`
`
`
`TO PETITIONER GOOGLE INC.’S
`PETITION FOR COVERED BUSINESS
`METHOD REVIEW OF
`U.S. PATENT NO. 8,336,772
`
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`_____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________________
`
`
`
`GOOGLE INC.
`Petitioner
`
`v.
`
`SMARTFLASH LLC
`Patent Owner
`
`U.S. Patent No. 8,336,772
`
`_____________________
`
`Covered Business Method Review Case No. Unassigned
`
`_____________________
`
`
`
`DECLARATION OF DR. JUSTIN DOUGLAS TYGAR
`
`
`
`
`
`1
`
`
`
`
`
`
`
`
`
`
`Google Exhibit 1002 Page 00001
`
`
`
`I, Dr. Justin Douglas Tygar, declare as follows:
`
`I have been retained as an expert witness on behalf of Google Inc. (“Google”
`
`or “petitioner”) in connection with the instant Covered Business Method
`
`(“CBM”) review petition.
`
`
`
`
`1.
`
`2.
`
`I am being compensated for my time in connection with this CBM review at
`
`my standard consulting rate, which is $500 per hour up to a maximum of
`
`$5,000 per day. My compensation is not dependent on the substance of my
`
`opinions, my testimony, or the outcome of this CBM review.
`
`3.
`
`I understand that the petition for CBM review involves U.S. Patent No.
`
`8,336,772 (“the ’772 patent”), Ex. 1001.1
`
`4.
`
`I have reviewed and am familiar with the ’772 patent, including claims 1, 5,
`
`9, 10, 21, and 22 (the “challenged claims”). I have reviewed and am
`
`familiar with six patents related to the ’772 patent: U.S. Patent Nos.
`
`7,334,720, 7,942,317, 8,033,458, 8,061,598, 8,118,221, and 8,794,516. I
`
`have reviewed and am familiar with the file histories for the ’772 patent and
`
`the six related patents.
`
`5.
`
`I am familiar with the general state of the technology at issue in the ’772
`
`patent as of October 25, 1999, its purported priority date.
`
`1 All references to “Ex. __” in this declaration refer to the Google Exhibits
`
`concurrently filed with Google’s CBM petition.
`
`
`
`
`2
`
`Google Exhibit 1002 Page 00002
`
`
`
`In preparing this declaration, I have considered each of the documents cited
`
`herein. I have also relied on my experience in the relevant art in connection
`
`with forming my opinions.
`
`QUALIFICATIONS
`Since 1998, I have been a Full Professor at the University of California,
`
`Berkeley. I hold a professor position in two departments at U.C. Berkeley:
`
`the Department of Electrical Engineering and Computer Sciences (Computer
`
`Sciences Division) and the School of Information. Before joining U.C.
`
`Berkeley, I was a tenured professor at Carnegie Mellon University in
`
`Computer Science, where I had a faculty appointment since 1986. I received
`
`my Ph.D. in Computer Science from Harvard University in 1986. I have
`
`extensive research, teaching, and industry experience in the areas of
`
`computer security and electronic commerce, with a special research interest
`
`in digital rights management as it relates to those areas.
`
`
`
`6.
`
`I.
`7.
`
`8.
`
`I have helped build a number of security and electronic commerce systems.
`
`Together with my colleague at Carnegie Mellon, Marvin Sirbu, I developed
`
`Netbill, a patented electronic payment system that was licensed to
`
`CyberCash (now part of Verisign). For the U.S. Postal Service, I designed
`
`the two dimensional “Information Based Indicia” postage indicia that have
`
`now become a widely used standard. Together with my graduate students, I
`
`
`
`
`3
`
`Google Exhibit 1002 Page 00003
`
`
`
`
`
`designed the architecture and a foundational operating system used on
`
`secure coprocessors, Dyad. Together with my graduate students, I designed
`
`Micro-Tesla, a light-weight cryptographic architecture that ultimately
`
`became a standard of the Internet Engineering Task Force and is widely used
`
`in sensor webs.
`
`9.
`
`I served as chair of the Defense Department’s ISAT Study Group on
`
`Security with Privacy and was a founding board member of the Association
`
`for Computing Machinery’s Special Interest Group on Electronic Commerce.
`
`10.
`
`I have written three books, including Secure Broadcast Communication in
`
`Wired and Wireless Networks (with Adrian Perrig), which has become a
`
`standard reference. My fourth book, Adversarial Machine Learning, is
`
`scheduled to be published by Cambridge University Press in 2015.
`
`11.
`
`I have been an active researcher in the fields of computer security and
`
`electronic commerce continuously since 1982.
`
`12. My complete curriculum vitae is submitted as Google Exhibit 1003.
`
`13. My findings explained in this declaration are based on my years of education,
`
`research, and industry experience in computer security and e-commerce
`
`technologies, including as applied to digital rights management.
`
`
`
`
`4
`
`Google Exhibit 1002 Page 00004
`
`
`
`
`
`II. LEVEL OF ORDINARY SKILL IN THE ART
`14. Counsel for the petitioner asked me to provide an opinion regarding the skill
`
`level of a person of ordinary skill in the art of the ’772 patent as of October
`
`25, 1999.2
`
`15. Counsel for the petitioner has informed me that the hypothetical person of
`
`ordinary skill in the art is presumed to have knowledge of all references that
`
`are sufficiently related to one another and to the pertinent art, and to have
`
`knowledge of all arts reasonably pertinent to the particular problem that the
`
`claimed inventions address. A person of ordinary skill is capable of drawing
`
`inferences and taking creative steps.
`
`16.
`
`In my opinion, a person of ordinary skill in the art with respect to the ’772
`
`patent would have had at least a Bachelor’s degree in computer science or
`
`equivalent experience.
`
`17. My understanding of a person of ordinary skill in the art is based on my
`
`education and professional experience. Since 1986, I have been a computer
`
`2 All opinions that I express in this Declaration with respect to the ’772
`
`Patent, its disclosure, the construction and scope of its claims, the validity of its
`
`claims, and the scope and content of the prior art are from the perspective and view
`
`of what a person skilled in the art would have understood, regardless of whether I
`
`expressly identify it as such.
`
`
`
`
`5
`
`Google Exhibit 1002 Page 00005
`
`
`
`
`
`science professor and I have been teaching undergraduate, masters, and
`
`doctoral students in computer science, and I am familiar with the abilities of
`
`students at those levels of education. A person with a computer science
`
`degree would understand and be able to practice the teachings of the asserted
`
`patents, including understanding their descriptions of systems and devices
`
`and associated hardware and functionality.
`
`18.
`
`I received my doctoral degree in computer science in 1986, and have
`
`actively been a computer science professor researching topics in computer
`
`security, electronic commerce, and distributed systems since that time, so in
`
`the late 1990s, I had far exceeded the education and experience of a person
`
`of ordinary skill in the art.
`
`III. STATE OF THE ART
`19. By October 25, 1999, both e-commerce and anti-piracy methods for digital
`
`content were well understood concepts. For example, WO 99/07121 A2 (Ex.
`
`1004), describes fundamental aspects and features of e-commerce including
`
`browsing content for purchase, payment verification, and digital delivery of
`
`purchased content. Ex. 1004 at Abstract. As another example, U.S. Patent
`
`No. 5,790,423, which was filed on June 13, 1995, and which issued on
`
`August 4, 1998, is directed to anti-piracy methods in the context of digital
`
`content distribution systems and discloses a system for distributing audio
`
`
`
`
`6
`
`Google Exhibit 1002 Page 00006
`
`
`
`
`
`content from a remote source over the Internet in which use rules for
`
`satisfying copyright protection criteria are coded into the control program.
`
`Ex. 1005 at 11:60-12:59.
`
`20. By October 1999, I had personally worked on e-commerce and anti-piracy
`
`projects such as the NetBill project, the Dyad project, and the development
`
`of electronic postage metering services for the USPS.
`
`21. By October 1999, multiple commercial services combining e-commerce and
`
`anti-piracy elements had launched.
`
`22. For example, from 1998 on, the Softbook ebook system was commercially
`
`available. Ex. 1006 (SOFTBOOK PRESS Secure Information Delivery to a
`
`Distributed Workforce, CIO Magazine, Aug. 1, 1999) at 4. This system
`
`involved a handheld ebook-reader device that could be plugged into a phone
`
`line to download material available from Softbookstore, an e-commerce site
`
`from which books and trade journals could be purchased. Id.; see also Ex.
`
`1007 (Electronic books to hit the shelves, New Straits Times, Aug. 24, 1998,
`
`Computimes) at 27. In the Softbook system, “[i]nformation is encrypted to
`
`prevent duplication, and the system is secure to prevent unauthorized use.”
`
`Ex. 1006 at 4.
`
`23. Similarly, prior to 1999, Liquid Audio developed, licensed, and deployed
`
`software and systems for the sale, delivery, and playback of digital music.
`
`
`
`
`7
`
`Google Exhibit 1002 Page 00007
`
`
`
`
`
`In October 1997, it published through its website a document entitled
`
`“Music on the Net,” which describes its platform for selling copy-protected
`
`files over the Internet. Ex. 1008 (Image of Liquidaudio.com cached October
`
`10, 1997; Linked “Music on the Net” Research Report) at 19. The document
`
`also describes competing services such as Cerberus and Eurodat, which also
`
`sold digital music in 1997. Id. The Eurodat service incorporated “an anti-
`
`piracy mechanism that ensures that downloaded music can only be played
`
`from the server it was encoded on.” Id.
`
`24. Liquid Audio extensively promoted its platform in 1998 through programs
`
`such as its Indie 1000 program, which provided artists with a turn-key
`
`solution for secure sales of digital content. Ex. 1009. This program
`
`emphasized the combination of anti-piracy measures with e-commerce
`
`functionality: “The Liquid Audio system combines sophisticated multi-layer
`
`encryption with inaudible digital watermarking technology to protect your
`
`intellectual property. This advanced system provides the most
`
`comprehensive, anti-copy and anti-piracy technology available today . . .
`
`When a music fan wants to buy your music they just click on ‘Buy
`
`Download’ in the Liquid MusicPlayer and enter the necessary payment
`
`information. You determine the price for the songs.” Id. at 2.
`
`
`
`
`8
`
`Google Exhibit 1002 Page 00008
`
`
`
`
`
`25. The examples above show that the combination of e-commerce systems with
`
`anti-piracy measures was well-established both in theory and in commercial
`
`practice by October 25, 1999.
`
`IV. OVERVIEW OF THE ’772 PATENT
`26. The ’772 patent states that its alleged invention “relates to a portable data
`
`carrier for storing and paying for data and to computer systems for providing
`
`access to data to be stored.” Ex. 1001 at 1:23-26. The ’772 patent states that
`
`the alleged “invention is particularly useful for managing stored audio and
`
`video data, but may also be applied to storage and access of text and
`
`software, including games, as well as other types of data.” Id. at 1:28-31.
`
`The stated goal of the ’772 patent is to respond to the “urgent need to find a
`
`way to address the problem of data piracy.” Id. at 1:50-58.
`
`27. The ’772 patent describes the core of its supposed invention as “a method of
`
`providing portable data comprising providing a portable data storage device
`
`comprising downloaded data storage means and payment validation means;
`
`providing a terminal for Internet access; coupling the portable data storage
`
`device to the terminal; reading payment information from the payment
`
`validation means using the terminal; validating the payment information;
`
`and downloading data into the portable storage device from a data supplier.”
`
`Id. at 1:61-2:3.
`
`
`
`
`9
`
`Google Exhibit 1002 Page 00009
`
`
`
`
`
`28. Data storage means and data encryption were conventional technologies as
`
`of October 1999. The ’772 patent provides various suggestions for the data
`
`storage means and the optional data encryption used in its system. Ex. 1001
`
`at 2:43-3:48. The specification identifies FLASH RAM as a known example
`
`of data storage means; the specification identifies Pretty Good Privacy and
`
`PKI (Public Key Infrastructure) as known examples of data encryption. Id.
`
`29. The ’772 patent also describes a portable data carrier that could be integrated
`
`into mobile communications devices. Portable data carriers were also
`
`known and conventional hardware as of October 1999. The ’772 patent
`
`specification identifies a “standard smart card” as an example of known
`
`portable data carriers. Id. at 11:34-35.
`
`30. The ’772 patent also describes the use of rules to govern access to stored
`
`data. Id. at 5:4-12. The specification identifies known examples of such
`
`rules, including “specify[ing] . . . a predetermined number of accesses” and
`
`allowing “unlimited plays but only on specified players.” Id. at 23:41-50.
`
`31. The specification of the ’772 patent also discloses that the alleged invention
`
`uses e-payment systems known at the time of its filing, such as MONDEX,
`
`Proton, and Visa, for payment and payment verification functions. Id. at
`
`13:43-58.
`
`
`
`
`10
`
`Google Exhibit 1002 Page 00010
`
`
`
`
`
`V. CLAIM CONSTRUCTION
`32. Counsel for the petitioner has informed me that terms in the challenged
`
`claims must be given their broadest reasonable construction in light of
`
`the ’772 patent’s specification, which means that the words of the claims
`
`should be given the broadest possible meaning that is consistent with the
`
`statements of the specification.
`
`“Data Carrier” (Claims 9, 10, 21, and 22)
`
`33. The patent describes the use of a “data carrier.” “A portable data carrier has
`
`an interface for sending and receiving data, non-volatile data memory for
`
`storing received content data and non-volatile payment validation memory
`
`for providing payment validation data to an external device.” Ex. 1001 at
`
`Abstract. The data carrier may “store both payment data and content
`
`data.” Id. at 4:36-37. The data carrier may comprise “non-volatile data
`
`memory and non-volatile parameter memory storing use status data and use
`
`rules.” Id. at 6:38-40. “The data carrier may also be integrated into other
`
`apparatus, such as a mobile communications device.” Id. at 4:51-53. The
`
`data carrier may “further comprise[] memory for storing data for accessing a
`
`mobile communications network, for example to receive content data over
`
`the network.” Id. at 6:13-16. In such an embodiment, “the data carrier may
`
`replace a SIM (Subscriber Identity Module) card.” Id. at 6:16-17. The data
`
`
`
`
`11
`
`Google Exhibit 1002 Page 00011
`
`
`
`
`
`carrier may also “store[] access control data, such as a user ID and
`
`password.” Id. at 5:29-30. Figure 2 provides an example of a portable data
`
`carrier, namely a smart Flash card, and Figure 9 illustrates the “components
`
`of a data carrier.” The patent also gives as examples of data carriers a
`
`“ROM chip or disk.” Id. at 18:28.
`
`34. The patent owner wrote in its claim construction brief at page 19 that “data
`
`carrier” could be construed to mean a “medium capable of storing
`
`information.” Ex. 1012 at 17.
`
`35. The district court wrote in its claim construction order at page 22 that “data
`
`carrier” means “medium capable of storing information.” Ex. 1011 at 22.
`
`36. Counsel has informed me that the district court uses a narrower interpretive
`
`standard than the standard that applies to a CBM proceeding. The broadest
`
`reasonable interpretation of the term “data carrier” would have been
`
`understood by a person of ordinary skill in the art to mean “any medium,
`
`regardless of structure, that is capable of storing information.”
`
`“Payment Data” (Claims 1, 5, 9, 10, 14, 21, and 22)
`
`37. The patent describes “payment data.” According to the specification,
`
`“payment data” can be used “for making a payment to the system owner”
`
`(Ex. 1001 at 21:1-2) and “a payment” can be “represented by the payment
`
`data.” Id. at 9:9-11. The specification also teaches that “payment data” can
`
`
`
`
`12
`
`Google Exhibit 1002 Page 00012
`
`
`
`
`
`store “a payment audit trail including payment amounts and data on to
`
`whom payments have been made.” Id. at 17:60-62.
`
`38. The district court wrote in its claim construction order at page 11 that
`
`“payment data” means “data that can be used to make payment for content.”
`
`Ex. 1011 at 11.
`
`39. Counsel has informed me that the district court uses a narrower interpretive
`
`standard than the standard that applies to a CBM proceeding. The broadest
`
`reasonable interpretation of the term “payment data” would have been
`
`understood by a person of ordinary skill in the art to mean “any information
`
`that can be used in connection with the process of making a payment for
`
`content.”
`
`“Payment Validation System” (Claims 1, 5, 9, 10, 14, 21, and 22)
`
`40. The patent describes “payment validation system.” According to the patent
`
`specification, the “payment validation system” is used “for validating the
`
`data and authorizing the payment” (Ex. 1001 at 8:26-28) as well as returning
`
`data such as “payment validation data.” Id. at 9:3-5, Claim 8 (“code to
`
`receive payment validation data defining if said payment validation system
`
`has validated payment for said content data item”). The patent also discloses
`
`that “[t]he payment validation system may be part of the data supplier’s
`
`computer systems or it may be a separate e-payment system.” Id. at 8:28-30.
`
`
`
`
`13
`
`Google Exhibit 1002 Page 00013
`
`
`
`
`
`41. The patent owner wrote in its claim construction brief at page 7 that
`
`“payment validation system” was a “system that returns payment validation
`
`data in response to valid payment data.” Ex. 1012 at 7.
`
`42. The district court wrote in its claim construction order at page 14 that
`
`“payment validation system” is a “system that returns payment validation
`
`data based on an attempt to validate payment data.” Ex. 1011 at 14.
`
`Counsel for the petitioner has informed me that the district court uses a
`
`narrower interpretive standard than the standard that applies to a CBM
`
`proceeding. The broadest reasonable interpretation of the term “payment
`
`validation system” would have been understood by a person of ordinary skill
`
`in the art to mean “any system that returns information in connection with an
`
`attempt to validate payment data” (wherein “payment data” must be
`
`construed broadly to include “any information that can be used in connection
`
`with the process of making a payment for content”).
`
`“Payment Validation Data” (Claims 1, 5, 9, 10, 14, 21, and 22)
`
`43. The patent describes “payment validation data.” According to the patent,
`
`“payment validation data” is data that a data access terminal can receive
`
`from a “payment validation system” after “payment data” is forwarded to the
`
`“payment validation system.” Ex. 1001 at 8:7-13, 9:3-5, Claim 8.
`
`
`
`
`14
`
`Google Exhibit 1002 Page 00014
`
`
`
`
`
`44. The district court wrote in its claim construction order at page 37 that
`
`“payment validation data” should be given its plain meaning. Ex. 1011 at 15,
`
`37.
`
`45. The patent owner wrote in its claim construction brief at page 10 that “none
`
`of the claims of the patents-in-suit require that the payment validation
`
`system be used to authorize payment.” Ex. 1012 at 10.
`
`46. Counsel for the petitioner has informed me that the district court uses a
`
`narrower interpretive standard than the standard that applies to a CBM
`
`proceeding. The broadest reasonable interpretation of the term “payment
`
`validation data” would have been understood by a person of ordinary skill in
`
`the art to mean “information returned in connection with an attempt to
`
`validate payment data” (wherein “payment data” must be construed broadly
`
`to include “any information that can be used in connection with the process
`
`of making a payment for content”).
`
`“Supplementary Data” (Claim 5)
`
`47. The patent describes a “supplementary data.” According to the patent,
`
`supplementary data can be advertising data, customer reward management
`
`data, and/or hot links to web sites. Ex. 1001 at Abstract, 5:53-60, 24:64-
`
`25:4. The ’772 patent also teaches that “supplementary data” may comprise
`
`“a pointer to an external data source from which data is downloaded either to
`
`
`
`
`15
`
`Google Exhibit 1002 Page 00015
`
`
`
`
`
`the data carrier or to a data access device or content player, so that
`
`advertising or other data can be displayed when reviewing or accessing the
`
`stored content.” Id. at 5:56-60.
`
`48. The district court wrote in its claim construction order at pages 7-8 that
`
`“supplementary data” should mean “advertising data, customer reward
`
`management data, and/or hot links to web sites” and that “[t]he parties have
`
`agreed to th[at] construction . . . .” Ex. 1011 at 7-8.
`
`49. Counsel for the petitioner has informed me that the district court uses a
`
`narrower interpretive standard than the standard that applies to a CBM
`
`proceeding. The broadest reasonable interpretation of the term
`
`“supplementary data” would have been understood by a person of ordinary
`
`skill in the art to be data additional to content (which would include at least
`
`“hot links to websites, advertising data, customer reward management data,
`
`and pointers to external data sources from which data is downloaded”).
`
`“Program Store” (Claims 1, 5, 9, 10, 14, 21, and 22)
`
`50. The patent describes a “program store.” According to the patent, a “program
`
`store” stores code that is implementable by a processor. E.g., Ex. 1001,
`
`4:54-61, Claim 8 (“a program store storing code implementable by a
`
`processor”).
`
`
`
`
`16
`
`Google Exhibit 1002 Page 00016
`
`
`
`
`
`51. The broadest reasonable interpretation of the term “program store” would
`
`have been understood by a person of ordinary skill in the art to mean “any
`
`generic component capable of storing programs.”
`
`VI. PATENT ELIGIBLE SUBJECT MATTER
`52. Counsel for the petitioner has informed me that laws of nature, abstract ideas,
`
`and natural phenomena cannot be patented pursuant to 35 U.S.C. § 101.
`
`Counsel for the petitioner has informed me that the Supreme Court has
`
`endorsed a two-step approach for determining when a claim falls outside the
`
`scope of Section 101. Counsel for the petitioner has informed me that the
`
`first step is to determine whether the claim at issue is directed to a patent
`
`ineligible concept like an abstract idea. If it is, the second step is to identify
`
`“what else” is claimed so as to determine whether the claim amounts to
`
`“significantly more” than the abstract idea.
`
`53. Counsel for the petitioner has informed me that if a claim does not recite
`
`significantly more than an abstract idea, it is invalid under Section 101.
`
`Counsel for the petitioner has informed me that to constitute “significantly
`
`more,” it is not sufficient to simply apply the abstract idea with a computer.
`
`Counsel for the petitioner has informed me that neither is it sufficient to
`
`limit the claim to a particular technological environment or to add to the
`
`claim insignificant post solution activity or well-understood, routine,
`
`
`
`
`17
`
`Google Exhibit 1002 Page 00017
`
`
`
`conventional activity. Counsel for the petitioner has informed that instead, a
`
`claim directed at an un-patentable abstract idea must contain other elements
`
`or a combination of elements (an “inventive concept”) sufficient to prevent
`
`patenting the abstract idea itself. Counsel has informed me that a claim
`
`directed at overriding a routine and conventional sequence of events may
`
`also be patent eligible.
`
`A.
`
`It Is My Opinion That Claims 1, 5, 9, 10, 14, 21, and 22 Are
`Directed To An Abstract Idea
`
`
`It is my opinion that claims 1, 5, 9, 10, 14, 21, and 22 of the ’772 patent are
`
`
`
`54.
`
`directed to the abstract idea of controlling access to something based on one
`
`or more conditions (such as payment).
`
`55. Each of claims 1, 5, 9, 10, 14, 21, and 22 is expressly directed to that
`
`abstract idea. Claim 1 recites a generic “handheld multimedia terminal”
`
`with “code to control access to said at least one selected item of multimedia
`
`content on said terminal responsive to said payment validation data.” Claim
`
`8 (upon which claims 9 and 10 depend) begins “[a] data access terminal for
`
`controlling access to one or more data items stored on a data carrier . . . .”
`
`56. The specification of the ’772 patent also teaches that the “invention” is
`
`directed to the same abstract idea. The specification states that the
`
`“invention” relates to “providing access” and “paying.” Ex. 1001 at 1:23-28.
`
`
`
`
`18
`
`Google Exhibit 1002 Page 00018
`
`
`
`B.
`
`It Is My Opinion That Claims 1, 5, 9, 10, 14, 21, and 22 Do Not
`Disclose An Inventive Concept That Is Significantly More Than
`An Abstract Idea
`It is my opinion that none of the challenged claims adds anything of
`
`significance to the underlying abstract idea of controlling access to
`
`something based on one or more conditions (such as payment). The claims
`
`simply apply the abstract idea to “data” and recite generic computer
`
`components and functionality.
`
`
`
`57.
`
`58. The computer hardware recited in claims 1, 5, 9, 10, 14, 21, and 22—
`
`namely, a “data carrier,” “non-volatile memory,” “handheld multimedia
`
`terminal,” “data access terminal,” “user interface,” “data carrier interface,”
`
`“program store,” “interface for communicating with a data supplier,”
`
`“wireless interface,” “display,” and “a processor coupled to” one or more of
`
`those components—is generic and conventional. Such hardware has long
`
`been routinely used in general purpose computers or itself is generic
`
`computer equipment. The specification of the ’772 patent states that the
`
`“data access terminal” may be “a conventional computer,” “a general
`
`purpose computer,” or “a home personal computer.” Ex. 1001 at 4:7-8,
`
`16:7, 16:42, Fig. 7. The specification also recites that “the invention may be
`
`implemented using any electronic communications network, such as a wide
`
`area network, local area network, wireless network, or conventional land line
`
`
`
`
`19
`
`Google Exhibit 1002 Page 00019
`
`
`
`
`
`network.” Id. at 25:53-56. According to the specification, “non-volatile
`
`memory” can comprise EEPROM and that the “permanent program
`
`memory” can comprise ROM, both generic and conventional components.
`
`Id. at 25:53-56.
`
`59. Further, the integration of one or more generic components with another
`
`component—e.g., integrating a data carrier with a data access terminal or a
`
`data access terminal with a mobile communications device—is a common
`
`hardware configuration such as the incorporation of memory into a general
`
`purpose computer or a cellular chipset into a mobile device. Those
`
`configurations are all conventional and were well known in the prior art to
`
`the ’772 patent.
`
`60. Similarly, a “mobile communications device” and an “audio/video player”
`
`are conventional electronic devices and were well known in the prior art to
`
`the ’772 patent.
`
`61. Alan Turing’s celebrated idealized computing automaton (now called a
`
`“Turing Machine” in his honor) was introduced in 1937 in the paper “On
`
`Computable Numbers, with an application to the Entscheidungsproblem”
`
`Ex. 1014 (Proceedings of the London Mathematical Society, vol s2-42, pp.
`
`230-265). On page 231, Turing notes “The machine is supplied a ‘tape’ (the
`
`analogue of paper) running through it, and divided into sections (called
`
`
`
`
`20
`
`Google Exhibit 1002 Page 00020
`
`
`
`
`
`‘squares’) each capable of bearing a ‘symbol.’” Id. Turing’s “tape” serves
`
`as a data carrier. Id. A “standard smart card,” which is the “data carrier”
`
`referenced in the ’772 patent specification (Ex. 1001 at 11:34-35), is a
`
`generic hardware device that was well known in the prior art to the ’772
`
`patent.
`
`62. The “code” functions recited in each of claims 1, 5, 9, 10, 14, 21, and 22
`
`(namely requesting, receiving, transmitting, displaying, presenting,
`
`outputting, responding, and writing) can be performed without a computer.
`
`Performing these functions with a computer is routine and conventional.
`
`Storing information in non-volatile memory, storing information on a
`
`standard smart card (or “data carrier”), requesting data identifying stored
`
`content, receiving data/content, displaying or presenting data to a user,
`
`receiving user selections for content, responding to user selections,
`
`responding to data, transmitting data, retrieving data, outputting data,
`
`receiving data over a wireless network, and controlling access to
`
`data/content are all generic, conventional, routine computer functions that
`
`were well known in the prior art to the ’772 patent.
`
`63. Reading and writing data in the context of computational machines dates
`
`back at least to Charles Babbage’s and Lady Augusta Ada Lovelace’s
`
`pioneering work on the “Analytical Engine” in the mid-1800s. Transmitting,
`
`
`
`
`21
`
`Google Exhibit 1002 Page 00021
`
`
`
`
`
`receiving, and responding to data among a network of multiple computing
`
`devices dates back at least to the ARPANET project of the late 1960s.
`
`64. To be clear, claims 1, 5, 9, 10, 14, 21, and 22 of the ’772 patent do not recite
`
`the use of generic computer hardware and functions to override some routine
`
`or conventional sequence of events. Instead, claims 1, 5, 9, 10, 14, 21, and
`
`22 recite the use of a general purpose computer to perform routine,
`
`conventional, well-known computer functions.
`
`C.
`
`It Is My Opinion That Claims 1, 5, 9, 10, 14, 21, and 22 of The
`’772 Patent Are Patent Ineligible
`In light of the above, it is my opinion that claims 1, 5, 9, 10, 14, 21, and 22
`
`65.
`
`are not directed to patent eligible subject matter and are thus invalid.
`
`
`
`22
`
`
`
`
`
`
`Google Exhibit 1002 Page 00022
`
`
`
` hereby declare that all statements made herein of my own knowledge are true and
`
` I
`
`that all statements made on information and belief are believed to be true; and
`
`further that these statements were made with the knowledge that willful false
`
`statements and the like so made are punishable by fine or imprisonment, or both,
`
`under Section 1001 of Title 18 of the United States Code.
`
`
`
`
`
`DATE:____________________
`
`
`DR. JUSTIN DOUGLAS TYGAR
`
`
`
`
`
`
`
`
`23
`
`8 May 2015
`
`Google Exhibit 1002 Page 00023