Motorola Mobility, Inc. v. Apple, Inc.

Filing 162

NOTICE by Apple, Inc. Defendant and Counterclaim-Plaintiff Apple Inc.'s Response to the Court's October 24, 2011 Order and Notice of Filing of Motorola's May 13, 2011 Infringement Contentions (Attachments: # 1 Exhibit Motorola's Preliminary Infringement Contentions, # 2 Exhibit A - Motorola's Preliminary Infringement Contentions, # 3 Exhibit B - Motorola's Preliminary Infringement Contentions, # 4 Exhibit C - Motorola's Preliminary Infringement Contentions, # 5 Exhibit D - Motorola's Preliminary Infringement Contentions, # 6 Exhibit E - Motorola's Preliminary Infringement Contentions, # 7 Exhibit F - Motorola's Preliminary Infringement Contentions)(Pace, Christopher)

Download PDF
Exhibit D UNITED STATES PATENT NO. 6,008,737 PRELIMINARY INFRINGEMENT CONTENTIONS1 Accused Apple Products:2 Apple iPhone 3G, 3GS, and 4G , Apple iPad, Apple iPad with 3G, Apple iPad 2, Apple iPad 2 with 3G, Apple iPod Touch (collectively, "Apple Phones"), Apple MacBook, Apple MacBook Pro, Apple MacBook Air, Apple iMac, Apple Mac Mini, and Apple Mac Pro (collectively, "Apple Computers"). ‘737 Patent Claim Accused Apple Products 9. A portable communication device in a communication system having a fixed portion, the portable communication device comprising: Upon information and belief, Apple imports, manufactures, sells, offers to sell, and uses the Accused Apple Products, which area portable communication devices. Moreover, the Accused Apple Products operate in the normal course of use in a communication system having a fixed portion. See, e.g., iPhone 4 Technical Specifications, (http://www.apple.com/iphone/specs.html), accessed on May 12, 2011, MOTO-APPLE-0006037953_126659: 1 Motorola Mobility's investigation is ongoing and discovery and claim construction are not yet complete. Mobility reserves the right to supplement or amend these contentions with contentions arising under the doctrine of equivalents in response to any proposed or ordered claim construction, subsequent discovery response or production, or subsequent disclosure made pursuant to FRCP 26. 2 This list of Accused Apple Products was created based on publicly available information. Motorola Mobility reserves the right to supplement this list of Accused Apple Products. 1 Exhibit D ‘737 Patent Claim Accused Apple Products See also e.g., Apple iPad Technical Specifications, (www.apple.com/ipad/specs), accessed on April 12, 2011, MOTO-APPLE-0005383110_35376: See also, e.g., MacBook Pro 15" Core 2 Duo Model A1211 Teardown, (http://www.ifixit.com/Teardown/MacBook-Pro-15Inch-Core-2-Duo-Model-A1211-Teardown/593/1), accessed on May 14, 2011, MOTO-APPLE-0006037953_127250: 2 Exhibit D ‘737 Patent Claim Accused Apple Products a processor; Upon information and belief, the Apple Phones contain a variety of different processors, such a an Apple A4 processor, and Apple Computers contain a variety of different processors, such as the 2.4GHz Intel Core 2 Duo processor. See, e.g., (http://www.apple.com/channel/iphone/iphone-4/bestbuy/design.html), accessed May 12, 2011, MOTO-APPLE0006037953_127201: See also e.g., Apple iPad Technical Specifications, (www.apple.com/ipad/specs), accessed on April 12, 2011, MOTO-APPLE-0005383110_35376: See also, e.g., MacBook Pro 15" Core 2 Duo Model A1211 Teardown, (http://www.ifixit.com/Teardown/MacBook-Pro-15Inch-Core-2-Duo-Model-A1211-Teardown/593/1), accessed on May 14, 2011, MOTO-APPLE-0006037953_127248: 3 Exhibit D ‘737 Patent Claim Accused Apple Products an authorization element Upon information and belief, the Accused Apple Products contain coupled to the processor for an authorization element coupled to the processor for obtaining obtaining usage authorization usage authorization for utilizing software: for utilizing software in the portable communication device, iPhone in Business: Security Overview, MOTO-APPLE0006037953_126666. See also iPhone in Business: Digital Certificates, MOTO-APPLE0006037953_126669: 4 Exhibit D ‘737 Patent Claim Accused Apple Products See also id.: See also Distributing Enterprise Apps for iOS 4 Devices, (http://developer.apple.com/library/ios/#featuredarticles/FA_Wire less_Enterprise_App_Distribution/Introduction/Introduction.html ), accessed on May 12, 2011, MOTO-APPLE0006037953_126598: "Certificate Validation. The first time an application is opened on a device, the distribution certificate is validated by contacting Apple's OCSP server. Unless the certificate has been revoked, the app is allowed to run. Inability to contact or get a response from the OCSP server is not interpreted as a revocation. To verify the status, the device must be able to reach ocsp.apple.com. See 'Network Configuration Requirements.' The OCSP response is cached on the device for the period of time specified by the OCSP server; currently between 3 and 7 days. The validity of the certificate will not be checked again until the device has restarted and the cached response has expired. If a revocation is received at that time, the app will be prevented from running. Note that revoking a distribution certificate will invalidate all of the applications you have distributed. An app will not run if the distribution certificate has expired. Currently, distribution certificates are valid for one year. A few weeks before your certificate expires request a new distribution certificate from the Dev Center, use it create new distribution provisioning profiles, then recompile and distribute the updated apps to your users. See 'Providing Updated Apps.'" See e.g., Communications with the Apple App store. in which the authorization Upon information and belief, the authorization element in the 5 Exhibit D ‘737 Patent Claim element generates an external authorization request, and Accused Apple Products Accused Apple Products generates an external authorization request. For example, the digital certificate (authorization element) is validated by contacting an external OCSP server (external authorization request) upon initial opening, and by a runtime check (external authorization request) at each time of use. See Distributing Enterprise Apps for iOS 4 Devices, (http://developer.apple.com/library/ios/#featuredarticles/FA_Wire less_Enterprise_App_Distribution/Introduction/Introduction.html ), accessed on May 12, 2011, MOTO-APPLE0006037953_126598: "Certificate Validation. The first time an application is opened on a device, the distribution certificate is validated by contacting Apple's OCSP server. Unless the certificate has been revoked, the app is allowed to run. Inability to contact or get a response from the OCSP server is not interpreted as a revocation. To verify the status, the device must be able to reach ocsp.apple.com. See 'Network Configuration Requirements.' The OCSP response is cached on the device for the period of time specified by the OCSP server; currently between 3 and 7 days. The validity of the certificate will not be checked again until the device has restarted and the cached response has expired. If a revocation is received at that time, the app will be prevented from running. Note that revoking a distribution certificate will invalidate all of the applications you have distributed. An app will not run if the distribution certificate has expired. Currently, distribution certificates are valid for one year. A few weeks before your certificate expires request a new distribution certificate from the Dev Center, use it create new distribution provisioning profiles, then recompile and distribute the updated apps to your users. See 'Providing Updated Apps.'" See also iPhone in Business: Security Overview, MOTO-APPLE0006037953_126666: 6 Exhibit D ‘737 Patent Claim Accused Apple Products See also iPhone in Business: Digital Certificates, MOTO-APPLE0006037953_126669: in which the authorization element communicates with the fixed portion to obtain the usage authorization in response to the external authorization request, and Upon information and belief, the authorization element in the Accused Apple Products communicates with the fixed portion to obtain the usage authorization in response to the external authorization request. For example, the digital certificate (authorization element) is validated by contacting an external OCSP server (communication to fixed portion to obtain usage authorization) upon initial opening, and by a runtime check (external authorization request) at each time of use. See, e.g., Distributing Enterprise Apps for iOS 4 Devices, (http://developer.apple.com/library/ios/#featuredarticles/FA_Wire less_Enterprise_App_Distribution/Introduction/Introduction.html ), accessed on May 12, 2011, MOTO-APPLE0006037953_126598: "Certificate Validation. The first time an application is opened on a device, the distribution certificate is validated by contacting Apple's OCSP server. Unless the certificate has been revoked, the app is allowed to run. Inability to contact or get a response from the OCSP server is not interpreted as a revocation. To verify the status, the device must be able to reach ocsp.apple.com. See 'Network Configuration Requirements.' 7 Exhibit D ‘737 Patent Claim Accused Apple Products The OCSP response is cached on the device for the period of time specified by the OCSP server; currently between 3 and 7 days. The validity of the certificate will not be checked again until the device has restarted and the cached response has expired. If a revocation is received at that time, the app will be prevented from running. Note that revoking a distribution certificate will invalidate all of the applications you have distributed. An app will not run if the distribution certificate has expired. Currently, distribution certificates are valid for one year. A few weeks before your certificate expires request a new distribution certificate from the Dev Center, use it create new distribution provisioning profiles, then recompile and distribute the updated apps to your users. See 'Providing Updated Apps.'" See also iPhone in Business: Security Overview, MOTO-APPLE0006037953_126666: See also iPhone in Business: Digital Certificates, MOTO-APPLE0006037953_126669: in which the external authorization request includes at least one of: an address identifying the Upon information and belief, the external authorization request includes at least one of: an address identifying the portable communication device, a software name and a size of the software. 8 Exhibit D ‘737 Patent Claim Accused Apple Products portable communication device, a software name For example, an X.509 digital certificate for an iPhone 4 and a size of the software; “enforces a trust policy referred to as the S/MIME policy, which and specifies that in order to be trusted to verify a digitally signed email, a certificate must contain an email address that matches the address of the sender of the email.” Security Concepts, (http://developer.apple.com/library/ios/#documentation/Security/ Conceptual/Security_Overview/Concepts/Concepts.html), accessed on May 13, 2011, MOTO-APPLE-0006037953_126611. See id. at MOTO-APPLE-0006037953_126608: "A digital certificate is a collection of data used to verify the identity of the holder or sender of the certificate: For example, an X.509 certificate contains such information as: • Version • Serial number • Certificate issuer • Certificate holder • Validity period (the certificate is not valid before or after this period) • Attributes, known as certificate extension, that contain additional information such as allowable uses for this certificate • Digital signature from the certification authority to ensure that the certificate has not been altered and to indicate the identity of the issuer • Public key of the owner of the certificate • Message digest algorithm used to create the signature." See also Distributing Enterprise Apps for iOS 4 Devices, (http://developer.apple.com/library/ios/#featuredarticles/FA_Wire less_Enterprise_App_Distribution/Introduction/Introduction.html ), accessed on May 12, 2011, MOTO-APPLE0006037953_126598: "Certificate Validation. The first time an application is opened on a device, the distribution certificate is validated by contacting Apple's OCSP server. Unless the certificate has been revoked, the app is allowed to run. Inability to contact or get a response from the OCSP server is not interpreted as a revocation. To verify the status, the device must be able to reach ocsp.apple.com. See 'Network 9 Exhibit D ‘737 Patent Claim Accused Apple Products Configuration Requirements.' The OCSP response is cached on the device for the period of time specified by the OCSP server; currently between 3 and 7 days. The validity of the certificate will not be checked again until the device has restarted and the cached response has expired. If a revocation is received at that time, the app will be prevented from running. Note that revoking a distribution certificate will invalidate all of the applications you have distributed. An app will not run if the distribution certificate has expired. Currently, distribution certificates are valid for one year. A few weeks before your certificate expires request a new distribution certificate from the Dev Center, use it create new distribution provisioning profiles, then recompile and distribute the updated apps to your users. See 'Providing Updated Apps.'" second authorization element Upon information and belief, the Accused Apple Products contain coupled to the processor for a second authorization element coupled to the processor for allowing utilization of the allowing utilization of the software, in response to an software, in response to authorization being obtained from the fixed portion. usage authorization being obtained from the fixed For example, the iPhone 4 software application is allowed to run portion. (second authorization element) once the digital certificate is authorized (usage authorization obtained from fixed portion. See, e.g., Distributing Enterprise Apps for iOS 4 Devices, (http://developer.apple.com/library/ios/#featuredarticles/FA_Wire less_Enterprise_App_Distribution/Introduction/Introduction.html ), accessed on May 12, 2011, MOTO-APPLE0006037953_126598: "Certificate Validation. The first time an application is opened on a device, the distribution certificate is validated by contacting Apple's OCSP server. Unless the certificate has been revoked, the app is allowed to run. Inability to contact or get a response from the OCSP server is not interpreted as a revocation. To verify the status, the device must be able to reach ocsp.apple.com. See 'Network Configuration Requirements.' The OCSP response is cached on the device for the period of time specified by the OCSP server; currently between 3 and 7 days. The validity of the certificate will not be 10 Exhibit D ‘737 Patent Claim Accused Apple Products checked again until the device has restarted and the cached response has expired. If a revocation is received at that time, the app will be prevented from running. Note that revoking a distribution certificate will invalidate all of the applications you have distributed. An app will not run if the distribution certificate has expired. Currently, distribution certificates are valid for one year. A few weeks before your certificate expires request a new distribution certificate from the Dev Center, use it create new distribution provisioning profiles, then recompile and distribute the updated apps to your users. See 'Providing Updated Apps.'" 11

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?