`
`
`
`TO PETITIONER GOOGLE INC.’S
`PETITION FOR COVERED BUSINESS
`METHOD REVIEW OF
`
`U.S. PATENT NO. 8,794,516
`
`
`
`
`
`
`
`
`
`
`
`
`
`DECLARATION OF DR. JUSTIN DOUGLAS TYGAR
`
`
`
`
`
`01980.00035/6761360.3
`
`
`1
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`_____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________________
`
`GOOGLE INC.
`Petitioner
`
`v.
`
`SMARTFLASH LLC
`Patent Owner
`
`U.S. Patent No. 8,794,516
`
`_____________________
`
`Covered Business Method Review Case No. Unassigned
`
`_____________________
`
`
`
`
`
`Google Exhibit 1002 Page 00001
`
`
`
`I, Dr. Justin Douglas Tygar, declare as follows:
`
`I have been retained as an expert witness on behalf of Google Inc. (“Google”
`
`or “petitioner”) in connection with the instant Covered Business Method
`
`(“CBM”) review petition.
`
`
`
`
`1.
`
`2.
`
`I am being compensated for my time in connection with this CBM review at
`
`my standard consulting rate, which is $500 per hour up to a maximum of
`
`$5,000 per day. My compensation is not dependent on the substance of my
`
`opinions, my testimony, or the outcome of this CBM review.
`
`3.
`
`I understand that the petition for CBM review involves U.S. Patent No.
`
`8,794,516 (“the ’516 patent”), Ex. 1001.1
`
`4.
`
`I have reviewed and am familiar with the ’516 patent, including claims 1, 3,
`
`5, 10, 12, 18, 19, 21, and 24 (the “challenged claims”). I have reviewed and
`
`am familiar with six patents related to the ’516 patent: U.S. Patent Nos.
`
`7,334,720, 7,942,317, 8,033,458, 8,061,598, 8,118,221, and 8,336,772. I
`
`have reviewed and am familiar with the file histories for the ’516 patent and
`
`the six related patents.
`
`5.
`
`I am familiar with the general state of the technology at issue in the ’516
`
`patent as of October 25, 1999, its purported priority date.
`
`1 All references to “Ex. __” in this declaration refer to the Google Exhibits
`
`concurrently filed with Google’s CBM petition.
`
`01980.00035/6761360.3
`
`
`2
`
`Google Exhibit 1002 Page 00002
`
`
`
`In preparing this declaration, I have considered each of the documents cited
`
`herein. I have also relied on my experience in the relevant art in connection
`
`with forming my opinions.
`
`QUALIFICATIONS
`Since 1998, I have been a Full Professor at the University of California,
`
`Berkeley. I hold a professor position in two departments at U.C. Berkeley:
`
`the Department of Electrical Engineering and Computer Sciences (Computer
`
`Sciences Division) and the School of Information. Before joining U.C.
`
`Berkeley, I was a tenured professor at Carnegie Mellon University in
`
`Computer Science, where I had a faculty appointment since 1986. I received
`
`my Ph.D. in Computer Science from Harvard University in 1986. I have
`
`extensive research, teaching, and industry experience in the areas of
`
`computer security and electronic commerce, with a special research interest
`
`in digital rights management as it relates to those areas.
`
`
`
`6.
`
`I.
`7.
`
`8.
`
`I have helped build a number of security and electronic commerce systems.
`
`Together with my colleague at Carnegie Mellon, Marvin Sirbu, I developed
`
`Netbill, a patented electronic payment system that was licensed to
`
`CyberCash (now part of Verisign). For the U.S. Postal Service, I designed
`
`the two dimensional “Information Based Indicia” postage indicia that have
`
`now become a widely used standard. Together with my graduate students, I
`
`01980.00035/6761360.3
`
`
`3
`
`Google Exhibit 1002 Page 00003
`
`
`
`
`
`designed the architecture and a foundational operating system used on
`
`secure coprocessors, Dyad. Together with my graduate students, I designed
`
`Micro-Tesla, a light-weight cryptographic architecture that ultimately
`
`became a standard of the Internet Engineering Task Force and is widely used
`
`in sensor webs.
`
`9.
`
`I served as chair of the Defense Department’s ISAT Study Group on
`
`Security with Privacy and was a founding board member of the Association
`
`for Computing Machinery’s Special Interest Group on Electronic Commerce.
`
`10.
`
`I have written three books, including Secure Broadcast Communication in
`
`Wired and Wireless Networks (with Adrian Perrig), which has become a
`
`standard reference. My fourth book, Adversarial Machine Learning, is
`
`scheduled to be published by Cambridge University Press in 2015.
`
`11.
`
`I have been an active researcher in the fields of computer security and
`
`electronic commerce continuously since 1982.
`
`12. My complete curriculum vitae is submitted as Google Exhibit 1003.
`
`13. My findings explained in this declaration are based on my years of education,
`
`research, and industry experience in computer security and e-commerce
`
`technologies, including as applied to digital rights management.
`
`01980.00035/6761360.3
`
`
`4
`
`Google Exhibit 1002 Page 00004
`
`
`
`
`
`II. LEVEL OF ORDINARY SKILL IN THE ART
`14. Counsel for the petitioner asked me to provide an opinion regarding the skill
`
`level of a person of ordinary skill in the art of the ’516 patent as of October
`
`25, 1999.2
`
`15. Counsel for the petitioner has informed me that the hypothetical person of
`
`ordinary skill in the art is presumed to have knowledge of all references that
`
`are sufficiently related to one another and to the pertinent art, and to have
`
`knowledge of all arts reasonably pertinent to the particular problem that the
`
`claimed inventions address. A person of ordinary skill is capable of drawing
`
`inferences and taking creative steps.
`
`16.
`
`In my opinion, a person of ordinary skill in the art with respect to the ’516
`
`patent would have had at least a Bachelor’s degree in computer science or
`
`equivalent experience.
`
`17. My understanding of a person of ordinary skill in the art is based on my
`
`education and professional experience. Since 1986, I have been a computer
`
`2 All opinions that I express in this Declaration with respect to the ’516
`
`Patent, its disclosure, the construction and scope of its claims, the validity of its
`
`claims, and the scope and content of the prior art are from the perspective and view
`
`of what a person skilled in the art would have understood, regardless of whether I
`
`expressly identify it as such.
`
`01980.00035/6761360.3
`
`
`5
`
`Google Exhibit 1002 Page 00005
`
`
`
`
`
`science professor and I have been teaching undergraduate, masters, and
`
`doctoral students in computer science, and I am familiar with the abilities of
`
`students at those levels of education. A person with a computer science
`
`degree would understand and be able to practice the teachings of the asserted
`
`patents, including understanding their descriptions of systems and devices
`
`and associated hardware and functionality.
`
`18.
`
`I received my doctoral degree in computer science in 1986, and have
`
`actively been a computer science professor researching topics in computer
`
`security, electronic commerce, and distributed systems since that time, so in
`
`the late 1990s, I had far exceeded the education and experience of a person
`
`of ordinary skill in the art.
`
`III. STATE OF THE ART
`19. By October 25, 1999, both e-commerce and anti-piracy methods for digital
`
`content were well understood concepts. For example, WO 99/07121 A2 (Ex.
`
`1004), describes fundamental aspects and features of e-commerce including
`
`browsing content for purchase, payment verification, and digital delivery of
`
`purchased content. Ex. 1004 at Abstract. As another example, U.S. Patent
`
`No. 5,790,423, which was filed on June 13, 1995, and which issued on
`
`August 4, 1998, is directed to anti-piracy methods in the context of digital
`
`content distribution systems and discloses a system for distributing audio
`
`01980.00035/6761360.3
`
`
`6
`
`Google Exhibit 1002 Page 00006
`
`
`
`
`
`content from a remote source over the Internet in which use rules for
`
`satisfying copyright protection criteria are coded into the control program.
`
`Ex. 1005 at 11:60-12:59.
`
`20. By October 1999, I had personally worked on e-commerce and anti-piracy
`
`projects such as the NetBill project, the Dyad project, and the development
`
`of electronic postage metering services for the USPS.
`
`21. By October 1999, multiple commercial services combining e-commerce and
`
`anti-piracy elements had launched.
`
`22. For example, from 1998 on, the Softbook ebook system was commercially
`
`available. Ex. 1006 (SOFTBOOK PRESS Secure Information Delivery to a
`
`Distributed Workforce, CIO Magazine, Aug. 1, 1999) at 4. This system
`
`involved a handheld ebook-reader device that could be plugged into a phone
`
`line to download material available from Softbookstore, an e-commerce site
`
`from which books and trade journals could be purchased. Id.; see also Ex.
`
`1007 (Electronic books to hit the shelves, New Straits Times, Aug. 24, 1998,
`
`Computimes) at 27. In the Softbook system, “[i]nformation is encrypted to
`
`prevent duplication, and the system is secure to prevent unauthorized use.”
`
`Ex. 1006 at 4.
`
`23. Similarly, prior to 1999, Liquid Audio developed, licensed, and deployed
`
`software and systems for the sale, delivery, and playback of digital music.
`
`01980.00035/6761360.3
`
`
`7
`
`Google Exhibit 1002 Page 00007
`
`
`
`
`
`In October 1997, it published through its website a document entitled
`
`“Music on the Net,” which describes its platform for selling copy-protected
`
`files over the Internet. Ex. 1008 (Image of Liquidaudio.com cached October
`
`10, 1997; Linked “Music on the Net” Research Report) at 19. The document
`
`also describes competing services such as Cerberus and Eurodat, which also
`
`sold digital music in 1997. Id. The Eurodat service incorporated “an anti-
`
`piracy mechanism that ensures that downloaded music can only be played
`
`from the server it was encoded on.” Id.
`
`24. Liquid Audio extensively promoted its platform in 1998 through programs
`
`such as its Indie 1000 program, which provided artists with a turn-key
`
`solution for secure sales of digital content. Ex. 1009. This program
`
`emphasized the combination of anti-piracy measures with e-commerce
`
`functionality: “The Liquid Audio system combines sophisticated multi-layer
`
`encryption with inaudible digital watermarking technology to protect your
`
`intellectual property. This advanced system provides the most
`
`comprehensive, anti-copy and anti-piracy technology available today . . .
`
`When a music fan wants to buy your music they just click on ‘Buy
`
`Download’ in the Liquid MusicPlayer and enter the necessary payment
`
`information. You determine the price for the songs.” Id. at 2.
`
`01980.00035/6761360.3
`
`
`8
`
`Google Exhibit 1002 Page 00008
`
`
`
`
`
`25. The examples above show that the combination of e-commerce systems with
`
`anti-piracy measures was well-established both in theory and in commercial
`
`practice by October 25, 1999.
`
`IV. OVERVIEW OF THE ’516 PATENT
`26. The ’516 patent states that its alleged invention “relates to a portable data
`
`carrier for storing and paying for data and to computer systems for providing
`
`access to data to be stored.” Ex. 1001 at 1:23-26. The ’516 patent states that
`
`the alleged “invention is particularly useful for managing stored audio and
`
`video data, but may also be applied to storage and access of text and
`
`software, including games, as well as other types of data.” Id. at 1:28-31.
`
`The stated goal of the ’516 patent is to respond to the “urgent need to find a
`
`way to address the problem of data piracy.” Id. at 1:50-58.
`
`27. The ’516 patent describes the core of its supposed invention as “a method of
`
`providing portable data comprising providing a portable data storage device
`
`comprising downloaded data storage means and payment validation means;
`
`providing a terminal for Internet access; coupling the portable data storage
`
`device to the terminal; reading payment information from the payment
`
`validation means using the terminal; validating the payment information;
`
`and downloading data into the portable storage device from a data supplier.”
`
`Id. at 1:62-2:3.
`
`01980.00035/6761360.3
`
`
`9
`
`Google Exhibit 1002 Page 00009
`
`
`
`
`
`28. Data storage means and data encryption were conventional technologies as
`
`of October 1999. The ’516 patent provides various suggestions for the data
`
`storage means and the optional data encryption used in its system. Id. at
`
`2:43-3:48. The specification identifies FLASH RAM as a known example
`
`of data storage means; the specification identifies Pretty Good Privacy and
`
`PKI (Public Key Infrastructure) as known examples of data encryption. Id.
`
`29. The ’516 patent also describes a portable data carrier that could be integrated
`
`into mobile communications devices. Portable data carriers were also
`
`known and conventional hardware as of October 1999. The ’516 patent
`
`specification identifies a “standard smart card” as an example of known
`
`portable data carriers. Id. at 11:34-35.
`
`30. The ’516 patent also describes the use of rules to govern access to stored
`
`data. Id. at 5:4-12. The specification identifies known examples of such
`
`rules, including “specify[ing] . . . a predetermined number of accesses” and
`
`allowing “unlimited plays but only on specified players.” Id. at 23:41-50.
`
`31. The specification of the ’516 patent also discloses that the alleged invention
`
`uses e-payment systems known at the time of its filing, such as MONDEX,
`
`Proton, and Visa, for payment and payment verification functions. Id. at
`
`13:43-58.
`
`01980.00035/6761360.3
`
`
`10
`
`Google Exhibit 1002 Page 00010
`
`
`
`
`
`V. CLAIM CONSTRUCTION
`32. Counsel for the petitioner has informed me that terms in the challenged
`
`claims must be given their broadest reasonable construction in light of
`
`the ’516 patent’s specification, which means that the words of the claims
`
`should be given the broadest possible meaning that is consistent with the
`
`statements of the specification.
`
`“Payment Data” (Claims 1 and 3)
`
`33. The patent describes “payment data.” According to the specification,
`
`“payment data” can be used “for making a payment to the system owner” (Id.
`
`at 21:1-2) and “a payment” can be “represented by the payment data.” Id. at
`
`9:9-11. The specification also teaches that “payment data” can store “a
`
`payment audit trail including payment amounts and data on to whom
`
`payments have been made.” Id. at 17:60-62.
`
`34. The district court wrote in its claim construction order at page 11 that
`
`“payment data” means “data that can be used to make payment for content.”
`
`Ex. 1011 at 11.
`
`35. Counsel has informed me that the district court uses a narrower interpretive
`
`standard than the standard that applies to a CBM proceeding. The broadest
`
`reasonable interpretation of the term “payment data” would have been
`
`understood by a person of ordinary skill in the art to mean “any information
`
`01980.00035/6761360.3
`
`
`11
`
`Google Exhibit 1002 Page 00011
`
`
`
`
`
`that can be used in connection with the process of making a payment for
`
`content.”
`
`“Payment Validation System” (Claims 1 and 3)
`
`36. The patent describes “payment validation system.” According to the patent
`
`specification, the “payment validation system” is used “for validating the
`
`data and authorizing the payment” (Ex. 1001 at 8:26-28) as well as returning
`
`data such as “payment validation data.” Id. at 9:3-5, Claim 1 (“code to
`
`receive payment validation data . . . defining if said payment validation
`
`system has validated payment for said at least one selected item of
`
`multimedia content”). The patent also discloses that “[t]he payment
`
`validation system may be part of the data supplier’s computer systems or it
`
`may be a separate e-payment system.” Id. at 8:28-30.
`
`37. The patent owner wrote in its claim construction brief at page 7 that
`
`“payment validation system” was a “system that returns payment validation
`
`data in response to valid payment data.” Ex. 1012 at 7.
`
`38. The district court wrote in its claim construction order at page 14 that
`
`“payment validation system” is a “system that returns payment validation
`
`data based on an attempt to validate payment data.” Ex. 1011 at 14.
`
`Counsel for the petitioner has informed me that the district court uses a
`
`narrower interpretive standard than the standard that applies to a CBM
`
`01980.00035/6761360.3
`
`
`12
`
`Google Exhibit 1002 Page 00012
`
`
`
`
`
`proceeding. The broadest reasonable interpretation of the term “payment
`
`validation system” would have been understood by a person of ordinary skill
`
`in the art to mean “any system that returns information in connection with an
`
`attempt to validate payment data” (wherein “payment data” must be
`
`construed broadly to include “any information that can be used in connection
`
`with the process of making a payment for content”).
`
`“Payment Validation Data” (Claims 1, 3, 5, 10, 12, 18, 19, 21, and 24)
`
`39. The patent describes “payment validation data.” According to the patent,
`
`“payment validation data” is data that a data access terminal can receive
`
`from a “payment validation system” after “payment data” is forwarded to the
`
`“payment validation system.” Ex. 1001 at 8:7-13, 9:3-5, Claim 1.
`
`40. The district court wrote in its claim construction order at page 37 that
`
`“payment validation data” should be given its plain meaning. Ex. 1011 at 15,
`
`37.
`
`41. The patent owner wrote in its claim construction brief at page 10 that “none
`
`of the claims of the patents-in-suit require that the payment validation
`
`system be used to authorize payment.” Ex. 1012 at 10.
`
`42. Counsel for the petitioner has informed me that the district court uses a
`
`narrower interpretive standard than the standard that applies to a CBM
`
`proceeding. The broadest reasonable interpretation of the term “payment
`
`01980.00035/6761360.3
`
`
`13
`
`Google Exhibit 1002 Page 00013
`
`
`
`
`
`validation data” would have been understood by a person of ordinary skill in
`
`the art to mean “information returned in connection with an attempt to
`
`validate payment data” (wherein “payment data” must be construed broadly
`
`to include “any information that can be used in connection with the process
`
`of making a payment for content”).
`
`“Supplementary Data” (Claim 3)
`
`43. The patent describes a “supplementary data.” According to the patent,
`
`supplementary data can be advertising data, customer reward management
`
`data, and/or hot links to web sites. Ex. 1001 at Abstract, 5:53-60, 24:64-
`
`25:4. The ’516 patent also teaches that “supplementary data” may comprise
`
`“a pointer to an external data source from which data is downloaded either to
`
`the data carrier or to a data access device or content player, so that
`
`advertising or other data can be displayed when reviewing or accessing the
`
`stored content.” Id. at 5:56-60.
`
`44. The district court wrote in its claim construction order at pages 7-8 that
`
`“supplementary data” should mean “advertising data, customer reward
`
`management data, and/or hot links to web sites” and that “[t]he parties have
`
`agreed to th[at] construction . . . .” Ex. 1011 at 7-8.
`
`45. Counsel for the petitioner has informed me that the district court uses a
`
`narrower interpretive standard than the standard that applies to a CBM
`
`01980.00035/6761360.3
`
`
`14
`
`Google Exhibit 1002 Page 00014
`
`
`
`
`
`proceeding. The broadest reasonable interpretation of the term
`
`“supplementary data” would have been understood by a person of ordinary
`
`skill in the art to be data additional to content (which would include at least
`
`“hot links to websites, advertising data, customer reward management data,
`
`and pointers to external data sources from which data is downloaded”).
`
`“Program Store” (Claims 1, 3, 5, 10, 12, 21, and 24)
`
`46. The patent describes a “program store.” According to the patent, a “program
`
`store” stores code that is implementable by a processor. E.g., Ex. 1001,
`
`4:54-61, Claim 5 (“a program store storing code implementable by a
`
`processor”).
`
`47. The broadest reasonable interpretation of the term “program store” would
`
`have been understood by a person of ordinary skill in the art to mean “any
`
`generic component capable of storing programs.”
`
`“Access Rule” (Claims 12, 19, and 24)
`
`48. The patent describes the use of “use rules” and “access rules.” According to
`
`the specification, “[t]he carrier may . . . store . . . content use rules for
`
`controlling access to the stored content.” Ex. 1001 at Abstract. “Content
`
`access rules” may correspond to a “purchased level of service.” Id. at Fig.
`
`12e. The “use rule will normally be dependent upon payment value
`
`information embodied in the payment data read from the data carrier.” Id. at
`
`01980.00035/6761360.3
`
`
`15
`
`Google Exhibit 1002 Page 00015
`
`
`
`
`
`8:36-38. The “content use rules” may “pertain[] to allowed use of stored
`
`data items.” Id. at 5:4-5. The “use rules . . . determine whether access is
`
`permitted to the stored data.” Id. at 9:22-23. A use rule may be associated
`
`with “a large number of data items.” Id. at 7:39. The “use rules may be
`
`linked to payments made from the card to provide payment options such as
`
`access to buy content data outright; rental access to content data for a time
`
`period or for a specified number of access events; and/or rental/purchase, for
`
`example where rental use is provided together with an option to purchase
`
`content data at the reduced price after rental access has expired.” Id. at 5:1-
`
`12. “Content access rules” can “provide unlimited plays but only on
`
`specified players, for example set top boxes owned by a particular cable TV
`
`network.” Id. at 23:46-48. The use rules “may also comprise access control
`
`employing a user identification and password.” Id. at 9:30-31.
`
`49. The Board wrote in Apple Inc. v. Smartflash LLC, CBM2014-00104, Paper 9
`
`at 8 (Sept. 30, 2014) that “use rule” and “access rule” mean “a rule
`
`specifying a condition under which access to content is permitted.”
`
`50. Although my opinion is that the broadest reasonable interpretation of “use
`
`rule” and “access rule” is broader than the Board’s prior interpretation, I
`
`have adopted the interpretation of “access rule” previously set forth by the
`
`Board for purposes of arriving at the opinions set forth in this declaration.
`
`01980.00035/6761360.3
`
`
`16
`
`Google Exhibit 1002 Page 00016
`
`
`
`
`
`VI. PATENT ELIGIBLE SUBJECT MATTER
`51. Counsel for the petitioner has informed me that laws of nature, abstract ideas,
`
`and natural phenomena cannot be patented pursuant to 35 U.S.C. § 101.
`
`Counsel for the petitioner has informed me that the Supreme Court has
`
`endorsed a two-step approach for determining when a claim falls outside the
`
`scope of Section 101. Counsel for the petitioner has informed me that the
`
`first step is to determine whether the claim at issue is directed to a patent
`
`ineligible concept like an abstract idea. If it is, the second step is to identify
`
`“what else” is claimed so as to determine whether the claim amounts to
`
`“significantly more” than the abstract idea.
`
`52. Counsel for the petitioner has informed me that if a claim does not recite
`
`significantly more than an abstract idea, it is invalid under Section 101.
`
`Counsel for the petitioner has informed me that to constitute “significantly
`
`more,” it is not sufficient to simply apply the abstract idea with a computer.
`
`Counsel for the petitioner has informed me that neither is it sufficient to
`
`limit the claim to a particular technological environment or to add to the
`
`claim insignificant post solution activity or well-understood, routine,
`
`conventional activity. Counsel for the petitioner has informed that instead, a
`
`claim directed at an un-patentable abstract idea must contain other elements
`
`or a combination of elements (an “inventive concept”) sufficient to prevent
`
`01980.00035/6761360.3
`
`
`17
`
`Google Exhibit 1002 Page 00017
`
`
`
`patenting the abstract idea itself. Counsel has informed me that a claim
`
`directed at overriding a routine and conventional sequence of events may
`
`also be patent eligible.
`
`A.
`
`It Is My Opinion That Claims 1, 3, 5, 10, 12, 18, 19, 21, and 24 Are
`Directed To An Abstract Idea
`
`
`It is my opinion that claims 1, 3, 5, 10, 12, 18, 19, 21, and 24 of the ’516
`
`
`
`53.
`
`patent are directed to the abstract idea of controlling access to something
`
`based on one or more conditions (such as payment).
`
`54. Each of claims 1, 3, 5, 10, 12, 18, 19, 21, and 24 is expressly directed to that
`
`abstract idea. Claim 1 (upon which claim 3 depends) recites a generic
`
`“handheld multimedia terminal” with “code to control access permitting
`
`access to said at least one selected item of multimedia content.” Claim 5
`
`(upon which claims 10 and 12 depend) recites “code to receive payment
`
`validation data validating a user purchase of an item of multimedia content.”
`
`Similarly, claim 14 (upon which claims 18 and 19 depend) recites “receiving
`
`payment validation data validating a user purchase of an item of multimedia
`
`content.” Claim 21 (upon which claim 24 depends) recites “providing
`
`multimedia data items to a handheld multimedia terminal” based on
`
`“payment validation data.”
`
`01980.00035/6761360.3
`
`
`18
`
`Google Exhibit 1002 Page 00018
`
`
`
`
`
`55. The specification of the ’516 patent also teaches that the “invention” is
`
`directed to the same abstract idea. The specification states that the
`
`“invention” relates to “providing access” and “paying.” Ex. 1001 at 1:23-28.
`
`B.
`
`It Is My Opinion That Claims 1, 3, 5, 10, 12, 18, 19, 21, and 24 Do
`Not Disclose An Inventive Concept That Is Significantly More
`Than An Abstract Idea
`It is my opinion that none of the challenged claims adds anything of
`
`56.
`
`significance to the underlying abstract idea of controlling access to
`
`something based on one or more conditions (such as payment). The claims
`
`simply apply the abstract idea to “data” and recite generic computer
`
`components and functionality.
`
`57. The computer hardware recited in claims 1, 3, 5, 10, 12, 18, 19, 21, and 24
`
`—namely, “non-volatile memory,” “handheld multimedia terminal,” “user
`
`interface,” “communications interface,” “wireless interface,” “wireless
`
`network,” “program store,” “data store,” “display,” and “a processor coupled
`
`to” one or more of those components—is generic and conventional. Such
`
`hardware has long been routinely used in general purpose computers or itself
`
`is generic computer equipment. The ’516 patent confirms my opinion:
`
`“[t]he physical embodiment of the system is not critical and a skilled person
`
`will understand that the terminals, data processing systems and the like can
`
`all take a variety of forms.” Ex. 1001 at 12:37-40. The specification of the
`
`01980.00035/6761360.3
`
`
`19
`
`Google Exhibit 1002 Page 00019
`
`
`
`
`
`’516 patent recites that “the invention may be implemented using any
`
`electronic communications network, such as a wide area network, local area
`
`network, wireless network, or conventional land line network.” Id. at 25:53-
`
`56. According to the specification, “non-volatile memory” can comprise
`
`EEPROM and that the “permanent program memory” can comprise ROM,
`
`both generic and conventional components. Id. at 17:33-36.
`
`58. Alan Turing’s celebrated idealized computing automaton (now called a
`
`“Turing Machine” in his honor) was introduced in 1937 in the paper “On
`
`Computable Numbers, with an application to the Entscheidungsproblem”
`
`Ex. 1014 (Proceedings of the London Mathematical Society, vol s2-42, pp.
`
`230-265). On page 231, Turing notes “The machine is supplied a ‘tape’ (the
`
`analogue of paper) running through it, and divided into sections (called
`
`‘squares’) each capable of bearing a ‘symbol.’” Id. Turing’s “tape” serves
`
`as a data store. Id. A “data store” referenced in the ’516 patent specification
`
`and in the challenged claims (Ex. 1001 at 6:48, Claim 5) is a generic
`
`hardware device that was well known in the prior art to the ’516 patent.
`
`59. The “code” functions recited in each of claims 1, 3, 5, 10, 12, 18, 19, 21, and
`
`24 (namely requesting, receiving, presenting, transmitting, retrieving, and
`
`outputting) can be performed without a computer. Performing these
`
`functions with a computer is routine and conventional. Storing information
`
`01980.00035/6761360.3
`
`
`20
`
`Google Exhibit 1002 Page 00020
`
`
`
`
`
`in non-volatile memory, storing data on a standard memory device (or “data
`
`store”), requesting data identifying stored content, receiving data/content,
`
`presenting data to a user, receiving user selections for content, responding to
`
`user selections, responding to data, transmitting data, retrieving data,
`
`outputting data, receiving data over a wireless network, and controlling
`
`access to data/content are all generic, conventional, routine computer
`
`functions that were well known in the prior art to the ’516 patent.
`
`60. Reading and writing data in the context of computational machines dates
`
`back at least to Charles Babbage’s and Lady Augusta Ada Lovelace’s
`
`pioneering work on the “Analytical Engine” in the mid-1800s. Transmitting,
`
`receiving, and responding to data among a network of multiple computing
`
`devices dates back at least to the ARPANET project of the late 1960s.
`
`61. To be clear, claims 1, 3, 5, 10, 12, 18, 19, 21, and 24 of the ’516 patent do
`
`not recite the use of generic computer hardware and functions to override
`
`some routine or conventional sequence of events. Instead, claims 1, 3, 5, 10,
`
`12, 18, 19, 21, and 24 recite the use of a general purpose computer to
`
`perform routine, conventional, well-known computer functions.
`
`C.
`
`It Is My Opinion That Claims 1, 3, 5, 10, 12, 18, 19, 21, and 24 of
`The ’516 Patent Are Patent Ineligible
`In light of the above, it is my opinion that claims 1, 3, 5, 10, 12, 18, 19, 21,
`
`62.
`
`and 24 are not directed to patent eligible subject matter and are thus invalid.
`01980.00035/6761360.3
`21
`
`
`Google Exhibit 1002 Page 00021
`
`
`
`
`
`
`
`01980.00035/6761360.3
`
`
`22
`
`Google Exhibit 1002 Page 00022
`
`
`
` hereby declare that all statements made herein of my own knowledge are true and
`
` I
`
`that all statements made on information and belief are believed to be true; and
`
`further that these statements were made with the knowledge that willful false
`
`statements and the like so made are punishable by fine or imprisonment, or both,
`
`under Section 1001 of Title 18 of the United States Code.
`
`
`
`
`
`DATE:____________________
`
`
`DR. JUSTIN DOUGLAS TYGAR
`
`
`
`
`
`01980.00035/6761360.3
`
`
`23
`
`13 May 2015
`
`Google Exhibit 1002 Page 00023