throbber
EXHIBIT 1002
`
`
`
`TO PETITIONER GOOGLE INC.’S
`PETITION FOR COVERED BUSINESS
`METHOD REVIEW OF
`U.S. PATENT NO. 8,118,221
`
`
`
`
`
`

`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`_____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________________
`
`
`
`GOOGLE INC.
`Petitioner
`
`v.
`
`SMARTFLASH LLC
`Patent Owner
`
`U.S. Patent No. 8,118,221
`
`_____________________
`
`Covered Business Method Review Case No. Unassigned
`
`_____________________
`
`
`
`DECLARATION OF DR. JUSTIN DOUGLAS TYGAR
`
`
`
`
`
`1
`
`
`
`
`
`
`
`
`
`
`Google Exhibit 1002 Page 00001
`
`

`
`I, Dr. Justin Douglas Tygar, declare as follows:
`
`I have been retained as an expert witness on behalf of Google Inc. (“Google”
`
`or “petitioner”) in connection with the instant Covered Business Method
`
`(“CBM”) review petition.
`
`
`
`
`1.
`
`2.
`
`I am being compensated for my time in connection with this CBM review at
`
`my standard consulting rate, which is $500 per hour up to a maximum of
`
`$5,000 per day. My compensation is not dependent on the substance of my
`
`opinions, my testimony, or the outcome of this CBM review.
`
`3.
`
`I understand that the petition for CBM review involves U.S. Patent No.
`
`8,118,221 (“the ’221 patent”), Ex. 1001.1
`
`4.
`
`I have reviewed and am familiar with the ’221 patent, including claim 3 (the
`
`“challenged claim”). I have reviewed and am familiar with six patents
`
`related to the ’221 patent: U.S. Patent Nos. 7,334,720, 7,942,317, 8,033,458,
`
`8,061,598, 8,336,772, and 8,794,516. I have reviewed and am familiar with
`
`the file histories for the ’221 patent and the six related patents.
`
`5.
`
`I am familiar with the general state of the technology at issue in the ’221
`
`patent as of October 25, 1999, its purported priority date.
`
`
`1 All references to “Ex. __” in this declaration refer to the Google Exhibits
`
`concurrently filed with Google’s CBM petition.
`
`
`
`
`2
`
`Google Exhibit 1002 Page 00002
`
`

`
`In preparing this declaration, I have considered each of the documents cited
`
`herein. I have also relied on my experience in the relevant art in connection
`
`with forming my opinions.
`
`QUALIFICATIONS
`Since 1998, I have been a Full Professor at the University of California,
`
`Berkeley. I hold a professor position in two departments at U.C. Berkeley:
`
`the Department of Electrical Engineering and Computer Sciences (Computer
`
`Sciences Division) and the School of Information. Before joining U.C.
`
`Berkeley, I was a tenured professor at Carnegie Mellon University in
`
`Computer Science, where I had a faculty appointment since 1986. I received
`
`my Ph.D. in Computer Science from Harvard University in 1986. I have
`
`extensive research, teaching, and industry experience in the areas of
`
`computer security and electronic commerce, with a special research interest
`
`in digital rights management as it relates to those areas.
`
`
`
`6.
`
`I.
`7.
`
`8.
`
`I have helped build a number of security and electronic commerce systems.
`
`Together with my colleague at Carnegie Mellon, Marvin Sirbu, I developed
`
`Netbill, a patented electronic payment system that was licensed to
`
`CyberCash (now part of Verisign). For the U.S. Postal Service, I designed
`
`the two dimensional “Information Based Indicia” postage indicia that have
`
`now become a widely used standard. Together with my graduate students, I
`
`
`
`
`3
`
`Google Exhibit 1002 Page 00003
`
`

`
`
`
`designed the architecture and a foundational operating system used on
`
`secure coprocessors, Dyad. Together with my graduate students, I designed
`
`Micro-Tesla, a light-weight cryptographic architecture that ultimately
`
`became a standard of the Internet Engineering Task Force and is widely used
`
`in sensor webs.
`
`9.
`
`I served as chair of the Defense Department’s ISAT Study Group on
`
`Security with Privacy and was a founding board member of the Association
`
`for Computing Machinery’s Special Interest Group on Electronic Commerce.
`
`10.
`
`I have written three books, including Secure Broadcast Communication in
`
`Wired and Wireless Networks (with Adrian Perrig), which has become a
`
`standard reference. My fourth book, Adversarial Machine Learning, is
`
`scheduled to be published by Cambridge University Press in 2015.
`
`11.
`
`I have been an active researcher in the fields of computer security and
`
`electronic commerce continuously since 1982.
`
`12. My complete curriculum vitae is submitted as Google Exhibit 1003.
`
`13. My findings explained in this declaration are based on my years of education,
`
`research, and industry experience in computer security and e-commerce
`
`technologies, including as applied to digital rights management.
`
`4
`
`
`
`
`
`Google Exhibit 1002 Page 00004
`
`

`
`
`
`II. LEVEL OF ORDINARY SKILL IN THE ART
`14. Counsel for the petitioner asked me to provide an opinion regarding the skill
`
`level of a person of ordinary skill in the art of the ’221 patent as of October
`
`25, 1999.2
`
`15. Counsel for the petitioner has informed me that the hypothetical person of
`
`ordinary skill in the art is presumed to have knowledge of all references that
`
`are sufficiently related to one another and to the pertinent art, and to have
`
`knowledge of all arts reasonably pertinent to the particular problem that the
`
`claimed inventions address. A person of ordinary skill is capable of drawing
`
`inferences and taking creative steps.
`
`16.
`
`In my opinion, a person of ordinary skill in the art with respect to the ’221
`
`patent would have had at least a Bachelor’s degree in computer science or
`
`equivalent experience.
`
`17. My understanding of a person of ordinary skill in the art is based on my
`
`education and professional experience. Since 1986, I have been a computer
`
`2 All opinions that I express in this Declaration with respect to the ’221
`
`Patent, its disclosure, the construction and scope of its claims, the validity of its
`
`claims, and the scope and content of the prior art are from the perspective and view
`
`of what a person skilled in the art would have understood, regardless of whether I
`
`expressly identify it as such.
`
`
`
`
`5
`
`Google Exhibit 1002 Page 00005
`
`

`
`
`
`science professor and I have been teaching undergraduate, masters, and
`
`doctoral students in computer science, and I am familiar with the abilities of
`
`students at those levels of education. A person with a computer science
`
`degree would understand and be able to practice the teachings of the asserted
`
`patents, including understanding their descriptions of systems and devices
`
`and associated hardware and functionality.
`
`18.
`
`I received my doctoral degree in computer science in 1986, and have
`
`actively been a computer science professor researching topics in computer
`
`security, electronic commerce, and distributed systems since that time, so in
`
`the late 1990s, I had far exceeded the education and experience of a person
`
`of ordinary skill in the art.
`
`III. STATE OF THE ART
`19. By October 25, 1999, both e-commerce and anti-piracy methods for digital
`
`content were well understood concepts. For example, WO 99/07121 A2 (Ex.
`
`1004), describes fundamental aspects and features of e-commerce including
`
`browsing content for purchase, payment verification, and digital delivery of
`
`purchased content. Ex. 1004 at Abstract. As another example, U.S. Patent
`
`No. 5,790,423, which was filed on June 13, 1995, and which issued on
`
`August 4, 1998, is directed to anti-piracy methods in the context of digital
`
`content distribution systems and discloses a system for distributing audio
`
`
`
`
`6
`
`Google Exhibit 1002 Page 00006
`
`

`
`
`
`content from a remote source over the Internet in which use rules for
`
`satisfying copyright protection criteria are coded into the control program.
`
`Ex. 1005 at 11:60-12:59.
`
`20. By October 1999, I had personally worked on e-commerce and anti-piracy
`
`projects such as the NetBill project, the Dyad project, and the development
`
`of electronic postage metering services for the USPS.
`
`21. By October 1999, multiple commercial services combining e-commerce and
`
`anti-piracy elements had launched.
`
`22. For example, from 1998 on, the Softbook ebook system was commercially
`
`available. Ex. 1006 (SOFTBOOK PRESS Secure Information Delivery to a
`
`Distributed Workforce, CIO Magazine, Aug. 1, 1999) at 4. This system
`
`involved a handheld ebook-reader device that could be plugged into a phone
`
`line to download material available from Softbookstore, an e-commerce site
`
`from which books and trade journals could be purchased. Id.; see also Ex.
`
`1007 (Electronic books to hit the shelves, New Straits Times, Aug. 24, 1998,
`
`Computimes) at 27. In the Softbook system, “[i]nformation is encrypted to
`
`prevent duplication, and the system is secure to prevent unauthorized use.”
`
`Ex. 1006 at 4.
`
`23. Similarly, prior to 1999, Liquid Audio developed, licensed, and deployed
`
`software and systems for the sale, delivery, and playback of digital music.
`
`
`
`
`7
`
`Google Exhibit 1002 Page 00007
`
`

`
`
`
`In October 1997, it published through its website a document entitled
`
`“Music on the Net,” which describes its platform for selling copy-protected
`
`files over the Internet. Ex. 1008 (Image of Liquidaudio.com cached October
`
`10, 1997; Linked “Music on the Net” Research Report) at 19. The document
`
`also describes competing services such as Cerberus and Eurodat, which also
`
`sold digital music in 1997. Id. The Eurodat service incorporated “an anti-
`
`piracy mechanism that ensures that downloaded music can only be played
`
`from the server it was encoded on.” Id.
`
`24. Liquid Audio extensively promoted its platform in 1998 through programs
`
`such as its Indie 1000 program, which provided artists with a turn-key
`
`solution for secure sales of digital content. Ex. 1009. This program
`
`emphasized the combination of anti-piracy measures with e-commerce
`
`functionality: “The Liquid Audio system combines sophisticated multi-layer
`
`encryption with inaudible digital watermarking technology to protect your
`
`intellectual property. This advanced system provides the most
`
`comprehensive, anti-copy and anti-piracy technology available today . . .
`
`When a music fan wants to buy your music they just click on ‘Buy
`
`Download’ in the Liquid MusicPlayer and enter the necessary payment
`
`information. You determine the price for the songs.” Id. at 2.
`
`
`
`
`8
`
`Google Exhibit 1002 Page 00008
`
`

`
`
`
`25. The examples above show that the combination of e-commerce systems with
`
`anti-piracy measures was well-established both in theory and in commercial
`
`practice by October 25, 1999.
`
`IV. OVERVIEW OF THE ’221 PATENT
`26. The ’221 patent states that its alleged invention “relates to a portable data
`
`carrier for storing and paying for data and to computer systems for providing
`
`access to data to be stored.” Ex. 1001 at 1:20-23. The ’221 patent states that
`
`the alleged “invention is particularly useful for managing stored audio and
`
`video data, but may also be applied to storage and access of text and
`
`software, including games, as well as other types of data.” Id. at 1:25-28.
`
`The stated goal of the ’221 patent is to respond to the “urgent need to find a
`
`way to address the problem of data piracy.” Id. at 1:49-55.
`
`27. The ’221 patent describes the core of its supposed invention as “a method of
`
`providing portable data comprising providing a portable data storage device
`
`comprising downloaded data storage means and payment validation means;
`
`providing a terminal for internet access; coupling the portable data storage
`
`device to the terminal; reading payment information from the payment
`
`validation means using the terminal; validating the payment information;
`
`and downloading data into the portable storage device from a data supplier.”
`
`Id. at 1:60-67.
`
`
`
`
`9
`
`Google Exhibit 1002 Page 00009
`
`

`
`
`
`28. Data storage means and data encryption were conventional technologies as
`
`of October 1999. The ’221 patent provides various suggestions for the data
`
`storage means and the optional data encryption used in its system. Id. at
`
`2:44-3:45. The specification identifies FLASH RAM as a known example
`
`of data storage means; the specification identifies Pretty Good Privacy and
`
`PKI (Public Key Infrastructure) as known examples of data encryption. Id.
`
`29. The ’221 patent also describes a portable data carrier that could be integrated
`
`into mobile communications devices. Portable data carriers were also
`
`known and conventional hardware as of October 1999. The ’221 patent
`
`specification identifies a “standard smart card” as an example of known
`
`portable data carriers. Id. at 11:29.
`
`30. The ’221 patent also describes the use of rules to govern access to stored
`
`data. Id. at 4:38-5:16. The specification identifies known examples of such
`
`rules, including “specify[ing] . . . a predetermined number of accesses” and
`
`allowing “unlimited plays but only on specified players.” Id. at 23:33-41.
`
`31. The specification of the ’221 patent also discloses that the alleged invention
`
`uses e-payment systems known at the time of its filing, such as MONDEX,
`
`Proton, and Visa, for payment and payment verification functions. Id. at
`
`13:35-55.
`
`
`
`
`
`
`10
`
`Google Exhibit 1002 Page 00010
`
`

`
`
`
`V. CLAIM CONSTRUCTION
`32. Counsel for the petitioner has informed me that terms in the challenged
`
`claims must be given their broadest reasonable construction in light of
`
`the ’221 patent’s specification, which means that the words of the claims
`
`should be given the broadest possible meaning that is consistent with the
`
`statements of the specification.
`
`“Use Rule Data”
`
`33. The Board wrote in Apple Inc. v. Smartflash LLC, CBM2014-00112,
`
`CBM2014-00113, Paper 7 at 4 (Sept. 30, 2014) that “use rule data” means
`
`“data for a rule specifying a condition under which access to content is
`
`permitted.”
`
`34. Although my opinion is that the broadest reasonable interpretation of “use
`
`rule data” is broader than the Board’s prior interpretation, I have adopted the
`
`interpretation of “use rule data” previously set forth by the Board for
`
`purposes of arriving at the opinions set forth in this declaration.
`
`“Payment Data”
`
`35. The patent describes “payment data.” According to the specification,
`
`“payment data” can be used “for making a payment to the system owner”
`
`(Ex. 1001 at 20:59-60) and “a payment” can be “represented by the payment
`
`data.” Id. at 9:4-6. The specification also teaches that “payment data” can
`
`
`
`
`11
`
`Google Exhibit 1002 Page 00011
`
`

`
`
`
`store “a payment audit trail including payment amounts and data on to
`
`whom payments have been made.” Ex. 1001 at 17:51-53.
`
`36. The district court wrote in its claim construction order at page 11 that
`
`“payment data” means “data that can be used to make payment for content.”
`
`Ex. 1011 at 11.
`
`37. Counsel has informed me that the district court uses a narrower interpretive
`
`standard than the standard that applies to a CBM proceeding.
`
`38. The broadest reasonable interpretation of the term “payment data” would
`
`have been understood by a person of ordinary skill in the art to mean “any
`
`information that can be used in connection with the process of making a
`
`payment for content.”
`
`“Payment Validation System”
`
`39. The patent describes “payment validation system.” According to the patent
`
`specification, the “payment validation system” is used “for validating the
`
`data and authorizing the payment” (Ex. 1001 at 8:21-23) as well as returning
`
`data such as “payment validation data.” Id. at 8:65-9:1, Claim 15
`
`(“receiving payment validation data from the payment validation system”).
`
`The patent also discloses that “[t]he payment validation system may be part
`
`of the data supplier’s computer systems or it may be a separate e-payment
`
`system.” Id. at 8:63-65.
`
`
`
`
`12
`
`Google Exhibit 1002 Page 00012
`
`

`
`
`
`40. The patent owner wrote in its claim construction brief at page 7 that
`
`“payment validation system” was a “system that returns payment validation
`
`data in response to valid payment data.” Ex. 1012 at 7.
`
`41. The district court wrote in its claim construction order at page 14 that
`
`“payment validation system” is a “system that returns payment validation
`
`data based on an attempt to validate payment data.” Ex. 1011 at 14.
`
`42. Counsel for the petitioner has informed me that the district court uses a
`
`narrower interpretive standard than the standard that applies to a CBM
`
`proceeding.
`
`43. The broadest reasonable interpretation of the term “payment validation
`
`system” would have been understood by a person of ordinary skill in the art
`
`to mean “any system that returns information in connection with an attempt
`
`to validate payment data” (wherein “payment data” must be construed
`
`broadly to include “any information that can be used in connection with the
`
`process of making a payment for content”).
`
`“Payment Validation Data”
`
`44. The patent describes “payment validation data.” According to the patent,
`
`“payment validation data” is data that a data access terminal can receive
`
`from a “payment validation system” after “payment data” is forwarded to the
`
`“payment validation system.” Ex. 1001 at 7:62-8:9, 8:63-9:1, Claim 15.
`
`
`
`
`13
`
`Google Exhibit 1002 Page 00013
`
`

`
`
`
`45. The district court wrote in its claim construction order at page 37 that
`
`“payment validation data” should be given its plain meaning. Ex. 1011 at 15,
`
`37.
`
`46. The patent owner wrote in its claim construction brief at page 10 that “none
`
`of the claims of the patents-in-suit require that the payment validation
`
`system be used to authorize payment.” Ex. 1012 at 10.
`
`47. Counsel for the petitioner has informed me that the district court uses a
`
`narrower interpretive standard than the standard that applies to a CBM
`
`proceeding.
`
`48. The broadest reasonable interpretation of the term “payment validation data”
`
`would have been understood by a person of ordinary skill in the art to mean
`
`“information returned in connection with an attempt to validate payment
`
`data” (wherein “payment data” must be construed broadly to include “any
`
`information that can be used in connection with the process of making a
`
`payment for content”).
`
`“Data Carrier”
`
`49. The patent describes the use of a “data carrier.” “A portable data carrier has
`
`an interface for sending and receiving data, non-volatile data memory for
`
`storing received content data and non-volatile payment validation memory
`
`for providing payment validation data to an external device.” Ex. 1001 at
`
`
`
`
`14
`
`Google Exhibit 1002 Page 00014
`
`

`
`
`
`Abstract. The data carrier may “store both payment data and content
`
`data.” Ex. 1001 at 4:32-33. The data carrier may comprise “non-volatile
`
`data memory and non-volatile parameter memory storing use status data and
`
`use rules.” Id. at 6:34-36. “The data carrier may also be integrated into
`
`other apparatus, such as a mobile communications device.” Id. at 4:48-
`
`49. The data carrier may “further comprise[] memory for storing data for
`
`accessing a mobile communications network, for example to receive content
`
`data over the network.” Id. at 6:9-12. In such an embodiment, “the data
`
`carrier may replace a SIM (Subscriber Identity Module) card.” Id. at 6:12-
`
`13. The data carrier may also “store[] access control data, such as a user ID
`
`and password.” Id. at 5:33-34. Figure 2 provides an example of a portable
`
`data carrier, namely a smart Flash card, and Figure 9 illustrates the
`
`“components of a data carrier.” The patent also gives as examples of data
`
`carriers a “ROM chip or disk.” Id. at 18:20.
`
`50. The patent owner wrote in its claim construction brief at page 19 that “data
`
`carrier” could be construed to mean a “medium capable of storing
`
`information.” Ex. 1012 at 17.
`
`51. The district court wrote in its claim construction order at page 22 that “data
`
`carrier” means “medium capable of storing information.” Ex. 1011 at 22.
`
`
`
`
`15
`
`Google Exhibit 1002 Page 00015
`
`

`
`
`
`52. Counsel has informed me that the district court uses a narrower interpretive
`
`standard than the standard that applies to a CBM proceeding.
`
`53. The broadest reasonable interpretation of the term “data carrier” would have
`
`been understood by a person of ordinary skill in the art to mean any
`
`“medium, regardless of structure, that is capable of storing information.”
`
`VI. PATENT ELIGIBLE SUBJECT MATTER
`54. Counsel for the petitioner has informed me that laws of nature, abstract ideas,
`
`and natural phenomena cannot be patented pursuant to 35 U.S.C. § 101.
`
`Counsel for the petitioner has informed me that the Supreme Court has
`
`endorsed a two-step approach for determining when a claim falls outside the
`
`scope of Section 101. Counsel for the petitioner has informed me that the
`
`first step is to determine whether the claim at issue is directed to a patent
`
`ineligible concept like an abstract idea. If it is, the second step is to identify
`
`“what else” is claimed so as to determine whether the claim amounts to
`
`“significantly more” than the abstract idea.
`
`55. Counsel for the petitioner has informed me that if a claim does not recite
`
`significantly more than an abstract idea, it is invalid under Section 101.
`
`Counsel for the petitioner has informed me that to constitute “significantly
`
`more,” it is not sufficient to simply apply the abstract idea with a computer.
`
`Counsel for the petitioner has informed me that neither is it sufficient to
`
`
`
`
`16
`
`Google Exhibit 1002 Page 00016
`
`

`
`
`
`limit the claim to a particular technological environment or to add to the
`
`claim insignificant post solution activity or well-understood, routine,
`
`conventional activity. Counsel for the petitioner has informed that instead, a
`
`claim directed at an un-patentable abstract idea must contain other elements
`
`or a combination of elements (an “inventive concept”) sufficient to prevent
`
`patenting the abstract idea itself. Counsel has informed me that a claim
`
`directed at overriding a routine and conventional sequence of events may
`
`also be patent eligible.
`
`It Is My Opinion That Claim 3 Is Directed To An Abstract Idea
`
`A.
`
`It is my opinion that claim 3 of the ’221 patent is directed to the abstract idea
`
`56.
`
`of controlling access based on payment.
`
`57. Claim 3 is expressly directed to that abstract idea. Under its broadest
`
`reasonable interpretation, claim 3 recites “code to”: “read payment data,”
`
`“forward payment data to a payment validation system,” “receive payment
`
`validation data from the payment validation system,” and “retrieve data”
`
`once validation of payment for that data has been received.
`
`58. The specification of the ’221 patent also teaches that the “invention” is
`
`directed to the abstract idea of controlling access based on payment. The
`
`specification states that the “invention” relates to “providing access” and
`
`“paying.” Ex. 1001 at 1:20-23.
`
`
`
`
`17
`
`Google Exhibit 1002 Page 00017
`
`

`
`B.
`
`It Is My Opinion That Claim 3 Does Not Disclose An Inventive
`Concept That Is Significantly More Than An Abstract Idea
`
`It is my opinion that claim 3 does not add anything of significance to the
`
`underlying abstract idea of controlling access based on payment. The claim
`
`simply applies that abstract idea to “data,” notes that the user may be
`
`provided with additional information about the purchased data (such as
`
`information about when the data may be accessed and about the value of the
`
`
`
`59.
`
`data), and recites generic computer components and functionality.
`
`60. The computer hardware recited in claim 3—namely, a “data access
`
`terminal,” a “data carrier,” an “interface,” and a “processor”—is generic and
`
`conventional. The specification of the ’221 patent states that the “data
`
`access terminal” may be “a conventional computer.” Ex. 1001 at 4:4-5.
`
`And data carriers, interfaces, and processors have long been routinely used
`
`in general purpose computers.
`
`61. Alan Turing’s celebrated idealized computing automaton (now called a
`
`“Turing Machine” in his honor) was introduced in 1937 in the paper “On
`
`Computable Numbers, with an application to the Entscheidungsproblem”
`
`Ex. 1014 (Proceedings of the London Mathematical Society, vol s2-42, pp.
`
`230-265). On page 231, Turing notes “The machine is supplied a ‘tape’ (the
`
`analogue of paper) running through it, and divided into sections (called
`
`‘squares’) each capable of bearing a ‘symbol.’” Id. Turing’s “tape” serves
`18
`
`
`
`
`Google Exhibit 1002 Page 00018
`
`

`
`
`
`as a data carrier. Id. The machine also had a “head,” which allowed state
`
`changes, and formed a “processor” with the other elements of the machine.
`
`62. A “standard smart card,” which is the “data carrier” referenced in the ’221
`
`patent specification (Ex. 1001 at 11:27-30), is a generic hardware device that
`
`was well known in the prior art to the ’221 patent.
`
`63. The generic processor and interfaces recited in the ’221 patent specification
`
`(id. at 4:50-57), are also generic computer hardware components that were
`
`well known in the prior art to the ’221 patent.
`
`64. The functions performed by the “code” of claim 3 (namely reading,
`
`forwarding, receiving, retrieving, writing, and outputting) can be performed
`
`without a computer. Performing these functions with a computer is routine
`
`and conventional. Reading data from a “data carrier” (i.e., a standard smart
`
`card), forwarding data, receiving data, retrieving data, writing data into a
`
`“data carrier,” and outputting data to a user are all generic, conventional,
`
`routine computer functions that were well known in the prior art to the ’221
`
`patent.
`
`65. Reading and writing data in the context of computational machines dates
`
`back at least to Charles Babbage’s and Lady Augusta Ada Lovelace’s
`
`pioneering work on the “Analytical Engine” in the mid-1800s. Transmitting,
`
`
`
`
`19
`
`Google Exhibit 1002 Page 00019
`
`

`
`
`
`receiving, and responding to data among a network of multiple computing
`
`devices dates back at least to the ARPANET project of the late 1960s.
`
`66. To be clear, claim 3 of the ’221 patent does not recite the use of generic
`
`computer hardware and functions to override some routine or conventional
`
`sequence of events. Instead, claim 3 recites the use of a general purpose
`
`computer to perform routine, conventional, well-known computer functions.
`
`C.
`
`It Is My Opinion That Claim 3 of The ’221 Patent Is Patent
`Ineligible
`In light of the above, it is my opinion that claim 3 is not directed to patent
`
`67.
`
`eligible subject matter and is thus invalid.
`
`
`
`
`
`
`
`
`
`
`20
`
`Google Exhibit 1002 Page 00020
`
`

`
` hereby declare that all statements made herein of my own knowledge are true and
`
` I
`
`that all statements made on information and belief are believed to be true; and
`
`further that these statements were made with the knowledge that willful false
`
`statements and the like so made are punishable by fine or imprisonment, or both,
`
`under Section 1001 of Title 18 of the United States Code.
`
`
`
`
`
`DATE:____________________
`
`
`DR. JUSTIN DOUGLAS TYGAR
`
`
`
`21
`
`
`
`
`
`
`6 May 2015
`
`Google Exhibit 1002 Page 00021

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket