throbber
Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 1 of 21 Page ID #:355
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Term
`
`Plaintiffs’ Proposed Construction
`
`Kwikset’s Proposed Construction
`
`“automatically cause[s] a
`message to be generated”
`[‘778 Patent claim 16;
`‘374 Patent claim 14]
`
`
`No construction necessary, but if construed:
`“cause[s] a message to be generated without
`user input”
`
`Intrinsic Evidence
`“It is thus one aspect of the present invention to
`provide a system and method that automatically
`updates credentials on a mobile device
`immediately after authorization changes have been
`made.”
`[‘778 Patent at 3:17-20]1
`
`“Specifically, the present invention utilizes
`communication techniques and protocols to
`automatically and remotely update credential
`information associated with one or a set of mobile
`devices.”
`[‘778 Patent at 4:60-63]
`
`“The communication network 116 provides a way
`for the controller 102 to automatically notify
`
`
`“cause a message to be created without
`receiving a message request from a user”
`
`Intrinsic Evidence
`Claims 2, 9, 14, 26, 31 in ’778 Patent.
`Claims 3, 13, 20, 29 in ’374 Patent.
`
`Col. 3:17-20.
`Col. 3:50-59.
`Col. 7: 5-8.
`Col. 9:36-62.
`Col. 9:63- Col. 10:6.
`Col. 10:7-32.
`Col. 10:60-64.
`
`’778 Patent File History, Office Action Response
`dated July 1, 2009, pg. 11. [AA0000161].
`
`’778 Patent File History, Office Action Response
`dated July 1, 2009, pg. 12. [AA0000162].
`
`’778 Patent File History, Office Action Response
`dated July 1, 2009, pg. 13. [AA0000163].
`
`
`1
`The ‘374 Patent is a continuation of the ‘778 Patent and therefore shares the same specification. Each passage described herein as appearing at a
`particular location in the ‘778 Patent is also found in the ‘374 Patent, except typically 1 line lower. For example, the instant passage appears in the ‘778 Patent at
`3:17-20 and in the ‘374 Patent at 3:18-21. Although not listed separately in this chart, it should be understood that all terms appearing in the ‘374 Patent and
`which are supported in this chart by passages from the ’778 Patent are also supported by the identical passages in the ‘374 Patent specification.
`2118/025100-0032
`A-1
`8429083.1 a05/15/15
`
`
`UniKey Exhibit 1003, Page 1
`
`

`

`Term
`
`Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 2 of 21 Page ID #:356
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Plaintiffs’ Proposed Construction
`and/or update information to the mobile devices
`112 related to the access system 100. ”
`[‘778 Patent at 7:4-7]
`
`“Referring now to FIG. 3, a method of
`automatically and remotely updating credential
`information on a mobile device 112 will be
`described in accordance with embodiments of the
`present invention. The method begins at step 300
`then proceeds to step 304 where credential
`information is changed at the controller 102. As
`noted above, credential information can include
`any data, set of data, encryption schemes, keys,
`transmission protocol, and the like, used by a
`particular mobile device 112 to verify its
`authenticity to a reader 108. Altering, modifying,
`enabling, disabling, revoking, adding, and
`updating any portion of the credential information
`may effect a change in the credential information.
`The credential information changed at the
`controller 102 is then updated at the database 130
`in step 308. Thereafter, in step 312, information is
`retrieved from the database 130 by the controller
`102 relating to what mobile device the changed
`information was associated with. The mobile
`device corresponding to the changed information
`is then identified as the target device. For
`example, if the access rights of one user have been
`modified, then the mobile device 112 associated
`with that user is the only mobile device 112 that
`
`Kwikset’s Proposed Construction
`
`’778 Patent File History, Office Action Response
`dated January 28, 2009, pg. 3. [AA0000126].
`
`’374 Patent File History, Response to Office
`Action dated Sept. 26, 2011, pg. 10.
`[AA0001137].
`
`’374 Patent File History, Response to Office
`Action dated Sept. 26, 2011, pg. 11.
`[AA0001138].
`
`Extrinsic Evidence
`
`’778 EPO Equivalent File History, Response to
`EPO Communication dated Feb. 23, 2015, pg. 3.
`
`’778 Canadian Equivalent File History, Response
`to Requisition for Appn. 2,647,713 dated May 8,
`2013, pg. 3.
`
`’778 Canadian Equivalent File History, Response
`to Requisition for Appn. 2,647,713 dated May 8,
`2013, pg. 4.
`
`Edward Tittel may provide testimony in support of
`Plaintiffs construction. Mr. Tittel will rely upon
`the asserted claims, specification, drawings and
`file history of the '778 Patent to support his
`testimony. In addition, Mr. Tittel may rely upon
`the IEEE Standard Dictionary: Glossary of Terms
`and Definitions (2009), American Heritage®
`
`2118/025100-0032
`8429083.1 a05/15/15
`
`
`A-2
`
`UniKey Exhibit 1003, Page 2
`
`

`

`Term
`
`Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 3 of 21 Page ID #:357
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Plaintiffs’ Proposed Construction
`needs to have its respective memory 200 updated,
`and thus the single mobile device 112 is the
`targeted mobile device 112. Alternatively, a
`change may relate to a number of mobile devices
`112 and each device will need to receive the
`updated information on its respective memory
`200. Thus each mobile device 112 will become a
`targeted device.
`
`Once a targeted device is determined in step 312, a
`message is sent from the controller 102 to the
`determined (targeted) mobile device 112 via the
`communication network 116 in step 316. That
`information is received at the mobile device 112
`through interface 136 by the antenna 226 that
`forwards this information to the RF
`modulation/demodulation unit 230 where the
`signal is demodulated. The RF
`modulation/demodulation unit 230 then sends the
`demodulated update signal to processor 204. The
`processor updates the memory 200 to reflect the
`change that was made at the controller 102 in step
`320.”
`[‘778 Patent at 9:36-10:6]
`
`“Referring now to FIG. 4, another method of
`updating, enabling, and/or revoking the credentials
`of a mobile device 112 will be described in
`accordance with embodiments of the present
`
`Kwikset’s Proposed Construction
`Dictionary of the English Language (Fifth Edition
`2011), EPO and Canadian equivalent file histories
`for the ’778 Patent, Chaum, David. “Zero-
`knowledge undeniable signatures.” Advances in
`Cryptology—EUROCRYPT’90. Springer Berlin
`Heidelberg, 1991, U.S. Patent 6,170,744, U.S.
`Patent 6,229,806, U.S. Patent 5,781,629, and
`Schneier, Bruce, Applied Cryptography:
`Protocols, Algorithms and Source Code, C, J
`Wiley & Sons, 1996. “automatic Pertaining to a
`process or device that, under specified conditions,
`functions without intervention by a human
`operator. IEEE Standard Dictionary: Glossary of
`Terms and Definitions (2009).
`
`“automatic Acting or operating in a manner
`essentially independent of external influence or
`control.” American Heritage® Dictionary of the
`English Language (Fifth Edition 2011). retrieved
`February 24 2015 at
`http://www.thefreedictionary.com/automatic.
`“message A grouping of data elements (DEs) and
`message attributes, used to convey information.
`Note: For the purposes of this standard, a message
`is an abstract description using a message set
`template, not a specific instance.” IEEE Standard
`Dictionary: Glossary of Terms and Definitions
`(2009) quoting IEEE Std 1488-2000 and IEEE Std
`1489-1999.
`
`
`2118/025100-0032
`8429083.1 a05/15/15
`
`
`A-3
`
`UniKey Exhibit 1003, Page 3
`
`

`

`Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 4 of 21 Page ID #:358
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Kwikset’s Proposed Construction
`
`Term
`
`Plaintiffs’ Proposed Construction
`invention. The method starts at step 400 and
`proceeds to step 404 where a time interval
`between credential updates is determined. The
`time period may vary depending upon the
`requirements and security needs of the system
`100. For example, the interval may be set to
`update credentials every second, minute, hour, day
`or a variation thereof.”
`[‘778 Patent at 10:7-15]
`
`Extrinsic Evidence
`Dr. Richard Mihran may testify that this term does
`not need construction. Dr. Mihran may also
`testify that if the term is construed, Plaintiff’s
`proposed construction is consistent with what a
`person of ordinary skill in the art at the time of the
`invention would understand this term to mean.
`
`“automatically initiating a
`system update process”
`[‘778 Patent claim 1; ‘374
`Patent claim 1]
`
`“automatically initiate a
`system update process”
`[‘778 Patent claim 16;
`‘374 Patent claim 14]
`
`2118/025100-0032
`8429083.1 a05/15/15
`
`
`No construction necessary, but if construed:
`“initiate [initiating] a system update process
`without user input ”
`
`Intrinsic Evidence
`“It is thus one aspect of the present invention to
`provide a system and method that automatically
`updates credentials on a mobile device
`immediately after authorization changes have been
`made.”
`
`
`“pushing credentials to a mobile device without
`a request from the user or the mobile device”
`
`Intrinsic Evidence
`Claims 2, 9, 14, 26, 31 in ’778 Patent.
`Claims 3, 13, 20, 29 in ’374 Patent.
`
`Col. 3:17-20.
`Col. 3:50-59.
`
`A-4
`
`UniKey Exhibit 1003, Page 4
`
`

`

`Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 5 of 21 Page ID #:359
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Term
`
`
`2118/025100-0032
`8429083.1 a05/15/15
`
`
`Plaintiffs’ Proposed Construction
`[‘778 Patent at 3:17-20]
`
`“Specifically, the present invention utilizes
`communication techniques and protocols to
`automatically and remotely update credential
`information associated with one or a set of mobile
`devices.”
`[‘778 Patent at 4:60-63]
`
`“The communication network 116 provides a way
`for the controller 102 to automatically notify
`and/or update information to the mobile devices
`112 related to the access system 100. ”
`[‘778 Patent at 7:4-7]
`
`“Referring now to FIG. 3, a method of
`automatically and remotely updating credential
`information on a mobile device 112 will be
`described in accordance with embodiments of the
`present invention. The method begins at step 300
`then proceeds to step 304 where credential
`information is changed at the controller 102. As
`noted above, credential information can include
`any data, set of data, encryption schemes, keys,
`transmission protocol, and the like, used by a
`particular mobile device 112 to verify its
`authenticity to a reader 108. Altering, modifying,
`enabling, disabling, revoking, adding, and
`
`A-5
`
`Kwikset’s Proposed Construction
`Col. 7:5-8.
`Col. 9:36-62.
`Col. 9:63- Col. 10:6.
`Col. 10:7-32.
`Col. 10:60-64.
`
`’778 Patent File History, Office Action Response
`dated July 1, 2009, pg. 11. [AA0000161].
`
`’778 Patent File History, Office Action Response
`dated July 1, 2009, pg. 12. [AA0000162].
`
`’778 Patent File History, Office Action Response
`dated July 1, 2009, pg. 13. [AA0000163].
`
`’778 Patent File History, Office Action Response
`dated January 28, 2009, pg. 3. [AA0000126].
`’374 Patent File History, Response to Office
`Action dated Sept. 26, 2011, pg. 10.
`[AA0001137].
`’374 Patent File History, Response to Office
`Action dated Sept. 26, 2011, pg. 11.
`[AA0001138].
`
`Extrinsic Evidence
`
`’778 EPO Equivalent File History, Response to
`EPO Communication dated Feb. 23, 2015, pg. 3.
`
`UniKey Exhibit 1003, Page 5
`
`

`

`Term
`
`Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 6 of 21 Page ID #:360
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Plaintiffs’ Proposed Construction
`updating any portion of the credential information
`may effect a change in the credential information.
`The credential information changed at the
`controller 102 is then updated at the database 130
`in step 308. Thereafter, in step 312, information is
`retrieved from the database 130 by the controller
`102 relating to what mobile device the changed
`information was associated with. The mobile
`device corresponding to the changed information
`is then identified as the target device. For
`example, if the access rights of one user have been
`modified, then the mobile device 112 associated
`with that user is the only mobile device 112 that
`needs to have its respective memory 200 updated,
`and thus the single mobile device 112 is the
`targeted mobile device 112. Alternatively, a
`change may relate to a number of mobile devices
`112 and each device will need to receive the
`updated information on its respective memory
`200. Thus each mobile device 112 will become a
`targeted device.
`
`Once a targeted device is determined in step 312, a
`message is sent from the controller 102 to the
`determined (targeted) mobile device 112 via the
`communication network 116 in step 316. That
`information is received at the mobile device 112
`through interface 136 by the antenna 226 that
`forwards this information to the RF
`modulation/demodulation unit 230 where the
`signal is demodulated. The RF
`
`Kwikset’s Proposed Construction
`
`’778 Canadian Equivalent File History, Response
`to Requisition for Appn. 2,647,713 dated May 8,
`2013, pg. 3.
`
`’778 Canadian Equivalent File History, Response
`to Requisition for Appn. 2,647,713 dated May 8,
`2013, pg. 4.
`
`Edward Tittel may provide testimony in support of
`Plaintiffs construction. Mr. Tittel will rely upon
`the asserted claims, specification, drawings and
`file history of the '778 Patent to support his
`testimony. In addition, Mr. Tittel may rely upon
`the IEEE Standard Dictionary: Glossary of Terms
`and Definitions (2009), American Heritage®
`Dictionary of the English Language (Fifth Edition
`2011), EPO and Canadian equivalent file histories
`for the ’778 Patent, Chaum, David. “Zero-
`knowledge undeniable signatures.” Advances in
`Cryptology—EUROCRYPT’90. Springer Berlin
`Heidelberg, 1991, U.S. Patent 6,170,744, U.S.
`Patent 6,229,806, U.S. Patent 5,781,629, and
`Schneier, Bruce, Applied Cryptography:
`Protocols, Algorithms and Source Code, C, J
`Wiley & Sons, 1996.
`
`“automatic Pertaining to a process or device that,
`under specified conditions, functions without
`intervention by a human operator. IEEE Standard
`Dictionary: Glossary of Terms and Definitions
`(2009).
`
`2118/025100-0032
`8429083.1 a05/15/15
`
`
`A-6
`
`UniKey Exhibit 1003, Page 6
`
`

`

`Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 7 of 21 Page ID #:361
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Kwikset’s Proposed Construction
`
`“automatic Acting or operating in a manner
`essentially independent of external influence or
`control.” American Heritage® Dictionary of the
`English Language (Fifth Edition 2011). retrieved
`February 24 2015 at
`http://www.thefreedictionary.com/automatic.
`
`Term
`
`Plaintiffs’ Proposed Construction
`modulation/demodulation unit 230 then sends the
`demodulated update signal to processor 204. The
`processor updates the memory 200 to reflect the
`change that was made at the controller 102 in step
`320.”
`[‘778 Patent at 9:36-10:6]
`
`“Referring now to FIG. 4, another method of
`updating, enabling, and/or revoking the credentials
`of a mobile device 112 will be described in
`accordance with embodiments of the present
`invention. The method starts at step 400 and
`proceeds to step 404 where a time interval
`between credential updates is determined. The
`time period may vary depending upon the
`requirements and security needs of the system
`100. For example, the interval may be set to
`update credentials every second, minute, hour, day
`or a variation thereof.”
`[‘778 Patent at 10:7-15]
`
`Extrinsic Evidence
`Dr. Richard Mihran may testify that this term does
`not need construction. Dr. Mihran may also
`testify that if the term is construed, Plaintiff’s
`proposed construction is consistent with what a
`person of ordinary skill in the art at the time of the
`invention would understand this term to mean.
`
`2118/025100-0032
`8429083.1 a05/15/15
`
`
`A-7
`
`UniKey Exhibit 1003, Page 7
`
`

`

`Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 8 of 21 Page ID #:362
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Term
`
`Plaintiffs’ Proposed Construction
`
`Kwikset’s Proposed Construction
`
`“Credential(s)”
`[‘778 Patent claim 1, 5, 6,
`9, 14, 16, 18, 22, 28, 31;
`‘374 Patent claim 1, 3, 13,
`14, 15, 16, 29]
`
`No construction necessary, but if construed:
`“data, set of data, encryption scheme, key,
`transmission protocol, and/or the like, used by
`a particular mobile device to verify its
`authenticity with a reader/interrogator”
`
`Intrinsic Evidence
`“As used herein, a “credential” or “credential
`information” is any data, set of data, encryption
`scheme, key, and/or transmission protocol used by
`a particular mobile device to verify its authenticity
`with a reader/interrogator.”
`[‘778 Patent at 3:43-46]
`
`“As noted above, credential information can
`include any data, set of data, encryption schemes,
`keys, transmission protocol, and the like, used by a
`particular mobile device 112 to verify its
`authenticity to a reader 108. ”
`[‘778 Patent at 9:41-44]
`
`“[C]redential information stored on a mobile
`device includes, at least partially, self-
`authenticating data, that the self-authenticating
`data is different after it has been changed or
`altered and that the self-authenticating data
`
`
`“any data, set of data, encryption scheme, key,
`and/or transmission protocol stored on a
`mobile device and used to verify its authenticity
`with a reader/interrogator”
`
`Intrinsic Evidence
`Claim 3, 20 in ’778 Patent.
`Claims 3, 4, 14, 16, 30 in ’374 Patent.
`
`Col. 3:43-46.
`Col. 8:8-12.
`Col. 9:13-15.
`Col. 9:41-47.
`Col. 10:19-22.
`Col. 10:60-64.
`’374 Patent File History, Response to Office
`Action dated Sept. 26, 2011, pg. 10.
`[AA0001137].
`
`’374 Patent File History, Response to Office
`Action dated Sept. 26, 2011, pg. 11.
`[AA0001138].
`
`’778 Patent File History, Office Action Response
`dated January 28, 2009, pg. 3. [AA0000126].
`
`
`Extrinsic Evidence
`
`2118/025100-0032
`8429083.1 a05/15/15
`
`
`A-8
`
`UniKey Exhibit 1003, Page 8
`
`

`

`Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 9 of 21 Page ID #:363
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Term
`
`Plaintiffs’ Proposed Construction
`enables the mobile device to make a determination
`of its own access rights with respect to an asset.”
`[Dec. 1, 2009 Response to Office Action at 12
`(AA0000350)]
`
`Dr. Richard Mihran may testify that this term does
`not need construction. Dr. Mihran may also
`testify that if the term is construed, Plaintiff’s
`proposed construction is consistent with what a
`person of ordinary skill in the art at the time of the
`invention would understand this term to mean.
`
`Kwikset’s Proposed Construction
`
`’778 EPO Equivalent File History, Response to
`EPO Communication dated Feb. 23, 2015, pg. 3.
`
`’778 Canadian Equivalent File History, Response
`to Requisition for Appn. 2,647,713 dated May 8,
`2013, pg. 3.
`
`’778 Canadian Equivalent File History, Response
`to Requisition for Appn. 2,647,713 dated May 8,
`2013, pg. 4.
`
`Edward Tittel may provide testimony in support of
`Plaintiffs construction. Mr. Tittel will rely upon
`the asserted claims, specification, drawings and
`file history of the '778 Patent to support his
`testimony. In addition, Mr. Tittel may rely upon
`the IEEE Standard Dictionary: Glossary of Terms
`and Definitions (2009), Microsoft Computer
`Dictionary, (5th ed. 2002), EPO and Canadian
`equivalent file histories for the ’778 Patent,
`Chaum, David. “Zero-knowledge undeniable
`signatures.” Advances in Cryptology—
`EUROCRYPT’90. Springer Berlin Heidelberg,
`1991, U.S. Patent 6,170,744, U.S. Patent
`6,229,806, U.S. Patent 5,781,629, and Schneier,
`Bruce, Applied Cryptography: Protocols,
`Algorithms and Source Code, C, J Wiley & Sons,
`1996.
`
`“authentication data
`
`2118/025100-0032
`8429083.1 a05/15/15
`
`
`A-9
`
`UniKey Exhibit 1003, Page 9
`
`

`

`Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 10 of 21 Page ID
` #:364
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Term
`
`Plaintiffs’ Proposed Construction
`
`Kwikset’s Proposed Construction
`Information used to verify a claimed identity.”
`IEEE Standard Dictionary: Glossary of Terms and
`Definitions (2009) quoting IEEE Std 2600-2008
`IEEE Standard for Information Technology:
`Hardcopy Device and System Security.
`
`“credential A form of authentication data that
`specifies basic identifying information about a
`user or application. Credentials may be bound in
`some way to the individual to whom they were
`issued, or they may be bearer credentials. The
`former are necessary for identification, while the
`latter may be acceptable for some forms of
`authorization.” IEEE Standard Dictionary:
`Glossary of Terms and Definitions (2009) quoting
`IEEE Std 2600-2008 IEEE Standard for
`Information Technology: Hardcopy Device and
`System Security.
`
`“credentials A set of information that includes
`identification and proof of identification that is
`used to gain access to local and network resources.
`Examples of credentials are user names and
`passwords, smart cards and certificates.” Microsoft
`Computer Dictionary 133 (5th ed. 2002).
`
`
`“credential data”
`[‘374 Patent claim 1, 3;
`’778 Patent claim 1]
`
`No construction necessary, but if construed:
`“data representing a credential”
`
`
`Defendant proposes the same construction for
`“credential data” and “credential” (above) for
`the same reasons set forth for “credential”
`above.
`
`2118/025100-0032
`8429083.1 a05/15/15
`
`
`A-10
`
`UniKey Exhibit 1003, Page 10
`
`

`

`Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 11 of 21 Page ID
` #:365
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Kwikset’s Proposed Construction
`
`
`Term
`
`
`
`
`
`Plaintiffs’ Proposed Construction
`
`
`
`Intrinsic Evidence
`“The present invention is generally directed
`toward a mobile device that can be used in a
`secure access system. More specifically, the
`mobile device can have credential data loaded
`thereon remotely updated, enabled, disabled,
`revoked, or otherwise altered with a message sent
`from, for example, a control panel and/or
`controller in the system.”
`(Abstract)
`
`“As used herein, a “credential” or “credential
`information” is any data, set of data, encryption
`scheme, key, and/or transmission protocol used by
`a particular mobile device to verify its authenticity
`with a reader/interrogator.”
`[‘778 Patent at 3:43-46]
`
`“As noted above, credential information can
`include any data, set of data, encryption schemes,
`keys, transmission protocol, and the like, used by a
`particular mobile device 112 to verify its
`authenticity to a reader 108. ”
`
`2118/025100-0032
`8429083.1 a05/15/15
`
`
`A-11
`
`UniKey Exhibit 1003, Page 11
`
`

`

`Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 12 of 21 Page ID
` #:366
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Kwikset’s Proposed Construction
`
`Term
`
`Plaintiffs’ Proposed Construction
`[‘778 Patent at 9:41-44]
`
`“The method of claim 3, wherein the first set of
`credential data has at least one of a key, password,
`unique ID, encryption scheme, and transmission
`protocol that is different in the second set of
`credential data.” [‘374 Patent, Claim 4]
`
`“[C]redential information stored on a mobile
`device includes, at least partially, self-
`authenticating data, that the self-authenticating
`data is different after it has been changed or
`altered and that the self-authenticating data
`enables the mobile device to make a determination
`of its own access rights with respect to an asset.”
`[Dec. 1, 2009 Response to Office Action at 12
`(AA0000350)]
`
`Extrinsic Evidence
`Dr. Richard Mihran may testify that this term does
`not need construction. Dr. Mihran may also
`testify that if the term is construed, Plaintiff’s
`proposed construction is consistent with what a
`person of ordinary skill in the art at the time of the
`invention would understand this term to mean.
`
`“mobile device”
`
`“a portable, wireless communication device
`having user input and a display screen”
`
`“device that uses a communications network to
`receive credentials”
`
`2118/025100-0032
`8429083.1 a05/15/15
`
`
`A-12
`
`UniKey Exhibit 1003, Page 12
`
`

`

`Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 13 of 21 Page ID
` #:367
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Term
`[‘778 Patent claim 1, 4, 6,
`12, 14, 16-18, 23-25, 28,
`31, 33; ‘374 Patent claim
`1, 3, 5, 11-16, 21-23, 26,
`29, 30]
`
`Plaintiffs’ Proposed Construction
`
`Intrinsic Evidence
`“In most global system for mobile communication
`(GSM) devices, e.g., mobile phones, there is a
`Subscriber Identification Module (SIM) that is a
`secure memory containing all of the owner's
`account information, as well as space available for
`additional applications such as an electronic purse
`for e-commerce. This memory is accessible from
`outside of the mobile device, i.e., remotely.
`Mobile devices carry a secure memory much like
`smart cards or the like and the new applications in
`NFC protocols enable the mobile device to
`perform functions like smart cards. The ability to
`have a mobile device also operate as a smart card
`creates a variety of new applications for the
`device.”
`[‘778 Patent at 2:9-20]
`
`“Bi-directional RF interfaces 120 between a reader
`108 and a mobile device 112 are automatically
`established when the mobile device 112 is placed
`within an active zone (not shown) of the
`interrogating reader 108. The active zone of the
`reader 108 is defined as a three dimensional space
`where the intensity of RF signals emitted by the
`reader exceeds a threshold of sensitivity of the
`mobile device 112 exceeds a threshold of
`sensitivity of the reader 108. The interface 120
`
`Kwikset’s Proposed Construction
`
`Intrinsic Evidence
`Claims 10, 11, 24, 25 in ’778 Patent.
`Claims 3, 11, 12 in ’374 Patent.
`
`Col. 6:46-59.
`Col. 6:60- Col. 7:8.
`Col. 8:29-31.
`Col. 10:51-64.
`Col. 10:65-11:6.
`
`’374 Patent File History, Response to Office
`Action dated Sept. 26, 2011, pg. 10.
`[AA0001137].
`
`’374 Patent File History, Response to Office
`Action dated Sept. 26, 2011, pg. 11.
`[AA0001138].
`
`’778 Patent File History, Office Action Response
`dated July 1, 2009, pg. 11. [AA0000161].
`
`’778 Patent File History, Office Action Response
`dated July 1, 2009, pg. 13. [AA0000163].
`
`’778 Patent File History, Office Action Response
`dated January 28, 2009, pg. 3. [AA0000126].
`
`Extrinsic Evidence
`
`2118/025100-0032
`8429083.1 a05/15/15
`
`
`A-13
`
`UniKey Exhibit 1003, Page 13
`
`

`

`Term
`
`Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 14 of 21 Page ID
` #:368
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Plaintiffs’ Proposed Construction
`shown can be between one or a number of readers
`108 and one or a number of mobile devices 11.
`Furthermore, the interface 120 may utilize known
`methods and protocols including NFC protocol,
`Infra Red communication methods, Bluetooth,
`ZigBee, GSM, WiFi, and/or other protocols
`known to those of skill in the art.”
`[‘778 Patent at 5:36-50]
`
`“In addition to being proximity readers (e.g.
`readers that verify authenticity of smart cards,
`mobile devices and the like) the readers 108 may
`also have additional functionality. The readers
`108 may include a keypad or other user input
`devices for receipt of additional user known
`passwords, contact card identification devices, and
`biometric authentication devices including voice
`recognition, retina scanners, finger print analyzers,
`facial feature analyzers, and the like.”
`
`[‘778 Patent at 6:25-32]
`
`“Acceptable mobile devices 112 include, mobile
`cellular phones, personal digital assistants (PDAs),
`Blackberrys™, or any other mobile
`communication device that can be enabled for use
`in the access system 100 described. Essentially,
`the mobile device 112 can perform functions
`
`Kwikset’s Proposed Construction
`
`’778 EPO Equivalent File History, Response to
`EPO Communication dated Feb. 23, 2015, pg. 3.
`
`’778 Canadian Equivalent File History, Response
`to Requisition for Appn. 2,647,713 dated May 8,
`2013, pg. 3.
`
`’778 Canadian Equivalent File History, Response
`to Requisition for Appn. 2,647,713 dated May 8,
`2013, pg. 4.
`
`Edward Tittel may provide testimony in support of
`Plaintiffs construction. Mr. Tittel will rely upon
`the asserted claims, specification, drawings and
`file history of the '778 Patent to support his
`testimony. In addition, Mr. Tittel may rely upon
`the IEEE Standard Dictionary: Glossary of Terms
`and Definitions (2009), EPO and Canadian
`equivalent file histories for the ’778 Patent,
`Chaum, David. “Zero-knowledge undeniable
`signatures.” Advances in Cryptology—
`EUROCRYPT’90. Springer Berlin Heidelberg,
`1991, U.S. Patent 6,170,744, U.S. Patent
`6,229,806, U.S. Patent 5,781,629, and Schneier,
`Bruce, Applied Cryptography: Protocols,
`Algorithms and Source Code, C, J Wiley & Sons,
`1996.
`
`“mobile device A device that uses network
`communications while in motion.” IEEE Standard
`Dictionary: Glossary of Terms and Definitions
`
`2118/025100-0032
`8429083.1 a05/15/15
`
`
`A-14
`
`UniKey Exhibit 1003, Page 14
`
`

`

`Term
`
`Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 15 of 21 Page ID
` #:369
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Plaintiffs’ Proposed Construction
`associated with typical mobile devices and can
`also act like a smart card, RFID, or other type of
`identification device.”
`[‘778 Patent at 6:47-54]
`
`“FIG. 2 is a block diagram depicting a mobile
`device in accordance with embodiments of the
`present invention;”
`[‘778 Patent at 4:44-45]
`
`Kwikset’s Proposed Construction
`(2009) quoting IEEE Std 802.15.3™-2003 Part
`15.3: Wireless Medium Access Control (MAC)
`and Physical Layer (PHY) Specifications for High
`Rate Wireless Personal Area Networks (WPANs).
`
`
`“mobile device A device whose logical location in
`the network may change during use.” IEEE
`Standard Dictionary: Glossary of Terms and
`Definitions (2009) quoting IEEE Std 802.15.4™-
`2006 IEEE Standard for Information technology—
`Telecommunications and information exchange
`between systems—Local and metropolitan area
`networks—Specific requirements— and Part 15.4:
`Wireless Medium Access Control (MAC) and
`Physical Layer.
`
`
`
`
`“Referring now to FIG. 2, an exemplary mobile
`device 112 will be described in accordance with
`embodiments of the present invention. In the
`depicted embodiment, the mobile device 112
`comprises a memory 200, a processor 204, an RF
`receiver/transmitter 208 including an RF
`modulation/demodulation unit 212 and an RF
`
`A-15
`
`2118/025100-0032
`8429083.1 a05/15/15
`
`
`UniKey Exhibit 1003, Page 15
`
`

`

`Case 8:14-cv-00947-CJC-DFM Document 30-1 Filed 05/15/15 Page 16 of 21 Page ID
` #:370
`Joint Claim Construction Statement -- Exhibit A
`Case No.: SACV-14-00947-CJC (DFMx)
`
`Term
`
`“self-authenticating data”
`
`2118/025100-0032
`8429083.1 a05/15/15
`
`
`Plaintiffs’ Proposed Construction
`antenna 216 for communication with a reader 108,
`an RF receiver/transmitter 230 including an
`antenna 226 and an RF modulation/demodulation
`unit 230 for communication with the
`communication network 116, an optional RF
`rectifier 220, and a power source 224. The
`processor 204 (e.g., an application specific
`integrated circuit (ASIC), microprocessor,
`programmable controller, or the like) uses bi-
`directional interfaces to communicate with various
`other parts of the mobile device 112.”
`[‘778 Patent at 7:9-23]
`
`“A power source 224 is also available to supply
`power to any other component of the mobile
`device 112 depicted or not depicted.”
`[‘778 Patent at 9:20-22]
`
`Extrinsic Evidence
`en.wikipedia.org/wiki/Mobile_device
`Dr. Richard Mihran may testify that Plaintiff’s
`proposed construction is consistent with what a
`person of ordinary skill in the art at the time of the
`invention wou

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket