throbber
Patent No. 7,900,057
`
`Case No. IPR2014-01449
`
`November 2, 2015
`
`Seagate Technology (US) Holdings, Inc.,
`
`and Seagate Technology LLC,
`
`Petitioners
`
`Enova Technology Corp.,
`
`Patent Owner
`
`v.
`
`

`
`2
`
`(3)IPR2014-01449, Claims 40-53
`(2)IPR2014-01297, Claims 33-39
`(1)IPR2014-01178, Claims 1-32
`3 Proceedings:
`
`Overview
`Overview
`
`’057 Patent -Claim 40
`
`

`
`3
`
`(3)IPR2014-01449, Claims 40-53
`(2)IPR2014-01297, Claims 33-39
`(1)IPR2014-01178, Claims 1-32
`3 Proceedings:
`
`Overview
`Overview
`
`’057 Patent -Claim 40
`
`

`
`4
`
`(4)Alleged evidence of secondary considerations
`(3)“command set” limitations in claims 44, 47, 50, 53
`(2)“pass” limitation in claim 40
`(1)“association” limitations in claims 40-42, 45, 48, 51
`Agenda
`
`IPR2014-01449 Claims 40-53
`IPR2014-01449 Claims 40-53
`
`’057 Patent -Claim 40
`
`

`
`5
`
`(4)Alleged evidence of secondary considerations
`(3)“command set” limitations in claims 44, 47, 50, 53
`(2)“pass” limitation in claim 40
`(1)“association” limitations in claims 40-42, 45, 48, 51
`Agenda
`
`IPR2014-01449 Claims 40-53
`IPR2014-01449 Claims 40-53
`
`’057 Patent -Claim 40
`
`

`
`6
`
`command FIS.
`completion of an operation or an aborted operation associated with the PIOdata-out
`received from said device interface, said Register-Device to Host FIS representing
`
`said cryptographic SATA apparatus detecting a Register-Device to Host FIS
`
`said cryptographic SATA apparatus encrypting said detected data FIS payload;
`
`and
`
`said cryptographic SATA apparatus detecting a data FIS payload received from
`
`said host interface;
`
`said cryptographic SATA apparatus passing a PIOsetup FIS received from a
`
`device interface to the host interface;
`
`requires setting in encryption mode;
`out command FIS is associated with a pre-defined category of command set that
`said cryptographic SATA apparatus determining whether the received PIOdata-
`
`data-out command FIS (Frame Information Structure) received from a host interface;
`
`a cryptographic SATA apparatus detecting a PIO(Programmed Input/Output)
`
`40. A cryptographic method, comprising the steps of:
`
`’057 Patent -Claim 40
`’057 Patent –Claim 40
`’057 Patent –Claim 40
`
`

`
`7
`
`command FIS.
`completion of an operation or an aborted operation associated with the PIOdata-out
`received from said device interface, said Register-Device to Host FIS representing
`
`said cryptographic SATA apparatus detecting a Register-Device to Host FIS
`
`said cryptographic SATA apparatus encrypting said detected data FIS payload;
`
`and
`
`said cryptographic SATA apparatus detecting a data FIS payload received from
`
`said host interface;
`
`said cryptographic SATA apparatus passing a PIOsetup FIS received from a
`
`device interface to the host interface;
`
`requires setting in encryption mode;
`out command FIS is associated with a pre-defined category of command set that
`said cryptographic SATA apparatus determining whether the received PIOdata-
`
`data-out command FIS (Frame Information Structure) received from a host interface;
`
`a cryptographic SATA apparatus detecting a PIO(Programmed Input/Output)
`
`40. A cryptographic method, comprising the steps of:
`
`’057 Patent -Claim 40
`’057 Patent –Claim 40
`’057 Patent –Claim 40
`
`

`
`(Ex. 1003, 1.)
`
`8
`
`(Ex. 1002, 1.)
`
`Sullivan + SATA
`Sullivan + SATA
`
`’057 Patent -Claim 40
`
`

`
`(Ex. 1002, Fig. 8, Abstract.)
`
`9
`
`’057 Patent -Claim 40
`Sullivan
`Sullivan
`
`

`
`10
`
`(Ex. 2061, ¶ 43; Reply, 16.)
`
`“WRITE SECTOR” Command:
`
`’057 Patent -Claim 40
`SATA SATA
`
`

`
`(Ex. 1002, 1.)
`
`11
`
`’057 Patent -Claim 40
`Sullivan
`Sullivan
`
`

`
`12
`
`(Ex. 1006, ¶ 100; Reply, 3, 4, 8.)
`render the information unusable or unreadable.”
`be changed because encrypting that information would
`disk drive, must be readable by the drive, and should not
`encryption, but control information is used by the hard
`on the disk of a hard disk drive and is suitable for
`filed, which I discussed above, that user data is stored
`of ordinary skill in the art at the time the ’057 Patent was
`“Sullivan thus reflects the concept well-known to persons
`
`’057 Patent -Claim 40
`Dr. Long
`Dr. Long
`
`

`
`13
`
`Pet., 13-14, 15, 26; Reply, 8, 20, 22.)
`information is transmitted in an unencrypted form.” (Ex. 1002, claim 9;
`information to the second device, where the associated control
`“transmitting the encrypted data with the associated control
`
`1; Pet., 13-14, 15, 26.)
`leave the control information substantially unaltered” (Ex. 1002, claim
`“an encrypt module configured to encrypt the data bits and to
`transmitted information” (Ex. 1002, ¶ [0006]; Pet., 15, 21, 26; Reply, 3-4, 8.)
`attacks and covert processes embedded in or achieved by the
`for both encryption purposes and for handling various types of
`the data and control information can be treated separately
`channel can be accomplished in-line and in real time, where
`“A system is needed whereby transmission of data in a serial
`’057 Patent -Claim 40
`
`Sullivan Excerpts
`Sullivan Excerpts
`
`

`
`14
`
`original data.” (Ex. 1002,¶[0070]; Reply, 12.)
`“themeaning of the stored datawill be protected via the encryption of the
`information.” (Ex. 1002, ¶ [0035]; Reply,3, 6, 12.)
`encrypted … and thus storage unit 60 never receives unencrypted classified
`“[A]nydata passing through bus 65 to storage unit 60 (see FIG. 1) is
`the storage system.” (Ex. 1002, [0004] ; Reply, 3.)
`“encryption and decryption of the data as it is written to and retrieved from
`and decryption of the data….” (Ex. 1002, ¶ [0004]; Reply, 3.)
`“One way to provide security to sensitive datais to use in-line encryption
`based systems.” (Ex. 1002, ¶ [0002]; Pet., 12, 29, 43; Reply, 3.)
`“The present invention relates to encryption of data storedby processor-
`
`Data
`
`’057 Patent -Claim 40
`“Data” and “Control Information” in Sullivan
`“Data” and “Control Information” in Sullivan
`
`

`
`15
`
`have responded if the encryption unit were not present.” (Ex. 1002,¶[0051]; Reply, 18.)
`encryption unit 90 in the same manner in which the target device would
`manufacturer, serialnumber, etc. of the target deviceis replied to by the
`“[A] command from the host 10 that requests information such as the
`data in a normal fashion….” (Ex. 1002, ¶ [0050]; Reply, 3.)
`receive control information (including commands,header data, etc.) and
`“The encryption unit 90 is set up such that the host 10 can transmit and
`information….” (Ex. 1002, ¶ [0010]; Pet.,21 26, 48;Reply,13.)
`“The control information, which may include commands and status
`
`Control Information
`
`’057 Patent -Claim 40
`“Data” and “Control Information” in Sullivan
`“Data” and “Control Information” in Sullivan
`
`

`
`16
`
`(Ex. 1001, 8:26-30; Pet., 5, 19; Reply, 13.)
`particular command protocol will be cryptographically processed.”
`or sectors of a hard disk drive), the payloads of all data FISesin that
`from/to physical storage media(such as optical tracks of a CDRW
`“if a SATA command protocol relates to reading/writing-data
`
`Data
`
`’057 Patent Excerpt
`’057 Patent Excerpt
`
`’057 Patent -Claim 40
`
`

`
`17
`
`(Ex. 1001, 7:31-33; Pet., 5, 19; Resp., 20.)
`cryptographicengine22”
`setup, configuration, and status inquiriesbypasses
`“A data FISwith ATA commands that are associated with device
`
`Control Information
`
`’057 Patent Excerpt
`’057 Patent Excerpt
`
`’057 Patent -Claim 40
`
`

`
`18
`
`(Ex. 1041, 65:19-22; Reply, 4.)
`A.Generally, yes, it would be unintelligible.”
`device?
`command, will the command be unintelligible to the
`“Q. Dr. Conte, if a storage device receives an encrypted
`
`protect sensitive information.” (Ex. 1041, 39:18-20; Reply, 3.)
`that time frame as today that encryption is used to
`“I think one of skill in the art would understand back in
`
`Dr. Conte
`Dr. Conte
`
`’057 Patent -Claim 40
`
`

`
`19
`
`(Ex. 1006, ¶ 105; Pet., 14.)
`general ‘packet’ of information.”
`serial protocols (including SATA) by describing a
`“Sullivan teaches principles applicable to many
`
`’057 Patent -Claim 40
`Dr. Long
`Dr. Long
`
`

`
`20
`
`SCSI, fibrechannel, and so on.” (Ex. 1002, ¶ [0038]; Pet., 14; Reply, 4, 9.)
`other suitable serial channels, such as serial ATA, serial
`1394) protocol buses, or they may be any of a number of
`“The serial channels herein may thus be Firewire® (IEEE
`
`transmission.”(Ex. 1002, ¶ [0069]; Reply, 9.)
`various types, such as multiple types of serial data
`and security system that can accommodate protocols of
`“This invention thus provides a high-speed, in-line encryption
`
`Sullivan Excerpts
`Sullivan Excerpts
`
`’057 Patent -Claim 40
`
`

`
`21
`
`(Resp., 22 (citing Dr. Conte, Ex. 2061, ¶ 95); Reply, 4.)
`payloads for encryption and others do not.”
`other organizational structure in which some packets contain
`Sullivan actually discloses any different packet format or
`neither Petitioner nor Dr. Long point to any suggestion that
`operate with other serial protocols, including SATA,
`“But, other than Sullivan’s general disclosure that it can
`
`(Resp., 18 (citing Dr. Conte, Ex. 2061, ¶ 88); Reply, 4.)
`serial interfaces, including SATA.”
`processing of the serial packets used by the disclosed
`“Sullivan’s encryption approach is described as based on
`
`Patent Owner
`Patent Owner
`
`’057 Patent -Claim 40
`
`

`
`22
`
`(Ex. 1006, ¶ 155 (citations and editorial marks omitted); Pet., 26; Reply, 4.)
`data is encrypted.”
`control information in the header so that only the user
`the encryption operation, the data is separated from the
`the user data is placed in the body of the packet. During
`information) is placed in the header of the packet and
`control information (e.g., commands and status
`“In particular, Sullivan describes a ‘packet’ in which
`
`’057 Patent -Claim 40
`Dr. Long
`Dr. Long
`
`

`
`23
`
`device….” (Ex. 1002, ¶ [0009]; Pet., 26; Resp., 23; Reply, 4.)
`recombined with the header, and transmitted to the target
`“The data is separated from the header, encrypted,
`
`(Ex. 1002, Fig. 8.)
`
`Sullivan Excerpts
`Sullivan Excerpts
`
`’057 Patent -Claim 40
`
`

`
`24
`
`(Ex. 1006, ¶ 103; Pet., 15.)
`cryptographic core 920 over another serial channel 65.”
`cipher text interface 910 links a storage device to the
`cryptographic core 920 over a serial channel 50, while the
`“In Sullivan, the plain text interface 900 links the host to the
`Dr. Long:
`
`(Ex. 1002, Fig. 11.)
`
`’057 Patent -Claim 40
`Dr. Long
`Dr. Long
`
`

`
`25
`shown in FIG. 2.” (Ex. 1002, ¶ [0062]; Pet., 14.)
`core 920, which may include the modules or other logic discussed above and
`encrypted data may be sent. Between these two layers is the cryptographic
`channel 65, i.e. is on the side of the unit 90 presented to a channel in which
`unencrypted data may be sent. A cipher text interface 910 couples to serial
`channel 50, i.e. is on the side of the unit 90 presented to a channel in which
`layers, as illustrated in FIG. 11. A plain text interface 900 couples to serial
`“The data encryption unit 90 may be implemented as a device with three logic
`
`(Ex. 1002, Fig. 11.)
`
`Sullivan Excerpts
`Sullivan Excerpts
`
`’057 Patent -Claim 40
`
`

`
`26
`
`text interface.” (Ex. 1002, ¶ [0064]; Pet., 15, 28.)
`“The filter module 730 … may be included in the plain
`
`(Ex. 1002, Fig. 11.)
`
`Sullivan Excerpts
`Sullivan Excerpts
`
`’057 Patent -Claim 40
`
`

`
`27
`
`(Ex. 1006, ¶ 117; Pet. 16; Reply, 6, 11-13, 21.)
`access and storage.’”
`set of commands’ that are ‘associated with data or memory
`specifically identify commands from a ‘predetermined allowed
`distinguish among different received commands and
`“Sullivan therefore discloses a component that is able to
`
`(Ex. 1006, ¶ 117; Pet. 16; Reply, 6, 11-13, 21.)
`allowed set of commands.’”
`whether a received command is part of a ‘predetermined
`unit with a ‘look-up table’ that may be used to determine
`“Sullivan discloses a ‘command pass filter’ in the encryption
`
`’057 Patent -Claim 40
`Dr. Long
`Dr. Long
`
`

`
`28
`
`(Ex. 1002, ¶ [0056]; Pet., 16, 28, 29; Resp., 28, 35; Reply, 6, 11, 13, 22.)
`access and storage.”
`other commands associated with data or memory
`“Typical allowed commands will be read, write, and
`
`(Ex. 1002, ¶ [0055]; Pet., 16, 28, 29; Resp., 28, 35; Reply, 6, 11, 22.)
`other information or categories of information….”
`predetermined allowed set of commands, status and
`formula or other logic configured to pass only a
`module 730, which may include a look-up table, a
`“The encryption unit in this embodiment includes a filter
`
`Sullivan Excerpts
`Sullivan Excerpts
`
`’057 Patent -Claim 40
`
`

`
`(Ex. 1003, 1.)
`
`29
`
`SATA SATA
`’057 Patent -Claim 40
`
`

`
`30
`
`target device….” (Ex. 1002, ¶ [0009]; Pet., 26; Resp., 23; Reply, 4.)
`recombined with the header, and transmitted to the
`“The data is separated from the header, encrypted,
`
`(Ex. 1002, Fig. 8.)
`
`Sullivan Excerpts
`Sullivan Excerpts
`
`’057 Patent -Claim 40
`
`

`
`31
`
`the order of FISesfor various operations.” (Ex. 2061, ¶ 42; Reply, 4.)
`declaration. I generally agree with Dr. Long’s recitation of
`FIStransmissions, which Dr. Long describes in his
`“The command protocols dictate a prescribed sequence of
`Dr. Conte:
`
`execute a particular command.” (Ex. 1006, ¶ 92; Pet., 7, 9-10; Reply, 4.)
`transmitted between the host and the device in order to
`“The SATA Standard also specifies the sequence of FISes
`Dr. Long:
`
`Dr. Long and Dr. Conte
`Dr. Long and Dr. Conte
`
`’057 Patent -Claim 40
`
`

`
`32
`
`(Ex. 2061, ¶ 43; Reply, 5, 16.)
`SECTOR command, a PIOdata-out command.”
`correctly identifies the order of FIS transactions for a WRITE
`Dr. Conte: “For example, in the diagram [above], Dr. Long
`
`(Ex. 2061, ¶ 43; Reply 5, 16.)
`Dr. Conte:
`
`(Ex. 1006, ¶ 93; Pet. 10-11.)
`Dr. Long:
`
`’057 Patent -Claim 40
`Dr. Long and Dr. Conte: WRITE SECTOR Command
`Dr. Long and Dr. Conte: WRITE SECTOR Command
`
`

`
`33
`
`standard.”(Ex. 1041, 36:11-12 ; Reply, 5.)
`“I verified this sequence was congruent with the [SATA]
`Dr. Conte:
`
`(Ex. 2061, ¶ 46; Reply, 5, 16.)
`Dr. Conte:
`
`(Ex. 1006, ¶ 95; Pet. 11-12.)
`Dr. Long:
`
`’057 Patent -Claim 40
`Dr. Long and Dr. Conte: READ DMA Command
`Dr. Long and Dr. Conte: READ DMA Command
`
`

`
`34
`
`Long’s declaration.” (Ex. 2061, ¶ 44; Reply, 5, 16.)
`similar and is shown in the diagram [above], which is not in Dr.
`“A PIOdata-in operation reading data from the device is
`Dr. Conte:
`
`(Ex. 2061, ¶ 44; Reply, 5, 16.)
`Dr. Conte:
`
`Dr. Conte: READ SECTOR Command
`Dr. Conte: READ SECTOR Command
`
`’057 Patent -Claim 40
`
`

`
`35
`
`(Ex. 1041, 37:4-13 (objection omitted), Reply, 5.)
`Long’s examples were correct.”
`the art would have been able to determine that Dr.
`A: In light of the SATA standard, one of ordinary skill in
`
`right?
`sequence of FISesbased on the SATA standard; is that
`November of 2005 would have been aware of this
`declaration, a person of ordinary skill in the art in
`I guess, in paragraphs 43, 44, 45 and 46 of your
`“Q: So for each of these examples that we’ve described,
`
`Dr. Conte
`Dr. Conte
`
`’057 Patent -Claim 40
`
`

`
`36
`
`the subsequent Data FISes.” (Ex. 1006, ¶ 97; Reply, 4, 6.)
`Standard creates an association between a command and
`contents of those Data FISes. As a result, the SATA
`triggers the transmission of Data FISesand dictates the
`“Importantly, in SATA, execution of a particular command
`
`’057 Patent -Claim 40
`Dr. Long
`Dr. Long
`
`

`
`37
`
`45, Reply, 5, 16.)
`FISesas in my diagram above for READ SECTOR.” (Ex. 2061, ¶
`regarding the device to the host with the same sequence of
`PIOdata-in command that sends control information
`“As Dr. Long notes, the IDENTIFY DEVICE command is a
`Dr. Conte:
`
`(Ex. 2061, ¶ 45; Ex. 1041, 29:6-37:13, Reply, 5, 16.)
`IDENTIFY DEVICE command:
`Dr. Conte:
`
`Dr. Long:
`
`Dr. Conte
`Dr. Conte
`
`’057 Patent -Claim 40
`
`

`
`38
`
`(Ex. 1041, 32:10-15; Reply, 5.)
`Long would call user dataand then a status type 34.”
`a packet with a header of 46 indicating or containing what Dr.
`then sending back a packet indicating device ready and then
`“This shows the host sending a packet to device, the device
`Dr. Conte:
`
`(Ex. 2061, ¶ 44; Ex. 1041, 29:6-37:13, Reply, 5, 16.)
`READ SECTOR command:
`Dr. Conte:
`
`Dr. Long:
`
`Dr. Conte
`Dr. Conte
`
`’057 Patent -Claim 40
`
`

`
`39
`
`Dr. Long:
`
`(Ex. 1006, ¶ 97; Reply 4, 16.)
`identifies the type of information in associated Data FISes.”
`(sent in a Register-Host to Device FIS or FIS Type 27h)
`included in the Data FIS. As a result, a command in SATA
`information (i.e., control information or user data) to be
`associated with each Data FIS require different types of
`transfer of Data FISes(FIS Type 46h), the commands
`“Although the execution of [different] commands involves the
`Dr. Long:
`
`’057 Patent -Claim 40
`Dr. Long
`Dr. Long
`
`

`
`40
`
`(Ex. 1006, ¶ 116 ; Reply, 3-6.)
`when those Data FISescontain user data).”
`those Data FISesare associated with read or write commands (i.e.,
`implemented in SATA, encrypts and decrypts Data FISesonly when
`such a person would have understood that Sullivan, when
`control information are associated with other commands in SATA,
`with read or write commands in SATA and that Data FISescontaining
`have known that Data FISescontaining user data are associated
`“Furthermore, because a person of ordinary skill in the art would
`
`as the other FIS types that also contain control information.”
`decryption those Data FISescontaining control information as well
`FISescontaining user data and will bypass without encryption or
`when implemented in SATA, will encrypt or decrypt only those Data
`“[O]ne of ordinary skill in the art would have understood that Sullivan,
`Dr. Long:
`’057 Patent -Claim 40
`Claim 40
`Claim 40
`
`

`
`41
`
`cryptographic engine.” (Ex. 1006, ¶ 117; Reply, 6, 11-13.)
`or memory access and storage’ (i.e., user data) will pass to the
`predetermined set of commands ‘typically associated with data
`teaches a means by which only data transmitted pursuant to a
`have recognized that Sullivan, when implemented using SATA,
`“Accordingly, in my opinion, one of ordinary skill in the art would
`purposes of encryption and decryption.” (Ex. 1006, ¶ 116; Reply, 3-6.)
`Sullivan, to distinguish user data from control information for
`Standard with an encryption device, such as the one taught in
`identification schemes and relationships established by the SATA
`been familiar with and readily able to use the conventional
`“Thus, in my opinion, one of ordinary skill in the art would have
`Dr. Long:
`
`’057 Patent -Claim 40
`Claim 40
`Claim 40
`
`

`
`42
`
`encrypted.” (Resp., 25 (emphasis added); Reply, 7, 9.)
`payloads of even non-Data FISeswould be
`result in a non-functional system in which the
`“Following this approach, as Dr. Long suggests, would
`
`Patent Owner
`Patent Owner
`
`’057 Patent -Claim 40
`
`

`
`43
`
`reject this packet.” (Resp., 32 (citing Ex. 2061, ¶ 106); Reply, 11.)
`command,’ Sullivan’s filter module embodiment would
`“Since a Data FIS does not contain any ‘allowed
`
`(citing Ex. 2061, ¶ 106); Reply, 11.)
`way: the command itself would be encrypted….” (Resp., 32
`per Sullivan’s disclosure, would be treated in the same
`“A read command, also one that would be ‘allowed’
`Dr. Conte:
`
`Patent Owner
`Patent Owner
`
`’057 Patent -Claim 40
`
`

`
`parallel ATA protocol.” (Ex. 2061, ¶ 27; Reply, 14-15.)
`“The SATAprotocol was developed as a high-speed replacement for the then-popular
`of the references on which the Board instituted review.”(Ex. 2061, ¶ 41; Reply, 5.)
`Petitions rely; they are described by the ATA specification itself, which is not itself one
`various command protocols is outside the scope of the SATAStandard on which the
`Dr. Conte:“The purpose and function of the individual commands described by the
`(Ex. 1003, 13; Reply, 5.)
`
`44
`
`SATA:
`
`’057 Patent -Claim 40
`SATA SATA
`
`

`
`45
`
`(4)Alleged evidence of secondary considerations
`(3)“command set” limitations in claims 44, 47, 50, 53
`(2)“pass” limitation in claim 40
`(1)“association” limitations in claims 40-42, 45, 48, 51
`Agenda
`
`IPR2014-01449 Claims 40-53
`IPR2014-01449 Claims 40-53
`
`’057 Patent -Claim 40
`
`

`
`46
`
`command FIS.
`completion of an operation or an aborted operation associated with the PIOdata-out
`received from said device interface, said Register-Device to Host FIS representing
`
`said cryptographic SATA apparatus detecting a Register-Device to Host FIS
`
`said cryptographic SATA apparatus encrypting said detected data FIS payload;
`
`and
`
`said cryptographic SATA apparatus detecting a data FIS payload received from
`
`said host interface;
`
`said cryptographic SATA apparatus passing a PIOsetup FIS received from a
`
`device interface to the host interface;
`
`requires setting in encryption mode;
`out command FIS is associated with a pre-defined category of command set that
`said cryptographic SATA apparatus determining whether the received PIOdata-
`
`data-out command FIS (Frame Information Structure) received from a host interface;
`
`a cryptographic SATA apparatus detecting a PIO(Programmed Input/Output)
`
`40. A cryptographic method, comprising the steps of:
`
`’057 Patent -Claim 40
`’057 Patent –Claim 40
`’057 Patent –Claim 40
`
`

`
`47
`
`command FIS.
`completion of an operation or an aborted operation associated with the PIOdata-out
`received from said device interface, said Register-Device to Host FIS representing
`
`said cryptographic SATA apparatus detecting a Register-Device to Host FIS
`
`said cryptographic SATA apparatus encrypting said detected data FIS payload;
`
`and
`
`said cryptographic SATA apparatus detecting a data FIS payload received from
`
`said host interface;
`
`said cryptographic SATA apparatus passing a PIOsetup FIS received from a
`
`device interface to the host interface;
`
`requires setting in encryption mode;
`out command FIS is associated with a pre-defined category of command set that
`said cryptographic SATA apparatus determining whether the received PIOdata-
`
`data-out command FIS (Frame Information Structure) received from a host interface;
`
`a cryptographic SATA apparatus detecting a PIO(Programmed Input/Output)
`
`40. A cryptographic method, comprising the steps of:
`
`’057 Patent -Claim 40
`’057 Patent –Claim 40
`’057 Patent –Claim 40
`
`

`
`48
`
`are rejected and filtered out.” (Resp., 46-47; Reply 20-21.)
`passed to the cryptographic module and encrypted or they
`packets that reach the cryptographic module: they are
`limitations because it “permits only two operations for
`
`•Sullivan’s filter module “teaches away” from these
`
`•“Petitioners do not address whether a PIOSetup FIS would
`because:
`Patent Owner asserts that claim 40 would not be obvious
`
`present a cryptographic determination.” (Resp., 45; Reply, 19.)
`
`Patent Owner
`
`

`
`49
`
`unencrypted form.” (Ex. 1002, claim 9; Pet., 15, 26; Reply, 8, 20, 22.)
`associated control information is transmitted in an
`control information to the second device, where the
`“transmitting the encrypted data with the associated
`
`Sullivan Excerpt
`
`

`
`50
`
`(Ex. 1006, ¶ 161; Petition, 29-30.)
`the second step of a PIOdata-out operation….”
`storage device and passes that FIS to the host as part of
`according to SATA, receives the PIOSetup FIS from the
`that Sullivan’s encryption unit, when implemented
`“One of ordinary skill in the art would have understood
`
`information.” (Ex. 1006, ¶ 179 (citations omitted); Reply, 19-20.)
`appreciated that the PIOSetup FIS conveyscontrol
`encrypted, and one of ordinary skill would have
`“Sullivan also teaches that control information is not
`
`Dr. Long
`
`

`
`51
`
`(Ex. 2060, 71:24-72:10; Reply, 20.)
`
`disk drive operations of reading and writing.”
`you had a limited function device where you do just the basic
`way, I suppose, if you wanted to. If you wanted to have a --if
`A. Right. I don't think it requires that. You could do it that
`Q. I'm just focusing on this embodiment.
`embodiment.
`A. Not necessarily. First of all, this is an alternative
`Or I should say has its data encrypted or decrypted.”
`is encrypted or decrypted, depending on the data direction.
`“Q. Okay. So every command that makes it through this filter
`
`Dr. Long
`
`

`
`52
`
`(4)Alleged evidence of secondary considerations
`(3)“command set” limitations in claims 44, 47, 50, 53
`(2)“pass” limitation in claim 40
`(1)“association” limitation in claims 40-42, 45, 48, 51
`Agenda
`
`IPR2014-01449 Claims 40-53
`IPR2014-01449 Claims 40-53
`
`’057 Patent -Claim 40
`
`

`
`53
`
`command, and WRITE BUFFER command.
`WRITE MULTIPLE command, WRITE MULTIPLE EXT
`SECTOR command, WRITE SECTOR EXT command,
`defined category of command set comprises WRITE
`47. The cryptographic method ofclaim 45, wherein the pre-
`
`command, and WRITE BUFFER command.
`WRITE MULTIPLE command, WRITE MULTIPLE EXT
`SECTOR command, WRITE SECTOR EXT command,
`defined category of command set comprises WRITE
`44. The cryptographic method ofclaim 42, wherein the pre-
`
`’057 Patent -Claim 40
`’057 Patent -Claims 44 and 47
`’057 Patent -Claims 44 and 47
`
`

`
`54
`
`command, and READ DMA EXT command.
`defined category of command set comprises READ DMA
`53. The cryptographic method ofclaim 51, wherein the pre-
`
`command, and READ DMA EXT command.
`defined category of command set comprises READ DMA
`50. The cryptographic method ofclaim 48, wherein the pre-
`
`’057 Patent -Claim 40
`’057 Patent -Claims 50 and 53
`’057 Patent -Claims 50 and 53
`
`

`
`55
`
`processed.” (Resp., 49; Reply, 22.)
`transport user data and should not be cryptographically
`with data or access memory and storage’ do not
`
`•“In particular, many commands which are ‘associated
`
`22.)
`disclosure of particular SATA commands” (Resp., 48-51; Reply, 21-
`this manner” and “Sullivan does not include any
`
`•“The SATA Standard itself does not group commands in
`obvious because:
`Patent Owner asserts that these claims would not be
`
`Patent Owner
`
`

`
`56
`
`(Ex. 1002, ¶ [0056]; Pet., 16, 28, 29; Resp., 28, 35; Reply, 6, 11, 13, 22.)
`access and storage.”
`other commands associated with data or memory
`“Typical allowed commands will be read, write, and
`
`Sullivan Excerpts
`Sullivan Excerpts
`
`’057 Patent -Claim 40
`
`

`
`57
`
`original data.” (Ex. 1002,¶[0070]; Reply, 12.)
`“themeaning of the stored datawill be protected via the encryption of the
`information.” (Ex. 1002, ¶ [0035]; Reply,3, 6, 12.)
`encrypted … and thus storage unit 60 never receives unencrypted classified
`“[A]nydata passing through bus 65 to storage unit 60 (see FIG. 1) is
`the storage system.” (Ex. 1002, [0004] ; Reply, 3.)
`“encryption and decryption of the data as it is written to and retrieved from
`and decryption of the data….” (Ex. 1002, ¶ [0004]; Reply, 3.)
`“One way to provide security to sensitive datais to use in-line encryption
`based systems.” (Ex. 1002, ¶ [0002]; Pet., 12, 29, 43; Reply, 3.)
`“The present invention relates to encryption of data storedby processor-
`
`Data
`
`Sullivan Excerpts
`Sullivan Excerpts
`
`’057 Patent -Claim 40
`
`

`
`58
`
`write commands.” (Ex. 1006, ¶ 193 (some citations omitted), see also¶ 210; Reply, 17.)
`encrypt the payloads of Data FISesassociated with those
`opinion, one of ordinary skill in the art would have known to
`Because Sullivan teaches encrypting user data, in my
`as recognized by the ’057 patent itself (Ex. 1001, 8:9-35).
`“These commands were copied from the SATA Standard,
`Regarding the commands in 44 and 47:
`
`’057 Patent -Claim 40
`Dr. Long
`Dr. Long
`
`

`
`59
`
`omitted), see also ¶ 268; Reply, 17.)
`associated with those read commands.” (Ex. 1006, ¶ 249 (some citations
`would have known to decrypt the payloads of Data FISes
`storage device are decrypted, one of ordinary skill in the art
`Because Sullivan teaches that user data read from a
`recognized by the ’057 patent itself (Ex. 1001, 8:9-35).
`“These commands are from the SATA Standard, as
`Regarding the commands in 50 and 53:
`
`’057 Patent -Claim 40
`Dr. Long
`Dr. Long
`
`

`
`60
`
`(Ex. 1001, 8:26-30; Pet., 5, 19; Reply, 13.)
`particular command protocol will be cryptographically processed.”
`or sectors of a hard disk drive), the payloads of all data FISesin that
`from/to physical storage media(such as optical tracks of a CDRW
`“if a SATAcommand protocol relates to reading/writing-data
`
`Data
`
`’057 Patent Excerpt
`’057 Patent Excerpt
`
`’057 Patent -Claim 40
`
`

`
`61
`
`(Exhibit 1041, 80:3-11; Reply, 17.)
`comprehensive list.”
`A: They may well be examples, but it is not a
`
`computer to a storage device?
`the purpose of transferring a Word document from a host
`would be examples of commands that could be used for
`the write commands contained on [Ex. 2061] page 21
`person of ordinary skill in the art would understand that
`“Q:Yeah. My question was, would you agree that a
`
`Dr. Conte
`Dr. Conte
`
`’057 Patent -Claim 40
`
`

`
`62
`
`(4)Alleged evidence of secondary considerations
`(3)“command set” limitations in claims 44, 47, 50, 53
`(2)“pass” limitation in claim 40
`(1)“association” limitations in claims 40-42, 45, 48, 51
`Agenda
`
`IPR2014-01449 Claims 40-53
`IPR2014-01449 Claims 40-53
`
`’057 Patent -Claim 40
`
`

`
`Patent No. 7,900,057
`
`Case No. IPR2014-01449
`
`November 2, 2015
`
`Seagate Technology (US) Holdings, Inc.,
`
`and Seagate Technology LLC,
`
`Petitioners
`
`Enova Technology Corp.,
`
`Patent Owner
`
`v.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket