throbber
Filed on behalf of: PNC Bank, N.A.
`
`
`
`JPMorgan Chase & Co.
`
`
`
`JP Morgan Chase Bank, N.A.
`
`By: Lionel M. Lavenue
`Timothy J. May
`FINNEGAN, HENDERSON, FARABOW,
` GARRETT & DUNNER, LLP
`901 New York Avenue, NW
`Washington, DC 20001-4413
`Telephone: 202-408-4000
`Facsimile: 202-408-4400
`E-mail: lionel.lavenue@finnegan.com
`
`timothy.may@finnegan.com
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`PNC Bank, N.A., JP Morgan Chase & Co., and JP Morgan Chase Bank, N.A.,
`Petitioner
`
`v.
`
`Maxim Integrated Products, Inc.,
`Patent Owner
`
`
`Patent No. 6,105,013
`
`
`
`DECLARATION OF HENRY N. DREIFUS
`
`Page 1 of 95
`
`PNC-JP MORGAN EXHIBIT 1008
`
`

`
`TABLE OF CONTENTS
`
`I. 
`
`Introduction ...................................................................................................... 1 
`
`II. 
`
`Qualifications ................................................................................................... 2 
`
`III.  Materials Reviewed ......................................................................................... 4 
`
`IV.  Overview of the ’013 Patent ............................................................................ 5 
`
`V. 
`
`Person of Ordinary Skill in the Art .................................................................. 8 
`
`VI.  Claim Construction .......................................................................................... 9 
`
`VII.  Certain References Disclose and/or Render Obvious All Elements of
`Claims 1-6, 8-12, 14, and 15 of the ’013 Patent .............................................. 9 
`
`A.  Hawkes Discloses All Elements of Claims 1-3, 6, 8, 9, 11, 12,
`14, and 15 of the ’013 Patent ............................................................... 10 
`
`1.  Microcontroller Core ................................................................ 12 
`
`2.  Math Coprocessor // Modular Exponentiation Accelerator
`Circuit ........................................................................................ 12 
`
`3.  Memory Circuitry // Memory Circuit ....................................... 13 
`
`4. 
`
`5. 
`
`6. 
`
`Input/Output Circuit .................................................................. 14 
`
`Real Time Clock // Clock Circuit ............................................. 15 
`
`Energy Circuit ........................................................................... 15 
`
`Hawkes Renders Claims 1-3, 6, 8, 9, 11, 12, 14, and 15 of
`the ’013 Patent Obvious ...................................................................... 16 
`
`Hawkes in Combination With Cooper Renders Claims 4 and 10
`of the ’013 Patent Obvious .................................................................. 16 
`
`B. 
`
`C. 
`
`D.  Hawkes in Combination With Hardware Hacker Renders Claim
`5 of the ’013 Patent Obvious ............................................................... 18 
`
`
`
`i
`
`Page 2 of 95
`
`

`
`E. 
`
`Chorley Discloses All Elements of Claims 1-3, 6, 9, 11, 12, 14,
`and 15 of the ’013 Patent ..................................................................... 19 
`
`F. 
`
`G. 
`
`H. 
`
`I. 
`
`1.  Microcontroller Core ................................................................ 20 
`
`2.  Math Coprocessor // Modular Exponentiation Accelerator
`Circuit ........................................................................................ 21 
`
`3.  Memory Circuitry // Memory Circuit ....................................... 22 
`
`4. 
`
`5. 
`
`6. 
`
`Input/Output Circuit .................................................................. 23 
`
`Real Time Clock // Clock Circuit ............................................. 23 
`
`Energy Circuit ........................................................................... 25 
`
`Chorley in Combination With Hawkes Renders Claims 1-3, 6, 8,
`9, 11, 12, 14, and 15 of the ’013 Patent Obvious ................................ 25 
`
`Chorley in Combination With Cooper or in combination with
`Hawkes and Cooper Renders Claims 4 and 10 of the ’013
`Patent Obvious .................................................................................... 27 
`
`Chorley in Combination With Hardware Hacker or in
`combination with Hawkes and Hardware Hacker Renders
`Claim 5 of the ’013 Patent Obvious .................................................... 28 
`
`Blandford Discloses All Elements of Claims 1-4, 6, 9, 10, 12,
`and 15 of the ’013 Patent ..................................................................... 29 
`
`1.  Microcontroller Core ................................................................ 31 
`
`2.  Math Coprocessor // Modular Exponentiation Accelerator
`Circuit ........................................................................................ 32 
`
`3.  Memory Circuitry // Memory Circuit ....................................... 32 
`
`4. 
`
`5. 
`
`6. 
`
`Input/Output Circuit .................................................................. 33 
`
`Real Time Clock // Clock Circuit ............................................. 33 
`
`Energy Circuit ........................................................................... 34 
`
`
`
`ii
`
`Page 3 of 95
`
`

`
`J. 
`
`Blandford in Combination With Hardware Hacker Renders
`Claim 5 of the ’013 Patent Obvious .................................................... 35 
`
`VIII.  Conclusion ..................................................................................................... 36 
`
`
`
`iii
`
`Page 4 of 95
`
`

`
`
`
`I.
`
`I, Henry N. Dreifus, declare as follows:
`
`Introduction
`
`1.
`
`I have been retained by PNC Bank, N.A., JP Morgan Chase & Co.,
`
`and JP Morgan Chase Bank, N.A. (collectively, “Petitioner”) as an independent
`
`expert consultant in this proceeding before the United States Patent and Trademark
`
`Office. Although I am being compensated at my rate of $350.00 per hour for the
`
`time I spend on this matter, no part of my compensation depends on the outcome
`
`of this proceeding, and I have no other interest in this proceeding.
`
`2.
`
`I understand that this proceeding involves U.S. Patent No. 6,105,013
`
`(“the ’013 patent”) (attached as Ex. 1001 to the petition). The application for
`
`the ’013 patent was filed on March 10, 1998, as U.S. Patent Application
`
`No. 09/041,190, which is based on U.S. Provisional Patent Application No.
`
`60/004,510, filed September 29, 1995, and the patent issued on August 15, 2000.
`
`3.
`
`I have been asked to consider whether certain references disclose or
`
`render obvious the claims of the ’013 patent.
`
`4.
`
`I have been advised that a patent claim may be invalid as obvious if
`
`the differences between the subject matter patented and the prior art are such that
`
`the subject matter as a whole would have been obvious at the time the invention
`
`was made to a person having ordinary skill in the art. I have also been advised that
`
`several factual inquiries underlie a determination of obviousness. These inquiries
`
`
`
`1
`
`Page 5 of 95
`
`

`
`include the scope and content of the prior art, the level of ordinary skill in the field
`
`of the invention, the differences between the claimed invention and the prior art,
`
`and any objective evidence of non-obviousness.
`
`5.
`
`I have been advised that objective evidence of non-obviousness,
`
`known as “secondary considerations of non-obviousness,” may include
`
`commercial success, satisfaction of a long-felt but unsolved need, failure of others,
`
`copying, skepticism or disbelief before the invention, and unexpected results. I am
`
`not aware of any such objective evidence of non-obviousness of the subject matter
`
`claimed in the ’013 patent at this time.
`
`6.
`
`In addition, I have been advised that the law requires a “common
`
`sense” approach of examining whether the claimed invention is obvious to a
`
`person skilled in the art. For example, I have been advised that combining familiar
`
`elements according to known methods is likely to be obvious when it does no more
`
`than yield predictable results.
`
`7. My opinions are set forth below.
`
`II. Qualifications
`
`8.
`
`I am the Founder and Managing Director of Dreifus Associates,
`
`Limited (DAL), an Identity technology and Personnel Assurance solutions
`
`development and integration organization established in 1991. My
`
`accomplishments include holding a key patent on advanced smart cards and
`
`
`
`2
`
`Page 6 of 95
`
`

`
`portable electronic transaction technology. I have more than 25 years of experience
`
`in the advanced card solutions field including extensive project work on strategic
`
`engagements developing systems applying multiple types of card technologies
`
`ranging from magnetic, optical and intelligent (smart card) for financial, security,
`
`consumer marketing and information applications. I have served as a recognized
`
`worldwide advisor in the card technology industry and provide vision for the
`
`application of enabling technologies to solve business problems. I was also a
`
`founding director of the Smart Card Industry Association and served as a delegate
`
`to the International Standards Organization (ISO) and the American National
`
`Standards Institute (ANSI) developing worldwide standards for the smart
`
`(integrated circuit) cards.
`
`9. My project assignments in smart card based solutions include
`
`providing consulting and advisory work to various elements of the financial
`
`transaction and identification solutions supply chain ranging from the card
`
`manufacturers and system component manufacturers to system operators. This has
`
`included work for American Express, MasterCard International, Rand McNally
`
`Corporation, Visa, Arthur Blank & Company, United States Department of
`
`Defense, AT&T and others.
`
`10. My current project assignments include supporting the development
`
`of a needs assessment and detailed design for an international interoperable
`
`
`
`3
`
`Page 7 of 95
`
`

`
`citizen’s identification capability to allow for multiple countries participating in an
`
`economic union to identify and provide services to citizens across the countries to
`
`include border crossing, social security, healthcare, driving, voting and other
`
`services.
`
`11. My curriculum vitae, which includes a more detailed summary of my
`
`background and experience, is attached as Appendix A.
`
`III. Materials Reviewed
`
`12.
`
`In forming my opinions, I have reviewed the ’013 Patent, the
`
`prosecution history of the ’013 patent, and the following documents:
`
` In re Maxim Integrated Prods., Inc., Case No. 2:12-mc-00244, MDL
`
`No. 2354 (W.D. Pa.), Docket No. 691, Special Master’s Report and
`
`Recommendation Re: Claim Construction (Oct. 9, 2013) (attached as
`
`Ex. 1009 to Petitioner’s filing);
`
` In re Maxim Integrated Prods., Inc., Case No. 2:12-mc-00244, MDL
`
`No. 2354 (W.D. Pa.), Docket No. 693, Correction to Special Master’s
`
`Report and Recommendation Re: Claim Construction (Oct. 15, 2013)
`
`(attached as Ex. 1010 to Petitioner’s filing);
`
` P. L. Hawkes, D. W. Davies, and W. L. Price, Integrated Circuit Cards,
`
`Tags and Tokens, New Technology and Applications (1990)
`
`(“Hawkes,” attached as Ex. 1011 to Petitioner’s filing);
`
`
`
`4
`
`Page 8 of 95
`
`

`
` International Publication No. WO 93/11540 by Cooper et al. (“Cooper,”
`
`attached as Ex. 1012 to Petitioner’s filing);
`
` Don Lancaster, Hardware Hacker, July, 1993 (“Hardware Hacker,”
`
`attached as Ex. 1013 to Petitioner’s filing);
`
` B. J. Chorley and W. L. Price, An Intelligent Token for Secure
`
`Transactions, Security and Protection in Information Systems:
`
`Proceedings of the Fourth IFIP TC 11 International Conference on
`
`Computer Security, IFIP/Sec ‘86 (1989) (“Chorley,” attached as Ex.
`
`1014 to Petitioner’s filing);
`
` International Publication No. WO 92/12485 by Robert Blandford
`
`(“Blandford,” attached as Ex. 1015 to Petitioner’s filing); and
`
` U.S. Patent No. 4,575,621 (attached as Ex. 1007 to Petitioner’s filing).
`
`IV. Overview of the ’013 Patent
`
`13. The ’013 patent purportedly relates to a “module” used for “monetary”
`
`or “digital cash” transactions. Ex. 1001 at 1:24-29, 1:48-67, and 7:62-12:34. As
`
`noted by the patent, conventional electronic hardware already existed for this
`
`purpose. Ex. 1001 at 1:43-45. In fact, I developed and filed a patent application for
`
`such hardware more than a decade before submission of the provisional application
`
`that lead to the ’013 patent. My application issued as U.S. Patent No. 4,575,621
`
`(Ex. 1007).
`
`
`
`5
`
`Page 9 of 95
`
`

`
`14. Figure 1 of ’013 patent, reproduced below, is a block-diagram of
`
`the ’013 patent’s module (module 10).
`
`
`
`15. As illustrated in Figure 1, module 10 includes one or more integrated
`
`circuits and has a microprocessor 12, a math coprocessor (or modular
`
`exponentiation accelerator) 18, memory circuitry 20 (including ROM 22 and
`
`NVRAM 24), input/output circuitry 26, a real time clock 14, and an energy circuit
`
`34. Ex. 1001 at 2:34-42, 3:5-9, and 3:21-30. These components are no different
`
`from the components used in many of the modules that I worked with in the 1980s.
`
`In fact, it was routine for modules to include a microprocessor for performing
`
`control functions and driving overall operation of the module; a math coprocessor
`
`for performing mathematical calculations at high speed for encryption and
`
`
`
`6
`
`Page 10 of 95
`
`

`
`decryption of information; memory circuitry for recording transactions,
`
`maintaining balance and key information, and storing applications; input/output
`
`circuitry for communicating with other devices; a real time clock for generating
`
`time stamps to secure and account for transactions; and an energy circuit for power
`
`other components.
`
`16. The ’013 patent provides some examples of how its module could be
`
`used. For example, the ’013 patent explains how the module can be used as a
`
`digital cash dispenser, how the module can be replenished with cash, and how the
`
`module can transfer cash to another module. Ex. 1001 at 7:63-12:34. However,
`
`these general uses were also well known back in the 1980s, and many of the
`
`modules that I worked with at that time provided for them.
`
`17. The ’013 patent includes sixteen claims, of which only claims 1 and 9
`
`are independent. For example, claim 1 recites a microcontroller based secure
`
`transaction integrated circuit comprising “a microcontroller core,” “a math
`
`coprocessor,” “memory circuitry,” “an input/output circuit,” and “a real time
`
`clock.” In full, claim 1 recites:
`
`A microcontroller based secure transaction
`1.
`integrated circuit comprising:
`a microcontroller core;
`a math coprocessor connected to said
`microcontroller core, said math coprocessor being for
`
`
`
`7
`
`Page 11 of 95
`
`

`
`handling complex mathematics of encryption and
`decryption;
`memory circuitry which can be programmed by
`a service provider to enable said microcontroller based
`secure transaction integrated circuit to perform
`predetermined functions on behalf of the service
`provider and for the benefit of an end user, said
`memory circuitry being connected to said
`microcontroller core;
`
`an input/output circuit, connected to said
`microcontroller core, for exchanging information with
`a device external to said microcontroller based secure
`transaction integrated circuit; and
`a real time clock, connected to said
`microcontroller core, for providing a time
`measurement for time stamping a predetermined
`function.
`Person of Ordinary Skill in the Art
`
`V.
`
`18.
`
`In my opinion, a person of ordinary skill in the art would be a person
`
`with a Bachelor of Science degree in electrical engineering or computer
`
`engineering with at least two years of practical or post-graduate work in the area of
`
`secure financial transactions and integrated circuits. I have employed individuals
`
`who regularly perform smart card solution design and development work with such
`
`skills.
`
`
`
`8
`
`Page 12 of 95
`
`

`
`VI. Claim Construction
`
`19.
`
`I have been advised that the first step of assessing the validity of a
`
`patent claim is to interpret or construe the meaning of the claim.
`
`20.
`
`I have been advised that in post-grant review proceedings before the
`
`U.S. Patent and Trademark Office, a patent claim receives the broadest reasonable
`
`construction in light of the specification of the patent in which it appears. I have
`
`also been advised that, at the same time, claim terms are given their ordinary and
`
`accustomed meaning as would be understood by one of ordinary skill in the art. I
`
`have been informed that the construction of a patent claim applied during this
`
`proceeding may differ from that in a district court proceeding.
`
`21.
`
`I have reviewed the constructions presented by Maxim and
`
`recommended by the Special Master. The adoption of either of these constructions,
`
`or any other proper construction under the broadest reasonable construction, would
`
`not change my opinions set forth below.
`
`VII. Certain References Disclose and/or Render Obvious All Elements of
`Claims 1-6, 8-12, 14, and 15 of the ’013 Patent
`
`22.
`
`In my opinion, Hawkes discloses and/or renders obvious all elements
`
`of claims 1-3, 6, 8, 9, 11, 12, 14, and 15; Hawkes in combination with Cooper
`
`renders claims 4 and 10 obvious; Hawkes in combination with Hardware Hacker
`
`renders claim 5 obvious; Chorley discloses all elements of claims 1-3, 6, 9, 11, 12,
`
`14, and 15; Chorley in combination with Hawkes renders claims 1-3, 6, 8, 9, 11, 12,
`
`
`
`9
`
`Page 13 of 95
`
`

`
`14, and 15 obvious; Chorley in combination with Cooper or in combination with
`
`Hawkes and Cooper renders claims 4 and 10 obvious; Chorley in combination with
`
`Hardware Hacker or in combination with Hawkes and Hardware Hacker renders
`
`claim 5 obvious; Blandford discloses all elements of claims 1-4, 6, 9, 10, 12, and
`
`15; and Blandford in combination Hardware Hacker renders claim 5 obvious.
`
`A. Hawkes Discloses All Elements of Claims 1-3, 6, 8, 9, 11, 12, 14,
`and 15 of the ’013 Patent
`
`23. For the reasons described below and in the claim charts attached as
`
`Appendix A to this declaration, it is my opinion that Hawkes discloses each and
`
`every element of claims 1-3, 6, 8, 9, 11, 12, 14, and 15 of the ’013 patent.
`
`24. Hawkes was published in 1990. I have been informed that Hawkes is
`
`prior art to the ’013 patent under 35 U.S.C. § 102(a).
`
`25. Hawkes is a book edited by P.L. Hawkes, D. W. Davies and W. L.
`
`Price, which describes efforts underway in smart cards in 1990 including a number
`
`of notable implementations and project developments. Hawkes introduces the
`
`concepts and framework for the design and development of a secure module for
`
`financial and other types of services for secure protected information exchange.
`
`Part of the book is devoted to an initiative undertaken by the UK National Physical
`
`Laboratory (NPL) along with other stakeholders sponsored by the Tokens and
`
`Transactions Control Consortium (TTCC), which developed an intelligent active
`
`secure token called the “NPL” or “Talisman” token. Ex. 1011 at chapter 6.
`
`
`
`10
`
`Page 14 of 95
`
`

`
`26.
`
`In my opinion, the NPL or Talisman token is “a microcontroller based
`
`secure transaction integrated circuit.” Hawkes confirms this in its explanation of
`
`the design of the token at page 7: “The Talisman token incorporates encryption
`
`means for generating a cryptographic version of messages sent from the token to
`
`remote computers or other tokens such that the message cannot be read by any but
`
`the intended recipient and he can authenticate that the message must have come
`
`from that token and no other.” Ex. 1011 at 7. Hawkes provides further
`
`confirmation in its explanation of the design of the token at page 84: “The basic
`
`token design therefore includes the ability to calculate digital signatures using a
`
`stored secret key. Since the ability to calculate signatures is a fundamental
`
`requirement in the device, it is convenient to apply this ability to calculating
`
`signatures on transaction messages authorised by the token holder. Transaction
`
`messages signed in this way can be checked anywhere in the transaction
`
`processing system where a reliable copy of the corresponding public key is
`
`available.” Ex. 1011 at 84; see also id. at 89. Figure 6.3, reproduced below,
`
`illustrates the token.
`
`
`
`11
`
`Page 15 of 95
`
`

`
`
`
`1. Microcontroller Core
`
`27.
`
`In my opinion, the token of Hawkes includes “a microcontroller core,”
`
`which Hawkes calls a “control processor” (referring to Figure 6.3). Hawkes also
`
`discloses a few example control processors that were commercially available
`
`including an Intel 8085 and the Texas Instruments TMS7000 series 8-bit
`
`microprocessors. Ex. 1011 at 87. These devices were implemented in at least one
`
`version of the token. Id.
`
`2. Math Coprocessor // Modular Exponentiation Accelerator
`Circuit
`
`28.
`
`It is also my opinion that the token of Hawkes includes “a math
`
`coprocessor connected to said microcontroller core, said math coprocessor being
`
`
`
`12
`
`Page 16 of 95
`
`

`
`for handling complex mathematics of encryption and decryption,” and “a modular
`
`exponentiation accelerator circuit, in communication with said microcontroller
`
`core, for performing encryption and decryption calculations.” Hawkes calls its
`
`math coprocessor/modular exponentiation circuit an “RSA processor” (referring to
`
`Figure 6.3), and explains on page 86: “This device, the TMS32010, is a 16-bit
`
`microprocessor with an instruction execution time of 200 ns. The instruction set
`
`includes a signed 16-bit multiply executed in one cycle. Although not ideal
`
`(overflow and the sign bit caused problems) this processor was programmed to
`
`perform the RSA calculations. The new design continues to use this processor.”
`
`Hawkes also states, “The Talisman token incorporates encryption means for
`
`generating a cryptographic version of messages sent from the token to remote
`
`computers or other tokens such that the message cannot be read by any but the
`
`intended recipient and he can authenticate that the message must have come from
`
`that token and no other.” Ex. 1011 at 7.
`
`3. Memory Circuitry // Memory Circuit
`
`29.
`
`In my opinion, the token of Hawkes also includes “memory circuitry
`
`which can be programmed by a service provider to enable said microcontroller
`
`based secure transaction integrated circuit to perform predetermined functions on
`
`behalf of the service provider and for the benefit of an end user, said memory
`
`circuitry being connected to said microcontroller core,” and “a memory circuit, in
`
`
`
`13
`
`Page 17 of 95
`
`

`
`communication with said microcontroller core, for storing a transaction program.”
`
`Hawkes calls its memory circuitry/circuit “data memory” and “program memory”
`
`(referring to Figure 6.3), and explains that although “32 K bytes of program
`
`memory are available, most applications to date have used only half of this
`
`amount.” Ex. 1011 at 87. Hawkes also states, “Therefore it is likely that these
`
`tokens will be specialised to certain types of application, such as banking. Within
`
`this general area, provided there are agreements on protocols and message formats,
`
`the range of possible transactions could be large. For these transactions, a number
`
`of banks and financial institutions could collaborate with a single token held by the
`
`user. The digital signature principle overcomes the security problems of this
`
`arrangement.” Ex. 1011 at 161.
`
`4.
`
`Input/Output Circuit
`
`30.
`
`It is also my opinion that the token of Hawkes includes “an
`
`input/output circuit, connected to said microcontroller core, for exchanging
`
`information with a device external to said microcontroller based secure transaction
`
`integrated circuit,” and “an input/output circuit, in communication with said
`
`microcontroller core, for receiving and transmitting data information with another
`
`electronic device.” Hawkes calls its input/output circuit a “Serial I/O” (referring to
`
`Figure 6.3). I interpret “I/O” to mean input/output. Hawkes describes the Serial I/O
`
`on page 87 as follows: “Communication between the token and the outside world
`
`
`
`14
`
`Page 18 of 95
`
`

`
`is by way of a three-wire serial interface.” The interface is used in an
`
`authentication process (see figure 6.1 on page 85) in which a random challenge is
`
`sent from a terminal to the token.
`
`5.
`
`Real Time Clock // Clock Circuit
`
`31.
`
`In my opinion, the token of Hawkes also includes “a real time clock,
`
`connected to said microcontroller core, for providing a time measurement for time
`
`stamping a predetermined function,” and “a clock circuit for measuring time and
`
`providing time stamp information responsive to functions being performed by said
`
`microcontroller core.” Hawkes calls its clock/clock circuit a “clock” (referring to
`
`Figure 6.3), and explains on page 87: “The clock maintains information about the
`
`date and time of day, this is used in some applications to date stamp messages.”
`
`Hawkes also states, “To avoid replays of transactions, it is necessary to include a
`
`time and date field in the message.” Ex. 1011 at 85.
`
`6.
`
`Energy Circuit
`
`32.
`
`It is also my opinion that the token of Hawkes includes “an energy
`
`circuit connected to said memory circuitry,” which Hawkes calls a “battery.” For
`
`example, Hawkes refers to “battery backed RAM” and indicates that certain
`
`functions could run “under battery operation.” Ex. 1011 at 87-88.
`
`
`
`15
`
`Page 19 of 95
`
`

`
`33. For the foregoing reasons and as laid out in the claim charts attached
`
`as Appendix B to this declaration, it is my opinion that Hawkes discloses each and
`
`every element of claims 1-3, 6, 8, 9, 11, 12, 14, and 15 of the ’013 patent.
`
`B. Hawkes Renders Claims 1-3, 6, 8, 9, 11, 12, 14, and 15 of the ’013
`Patent Obvious
`
`34. As described above and shown in the claim charts attached as
`
`Appendix B, Hawkes discloses all of the elements of claims 1-3, 6, 8, 9, 11, 12, 14,
`
`and 15. However, to the extent the preamble of either claim 1 or claim 9 is
`
`interpreted to require that all claim elements be part of a single integrated circuit
`
`(as opposed to a combination of multiple integrated or discrete circuits) and to the
`
`extent it is found that Hawkes does not explicitly disclose such a single integrated
`
`circuit, it would have at least been obvious to one of ordinary skill in the art to
`
`combine the circuits of Hawkes into a single integrated circuit. For example, as
`
`Hawkes specifically contemplated, “it will be feasible to miniaturise the intelligent
`
`token still further.” Ex. 1011 at 90. Hawkes also explained that miniaturization
`
`could be achieved by combining circuits. Ex. 1011 at 89. And it would have been
`
`routine for one of ordinary skill in the art to do so.
`
`C. Hawkes in Combination With Cooper Renders Claims 4 and 10 of
`the ’013 Patent Obvious
`
`35. For the reasons described below, it is my opinion that Hawkes in
`
`combination with Cooper renders claims 4 and 10 of the ’013 patent obvious.
`
`
`
`16
`
`Page 20 of 95
`
`

`
`36. Cooper was published on June 10, 1993. I have been informed that
`
`Cooper is prior art to the ’013 patent under 35 U.S.C. § 102(a).
`
`37. Claim 4 depends from claim 3 and requires that “said memory
`
`circuitry is non-volatile RAM.” Claim 10 depends from claim 9 and similarly
`
`requires that “said memory circuit is a nonvolatile RAM.” As described above and
`
`shown in the claim charts attached as Appendix B, Hawkes discloses or renders
`
`obvious all of the elements of claims 3 and 9
`
`38. Hawkes also discloses that “32 K bytes of program memory are
`
`available.” Ex. 1011 at 87. In addition, Hawkes discloses that “[t]he exact form of
`
`memory used in these devices varies widely from UV or electrically
`
`reprogrammable memory devices to battery backed RAM (random access
`
`memory).” Ex. 1011 at 3. Battery backed RAM is a form of persistent storage and
`
`is desirable for many security applications, including inventions I developed in the
`
`1980s for secure portable electronic transaction devices. The use of battery backed
`
`RAM provides a way to rapidly erase any sensitive information, such as encryption
`
`keys in the event of tampering.
`
`39. To the extent it is found that Hawkes does not explicitly disclose the
`
`specific type of memory circuit or circuitry which can be programmed by the
`
`service provider, it would have at least been obvious to one of ordinary skill in the
`
`art to use non-volatile RAM as the program memory. Indeed, such RAM devices
`
`
`
`17
`
`Page 21 of 95
`
`

`
`were well-known in the art. See, e.g., Cooper, Ex. 1012, at Abstract. It would have
`
`been routine for one of ordinary skill in the art to use them, and they would have
`
`provided well-known advantages (e.g., reducing the power needed from the energy
`
`circuit). These advantages were well known in the art at the time of the alleged
`
`invention.
`
`D. Hawkes in Combination With Hardware Hacker Renders Claim 5
`of the ’013 Patent Obvious
`
`40. For the reasons described below, it is my opinion that Hawkes in
`
`combination with Hardware Hacker renders claim 5 of the ’013 patent obvious.
`
`41. Hardware Hacker was published in July, 1993. I have been informed
`
`that Hardware Hacker is prior art to the ’013 patent under 35 U.S.C. § 102(a).
`
`42. Claim 5 depends from claim 1 and requires that “said microcontroller
`
`based secure transaction integrated circuit is programmed in a script programming
`
`language.” As described above and shown in the claim charts attached as Appendix
`
`B, Hawkes discloses or renders obvious all of the elements of claim 1. Hawkes also
`
`discloses that “a high-level language can be used for the application software.” Ex.
`
`1011 at 87. To the extent it is found that Hawkes does not explicitly disclose the
`
`specific type of programming language used, it would have at least been obvious to
`
`one of ordinary skill in the art to use one of the many well-known script
`
`programming languages. For example, Hardware Hacker discusses two script
`
`programming languages, BASIC and PostScript. Ex. 1013 at 66.1-66.2. Using such
`
`
`
`18
`
`Page 22 of 95
`
`

`
`programming languages would allow for faster development of application
`
`software by providing abstraction of the underlying environment, thereby
`
`eliminating the need for software developers to explicitly identify and control each
`
`and every aspect of the software’s functionality down to specific locations (e.g.,
`
`specific memory cells) as would be necessary if programming in a low level (or
`
`machine level) language without the benefit of abstraction. These advantages of
`
`script programming languages were well known in the art at the time of the alleged
`
`invention. Moreover, it would have been routine for one of ordinary skill in the art
`
`to use such languages to program the functionality of the Hawkes token.
`
`E.
`
`Chorley Discloses All Elements of Claims 1-3, 6, 9, 11, 12, 14, and
`15 of the ’013 Patent
`
`43. For the reasons described below and in the claim charts attached as
`
`Appendix C to this declaration, it is my opinion that Chorley discloses each and
`
`every element of claims 1-3, 6, 9, 11, 12, 14, and 15 of the ’013 patent.
`
`44. Chorley was published at least as early as 1989. I have been informed
`
`that Chorley is prior art to the ’013 patent under 35 U.S.C. § 102(a).
`
`45. Chorley is an article by B J Chorley and W L Price, which describes
`
`the design of an intelligent token developed by the National Physical Laboratory in
`
`the UK, the same token discussed by Hawkes.
`
`46.
`
`In my opinion, the intelligent token is “a microcontroller based secure
`
`transaction integrated circuit.” Chorley confirms this on page 391: “Our purpose in
`
`
`
`19
`
`Page 23 of 95
`
`

`
`presenting this paper is to examine some aspects of the process of verifying the
`
`identity of authorised users and also the integrity of the transactions carried out on
`
`their behalf. We shall then develop a specification for an intelligent token that can
`
`participate effectively in achieving identity verification and transaction integrity.”
`
`Figure 1 on page 394, reproduced below, illustrates the token.
`
`
`
`1. Microcontroller Core
`
`47.
`
`In my opinion, the token of Chorley includes “a microcontroller core,”
`
`which Chorley calls an “Intel 8085 microprocessor” of the control module of
`
`Figure 1. For example, page 394 of Chorley states, “The token consists of two
`
`main parts (figure 1), the [Texas Instruments] TMS32010 and associated ROM and
`
`RAM storage, and a control module built around an Intel 8085 microprocessor; in
`
`
`
`20
`
`Page 24 of 95
`
`

`
`the control module we have, in addition to ROM and RAM storage, time of day
`
`clock, input/output interface, display and keyboard. The two parts of the unit are
`
`linked via a bus buffer.”
`
`2. Math Coprocessor // Modular Exponentiation Accelerator
`Circuit
`
`48.
`
`It is al

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket