`
`
`
`TO PETITIONER GOOGLE INC.’S
`PETITION FOR COVERED BUSINESS
`METHOD REVIEW OF
`U.S. PATENT NO. 8,118,221
`
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`_____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________________
`
`
`
`GOOGLE INC.
`Petitioner
`
`v.
`
`SMARTFLASH LLC
`Patent Owner
`
`U.S. Patent No. 8,118,221
`
`_____________________
`
`Covered Business Method Review Case No. Unassigned
`
`_____________________
`
`
`
`DECLARATION OF DR. JUSTIN DOUGLAS TYGAR
`
`
`
`
`
`1
`
`
`
`
`
`
`
`
`
`
`Google Exhibit 1002 Page 00001
`
`
`
`I, Dr. Justin Douglas Tygar, declare as follows:
`
`I have been retained as an expert witness on behalf of Google Inc. (“Google”
`
`or “petitioner”) in connection with the instant Covered Business Method
`
`(“CBM”) review petition.
`
`
`
`
`1.
`
`2.
`
`I am being compensated for my time in connection with this CBM review at
`
`my standard consulting rate, which is $500 per hour up to a maximum of
`
`$5,000 per day. My compensation is not dependent on the substance of my
`
`opinions, my testimony, or the outcome of this CBM review.
`
`3.
`
`I understand that the petition for CBM review involves U.S. Patent No.
`
`8,118,221 (“the ’221 patent”), Ex. 1001.1
`
`4.
`
`I have reviewed and am familiar with the ’221 patent, including claim 3 (the
`
`“challenged claim”). I have reviewed and am familiar with six patents
`
`related to the ’221 patent: U.S. Patent Nos. 7,334,720, 7,942,317, 8,033,458,
`
`8,061,598, 8,336,772, and 8,794,516. I have reviewed and am familiar with
`
`the file histories for the ’221 patent and the six related patents.
`
`5.
`
`I am familiar with the general state of the technology at issue in the ’221
`
`patent as of October 25, 1999, its purported priority date.
`
`
`1 All references to “Ex. __” in this declaration refer to the Google Exhibits
`
`concurrently filed with Google’s CBM petition.
`
`
`
`
`2
`
`Google Exhibit 1002 Page 00002
`
`
`
`In preparing this declaration, I have considered each of the documents cited
`
`herein. I have also relied on my experience in the relevant art in connection
`
`with forming my opinions.
`
`QUALIFICATIONS
`Since 1998, I have been a Full Professor at the University of California,
`
`Berkeley. I hold a professor position in two departments at U.C. Berkeley:
`
`the Department of Electrical Engineering and Computer Sciences (Computer
`
`Sciences Division) and the School of Information. Before joining U.C.
`
`Berkeley, I was a tenured professor at Carnegie Mellon University in
`
`Computer Science, where I had a faculty appointment since 1986. I received
`
`my Ph.D. in Computer Science from Harvard University in 1986. I have
`
`extensive research, teaching, and industry experience in the areas of
`
`computer security and electronic commerce, with a special research interest
`
`in digital rights management as it relates to those areas.
`
`
`
`6.
`
`I.
`7.
`
`8.
`
`I have helped build a number of security and electronic commerce systems.
`
`Together with my colleague at Carnegie Mellon, Marvin Sirbu, I developed
`
`Netbill, a patented electronic payment system that was licensed to
`
`CyberCash (now part of Verisign). For the U.S. Postal Service, I designed
`
`the two dimensional “Information Based Indicia” postage indicia that have
`
`now become a widely used standard. Together with my graduate students, I
`
`
`
`
`3
`
`Google Exhibit 1002 Page 00003
`
`
`
`
`
`designed the architecture and a foundational operating system used on
`
`secure coprocessors, Dyad. Together with my graduate students, I designed
`
`Micro-Tesla, a light-weight cryptographic architecture that ultimately
`
`became a standard of the Internet Engineering Task Force and is widely used
`
`in sensor webs.
`
`9.
`
`I served as chair of the Defense Department’s ISAT Study Group on
`
`Security with Privacy and was a founding board member of the Association
`
`for Computing Machinery’s Special Interest Group on Electronic Commerce.
`
`10.
`
`I have written three books, including Secure Broadcast Communication in
`
`Wired and Wireless Networks (with Adrian Perrig), which has become a
`
`standard reference. My fourth book, Adversarial Machine Learning, is
`
`scheduled to be published by Cambridge University Press in 2015.
`
`11.
`
`I have been an active researcher in the fields of computer security and
`
`electronic commerce continuously since 1982.
`
`12. My complete curriculum vitae is submitted as Google Exhibit 1003.
`
`13. My findings explained in this declaration are based on my years of education,
`
`research, and industry experience in computer security and e-commerce
`
`technologies, including as applied to digital rights management.
`
`4
`
`
`
`
`
`Google Exhibit 1002 Page 00004
`
`
`
`
`
`II. LEVEL OF ORDINARY SKILL IN THE ART
`14. Counsel for the petitioner asked me to provide an opinion regarding the skill
`
`level of a person of ordinary skill in the art of the ’221 patent as of October
`
`25, 1999.2
`
`15. Counsel for the petitioner has informed me that the hypothetical person of
`
`ordinary skill in the art is presumed to have knowledge of all references that
`
`are sufficiently related to one another and to the pertinent art, and to have
`
`knowledge of all arts reasonably pertinent to the particular problem that the
`
`claimed inventions address. A person of ordinary skill is capable of drawing
`
`inferences and taking creative steps.
`
`16.
`
`In my opinion, a person of ordinary skill in the art with respect to the ’221
`
`patent would have had at least a Bachelor’s degree in computer science or
`
`equivalent experience.
`
`17. My understanding of a person of ordinary skill in the art is based on my
`
`education and professional experience. Since 1986, I have been a computer
`
`2 All opinions that I express in this Declaration with respect to the ’221
`
`Patent, its disclosure, the construction and scope of its claims, the validity of its
`
`claims, and the scope and content of the prior art are from the perspective and view
`
`of what a person skilled in the art would have understood, regardless of whether I
`
`expressly identify it as such.
`
`
`
`
`5
`
`Google Exhibit 1002 Page 00005
`
`
`
`
`
`science professor and I have been teaching undergraduate, masters, and
`
`doctoral students in computer science, and I am familiar with the abilities of
`
`students at those levels of education. A person with a computer science
`
`degree would understand and be able to practice the teachings of the asserted
`
`patents, including understanding their descriptions of systems and devices
`
`and associated hardware and functionality.
`
`18.
`
`I received my doctoral degree in computer science in 1986, and have
`
`actively been a computer science professor researching topics in computer
`
`security, electronic commerce, and distributed systems since that time, so in
`
`the late 1990s, I had far exceeded the education and experience of a person
`
`of ordinary skill in the art.
`
`III. STATE OF THE ART
`19. By October 25, 1999, both e-commerce and anti-piracy methods for digital
`
`content were well understood concepts. For example, WO 99/07121 A2 (Ex.
`
`1004), describes fundamental aspects and features of e-commerce including
`
`browsing content for purchase, payment verification, and digital delivery of
`
`purchased content. Ex. 1004 at Abstract. As another example, U.S. Patent
`
`No. 5,790,423, which was filed on June 13, 1995, and which issued on
`
`August 4, 1998, is directed to anti-piracy methods in the context of digital
`
`content distribution systems and discloses a system for distributing audio
`
`
`
`
`6
`
`Google Exhibit 1002 Page 00006
`
`
`
`
`
`content from a remote source over the Internet in which use rules for
`
`satisfying copyright protection criteria are coded into the control program.
`
`Ex. 1005 at 11:60-12:59.
`
`20. By October 1999, I had personally worked on e-commerce and anti-piracy
`
`projects such as the NetBill project, the Dyad project, and the development
`
`of electronic postage metering services for the USPS.
`
`21. By October 1999, multiple commercial services combining e-commerce and
`
`anti-piracy elements had launched.
`
`22. For example, from 1998 on, the Softbook ebook system was commercially
`
`available. Ex. 1006 (SOFTBOOK PRESS Secure Information Delivery to a
`
`Distributed Workforce, CIO Magazine, Aug. 1, 1999) at 4. This system
`
`involved a handheld ebook-reader device that could be plugged into a phone
`
`line to download material available from Softbookstore, an e-commerce site
`
`from which books and trade journals could be purchased. Id.; see also Ex.
`
`1007 (Electronic books to hit the shelves, New Straits Times, Aug. 24, 1998,
`
`Computimes) at 27. In the Softbook system, “[i]nformation is encrypted to
`
`prevent duplication, and the system is secure to prevent unauthorized use.”
`
`Ex. 1006 at 4.
`
`23. Similarly, prior to 1999, Liquid Audio developed, licensed, and deployed
`
`software and systems for the sale, delivery, and playback of digital music.
`
`
`
`
`7
`
`Google Exhibit 1002 Page 00007
`
`
`
`
`
`In October 1997, it published through its website a document entitled
`
`“Music on the Net,” which describes its platform for selling copy-protected
`
`files over the Internet. Ex. 1008 (Image of Liquidaudio.com cached October
`
`10, 1997; Linked “Music on the Net” Research Report) at 19. The document
`
`also describes competing services such as Cerberus and Eurodat, which also
`
`sold digital music in 1997. Id. The Eurodat service incorporated “an anti-
`
`piracy mechanism that ensures that downloaded music can only be played
`
`from the server it was encoded on.” Id.
`
`24. Liquid Audio extensively promoted its platform in 1998 through programs
`
`such as its Indie 1000 program, which provided artists with a turn-key
`
`solution for secure sales of digital content. Ex. 1009. This program
`
`emphasized the combination of anti-piracy measures with e-commerce
`
`functionality: “The Liquid Audio system combines sophisticated multi-layer
`
`encryption with inaudible digital watermarking technology to protect your
`
`intellectual property. This advanced system provides the most
`
`comprehensive, anti-copy and anti-piracy technology available today . . .
`
`When a music fan wants to buy your music they just click on ‘Buy
`
`Download’ in the Liquid MusicPlayer and enter the necessary payment
`
`information. You determine the price for the songs.” Id. at 2.
`
`
`
`
`8
`
`Google Exhibit 1002 Page 00008
`
`
`
`
`
`25. The examples above show that the combination of e-commerce systems with
`
`anti-piracy measures was well-established both in theory and in commercial
`
`practice by October 25, 1999.
`
`IV. OVERVIEW OF THE ’221 PATENT
`26. The ’221 patent states that its alleged invention “relates to a portable data
`
`carrier for storing and paying for data and to computer systems for providing
`
`access to data to be stored.” Ex. 1001 at 1:20-23. The ’221 patent states that
`
`the alleged “invention is particularly useful for managing stored audio and
`
`video data, but may also be applied to storage and access of text and
`
`software, including games, as well as other types of data.” Id. at 1:25-28.
`
`The stated goal of the ’221 patent is to respond to the “urgent need to find a
`
`way to address the problem of data piracy.” Id. at 1:49-55.
`
`27. The ’221 patent describes the core of its supposed invention as “a method of
`
`providing portable data comprising providing a portable data storage device
`
`comprising downloaded data storage means and payment validation means;
`
`providing a terminal for internet access; coupling the portable data storage
`
`device to the terminal; reading payment information from the payment
`
`validation means using the terminal; validating the payment information;
`
`and downloading data into the portable storage device from a data supplier.”
`
`Id. at 1:60-67.
`
`
`
`
`9
`
`Google Exhibit 1002 Page 00009
`
`
`
`
`
`28. Data storage means and data encryption were conventional technologies as
`
`of October 1999. The ’221 patent provides various suggestions for the data
`
`storage means and the optional data encryption used in its system. Id. at
`
`2:44-3:45. The specification identifies FLASH RAM as a known example
`
`of data storage means; the specification identifies Pretty Good Privacy and
`
`PKI (Public Key Infrastructure) as known examples of data encryption. Id.
`
`29. The ’221 patent also describes a portable data carrier that could be integrated
`
`into mobile communications devices. Portable data carriers were also
`
`known and conventional hardware as of October 1999. The ’221 patent
`
`specification identifies a “standard smart card” as an example of known
`
`portable data carriers. Id. at 11:29.
`
`30. The ’221 patent also describes the use of rules to govern access to stored
`
`data. Id. at 4:38-5:16. The specification identifies known examples of such
`
`rules, including “specify[ing] . . . a predetermined number of accesses” and
`
`allowing “unlimited plays but only on specified players.” Id. at 23:33-41.
`
`31. The specification of the ’221 patent also discloses that the alleged invention
`
`uses e-payment systems known at the time of its filing, such as MONDEX,
`
`Proton, and Visa, for payment and payment verification functions. Id. at
`
`13:35-55.
`
`
`
`
`
`
`10
`
`Google Exhibit 1002 Page 00010
`
`
`
`
`
`V. CLAIM CONSTRUCTION
`32. Counsel for the petitioner has informed me that terms in the challenged
`
`claims must be given their broadest reasonable construction in light of
`
`the ’221 patent’s specification, which means that the words of the claims
`
`should be given the broadest possible meaning that is consistent with the
`
`statements of the specification.
`
`“Use Rule Data”
`
`33. The Board wrote in Apple Inc. v. Smartflash LLC, CBM2014-00112,
`
`CBM2014-00113, Paper 7 at 4 (Sept. 30, 2014) that “use rule data” means
`
`“data for a rule specifying a condition under which access to content is
`
`permitted.”
`
`34. Although my opinion is that the broadest reasonable interpretation of “use
`
`rule data” is broader than the Board’s prior interpretation, I have adopted the
`
`interpretation of “use rule data” previously set forth by the Board for
`
`purposes of arriving at the opinions set forth in this declaration.
`
`“Payment Data”
`
`35. The patent describes “payment data.” According to the specification,
`
`“payment data” can be used “for making a payment to the system owner”
`
`(Ex. 1001 at 20:59-60) and “a payment” can be “represented by the payment
`
`data.” Id. at 9:4-6. The specification also teaches that “payment data” can
`
`
`
`
`11
`
`Google Exhibit 1002 Page 00011
`
`
`
`
`
`store “a payment audit trail including payment amounts and data on to
`
`whom payments have been made.” Ex. 1001 at 17:51-53.
`
`36. The district court wrote in its claim construction order at page 11 that
`
`“payment data” means “data that can be used to make payment for content.”
`
`Ex. 1011 at 11.
`
`37. Counsel has informed me that the district court uses a narrower interpretive
`
`standard than the standard that applies to a CBM proceeding.
`
`38. The broadest reasonable interpretation of the term “payment data” would
`
`have been understood by a person of ordinary skill in the art to mean “any
`
`information that can be used in connection with the process of making a
`
`payment for content.”
`
`“Payment Validation System”
`
`39. The patent describes “payment validation system.” According to the patent
`
`specification, the “payment validation system” is used “for validating the
`
`data and authorizing the payment” (Ex. 1001 at 8:21-23) as well as returning
`
`data such as “payment validation data.” Id. at 8:65-9:1, Claim 15
`
`(“receiving payment validation data from the payment validation system”).
`
`The patent also discloses that “[t]he payment validation system may be part
`
`of the data supplier’s computer systems or it may be a separate e-payment
`
`system.” Id. at 8:63-65.
`
`
`
`
`12
`
`Google Exhibit 1002 Page 00012
`
`
`
`
`
`40. The patent owner wrote in its claim construction brief at page 7 that
`
`“payment validation system” was a “system that returns payment validation
`
`data in response to valid payment data.” Ex. 1012 at 7.
`
`41. The district court wrote in its claim construction order at page 14 that
`
`“payment validation system” is a “system that returns payment validation
`
`data based on an attempt to validate payment data.” Ex. 1011 at 14.
`
`42. Counsel for the petitioner has informed me that the district court uses a
`
`narrower interpretive standard than the standard that applies to a CBM
`
`proceeding.
`
`43. The broadest reasonable interpretation of the term “payment validation
`
`system” would have been understood by a person of ordinary skill in the art
`
`to mean “any system that returns information in connection with an attempt
`
`to validate payment data” (wherein “payment data” must be construed
`
`broadly to include “any information that can be used in connection with the
`
`process of making a payment for content”).
`
`“Payment Validation Data”
`
`44. The patent describes “payment validation data.” According to the patent,
`
`“payment validation data” is data that a data access terminal can receive
`
`from a “payment validation system” after “payment data” is forwarded to the
`
`“payment validation system.” Ex. 1001 at 7:62-8:9, 8:63-9:1, Claim 15.
`
`
`
`
`13
`
`Google Exhibit 1002 Page 00013
`
`
`
`
`
`45. The district court wrote in its claim construction order at page 37 that
`
`“payment validation data” should be given its plain meaning. Ex. 1011 at 15,
`
`37.
`
`46. The patent owner wrote in its claim construction brief at page 10 that “none
`
`of the claims of the patents-in-suit require that the payment validation
`
`system be used to authorize payment.” Ex. 1012 at 10.
`
`47. Counsel for the petitioner has informed me that the district court uses a
`
`narrower interpretive standard than the standard that applies to a CBM
`
`proceeding.
`
`48. The broadest reasonable interpretation of the term “payment validation data”
`
`would have been understood by a person of ordinary skill in the art to mean
`
`“information returned in connection with an attempt to validate payment
`
`data” (wherein “payment data” must be construed broadly to include “any
`
`information that can be used in connection with the process of making a
`
`payment for content”).
`
`“Data Carrier”
`
`49. The patent describes the use of a “data carrier.” “A portable data carrier has
`
`an interface for sending and receiving data, non-volatile data memory for
`
`storing received content data and non-volatile payment validation memory
`
`for providing payment validation data to an external device.” Ex. 1001 at
`
`
`
`
`14
`
`Google Exhibit 1002 Page 00014
`
`
`
`
`
`Abstract. The data carrier may “store both payment data and content
`
`data.” Ex. 1001 at 4:32-33. The data carrier may comprise “non-volatile
`
`data memory and non-volatile parameter memory storing use status data and
`
`use rules.” Id. at 6:34-36. “The data carrier may also be integrated into
`
`other apparatus, such as a mobile communications device.” Id. at 4:48-
`
`49. The data carrier may “further comprise[] memory for storing data for
`
`accessing a mobile communications network, for example to receive content
`
`data over the network.” Id. at 6:9-12. In such an embodiment, “the data
`
`carrier may replace a SIM (Subscriber Identity Module) card.” Id. at 6:12-
`
`13. The data carrier may also “store[] access control data, such as a user ID
`
`and password.” Id. at 5:33-34. Figure 2 provides an example of a portable
`
`data carrier, namely a smart Flash card, and Figure 9 illustrates the
`
`“components of a data carrier.” The patent also gives as examples of data
`
`carriers a “ROM chip or disk.” Id. at 18:20.
`
`50. The patent owner wrote in its claim construction brief at page 19 that “data
`
`carrier” could be construed to mean a “medium capable of storing
`
`information.” Ex. 1012 at 17.
`
`51. The district court wrote in its claim construction order at page 22 that “data
`
`carrier” means “medium capable of storing information.” Ex. 1011 at 22.
`
`
`
`
`15
`
`Google Exhibit 1002 Page 00015
`
`
`
`
`
`52. Counsel has informed me that the district court uses a narrower interpretive
`
`standard than the standard that applies to a CBM proceeding.
`
`53. The broadest reasonable interpretation of the term “data carrier” would have
`
`been understood by a person of ordinary skill in the art to mean any
`
`“medium, regardless of structure, that is capable of storing information.”
`
`VI. PATENT ELIGIBLE SUBJECT MATTER
`54. Counsel for the petitioner has informed me that laws of nature, abstract ideas,
`
`and natural phenomena cannot be patented pursuant to 35 U.S.C. § 101.
`
`Counsel for the petitioner has informed me that the Supreme Court has
`
`endorsed a two-step approach for determining when a claim falls outside the
`
`scope of Section 101. Counsel for the petitioner has informed me that the
`
`first step is to determine whether the claim at issue is directed to a patent
`
`ineligible concept like an abstract idea. If it is, the second step is to identify
`
`“what else” is claimed so as to determine whether the claim amounts to
`
`“significantly more” than the abstract idea.
`
`55. Counsel for the petitioner has informed me that if a claim does not recite
`
`significantly more than an abstract idea, it is invalid under Section 101.
`
`Counsel for the petitioner has informed me that to constitute “significantly
`
`more,” it is not sufficient to simply apply the abstract idea with a computer.
`
`Counsel for the petitioner has informed me that neither is it sufficient to
`
`
`
`
`16
`
`Google Exhibit 1002 Page 00016
`
`
`
`
`
`limit the claim to a particular technological environment or to add to the
`
`claim insignificant post solution activity or well-understood, routine,
`
`conventional activity. Counsel for the petitioner has informed that instead, a
`
`claim directed at an un-patentable abstract idea must contain other elements
`
`or a combination of elements (an “inventive concept”) sufficient to prevent
`
`patenting the abstract idea itself. Counsel has informed me that a claim
`
`directed at overriding a routine and conventional sequence of events may
`
`also be patent eligible.
`
`It Is My Opinion That Claim 3 Is Directed To An Abstract Idea
`
`A.
`
`It is my opinion that claim 3 of the ’221 patent is directed to the abstract idea
`
`56.
`
`of controlling access based on payment.
`
`57. Claim 3 is expressly directed to that abstract idea. Under its broadest
`
`reasonable interpretation, claim 3 recites “code to”: “read payment data,”
`
`“forward payment data to a payment validation system,” “receive payment
`
`validation data from the payment validation system,” and “retrieve data”
`
`once validation of payment for that data has been received.
`
`58. The specification of the ’221 patent also teaches that the “invention” is
`
`directed to the abstract idea of controlling access based on payment. The
`
`specification states that the “invention” relates to “providing access” and
`
`“paying.” Ex. 1001 at 1:20-23.
`
`
`
`
`17
`
`Google Exhibit 1002 Page 00017
`
`
`
`B.
`
`It Is My Opinion That Claim 3 Does Not Disclose An Inventive
`Concept That Is Significantly More Than An Abstract Idea
`
`It is my opinion that claim 3 does not add anything of significance to the
`
`underlying abstract idea of controlling access based on payment. The claim
`
`simply applies that abstract idea to “data,” notes that the user may be
`
`provided with additional information about the purchased data (such as
`
`information about when the data may be accessed and about the value of the
`
`
`
`59.
`
`data), and recites generic computer components and functionality.
`
`60. The computer hardware recited in claim 3—namely, a “data access
`
`terminal,” a “data carrier,” an “interface,” and a “processor”—is generic and
`
`conventional. The specification of the ’221 patent states that the “data
`
`access terminal” may be “a conventional computer.” Ex. 1001 at 4:4-5.
`
`And data carriers, interfaces, and processors have long been routinely used
`
`in general purpose computers.
`
`61. Alan Turing’s celebrated idealized computing automaton (now called a
`
`“Turing Machine” in his honor) was introduced in 1937 in the paper “On
`
`Computable Numbers, with an application to the Entscheidungsproblem”
`
`Ex. 1014 (Proceedings of the London Mathematical Society, vol s2-42, pp.
`
`230-265). On page 231, Turing notes “The machine is supplied a ‘tape’ (the
`
`analogue of paper) running through it, and divided into sections (called
`
`‘squares’) each capable of bearing a ‘symbol.’” Id. Turing’s “tape” serves
`18
`
`
`
`
`Google Exhibit 1002 Page 00018
`
`
`
`
`
`as a data carrier. Id. The machine also had a “head,” which allowed state
`
`changes, and formed a “processor” with the other elements of the machine.
`
`62. A “standard smart card,” which is the “data carrier” referenced in the ’221
`
`patent specification (Ex. 1001 at 11:27-30), is a generic hardware device that
`
`was well known in the prior art to the ’221 patent.
`
`63. The generic processor and interfaces recited in the ’221 patent specification
`
`(id. at 4:50-57), are also generic computer hardware components that were
`
`well known in the prior art to the ’221 patent.
`
`64. The functions performed by the “code” of claim 3 (namely reading,
`
`forwarding, receiving, retrieving, writing, and outputting) can be performed
`
`without a computer. Performing these functions with a computer is routine
`
`and conventional. Reading data from a “data carrier” (i.e., a standard smart
`
`card), forwarding data, receiving data, retrieving data, writing data into a
`
`“data carrier,” and outputting data to a user are all generic, conventional,
`
`routine computer functions that were well known in the prior art to the ’221
`
`patent.
`
`65. Reading and writing data in the context of computational machines dates
`
`back at least to Charles Babbage’s and Lady Augusta Ada Lovelace’s
`
`pioneering work on the “Analytical Engine” in the mid-1800s. Transmitting,
`
`
`
`
`19
`
`Google Exhibit 1002 Page 00019
`
`
`
`
`
`receiving, and responding to data among a network of multiple computing
`
`devices dates back at least to the ARPANET project of the late 1960s.
`
`66. To be clear, claim 3 of the ’221 patent does not recite the use of generic
`
`computer hardware and functions to override some routine or conventional
`
`sequence of events. Instead, claim 3 recites the use of a general purpose
`
`computer to perform routine, conventional, well-known computer functions.
`
`C.
`
`It Is My Opinion That Claim 3 of The ’221 Patent Is Patent
`Ineligible
`In light of the above, it is my opinion that claim 3 is not directed to patent
`
`67.
`
`eligible subject matter and is thus invalid.
`
`
`
`
`
`
`
`
`
`
`20
`
`Google Exhibit 1002 Page 00020
`
`
`
` hereby declare that all statements made herein of my own knowledge are true and
`
` I
`
`that all statements made on information and belief are believed to be true; and
`
`further that these statements were made with the knowledge that willful false
`
`statements and the like so made are punishable by fine or imprisonment, or both,
`
`under Section 1001 of Title 18 of the United States Code.
`
`
`
`
`
`DATE:____________________
`
`
`DR. JUSTIN DOUGLAS TYGAR
`
`
`
`21
`
`
`
`
`
`
`6 May 2015
`
`Google Exhibit 1002 Page 00021