throbber

`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`COMPASS BANK,
`COMMERCE BANCSHARES, INC. and
`FIRST NATIONAL BANK OF OMAHA
`Petitioners,
`
`v.
`
`INTELLECTUAL VENTURES II LLC
`
`Patent Owner.
`
`
`
`
`
`
`
`IPR2014-00724
`U.S. Patent 5,745,574
`
`
`
`
`
`
`
`
`
`
`
`
`
`DECLARATION OF SEAD MUFTIC
`
`
`
`Intellectual Ventures Ex. 2010
`Compass v. IV
`IPR2014-00724
`
`

`

`I, Sead Muftic, do declare as follows:
`
`1.
`
`I have personal knowledge of the matters set forth herein, and if I am
`
`called upon to testify, I could testify competently thereto.
`
`2.
`
`I understand that an inter partes review of claims 18-31 of U.S. Patent
`
`No. 5,745,574 (“the ’574 patent”) has been instituted in IPR2014-00724. I
`
`understand that one of the grounds for invalidity which is being considered is as
`
`follows:
`
`
`Whether claims 18-31 are anticipated under 35 U.S.C. § 102(a)
`by Nada Kapidzic & Alan Davidson, “A Certificate Management
`System: Structure, Functions and Protocols” Proceedings, IEEE
`Symposium on Network and Distributed System Security, Feb. 16-17,
`1995, at 153-160 (“Kapidzic” or “the Kapidzic article”).
`
`3.
`
`I do not have any current financial interest in the ’574 patent. I am
`
`not employed by the current assignee of the ’574 patent. Although I am being
`
`compensated for my time in preparing this declaration, my compensation is not
`
`dependent on the outcome of this IPR or upon the outcome of the pending
`
`litigation between the parties of the IPR.
`
`PERSONAL BACKGROUND
`
`I am the sole inventor of the ’574 patent.
`
`I obtained my M.Sc. and Ph.D. degrees in Computer Science in the
`
`4.
`
`5.
`
`field of computer security from the Ohio State University in 1974 and 1976,
`
`respectively.
`
`1
`
`

`

`6.
`
`Since obtaining my Ph.D., I have held numerous positions in the field
`
`of computer security in both industry and academia.
`
`7.
`
`At the time of filing the ’574 patent, I was a Professor of Computer
`
`and Networks Security at Stockholm University, Sweden. I held this position from
`
`1991 to 2002.
`
`8.
`
`At the time of filing the ’574 patent, I was also the CEO of COST
`
`Computer Security Technologies AB (Stockholm, Sweden), which position I held
`
`from 1992 to 1995.
`
`9. My full background is summarized in my curriculum vitae, a copy of
`
`which is provided as Exhibit 2008.
`
`DERIVATION OF THE CONCEPTS CLAIMED IN THE ’574 PATENT
`
`10.
`
`11.
`
`12.
`
`I have reviewed claims 18-31 of the ’574 patent.
`
`I have also reviewed the Kapidzic article.
`
`I do not believe that Kapidzic discloses any of claims 18-31 of the
`
`’574 patent.
`
`13. However, to the extent that Kapidzic discloses any concepts of
`
`portions of claims 18-31 of the ’574 patent, these concepts were derived from me,
`
`and I am the sole inventor of those concepts.
`
`14. The authors of the Kapidzic article, Nada Kapidzic and Alan
`
`Davidson, were my graduate students, and they prepared the Kapidzic article under
`
`my direction and supervision and using my direct contributions.
`
`2
`
`

`

`15. Beginning in about 1992, I became a Ph.D. advisor for Nada
`
`Kapidzic. I was Nada Kapidzic’s Ph.D. advisor from about 1992 to 1997.
`
`16. Also beginning in about 1992, I became a Licentiate advisor for Alan
`
`Davidson. In Sweden, the Licentiate degree is a higher degree than a Masters
`
`degree but a lower degree than the Ph.D. degree. I was Alan Davidson’s Licentiate
`
`advisor from about 1992 until sometime after the publication of the Kapidzic
`
`article.
`
`17.
`
`I conceived of the concepts claimed in claims 18-31 of the ’574 patent
`
`prior to the publication of Kapidzic.
`
`18.
`
`I had been researching in the field of computer security ever since
`
`obtaining my Ph.D. in 1976.
`
`19.
`
`I was researching in the field of public key certification at least as
`
`early as 1994. Some of this research is documented in “The Structure and
`
`Functioning of the COST Privacy Enhanced Mail (PEM) System,” published as
`
`part of the Proceedings of the IFIP SEC 1994 conference in Cura!ao (“the Cura!ao
`
`article”), provided as Exhibit 2009.
`
`20. The Cura!ao article is coauthored by myself as the first-named author,
`
`along with Nada Kapidzic and Alan Davidson, the listed authors of the Kapidzic
`
`article, who I added as coauthors only for the benefit of having the reference of
`
`participating in my research.
`
`21.
`
`I developed improvements on features described in the Cura!ao
`
`article. Some of those improvements are described in another paper co-authored
`
`by Nada Kapidzic (the first-named author) and me, entitled “COST-PEM
`
`3
`
`

`

`Certificates Verification: an Alternative Procedure,” (“the COST-PEM article”) a
`
`copy of which is provided as Exhibit 2007.
`
`22. The COST-PEM article is also referred to in the Kapidzic article,
`
`which states that “[a]n alternative procedure has been suggested by Kapidzic and
`
`Muftic [6], though this is not adopted in this version of the CMS [Certificate
`
`Management System].” Exhibit 1004 at §§ 6, 9 (citing to Reference [6], which is
`
`the COST-PEM article).
`
`23. Several portions of the Kapidzic article are also referenced in Nada
`
`Kapidzic’s dissertation, completed in 1997, attached as Exhibit 2011.
`
`24.
`
`I understand that Nada Kapidzic has stated that she and Alan
`
`Davidson contributed to the concepts of the Kapidzic article. Exhibit 2011 at 1-4,
`
`25-41. However, as discussed below in paragraphs 25 through 33, I disagree.
`
`25.
`
`I conceived of all the concepts described in the Kapidzic article,
`
`including at least the concepts described in sections 2 through 8 of Kapidzic.
`
`26.
`
`I explained all the details of these concepts to Nada Kapidzic, who
`
`wrote about them in the Kapidzic article under my direction and supervision.
`
`27. Under my direction and supervision, Alan Davidson wrote a
`
`demo/prototype computer program implementation of the system described in the
`
`Kapidzic article and assisted Nada with writing the Kapidzic article.
`
`28.
`
`I allowed Nada Kapidzic and Alan Davidson to have the publication
`
`credit for the Kapidzic article without including my name to help them build their
`
`academic careers.
`
`4
`
`

`

`29.
`
`I have done a similar practice in other situations in which I gave other
`
`students publishing credits to help build their careers. It is well known that
`
`aspiring academics need publication credits to advance their careers. In addition, a
`
`student is usually only paid to attend a conference if he or she is the first listed
`
`author. To help my students achieve these benefits, I have listed my students as
`
`the first author on papers and also omitted my name as a co-author even though I
`
`was the one who did the primary research.
`
`30. For example, enclosed is a Licentiate thesis prepared by one of my
`
`current Ph.D. students, Ioannis Kounelis, provided as Exhibit 2015, which lists
`
`papers he has published with me and without me. Exhibit 2015, at 42. All ideas
`
`that he published, with me or without me, resulted from my original ideas and
`
`suggestions to him.
`
`31.
`
`I did not deem it important to my career to be a listed co-author on the
`
`Kapidzic article since I was a tenured professor and thus did not need further
`
`publication credits to maintain my professorship. In addition, I did not intend to
`
`participate at the conference where the paper was presented (San Diego).
`
`32.
`
`I also did not deem it important to list myself as an author on the
`
`Kapidzic article because I had already co-authored in this area, including the
`
`Cura!ao and COST-PEM articles, and also because I had authored numerous other
`
`articles in the field of computer security.
`
`33. Thus, the Kapidzic article does not summarize Nada Kapidzic’s or
`
`Alan Davidson’s contributions to the field, but rather my contributions.
`
`5
`
`

`

`34. At the time of publication of the Kapidzic article, I had not yet
`
`considered filing for patent protection to protect my ideas.
`
`35. The steps that eventually led me to consider filing for patent
`
`protection started in June 1995, when I attended an IFIP/SEC international
`
`conference in Cape Town, South Africa.
`
`36. At the conference, I spoke as a keynote speaker about my public key
`
`certification and other security products that I was developing.
`
`37. Lance Hoffman, a professor from George Washington University, was
`
`in attendance at the conference and suggested that I go to the United States to
`
`obtain funding for my products.
`
`38.
`
`I traveled to the United States sometime between June and September
`
`1995. While there, I met with Kenneth Krosin, an attorney who had hosted me
`
`when I was studying for my Ph.D. at The Ohio State University.
`
`39.
`
`I told Kenneth of my business plans, and he suggested that I should
`
`file a patent in the United States to help build my business.
`
`40. Kenneth introduced me to David Stewart, who was the patent attorney
`
`that helped me file the patent application that resulted in the ’574 patent.
`
`41.
`
`I began working with David Stewart to prepare the patent application
`
`in about September 1995. We filed the patent application on December 15, 1995.
`
`
` declare under penalty of perjury that the foregoing is true and correct.
`
` I
`
`
`
`
`Dated: 20 January 2015
`
`
`
`Sead Muftic
`
`By:
`
`
`6
`
`
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket