`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`COMPASS BANK,
`COMMERCE BANCSHARES, INC. and
`FIRST NATIONAL BANK OF OMAHA
`Petitioners,
`
`v.
`
`INTELLECTUAL VENTURES II LLC
`
`Patent Owner.
`
`
`
`
`
`
`
`IPR2014-00724
`U.S. Patent 5,745,574
`
`
`
`
`
`
`
`
`
`
`
`
`
`DECLARATION OF SEAD MUFTIC
`
`
`
`Intellectual Ventures Ex. 2010
`Compass v. IV
`IPR2014-00724
`
`
`
`I, Sead Muftic, do declare as follows:
`
`1.
`
`I have personal knowledge of the matters set forth herein, and if I am
`
`called upon to testify, I could testify competently thereto.
`
`2.
`
`I understand that an inter partes review of claims 18-31 of U.S. Patent
`
`No. 5,745,574 (“the ’574 patent”) has been instituted in IPR2014-00724. I
`
`understand that one of the grounds for invalidity which is being considered is as
`
`follows:
`
`
`Whether claims 18-31 are anticipated under 35 U.S.C. § 102(a)
`by Nada Kapidzic & Alan Davidson, “A Certificate Management
`System: Structure, Functions and Protocols” Proceedings, IEEE
`Symposium on Network and Distributed System Security, Feb. 16-17,
`1995, at 153-160 (“Kapidzic” or “the Kapidzic article”).
`
`3.
`
`I do not have any current financial interest in the ’574 patent. I am
`
`not employed by the current assignee of the ’574 patent. Although I am being
`
`compensated for my time in preparing this declaration, my compensation is not
`
`dependent on the outcome of this IPR or upon the outcome of the pending
`
`litigation between the parties of the IPR.
`
`PERSONAL BACKGROUND
`
`I am the sole inventor of the ’574 patent.
`
`I obtained my M.Sc. and Ph.D. degrees in Computer Science in the
`
`4.
`
`5.
`
`field of computer security from the Ohio State University in 1974 and 1976,
`
`respectively.
`
`1
`
`
`
`6.
`
`Since obtaining my Ph.D., I have held numerous positions in the field
`
`of computer security in both industry and academia.
`
`7.
`
`At the time of filing the ’574 patent, I was a Professor of Computer
`
`and Networks Security at Stockholm University, Sweden. I held this position from
`
`1991 to 2002.
`
`8.
`
`At the time of filing the ’574 patent, I was also the CEO of COST
`
`Computer Security Technologies AB (Stockholm, Sweden), which position I held
`
`from 1992 to 1995.
`
`9. My full background is summarized in my curriculum vitae, a copy of
`
`which is provided as Exhibit 2008.
`
`DERIVATION OF THE CONCEPTS CLAIMED IN THE ’574 PATENT
`
`10.
`
`11.
`
`12.
`
`I have reviewed claims 18-31 of the ’574 patent.
`
`I have also reviewed the Kapidzic article.
`
`I do not believe that Kapidzic discloses any of claims 18-31 of the
`
`’574 patent.
`
`13. However, to the extent that Kapidzic discloses any concepts of
`
`portions of claims 18-31 of the ’574 patent, these concepts were derived from me,
`
`and I am the sole inventor of those concepts.
`
`14. The authors of the Kapidzic article, Nada Kapidzic and Alan
`
`Davidson, were my graduate students, and they prepared the Kapidzic article under
`
`my direction and supervision and using my direct contributions.
`
`2
`
`
`
`15. Beginning in about 1992, I became a Ph.D. advisor for Nada
`
`Kapidzic. I was Nada Kapidzic’s Ph.D. advisor from about 1992 to 1997.
`
`16. Also beginning in about 1992, I became a Licentiate advisor for Alan
`
`Davidson. In Sweden, the Licentiate degree is a higher degree than a Masters
`
`degree but a lower degree than the Ph.D. degree. I was Alan Davidson’s Licentiate
`
`advisor from about 1992 until sometime after the publication of the Kapidzic
`
`article.
`
`17.
`
`I conceived of the concepts claimed in claims 18-31 of the ’574 patent
`
`prior to the publication of Kapidzic.
`
`18.
`
`I had been researching in the field of computer security ever since
`
`obtaining my Ph.D. in 1976.
`
`19.
`
`I was researching in the field of public key certification at least as
`
`early as 1994. Some of this research is documented in “The Structure and
`
`Functioning of the COST Privacy Enhanced Mail (PEM) System,” published as
`
`part of the Proceedings of the IFIP SEC 1994 conference in Cura!ao (“the Cura!ao
`
`article”), provided as Exhibit 2009.
`
`20. The Cura!ao article is coauthored by myself as the first-named author,
`
`along with Nada Kapidzic and Alan Davidson, the listed authors of the Kapidzic
`
`article, who I added as coauthors only for the benefit of having the reference of
`
`participating in my research.
`
`21.
`
`I developed improvements on features described in the Cura!ao
`
`article. Some of those improvements are described in another paper co-authored
`
`by Nada Kapidzic (the first-named author) and me, entitled “COST-PEM
`
`3
`
`
`
`Certificates Verification: an Alternative Procedure,” (“the COST-PEM article”) a
`
`copy of which is provided as Exhibit 2007.
`
`22. The COST-PEM article is also referred to in the Kapidzic article,
`
`which states that “[a]n alternative procedure has been suggested by Kapidzic and
`
`Muftic [6], though this is not adopted in this version of the CMS [Certificate
`
`Management System].” Exhibit 1004 at §§ 6, 9 (citing to Reference [6], which is
`
`the COST-PEM article).
`
`23. Several portions of the Kapidzic article are also referenced in Nada
`
`Kapidzic’s dissertation, completed in 1997, attached as Exhibit 2011.
`
`24.
`
`I understand that Nada Kapidzic has stated that she and Alan
`
`Davidson contributed to the concepts of the Kapidzic article. Exhibit 2011 at 1-4,
`
`25-41. However, as discussed below in paragraphs 25 through 33, I disagree.
`
`25.
`
`I conceived of all the concepts described in the Kapidzic article,
`
`including at least the concepts described in sections 2 through 8 of Kapidzic.
`
`26.
`
`I explained all the details of these concepts to Nada Kapidzic, who
`
`wrote about them in the Kapidzic article under my direction and supervision.
`
`27. Under my direction and supervision, Alan Davidson wrote a
`
`demo/prototype computer program implementation of the system described in the
`
`Kapidzic article and assisted Nada with writing the Kapidzic article.
`
`28.
`
`I allowed Nada Kapidzic and Alan Davidson to have the publication
`
`credit for the Kapidzic article without including my name to help them build their
`
`academic careers.
`
`4
`
`
`
`29.
`
`I have done a similar practice in other situations in which I gave other
`
`students publishing credits to help build their careers. It is well known that
`
`aspiring academics need publication credits to advance their careers. In addition, a
`
`student is usually only paid to attend a conference if he or she is the first listed
`
`author. To help my students achieve these benefits, I have listed my students as
`
`the first author on papers and also omitted my name as a co-author even though I
`
`was the one who did the primary research.
`
`30. For example, enclosed is a Licentiate thesis prepared by one of my
`
`current Ph.D. students, Ioannis Kounelis, provided as Exhibit 2015, which lists
`
`papers he has published with me and without me. Exhibit 2015, at 42. All ideas
`
`that he published, with me or without me, resulted from my original ideas and
`
`suggestions to him.
`
`31.
`
`I did not deem it important to my career to be a listed co-author on the
`
`Kapidzic article since I was a tenured professor and thus did not need further
`
`publication credits to maintain my professorship. In addition, I did not intend to
`
`participate at the conference where the paper was presented (San Diego).
`
`32.
`
`I also did not deem it important to list myself as an author on the
`
`Kapidzic article because I had already co-authored in this area, including the
`
`Cura!ao and COST-PEM articles, and also because I had authored numerous other
`
`articles in the field of computer security.
`
`33. Thus, the Kapidzic article does not summarize Nada Kapidzic’s or
`
`Alan Davidson’s contributions to the field, but rather my contributions.
`
`5
`
`
`
`34. At the time of publication of the Kapidzic article, I had not yet
`
`considered filing for patent protection to protect my ideas.
`
`35. The steps that eventually led me to consider filing for patent
`
`protection started in June 1995, when I attended an IFIP/SEC international
`
`conference in Cape Town, South Africa.
`
`36. At the conference, I spoke as a keynote speaker about my public key
`
`certification and other security products that I was developing.
`
`37. Lance Hoffman, a professor from George Washington University, was
`
`in attendance at the conference and suggested that I go to the United States to
`
`obtain funding for my products.
`
`38.
`
`I traveled to the United States sometime between June and September
`
`1995. While there, I met with Kenneth Krosin, an attorney who had hosted me
`
`when I was studying for my Ph.D. at The Ohio State University.
`
`39.
`
`I told Kenneth of my business plans, and he suggested that I should
`
`file a patent in the United States to help build my business.
`
`40. Kenneth introduced me to David Stewart, who was the patent attorney
`
`that helped me file the patent application that resulted in the ’574 patent.
`
`41.
`
`I began working with David Stewart to prepare the patent application
`
`in about September 1995. We filed the patent application on December 15, 1995.
`
`
` declare under penalty of perjury that the foregoing is true and correct.
`
` I
`
`
`
`
`Dated: 20 January 2015
`
`
`
`Sead Muftic
`
`By:
`
`
`6
`
`
`
`