throbber
Case 4:18-cv-07229-YGR Document 59-1 Filed 04/06/20 Page 1 of 62
`
`
`
`PAUL J. ANDRE (State Bar No. 196585)
`pandre@kramerlevin.com
`LISA KOBIALKA (State Bar No. 191404)
`lkobialka@kramerlevin.com
`JAMES HANNAH (State Bar No. 237978)
`jhannah@kramerlevin.com
`AUSTIN MANES (State Bar No. 284065)
`amanes@kramerlevin.com
`KRAMER LEVIN NAFTALIS & FRANKEL LLP
`990 Marsh Road
`Menlo Park, CA 94025
`Telephone: (650) 752-1700
`Facsimile: (650) 752-1800
`
`Attorneys for Plaintiff
`FINJAN, INC.
`
`
`
`IN THE UNITED STATES DISTRICT COURT
`
`FOR THE NORTHERN DISTRICT OF CALIFORNIA
`
`FINJAN, INC.,
`
`
`
`
`
`
`Plaintiff,
`
`v.
`
`
`QUALYS INC.,
`
`
`
`
`
`
`Defendant.
`
`
`
`OAKLAND DIVISION
`
`
`Case No.: 4:18-cv-07229-YGR
`
`DECLARATION OF MICHAEL T.
`GOODRICH, PH.D. REGARDING CLAIM
`CONSTRUCTION
`
`Date: May 1, 2020
`Time:
`10:00 AM
`Place: Courtroom 1, 4th Floor
`Before: Hon. Yvonne Gonzalez Rogers
`
`
`DECLARATION OF MICHAEL T. GOODRICH
`
`
`
`CASE NO. 4:18-cv-07229-YGR
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`

`

`Case 4:18-cv-07229-YGR Document 59-1 Filed 04/06/20 Page 2 of 62
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`I, Michael T. Goodrich, Ph.D., declare as follows:
`I am a Distinguished Professor1 in the Department of Computer Science at University of
`1.
`California, Irvine, where I have taught courses and performed research in Computer Science, including
`topics in Algorithms, Computer Security, Networking, Data Structures, and Parallel Computing, since
`2001. I am a retained technical expert on behalf of Plaintiff, Finjan, Inc., (“Finjan”) in the above
`captioned matter. I have personal knowledge of the facts disclosed herein and, if called as a witness, I
`could and would testify regarding the opinions disclosed herein.
`I submit this Declaration in support of Finjan’s claim construction brief and to rebut
`2.
`certain opinions of Dr. Aviel Rubin, who has been retained on behalf of Defendant, Qualys, Inc.
`(“Qualys”). I have been asked to provide opinions regarding the understanding that a person of
`ordinary skill in the art (“POSITA”) would have regarding the terms “receiver” and “transmitter” as
`they appear in U.S. Patent Nos. 8,141,154 (“the ’154 Patent”), 8,677,494 (“the ’494 Patent”), and
`6,965,968 (“the ’968 Patent”).
`In summary, it is my opinion that a POSITA would understand the terms “receiver” and
`3.
`“transmitter” to have sufficiently definite meanings as the names of structures within the context of the
`specifications and claims of the ’154, ’494, and ’968 Patents. Further, it is my opinion that the ’154,
`’494, and ’968 Patents disclose to a POSITA sufficient structures that correspond to the function of a
`receiver and transmitter in the claims of these patents.
`EXPERIENCE AND QUALIFICATIONS
`I.
`Curriculum Vitae
`A.
`4.
`Attached hereto as Appendix A is a true and correct copy of my Curriculum Vitae (CV).
`I summarize some of the relevant information regarding my CV as follows.
`I received a Bachelor of Arts degree in Mathematics and Computer Science from Calvin
`5.
`University in 1983 and a PhD in Computer Science from Purdue University in 1987.
`
`1 “The Distinguished Professor title is a campus-level distinction and is reserved for Above Scale
`faculty who have achieved the highest levels of scholarship over the course of their careers.
`Distinguished Professors will typically have earned national and international level distinctions and
`honors of the highest level.” https://ap.uci.edu/titles-of-distinction/distinguished-professor/ (last visited
`March 26, 2020).
`
`DECLARATION OF MICHAEL T. GOODRICH
`
`1
`
`CASE NO. 4:18-cv-07229-YGR
`
`

`

`Case 4:18-cv-07229-YGR Document 59-1 Filed 04/06/20 Page 3 of 62
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`I am a Distinguished Professor in the Department of Computer Science at the
`6.
`University of California, Irvine, where I have been a faculty member since 2001. In addition, I am
`technical director for the Center for Algorithms and Theory of Computation in the Donald Bren School
`of Information and Computer Sciences at University of California, Irvine. I was a professor in the
`Department of Computer Science at Johns Hopkins University from 1987-2001. I have also served as
`an associate dean in the School of Information and Computer Sciences and as department chair for the
`Department of Computer Science, at University of California, Irvine.
`I have over 30 years’ experience in computer science and I have authored or coauthored
`7.
`over 300 publications, including several widely adopted books, such as Introduction to Computer
`Security and Algorithm Design and Applications. My research includes contributions to data structures
`and algorithms, information security and privacy, networking, graph algorithms, computational
`geometry, distributed and parallel algorithms, and cloud security. For example, I have published peer-
`reviewed research articles, including (using the numbering scheme in my CV) publications J-63, J-71,
`J-78, C-80, C-83, C-85, C-91, C-100, and C-108, on stopping viruses in email attachments and on
`authenticating data downloaded from untrusted repositories. I have also published peer-reviewed
`research articles on the use of parallelism in computer systems, including publications J-5, J-7, J-12, J-
`16, J-19, and J-24. In addition, in my publication J-61, “Probabilistic Packet Marking for Large-Scale
`IP Traceback,” I published a scheme for marking packets on the Internet, using network routers and
`other network devices in a packet-by-packet basis, so as to determine the source of distributed denial-
`of-service attacks. Furthermore, I have publications dealing with networking and mobile devices,
`including journal articles J- 56, J-61, J-62, J-66, J-69, J-78, and J-84, book chapter Ch-9, and peer-
`reviewed conference publications C-80, C-101, C-117, C-133, C-136, C-156, and C-181. For instance,
`in my journal article J-56, my coauthors and I study methods for partitioning data into push and pull
`regions so as to optimize communication costs between a server and several clients.
`In my capacity as a Distinguished Professor at University of California, Irvine, my
`8.
`responsibilities include teaching undergraduate and graduate students, performing research in
`computer science, mentoring PhD students and postdoctoral fellows, and serving on various university
`
`DECLARATION OF MICHAEL T. GOODRICH
`
`2
`
`CASE NO. 4:18-cv-07229-YGR
`
`

`

`Case 4:18-cv-07229-YGR Document 59-1 Filed 04/06/20 Page 4 of 62
`
`
`
`committees. According to Google Scholar, I have an h-index of 66, meaning that I have at least 66
`publications that have each been cited at least 66 times.
`My research has been supported by grants from the Defense Advanced Research
`9.
`Projects Agency (DARPA), the National Security Agency (NSA), the Office of Naval Research
`(ONR), the Army Research Office (ARO), and the National Science Foundation (NSF).
` In addition, I have consulting experience as an expert witness and/or technical expert in
`10.
`matters involving algorithms, cryptography, machine learning, digital rights management, computer
`security, networking, software, and storage technologies.
` I am a Fellow of the American Association for the Advancement of Science (AAAS), a
`11.
`Fellow of the Institute of Electrical and Electronics Engineers (IEEE), and a Fellow of the Association
`for Computing Machinery (ACM), as well as being named as a Foreign Member of the Royal Danish
`Academy of Sciences and Letters. I am also a recipient of a Fulbright Scholarship (for senior specialist
`service to University of Aarhus, Denmark). In addition, I am a recipient of the IEEE Computer Society
`Technical Achievement Award and the Pond Award for Excellence in Undergraduate Teaching. Also,
`I am an ACM Distinguished Scientist.
` I am familiar with computer security, malware techniques, intrusion detection, virus
`12.
`detection, and anti-virus software around the time of the inventions of the patents-in-suit. For example,
`my study of computer security topics began in the 1980s as an undergraduate student and continued in
`graduate school, where my Ph.D. research involved the study of computer system components
`operating in parallel. My study and interest in computer security continued after my Ph.D., as detailed
`above and in my CV. In addition, I have reviewed and evaluated research papers on computer security,
`including cryptography, beginning with work as an associate editor for Journal of Computer & System
`Sciences, as well as my service on program committees of peer-reviewed Computer Science
`conferences, including the Conference on Electronic Publishing and the Information Superhighway
`and the ACM Symposium on Theory of Computing (STOC), the latter for which I chaired and edited
`the conference proceedings in 1994.
`
`DECLARATION OF MICHAEL T. GOODRICH
`
`3
`
`CASE NO. 4:18-cv-07229-YGR
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`

`

`Case 4:18-cv-07229-YGR Document 59-1 Filed 04/06/20 Page 5 of 62
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`Prior Testimony
`B.
`A list of cases in which I have testified at deposition or trial or in written reports and
`13.
`declarations during at least the past five years is part of Appendix A of this Declaration.
`Compensation
`C.
`14. My compensation for my work in this case is based solely on the amount of time that I
`devote to activity related to this case (I am paid on an hourly basis) and is in no way affected by any
`opinions that I render. I receive no other compensation from work on this action. My compensation is
`not dependent on the outcome of this matter. I have no financial interest in the outcome of this matter.
`II. MATERIALS CONSIDERED
`15. My opinions, expressed herein, are based on information I have reviewed to date
`including the materials referenced herein and in the exhibits attached to this declaration, and are based
`on my knowledge and experience in the fields of computer science, computer and network security,
`network optimization, Internet communications, and software development.
`In the process of forming my opinions, I have reviewed and considered documents and
`16.
`items including: the declaration of Dr. Rubin, including all documents cited in his declaration, the
`’154, ’494, and ’968 Patents and their file histories, and Finjan’s Opening Claim Construction Brief
`and exhibits referenced therein.
`III. LEGAL STANDARDS
`Counsel for Finjan has informed me of the following legal standards that I have used as
`17.
`a framework in forming my opinions contained herein:
`Claim Construction
`A.
`18.
`I have been informed that claim construction is a legal issue for the Court to decide. I
`understand that patent claim terms are to be interpreted based on their meaning to a POSITA at the
`time of the invention. I further understand that, where the meaning of a term is not immediately
`apparent, one must look at those sources available to the public that show what a POSITA would have
`understood the claim language to mean, including the words of the claims themselves, the remainder of
`the specification, the prosecution history, and extrinsic evidence concerning relevant scientific
`
`DECLARATION OF MICHAEL T. GOODRICH
`
`4
`
`CASE NO. 4:18-cv-07229-YGR
`
`

`

`Case 4:18-cv-07229-YGR Document 59-1 Filed 04/06/20 Page 6 of 62
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`principles, the meaning of technical terms, and the state of the art. I also understand that in
`interpreting a patent claim, the focus is first on the intrinsic evidence of record, i.e., the patent and its
`prosecution history, including the claims.
`B. Means-Plus-Function
`I have been informed that a claim element may be expressed as a means for performing
`19.
`a specified function without express recital of the structure of the element. Such means-plus-function
`elements are to be construed to cover the corresponding structure described in the specification and
`equivalents to that structure.
`I have been further informed that if a claim element does not use “means for” language,
`20.
`it is strongly presumed not to be a mean-plus-function element. Such elements are only deemed to be
`means-plus-function elements if the words in the element, in view of the specification, would not be
`understood by a POSITA to have a sufficiently definite meaning as the name for structure.
`I am yet further informed that what is important is whether the term used is one that is
`21.
`understood to describe structure, in which case the element is not a means-plus-function element,
`although it might not bring to mind any particular structure. For example, I understand that the Federal
`Circuit held “detector,” although broad, is still structural for purposes of means-plus-function analysis
`because it is not a generic structural term nor is it a coined term lacking a clear meaning. The fact that
`more than one structure may be described by the term, or even that the term may encompass a
`multitude of structures, does not make it any less structural and transform it into a mean-plus-function
`element.
`Indefiniteness
`C.
`I have been informed that claims of a patent must distinctly claim the subject matter
`22.
`which an applicant considers as his or her invention. I understand that a patent is invalid for
`indefiniteness if a patent’s claims do not reasonably apprise a POSITA of the claimed invention.
`I have been informed that if a claim element is deemed to be a means-plus-function
`23.
`element for a computer-implemented function the specification must include the algorithm needed to
`perform the claimed function. The sufficiency of the disclosed algorithm is determined in view of
`
`DECLARATION OF MICHAEL T. GOODRICH
`
`5
`
`CASE NO. 4:18-cv-07229-YGR
`
`

`

`Case 4:18-cv-07229-YGR Document 59-1 Filed 04/06/20 Page 7 of 62
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`whether a POSITA would know how to program the computer to achieve the claimed function in view
`of the disclosure of the specification.
`Person of Ordinary Skill in the Art
`D.
`24.
`I understand in determining the level of ordinary skill in the art the following factors go
`into consideration:
`the educational level of active workers in the field, including the named inventors of the
`•
`patent;
`the type of problems encountered in the art;
`•
`• prior art solutions to those problems;
`the rapidity with which innovations are made; and
`•
`•
`the sophistication of the technology in the art.
`25.
`Based on my review of the ’154, ’494, and ’968 Patents, in addition to my consideration
`of the above factors outlined above, my understanding of a POSITA at the time of the invention would
`be a person with a bachelor’s degree in computer science, or equivalent, who also has either (1) two or
`more years of experience in computer security and/or (2) an advanced degree, such as a master’s
`degree, in computer science. For example, these patents address the problem of stopping malware
`included with downloadables using techniques that include clients and servers, policy-based caching,
`and runtime analysis. My understanding of a POSITA differs slightly from that of Dr. Rubin, as given
`in his Declaration (“Rubin Decl.”) but my opinions contained herein would not change were I to adopt
`his understanding of a POSITA.
`BACKGROUND OF THE ’154, ’494, AND ’968 PATENTS
`IV.
`In this section, I provide background information about related technologies with
`26.
`respect to the ’154, ’494, and ’968 Patents.
`Distributed Computing
`A.
`27.
`Distributed computing involves the use of multiple processors that coordinate to
`perform computational tasks. Typically, these processors are connected via a communications network
`and this coordination is done using messages that are transmitted and received between the processors
`
`DECLARATION OF MICHAEL T. GOODRICH
`
`6
`
`CASE NO. 4:18-cv-07229-YGR
`
`

`

`Case 4:18-cv-07229-YGR Document 59-1 Filed 04/06/20 Page 8 of 62
`
`
`
`over the network. Such a collection of processors can coordinate to collectively perform tasks by
`sending messages between the processors rather than, say, using a common shared memory space.
`Performing computations is therefore distributed, because it involves the processors performing tasks
`separately while they are also coordinating and communicating via the shared network.2
`As would be known to a POSITA, in the context of distributed computing, tasks are
`28.
`often partitioned between clients and servers, with clients requesting data or services by transmitting
`messages to servers, which receive those requests, process them, and transmit response messages back
`to the clients, which, in turn, receive those responses and act on them according to their programming
`instructions.3 Thus, in the context of distributed computing, “receive” and “transmit” would be
`understood as terms of art to a POSITA. For example, a plain-and-ordinary meaning of “receive” in
`this context is “to accept data from another component via a communications system or network.”4
`
`
`2 See, e.g., Microsoft Computer Dictionary, 5/e, 2002. (“distributed computing n. See distributed
`processing.” and “distributed processing n. A form of information processing in which work is
`performed by separate computers linked through a communications network. …”) These definitions
`are unchanged from the third edition (1997).
`
`3 See, e.g., Microsoft Computer Dictionary, 5/e, 2002. (“client/server architecture n. An arrangement
`used on LANs (local area networks) that makes use of distributed intelligence to treat both the server
`and the individual workstations as intelligent, programmable devices, thus exploiting the full
`computing power of each. This is done by splitting the processing of an application between two
`distinct components: a ‘front-end’ client and a ‘back-end’ server. The client component is a complete,
`stand-alone personal computer (not a ‘dumb’ terminal), and it offers the user its full range of power
`and features for running applications. The server component can be a personal computer, a
`minicomputer, or a mainframe that provides the traditional strengths offered by minicomputers and
`mainframes in a time-sharing environment: data management, information sharing between clients,
`and sophisticated network administration and security features. The client and server machines work
`together to accomplish the processing of the application being used. Not only does this increase the
`processing power available over older architectures but it also uses that power more efficiently. The
`client portion of the application is typically optimized for user interaction, whereas the server portion
`provides the centralized, multiuser functionality. See also distributed intelligence. Compare peer-to-
`peer network.”) This definition is unchanged from the third edition (1997).
`4 See, e.g., Microsoft Computer Dictionary, 5/e, 2002. (“receive vb. To accept data from an external
`communications system, such as a local area network (LAN) or a telephone line, and store the data as a
`file.”) This definition is unchanged from the third edition (1997).
`7
`
`DECLARATION OF MICHAEL T. GOODRICH
`
`CASE NO. 4:18-cv-07229-YGR
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`

`

`Case 4:18-cv-07229-YGR Document 59-1 Filed 04/06/20 Page 9 of 62
`
`
`
`Likewise, a plain-and-ordinary meaning of “transmit” in this context is “to send data to another
`component via a communications system or network.”5
`B. Malware
`As is discussed in my coauthored book, Introduction to Computer Security, malicious
`29.
`software, which is also known as malware, is software whose existence or execution has negative
`consequences. Examples include backdoors, which allow unauthorized access to a system, logic
`bombs, which perform a malicious action based on a triggering event such as a date or time, computer
`viruses, which are software instances that can replicate themselves by injecting their code into other
`files for malicious purposes, Trojan horses, which appear to perform useful tasks, but also do actions
`with negative consequences, and computer worms, which are malicious programs that spread copies of
`themselves via a network without injecting code copies into other files. In some cases, the malicious
`intent of malware is to use system resources, like computer memory or network bandwidth, while in
`other cases the malicious intent is to cause deliberate harm, such as deleting or modifying data or
`crashing networks or computer systems.
`Because they can replicate themselves through other files, computer viruses have been
`30.
`particularly vexing to stop, and several techniques have been employed against them. Examples
`include finding patterns or “signatures” in the code of a virus so as to identify and remove it and
`keeping track of digital digests or “fingerprints” of existing files and noting when those digests or
`fingerprints change.
`These approaches are not as effective or applicable for downloadables, however, which
`31.
`are small executable or interpretable application programs that are downloaded from a source computer
`and run on a destination computer. For such software instances, the ’154, ’494, and ’968 Patents
`describe novel inventions for identifying and stopping malicious downloadables.
`
`
`5 See, e.g., Microsoft Computer Dictionary, 5/e, 2002. (“transmit vb. To send information over a
`communications line or circuit. …” and “transmitter vb. Any circuit or electronic device designed to
`send electronically encoded data to another location.”) These definitions are unchanged from the third
`edition (1997).
`
`DECLARATION OF MICHAEL T. GOODRICH
`
`8
`
`CASE NO. 4:18-cv-07229-YGR
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`

`

`Case 4:18-cv-07229-YGR Document 59-1 Filed 04/06/20 Page 10 of 62
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`The ’494 Patent
`C.
`The ’494 was filed November 7, 2011 and was issued March 18, 2014. I understand that
`32.
`this patent claims priority to January 29, 1997.
`The ‘494 Patent discloses systems and methods for protecting computers and other
`33.
`network accessible devices from undesirable or otherwise malicious operations of downloadables. It
`discloses a protection engine that provides for monitoring information received, determining whether
`the received information is likely to include executable code, and, if so, causes what the patent calls
`“mobile protection code’’ to be transferred to a receiving device, which then makes a determination as
`to whether the downloadable will attempt malicious operations and, based on that determination,
`causes predetermined corresponding operations to be executed in response to such attempts. See, e.g.,
`the ‘494 Patent at Abstract.
`The ’968 Patent
`D.
`34.
`The ’968 Patent was filed February 27, 2003 and was issued November 15, 2005.
`35.
`The ’968 Patent describes a policy-based cache manager, which allows for cached
`content to be subject to multiple policies according to an index, so that digital content can be
`determined if it is allowable relative to a given set of policies when it is being cached. The ’968 Patent
`at Abstract.
`The ’154 Patent
`E.
`The ’154 Patent was filed September 30, 2010 and was issued March 20, 2012.
`36.
`The ’154 Patent describes a method for protecting a client computer from dynamically
`37.
`generated malicious content. It discloses receiving content, where that content includes a call to a
`function, which may then be replaced with a call to a replacement function, which transmits the
`content to a security computer for inspection, transmitting the content to the client computer,
`processing the content, transmitting the input to the security computer where a first function is
`invoked, determining at the security computer whether the call is safe, transmitting a response
`regarding this determination to the client computer, and invoking a second function only if a security
`computer indicates that it is safe to do so. See, e.g., the ’154 Patent at Abstract.
`
`DECLARATION OF MICHAEL T. GOODRICH
`
`9
`
`CASE NO. 4:18-cv-07229-YGR
`
`

`

`Case 4:18-cv-07229-YGR Document 59-1 Filed 04/06/20 Page 11 of 62
`
`
`
`V.
`
`CLAIM INTERPRETATION OF “RECEIVER” AND “TRANSMITTER”
`The Terms “Receiver” and “Transmitter” Connote Structure
`A.
`38.
`Dr. Rubin opines in his declaration that a POSITA would not understand the terms
`“receiver” and “transmitter” to connote structure. Rubin Decl. at paragraphs 35-37. I disagree.
`As mentioned above, a POSITA would understand the terms “receive” and “transmit”
`39.
`to be terms of art in the context of distributed computing, with plain-and-ordinary means that are,
`respectively, “to accept data from another component via a communications system or network”6 and
`“to send data to another component via a communications system or network.”7 Likewise, a POSITA
`would understand the terms “receiver” and “transmitter” to be terms of art. This understanding is
`supported, for example, by the Microsoft Computer Dictionary, as I cite above and in the footnotes.
`This understanding is further supported by the Dictionary of Computing, which I also cite in the
`footnotes.8 Thus, a POSITA would understand that in the context of distributed computing, a plain-
`and-ordinary meaning of “receiver” is “a component that accepts data from another component via a
`communications system or network” and a “transmitter” is “a component that sends data to another
`component via a communications system or network.”
`
`
`6 See, e.g., Microsoft Computer Dictionary, 5/e, 2002. (“receive vb. To accept data from an external
`communications system, such as a local area network (LAN) or a telephone line, and store the data as a
`file.”) This definition is unchanged from the third edition (1997).
`
`7 See, e.g., Microsoft Computer Dictionary, 5/e, 2002. (“transmit vb. To send information over a
`communications line or circuit. …” and “transmitter vb. Any circuit or electronic device designed to
`send electronically encoded data to another location.”) These definitions are unchanged from the third
`edition (1997).
`
`8 See, e.g., Dictionary of Computing, 4/e, Collin, 2002. (“receive verb to accept data from a
`communications link”, “receiver noun electronic device that can detect transmitted signals and present
`them in a suitable form”, “transmit verb to send information from one device to another, using any
`medium, such as radio, cable, wire link, etc.”, “transmitter (TX) noun device which will take an input
`signal, process it (modulate or convert to sound, etc.) then transmit it by some medium (radio, light,
`etc.).”)
`
`10
`DECLARATION OF MICHAEL T. GOODRICH
`
`CASE NO. 4:18-cv-07229-YGR
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`

`

`Case 4:18-cv-07229-YGR Document 59-1 Filed 04/06/20 Page 12 of 62
`
`
`
`This understanding is further supported by the textbook, Computer Networks, by
`40.
`Tanenbaum,9 which is a widely adopted textbook used in many undergraduate computer science
`curricula. Tanenbaum uses the terms “receiver” and “transmitter” without needing to provide to the
`reader further structural definition for the concepts he is discussing, confirming that the terms are
`sufficient to convey structure to a POSITA.
`For example, Tanenbaum writes in the introductory chapter describing networking,
`41.
`“Point-to-point transmission with exactly one sender and exactly one receiver is sometimes called
`unicasting.” Tanenbaum at 17 [bold-italics added, bold as in the original] (see also Tanenbaum 4/e at
`20). Tanenbaum also writes, “An allocation problem that occurs at every level is how to keep a fast
`sender from swamping a slow receiver with data.” Tanenbaum at 34 [emphasis added] (see also
`Tanenbaum 3/e at 21). Further, Tanenbaum writes, “The essential aspect of a connection is that it acts
`like a tube: the sender pushes objects (bits) in at one end, and the receiver takes them out at the other
`end.” Tanenbaum at 35 [emphasis added] (see also Tanenbaum 3/e at 23). In addition, Tanenbaum
`writes, “Another issue that arises in the data link layer (and most of the higher layers as well) is how to
`keep a fast transmitter from drowning a slow receiver in data.” Tanenbaum at 43 (see also Tanenbaum
`3/e at 30). Moreover, in this same introductory chapter, Tanenbaum writes, “The most practical
`approach [to connect office and laptop computers to the Internet] is to equip both the office and laptop
`computers with short-range radio transmitters and receivers to allow them to talk.” Tanenbaum at 70
`[emphasis added] (see also Tanenbaum 4/e at 58). Tanenbaum illustrates this idea, along with a
`concept known as “multipath fading” that can occur in such scenarios, in a figure, which I excerpt
`below:
`
`
`9 Tanenbaum, Computer Networks, 5/e, Prentice Hall, 2011, 2003 (4/e), 1996 (3/e), 1989 (2/e), 1981
`(1/e).
`
`11
`DECLARATION OF MICHAEL T. GOODRICH
`
`CASE NO. 4:18-cv-07229-YGR
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`

`

`Case 4:18-cv-07229-YGR Document 59-1 Filed 04/06/20 Page 13 of 62
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`Tanenbaum at 71 [highlighting added].
`A POSITA would understand that the context of the ’154, ’494, and ’968 Patent
`42.
`includes distributed computing; hence, the terms “receiver” and “transmitter” connote structure in the
`context of these patents, as disclosed, for instance, in the exemplary dictionary and textbook citations
`given above.10 For example, the ’494 states that the field of its invention “relates generally to computer
`networks, and more particularly provides a system and methods for protecting network-connectable
`devices from undesirable downloadable operation.” ’494 Patent at 1:59-63. The ’968 Patent states that
`the field of its invention “relates to cache management and content filtering” (’968 Patent at 1:5-6) and
`that “Internet browsers cache web pages so that these pages do not have to be re-transmitted when a
`user returns to view the same page a second time.” ’968 Patent at 1:11-14, emphasis added. The ’154
`Patent states that the field of its invention “relates to computer security, and more particularly to
`protection against malicious code such as computer viruses” (’154 Patent at 1:8-10) and “With the
`advent of the Internet and the ability to run executable code such as scripts within Internet browsers, a
`new type of virus formed; namely, a virus that enters a computer over the Internet and not through the
`computer’s file system.” ’154 Patent at 1:34-37. Therefore, the context of the ’154, ’494, and ’968
`Patents includes distributed computing; hence, a POSITA would understand the terms “receiver” and
`
`
`10 It is further my opinion, as I explain elsewhere herein, that the ’154, ’494, and ’968 Patent
`specifications themselves disclose structure for “receiver” and “transmitter.”
`12
`DECLARATION OF MICHAEL T. GOODRICH
`
`CASE NO. 4:18-cv-07229-YGR
`
`

`

`Case 4:18-cv-07229-YGR Document 59-1 Filed 04/06/20 Page 14 of 62
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`“transmitter” to connote structure in the context of these patents. I also note that nothing in the file
`histories for all three of these patents indicates that the examiner questioned or challenged the structure
`of the claimed “receiver” or “transmitter” elements, which further supports that these terms connote
`structure in the context of these patents.
`Dr. Rubin admits that “[t]ransmitting and receiving are

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket