubstantiated attorney arguments which, at most, suggest factual and
`claim-construction disputes. Thus, Apple’s Motion should be denied.
`II. LEGAL STANDARD
`A. Rule 12(b)(6) Motion to Dismiss
`Dismissal at the pleading stage is improper if a complaint alleges “enough facts to state a
`claim to relief that is plausible on its face.” Bell Atl. Corp. v. Twombly , 550 U.S. 544, 570
`(2007). When deciding a Rule 12(b)(6) motion to dismiss for failure to state a claim, the court
`“accepts all well-pleaded facts as true, viewing them in the light most favorable to the plaintiff. ”
`Case 1:23-cv-00324-ADA Document 30 Filed 06/14/23 Page 6 of 27
`
`
`
`
`
`
`
`
`2
`In re Katrina Canal Breaches Litig., 495 F.3d 191, 205 (5th Cir. 2007) (citations omitted).
`Patent eligibility can be determined on a motion to dismiss “only when there are no
`factual allegations that, taken as true, prevent resolving the eligibility question as a matter of
`law.” Aatrix Software, Inc. v. Green Shades Software, Inc., 882 F.3d 1121, 1125 (Fed. Cir.
`2018). For example, a factual dispute over “[w]hether the claim elements or t he claimed
`combination are well-understood, routine, [or] conventional” will preclude granting a motion to
`dismiss. Id. at 1128. And because pa tents are presumed valid , “[a]ny fact . . . pertinent to the
`invalidity conclusion must be proven by clear and convincing evidence.” Cellspin Soft, Inc. v.
`Fitbit, Inc., 927 F.3d 1306, 1319 (Fed. Cir. 2019). Indeed, this Court has held that a Rule 12(b)
`motion is an “awkward place” to determine § 101 eligibility:
`In other words, to prevail, the movant needs to overcome both a factual deck
`stacked against it and a heightened burden of proof. Therefore, because a patent is
`presumed valid and requires clear and convincing evidence to prove its invalidity,
`a Rule 12(b) motion to dismiss is a procedurally awkward place for a court to
`resolve a patent’s § 101 eligibility.
`AML IP, LLC v. ALDI, Inc., No. 6:21-cv-605-ADA, Dkt. 40 at 7 (W.D. Tex. Oct. 20, 2022).
`B. Patent Eligibility Under 35 U.S.C. § 101
` Whether a patent recites patent -eligible subject matter under § 101 involves a two -step
`analysis according to the test set forth in Alice Corp. Pty. Ltd. v. CLS Bank Int’l , 573 U.S. 208
`(2014). Apple, as the party chall enging the validity of the Asserted Patents, bears the burden of
`proof. Illumina, Inc. v. Ariosa Diagnostics, Inc., 967 F.3d 1319, 1328 (Fed. Cir. 2020).
`Alice Step One. At step one , the court determines “whether the claims at issue are
`directed to a paten t-ineligible concept,” like an abstract idea. Alice , 573 U.S. at 218. To make
`this determination, courts ask “what the patent asserts to be the focus of the claimed advance
`over the prior art” by considering the asserted claims “in light of the specificati on.” TecSec, Inc.
`v. Adobe Inc. , 978 F.3d 1278, 1292 (Fed. Cir. 2020). In cases involving inventions related to
`Case 1:23-cv-00324-ADA Document 30 Filed 06/14/23 Page 7 of 27
`
`
`
`
`
`
`
`
`3
`computer technology, the Federal Circuit has found that claims are patent eligible when they
`focus on: (1) “specific asserted improvements in co mputer capabilities,” or (2) “a solution to a
`problem specifically arising in the realm of computer networks or computers.” Id. at 1293.
`Notably, the Federal Circuit has held that “[i]mproving security . . . can be a non -abstract
`computer-functionality improvement if done by a specific technique that departs from earlier
`approaches to solve a specific computer problem.” Id. at 1294 (quoting Ancora Techs., Inc. v.
`HTC Am., Inc., 908 F.3d 1343, 1348 (Fed. Cir. 2018)). At step one, courts must avoid describing
`the claims at “ a high level of abstraction” or “untethered from the language of the claims”
`because doing so “all but ensures that the exceptions to § 101 swallow the rule.” Enfish, LLC v.
`Microsoft Corp., 822 F.3d 1327, 1337 (Fed. Cir. 2016).
`Alice Step Two. If a patent claim fails at step one, the court proceeds to step two where it
`“examine[s] the elements of the claim to dete rmine whether it contains an inventive concept
`sufficient to transform the claimed abstract idea into a patent -eligible application.” Alice, 573
`U.S. at 221 (citations and quotations omitted). Patent claims recite an “inventive concept” if they
`reflect “something more than well-understood, routine, conventional activities previously known
`to the industry.” Cellspin, 927 F.3d at 1315 (citation omitted) . “[W]hether a claim element or
`combination of elements is well- understood, routine and conventional to a skilled artisan in the
`relevant field is a question of fact” that “must be proven by clear and convincing evidence.”
`Berkheimer v. HP Inc., 881 F.3d 1360, 1368 (Fed. Cir. 2018). For a Rule 12(b) motion, Carbyne
`need only assert “plausible and specific factual allegations that aspects of the claims are
`inventive.” Cellspin, 927 F.3d at 1317.
`III. ARGUMENT
`The relevant question at the moti on to dismiss stage is whether Carbyne has stated a
`legally plausible claim; not whether it will ultimately be entitled to relief. See supra Section II.A.
`Case 1:23-cv-00324-ADA Document 30 Filed 06/14/23 Page 8 of 27
`
`
`
`
`
`
`
`
`4
`Carbyne’s factual allegations must be taken as true, with every inference made in Carbyne’s
`favor. Id. In the Complaint, Carbyne adequately alleged that Apple infringes its duly issued
`patents and that each Asserted Patent is directed to patent-eligible subject matter and claims
`unconventional, inventive concepts. Carbyne has thus adequately pled legally sufficient claims,
`and dismissal at this early stage of the case is inappropriate. Aatrix Software, 882 F.3d at 1128.
`A. Apple Has Not Met Its Burden of Proving the Two Allegedly “Representative
`Claims” Are Representative of Every Asserted Claim in the Patents.
`Apple argues that the six Asserted Patents should be held invalid and the entire case
`dismissed based on a completely unsupported assertion that two claims—claim 13 of the ’138
`Patent (Authentication Patents) and claim 9 of the ’010 Patent (Fraud Reduct ion Patents)—are
`representative of the sixty-three Asserted Claims of the Asserted Patents. Apple’s argument fails.
`According to 35 U.S.C. § 282, “[e]ach claim of a patent (whether in independent,
`dependent, or multiple dependent form) shall be presumed va lid independently of the validity of
`other claims.” “Absent a basis to overcome the presumption of independence, the plain text of §
`282 requires courts to analyze the validity of each claim individually.” PPS Data, LLC v. Jack
`Henry & Assocs., Inc., 404 F. Supp. 3d 1021, 1030 (E.D. Tex. 2019) ; Grecia Est. Holdings LLC
`v. Meta Platforms, Inc., 605 F. Supp. 3d 905, 912 (W.D. Tex. 2022) (Albright, J.) (“35 U.S.C. §
`282 accords a presumption of validity to each patent claim.”).
`As the movant and proponent of t he alleged representativeness, Apple has the burden to
`overcome the presumption of independent validity of each claim by “offering a substantial
`rationale for treating a claim as representative of other asserted claims” that is “directly tethered
`to the cl aim language.” PPS Data, LLC , 404 F. Supp. 3d at 1030. In other words , to justify
`treating one claim from each of the Authentication and Fraud Reduction Patents as representative
`of all the other Asserted Claims, Apple “must conduct an analysis tethered to the claim language,
`Case 1:23-cv-00324-ADA Document 30 Filed 06/14/23 Page 9 of 27
`
`
`
`
`
`
`
`
`5
`to show that there are no legally relevant distinctions between the claim identified as
`representative and the remaining asserted claims .” Id. at 1031 (emphasis added). The Federal
`Circuit has held the presumption of independent validi ty can be overcome and a claim may be
`treated as representative only when: (1) “the patentee does not present any meaningful argument
`for the distinctive significance of any claim limitations not found in the representative claim” or
`(2) “the parties agree to treat a claim as representative.” Berkheimer, 881 F.3d at 1365.
`Here, Apple has failed to establish that representa tive treatment is justified . First, the
`parties have not agreed that the two claims Apple has identified are representative of all the
`Asserted Claims. Second, Apple has also failed to show that there are no legally relevant
`distinctions between its representative claims and the remaining claims . As explained below,
`both the independent and dependent claims of the Fraud Reduction and Authen tication Patents
`include distinct limitations not present in the allegedly representative claims that Apple has
`overlooked or ignored. Because Apple has failed to meet its burden of proving the two claims it
`identified are representative of all the Asserted Claims, the Court should deny Apple’s Motion.
`1. The Authentication Patents contain distinct limitations.
`In a single footnote, Apple concludes that the ’138 Patent’s independent claims are
`substantially similar to (and thus representative of) the claims of the ’138, ’512, and ’105
`Patents. Mot. at 14 n.7. Based entirely on this footnote statement, Apple treats claim 13 of the
`’138 Patent as representative of all thirty -one asserted claims of the Authentication Patents and
`only applies the Alice test to this allegedly representative claim. But there are substantial
`differences that preclude finding that this single claim is representative.
`For example, claim 1 of the ’512 Patent discloses a hardware architecture with a “first”
`and “second processor” wherein each processor is capable of performing explicit tasks. See, e.g.,
`’512 Patent at cl. 1. Further, there are other distinct components in the claims such as “secure”
`Case 1:23-cv-00324-ADA Document 30 Filed 06/14/23 Page 10 of 27
`
`
`
`
`
`
`
`
`6
`and “insecure storage” as well as a “restricted interface” for communication between the “fi rst”
`and “second” processor that are different from the scope of claim 13 of the ’138 Patent. Id. And
`these are differences between the alleged representative claim and just one claim of the ’512
`Patent. Other claims of the ’512 Patent add other distinct d ifferences that need to be considered
`in the § 101 analysis, such as: cloud storage (claim 2); how the encrypted record is downloaded
`by the second device (claim 4); and how the record is decrypted and stored (claims 5-9). None of
`this is captured by a single claim from the ’138 Patent.
`The same is true for the other Authentication Patents. For example, independent claim 1
`of the ’105 Patent explicitly requires a “first” and “second” device of the “same brand” capable
`of initiating a backup of a record. Non e of these limitations are found in claim 13 of the ’138
`Patent. However, this is just one of the many differences as claim 4 adds a “secure channel”
`between the first and second devices of the same brand, claim 9 adds a secure storage and the
`restricted interface, and claims 10 and 11 add limitations to the restricted interface such as it
`being a dedicated physical connection and/or an application programming interface, respectively.
`Notably, the alleged representative claim of the ’138 Patent does not even capture all the
`distinct elements of the claims of the ’138 Patent. Consider claims 11 and 12, which claim the
`hardware system of claim 1 and additionally a “restricted interface” and “secure storage,”
`respectively. Neither of these distinct hardware elements is captured by the alleged
`representative claim. Accordingly, Apple cannot show that claim 13 is representative of the ’138
`Patent’s claims—let alone all claims of the Authentication Patents. Apple’s Motion ignores the
`distinctions between the Authentication Patents in favor of analyzing a single claim that it alleges
`is representative, despite meaningful arguments to the contrary. This Court should not treat a
`single claim in the ’138 Patent as representative, and should deny the Motion on this basis.
`Case 1:23-cv-00324-ADA Document 30 Filed 06/14/23 Page 11 of 27
`
`
`
`
`
`
`
`
`7
`2. The Fraud Reduction Patents contain distinct limitations.
`Apple’s Motion states in a footnote that the ’010, ’656, and ’886 Patents are
`“substantively similar.” Mot. at 4 n.3. Based entirely on this footnote statement, Apple treats
`claim 9 of the ’010 Patent as representative of all thirty -two Fraud Reduction Claims and
`analyzes the patent eligibility of only th is single “representative” claim under the Alice test. See
`Mot. at 6–12. Based entirely on the footnote statement, and as with the Authenticati on Patents,
`Apple’s “reasoning” does not meet its burden to rebut the presumption of independent validity.
`As Carbyne pointed out in its Complaint, the independent claims of the ’656 Patent
`(claims 1, 10, 19) and the ’886 Patent (claims 1, 6, 11) include additional limitations that provide
`technical improvements distinct from the ’010 Patent’s claims . See Compl. ¶¶ 58 -59. The
`method recited in claim 9 of the ’010 Patent describes using “captured biometric information”
`only to determine that the user is alive. All of the ’656 Patent’s asserted claims add the limitation
`of comparing this captured biometric information to distinct “stored biometric information” to
`confirm a user’s identity for the purpose of detecting fraud. E.g., Dkt. 1-5 (’656 Patent) at cls. 1,
`10, and 19 (emphasis added). Likewise, the ’8 86 Patent ’s asserted claims add the requirement
`that the biometric information used to determine whether a user is “alive” must consist of a “set
`of image s” captured using a camera. E.g., Dkt. 1 -6 (’886 Patent) at cl s. 1, 6, 11. Just as a
`biometric comparison improves fraud detection through verification, analyzing real-world photos
`helps to more accurately verify that a party to a remote transaction is alive. Carbyne pointed out
`both of these advances in the Complaint, meaning it has already provided meaningful arguments
`for how the ’886 and ’656 Patents’ claims differ from those of the ’010 Patent.
`Apple’s own Motion acknowledges the meaningful distinctions between the independent
`claims of the ’656 and ’886 Patents and claim 9 of the ’010 Patent:
` [The ’010 Patent’s . . . claim 9] recites receiving and storing information[];
`Case 1:23-cv-00324-ADA Document 30 Filed 06/14/23 Page 12 of 27
`
`
`
`
`
`
`
`
`8
`displaying information[]; analyzing information[]; and a result[]. The ’656 and
`’886 independent claims . . . also recite capturing l ocation information, and the
`’656 recites storing biometric information instead of a virtual likeness.
`Mot. at 4–5 (emphasis added) (citations omitted). Thus, by Apple’s own summary, the ’656 and
`’886 Patents’ independent claims possess additional limitations over the ’010 Patent’s claim 9. In
`fact, the ’656 Patent’s independent claims include different subject matter altogether. Apple does
`not bother to explain how these additional limitations are not legally significant. Therefore,
`Apple has not met its burden of proving that claim 9 of the ’010 Patent is representative.
`The dependent claims also include limitations beyond those of Apple’s proposed
`representative claim , such as: the ’010 Patent’s claim 21, wherein collected biometric
`information comprises a plurality of photographs that are analyzed to determine whether the user
`is alive; the ’656 Patent’s claim 18, which recites initiating a transaction without the user needing
`to input a password (a convenience feature) ; and the ’886 Patent’s claim 10, w hich recites
`associating the patented interface with a phone, tablet, or laptop, providing for brand or vendor
`association. Apple downplays these limitations solely with attorney argument , stating that the
`dependent claims “add minor features that do no ch ange the character of the independent
`claims.” Mot. at 5. But to reach this conclusion, Apple did not analyze the language of the
`claims. Instead, Apple sorted the dependent claims into generic, arbitrary categories , that its
`attorneys characterize as “add[ing] minor features ,” such as “collection of additional
`information,” “origin of collected information,” and “information that is not required.” Id. This
`sort of analysis, completely untethered from the claim language, and with nothing more than the
`suppositions of Apple’s attorneys, cannot rebut the presumption of independent validity. Thus,
`Apple has not met its burden of proving that claim 9 of the ’010 Patent is representative of the
`other Fraud Reduction Claims, and its Motion should therefore be denied.
`Case 1:23-cv-00324-ADA Document 30 Filed 06/14/23 Page 13 of 27
`
`
`
`
`
`
`
`
`9
`B. The Authentication & Fraud Reduction Patents Claim Eligible Subject Matter.
`1. The Authentication Patents claim eligible subject matter.
`The Authentication Patents are directed to specific improvements in computer security,
`such as using a dedicated processor only accessible over a restricted interface to control access to
`records stored in secure storage, and not simply “facilitating access to resources based on
`authenticating a user’s identity” as Apple generically suggests. Mot. at 15. In fact, as
`demonstrated in the following sections, the Authentication Patents are so clearly not directed to
`an abstract idea, that even Samsung, a party just as sophisticated as Apple, did not raise § 101 as
`a defense in a litigation two years ago with some of the same patents.
`1
`a) Alice Step One: The Authentication C laims solve computer
`problems and improve computer capabilities and are not
`abstract.
`The Authentication Patents provide technical solutions —such as using a dedicated
`processor only accessible over a restricted interface to limit access to a user’s most vital records
`(their passwords and biometric info) —that overcome issues in the prior art authentication
`systems t o enable safer and more convenient authentication. Separating cryptographic
`functionality into a sp ecialized secure processor and storage that is difficult to penetrate is a
`technological solution to a technological problem and not merely the application of an abstract
`idea using conventional computer technology. See Amdocs (Israel) Ltd. v. Openet Telecom, Inc.,
`841 F.3d 1288, 1300 (Fed. Cir. 2016); Ancora Techs., 908 F.3d at 1350 (Claims “yield[ed] a
`tangible technological benefit (by making the claimed system less susceptible to hacking).”); SRI
`Int’l, Inc. v. Cisco Sy s., Inc. , 930 F.3d 1295, 1303 (Fed. Cir. 2019) (Claims were “directed to
`using a specific technique . . . to solve a technological problem arising in computer networks:
`
`1 In fact, the USPTO did not institute IPRs on the ’512 Patent , which further demonstrates the
`inventive concepts of the Authentication Patents. See generally Ex. 1.
`Case 1:23-cv-00324-ADA Document 30 Filed 06/14/23 Page 14 of 27
`
`
`
`
`
`
`
`
`10
`identifying hackers or potential intruders into the network.”).
`The idea to bifurcate the processers and use other means to restrict access to the user’s
`most vital information is described in the Complaint and specification of the Authentication
`Patents. For example:
`One example of a device with secure storage is
`illustrated in FIG. 3. In the example shown, a mobile
`phone 300 includes a large and insecure storage 302
`attached to a fast processor 304, and a smaller but
`secure storage 306 attached to a dedicated processor
`308 and a sensor 310 (e.g., a camera or a fingerprint
`reader). Users (and applications) can read from an d
`write to the insecure storage area. However, users
`cannot access the secure storage area, and the fast
`processor can only communicate with the dedicated
`processor/sensor via a restricted API.
`Dkt. 1-1 (’512 Patent) at 3:66- 4:8; Compl. ¶¶ 44- 45. As the fi gure and the description explain,
`bifurcating the tasks which a first processor and a dedicated second processor are configured to
`do restricts the first processor from accessing the user’s most vital information which is stored in
`secure storage and only accessible by the dedicated second processor. See, e.g. , Compl. ¶ 32
`(“Dr. Jakobsson determined that the correct way to deal with this was to create a secure portion
`of a device where at least some processing of the user’s most sensitive data would be done.”).
`This separation and bifurcation of tasks between processors is also reflected in the claims
`of the Authentication Patents—but not in the single allegedly representative claim that Apple has
`elected to focus on. Consider claim 1 of the ’512 Patent, wh ich illustrates this secure division in
`a system with a “first” and “second” processor where these processors are only capable of
`communicating with each other via a “restricted interface.” Here, the “ first” processor is
`configured to “establish a secure connection with the external resource ,” while the “ second”
`processor is configured to perform many sensitive tasks like “determin[e] that there is a match
`between the biometric input and a stored biometric template,” “access a record stored in a secure
`Case 1:23-cv-00324-ADA Document 30 Filed 06/14/23 Page 15 of 27
`
`
`
`
`
`
`
`
`11
`storage,” and “perform a cryptographic operation.” Dkt. 1 -1 (’512 Patent) at cl . 1; see also Dkt.
`1-2 (’105 Patent) at cls. 1, 9-11 (discussing different forms of the “restricted interface” such as a
`“dedicated physical connection” and “application programming interface” to help restrict access
`to the user’s most important information); Dkt. 1-3 (’138 Patent) at cls. 11-12, 23-24.
`Indeed, performing these functions on a conventional computer (i.e., that fails to restrict
`access to a user’s most important data) would substantially decrease the security of the overall
`system, and thus the claimed systems improve the operation of the computer itself. See Enfish ,
`822 F.3d at 1

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket