throbber

`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF PENNSYLVANIA
`
`SIGHTSOUND TECHNOLOGIES, LLC,
`
`Plaintiff, Counter-Defendant
`
`
`
`
`
`v.
`
`APPLE INC.
`
`Civil Action No. 2:11-cv-01292-DWA
`
`Senior District Judge Donetta W. Ambrose
`
`Defendant, Counter-Plaintiff.
`
`PLAINTIFF SIGHTSOUND TECHNOLOGIES, LLC’S, EXPERT REPORT
`OF DR. J. DOUGLAS TYGAR REGARDING INFRINGEMENT
`
`
`
`
`
`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`April 22, 2012
`Date
`
`
`
`
`
`Dr. Douglas J. Tygar
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Apple Exhibit 1024 Page 00001
`
`

`

`I.
`
`Introduction
`
`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`
`1.
`
`This report gives the opinions, and their underlying bases and reasons, about
`
`which I may testify at trial on behalf of SightSound Technologies, LLC (“SightSound”). This
`
`report further includes information regarding my comparison of certain claims in the asserted
`
`patents to certain methods that were constructed, operated, practiced or used by Defendant Apple
`
`Inc. (“Apple”). I reserve the right to respond to assertions made by Defendant’s expert witnesses
`
`or fact witnesses and to testify in rebuttal to evidence that Apple may present during trial.
`
`2.
`
`I have been retained by the plaintiff SightSound Technologies, LLC
`
`(“SightSound”), to serve as an expert in this case. I expect to testify at trial regarding the matters
`
`set forth in this report if asked about these matters by the Court or the parties’ attorneys.
`
`3.
`
`4.
`
`I live in Berkeley, California.
`
`I am a tenured, full Professor at the University of California, Berkeley (“UC
`
`Berkeley”), with a joint appointment in the Department of Electrical Engineering and Computer
`
`Science (Computer Science Division) and the School of Information. Prior to joining UC
`
`Berkeley in 1998, I was a tenured faculty member in the Computer Science Department at
`
`Carnegie Mellon University, where I was initially appointed as an assistant professor in 1986.
`
`5.
`
`I am an expert in software engineering, computer security, electronic commerce,
`
`and cryptography. Since 1986, I have regularly taught courses in software engineering,
`
`electronic commerce, and computer security, at the undergraduate, Master’s, and Ph.D. level at
`
`both UC Berkeley and Carnegie Mellon University.
`
`6.
`
`I have also co-written three books that address networking technology and
`
`security for networking technology, and one of those books has been translated into Japanese. I
`
`have helped design the DETER networking testbed supported by the U.S. National Science
`
`‐ 1 ‐
`
`Page 00002
`
`

`

`Foundation and the U.S. Department of Homeland Security that is a widely used framework for
`
`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`
`testing networking. Further, I led the team that designed the SWOON overlay network used to
`
`test mobile networking in that environment.
`
`7.
`
`I helped design the security standards for the U.S. Postal Service’s Information
`
`Based Indicia Program (cryptographic postal indicia) which gives postage payment information
`
`for physical mail. I also helped design the NetBill system at CMU which was an early electronic
`
`payment system that was licensed by CyberCash, and was influential in setting standards for on
`
`electronic payment.
`
`8.
`
`Among my awards are the National Science Foundation Presidential Young
`
`Investigator Award and the Kyoto Fellowship.
`
`9.
`
`I was the co-inventor of a major electronic commerce payment system called
`
`NetBill which has been patented, implemented, and licensed to a commercial company
`
`CyberCash. I am the UC Berkeley lead of the U.S. National Science Foundation Science and
`
`Technology Center TRUST, which studies issues associated with networking and security. The
`
`U.S. State Department chose my project at UC Berkeley to examine the security and networking
`
`issues, including load-balancing issues, for communications protocols and software to support
`
`Internet freedom and allow users to bypass national firewalls in countries such as China, Iran,
`
`and Syria.
`
`10.
`
`I am also affiliated with the Intel Science and Technology Center SCRUB, which
`
`focuses on issues related to networking and security.
`
`11. My complete and current curriculum vitae is attached to this report as Exhibit A.
`
`The cases for which I have testified as an expert witness at trial or by deposition in the past four
`
`years are listed and described in Exhibit B.
`
`‐ 2 ‐
`
`Page 00003
`
`

`

`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`
`I am being compensated at my normal hourly rate of $500 per hour plus expenses
`
`12.
`
`for my work on this matter.
`
`II.
`
`Summary Of Opinions
`
`13.
`
`I understand that the patents in this case are U.S. Patent No. 5,191,573 and
`
`5,191,573 C1 (collectively, “the ’573 patent”) and U.S. Patent No. 5,966,440 and 5,966,440 C1
`
`(collectively, “the ’440 patent”). I refer to the ’573 and ’440 patents collectively in my report as
`
`the asserted patents.
`
`14.
`
`I have been informed that SightSound contends that the asserted patents are
`
`infringed by Apple’s iTunes Store and the methods Apple employs and are used by Apple and
`
`Apple’s customers in the sale of songs, movies, television shows, music videos and albums to
`
`iTunes customers.
`
`15.
`
`As discussed more fully below, it is my opinion that Apple directly infringes and
`
`induces infringement of the following claims of the asserted patents
`
` Claims 1, 2, 4 and 5 of the ’573 patent, and
`
` Claims 1, 11, 64 and 95 of the ’440 patent.
`
`16.
`
`If called as an expert witness, I expect to provide testimony concerning the
`
`infringement of these asserted claims.
`
`17. My opinions are based on my general knowledge and experience, particularly my
`
`expertise in the fields of Internet architecture, media delivery systems, eCommerce systems,
`
`credit card processing technology, engineering development practices, software development and
`
`software engineering. My opinions are further based on documents and information that I have
`
`considered during the preparation of this report, such as the asserted patents and related
`
`prosecution and reexamination histories, the iTunes Apple TV, desktop and mobile clients, the
`
`‐ 3 ‐
`
`Page 00004
`
`

`

`iTunes Store (which is publicly available via the iTunes clients), transactions processed through
`
`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`
`the iTunes Store (Exs. __–__), the claim construction orders in this litigation and in
`
`SightSound.com, Inc. v. N2K, Inc., Case No. Civ. A. 98-CV-118 (“N2K”), reprinted at 185 F.
`
`Supp. 2d 445 (W.D. Pa. 2002), Apple’s 30(b)(6) deposition transcripts; the transcript of Payam
`
`Mirrashidi’s deposition; documents produced by Apple and portions of Apple’s source code for
`
`the iTunes Store and the iTunes clients. A list of all the materials that I considered in forming
`
`my opinions is included in Exhibit C.
`
`18.
`
`I also worked with Dr. Sarah Harris to assist me in the review of Apple’s source
`
`code. Dr. Harris performed an initial review of Apple’s source code, and I consulted with her on
`
`her findings, and then personally reviewed relevant portions of the code when necessary. Based
`
`on my own review after my conversations with Dr. Harris and the printouts, it is my opinion that
`
`the Apple source code confirms the opinions provided in this report.
`
`III. The Asserted Patents
`
`19.
`
`I expect to testify at trial regarding the background of the technology to which the
`
`’573 and ’440 patents relate and the problems they solved. This testimony will be based on my
`
`review of the asserted patents and their prosecution histories and my own specialized knowledge
`
`of this field of technology, which I acquired through my education and professional experience.
`
`20.
`
`On March 2, 1993, the United States Patent and Trademark Office (“PTO”) issued
`
`United States Patent No. 5,191,573 to Mr. Hair. The ’573 patent claims priority to an
`
`application, Serial No. 206,497, that was filed on June 13, 1988. The ’573 patent underwent
`
`reexamination, and the PTO confirmed the validity of all six claims of the ’573 patent by issuing
`
`a reexamination certificate, U.S. Patent No 5,191,573 C1, on November 30, 2010. No claims
`
`from the ’573 patent were amended or cancelled during reexamination.
`
`‐ 4 ‐
`
`Page 00005
`
`

`

`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`
`The PTO further issued Mr. Hair the ’440 patent on October 12, 1999. The ’440
`
`21.
`
`patent is a continuation of the application that gave rise to the ’573 patent and also claims
`
`priority to the same application, No. 07/206,497, that was filed on June 13, 1998. The ’440
`
`patent also underwent reexamination. The PTO confirmed the validity of asserted claims 1 and
`
`11, as amended, and the ’440 patent was amended to include new claims 64 and 95. The PTO
`
`issued a reexamination certificate, U.S. Patent No. 5,966,440 C1, on June 27, 2010.
`
`22.
`
`The ’573 and ’440 patents generally relate to the field of electronic sale and
`
`distribution of digital audio or digital video. More specifically, the patented technology pertains
`
`to selling or purchasing digital audio or video via telecommunications lines.
`
`A.
`
`23.
`
`The ’573 patent
`
`The ’573 patent has priority to an application from 1988. The ’573 patent
`
`discloses a complete method to sell songs and videos over telecommunications lines, such as the
`
`Internet, allow the user to pay per song, album or video, download the corresponding file to his
`
`or her own computer or device and play the media file.
`
`B.
`
`24.
`
`The ’440 patent
`
`The ’440 patent is based on the same application as the ’573 patent and shares the
`
`same specification as the ’573 patent. The claims of the ’440 patent—while different from the
`
`claims of the ’573 patent—are directed to the same general subject matter as the ’573 patent: the
`
`sale and distribution of digital audio and video files.
`
`IV.
`
`Brief overview of the iTunes Store
`
`25.
`
`For clarity, this report only describes and opines on purchases from iTunes in the
`
`United States. I use the term “iTunes Store” to mean the software authored by Apple that
`
`executes on Apple’s servers. I use the term “iTunes Desktop Client” to refer to the software
`
`‐ 5 ‐
`
`Page 00006
`
`

`

`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`
`Detailed analysis of asserted claims
`
`F.
`
`1.
`
`’573 patent, claim 1
`
`68.
`
`Claim 1 of the ’573 patent claims
`
`A method for transmitting a desired digital audio signal stored on a
`first memory of a first party to a second memory of a second party
`comprising the steps of:
`
`[a] transferring money electronically via a telecommunication line
`
`[a][1] to the first party at a location remote from the
`second party and controlling use of the first memory
`
`[a][2] from the second party financially distinct from the
`first party,
`
`[a][3] said second party controlling use and in possession
`of the second memory;
`
`[b] connecting electronically via a telecommunications line the
`first memory with the second memory such that the desired digital
`audio signal can pass therebetween;
`
`[c] transmitting the desired digital audio signal from the first
`memory
`
`[c][1] with a transmitter in control and possession of the
`first party
`
`[c][2] to a receiver having the second memory at a location
`determined by the second party,
`
`[c][3] said receiver in possession and control of the second
`party; and
`
`[d] storing the digital signal in the second memory.
`
`69. My Understanding of the Claim
`
`70.
`
`Claim 1 of the ’573 patent is a method claim pertaining to the electronic sale and
`
`transmission of digital audio signals—which are digital representations of sound waves.
`
`71.
`
`The steps of the method pertain specifically to the following:
`
`‐ 19 ‐
`
`Page 00007
`
`

`

`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`
`said first party and said second party in
`[e]
`communication via said telecommunications lines,
`
`e.
`
`336. Condition [e] requires that the iTunes user and Apple be in communication via the
`
`telecommunications line. As indicated before, the Court has construed “telecommunications
`
`lines” to mean “an electronic medium for communicating between computers,” and it is my
`
`opinion that this definition includes the Internet.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`condition is satisfied when the iTunes Store requests payment.
`
`Therefore, it is my opinion that this
`
`f.
`
`the step of charging a fee includes the step of
`[f]
`charging a fee via telecommunications lines by the first
`party to the second party at a location remote from the
`second party location,
`
`337. Step [f] of claim 95 of the ’440 patent involves the charging of a fee via
`
`telecommunications lines. The Court has construed “telecommunications lines” to include the
`
`Internet. The Court has also construed charging a fee to mean “requesting payment
`
`electronically.”
`
`338. As discussed above in paragraphs 334–335, the steps of charging a fee are
`
`performed by the iTunes Store and the iTunes Client over the Internet. As discussed above in
`
`‐ 110 ‐
`
`Page 00008
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket