Uniloc AirDrop Patent Suit
Uniloc AirDrop Patent Suit
Plaintiffs, Uniloc 2017 LLC and Uniloc Licensing USA, LLC (together, “Uniloc”), for
THE PARTIES
business at 1209 Orange Street, Wilmington, Delaware 19801, 620 Newport Center Drive,
Newport Beach, California 92660, and 102 N. College Avenue, Suite 303, Tyler, Texas 75702.
2. Uniloc Licensing USA, LLC is a Delaware limited liability company, having places
of business at 1209 Orange Street, Wilmington, Delaware 19801, 620 Newport Center Drive,
Newport Beach, California 92660, and 102 N. College Avenue, Suite 303, Tyler, Texas 75702.
3. Uniloc holds all substantial rights, title, and interest in and to U.S. Patent No.
7,136,999.
at 12535 Riata Vista Circle and 5501 West Parmer Lane, Austin, Texas. Apple uses, offers for
sale, sells and imports the products accused of infringement herein for sale to customers in this
judicial district and elsewhere in the United States. Apple may be served with process through
3050711.v1
              Case 1:18-cv-00838-LY Document 1 Filed 10/03/18 Page 2 of 8
its registered agent for service in Texas: CT Corporation System, 1999 Bryant Street, Suite 900,
JURISDICTION
5. Uniloc brings this action for patent infringement under the patent laws of the United
States, 35 U.S.C. § 271, et seq. This Court has subject matter jurisdiction under 28 U.S.C. §§ 1331
and 1338(a).
                                     COUNT I
                      (INFRINGEMENT OF U.S. PATENT NO. 7,136,999)
7. Uniloc 2017 LLC is the owner by assignment of U.S. Patent No. 7,136,999 entitled
on November 14, 2006 (“the ’999 Patent”). A copy of the ’999 Patent is attached as Exhibit A.
8. Uniloc Licensing USA, LLC is the exclusive licensee of the ’999 Patent, with
ownership of all substantial rights, including the right to grant sublicenses, to exclude others, and
9. The ’999 Patent describes in detail and claims in various ways inventions in
10. The ’999 Patent describes problems and shortcomings in the then-existing field of
providing security in communications between devices using Bluetooth. See, e.g., Ex. A at 1:54-
59. The ’999 Patent describes and claims novel and inventive technological improvements and
solutions described and claimed in the ’999 Patent were not conventional or generic at the time of
                                                  2
3050711.v1
              Case 1:18-cv-00838-LY Document 1 Filed 10/03/18 Page 3 of 8
their respective inventions but involved novel and non-obvious approaches to the problems and
12. The inventions claimed in the ’999 Patent involve and cover more than just the
performance of well-understood, routine, and conventional activities known to the industry prior
to the invention of such novel and non-obvious methods, systems, and devices.
13. The inventions claimed in the ’999 Patent represent technological solutions to
technological problems. The written description of the ’999 Patent describes in technical detail
each of the limitations of the claims, allowing a person of ordinary skill in the art to understand
what the limitations cover and how the non-conventional and non-generic combination of claim
elements differ markedly from and improved upon what may have been considered conventional
or generic.
14. Apple uses, offers for sale, sells and imports electronic devices that use Apple’s
AirDrop feature to share between such devices photos, videos, contacts, voice memos and location,
including the following: iPhone5, iPhone 5c, iPhone 5s, iPhone 6, iPhone 6 Plus, iPhone 6s, iPhone
6s Plus, iPhone SE, iPhone 7, iPhone 7 Plus, iPhone 8, iPhone 8 Plus, iPhone X, iPhone XR,
iPhone XS, iPhone XS Max; iPad (4th, 5th gen.), iPad Mini, iPad Mini 2, iPad Mini 3, iPad Mini
4, iPad Pro, iPad Air, iPad Air 2, MacBook, MacBook Air (11 inches, 13 inches), MacBook Pro
(13 and 15 inches), iMac (21.5 and 27 inches), Mac Mini, Mac Pro; iPod (5th gen.) and iPod touch
15. The Accused Infringing Devices include Bluetooth and WiFi functionality and use
Apple’s AirDrop feature to exchange data, such as photos, videos, contacts, voice memos, and
                                                 3
3050711.v1
               Case 1:18-cv-00838-LY Document 1 Filed 10/03/18 Page 4 of 8
16. When in range of WiFi or Bluetooth, users enable AirDrop by tapping on the
AirDrop button on a first Accused Infringing Device (e.g., an iPhone). When AirDrop is enabled,
a 2048-bit RSA identity is stored on the user’s first Accused Infringing Device (e.g., an iPhone,
iPad, or a MacBook) and an AirDrop identity hash is created based on the email address and phone
17. Once AirDrop has been enabled, the first Accused Infringing Device emits an
AirDrop advertisement signal over Bluetooth, and a second Accused Infringing Device (e.g., an
iPhone, iPad, or MacBook) with AirDrop-enabled that is located within range of the signal
responds by sending over Bluetooth a shortened version of its own identity hash.
18. If the second Accused Infringing Device’s shortened identity hash is recognized as
a contact by the first Accused Infringing Device, the first Accused Infringing Device creates a
peer-to-peer WiFi network (e.g., WiFi Direct) over which the second Accused Infringing Device
sends its full identity hash to the first Accused Infringing Device. If the second Accused Infringing
Device’s full identity hash is recognized by the first Accused Infringing Device, the second
Accused Infringing Device user’s identity is displayed on the first Accused Infringing Device share
sheet.
19. To send, for example, a photo to the second Accused Infringing Device, the user
taps on the selected photo, the share button, and then the AirDrop button on the first Accused
Infringing Device. The first Accused Infringing Device displays any AirDrop enabled devices
within range that are recognized by the first Accused Infringing Device as a contact (or each such
20. Once the second Accused Infringing Device’s identity has been confirmed as
described above, by tapping on the displayed intended recipient’s button on the first Accused
                                                  4
3050711.v1
              Case 1:18-cv-00838-LY Document 1 Filed 10/03/18 Page 5 of 8
Infringing Device the photo is sent over the direct WiFi channel (enabled by Bonjour) to the second
21. Apple has infringed and continues to infringe the ’999 Patent in the United States,
including claims 13 and 17, by using, offering for sale, selling and importing the Accused
22. Apple has also infringed and continues to infringe numerous claims of the ’999
Patent, including claims 13 and 17, by actively inducing others to import, use, offer for sale and
sell the Accused Infringing Devices. Apple’s customers who use the AirDrop feature of the
Accused Infringing Devices, as described above, in accordance with Apple’s instructions infringe
claims 13 and 17 of the ’999 Patent, in violation of 35 U.S.C. § 271(a). Apple intentionally,
directly and/or indirectly instructs its customers to use the Accused Infringing Devices in an
infringing manner through training videos, demonstrations, brochures, installation, and user
• www.apple.com
• www.apple.com/ipad-pro/
• www.apple.com/ipad-mini-4/ios//
• www.apple.com/safari/
• www.apple.com/imovie/
• www.apple.com/macos/photos/
• https://support.apple.com/en-us/HT203106
• https://support.apple.com/en-us/HT204144
• https://support.apple.com/en-us/HT204289
• https://support.apple.com/kb/PH14580
                                                  5
3050711.v1
              Case 1:18-cv-00838-LY Document 1 Filed 10/03/18 Page 6 of 8
• https://support.apple.com/kb/PH24625
• https://support.apple.com/kb/PH26768
• https://support.apple.com/kb/PH26789
• https://help.apple.com/iphone/12/#/iphb658714b9
• https://help.apple.com/iphone/11/#/iphb658714b9
• https://help.apple.com/iphone/10/#/iphb658714b9
• https://help.apple.com/iphone/9/#/iphf28f17237
• https://help.apple.com/ipad/12/#/iPadf84aaf63
• https://help.apple.com/ipad/11/#/iPadf84aaf63
• https://help.apple.com/ipad/10/#/iPadf84aaf63
• https://help.apple.com/macbook/late-2018/#/apd8dc9cb47a
• https://help.apple.com/macbook/early2018/#/apd8dc9cb47a
• https://help.apple.com/ipod-touch/12/#/iphb658714b9
• https://help.apple.com/ipod-touch/11/#/iphb658714b9
• https://support.apple.com/business/site/docs/iOS_Security_Guide.pdf
• www.youtube.com
• www.youtube.com/watch?v=CVLdVmUiqqU
Apple also induces infringement by failing to remove or distinguish the infringing features of the
Accused Infringing Devices. Apple is thereby liable for infringement of the ’999 Patent under 35
U.S.C. § 271(b).
23. Apple has also infringed, and continues to infringe, claims 13 and 17 of the ’999
Patent by selling, offering for sale and importing the Accused Infringing Devices, which devices
are used in practicing the processes, or using the systems, of the ’999 Patent and constitute a
                                                 6
3050711.v1
              Case 1:18-cv-00838-LY Document 1 Filed 10/03/18 Page 7 of 8
material part of the invention. Apple knows that portions of the software contained in the Accused
Infringing Devices are especially made, or especially adapted, for use in infringement of the ’999
Patent and are not a staple article or commodity of commerce suitable for substantial noninfringing
use. Apple is thereby liable for infringement of the ’999 Patent under 35 U.S.C. § 271(c).
24. Apple will have been on notice of the ’999 Patent since, at the latest, the service of
this complaint upon it. By the time of trial, Apple will have known and intended (since receiving
such notice) that its continued actions would actively induce and contribute to the infringement of
25. Apple may have infringed the ’999 Patent through other software and devices
utilizing the same or reasonably similar functionality, including other versions of the Accused
Infringing Products.
26. Uniloc has been damaged by Apple’s infringement of the ’999 Patent.
(B) awarding Uniloc its damages suffered as a result of Apple’s infringement of the
’999 Patent;
(C) awarding Uniloc its costs, attorneys’ fees, expenses, and interest, and
(D) granting Uniloc such further relief as the Court finds appropriate.
                                                  7
3050711.v1
             Case 1:18-cv-00838-LY Document 1 Filed 10/03/18 Page 8 of 8
                                          8
3050711.v1
JS 44 (Rev. 12/12)
                                     Case 1:18-cv-00838-LY Document 1-1 Filed 10/03/18 Page 1 of 3
                                                                            CIVIL COVER SHEET
The JS 44 civil cover sheet and the information contained herein neither replace nor supplement the filing and service of pleadings or other papers as required by law, except as
provided by local rules of court. This form, approved by the Judicial Conference of the United States in September 1974, is required for the use of the Clerk of Court for the
purpose of initiating the civil docket sheet. (SEE INSTRUCTIONS ON NEXT PAGE OF THIS FORM.)
    (b) County of Residence of First Listed Plaintiff                                                          County of Residence of First Listed Defendant
                                  (EXCEPT IN U.S. PLAINTIFF CASES)                                                                   (IN U.S. PLAINTIFF CASES ONLY)
                                                                                                               NOTE:     IN LAND CONDEMNATION CASES, USE THE LOCATION OF
                                                                                                                         THE TRACT OF LAND INVOLVED.
    (c) Attorneys (Firm Name, Address, and Telephone Number)                                                    Attorneys (If Known)
Edward R. Nelson III, Nelson Bumgardner Albritton P.C.
3131 West 7th Street, Suite 300, Fort Worth, TX 76107
Phone: 817-377-9111
II. BASIS OF JURISDICTION (Place an “X” in One Box Only)                                         III. CITIZENSHIP OF PRINCIPAL PARTIES (Place an “X” in One Box for Plaintiff
                                                                                                          (For Diversity Cases Only)                                            and One Box for Defendant)
’ 1    U.S. Government                ’ 3     Federal Question                                                                     PTF           DEF                                           PTF      DEF
         Plaintiff                              (U.S. Government Not a Party)                        Citizen of This State         ’ 1           ’ 1       Incorporated or Principal Place      ’ 4      ’ 4
                                                                                                                                                             of Business In This State
’ 2    U.S. Government                ’ 4     Diversity                                              Citizen of Another State          ’ 2        ’    2   Incorporated and Principal Place     ’ 5      ’ 5
         Defendant                              (Indicate Citizenship of Parties in Item III)                                                                 of Business In Another State
The JS 44 civil cover sheet and the information contained herein neither replaces nor supplements the filings and service of pleading or other papers as
required by law, except as provided by local rules of court. This form, approved by the Judicial Conference of the United States in September 1974, is
required for the use of the Clerk of Court for the purpose of initiating the civil docket sheet. Consequently, a civil cover sheet is submitted to the Clerk of
Court for each civil complaint filed. The attorney filing a case should complete the form as follows:
I.(a)    Plaintiffs-Defendants. Enter names (last, first, middle initial) of plaintiff and defendant. If the plaintiff or defendant is a government agency, use
         only the full name or standard abbreviations. If the plaintiff or defendant is an official within a government agency, identify first the agency and
         then the official, giving both name and title.
  (b)    County of Residence. For each civil case filed, except U.S. plaintiff cases, enter the name of the county where the first listed plaintiff resides at the
         time of filing. In U.S. plaintiff cases, enter the name of the county in which the first listed defendant resides at the time of filing. (NOTE: In land
         condemnation cases, the county of residence of the "defendant" is the location of the tract of land involved.)
  (c)    Attorneys. Enter the firm name, address, telephone number, and attorney of record. If there are several attorneys, list them on an attachment, noting
         in this section "(see attachment)".
II.      Jurisdiction. The basis of jurisdiction is set forth under Rule 8(a), F.R.Cv.P., which requires that jurisdictions be shown in pleadings. Place an "X"
         in one of the boxes. If there is more than one basis of jurisdiction, precedence is given in the order shown below.
         United States plaintiff. (1) Jurisdiction based on 28 U.S.C. 1345 and 1348. Suits by agencies and officers of the United States are included here.
         United States defendant. (2) When the plaintiff is suing the United States, its officers or agencies, place an "X" in this box.
         Federal question. (3) This refers to suits under 28 U.S.C. 1331, where jurisdiction arises under the Constitution of the United States, an amendment
         to the Constitution, an act of Congress or a treaty of the United States. In cases where the U.S. is a party, the U.S. plaintiff or defendant code takes
         precedence, and box 1 or 2 should be marked.
         Diversity of citizenship. (4) This refers to suits under 28 U.S.C. 1332, where parties are citizens of different states. When Box 4 is checked, the
         citizenship of the different parties must be checked. (See Section III below; NOTE: federal question actions take precedence over diversity
         cases.)
III.     Residence (citizenship) of Principal Parties. This section of the JS 44 is to be completed if diversity of citizenship was indicated above. Mark this
         section for each principal party.
IV.      Nature of Suit. Place an "X" in the appropriate box. If the nature of suit cannot be determined, be sure the cause of action, in Section VI below, is
         sufficient to enable the deputy clerk or the statistical clerk(s) in the Administrative Office to determine the nature of suit. If the cause fits more than
         one nature of suit, select the most definitive.
VI.      Cause of Action. Report the civil statute directly related to the cause of action and give a brief description of the cause. Do not cite jurisdictional
         statutes unless diversity. Example: U.S. Civil Statute: 47 USC 553 Brief Description: Unauthorized reception of cable service
VII.     Requested in Complaint. Class Action. Place an "X" in this box if you are filing a class action under Rule 23, F.R.Cv.P.
         Demand. In this space enter the actual dollar amount being demanded or indicate other demand, such as a preliminary injunction.
         Jury Demand. Check the appropriate box to indicate whether or not a jury is being demanded.
VIII. Related Cases. This section of the JS 44 is used to reference related pending cases, if any. If there are related pending cases, insert the docket
      numbers and the corresponding judge names for such cases.
Date and Attorney Signature. Date and sign the civil cover sheet.
        Case 1:18-cv-00838-LY Document 1-1 Filed 10/03/18 Page 3 of 3
PLAINTIFF DEFENDANT
                               RELATED CASES
COURT                       JUDGE                       DOCKET NUMBER
Western District of Texas   LEE YEAKEL                  1:18-cv-00158
Western District of Texas   LEE YEAKEL                  1:18-cv-00159
Western District of Texas   LEE YEAKEL                  1:18-cv-00161
Western District of Texas   LEE YEAKEL                  1:18-cv-00163
Western District of Texas   LEE YEAKEL                  1:18-cv-00164
Western District of Texas   LEE YEAKEL                  1:18-cv-00166
Western District of Texas   LEE YEAKEL                  1:18-cv-00293
Eastern District of Texas   JAMES RODNEY GILSTRAP       2:16-cv-00638
Eastern District of Texas   JAMES RODNEY GILSTRAP       2:17-cv-00708
Northern District of        WILLIAM ALSUP               3:18-cv-00359
California
Northern District of        WILLIAM ALSUP               3:18-cv-00360
California
Northern District of        WILLIAM ALSUP               3:18-cv-00363
California
Northern District of        WILLIAM ALSUP               3:18-cv-00365
California
Northern District of        WILLIAM ALSUP               3:18-cv-00572
California
Northern District of        PHYLLIS J. HAMILTON         4:18-cv-00361
California
Northern District of        PHYLLIS J. HAMILTON         4:18-cv-00362
California
Northern District of        PHYLLIS J. HAMILTON         4:18-cv-00364
California
Northern District of        LUCY H. KOH                 5:18-cv-00357
California
Case 1:18-cv-00838-LY Document 1-2 Filed 10/03/18 Page 1 of 6
          EXHIBIT A
              Case 1:18-cv-00838-LY Document 1-2 Filed 10/03/18 Page 2 of 6
                                                                                                  US007136999B1
                                                                                   ELECTRONIC
                                                                                     DEVICE
                                                                                                                                 102
                                                                                                            ELECTRONIC
                                                                                                            y
                                                                                                              DEVICE
     Case 1:18-cv-00838-LY Document 1-2 Filed 10/03/18 Page 3 of 6
                                                   ELECTRONIC
                                                     DEVICE
     ----------- 1
                   115-              107
        113                      /
                                     1.
             115
        O' | | - l--192                                         ELECTRONIC 102
                             N                11                 DEVICE
                                                                    NON-VOLATILE
                    -102                                              MEMORY
                                          FIG.2
             Case 1:18-cv-00838-LY Document 1-2 Filed 10/03/18 Page 4 of 6
                                                    US 7,136,999 B1
                              1.                                                                     2
    METHOD AND SYSTEM FOR ELECTRONIC                                          BRIEF SUMMARY OF THE INVENTION
         DEVICE AUTHENTCATION
                                                                        It is an object of the invention to authenticate a device first
         BACKGROUND OF THE INVENTION                                  authenticated on a physically restrained network through
                                                                      another network.
  1. Field of the Invention                                              It is a further object of the invention to simplify authen
                                                                      tication of a device in a network by re-using a given
  The present invention relates generally to electronic               authentication process in another network.
device authentication.                                                  In accordance with the invention, a method of authenti
   2. Description of the Related Art                             10   cating first and second electronic devices is provided, the
   In the Bluetooth Specification, “Specification of the Blue         method comprising:
tooth System Core, V.1.0A, Jul. 26th 1999, pp. 18–19, 95,               upon link set-up over a short-range wireless link, execut
149-154, 169-170, 194-200, 226, 319, 537, 1029, and                   ing an authentication protocol by exchanging authentication
                                                                      information between the first and second electronic devices
1031, the so-called Bluetooth short range radio link between     15   to initially authenticate communication between the first and
Bluetooth enabled devices is described, particularly, the             second devices;
Bluetooth frequency bands, the concept of master and slave              later, when the first and second electronic devices are
devices, and security using authentication of devices. Blue           beyond the short-range wireless link, executing the authen
tooth (BT) is a specification for small form factor, low-cost,        tication protocol by exchanging the authentication informa
short-range radio links between mobile PCs, mobile phones,            tion between the first and second electronic devices over an
and other such devices. Bluetooth radio arose out of an
initiative among leaders in the telecommunication and com             alternate communications link, then only allowing commu
                                                                      nication between the first and second devices if the first and
puter industries to make a global standard for wireless               second devices had initially been Successfully authenticated.
connectivity. The standard relies on a low power radio link
operating at 2.4 Gigahertz. Bluetooth-provisioned devices                The invention is based upon the insight that once devices
normally must be physically close to each other (i.e., within    25   are authenticated on a restricted network, it is very simple to
100 meters) to communicate. Bluetooth includes a robust               re-connect the devices through another, unrestricted net
authentication mechanism that ensures that a Bluetooth                work. In this respect, restriction can be determined by the
device only communicates with other devices for which it is           way a system works, such as authentication in accordance
authenticated, and not with any random device that comes              with said Bluetooth Specification, or can be restricted physi
into its range. Bluetooth radio uses a fast acknowledgement      30   cal access to premises such as an office.
and frequency hopping scheme to make the link robust.                    In a preferred embodiment, the first and second electronic
Devices avoid interference from other signals by hopping to           devices each have the capability of communicating with
a new frequency after transmitting or receiving a packet.             each other over at least a primary and a secondary commu
Compared with other systems operating in the same fre                 nications link. The primary communications link is a given
quency band, the Bluetooth radio typically hops faster and       35   short-range wireless link. Preferably, the short-range wire
uses shorter packets. This makes Bluetooth radio more                 less link conforms to a given protocol, namely, Bluetooth.
robust than other systems.                                            The secondary communications link may be any alternative
   The Bluetooth authentication scheme works generally as             link such as a wide area network (WAN), a local area
follows. A user enters a numerical code (a personal identi            network (LAN), or the like. The devices are first authenti
                                                                 40   cated over the primary link, with the user entering the same,
fication number or PIN) in the two devices to establish a             given PIN code in both devices. After the devices verify that
Bluetooth link for the first time. The PIN can be any number,         they share the same PIN code, they exchange key informa
but it must be the same on both devices. Once this is done,           tion. Later, when the devices are no longer within range to
the devices communicate with each other using Bluetooth               authenticate over the primary communications link using
transceivers to verify that the PIN numbers match. If so, one    45   Bluetooth, one of the devices invites the exchange of key
device generates unique key information based on a device             information automatically using the secondary communica
address, which is unique for each device. This unique key             tions link. If the other device can provide the key informa
(generated by one of the devices) is stored in both devices           tion requested, the devices are then authenticated to each
and used to authenticate the two devices for any Subsequent           other over the secondary communications link. In addition
Bluetooth link between them. In particular, the key              50   thereto a user may be requested to enter login data, Such as
exchanged upon link initialization identifies a unique link           a user name or a password. The foregoing has outlined some
and can be used reliably for Subsequent authentication when           of the more pertinent objects and features of the present
the link is re-established.
                                                                      invention. These objects and features should be construed to
  The feature that ensures security in a Bluetooth system is          be merely illustrative of some of the more prominent fea
the need for physical proximity to establish a link, i.e., the   55   tures and applications of the invention. Many other benefi
user must enter the numerical code on both devices when the           cial results can be attained by applying the disclosed inven
devices are in close proximity. If the devices are more than          tion in a different manner or by modifying the invention as
100 meters apart, the initial Bluetooth link cannot be estab          will be described. Accordingly, a fuller understanding of the
lished.                                                               invention may be had by referring to the following Detailed
   Wide area networks also use basic authentication to           60   Description of the Preferred Embodiment.
enable electronic devices to communicate with each other.
The most common and popular wide area network is the                        BRIEF DESCRIPTION OF THE DRAWINGS
Internet. Internet service providers typically restrict access
on their servers to given users. Normally, this is achieved by           For a more complete understanding of the present inven
requiring a prospective user (e.g., a user of a client machine   65   tion and the advantages thereof, reference should be made to
running a web browser) to enter a userid and password                 the following Detailed Description taken in connection with
combination.                                                          the accompanying drawings in which:
             Case 1:18-cv-00838-LY Document 1-2 Filed 10/03/18 Page 5 of 6
                                                     US 7,136,999 B1
                           3                                                                          4
  FIG. 1 is a block diagram illustrating an embodiment of               work 113, with the device 102 within network boundary
the invention; and                                                      115, the user 115 needs to initially set-up the link 107 while
  FIG. 2 is a block diagram of an electronic device accord              the devices 102 and 111 are authenticated. Later, the device
ing to the present invention.                                           102" moves to another location outside the constrained
                                                                        network, indicated with the device 102 and a dashed arrow
           DETAILED DESCRIPTION OF THE                                  117. The device 102 may have an aerial 116 when the link
             PREFERRED EMBODIMENT                                       107 is a radio link. Instead of an aerial, an infrared trans
                                                                        mitter/receiver may be used, when the link 107 is an infrared
  FIG. 1 is a block diagram illustrating an embodiment of               link.
the invention. As used herein, an “electronic device' should       10     In terms of Bluetooth, the devices 102/102 and 111 may
be broadly construed to mean a computer (or a set of                    be so-called Bluetooth enabled devices, the device 102'/102
computers) of any type including, without limitation, a                 being a slave device and the device 111 being a master
desktop computer, a workstation or server platform, a note              device. The concept of master and slave is defined on page
book computer, a diskless computer, a handheld computing                95 of said Bluetooth Specification. Authentication of Blue
device (e.g., personal digital assistant, business organizer, or   15   tooth enabled devices is described on pages 149–154 of said
the like), a communications device (e.g., cellular phone,               Bluetooth Specification. When the master and slave are
Smartphone, or the like) provisioned to include computing               out-of-range of the wireless or “primary” data link 107.
power, in-vehicle computing devices, or the like. Thus, as is           however, they may still communicate with each other fol
well known, a given electronic device 102, as shown in more             lowing authentication according to the present invention. In
detail in FIG. 2, typically includes a processor 104, a                 particular, slave device 102 first establishes a link to the
memory 106 (e.g., RAM and ROM) for storing programs                     master device 111 over the alternate or “secondary” link 109,
110 executable by the processor 104, at least one input                 which, as noted above, may be any convenient communi
device 112 Such as a keyboard or mouse, at least one output             cations link Such as the Internet, an intranet, a local area
device 114 Such as a monitor or display. Typically, each of             network, or the like. To establish this connection, as noted
the electronic devices includes hardware and software              25   above, each of the devices 102 and 111 must include
resources (not shown) to enable the devices to communicate              appropriate hardware and Software resources (e.g., a
with each other over a network 120 such as the Internet, an             modem, a TCP/IP stack, and the like) that are used for this
intranet, a local area network, a mobile radio network, or the          purpose, as is well known. Once this connection is estab
like. The electronic device 102 can be a mobile phone, a                lished, the master device 111 offers to use the authentication
personal digital assistent (PDA), a laptop computer, or any        30   protocol of the primary data link 107 to facilitate device
other suitable device. In FIG. 1, another electronic device             authentication. The primary data link authentication proto
111 is shown. The electronic device 111 can be a web-server,            col may be one of several protocols offered during the
an e-mail server, or some other database-like device.                   attempt to establish a connection between the two devices
   When the device 102, e.g., a laptop, connects to the                 102/102 and 111. The offer issued from the master device
network 120, e.g. the Internet, its internet protocol address      35   111 invites the exchange of key information according to the
is determined and services such as a printer service and a              authentication protocol of the primary data link, in the
calendar service are set up automatically. But before such              example given a Bluetooth protocol. If upon exchange the
services are set up the device 102 needs to be authenticated.           keys match, the devices 102/102 are authenticated to com
Upon device authentication, the user may login to a service             municate with each other.
by providing a user name and password, for instance. The           40      In Summary, an initial Bluetooth link setup and authen
invention is mainly concerned with device authentication                tication procedure is carried out between a pair of electronic
whereby authentication information is exchanged between                 devices. Thus, for example, the BT-devices can be a home/
devices.                                                                office Internet server and a mobile phone, or any other
  According to the invention, each of the devices also                  suitable pair of devices. When the user of the mobile phone,
includes a transceiver 105 to enable the devices to commu          45   for example, later wants to make a remote connection to the
nicate over a communications link 107. Preferably, the                  other device of the BT-enabled link, e.g., through another
communications link 107 is a short-range wireless link that             network such as the Internet, the same BT authentication
conforms to a given radio protocol, e.g., Bluetooth. This is            protocol is used as with the initial BT-link setup so that
not a limitation of the present invention, however, as the              communication by unauthenticated devices may be pre
alternative communications link 107 may be an infrared             50   vented. Thus, once the remote connection is secured by the
link, an acoustic link, or the like. In the preferred embodi            initial BT-link setup procedure, i.e., devices other than
ment, the alternative communications link 107 is a “pri                 legitimate authenticated devices can never use the mobile
mary” link in the sense that the devices initially authenticate         phone network to connect to the home server or network for
to each other over the link 107 link and then, later, authen            remote re-connection of the BT-link if the user of the device
ticate to each other over a secondary link 109 such as the         55   had not first initiated the BT-link locally.
Internet, an intranet, or Some other link. Thus, according to              Security is enhanced with the invention by exchanging
the preferred embodiment of the invention, the pair of                  link key information because the link key information is
electronic devices first authenticate using Bluetooth over a            established in a secure system. In the described example,
first link, the link 107 and then later authenticate (e.g., when        security is assured by the requirement that the two devices
the devices are out-of-range of the original wireless con          60   be in physical proximity when establishing the link key.
nection) over some alternative link, the link 109. In FIG. 1,           Userids or passwords need not be exchanged on Subsequent
Such a Successive device authentication at different locations          logins, depending on the level of additional security
is indicated by the electronic device 102 having been moved             required. An additional PIN may be used to access some
from a network 113 to which the device 102 has restrained               services, possibly in a corporate environment.
access, to the unconstrained network 120. The network 113          65      Although specific embodiments of the present invention
is a so-called Bluetooth network, for instance, to which a              are described herein, they are not to be construed as limiting
user 115 has constrained access. When accessing the net                 the scope of the invention. Many embodiments of the
             Case 1:18-cv-00838-LY Document 1-2 Filed 10/03/18 Page 6 of 6
                                                      US 7,136,999 B1
                            5                                                                        6
invention will become apparent to those skilled in the art in              13. A method of authenticating first and second electronic
light of the teachings of this specification. For example,              devices, comprising:
although the described embodiments use a wireless link to                 upon link set-up over a first link, executing an authenti
establish the link key, other similarly secure connection                    cation protocol by exchanging authentication informa
means such as infrared links or closed networks may be             5         tion between the first and second electronic devices to
advantageously used. Also, although the described embodi                     initially authenticate communication between the first
ments show authentication between two devices on two                         and second devices;
networks, authentication can be achieved on any number of                 later, when the first and second electronic devices are
networks between the two devices. The scope of the inven                     connected using a second link, exchanging the authen
tion is only limited by the claims appended hereto.                10        tication information between the first and second elec
   The word “comprising does not exclude the presence of                     tronic devices over the second link, then only allowing
other elements or steps than those listed in a claim.                        communication between the first and second devices if
   Having thus described my invention, what I claim as new                  the first and second devices had initially been success
and desire to secure by Letters Patent is set forth in the                  fully authenticated.
following claims.                                                  15     14. An electronic device, comprising:
  What is claimed is:                                                     a processor;
   1. A method of authenticating first and second electronic              and
devices, comprising:                                                      a memory loaded with a software routine executed by the
  upon link set-up over a short-range wireless link, execut                 processor (a) for generating authentication information
      ing an authentication protocol by exchanging authen                   useful in initially authenticating the electronic device to
     tication information between the first and second elec                 a another electronic device over a short-range wireless
     tronic devices to initially authenticate communication                 link, and (b) for later Supplying the authentication
     between the first and second devices;                                   information for later authentication of the electronic
  later, when the first and second electronic devices are                    device to the other electronic device over an alternate
     beyond the short-range wireless link, executing the           25        communications link when the devices are beyond the
     authentication protocol by exchanging the authentica                    short-range wireless link, then only allowing commu
     tion information between the first and second electronic                nication between the devices if the devices had initially
     devices over an alternate communications link, then                     been Successfully authenticated.
     only allowing communication between the first and                    15. The electronic device of claim 14, wherein the link
     second devices if the first and second devices had            30   set-up step includes entry of a given personal identification
     initially been successfully authenticated.                         number into each of the first and second electronic devices.
  2. The method of claim 1, wherein the authentication                    16. The electronic device of claim 14, wherein the elec
information is an authentication key.                                   tronic device is a client and the second electronic device is
  3. The method of claim 1, wherein the authentication                  a SWC.
information a password.                                            35     17. A communications system, comprising:
  4. The method of claim 1, wherein the first device is a                 a first electronic device;
master device and the second device is a slave device.                    a second electronic device;
  5. The method of claim 1, wherein the short-range wire                  a first communications link over which the first and
less link is a radio link.                                                   second electronic devices authenticate each other using
  6. The method of claim 1, wherein the short-range wire           40        a given protocol that includes a link set-up and the
less link is an infra-red link.                                              exchange of authentication information following the
   7. The method of claim 1, wherein the link set-up occurs                  link set-up, the authentication information being used
when the first and second devices are in physical proximity.                 to initially authenticate communication between the
   8. The method of claim 1, wherein the short-range wire                    first and second electronic devices; and
less link conforms to a given RF protocol.                         45     a second communications link over which the first and
   9. The method of claim 8, wherein the given RF protocol                  second electronic devices later authenticate each other
is Bluetooth.                                                                using the exchange of the authentication information,
   10. The method of claim 1 wherein the link set-up step                    then only allowing communication between the first
includes entry of a given personal identification number into                and second devices if the first and second devices had
each of the first and second electronic devices.                   50        initially been successfully authenticated, wherein said
  11. The method of claim 1, wherein the alternate com                       first communications link and said second communi
munications link is a computer network.                                      cations link are different types of links.
  12. The method of claim 1, wherein the first electronic
device is a client and the second electronic device is a server.                               k   k   k   k   k