throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`_____________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_____________________________
`
`COMPASS BANK, AMERICAN EXPRESS COMPANY, AMERICAN EXPRESS
`TRAVEL RELATED SERVICES COMPANY, INC., DISCOVER FINANCIAL
`SERVICES, DISCOVER BANK, DISCOVER PRODUCTS INC., NAVY FEDERAL
`CREDIT UNION, AND STATE FARM MUTUAL AUTOMOBILE INSURANCE
`COMPANY
`Petitioner,
`
`v.
`
`MAXIM INTEGRATED PRODUCTS, INC.
`Patent Owner.
`
`Case No. To Be Assigned
`
`Patent No. 6,105,013
`SYSTEM FOR COMMUNICATING
`DATA SECURELY
`______________________________________________________________________________
`
`DECLARATION OF PETER ALEXANDER, PH.D.
`
`COMPASS EXH. 1021 - Page 1 of 71
`
`

`

`V.
`VI.
`
`VII.
`
`B.
`
`I.
`II.
`III.
`IV.
`
`QUALIFICATIONS ............................................................................................................1
`MATERIALS CONSIDERED ............................................................................................3
`LEVEL OF ORDINARY SKILL AND RELEVANT TIME..............................................4
`LEGAL STANDARDS .......................................................................................................5
`A.
`Anticipation..............................................................................................................5
`B.
`Obviousness .............................................................................................................5
`OVERVIEW OF THE ’013 PATENT.................................................................................6
`CLAIM CONSTRUCTION...............................................................................................14
`A.
`“microcontroller based secure transaction integrated circuit” and “secure
`transaction integrated circuit”................................................................................15
`“modular exponentiation accelerator circuit…for performing encryption
`and decryption calculations”..................................................................................15
`“script programming language”.............................................................................16
`C.
`“transaction groups”...............................................................................................19
`D.
`CERTAIN REFERENCES DISCLOSE OR SUGGEST ALL OF THE
`CLAIMED FEATURES OF THE ’013 PATENT.............................................................19
`A.
`Prior Art Overview ................................................................................................19
`1.
`The Sudia Reference (Ex. 1005)................................................................19
`2.
`The Hawkes Reference (Ex. 1006) ............................................................21
`3.
`The Axelson Reference (Ex. 1007)............................................................25
`4.
`The Lancaster Reference (Ex. 1008) .........................................................25
`5.
`The Lee Reference (Ex. 1009)...................................................................26
`Sudia Renders Obvious Claims 1-4, 6-12 and 14-16 of the ‘013 Patent
`Under 35 U.S.C. § 103...........................................................................................26
`1.
`Motivation to Combine..............................................................................26
`2.
`Claim Chart................................................................................................30
`Hawkes Renders Obvious Claims 1-4, 6-12, and 14-16 of the ’013 Patent
`Under 35 U.S.C. § 103...........................................................................................46
`1.
`Motivation to Combine..............................................................................46
`2.
`Claim Chart................................................................................................48
`Claim 5 is Obvious Under 35 U.S.C. § 103 in Light of Hawkes or Sudia
`Alone or in Combination with One or More of Axelson or Lancaster ..................62
`Hawkes and/or Sudia and Lee Render Obvious Claim 13 Under 35 U.S.C.
`§ 103.......................................................................................................................65
`1.
`Motivation to Combine..............................................................................65
`2.
`Claim Chart................................................................................................66
`VIII. CONCLUDING STATEMENTS ......................................................................................69
`
`Table of Contents
`
`i
`
`B.
`
`C.
`
`D.
`
`E.
`
`COMPASS EXH. 1021 - Page 2 of 71
`
`

`

`I, Peter Alexander, declare and state as follows:
`1.
`The petition names Compass Bank, American Express Company, American Express
`Travel Related Services Company, Inc., Discover Financial Services, Discover Bank, Discover
`Products Inc., Navy Credit Federal Credit Union, and State Farm Mutual Automobile Insurance
`Company as real parties-in interest. I have been retained by American Express Company,
`American Express Travel Related Services Company, Inc., Compass Bank, Discover Financial
`Services, Discover Bank, Discover Products Inc., Navy Credit Federal Credit Union, and State
`Farm Mutual Automobile Insurance Company (collectively “Petitioners”) as an expert witness in
`this case to offer my opinions on U.S. Patent No. 6,105,013 (“the ’013 Patent”). I am being
`retained at my customary rate of $525/hour. I have no financial interest in, or affiliation with,
`the Petitioners, real parties-in-interest, or the patent owner, which I understand to be Maxim
`Integrated Products, Inc. My compensation is not dependent upon the outcome of the present
`covered business method patent review or any related litigation proceedings.
`2.
`As preparation for forming opinions expressed in this declaration, I reviewed the ’013
`Patent prosecution history, specification and claims, and the materials discussed below.
`I.
`QUALIFICATIONS
`3.
`My academic credentials include a Ph.D. from the Massachusetts Institute of Technology
`in Electrical Engineering, a Masters degree from the University of Illinois (Urbana) in Electrical
`Engineering, and a Bachelors degree in Electrical Engineering from the University of Canterbury
`(New Zealand). My Curriculum Vitae, attached separately as Ex. 1022 to the Petition, lists my
`prior engagements where I have testified as an expert witness for at least the last 4 years, and a
`list of my publications authored in at least the last 10 years.
`4.
`My academic degrees are all in Electrical Engineering. While undertaking my Doctorate
`work at MIT I worked in the Research Lab. for Electronics that has for decades contributed to
`basic research in information theory, coding, and statistical estimation theory. My Ph.D. thesis
`was in the field of statistical estimation theory as applied to communications systems.
`5.
`As indicated in my Curriculum Vitae, my experience in computer technology design and
`development spans more than 35 years. I have been a designer of computer systems for
`processing, storage and display of data since 1974. In the 1970s, I worked with, among others,
`products in Intel’s various lines of microprocessor and microcontrollers. In the first few years I
`was a university professor teaching graduate and undergraduate electrical engineering courses -
`including the design and programming of computers. Along with a group of young graduate
`students I developed a microprocessor system for industrial control applications in 1974 using
`the Intel 4004 CPU chip as the base component.
`6.
`When I entered the computer industry in the mid-1970s I developed special software and
`custom hardware systems for government agencies such as the Defense Communications
`Agency, Naval Research Labs, and National Security Agency. For most of that period I held a
`Secret security clearance and programmed microprocessor computers for use in defense systems.
`Typically these systems were used for radar and sonar systems deployed by the military. My
`design efforts involved both software and computer hardware architecture and involved custom
`hardware implementations using commercial CPU and digital signal processing (“DSP”) chips.
`
`1
`
`COMPASS EXH. 1021 - Page 3 of 71
`
`

`

`During this phase I developed many systems based on commercial microprocessor and DSP
`chips from Motorola, Intel and Texas Instruments.
`7.
`My contract work with the DSP systems developed for the National Security Agency
`resulted in the commercialization of a high speed computer system. During the 1980s I founded
`a company that sold these high performance machines as commercial products, a company called
`Numerix Corporation. I formulated the system design and programmed a significant portion of
`the application software that ran on the machines. During this decade I was also spearheading
`efforts to migrate the discrete integrated circuits (“IC”) hardware implementations into gate
`arrays – a form of custom chip that was in vogue during that time period. I was the chief
`architect of the systems that we built and personally formulated all the key bus, memory and
`processor interconnections. At that time I had roughly 20 hardware engineers and 30 software
`engineers reporting to me.
`8.
`The high-performance processor products were sold to companies like Standard Oil of
`Ohio in Dallas, Texas to process seismic field data collected for oil exploration as well as to US
`government agencies as commercial off-the-shelf products. For example, some of our systems
`provided processing for sonar systems used to track Soviet submarines in the Pacific Ocean.
`Others were used in military radar systems for missile tracking by RCA. Numerix Corporation
`was acquired in 1989 by a Boston company called Mercury Computer Systems that continues to
`sell digital signal processing solutions to US government agencies.
`9.
`In the mid-1990s I focused my career more on business–oriented software development.
`For example I directed the efforts of approximately 100 software developers and Quality
`Assurance personnel while employed at Platinum Software in the mid to late 1990s. The
`software systems were “client-server” business applications such as finance, manufacturing and
`sales force automation. At that time those applications were being adapted to web server
`implementations in order to allow our customers to access the same content through a web
`browser running on a client computer.
`10.
`Then in the period 1999-2003 I was responsible for teams of 50 or more web site
`developers at companies such as CareerPath.com (now merged with the CareerBuilder.com site).
`As such I have had a rich and in-depth exposure to many forms of computer applications
`involving the display of web pages on client computers. My work in web site design led to a
`hands-on knowledge of cryptographic systems for secure access and user authentication. My
`experience in this domain results from having designed and created two different commercial
`web sites that required extensive engineering effort to support secure e-commerce transactions.
`For example while running a development team of about 15 people at InfrastructureWorld.com
`as Chief Technology Officer I engineered a hardened web site that provided extraordinary levels
`of security for the high-dollar business transactions. The web server implementations were
`designed to support authentication through Public Key certificates, user access control via
`authenticated account login, Secure Sockets Layer (“SSL”) extranet connections, and document
`encryption.
`11.
`Similarly, while at Syntricity, Inc. in San Diego, CA as Vice President, Technical
`Operations, I designed and developed a secure Application Services Provider (ASP) Internet
`system to host a hundred or so corporate customers, allowing them secure access to tools for
`
`2
`
`COMPASS EXH. 1021 - Page 4 of 71
`
`

`

`transfer of data files and analysis of semiconductor yield data. This web site used secure FTP for
`high-speed data transfers, SSL for secure web site access, and user authentication.
`12.
`In addition I have served as a technical expert in several contract and patent lawsuits
`involving cryptographic components. Briefly, these include Dongjin Semichem Co., Ltd. v.
`EmailFund, Inc., which involved an effort to implement wireless security software technology in
`handheld wireless devices. The concept was to use the Elliptic Curve Digital Signature
`Algorithm (ECDSA) to perform the functions of user authentication, non-repudiation, integrity
`and cryptographic primitives in a single integrated circuit that could be integrated into a smart
`phone. I have also contributed as a technical expert in cases such as: Adobe Systems, Inc. v.
`Wowza Media Systems, Inc. that involved Diffie-Hellman key exchange for flash media
`delivery; VirnetX Inc. v. Cisco Systems, Inc. and Apple Computer, Inc. that involved the SSL
`protocol, IPSec Internet packet encryption, Public Key cryptography authentication and
`encryption techniques using Digital Certificates; and, Leon Stambler v. Amazon.com, Inc., et al.
`that involved Point of Sale authentication systems in the early 1990s.
`13.
`In those efforts I frequently relied on documents referred to or directly related to those
`used to support this petition, namely Diffie-Hellman key exchange and the Diffie-Hellman U.S.
`Patent 4,200,770 from 1977 (“DH Key Exchange”), the Rivest Shamir Adleman (“RSA”) U.S.
`patent 4,405,829, also from 1977, and numerous documents and books published by Price and
`Davies, the British POS terminal authentication pioneers.
`14.
`In summary, I believe I am qualified to testify on the subjects of secure financial
`transactions and the implementation of cryptographic applications such as authentication, non-
`repudiation, and message integrity programmed into physical devices such as smart cards and
`tokens using microprocessors or application specific ICs.
`II.
`MATERIALS CONSIDERED
`15.
`I have reviewed each of the following:
`a.
`U.S. Patent No. 6,105,013 (“the ’013 Patent”) entitled “Method, apparatus,
`system and firmware for secure transactions” issued to Stephen M. Curry et al on
`August 15, 2000, including the claims, description and prosecution history (which
`are identified in the Petition respectively as Exhibits 1001 and 1002);
`U.S. Patent No. 6,237,095 (“the ’095 Patent”), which is related to the ‘013 Patent
`and claims priority to the same application as the ‘013 Patent, including the
`claims, description and prosecution history of the ‘095 Patent (Exs. 1003 and
`1004);
`U.S. Patent No. 5,799,086 entitled “Enhanced cryptographic system and method
`with key escrow feature” to Frank Wells Sudia issued on August 25, 1998 from
`an application filed on January 13, 1994 (Ex. 1005; hereinafter, “Sudia”);
`Integrated Circuit Cards, Tags, and Tokens by P.L. Hawkes, et al. (1990) (Ex.
`1006; hereinafter “Hawkes”), which includes:
`Preface by P.L. Hawkes (hereinafter, “Hawkes Preface”);
`i.
`
`b.
`
`c.
`
`d.
`
`3
`
`COMPASS EXH. 1021 - Page 5 of 71
`
`

`

`ii.
`
`iv.
`
`e.
`
`f.
`
`g.
`
`h.
`
`i.
`
`j.
`
`iii.
`
`Chapter 1: Introduction to Integrated Circuit Cards, Tags and Tokens for
`Automatic Identification by P.L. Hawkes (hereinafter, “Hawkes
`Chapter 1”);
`Chapter 6: Secure Transactions with an Intelligent Token by W.L. Price
`and Bernard J. Chorley (hereinafter, “Hawkes Chapter 6”); and
`Chapter 8: Cryptography and the Smart Card by D.W. Davies
`(hereinafter, “Hawkes Chapter 8”);
`Jan Axelson, The Microcontroller Idea Book (1994) (Ex. 1007, hereinafter
`“Axelson”);
`Don Lancaster, A Flying Car Newsletter; Photopolymer Resources; Amateur
`Television Books; Royalty-Free Real PostScript!; BASIC Stamp Microcontroller,
`4 HARDWARE HACKER 66 (July 1993) (Ex. 1008, hereinafter “Lancaster”);
`U.S. Patent No. 5,210,846 entitled “One-Wire Bus Architecture” issued to R.D.
`Lee on May 11, 1993 from an application filed on May 15, 1989 (Ex. 1009;
`hereinafter “Lee”);
`Texas Instruments, TMS7000 Family Microarchitecture User’s Guide (1982) (Ex.
`1010);
`Russ Hersch, Microcontroller primer and FAQ, USENET posting (Jan. 26, 1994),
`available at http://www.cs.cmu.edu/Groups/AI/html/faqs/ai/microcontroller-
`faq/primer/faq.html (Ex. 1011);
`Petition for Covered Business Method Patent Review Under 35 U.S.C. §§ 321-
`329 and § 18 of the Leahy-Smith America Invents Act, Case CBM2014-178, JP
`Morgan Chase & Co., and JP Morgan Chase Bank, N.A. (“Chase”), Petitioner.
`(U.S. Patent No. 6,105,013) (Ex. 1013);
`Declaration of Stephen D. Bristow in support of Chase Petition for Covered
`Business Method Review of U.S. Patent No. 6,105,013 (Ex. 1014);
`Institution of Covered Business Method Patent Review Decision, Case
`CBM2014-179, Chase, Petitioner (U.S. Patent No. 5,940,510) (Ex. 1012);
`Report and Recommendation regarding claim construction in In re: Maxim
`Integrated Prods., Inc. MDL No. 2354, Misc. No. 12-244-JFC (W.D. Pa.) (Ex
`1015; hereinafter “R&R”) and Correction to Report and Recommendation (Ex.
`1016; hereinafter “R&R Correction”); and
`Opinion and order regarding claim construction in In re: Maxim Integrated
`Prods., Inc. MDL No. 2354, Misc. No. 12-244-JFC (W.D. Pa.) (Ex 1017;
`hereinafter “CC Op.”).
`LEVEL OF ORDINARY SKILL AND RELEVANT TIME
`III.
`It is my opinion that a person of ordinary skill in the art at the time of the inventions
`16.
`claimed in the ’013 Patent would have had at least a B.S. degree in electrical engineering or
`computer engineering with at least two years of practical or post-graduate work in the areas of
`
`k.
`
`l.
`
`m.
`
`n.
`
`4
`
`COMPASS EXH. 1021 - Page 6 of 71
`
`

`

`A.
`
`secure financial transactions and real-time microcontroller programming, or, alternatively, an
`additional year (at least three years) of postgraduate or professional experience in computer
`systems engineering related to secure data transactions, or the equivalent. I was a person of at
`least ordinary skill in this art in the time period from 1994 to 1996. I remain a person of at least
`ordinary skill in this art today.
`17.
`The basis for my familiarity with the level of ordinary skill is my interaction with large
`numbers of workers in the computing field who were at this level of skill. The pertinent art was
`the configuration and arrangement of commercially available computer components, networks,
`systems and software to satisfy particular customer specifications, together with such
`programming as might be necessary to tie the components together and operate in the desired
`manner.
`18.
`In reaching my opinion as to the hypothetical person of ordinary skill in the art, I have
`considered the types of problems encountered in the art, the prior art solutions to those problems,
`the rapidity with which innovations are made, the sophistication of the technology, and the
`educational level and professional capabilities of workers in the field.
`IV.
`LEGAL STANDARDS
`Anticipation
`It is my understanding that a claim may be invalid as anticipated under 35 U.S.C. § 102 if
`19.
`each and every element of a claim, as properly construed, is disclosed either explicitly or
`inherently in a single prior art reference, subject to the limitations imposed by § 102 in
`paragraphs a-g. Under the principles of inherency, if the prior art necessarily functions in
`accordance with, or includes the claimed limitations, it anticipates. Persons of ordinary skill
`need not recognize the inherent characteristics or functioning of the prior art. In addition, a new
`scientific explanation for the functioning of the prior art does not render the old apparatus,
`composition, or method patentable. Such a reference, if it contained each and every element of a
`claim, would anticipate the claim.
`B.
`Obviousness
`Regarding the legal doctrine of obviousness, my understanding is as follows. A claim
`20.
`may be invalid even if each and every claim limitation is not present or disclosed in a single
`prior-art reference. Under the doctrine of obviousness, a claim may be invalid if the differences
`between the invention and the prior art are such that the subject matter as a whole would have
`been obvious at the time the invention was made to a person having ordinary skill in the art to
`which the subject matter pertains. A person of ordinary skill in the art is presumed to have
`knowledge of the relevant prior art at the time of the claimed invention.
`21.
`Obviousness is based on the scope and content of the prior art, the differences between
`the prior art and the claim, the level of ordinary skill in the art, and secondary indicia of
`obviousness and non-obviousness to the extent such indicia exist. The scope of the prior art
`comprises any prior art that was reasonably pertinent to the particular problems the inventor
`faced.
`The determination of whether the asserted claims would have been obvious to a person of
`22.
`ordinary skill in the art and, therefore, invalid, is not governed by any rigid test or formula. A
`determination that a claim is obvious is, instead, based on a common sense determination that the
`
`5
`
`COMPASS EXH. 1021 - Page 7 of 71
`
`

`

`claimed invention is merely a combination of known limitations to achieve predictable results.
`Any of the following rationales are acceptable justifications to conclude that a claim would have
`been obvious: the claimed invention is simply a combination of known prior art methods to
`yield predictable results; the claimed invention is a simple substitution of one known element for
`another to obtain predictable results; the claimed invention uses known techniques to improve
`similar devices (methods, or products) in the same way; the claimed invention applies a known
`technique to a known device (method, or product) ready for improvement to yield predictable
`results; the claimed invention was “obvious to try”—choosing from a finite number of identified,
`predictable solutions, with a reasonable expectation of success; there is known work in one field
`of endeavor that may prompt variations of it for use in either the same field or a different one
`based on design incentives or other market forces if the variations would have been predictable
`to one of ordinary skill in the art; or there is some teaching, suggestion, or motivation in the prior
`art that would have led one of ordinary skill in the art to modify the prior art reference to
`combine prior art teachings to arrive at the claimed inventions.
`23.
`In addition, a claim can be obvious in light of a single reference, without the need to
`combine references, if the elements of the claim that are not found in the reference can be
`supplied by the common sense or knowledge of one of ordinary skill in the art.
`24.
`An analysis of whether a claimed invention is obvious must not rely on a hindsight
`combination of prior art. The analysis must proceed in the context of the time of the invention or
`claimed priority date and consider whether the invention as a whole would have been obvious to
`a person of ordinary skill in the art, taking into consideration any interrelated teachings of the
`prior art, the effects of demands known to the design community or present in the marketplace,
`and the background knowledge possessed by a person having ordinary skill in the art, all in order
`to determine whether there was an apparent reason to combine any known elements in the
`fashion claimed by the patent at issue.
`V.
`OVERVIEW OF THE ’013 PATENT
`25.
`The ’013 Patent entitled “Method, apparatus, system and firmware for secure
`transactions” issued to Stephen M. Curry et al on August 15, 2000. The application that resulted
`in the ’013 Patent, Appl. No. 09/041,190 was filed on March 10, 1998. The application for the
`’013 Patent was a continuation of application No. 08/594,983, file on Jan. 31, 1996, now Pat. No.
`5,748,740. The ‘013 Patent claims priority to Provisional Appl. No. 60/004,510, filed September
`29, 1995.
`26.
`The ’013 Patent specification discloses an electronic module used for secure transactions
`and various service provider applications for that module. ‘013 Patent, Abstract. From the
`specification it can be understood that a “service provider” is an organization that relies on or
`utilizes the functionality of a portable device containing cryptographic authentication and data
`encryption primitives. Examples given by the ’013 Patent specification include (1) Secure Email
`(Id. 5:1-6:40); (2) Digital Notary Service (Id. 6:42-7:61); (3) Digital Cash Dispenser (Id. 7:63-
`10:21); (4) Digital Cash Replenishment (Id. 10:23-59); (5) Technique for Software Authorization
`and Usage Metering (Id. 12:35-13:10); (6) Postal Metering Service (Id. 13:55-14:50); Registry
`with Guaranteed Private Key Security to support merchant transactions with consumers; and (7)
`Subscription Information Service (Id. 14:52-16:18). Thus, the ’013 Patent envisions
`applicability over a wide range of secure applications.
`
`6
`
`COMPASS EXH. 1021 - Page 8 of 71
`
`

`

`The ’013 Patent specification disclosures of service provider applications include
`27.
`merchant-customer financial transactions.
`2. Usage
`When a Merchant wishes to obtain positive identification of an End User over the Internet or
`other network, the Merchant generates a unique packet of data and transmits it to the End User,
`and the End User passes the data into the input object and invokes the transaction script 44 which
`causes it to be encrypted with the private key generated by the module 10. The resulting
`encrypted packet is transmitted back to the Merchant. The Merchant then accesses the data base
`provided by the Service Provider to obtain the public key belonging to the End User, and attempts
`to decrypt the encrypted packet using the End User's public key. If the decryption succeeds, the
`Merchant has proven the physical presence of the End User's module 10 at the remotely
`networked location. By guaranteeing the presence of the End User's module 10 at the remote site,
`this identification validates and legitimizes the contents of the data packet and therefore also any
`financial transactions, represented by the contents of the packet, that may be requested by the End
`User.
`The model described here is one in which the authority to perform financial transactions derives
`from the registry maintained by the Service Provider. It is therefore essential that this information
`be accurate and that the private key in the module 10 can be secure from all parties. Because each
`module 10 has its own unique RSA key set, there is no provision in this model for the module 10
`to represent money independently of the registry maintained by the Service Provider. Instead, the
`registry and the ability of the module 10 to sign with its private key together serve as a definitive
`means of identifying the End User remotely to any other party.
`Id. 15:54-16:18.
`28.
`The claims of the ’013 Patent generally recite “a microcontroller based secure transaction
`integrated circuit” comprised of a microcontroller core connected to a math coprocessor capable
`of handling complex mathematics of encryption and decryption. See ’013 Patent independent
`claims 1 and 9.
`
`7
`
`COMPASS EXH. 1021 - Page 9 of 71
`
`

`

`Id. Figure 1.
`29.
`Figure 1 illustrates the components of the claimed “secure transaction integrated circuit,”
`which the specification also calls a module. The module 10 includes a microprocessor /
`microcontroller 12, a math coprocessor / modular exponentiation accelerator 18 for processing
`encryption and decryption calculations, a memory circuit 20, an input/output circuit 26, a real
`time clock 14 for time stamping, and energy circuitry 34. Id. at 2:34-3:9. The patent does not
`describe these components beyond their basic functions or preferences. Further, all of the
`components of the claimed module were readily understood by a person of ordinary skill before
`the ‘013 Patent was filed and were well known and readily available components for use in
`generic computers or other integrated circuit devices.
`a.
`The “microcontroller core” is described to be a generic microprocessor, such as
`“preferably an 8-bit microprocessor, but could be 16, 32, 64 or any operable
`number of bits.” Id. at 2:48-51. The “microcontroller core” is also described to be
`“a general-purpose, 8051-compatible micro controller 12 or a reasonably similar
`product.” Id. at 3:22-24.
`The “math coprocessor”/ “modular exponentiation accelerator” is described as
`being “designed and used to handle very large numbers. In particular, the
`coprocessor will handle the complex mathematics of RSA encryption and
`decryption” or other types of math intensive encryption or decryption techniques.
`Id. at 2:54-57, 30:1-2. The specification identifies a known type of math
`coprocessor called “a high-speed modular exponentiation accelerator for large
`integers (math coprocessor).” Id. at 3:25-26. As seen in the references cited by
`the ’013 Patent itself, coprocessors for acceleration of encryption/decryption
`operations were well known at the time of the filing of the ’013 Patent
`
`b.
`
`8
`
`COMPASS EXH. 1021 - Page 10 of 71
`
`

`

`e.
`
`f.
`
`c.
`
`d.
`
`application. See, e.g., references to commercially available encryption/decryption
`coprocessors “SGS-Thompson Microelectronics CMOS Crypto Computer
`Family” datasheet ST16xF74 , Oct., 1993 and “CMOS MCU Based Safeguarded
`Smartcard IC with Modular Aritmetic Processor,”datasheet ST16CF54, Sep.
`1994.
`The “memory circuit” is described as being able to “contain both read-only-
`memory and non-volatile random-access-memory” and “volatile memory,
`EPROM, SRAM and a variety of other types of memory circuitry could be used
`to create an equivalent device.” Id. at 2:58-63. A person of ordinary skill in the
`art would understand this to refer to any form of memory in the module.
`The “input/output circuit” enables “bidirectional communication with the
`module.” Id. at 2:66-67. A person of ordinary skill in the art would understand
`this to refer to any circuit for communicating with the module.
`The “real time clock circuit” is generally understood to be a clock that keeps track
`of the date and/or time. Id. at 2:52-53.
`The “energy circuit may be necessary to maintain [stored information] in the
`memory circuitry 20 and/or aid in powering the other circuitry in the module 10.
`The energy circuit 34 could consist of a battery, capacitor, R/C circuit,
`photovoltaic cell, or any other equivalent energy producing circuit or means.” Id.
`at 3:5-9.
`In other aspects of the ’013 Patent the claims are directed towards “a plurality of
`30.
`transaction groups wherein each said transaction group can comprise a transaction program
`created by a service provider.” Id. 30:2-5. These programs are described in the specification as
`sequences of commands that are applied to different objects in the system such as private and
`public keys stored in memory.
`The fundamental concept implemented by the firmware is that the Service Provider can store
`transaction scripts 44 in a transaction group 40 to perform only those operations among objects
`that he wishes the End User to be able to perform.
`Id. 4:45-48.
`31.
`For example monetary transactions using the module are disclosed by the specification.
`The module serves as a digital wallet that can generate, on demand, certificates that are
`equivalent to cash because they attest to the fact that digital money on the module was decreased
`in value by an amount corresponding to the certificate. A “Service Provider” in this embodiment
`is a bank.
`2. Exemplary Monetary Transactions Using The Module
`Monetary transactions using the module 10 and digital certificates are somewhat more
`complicated because digital data, unlike Federal Reserve Notes, can be copied and duplicated
`easily. Nevertheless, the use of "SALTs" and transaction sequence numbers can guarantee the
`authenticity of digital certificates. (In the following discussion, it is assumed that every party to
`the transaction has its own RSA key set with a private key that it is able to keep secret.)
`Id. 9:13-21.
`
`9
`
`COMPASS EXH. 1021 - Page 11 of 71
`
`

`

`Figure 6 of the ’013 Patent describes the digital money application. Specifically, Figure
`32.
`6 provides an exemplary technique for preparing a module for monetary transactions while
`Figure 7 is an exemplary technique for using the module as a digital wallet.
`
`Id. Figure 6.
`
`10
`
`COMPASS EXH. 1021 - Page 12 of 71
`
`

`

`Id. Figure 7.
`33.
`The following description indicates the flow of preparing a module for financial
`transactions. The module is loaded with a transaction group containing transaction scripts by the
`Service Provider and made available to an end user. When the user participates in a merchant
`transaction the script contained in the locked transaction object is used to process objects stored
`in the module. For example, the transaction amount might be subtracted from the money object
`stored in the Service Provider’s transaction group.
`a. Referring to FIG. 6, the Service Provider (bank) prepares the module 10 by creating a
`transaction group 40 containing a money object r

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket