`FOR THE WESTERN DISTRICT OF PENNSYLVANIA
`
`SIGHTSOUND TECHNOLOGIES, LLC,
`
`Plaintiff, Counter-Defendant
`
`
`
`
`
`v.
`
`APPLE INC.
`
`Civil Action No. 2:11-cv-01292-DWA
`
`Senior District Judge Donetta W. Ambrose
`
`Defendant, Counter-Plaintiff.
`
`PLAINTIFF SIGHTSOUND TECHNOLOGIES, LLC’S, EXPERT REPORT
`OF DR. J. DOUGLAS TYGAR REGARDING INFRINGEMENT
`
`
`
`
`
`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`April 22, 2012
`Date
`
`
`
`
`
`Dr. Douglas J. Tygar
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Apple Exhibit 1343 Page 00001
`
`
`
`I.
`
`Introduction
`
`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`
`1.
`
`This report gives the opinions, and their underlying bases and reasons, about
`
`which I may testify at trial on behalf of SightSound Technologies, LLC (“SightSound”). This
`
`report further includes information regarding my comparison of certain claims in the asserted
`
`patents to certain methods that were constructed, operated, practiced or used by Defendant Apple
`
`Inc. (“Apple”). I reserve the right to respond to assertions made by Defendant’s expert witnesses
`
`or fact witnesses and to testify in rebuttal to evidence that Apple may present during trial.
`
`2.
`
`I have been retained by the plaintiff SightSound Technologies, LLC
`
`(“SightSound”), to serve as an expert in this case. I expect to testify at trial regarding the matters
`
`set forth in this report if asked about these matters by the Court or the parties’ attorneys.
`
`3.
`
`4.
`
`I live in Berkeley, California.
`
`I am a tenured, full Professor at the University of California, Berkeley (“UC
`
`Berkeley”), with a joint appointment in the Department of Electrical Engineering and Computer
`
`Science (Computer Science Division) and the School of Information. Prior to joining UC
`
`Berkeley in 1998, I was a tenured faculty member in the Computer Science Department at
`
`Carnegie Mellon University, where I was initially appointed as an assistant professor in 1986.
`
`5.
`
`I am an expert in software engineering, computer security, electronic commerce,
`
`and cryptography. Since 1986, I have regularly taught courses in software engineering,
`
`electronic commerce, and computer security, at the undergraduate, Master’s, and Ph.D. level at
`
`both UC Berkeley and Carnegie Mellon University.
`
`6.
`
`I have also co-written three books that address networking technology and
`
`security for networking technology, and one of those books has been translated into Japanese. I
`
`have helped design the DETER networking testbed supported by the U.S. National Science
`
`‐ 1 ‐
`
`Page 00002
`
`Page 00002
`
`
`
`Foundation and the U.S. Department of Homeland Security that is a widely used framework for
`
`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`
`testing networking. Further, I led the team that designed the SWOON overlay network used to
`
`test mobile networking in that environment.
`
`7.
`
`I helped design the security standards for the U.S. Postal Service’s Information
`
`Based Indicia Program (cryptographic postal indicia) which gives postage payment information
`
`for physical mail. I also helped design the NetBill system at CMU which was an early electronic
`
`payment system that was licensed by CyberCash, and was influential in setting standards for on
`
`electronic payment.
`
`8.
`
`Among my awards are the National Science Foundation Presidential Young
`
`Investigator Award and the Kyoto Fellowship.
`
`9.
`
`I was the co-inventor of a major electronic commerce payment system called
`
`NetBill which has been patented, implemented, and licensed to a commercial company
`
`CyberCash. I am the UC Berkeley lead of the U.S. National Science Foundation Science and
`
`Technology Center TRUST, which studies issues associated with networking and security. The
`
`U.S. State Department chose my project at UC Berkeley to examine the security and networking
`
`issues, including load-balancing issues, for communications protocols and software to support
`
`Internet freedom and allow users to bypass national firewalls in countries such as China, Iran,
`
`and Syria.
`
`10.
`
`I am also affiliated with the Intel Science and Technology Center SCRUB, which
`
`focuses on issues related to networking and security.
`
`11. My complete and current curriculum vitae is attached to this report as Exhibit A.
`
`The cases for which I have testified as an expert witness at trial or by deposition in the past four
`
`years are listed and described in Exhibit B.
`
`‐ 2 ‐
`
`Page 00003
`
`Page 00003
`
`
`
`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`
`I am being compensated at my normal hourly rate of $500 per hour plus expenses
`
`12.
`
`for my work on this matter.
`
`II.
`
`Summary Of Opinions
`
`13.
`
`I understand that the patents in this case are U.S. Patent No. 5,191,573 and
`
`5,191,573 C1 (collectively, “the ’573 patent”) and U.S. Patent No. 5,966,440 and 5,966,440 C1
`
`(collectively, “the ’440 patent”). I refer to the ’573 and ’440 patents collectively in my report as
`
`the asserted patents.
`
`14.
`
`I have been informed that SightSound contends that the asserted patents are
`
`infringed by Apple’s iTunes Store and the methods Apple employs and are used by Apple and
`
`Apple’s customers in the sale of songs, movies, television shows, music videos and albums to
`
`iTunes customers.
`
`15.
`
`As discussed more fully below, it is my opinion that Apple directly infringes and
`
`induces infringement of the following claims of the asserted patents
`
` Claims 1, 2, 4 and 5 of the ’573 patent, and
`
` Claims 1, 11, 64 and 95 of the ’440 patent.
`
`16.
`
`If called as an expert witness, I expect to provide testimony concerning the
`
`infringement of these asserted claims.
`
`17. My opinions are based on my general knowledge and experience, particularly my
`
`expertise in the fields of Internet architecture, media delivery systems, eCommerce systems,
`
`credit card processing technology, engineering development practices, software development and
`
`software engineering. My opinions are further based on documents and information that I have
`
`considered during the preparation of this report, such as the asserted patents and related
`
`prosecution and reexamination histories, the iTunes Apple TV, desktop and mobile clients, the
`
`‐ 3 ‐
`
`Page 00004
`
`Page 00004
`
`
`
`iTunes Store (which is publicly available via the iTunes clients), transactions processed through
`
`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`
`the iTunes Store (Exs. __–__), the claim construction orders in this litigation and in
`
`SightSound.com, Inc. v. N2K, Inc., Case No. Civ. A. 98-CV-118 (“N2K”), reprinted at 185 F.
`
`Supp. 2d 445 (W.D. Pa. 2002), Apple’s 30(b)(6) deposition transcripts; the transcript of Payam
`
`Mirrashidi’s deposition; documents produced by Apple and portions of Apple’s source code for
`
`the iTunes Store and the iTunes clients. A list of all the materials that I considered in forming
`
`my opinions is included in Exhibit C.
`
`18.
`
`I also worked with Dr. Sarah Harris to assist me in the review of Apple’s source
`
`code. Dr. Harris performed an initial review of Apple’s source code, and I consulted with her on
`
`her findings, and then personally reviewed relevant portions of the code when necessary. Based
`
`on my own review after my conversations with Dr. Harris and the printouts, it is my opinion that
`
`the Apple source code confirms the opinions provided in this report.
`
`III. The Asserted Patents
`
`19.
`
`I expect to testify at trial regarding the background of the technology to which the
`
`’573 and ’440 patents relate and the problems they solved. This testimony will be based on my
`
`review of the asserted patents and their prosecution histories and my own specialized knowledge
`
`of this field of technology, which I acquired through my education and professional experience.
`
`20.
`
`On March 2, 1993, the United States Patent and Trademark Office (“PTO”) issued
`
`United States Patent No. 5,191,573 to Mr. Hair. The ’573 patent claims priority to an
`
`application, Serial No. 206,497, that was filed on June 13, 1988. The ’573 patent underwent
`
`reexamination, and the PTO confirmed the validity of all six claims of the ’573 patent by issuing
`
`a reexamination certificate, U.S. Patent No 5,191,573 C1, on November 30, 2010. No claims
`
`from the ’573 patent were amended or cancelled during reexamination.
`
`‐ 4 ‐
`
`Page 00005
`
`Page 00005
`
`
`
`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`
`The PTO further issued Mr. Hair the ’440 patent on October 12, 1999. The ’440
`
`21.
`
`patent is a continuation of the application that gave rise to the ’573 patent and also claims
`
`priority to the same application, No. 07/206,497, that was filed on June 13, 1998. The ’440
`
`patent also underwent reexamination. The PTO confirmed the validity of asserted claims 1 and
`
`11, as amended, and the ’440 patent was amended to include new claims 64 and 95. The PTO
`
`issued a reexamination certificate, U.S. Patent No. 5,966,440 C1, on June 27, 2010.
`
`22.
`
`The ’573 and ’440 patents generally relate to the field of electronic sale and
`
`distribution of digital audio or digital video. More specifically, the patented technology pertains
`
`to selling or purchasing digital audio or video via telecommunications lines.
`
`A.
`
`23.
`
`The ’573 patent
`
`The ’573 patent has priority to an application from 1988. The ’573 patent
`
`discloses a complete method to sell songs and videos over telecommunications lines, such as the
`
`Internet, allow the user to pay per song, album or video, download the corresponding file to his
`
`or her own computer or device and play the media file.
`
`B.
`
`24.
`
`The ’440 patent
`
`The ’440 patent is based on the same application as the ’573 patent and shares the
`
`same specification as the ’573 patent. The claims of the ’440 patent—while different from the
`
`claims of the ’573 patent—are directed to the same general subject matter as the ’573 patent: the
`
`sale and distribution of digital audio and video files.
`
`IV.
`
`Brief overview of the iTunes Store
`
`25.
`
`For clarity, this report only describes and opines on purchases from iTunes in the
`
`United States. I use the term “iTunes Store” to mean the software authored by Apple that
`
`executes on Apple’s servers. I use the term “iTunes Desktop Client” to refer to the software
`
`‐ 5 ‐
`
`Page 00006
`
`Page 00006
`
`
`
`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`
`Detailed analysis of asserted claims
`
`F.
`
`1.
`
`’573 patent, claim 1
`
`68.
`
`Claim 1 of the ’573 patent claims
`
`A method for transmitting a desired digital audio signal stored on a
`first memory of a first party to a second memory of a second party
`comprising the steps of:
`
`[a] transferring money electronically via a telecommunication line
`
`[a][1] to the first party at a location remote from the
`second party and controlling use of the first memory
`
`[a][2] from the second party financially distinct from the
`first party,
`
`[a][3] said second party controlling use and in possession
`of the second memory;
`
`[b] connecting electronically via a telecommunications line the
`first memory with the second memory such that the desired digital
`audio signal can pass therebetween;
`
`[c] transmitting the desired digital audio signal from the first
`memory
`
`[c][1] with a transmitter in control and possession of the
`first party
`
`[c][2] to a receiver having the second memory at a location
`determined by the second party,
`
`[c][3] said receiver in possession and control of the second
`party; and
`
`[d] storing the digital signal in the second memory.
`
`69. My Understanding of the Claim
`
`70.
`
`Claim 1 of the ’573 patent is a method claim pertaining to the electronic sale and
`
`transmission of digital audio signals—which are digital representations of sound waves.
`
`71.
`
`The steps of the method pertain specifically to the following:
`
`‐ 19 ‐
`
`Page 00007
`
`Page 00007
`
`
`
`Confidential-----Outside Attorney Eyes Only
`Source Code
`Information Subject to Protective Order
`
`
`said first party and said second party in
`[e]
`communication via said telecommunications lines,
`
`e.
`
`336. Condition [e] requires that the iTunes user and Apple be in communication via the
`
`telecommunications line. As indicated before, the Court has construed “telecommunications
`
`lines” to mean “an electronic medium for communicating between computers,” and it is my
`
`opinion that this definition includes the Internet.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`condition is satisfied when the iTunes Store requests payment.
`
`Therefore, it is my opinion that this
`
`f.
`
`the step of charging a fee includes the step of
`[f]
`charging a fee via telecommunications lines by the first
`party to the second party at a location remote from the
`second party location,
`
`337. Step [f] of claim 95 of the ’440 patent involves the charging of a fee via
`
`telecommunications lines. The Court has construed “telecommunications lines” to include the
`
`Internet. The Court has also construed charging a fee to mean “requesting payment
`
`electronically.”
`
`338. As discussed above in paragraphs 334–335, the steps of charging a fee are
`
`performed by the iTunes Store and the iTunes Client over the Internet. As discussed above in
`
`‐ 110 ‐
`
`Page 00008
`
`Page 00008
`
`