throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`PETITION FOR INTER PARTES
`REVIEW PURSUANT TO 37
`C.F.R. § 42.100 ET SEQ.
`
`In re U.S. Patent No. 6,857,067
`
`Currently in Litigation Styled: Uniloc USA, Inc. and
`Uniloc Luxembourg S.A. v. Distinctive Developments,
`Inc., Case No. 6:12-cv-00462-LED
`
`Issued: February 15, 2005
`
`Filed: February 26, 2001
`
`Applicant: Martin S. Edelman
`
`Title: System and Method for Preventing
`Unauthorized Access to Electronic Data
`
`Mail Stop Inter Partes Review
`Commissioner for Patents
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW OF U.S. PATENT NO. 6,857,067
`
`
`
`
`
`
`
`

`

`Petition for Inter Partes Review of
`U.S. Patent No. 6,857,067
`
`I.
`
`INTRODUCTION
`
`Petitioners Distinctive Developments, Ltd., Electronic Arts Inc., Gameloft S.E., Halfbrick
`
`Studios Pty Ltd., Laminar Research LLC, Mojang AB and Square Enix, Inc. (collectively
`
`“Petitioners”) request an Inter Partes Review (“IPR”) of claims 1, 20-22, 30, 31, 35, 67, 107,
`
`and 108 (collectively, the “Challenged Claims”) of U.S. Patent No. 6,857,067 (the “’067 Patent”)
`
`issued on February 15, 2005 to Martin S. Edelman (“Applicant”). Exhibit 1001, ‘067Patent.
`
`The ‘067 Patent is generally directed to digital rights management (“DRM”) and
`
`describes a system for preventing unauthorized access to electronic data stored on an electronic
`
`device. Id. at Abstract. DRM technology has been available for decades to control access to
`
`copyrighted electronic data. The video game industry, for example, has made extensive use of
`
`DRM technology since at least the mid 1980’s in an effort to control illegal copying and
`
`distribution of video games. Early examples of DRM in the video game space include: physical
`
`protection appearing on floppy disks, compact discs, and game cartridges, and requiring users to
`
`register games online via a server. As such, by the early 2000’s—the timeframe from which the
`
`‘067 Patent emerged—the DRM space was well developed. See e.g., Exhibit 1008, Expert
`
`Declaration of Dr. Justin Douglas Tygar (“Tygar Declaration”) at ¶¶ 20-23.
`
`Numerous references were not considered by or presented to the Patent Office during the
`
`prosecution of the ‘067 Patent. For instance, U.S. Patent No. 7,032,240 to Cronce, et al.
`
`(“Cronce”) discloses a removable, portable authorization device for authorizing an electronic
`
`device to use protected information. Exhibit 1002, Cronce at Abstract, 1:15-19, 3:44-55 and Fig.
`
`1. Cronce further details the exact communications between a licensing medium, an electronic
`
`device and a registration authority as described in claims 1, 35, 67, 107, and 108. This Petition
`
`demonstrates that Cronce—and several other prior art references—anticipate and/or render
`
`1
`
`

`

`
`obvious claims 1, 20-22, 30, 31, 35, 67, 107, and 108 of the ‘067 Patent; accordingly, they are
`
`Petition for Inter Partes Review of
`U.S. Patent No. 6,857,067
`
`invalid.
`
`II.
`
`REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R.
`§ 42.104
`
`Pursuant to 37 C.F.R. § 42.104, each requirement for IPR of the ’067 Patent is satisfied.
`
`A.
`
`Grounds for Standing Under 37 C.F.R. § 42.104(a)
`
`Petitioners certify that the ’067 Patent is available for IPR and that the Petitioner is not
`
`barred or estopped from requesting IPR challenging the claims of the ’067 Patent. Specifically,
`
`Petitioners state: (1) Petitioners are not the owner of the ’067 Patent; (2) Petitioners have not
`
`filed a civil action challenging the validity of any claim of the ’067 Patent; (3) this Petition is
`
`filed less than one year after the Petitioners were served with a complaint alleging infringement
`
`of the ’067 Patent; and (4) this Petition is filed more than nine months after the ‘067 Patent
`
`issued and the ‘067 Patent was not the subject of a post-grant review.
`
`B.
`
`Identification of Challenge Under 37 C.F.R. § 42.104(b) and
`Relief Requested
`
`In view of the prior art, evidence, and claims charts, claims 1, 20-22, 30, 31, 35, 67, 107,
`
`and 108 of the ’067 Patent are unpatentable and should be cancelled. 37 C.F.R. § 42.104(b)(1).
`
`1.
`
`The Grounds For Challenge
`
`Based on the prior art references identified below, IPR of the Challenged Claims should
`
`be granted. 37 C.F.R. § 42.104(b)(2).
`
`Proposed Statutory Rejections
`for the ‘067 Patent
`Claims 1, 20, 31, 35, 67, 107, and 108 are anticipated under §
`102(e) by U.S. Patent No. 7,032,240 to Cronce et al. (“Cronce”),
`entitled “Portable Authorization Device for Authorizing Use of
`Protected Information and Associated Method,” filed on February
`14, 2000, and issued on April 18, 2006.
`Claims 1, 20, 31, 67, and 107 are anticipated under § 102(b) by
`U.S. Patent No. 5,910,987 to Ginter et al. (“Ginter”) entitled
`
`Reference
`Exhibit No.
`1002
`
`1003
`
`
`
`
`2
`
`

`

`Petition for Inter Partes Review of
`U.S. Patent No. 6,857,067
`
`Proposed Statutory Rejections
`for the ‘067 Patent
`“Systems and Methods for Secure Transaction Management and
`Electronic Rights Protection,” filed on December 4, 2006, and
`issued on June 8, 1999.
`Claims 1, 20-22, 30, 31, 67, 107, and 108 are anticipated under §
`102 (b) by U.S. Patent No. 6,008,737 to Deluca, et al. (“Deluca”),
`entitled “Apparatus for Controlling Utilization of Software Added
`to a Portable Communication Device,” filed on June 24, 1996, and
`issued on December 28, 1999.
`Claims 1, 67, 107, and 108 are obvious under § 103(a) over U.S.
`Patent No. 7,036,011 to Grimes, et al. (“Grimes”), entitled “Digital
`Rights Management,” filed on June 29, 2001 and issued on April
`25, 2006 and claiming priority to U.S. Prov. Appln. No. 60/214,726
`filed on June 29, 2000, in view of Cronce.
`
`Reference
`Exhibit No.
`
`1004
`
`1002 and
`1005
`
`
`
`
`In Section IV below, Petitioners identify where each element of the Challenged Claims is found
`
`in the prior art patents. 37 C.F.R. § 42.104(b)(4). The exhibit numbers of the supporting
`
`evidence relied upon to support the challenges are provided above and the relevance of the
`
`evidence to the challenges raised are provided in Section IV. 37 C.F.R. § 42.104(b)(5).
`
`Exhibits 1001 – 1005 are also attached.
`
`2.
`
`Construction of the Challenged Claims Under 37 C.F.R.
`§ 42.104(b)(3)
`
`A claim subject to IPR receives the “broadest reasonable construction in light of the
`
`specification of the patent in which it appears.” 37 C.F.R. § 42.100(b). Unless otherwise noted,
`
`Petitioners propose, for purposes of IPR only, that the claim terms of the ‘067 Patent are
`
`presumed to take on their ordinary and customary meaning that the term would have to one of
`
`ordinary skill in the art.1 However, Petitioners propose the following function and structure for
`
`
`1 It should be noted that, while Petitioners believe the interpretation reflected below is accurate for purposes of IPR,
`Petitioners are applying the “broadest reasonable construction” of the claims for purposes of IPR only, and the
`analysis is not, and should not be viewed as, a concession by Petitioners as to the proper scope of any claim term in
`any litigation. These assumptions are not a waiver of any argument in any litigation that claim terms in the ‘067
`Patent are indefinite or otherwise invalid.
`
`
`
`
`3
`
`

`

`
`the “means-plus-function” limitations of claim 35 of the ‘067 Patent based upon 35 U.S.C. § 112
`
`Petition for Inter Partes Review of
`U.S. Patent No. 6,857,067
`
`¶ 6:
`
`Term
`
`Function(s)
`
`Structure2
`
`data
`“license
`storage means”
`“registration
`authorization
`means”
`“verification
`means”
`
`Storing license data, communicating with an
`electronic device.
`Communicating with the electronic device,
`providing updated license data to the license
`data storage means.
`Verifying license data stored on the licensing
`medium.
`
`
`
`Structures described in the specification at
`7:13-32, and equivalents thereof.
`Structures described in the specification at
`7:62-66, and equivalents thereof.
`
`Structures described in the specification at
`4:10-26,
`4:37-39,
`and
`11:63-12:4,
`and
`equivalents thereof.
`
`3.
`
`Level of a Person Having Ordinary Skill in the Art
`
`A person having ordinary skill in the art at the time of the ‘067 Patent would have a B.S.
`
`in computer science or related engineering discipline or equivalent experience and at least two
`
`years in the software development industry or equivalent experience or education. The person
`
`would also have some knowledge of data encryption/decryption techniques, networking of
`
`computers, databases, programming of microprocessors/microcontrollers, and digital rights
`
`management systems and their implementation. See, Exhibit 1008, Tygar Declaration at ¶ 19.
`
`III.
`
`SUMMARY OF THE ‘067 PATENT
`
`A.
`
`Description of the Alleged Invention of the ‘067 Patent
`
`The ‘067 Patent describes a method and system for preventing unauthorized access to
`
`electronic data “such as for example computer software, music, movies, e-books, and the like.”
`
`Exhibit 1001, ‘067 Patent at 1:10-14. The system of the ‘067 Patent is based on the use of a
`
`smartcard or other removable storage medium as a portable licensing medium. Id. at 7:13-18.
`
`Repeated references reinforce that the ‘067 DRM system is premised on a removable licensing
`
`2 Though Petitioners cannot challenge claims on the basis of 35 U.S.C. § 112 in an IPR setting, Petitioners
`respectfully note that the written description contains no adequate disclosure for any of the means-plus-function
`limitations. Thus, Petitioners are left to guess as to what structures are included in the “means for” limitations. As
`noted above, however, Petitioners assume for purposes of applying the “broadest reasonable construction” in this
`IPR context only that the claim is adequately supported.
`
`
`
`4
`
`

`

`
`medium, e.g., a smartcard-based system. See, e.g., id. at 4:43-53, 7:13-18 7:33-37, Figs. 1, 2, 4
`
`Petition for Inter Partes Review of
`U.S. Patent No. 6,857,067
`
`and 5. Fig. 1 represents the system of the ‘067 Patent with a removable smartcard licensing
`
`medium represented as 120:
`
`
`
`The independent claims challenged in this IPR generally require four essential elements.
`
`First, the removable memory stores license data and can communicate with an electronic device,
`
`such as a computer. Id. at 3:61-65, 7:48-55. Second, the electronic device determines whether
`
`to allow access to electronic data contained on the electronic device based on the license data on
`
`the removable memory. Id. at 3:63-67, 7:48-55. Third, the license data stored on the removable
`
`memory is verified by communicating with a registration authority. Id. at 3:67-4:3, 8:5-7.
`
`Finally, the license data on the removable memory is updated based on information received
`
`from the registration authority. Id. at 4:3-4, 8:7-9. In effect, the removable memory holds
`
`license data to access electronic content on a computer, and the license data can be verified and
`
`updated through communication with a registration authority. The removable memory can be
`
`used on multiple electronic devices. Id. at 16:30-34, 16:40-45. This type of DRM system was
`
`well known before the filing date of the ‘067 Patent.
`
`
`
`
`5
`
`

`

`
`
`B.
`
`Summary of the Prosecution History of the ‘067 Patent
`
`The ‘067 Patent was filed on February 6, 20013, and as-filed, the application included
`
`Petition for Inter Partes Review of
`U.S. Patent No. 6,857,067
`
`110 initial claims, which increased to 113 claims through a preliminary amendment. See Exhibit
`
`1007, ‘067 File History at As-Filed Application and March 5, 2003 Preliminary Amendment.
`
`On July 25, 2004, the USPTO mailed a first action Notice of Allowance and the patent issued on
`
`February 15, 2005 with 113 claims. The Notice of Allowance summarily states the following
`
`reasons for allowance:
`
`Applicant has claimed uniquely distinct features in the instant invention
`which are not found in the prior art either singularly or in combination. In
`the Examiner’s opinion, it would not have been obvious to a person of
`ordinary skill in the art to disclose:
`
`[listing of various claim limitations]
`
`These features are not found or suggested in the prior art.
`
`
`Id. at July 25, 2004 Notice of Allowance. However, the purportedly novel claims are clearly
`
`described in multiple prior art references that were not considered by the Examiner.
`
`IV.
`
`THERE IS A REASONABLE LIKELIHOOD THAT THE
`CHALLENGED CLAIMS OF THE ‘067 PATENT ARE
`UNPATENTABLE
`
`Software protection systems were prevalent well before the earliest possible priority date
`
`of the ‘067 Patent (i.e., February 26, 2001). The following prior art references disclose each
`
`limitation of the Challenged Claims. As such, these claims are unpatentable.
`
`
`
`Included in the claim charts below are exemplary citations to the prior art references.
`
`These citations are exemplary only, and are not intended to be a complete list of potentially
`
`relevant prior art teachings. For instance, the Panel might find other, non-cited, portions of these
`
`
`3 The Patent Owner has admitted that the earliest priority date for the patent is February 26, 2001, the filing date of
`the application. See Exhibit 1006, Plaintiff’s Disclosures Pursuant to Local Patent Rules 3-1 and 3-2, at 3 in Uniloc
`v. Distinctive Developments, Inc., 6:12-cv-462 (E.D. Tex.).
`
`6
`
`
`

`

`
`references useful in evaluating the claims and responding to any arguments advanced by Patent
`
`Petition for Inter Partes Review of
`U.S. Patent No. 6,857,067
`
`Owner. Further, to the extent the Patent Owner contends certain concepts are missing from the
`
`prior art, Petitioners may identify portions of prior art references, in addition to the citations
`
`below, to provide a full context for the patentability analysis.
`
`1.
`
`Cronce Anticipates Claims 1, 20, 31, 35, 67, 107, and 108
`Under 35 U.S.C. § 102(e)
`
`Cronce was not cited or considered during prosecution of the ‘067 Patent. Cronce
`
`discloses a portable, removable memory for storing license data that is configured to
`
`communicate with a host system. Exhibit 1002, at 4:56-64; 5:17-21; Fig. 1. Access to electronic
`
`data on the host system is determined based on the authorization data stored on the portable
`
`memory. Id. at 3:56-59; 8:3-12; Figs. 2, 10. The authorization data on the portable memory is
`
`verified and updated through communicating with an information authority over a network. Id.
`
`at 5:35-5:37; 6:10-16. As shown below, Cronce discloses every limitation of claims 1, 20, 31,
`
`35, 67, 107, and 108. Thus, there is a reasonable likelihood that Petitioners will prevail with
`
`respect to claims 1, 20, 31, 35, 67, 107, and 108, and these claims should be reviewed, rejected
`
`under § 102(e) as being anticipated by Cronce, and cancelled.
`
`Claim 1
`1. A system for
`preventing
`unauthorized access
`to electronic data
`on an electronic
`device, the system
`comprising:
`
`
`Anticipated By Cronce (Ex. 1002)
`Cronce discloses “[a]n authorization system and associated method for
`selectively authorizing a host system to use one or more items of protected
`information associated with the host system. The authorization system
`includes a portable authorization device that is removably couplable to the
`host system. The portable authorization device is capable of receiving and
`storing multiple items of authorization information associated with a
`plurality of respective items of protected information from one or more
`information authorities. Preferably, the portable authorization device is
`capable of communicating with multiple types of information authorities.
`The portable authorization device selectively authorizes the host system to
`use the one or more respective items of protected information based upon
`the respective authorization information stored therein.” Exhibit 1002,
`
`Cronce at Abstract (emphasis added).    
`  
`
`
`
`
`7
`
`

`

`Petition for Inter Partes Review of
`U.S. Patent No. 6,857,067
`
`The host system is an electronic device such as a personal computer
`storing protected information such as software. See, id. at 5:12-16. The
`host system executes access control programs to prevent unauthorized
`access to the protected information. See, id. at 4:48-5:11.
`Cronce discloses a portable authorization device for storing license data.
`Fig. 1 of Cronce shows the removable, portable authorization device 140
`that is similar to the removable, portable licensing medium described by
`the ‘067 Patent. Compare ‘067 Patent at Fig. 1 (reference numeral 120)
`with Cronce at Fig. 1 (reference numeral 140).
`
`
`[1(a)] a portable
`licensing medium
`configured to
`communicate with
`the electronic
`device and to store
`license data,
`
`
`
`
`Cronce at Fig. 1.
`
`Cronce’s portable authorization device stores authorization information
`for accessing protected information on the host system. In one
`embodiment, the host system 110 receives authorization data from an
`information authority 185 and causes the authorization data to be stored on
`the portable authorization device 140.
`
`
`“The portable authorization device 140 of the authorization system
`100 is a relatively small and simple ‘dongle-like’ device that stores
`one or more items of authorization information 171 for authorizing
`the host system 110 to use the respective items of protected
`information 115. The portable authorization device 140 includes a
`microprocessor or dedicated logic for performing secure transactions
`with the host system 110 and a memory for storing the authorization
`information 171.” Id. at 5:17-25 (emphasis added).
`
`“The networked indirect information authority 185 is connected to a
`network 187, such as the Internet, and communicates with the
`portable authorization device 140 via the network 187, the host
`system 110 and the host sytem interface circuit 145.” Id. at 7:43-47.
`
`“The authorization process involves two basic steps. First, the
`information authority 160/180/185
`transfers
`the authorization
`
`8
`
`
`
`
`
`
`

`

`
`
`
`
`
`[1(b)] the license
`data configured to
`be used by the
`electronic device to
`determine whether
`to allow access to
`the electronic data;
`and
`
`
`
`[1(c)] a registration
`authority
`configured
`
`to
`
`Petition for Inter Partes Review of
`U.S. Patent No. 6,857,067
`
`information 171 to the portable authorization device 140 for storage
`therein (step 210).” Id. at 8:13-16.
`
`
`The host system communicates with the portable authorization device via
`a communicatons port.
`
`“Like a conventional dongle, the portable authorization device 140 is
`readily transportable and can be used with a number of different host
`systems. To use the portable authorization device 140 with a host
`system 110, the end-user may simply connect the device to a
`communications port of the host system such as a parallel port or
`USB port.” Id. at 5:25-31.
`
`
`See also id. at 3:44-55; 5:17-34.
`Authorization software on the host system determines whether to permit
`access to protected information based on the authorization information
`stored on the portable authorization device.
`
`“FIG. 2 illustrates the overall process employed by the authorization
`system 100 in a presently preferred embodiment of the invention to
`selectively authorize the host system 10 to use an item of protected
`information 115 associated with the host system.” Id. at 8:3-7
`(emphasis added).
`
`
`
`
`
`“Second, the portable authorization device 140 authorizes the host
`system 110 to use the item of protected information 115 (step 210).”
`Id. at 8:22-24.
`
`invention
`the present
`“The portable authorization device of
`selectively authorizes the host system to use the one or more
`respective items of protected information based upon the respective
`authorization information stored therein.” Id. at 3:56-59.
`
`
`See also id. at 4:65-5:11; 18:24-20:9; Fig. 10.
`The host system verifies the authorization information stored on the
`portable authorization device by communicating with an information
`authority.
`
`9
`
`

`

`Petition for Inter Partes Review of
`U.S. Patent No. 6,857,067
`
`“The information authorities 160, 180 and 185 provide respective
`authorization information 171 for transmission to the portable
`authorization device 140 to authorize use of the items of protected
`information.” Id. at 5:55-59.
`
`
`
`
`
`communicate with
`the
`electronic
`device,
`the
`registration
`having
`authority
`verification data for
`verifying
`the
`license data stored
`on
`the
`licensing
`medium,
`
`
`“The authorization system 100 may support multiple types of
`information authorities. The
`types of
`information authorities
`supported may include a physical direct information authority 160, a
`physical indirect information authority 180 and a networked indirect
`information authority 185. The multiple types of information
`authorities 160, 180 and 185 each communicate with the portable
`authorization device 140 in a different manner, as explained below.”
`Id. at 6:17-24.
`
`
`Specifically, the authorization software on the host system controls the
`communications between the information authorities and the portable
`authorization device.
`
`“The access control programs 117, in conjunction with the host
`system 110, are also used to control communications between the
`indirect information authorities 180 and 185 and the host system
`110.” Id. at 5:4-8.
`
`“The access control programs 117 of the host system 110 may be
`used to control which of the information authorities 160, 180 and
`185 are permitted to communicate with the portable authorization
`device 140.” Id. at 6:32-35.
`
`See also, id. at 7:43-47; Fig. 1.
`
`The information authority has identification information used to uniquely
`identify an item of protected information and verify the authorization
`information stored on the portable authorization device. Specifically, the
`host system receives the identification information corresponding to a
`specific item of protected information from the information authority. The
`received identification information is compared to the identification
`information associated with the authorization information stored in the
`portable authorization device.
`
`
`“[T]he portable authorization device 140 optionally verifies that it is
`authorized to receive the dynamic key selector 171 from the
`information authority 160/180/185 (step 214). During this step, the
`information
`authority
`160/180/185
`transmits
`identification
`information (not shown) associated with the dynamic key selector
`171 to the portable authorization device 140. In a preferred
`embodiment of the invention, the identification information is a
`
`10
`
`
`
`
`
`
`

`

`[1(d)] wherein the
`registration
`authority provides
`updated
`license
`for
`data
`the
`licensing medium.
`
`
`
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 6,857,067
`
`number used to uniquely identify the item of protected information
`115 authorized by the dynamic key selector 171. In this embodiment,
`the fixed key ID 151 stored in the storage medium 144 is used to
`identify
`the portable authorization device 140. The portable
`authorization device 140 then determines, based on a comparison of
`the identification information with the fixed key ID 151, whether the
`item of protected information 115 identified by the identification
`information is authorized for use with the portable authorization
`device. Depending on the outcome of this determination, the portable
`authorization device 140 then authorizes or declines receipt of the
`dynamic key selector 171.” Id. at 15:39-58 (emphasis added).
`
`See also id. at Figs. 9, 10.
`
`This verification process described by Cronce is analogous to the
`verification process described in the ‘067 patent where license data is
`verified by comparing the license data stored on the portable licensing
`medium with the licensing data received from a registration authority.
`See, ‘067 patent at 4:10-26.
`
`In the embodiment where the networked indirect information authority
`185 is used, the host system provides updated authorization information to
`the portable authorization device based on information received from the
`information authority.
`
`
`“Furthermore, the portable authorization device 140 can be updated
`with new authorization information 171 from information authorities
`160/180/185, as explained below. An advantage provided by this
`feature is that it is relatively inexpensive for a software vendor to
`authorize the use of a new version of software. The vendor can
`update
`the portable authorization device 140 with
`the new
`authorization information by providing a relatively simple and
`inexpensive information authority, rather than a dongle, to the end-
`user.” Cronce at 5:35-43 (emphasis added).
`
`
`“The information authorities 160, 180 and 185 are trusted devices for
`transmitting and receiving information, such as messages, from the
`portable authorization device 140. The information authorities 160,
`180 and 185 provide respective authorization information 171 for
`transmission to the portable authorization device 140 to authorize the
`use of the items of protected information 115. In a presently
`preferred embodiment, the information authorities 160, 180 and 185
`comprise message authorities for
`transmitting and receiving
`messages from
`the portable authorization device 140. The
`information authorities 160, 180 and 185 may be used, for example,
`by software vendors as a means to deliver software, upgrades,
`to end-users.” Id. at 5:53-65
`authorization
`information, etc.
`
`11
`
`

`

`Claim 20
`20. A system
`according to claim 1,
`wherein the licensing
`medium is a random
`access memory.
`
`Claim 31
`31. A system
`according to claim 1,
`wherein the licensing
`medium is configured
`to communicate with
`the electronic device
`through a wired
`connection.
`
`
`
`
`
`
`
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 6,857,067
`
`
`
`(emphasis added).
`
`“The networked indirect information authority 185 is connected to a
`network 187, such as the Internet, and communicates with the
`portable authorization device 140 via the network 187, the host
`system 110 and the host sytem interface circuit 145.” Id. at 7:43-47.
`
`Anticipated By Cronce (Ex. 1002)
`As show above, Cronce anticipates claim 1. See, Cronce applied to
`Claim 1. Cronce also discloses that the portable authorization device
`includes a random access memory 143.
`
`
`“The portable authorization device 140 includes a processing unit
`141, a storage medium 144, the host system interface circuit 145
`and the direct information authority interface circuit 147. In this
`embodiment, the processing unit 141 comprises a microcontroller
`including a program ROM 142 and a program/data RAM 143.” Id.
`at 8:48-53 (emphasis added).
`
`See also, id. at Fig. 3.
`
`Anticipated By Cronce (Ex. 1002)
`As show above, Cronce anticipates claim 1. See, Cronce applied to
`Claim 1. Cronce also discloses that the portable authorization device is
`configured to communicate with the host system via a wired USB or
`parallel port connection.
`
`
`“Like a conventional dongle, the portable authorization device 140
`is readily transportable and can be used with a number of different
`host systems. To use the portable authorization device 140 with a
`host system 110, the end-user may simply connect the device to a
`communications port of the host system such as a parallel port or
`USB port.” Id. at 5:25-31.
`
`“The host system interface 281 provides a communications
`protocol for the portable authorization device 140 to communicate
`with the host system 110. . . . Information is transmitted between
`the portable authorization device 140 and the host system 110 via
`the host system interface circuit 145. In a preferred embodiment of
`the invention that uses a USB port, the host system interface 281
`communicates with
`the host system 110 using a USB
`communications protocol.” Id. at 9:25-39.
`
`12
`
`

`

`Claim 35
`35. A system for
`preventing
`unauthorized access
`to electronic data on
`an electronic device,
`the system
`comprising:
`[35(a)] license data
`storage means
`configured to
`communicate with
`the electronic device,
`
`
`[35(b)] the license
`data configured to be
`used by the electronic
`device to determine
`whether to allow
`access to the
`electronic data; and
`[35(c)]
`registration
`authorization means
`configured
`to
`
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 6,857,067
`
`Anticipated By Cronce (Ex. 1002)
`As described above with regard to independent claim 1, Cronce
`discloses this limitation. See, Cronce applied to Claim 1 at Preamble.
`
`
`The ‘067 Patent discloses that the “licensing medium 120 may be any
`type of portable electronic data storage medium that has a unique,
`unalterable serial number or other form of identification . . . .” ‘067
`Patent at 7:13-15. Cronce discloses that the portable authorization
`device is a USB/parallel port computer storage device with a unique
`serial number.
`
`
`“Like a conventional dongle, the portable authorization device 140
`is readily transportable and can be used with a number of different
`host systems. To use the portable authorization device 140 with a
`host system 110, the end-user may simply connect the device to a
`communications port of the host system such as a parallel port or
`USB port.” Cronce at 5:25-31.
`
`“The fixed user data 153 is used to store alphanumeric strings or
`other data not related to the authorization function of the portable
`authorization device 140. The fixed user data 153 may include a
`manufacturing secret key which identifies the particular product
`type of the portable authorization device 140 and a serial number
`that uniquely identifies the individual portable authorization
`device.” Id. at 11:32-39 (emphasis added).
`
`See also, id. at 9:25-39; Fig. 3.
`
`As described above with regard to independent claim 1, Cronce
`discloses that the portable authorization device is configured to
`communicate with the host system. See, Cronce applied to Claim 1 at
`1(a).
`As described above with regard to independent claim 1, Cronce
`discloses this limitation. See, Cronce applied to Claim 1 at 1(b).
`
`
`The ‘067 Patent discloses that “[t]he registration authority 110 is a
`remote server that maintains a licensing database containing information
`for all of the licensing media 120 authorized by the software protection
`
`13
`
`

`

`Petition for Inter Partes Review of
`U.S. Patent No. 6,857,067
`
`administrator and all of the software licenses authorized by the software
`vendors 130.” ‘067 Patent at 7:62-66. As shown in the figure below,
`Cronce discloses a networked indirect information authority 185, which
`is a remote server configured to communicate with the host system 110:
`
`communicate with
`the electronic device,
`the
`registration
`authorization means
`having
`verification
`means for verifying
`the
`license
`data
`stored
`on
`the
`licensing medium,
`
`
`
`
`Cronce at Fig. 1.
`
`The information authority server 185 is used by the protected
`information vendor to maintain authorization data for all of the portable
`authorization devices.
`
`
`“The networked indirect information authority 185 can be a
`system, such as a computer server, that stores authorization
`information 171 and other data associated with one or more items
`of protected information 115. Unlike conventional networked
`schemes, however, the networked indirect information authority
`185 transmits the authorization information 171 to the portable
`authorization device 140, rather than to the host system 110, for
`storage. The networked indirect information authority 185 is
`connected
`to a network 187, such as
`the Internet, and
`communicates with the portable authorization device 140 via the
`network 187, the host system 110 and the host system interface
`circuit 145. The networked indirect information authority 185 is
`typically operated by the vendor of the item of protected
`information 115.” Id. at 7:36-50 (emphasis added).
`
`“[T]he portable authorization device 140 optionally verifies that it
`is authorized to receive the dynamic key selector 171 from the
`information authority 160/180/185 (step 214). During this step, the
`information
`authority 160/180/185
`transmits
`identification
`information (not shown) associated with the dynamic key selector
`171 to the portable authorization device 140. In a preferred
`embodiment of the invention, the identification information is a
`number used

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket