DCT

3:22-cv-01832

RN Nehushtan Trust Ltd v. Apple Inc

Key Events
Complaint
complaint Intelligence

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 3:22-cv-01832, N.D. Cal., 03/23/2022
  • Venue Allegations: Venue is alleged to be proper as Defendant Apple Inc. resides in the Northern District of California, where its headquarters is located.
  • Core Dispute: Plaintiff alleges that Defendant's cellular communication devices, including iPhones, iPads, and Apple Watches, directly infringe two patents related to securing cellular devices against unauthorized access and cloning.
  • Technical Context: The patents address security vulnerabilities in cellular devices, specifically the risk of cloning a device's identity by illicitly reading and writing sensitive configuration data, a significant concern during the growth of the smartphone market.
  • Key Procedural History: The complaint notes that the asserted patents are members of a patent family with a priority date spanning back to 2004, placing the invention's origin during the early development of the smartphone ecosystem.

Case Timeline

Date Event
2004-03-08 Priority Date for '002 & '544 Patents
2017-04-25 U.S. Patent 9,635,544 Issued
2017-05-02 U.S. Patent 9,642,002 Issued
2022-03-23 Complaint Filed

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 9,642,002 - "Cellular Device Security Apparatus and Method"

  • Patent Identification: U.S. Patent No. 9,642,002, "Cellular Device Security Apparatus and Method," issued May 2, 2017.

The Invention Explained

  • Problem Addressed: The patent's background describes a security vulnerability in cellular devices where sensitive information-such as the Electronic Serial Number (ESN) and Authentication Key (A-KEY)-could be read from a device and written to a "destination device" '002 Patent, col. 1:25-34 This "cloning" would make the destination device identical to the source device on the cellular network, enabling unauthorized calls and data access billed to the original user '002 Patent, col. 1:25-42
  • The Patented Solution: The invention proposes restricting access to the device's "data mode"-a state that allows for changing settings and the operating system-by requiring a "device unique security setting" '002 Patent, abstract This setting is provided remotely to the device from a secure server over a network connection before the data mode can be used, and it may be a dynamic or one-time password to prevent a single compromised password from affecting multiple devices '002 Patent, abstract '002 Patent, col. 10:48-55
  • Technical Importance: The approach of tying device reprogramming privileges to a live, secure network session with a trusted server represented a shift from static, manufacturer-set passwords that, if compromised, could make entire product lines vulnerable '002 Patent, col. 8:12-16

Key Claims at a Glance

  • The complaint asserts independent claim 5 Compl. ¶15
  • The essential elements of independent claim 5 include:
    • A cellular communication device with a processor, memory, and a data mode for reading/writing data and changing settings.
    • An access restrictor to restrict use of the data mode based on a device unique security setting.
    • The device unique security setting is provided remotely using a predetermined security protocol.
    • The device unique security setting is obtained remotely before the data mode is used.
    • The data mode permits actions like uploading or replacing an operating system via an active connection with a cellular provider.
    • The device is configured to either enable the data mode if the security setting is correct or disable it if the active connection is lost.
  • The complaint does not explicitly reserve the right to assert dependent claims.

U.S. Patent No. 9,635,544 - "Cellular Device Security Apparatus and Method"

  • Patent Identification: U.S. Patent No. 9,635,544, "Cellular Device Security Apparatus and Method," issued April 25, 2017.

The Invention Explained

  • Problem Addressed: As a member of the same patent family, the '544 Patent addresses the identical problem of device cloning by exploiting unprotected access to a device's "data mode" to copy sensitive network identity information '544 Patent, col. 1:25-42
  • The Patented Solution: The solution is substantively the same as that of the '002 Patent: securing the data mode with a remotely-provided, device-unique security setting managed by a secure server '544 Patent, abstract The system is designed such that the data mode is only operable during an active, authenticated connection between the device and the server, thereby preventing unauthorized offline reprogramming '544 Patent, col. 4:38-44
  • Technical Importance: This patent, like its family member, details a security architecture where device management functions are contingent on real-time, authenticated communication with a provider, enhancing security over static, on-device credentials '544 Patent, col. 8:1-7

Key Claims at a Glance

  • The complaint asserts independent claim 17 Compl. ¶23
  • The essential elements of independent claim 17 include:
    • A cellular communication device with a processor, memory, and a data mode for reading/writing data and changing settings.
    • An access restrictor to restrict data mode use based on a device unique security setting.
    • The device unique security setting is obtained remotely before the data mode is used.
    • The data mode is usable for transferring icons to the device.
    • The device is associated with a client program for managing a predetermined communication protocol.
    • The device is configured to set the device into data mode when the security setting is correct and disable it when the active connection is no longer active.
  • The complaint does not explicitly reserve the right to assert dependent claims.

III. The Accused Instrumentality

Product Identification

  • The accused products are Apple's cellular communication devices, including iPhones, iPads, and Apple Watches Compl. ¶14 Compl. ¶19

Functionality and Market Context

  • The complaint identifies these as cellular communication devices that Apple has made, offered for sale, and sold Compl. ¶15 Compl. ¶19 The infringement allegations center on the security architecture used to manage and update these devices. The complaint implies that these devices have a secure mode for receiving operating system updates and configuration changes from a provider, which corresponds to the claimed "data mode," and that this process is governed by security protocols that allegedly practice the claimed inventions.

IV. Analysis of Infringement Allegations

The complaint references claim chart exhibits that were not provided with the filing Compl. ¶16 Compl. ¶20 The analysis below is based on the complaint's narrative allegations and the text of the asserted claims.

'002 Patent Infringement Allegations

Claim Element (from Independent Claim 5) Alleged Infringing Functionality Complaint Citation Patent Citation
A cellular communication device comprising a processor, a memory and a data mode, said data mode allowing reading and writing of data in said memory and changing of settings... The accused iPhones, iPads, and Apple Watches, which contain processors and memory and have a secure mode for receiving software updates and configuration data. ¶15 col. 22:50-55
said cellular communication device also comprises an access restrictor to restrict use of said data mode in accordance with a device unique security setting... The security architecture within Apple's operating systems (e.g., iOS, watchOS) that controls and limits access to system-level functions like OS updates. ¶16 col. 22:56-59
...the device unique security setting provided remotely to said cellular communication device using a predetermined security protocol; Security credentials or tokens that are allegedly delivered to the accused devices over a network connection (e.g., Wi-Fi or cellular) as part of Apple's software update and device management process. ¶16 col. 22:59-62
said device unique security setting is obtained remotely and provided to the cellular communication device before the data mode is used; The process by which Apple devices allegedly authenticate with Apple's servers and receive authorization before initiating a software update or other system-level change. ¶16 col. 22:63-65
said data mode permits actions comprising uploading, maintaining or replacing an operating system in said cellular communication device that are provided by a cellular provider using an active connection... The functionality of the accused devices to download and install new versions of their operating systems (e.g., iOS updates) over an active internet connection. ¶16 col. 22:66-col. 23:2
...enabling said cellular communication device to use said data mode when it is determined that said device unique security setting is correct; and disabling use of said data mode when said active connection is no longer active. The alleged behavior of the accused devices to permit the OS update process to proceed upon successful authentication and to terminate the process if the connection to Apple's servers is lost. ¶16 col. 23:3-8

'544 Patent Infringement Allegations

Claim Element (from Independent Claim 17) Alleged Infringing Functionality Complaint Citation Patent Citation
A cellular communication device comprising a processor, a memory and a data mode, said data mode allowing reading and writing of data and changing of settings on said cellular communication device... The accused iPhones, iPads, and Apple Watches, which contain processors and memory and have a secure mode for software updates and configuration. ¶19 col. 23:46-51
said cellular communication device further comprising an access restrictor to restrict use of said data mode in response to a cellular communication device unique security setting; Apple's operating system security architecture that controls access to system-level functions. ¶20 col. 23:52-55
wherein said device unique security setting is obtained remotely and provided to the cellular communication device before use of the data mode... The alleged process where accused devices receive security credentials from Apple servers over a network before a protected operation begins. ¶20 col. 23:56-59
...said data mode being usable for transfer of icons to the cellular communication device; The functionality of the accused devices to receive and install application icons as part of software installation and updates managed through the secure data mode. ¶20 col. 23:59-61
wherein said cellular communication device is associated with a client program for managing a predetermined communication protocol... The software on the accused devices (e.g., the OS update agent) that allegedly manages the secure communication protocol with Apple's servers. ¶20 col. 23:62-65
...setting said cellular communication device into said data mode when said device unique security setting is correct; and disabling said data mode when said active connection is no longer active. The alleged behavior where the update process is enabled upon successful authentication and disabled if the network connection is lost. ¶20 col. 23:66-col. 24:2
  • Identified Points of Contention:
    • Evidentiary Questions: The complaint makes conclusory infringement allegations and relies on references to missing exhibits Compl. ¶16 Compl. ¶20 A primary point of contention will be what specific evidence Plaintiff can produce to map the elements of Apple's complex security architecture to the limitations of the asserted claims.
    • Scope Questions: The case may turn on the construction of key terms. A central question will be whether Apple's standard device authentication and software update protocols, which secure millions of devices, fall within the scope of a "device unique security setting" as contemplated by the patents, which describe the setting as potentially being a "one-time password" '002 Patent, col. 4:16 or constructed from unique hardware identifiers like an A-KEY '002 Patent, col. 12:13-15
    • Technical Questions: A factual dispute may arise over how Apple's technology actually operates. For instance, what specific software or hardware component in an iPhone functions as the claimed "access restrictor" '002 Patent, col. 22:56? What is the exact sequence and timing of authentication in Apple's OS update process, and does it align with the claim requirement that the security setting is "obtained remotely...before the data mode is used" '002 Patent, col. 22:63-65?

No probative visual evidence provided in complaint.

V. Key Claim Terms for Construction

  • The Term: "device unique security setting"

  • Context and Importance: This term is the central inventive concept of both asserted patents. Its definition will be critical to the infringement analysis. Practitioners may focus on whether the security credentials used by Apple's devices are "unique" in the manner required by the claims and specification.

  • Intrinsic Evidence for Interpretation:

    • Evidence for a Broader Interpretation: The claims themselves do not specify the form of the setting, leaving open the possibility that any remotely provided, device-specific credential could qualify. Claim 6 of the '002 Patent describes the setting as potentially being a "software setting" or a "dynamic password," which could be interpreted broadly '002 Patent, col. 23:8-13
    • Evidence for a Narrower Interpretation: The specification provides specific examples, such as a "one-time password" or a setting constructed from a combination of unique device identifiers (e.g., ESN, A-KEY) and random values '002 Patent, col. 10:48-55 '002 Patent, col. 12:1-24 A defendant may argue these embodiments limit the term to security schemes that are distinct from standard, widely deployed public key infrastructure or token-based authentication.
  • The Term: "access restrictor"

  • Context and Importance: This term defines the component that enforces the security. Infringement will depend on whether Apple's products contain a structure that meets the definition of this term. The dispute may center on whether this must be a distinct module or if it can be a distributed function of the operating system.

  • Intrinsic Evidence for Interpretation:

    • Evidence for a Broader Interpretation: The term itself is functional. The claim only requires a component that "restricts use of said data mode" '002 Patent, col. 22:57, suggesting any software or hardware that performs this function could be the "access restrictor."
    • Evidence for a Narrower Interpretation: The specification refers to this component as a "mode management unit 22" '002 Patent, col. 9:15, which is depicted in a block diagram Fig. 2 as a discrete component. A defendant may argue this implies a more specific, modular structure rather than a general security function integrated throughout an OS.

VI. Other Allegations

The complaint does not provide sufficient detail for analysis of indirect or willful infringement.

VII. Analyst's Conclusion: Key Questions for the Case

  • A core issue will be one of definitional scope: Can the term "device unique security setting," which the patent specification links to concepts like one-time passwords and values derived from hardware-specific keys like the A-KEY, be construed to cover the large-scale, standardized security and authentication protocols Apple uses to manage software updates across its ecosystem?
  • A second key issue will be one of evidentiary mapping: The complaint offers only conclusory allegations of infringement, referencing non-public exhibits. A central question for the litigation will be whether the plaintiff can present concrete technical evidence that maps specific components and processes within Apple's proprietary and complex operating systems to the structural and functional limitations of the asserted claims, particularly the "access restrictor" and the "predetermined security protocol."
  • Finally, the case will likely involve a dispute over technical operation: A key factual question will be whether the timing and sequence of operations in Apple's device management system align with the claims. Specifically, does an Apple device "obtain" a remote security setting before entering a state analogous to the claimed "data mode," or do the authentication and data transfer operations function in a manner technically distinct from the specific process recited in the claims?