throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`___________________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`___________________________________
`
`GOOGLE INC. AND APPLE INC.
`
`Petitioners
`
`v.
`
`CONTENTGUARD HOLDINGS, LLC
`
`Patent Owner
`
`U.S. Patent No. 7,774,280
`
`_________________________________
`
`Case CBM: CBM2015-000401
`
`_________________________________
`
`DECLARATION OF BENJAMIN GOLDBERG, PH.D. IN SUPPORT OF
`PETITIONERS’ REPLY TO PATENT OWNER’S RESPONSE AND
`OPPOSITION TO PATENT OWNER’S
`CONTINGENT MOTION TO AMEND
`
`1 Case No. CBM2015-00160
`
`Exhibit 1032
`Declaration of Benjamin Goldberg
`
`

`
`OVERVIEW
`
`1. I have been retained as an expert witness on behalf of Google Inc. for the
`
`above-captioned covered business method review. I am competent to make this
`
`declaration. I submitted a declaration in support of the Petition originally filed
`
`for this case (Exhibit 1014).
`
`2. I am being compensated for my time in connection with this covered business
`
`method review at my standard consulting rate, which is $450 per hour. My
`
`compensation is not dependent on the substance of my opinions, my testimony,
`
`or the outcome of this covered business method patent review.
`
`3. In preparing this Declaration, I have reviewed the ‘280 patent and the ‘012
`
`Stefik patent, Patent Owner’s Response, Patent Owner’s Contingent Motion to
`
`Amend, Dr. Martin’s declaration and the transcript of Dr. Martin’s deposition.
`
`4. In formulating my opinions, I have relied upon my experience in the relevant
`
`art. I have also considered, in formulating my opinions, the viewpoint of a
`
`person of ordinary skill in the art in early 2001. I am familiar with the level of
`
`skill of a person of ordinary skill in the art with respect to the technology at
`
`issue in June, 2001, which I understand is the earliest possible priority date for
`
`the ‘280 patent.
`
`2
`
`Exhibit 1032
`Declaration of Benjamin Goldberg
`
`

`
`BACKGROUND AND QUALIFICATIONS
`
`5. I am a tenured Associate Professor in the Department of Computer Science of
`
`the Courant
`
`Institute of Mathematical Sciences, New York University
`
`(“NYU”), in New York, NY. I have held this position since September 1994.
`
`From 1987 to 1994, I was an Assistant Professor in the Department of
`
`Computer Science at NYU. Since September 2014, I have been the Director of
`
`Graduate Studies for the MS programs in the Department of Computer Science,
`
`having previously served in that role from September 2009 through August
`
`2012. I served as the Director of Undergraduate Studies for the Department of
`
`Computer Science from September 1995 through August 1998 and from
`
`September 2003 through August 2006.
`
`In addition, I held a one-year visiting
`
`professorship at the Institut National de Recherche en informatique et en
`
`Automatique (INRIA), a national laboratory in France, and was twice appointed
`
`to a month-long position as an invited professor at
`
`the Ecole Normale
`
`Supérieur, a University in Paris.
`
`6. I received my Doctoral degree in Computer Science from Yale University, New
`
`Haven, Connecticut in 1988, having previously received Master of Science and
`
`Master of Philosophy degrees in Computer Science from Yale in 1984. My
`
`undergraduate degree from Williams College in 1982 was a Bachelor of Arts
`
`degree with highest honors in Mathematical Sciences.
`3
`
`Exhibit 1032
`Declaration of Benjamin Goldberg
`
`

`
`7. I have taught courses at the undergraduate and graduate level in, among other
`
`things, software development, programming languages, embedded systems
`
`(including mobile devices and media devices), operating systems, object-
`
`oriented programming, hardware design, and other areas related to the
`
`technology of the ‘280 patent. The content of these courses (e.g. operating
`
`systems, embedded systems, etc.) includes computer security and digital
`
`content distribution.
`
`8. In sum, I have over 30 years of experience in research and development in the
`
`areas of computer science as a professor, researcher and consultant. I consider
`
`myself to be at least a person of ordinary skill in the art, as described below.
`
`The Next-Set-of-Rights (NSOR) Grammar Element Controls Usage Rights
`Creation
`
`9. The following example illustrates how the NSOR element, as described in the
`
`U.S. Patent No. 5,634,012 (the “Stefik ‘012 patent” or “’012 patent”), can be
`
`used to grant the right to add, delete, or replace certain usage rights for a work
`
`after it is transported. Consider two digital works with the following rights:
`
`Work 1
`
`Work 2
`[Play] [Copy]
`[Loan] [Next-Set-of-Rights: (Delete:
`Copy Loan) (Add: Print)]
`10.If the Loan right for either work is exercised, the repository will make a copy of
`
`[Play] [Copy]
`[Loan]
`
`the content and then will create usage rights for that copy either according to
`4
`
`Exhibit 1032
`Declaration of Benjamin Goldberg
`
`

`
`the default rules (Work 1) or as specified in the Next-Set-of-Rights (Work 2).
`
`Thus, for Work 1, the repository will create Play, Copy, and Loan usage rights
`
`for the new copy of the work. This is because there is no NSOR element that
`
`modifies the default rules. See Ex. 1002 at 21:50-52.
`
`For Work 2,
`
`the
`
`repository will create for the new copy of the work a different set of usage
`
`rights: (i) it will create a Play usage right (same as the original copy), (ii) it will
`
`not create a Copy or Loan usage right for that copy (i.e., it will “delete” those
`
`usage rights in the copy) and (iii) it will add a “Print” usage right (not present in
`
`original copy). The different set of usage rights in the copy relative to the usage
`
`rights for the original digital work is directly attributable to actions taken by the
`
`repository when using the NSOR. In other words, the data in the NSOR directs
`
`the repository to: (i) delete the Copy and Loan usage rights from the copy (i.e.,
`
`by specifying “Delete: Copy Loan”) and (ii) add the Print usage right to the
`
`copy (i.e., “Add: Print”).
`
`11.The “Loan” usage right therefore specifies certain actions that can be taken on
`
`the content; namely, making a copy of the content and transferring it to another
`
`repository. For both Work 1 and Work 2, exercising the Loan right causes the
`
`same action to the content: a copy is made and loaned to another repository. But
`
`the usage rights that are created in the loaned copies are different because only
`
`one of the works has a Next-Set-of-Rights meta-right.
`5
`
`Exhibit 1032
`Declaration of Benjamin Goldberg
`
`

`
`12.Stefik shows that the usage right controls the actions being taken on the content
`
`(e.g., making a copy or loaning a copy of the digital work), while the NSOR is
`
`used exclusively to create or delete “usage rights” which are attached to the
`
`copy of the digital work. Changing the NSOR changes the usage rights that a
`
`repository can create or delete during a transaction; it does not change the
`
`action that gets taken on the content.
`
`A Participant in The System of the Stefik ‘012 Patent Can Choose Whether To
`Exercise an NSOR
`
`13.The Stefik ‘012 patent illustrates that a participant in its distribution scheme can
`
`choose whether to exercise an NSOR by selecting from multiple versions of the
`
`same usage right, and furthermore that use of the NSOR can be subject to
`
`conditions. See, e.g., Ex. 1002 at 27:15-33. For example, Stefik describes a
`
`digital work with two different versions of a “Loan” right:
`
`Ex. 1002 at 27:15-33; see also Paper 15 at 58-59 (discussing this example). In this
`
`example, the first “Loan” right has an NSOR element, as well as a Remaining-
`
`6
`
`Exhibit 1032
`Declaration of Benjamin Goldberg
`
`

`
`Copy-Rights element that can also be exercised to create rights (for the original
`
`copy owner), and it requires a daily $10 fee. Ex. 1002 at 27:27-30. The second
`
`“Loan” right has no NSOR element and no rights specified in the Remaining-
`
`Copy-Rights. Id. at 27:30-33. When this digital work is loaned to another
`
`repository, the NSOR element is only exercised if the first Loan right is selected
`
`and the $10 fee is paid. Id. at 27:27-30.The specified Remaining-Copy-Rights are
`
`also only created if the first Loan right is selected and the $10 fee is paid. Id. As
`
`this example shows, a participant in the system may choose to exercise a particular
`
`version of a usage right based on its associated NSOR element or its Remaining-
`
`Copy-Rights, and must meet the corresponding conditions to do so.
`
`Usage Rights Creation Can Be Controlled as a Work is Passed
`
`14.The NSOR element allows a publisher to control usage rights creation as a
`
`digital work is passed down a chain of repositories. For example, the publisher
`
`could supply a digital work with multiple versions of a Copy usage right, each
`
`with a different NSOR element bearing a different fee. The publisher could
`
`thereby exert control over usage rights creation as a digital work is passed down
`
`a chain of repositories, while permitting a degree of choice (as to which NSOR
`
`element to use) by downstream distributors and consumers. See Ex. 1014 ¶¶ 59,
`
`64, 68.
`
`15.Consider the following exemplary set of usage rights:
`7
`
`Exhibit 1032
`Declaration of Benjamin Goldberg
`
`

`
`(Play)
`
`(Copy Next-Set-of-Rights: (Delete: Copy)
`
`Fee: Per-Use: $1.00 To: Account-ID-567)
`
`(Copy Next-Set-of-Rights: (Delete: Copy Add: Print)
`
`Fee: Per-Use: $2.00 To: Account-ID-567)
`
`16.In this example, the user has a choice of two Copy rights. One allows the user
`
`to create a copy that only has a Play right and the other allows the user to create
`
`a copy that has the Play and Print rights. The user is not required to exercise
`
`each NSOR element; he can choose between creating a copy that has the Play
`
`right only or one that has both a Play and a Print right. Supplying a digital work
`
`with multiple versions of a usage right, each with a different NSOR element,
`
`allows a publisher to exert control over usage rights creation as a digital work is
`
`passed down a chain of repositories, while permitting a degree of choice by
`
`downstream distributors and consumers.
`
`The NSOR Is a Meta-Right
`
`17.Exercising the NSOR element only creates, destroys, or modifies usage rights;
`
`it does not result in actions to content. For example, if a “Copy” usage right has
`
`an NSOR element, exercising the Copy usage right results in an action to
`
`content (making a copy) while exercising the NSOR element results in creating
`
`or destroying usage rights for the copy of the digital work (the rights specified
`8
`
`Exhibit 1032
`Declaration of Benjamin Goldberg
`
`

`
`using “Add:” or “Delete:”). Because the NSOR element is “a right that, when
`
`exercised, creates or disposes of usage rights (or other meta-rights) but that is
`
`not itself a usage right because exercising a meta-right does not result in action
`
`to content,” it satisfies even ContentGuard’s alternative construction of a “meta-
`
`right.”
`
`18.Under ContentGuard’s proposed construction of “meta-right,” the only
`
`requirement is that meta-rights must create, dispose of, or alter usage rights.
`
`Under this definition, the NSOR is a meta-right. That the data representing the
`
`meta-right is stored in a common file structure with other data representing
`
`usage rights is of no consequence to this conclusion.
`
`NSOR Elements Cannot Be Exercised Unless All Conditions Are Satisfied,
`Including Those Specific to The NSOR and to The Requesting Repository
`
`19.The Stefik ‘012 patent teaches that to exercise a usage right with a NSOR, a
`
`repository must first determine whether all applicable conditions are met. For
`
`example, in the Loan example discussed above (Ex. 1002 at 27:15-33), a $10
`
`fee must be paid to exercise the first Loan right. If the $10 is not paid, the
`
`requester can still borrow the work (using the second Loan right), but different
`
`rights are created (at both the original copy owner’s and the requester’s
`
`repositories). Id. at 27:26-33. This example shows that compliance with the $10
`
`fee condition controls whether the NSOR element is exercised. See id. Ex.
`
`9
`
`Exhibit 1032
`Declaration of Benjamin Goldberg
`
`

`
`1014, ¶ 76. Similarly, if a Loan right contains a “Security Level” parameter, the
`
`Loan right cannot be exercised unless the requesting repository meets the
`
`minimum security level requirement. See Ex. 1002 at 26:16-28 (discussing
`
`“SC:3” element). As Stefik explains, during a transaction, a server repository
`
`validates all conditions on the exercise of a usage right, including any security
`
`level conditions applicable to the consumer repository. See, e.g., id. at 7:23-29,
`
`27:15-33. In the “SC:3” example, “Copy or transfer operations can take place
`
`only with repositories of security level three or greater.” Ex. 1002 at 26:28-36.
`
`Unless the server repository determines that the consumer repository is entitled
`
`to the right because it has sufficient security, any usage rights specified by an
`
`NSOR element associated with the Copy or Transfer right will not be created.
`
`See Ex. 1014, ¶ 77.
`
`ContentGuard’s Proposed Substitute Claim 37
`
`20.I understand that, in its Contingent Motion to Amend, ContentGuard proposes
`
`to substitute claim 37, reproduced below, for claim 1 (new text that would be
`
`introduced by the proposed amendment is underlined):
`
`37. (Proposed substitute for original claim 1) A computer-
`implemented method for transferring rights adapted to be associated
`with items from a rights supplier to a rights consumer, the method
`comprising:
`obtaining a set of rights associated with an item of content, the set of
`10
`
`Exhibit 1032
`Declaration of Benjamin Goldberg
`
`

`
`rights including a meta-right specifying a usage right or another meta-
`right that can be created when the meta-right is exercised, wherein the
`meta-right is provided in digital form and is enforceable by a
`repository;
`determining, by a repository, whether the rights consumer is entitled
`to the right specified by the meta-right; and
`exercising the meta-right to create the right specified by the meta-right
`if the rights consumer is entitled to the right specified by the meta-
`right, wherein the created right includes at least one state variable
`based on the set of rights and used for determining a state of the
`created right, and wherein the meta-right is not itself a usage right
`because exercising the meta-right does not result in action to the
`content.
`
`ContentGuard’s Patent Applications Establish that Meta-Rights Create or Dispose
`of Other Rights
`
`21.For the purpose of arguing that its patent applications disclose the above-
`
`indicated subject matter it seeks to add to the claim, ContentGuard cites various
`
`passages in its patent applications and asserts that they are “explaining that
`
`meta-rights are different from usage rights because exercising meta-right does
`
`not act on content.” Paper 16 at 4-5. Notably, however, one of these cited
`
`passages (in Provisional Patent Application 60/331,624) states: “[w]hen
`
`exercising rights, actions result, for example viewing or using content.” Ex.
`
`11
`
`Exhibit 1032
`Declaration of Benjamin Goldberg
`
`

`
`2013 at 2 (emphasis in original). By using the generic term “rights,” this
`
`sentence suggests that meta-rights can result in actions to content.
`
`A Person Of Ordinary Skill Would Have Been Motivated To Adapt Stefik To
`Exercise The NSOR In A Separate Transaction
`
`22.As I already noted in my previous declaration, there are only two options for
`
`when the NSOR might be exercised relative to when a usage right is exercised:
`
`at the same time or at a different time. Ex. 1014 ¶ 98. A person of ordinary skill
`
`in the art would have recognized that segmenting a transaction into discrete
`
`actions was a conventional technique in Internet-based transactions, and it
`
`would have been common sense to perform those actions at different times. Ex.
`
`1014 ¶¶ 98-99. Adjusting the timing of actions so that the NSOR element was
`
`exercised separately from the “Copy” or “Transfer” action thus would have
`
`been one of a finite number of identified, predictable solutions that was readily
`
`within the grasp of the skilled person. Ex. 1014 ¶¶ 98-99.
`
`Importantly,
`
`exercising the NSOR at a different time than the usage right is exercised would
`
`have no practical consequences for operation of the Stefik scheme; the NSOR
`
`would still be used according to its established function disclosed in Stefik, with
`
`only the timing and/or circumstances of use being modified.
`
`23.Stefik discloses that usage rights can be combined to create complex
`
`distribution channels, and it describes numerous distribution models supported
`
`12
`
`Exhibit 1032
`Declaration of Benjamin Goldberg
`
`

`
`by usage rights. Ex. 1002 at 45:20-24. For example, Stefik shows a scenario
`
`where a separately issued “distribution license” is used to control whether
`
`downstream parties can make copies of a digital work. Ex. 1002 at 46:1-44.
`
`Parties with such a license can make copies, while parties that do not have the
`
`distribution license cannot do so. Id. at 46:20-27, 46:40-44; see also id. at
`
`26:46-52 (showing analogous usage rights statements). Stefik therefore suggests
`
`to the skilled person that it is desirable to manage rights at one level of a
`
`distribution chain in order to control rights granted at a subsequent, downstream
`
`level of the chain.
`
`24.Stefik also describes many other examples of using licenses and shows various
`
`combinations of usage rights to control which distributors can create copies of a
`
`digital work and sell them to consumers and whether additional fees can be
`
`added to the digital works. E.g., Ex. 1002 at 45:45 (“Paid Distributors”), 47:14
`
`(“Distribution Trees”), 47:65 (“Limited Reuse”), 48:18 (“Commercial
`
`Libraries”). Stefik explains that these distribution scenarios permit “fine grained
`
`control of the rights and fees.” Ex. 1002 at 48:6-7. Stefik therefore expressly
`
`provides a way to solve the same problem the ’280 patent purports to address,
`
`namely allowing authors to maintain adequate rights control in multi-level
`
`distribution schemes so they get paid for the use of their work. Ex. 1001 at
`
`2:22-48; see also Ex. 1033 [Martin Dep. Tr.] at 124:13-125:1 (“Distribution
`13
`
`Exhibit 1032
`Declaration of Benjamin Goldberg
`
`

`
`Trees” model is a type of multi-tiered distribution), 126:16-23 (creator of a
`
`work “is able to exert control over that work further down the distribution
`
`chain”); 141:16-21 (same, for publisher). To further these goals identified in
`
`Stefik, a skilled person would have found it obvious to exercise the NSOR
`
`element separately from when usage rights are exercised.
`
`Stefik Suggests Using Rights that can be Exercised Separately from an Action To
`Content
`
`25.Stefik shows use of an “Embed” usage right to enable a distributor or retailer to
`
`add its own fee conditions to a digital work. Ex. 1002 at 41:54-56 (“An embed
`
`transaction is a request . . . to add a shell d-block [to a digital work] to enable
`
`the adding of fees by a distributor of the work.”); id. at 26:6-10 (“For example,
`
`a 5% markup means that a fee of 5% of cumulative fee so far will be allocated
`
`to the distributor. . . . It is typically used in a shell provided by a distributor.”).
`
`The Embed right is exercised by creating a new fee condition and adding it to
`
`an existing digital work. When the Embed right is exercised in this manner,
`
`there is no action on the content.
`
`26.Stefik also explains how the Embed right can be used to add and remove usage
`
`fee conditions. Altering conditions is one way a meta-right can modify a usage
`
`right. Ex. 1001 at 5:56-57. In Stefik’s Paid Distributors scenario, the creator
`
`“grants an Embed right, so that anyone can add shells to have fees paid to
`
`14
`
`Exhibit 1032
`Declaration of Benjamin Goldberg
`
`

`
`themselves.” Ex. 1002 at 45:56-58. The distributor can add a shell specifying
`
`that fees are to be paid back to that distributor. Id. at 45:59-60. The consumer
`
`“can add his own shell with fees to be paid to himself.” Id. at 45:67. This
`
`distribution example shows how fee conditions can be added and removed from
`
`a digital work independent of any action to the content.
`
`27.Stefik also shows that the Embed right can include an NSOR element. Ex. 1002
`
`at 21:3-33, 41:41-46; Fig. 15 (1507). Just as the Embed transaction allows fees
`
`to be added without any action to the content itself, it can allow adding usage
`
`rights pursuant to an NSOR element as well. For example, a digital work could
`
`include the following rights:
`
`(Copy)
`
`(Embed Next-Set-of-Rights: (Add: Play Delete: Embed Copy) Fee: $1)
`
`(Embed Next-Set-of-Rights: (Add: Play (Loan 2) Delete: Embed Copy) Fee:
`
`$2).
`
`Exercising one of the Embed rights above would change the usage rights attached
`
`to the content, but it would not result in an action on the content itself. Thus, Stefik
`
`teaches that it is advantageous to grant a right to create new usage rights that can
`
`be exercised separately from an action to content, and teaches a process for doing
`
`so.
`
`15
`
`Exhibit 1032
`Declaration of Benjamin Goldberg
`
`

`
`CONCLUSION
`
`28.In signing this declaration, I recognize that it will be filed as evidence in a
`
`contested proceeding before the Patent Trial and Appeal Board of the United
`
`States Patent and Trademark Office. I also recognize that I may be subject to
`
`cross-examination in the case and that cross-examination will take place within
`
`the United States. If cross-examination is required, I agree to appear within the
`
`United States during the time allotted and subject myself to cross-examination.
`
`29.I hereby declare that all the statements made herein of my own knowledge are
`
`true and that all statements made on information and belief are believed to be
`
`true, and further that these statements were made with the knowledge that
`
`willful false statements and the like so made are punishable by fine or
`
`imprisonment, or both, under Section 1001 of Title 18 of the United States
`
`Code.
`
`Executed on December 21, 2015
`in Palo Alto, California
`
`Benjamin Goldberg, Ph.D.
`
`16
`
`Exhibit 1032
`Declaration of Benjamin Goldberg

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket