throbber
Paper 15
`Trials@uspto.gov
`571-272-7822 Entered: July 1, 2013
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`
`
`
`ZTE CORPORATION AND ZTE (USA) INC.
`Petitioners
`
`v.
`
`CONTENTGUARD HOLDINGS INC.
`Patent Owner
`____________
`
`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`____________
`
`
`
`
`
`Before JAMESON LEE, MICHAEL W. KIM, and
`MICHAEL R. ZECHER, Administrative Patent Judges.
`
`
`ZECHER, Administrative Patent Judge
`
`
`
`DECISION
`Institution of Inter Partes Review
`37 C.F.R. § 42.108
`
`
`
`
`
`Petitioner Apple Inc. - Ex. 1035, p. 1
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`I. INTRODUCTION
`
`ZTE Corporation and ZTE (USA) Inc. (“ZTE”) filed a corrected
`
`petition (“Pet.”) requesting inter partes review of claims 1-25 of U.S. Patent
`
`No. 7,523,072 (“the ’072 patent”). Paper 10. In response, Patent Owner,
`
`ContentGuard Holdings Inc. (“ContentGuard”), filed a preliminary response
`
`(“Prel. Resp.”). Paper 13. We have jurisdiction under 35 U.S.C. § 314.
`
`The standard for instituting an inter partes review is set forth in
`
`35 U.S.C. § 314(a), which provides:
`
`THRESHOLD -- The Director may not authorize an inter partes
`review to be instituted unless the Director determines that the
`information presented in the petition filed under section 311
`and any response filed under section 313 shows that there is a
`reasonable likelihood that the petitioner would prevail with
`respect to at least 1 of the claims challenged in the petition.
`
`For the reasons set forth below, we conclude that the information
`
`presented in the petition demonstrates that there is a reasonable likelihood
`
`that ZTE will prevail in establishing claims 1-25 as unpatentable. Pursuant
`
`to 35 U.S.C. § 314, we hereby authorize an inter partes review to be
`
`instituted as to claims 1-25 of the ’072 patent.
`
`A. Related Matters
`
`ZTE indicates that the ’072 patent was asserted against it in
`
`ContentGuard Holdings Inc. v. ZTE Corp. et al., Civil Action No. 1:12-cv-
`
`0206-CMH-TCB, filed in the U.S. District Court for the Eastern District of
`
`Virginia on February 27, 2012. Pet. 1. According to ZTE, this patent
`
`infringement lawsuit was transferred to the U.S. District Court for the
`
`2
`
`Petitioner Apple Inc. - Ex. 1035, p. 2
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`Southern District of California on May 21, 2012. Id. ContentGuard does
`
`not dispute that it asserted the ’072 patent against ZTE.
`
`ZTE also filed five other petitions seeking inter partes review of the
`
`following patents: U.S. Patent No. 7,225,160 (IPR2013-00134); U.S.
`
`Patent No. 7,359,884 (IPR2013-00136); U.S. Patent No. 6,963,859
`
`(IPR2013-00137); U.S. Patent No. 7,139,736 (IPR2013-00138); and U.S.
`
`Patent No. 7,269,576 (IPR2013-00139). Pet. 1.
`
`B. The Invention of the ’072 Patent (Ex. 1001)
`
`The invention of the ’072 patent generally relates to distributing and
`
`enforcing usage rights for digital works. Ex. 1001, 1:27-28. A digital work
`
`refers to any work that has been reduced to a digital representation,
`
`including any audio, video, text, or multimedia work, and any accompanying
`
`interpreter, e.g., software, which may be required to recreate or render the
`
`content of the digital work. Ex. 1001, 6:3-7. Usage rights refer to rights
`
`granted to a recipient of a digital work that define the manner in which a
`
`digital work may be used and distributed. Ex. 1001, 4:13-16; 6:9-12.
`
`According to the ’072 patent, the disclosed invention: (1) provides the
`
`owner of a digital work the flexibility to distribute the digital work as
`
`desired; and (2) includes a distribution system that transports a means for
`
`billing with the digital work. Ex. 1001, 3:15-17; 4:1-3.
`
`The ’072 patent discloses permanently attaching usage rights to the
`
`digital work. Ex. 1001, 6:16-17. Copies of the digital work also will have
`
`the usage rights attached thereto. Ex. 1001, 6:17-18. Therefore, any usage
`
`3
`
`Petitioner Apple Inc. - Ex. 1035, p. 3
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`rights and associated fees assigned by the creator and subsequent distributor
`
`of the digital work always will remain with the digital work. Ex. 1001, 6:18-
`
`21. The ’072 patent further discloses that repositories enforce the usage
`
`rights of digital works. Ex. 1001, 4:26-27; 6:22-23. In particular,
`
`repositories store digital works, control access to digital works, bill for
`
`access to digital works, and maintain the security and integrity of the digital
`
`works stored therein. Ex. 1001, 6:23-26.
`
`Figure 1 of the ’072 patent illustrates the basic operations of the
`
`disclosed invention. Ex. 1001, 4:52-54; 6:38-40. Figure 1 of the ’072 patent
`
`is reproduced below:
`
`Figure 1 illustrates the basic operations of repositories 1 and 2.
`
`4
`
`
`
`Petitioner Apple Inc. - Ex. 1035, p. 4
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`At step 101, a creator creates a digital work. Ex. 1001, 6:40-41. At
`
`step 102, the creator determines the appropriate usage rights and fees,
`
`attaches them to the digital work, and stores the digital work with the
`
`associated usage rights and fees in repository 1. Ex. 1001, 6:41-43. At step
`
`103, repository 1 receives a request to access the digital work from
`
`repository 2. Ex. 1001, 6:46-48. Such a request, or session initiation,
`
`includes steps that help ensure that repository 1 and repository 2 are
`
`trustworthy. Ex. 1001, 6:48-51. At step 104, repository 2 requests access to
`
`the digital work stored in repository 1 for a stated purpose, e.g., to print the
`
`digital work or obtain a copy of the digital work. Ex. 1001, 6:51-55. At step
`
`105, repository 1 checks the usages rights associated with the digital work
`
`stored therein to determine if access to the digital work may be granted. Ex.
`
`1001, 6:56-58. At step 106, if access is denied, repository 1 terminates the
`
`session with repository 2 by transmitting an error message. Ex. 1001, 6:62-
`
`63. At step 107, if access is granted, repository 1 transmits the digital work
`
`to repository 2. Ex. 1001, 6:63-65. At step 108, both repository 1 and 2
`
`generate billing information prior to transmitting the billing information to a
`
`credit server. Ex. 1001, 6:65-7:1. The use of both repositories 1 and 2 for
`
`billing prevents attempts to circumvent the billing process. Ex. 1001, 7:1-2.
`
`Figure 2 of the ’072 patent illustrates the various types of repositories
`
`and the transaction flow between them. Ex. 1001, 4:55-57; 7:3-6. Figure 2
`
`of the ’072 patent is reproduced below:
`
`5
`
`Petitioner Apple Inc. - Ex. 1035, p. 5
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`
`
`Figure 2 illustrates various types of repositories and
`their corresponding functions.
`
`Repository 201 represents the general instance of a repository having
`
`
`
`two modes of operation: (1) a server mode; and (2) a requester mode. Ex.
`
`1001, 7:8-10. When repository 201 is in server mode, it receives and
`
`processes access requests for digital works. Ex. 1001, 7:11-12. When
`
`repository 201 is in requester mode, it initiates requests to access digital
`
`works. Ex. 1001, 7:12-14
`
`
`
`During the course of operation, repository 201 may communicate with
`
`a plurality of other repositories, including rendering repository 203. Ex.
`
`1001, 7:16-21. Communication with rendering repository 203 occurs in
`
`connection with rendering a digital work. Ex. 1001, 7:31-32. According to
`
`the ’072 patent, rendering repository 203 is coupled to a rendering device,
`
`e.g., a printer device, to comprise a rendering system. Ex. 1001, 7:32-35.
`
`
`
`
`
`6
`
`Petitioner Apple Inc. - Ex. 1035, p. 6
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`C. Illustrative Claim
`
`
`
`Claims 1, 10, and 18 are independent claims. Independent claim 1,
`
`which is illustrative, is reproduced below:
`
`rendering digital
`
`for
`
`securely
`
`A method
`1.
`
`documents, comprising:
`
`retrieving, by a document platform, a digital document
`and at least one usage right associated with the digital
`document from a document repository, the at least one usage
`right specifying a manner of use indicating the manner in which
`the digital document can be rendered;
`
`storing the digital document and the at least one usage
`right in separate files in the document platform;
`
`determining, by the document platform, whether the
`digital document may be rendered based on the at least one
`usage right; and
`
`if the at least one usage right allows the digital document
`to be rendered on the document platform, rendering the digital
`document by the document platform.
`
`Ex. 1001, Claims—52:8-22 (emphasis added).
`
`D. Prior Art Relied Upon
`
`ZTE relies upon the following prior art references:
`
`US 4,868,736
`US 5,986,690
`
`
`
`
`Ex. 1014
`Sept. 19, 1989
`Ex. 1013
`Nov. 16, 1999
`(filed Nov. 7, 1994)
`
`
`
`Ex. 1012
`
`Ex. 1010
`
`Ex. 1011
`
`
`Walker
`Hendricks
`
`
`
`
`EP 0268139 A2 May 25, 1988
`Comerford
`(hereinafter “EP ’139”)
`Hartrick
`EP 0464306 A2
`(hereinafter “EP ’306”)
`Hartrick
`EP 0567800 A1 Nov. 3, 1993
`(hereinafter “EP ’800”)
`
`Jan. 8, 1992
`
`7
`
`Petitioner Apple Inc. - Ex. 1035, p. 7
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`
`
`E. Alleged Grounds of Unpatentability
`
`ZTE seeks to cancel claims 1-25 of the ’072 patent based on the
`
`following alleged grounds of unpatentability:
`
`1.
`
`Claims 1-25 as anticipated under 35 U.S.C. § 102(b) by EP
`
`’139. Pet. 11-27.
`
`2.
`
`Claims 1, 2, 5-8, 10, 13-16, 18, and 21-24 as anticipated under
`
`35 U.S.C. § 102(e) by Hendricks. Id. at 27-36.
`
`3.
`
`Claims 1-9 as anticipated under 35 U.S.C. § 102(b) by Walker.
`
`Id. at 36-40.
`
`4.
`
`Claims 1, 5, 7, 8, 10, 13, 15, 16, 18, 21, 23, and 24 as
`
`unpatentable under 35 U.S.C. § 103(a) over the combination of EP ’306 and
`
`EP ’800. Id. at 40-53.
`
`
`
`II. CLAIM CONSTRUCTION
`
`Consistent with the statute and legislative history of the Leahy-Smith
`
`America Invents Act, Pub. L. 112-29, 125 Stat. 284, 329 (2011) (“AIA”), we
`
`construe claims by applying the broadest reasonable interpretation in light of
`
`the specification. 37 C.F.R. § 42.100(b); see also Office Patent Trial
`
`Practice Guide, 77 Fed. Reg. 48756, 48766 (Aug. 14, 2012). There is a
`
`“heavy presumption” that a claim term carries its ordinary and customary
`
`meaning. CCS Fitness, Inc. v. Brunswick Corp., 288 F.3d 1359, 1366 (Fed.
`
`Cir. 2002). However, a “claim term will not receive its ordinary meaning if
`
`the patentee acted as his own lexicographer and clearly set forth a definition
`
`8
`
`Petitioner Apple Inc. - Ex. 1035, p. 8
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`of the disputed claim term in either the specification or prosecution history.”
`
`Id. “Although an inventor is indeed free to define the specific terms used to
`
`describe his or her invention, this must be done with reasonable clarity,
`
`deliberateness, and precision.” In re Paulsen, 30 F.3d 1475, 1480 (Fed. Cir.
`
`1994).
`
`A. “Repository” (Claims 1, 10, and 18)
`
`
`
`ZTE does not provide a claim construction for the claim term
`
`“repository.” However, ContentGuard contends that the claim term
`
`“repository” should be construed as a “trusted system for supporting usage
`
`rights.” Prel. Resp. 18-19. ContentGuard then cites to several portions of
`
`the specification of the ’072 patent that allegedly support its proposed claim
`
`construction. Id. at 19-21 (citing to Ex. 1001, 11:58-67; 12:63-64; 13:15-20;
`
`51:33-37).
`
`
`
`The specification of the ’072 patent provides a glossary that explicitly
`
`sets forth a definition for the claim term “repository.” For convenience, that
`
`glossary definition is reproduced below:
`
`Conceptually a set of functional specifications defining core
`functionality in support of usage rights. A repository is a
`trusted system in that it maintains physical, communications
`and behavioral integrity.
`
`Ex. 1001, 51:34-37. By setting forth the term in a glossary and using the
`
`verb “is” following “repository” in the second sentence, we find that the
`
`specification explicitly sets forth a definition of “repository” as “a trusted
`
`system in that it maintains physical, communications and behavioral
`
`integrity.” However, the first sentence is also relevant to the definition of
`
`9
`
`Petitioner Apple Inc. - Ex. 1035, p. 9
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`“repository” because it elaborates that the repository supports usage rights.
`
`Accordingly, we construe “repository” as “a trusted system, which maintains
`
`physical, communications and behavioral integrity, and supports usage
`
`rights.”
`
`Our analysis does not end here. In order to understand “a trusted
`
`system,” it is necessary to construe “physical integrity,” “communications
`
`integrity,” and “behavioral integrity.” These terms are described in a section
`
`of the specification labeled “Repositories.” Ex. 1001, 11:58-14:32. For
`
`“physical integrity,” the specification discloses the following:
`
`Physical integrity refers to the integrity of the physical
`devices themselves. Physical integrity applies both to the
`repositories and to the protected digital works. Thus, the
`higher security classes of repositories themselves may have
`sensors that detect when tampering is attempted on their secure
`cases. In addition to protection of the repository itself, the
`repository design protects access to the content of digital
`works. In contrast with the design of conventional magnetic
`and optical devices–such as floppy disks, CD-ROMs, and
`videotapes–repositories never allow non-trusted systems to
`access the works directly. A maker of generic computer
`systems cannot guarantee that their platform will not be used to
`make unauthorized copies. The manufacturer provides generic
`capabilities for reading and writing information, and the general
`nature of the functionality of the general computing device
`depends on it. Thus, a copy program can copy arbitrary data.
`This copying issue is not limited to general purpose computers.
`It also arises for the unauthorized duplication of entertainment
`“software” such as video and audio recordings by magnetic
`recorders. Again, the functionality of the recorders depends on
`their ability to copy and they have no means to check whether a
`copy is authorized. In contrast, repositories prevent access to
`
`10
`
`Petitioner Apple Inc. - Ex. 1035, p. 10
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`the raw data by general devices and can test explicit rights and
`conditions before copying or otherwise granting access.
`Information is only accessed by protocol between trusted
`repositories.
`
`Ex. 1001, 12:1-26 (emphasis added). Many of the above aspects that are
`
`associated with “physical integrity” are described using permissive terms
`
`such as “may” and “can” and, thus, are inappropriate to include in this
`
`broadest reasonable construction as necessary limitations. The specification
`
`also appears to use the terms or phrases in each of the following three groups
`
`interchangeably:
`
`(1)
`
`data, content, digital work, information;
`
`(2)
`
`non-trusted system, general device; and
`
`(3)
`
`“never allow access” and “prevent access.”
`
`When referring to the relationship between the repository and data, the
`
`specification uses absolute terms such as “never” and “only.” In light of the
`
`foregoing, we construe “physical integrity” as “preventing access to
`
`information by a non-trusted system.”
`
`For “communications integrity,” the specification discloses the
`
`following:
`
`Communications integrity refers to the integrity of the
`communications channels between repositories.
` Roughly
`speaking, communications integrity means that repositories
`cannot be easily fooled by “telling them lies.” Integrity in this
`case refers
`to
`the property
`that repositories will only
`communicate with other devices that are able to present proof
`that they are certified repositories, and furthermore, that the
`repositories monitor the communications to detect “impostors”
`and malicious or accidental interference. Thus the security
`11
`
`Petitioner Apple Inc. - Ex. 1035, p. 11
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`exchange of digital
`encryption,
`involving
`measures
`certificates, and nonces described below are all security
`measures aimed at reliable communication in a world known
`to contain active adversaries.
`
`Ex. 1001, 12:27-39 (emphasis added). We construe “communications
`
`integrity” as “only communicates with other devices that are able to present
`
`proof that they are trusted systems, e.g., by using security measures such as
`
`encryption, exchange of digital certificates, and nonces.” The Encyclopedia
`
`of Cryptography defines “nonce” as “[a] number used in a cryptographic
`
`protocol to indicate the unique character of a message.” Newton, David E.,
`
`Encyclopedia of Cryptography 197 (1997).
`
`For “behavioral integrity,” the specification discloses the following:
`
`Behavioral integrity refers to the integrity in what
`repositories do. What repositories do is determined by the
`software that they execute. The integrity of the software is
`generally assured only by knowledge of its source. Restated, a
`user will trust software purchased at a reputable computer store
`but not trust software obtained off a random (insecure) server
`on a network. Behavioral integrity is maintained by requiring
`that repository software be certified and be distributed with
`proof of such certification, i.e. a digital certificate. The
`purpose of the certificate is to authenticate that the software has
`been tested by an authorized organization, which attests that the
`software does what it is supposed to do and that it does not
`compromise the behavioral integrity of a repository. If the
`digital certificate cannot be found in the digital work or the
`master repository which generated the certificate is not known
`to the repository receiving the software, then the software
`cannot be installed.
`
`Ex. 1001, 12:40-56 (emphasis added). We construe “behavioral integrity” in
`
`12
`
`Petitioner Apple Inc. - Ex. 1035, p. 12
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`the context of a repository as “requiring software to include a digital
`
`certificate in order to be installed in the repository.”
`
`The record is not without evidence contrary to our interpretation. The
`
`nature of interpretation is to come to the appropriate conclusion in light of
`
`all of the evidence. All of the evidence does not have to point uniformly in a
`
`single direction.
`
`Table 2 in the specification of the ’072 patent (Ex. 1001, 14) indicates
`
`ten different levels of security for repositories, and the lowest level, i.e.,
`
`level “0,” is described as follows:
`
`Open system. Document transmission is unencrypted. No
`digital certificate is required for identification. The security of
`the system depends mostly on user honesty, since only modest
`knowledge may be needed to circumvent the security measures.
`The repository has no provisions for preventing unauthorized
`programs from running and accessing or copying files. The
`system does not prevent the use of removable storage and does
`not encrypt stored files.
`
`Ex. 1001, 14:64-15:15. Thus, according to Table 2, repositories are not all
`
`trusted systems. Level “0” security means having an open system lacking in
`
`physical, communications, and behavioral integrity and without support for
`
`managing usage rights. That is directly contrary to the meaning of
`
`“repository” as defined in the glossary. For reasons discussed below, we
`
`adhere to the definition provided in the glossary. The contrary evidence
`
`based on level “0”security shown in Table 2 is insufficient to outweigh the
`
`rest of the evidence including, in particular, the explicit definition provided
`
`in the glossary. We make our determination based on the totality of the
`
`13
`
`Petitioner Apple Inc. - Ex. 1035, p. 13
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`evidence.
`
`As noted above, the disclosed invention is directed to distributing and
`
`enforcing usage rights for digital works. The problems described in the
`
`background portion of the specification concern unauthorized and
`
`unaccounted distribution or usage of electronically published materials. See
`
`generally Ex. 1001, 1:32-3:17. The ’072 patent states that it solves
`
`preexisting problems by both permanently attaching usage rights to digital
`
`works and placing elements in repositories that enforce those usage rights.
`
`Ex. 1001, 6:16-27.
`
`Here, the definition set forth in the glossary for “repository” is
`
`consistent with the description of the acknowledged prior art and the
`
`objective or goal to be achieved by the invention of the ’072 patent. The
`
`specification also contains detailed preferred embodiments utilizing
`
`repositories that are trusted systems to provide usage control for digital
`
`works. Ex. 1001, 7:3-41; 7:60-61; 13:7-14, 21-23; 14:8-20; 18:11-13;
`
`26:40-29:20; 41:9-42:12.
`
`The bulk of the disclosure consistently is directed to repositories,
`
`which are trusted systems for providing usage control for digital works. For
`
`example, the specification states:
`
`The enforcement elements of the present invention are
`embodied in repositories. Among other things, repositories are
`used to store digital works, control access to digital works, bill
`for access to digital works and maintain the security and
`integrity of the system.
`
`
`14
`
`Petitioner Apple Inc. - Ex. 1035, p. 14
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`Ex. 1001, 6:23-27 (emphasis added). Other references to “repository” in the
`
`specification that recite necessary features of repositories also support the
`
`definition in the glossary that a repository is a trusted system. For example,
`
`the specification states:
`
`The core repository services 1302 comprise a set of
`functions required by each and every repository. The core
`repository services 1302
`include
`the session
`initiation
`transactions which are defined in greater detail below. This set
`of services also includes a generic ticket agent which is used to
`“punch” a digital ticket and a generic authorization server for
`processing authorization specifications.
`
`Ex. 1001, 14:8-14 (emphasis added). In another example, the specification
`
`discloses that “[a]s a prerequisite to operation, a repository will require
`
`possession of an identification certificate” and that “identification
`
`certificates 1306 are required to enable the use of the repository.” Ex. 1001,
`
`13:7-8, 14:18-20 (emphasis added). In yet another example, the
`
`specification states “[p]rovisions for security and privacy are part of the
`
`requirements for specifying and implementing repositories and thus form
`
`the need for various transactions.” Ex. 1001, 26:35-38 (emphasis added).
`
`Indeed, by using words such as “require” and “requirements,” these
`
`disclosures amply support the definition provided in the glossary that a
`
`repository is a trusted system.
`
`
`
`In summary, even applying the broadest reasonable interpretation
`
`consistent with the specification, the weight of the evidence supports the
`
`definition provided in the glossary. We regard as significant that the
`
`definition states in no equivocal manner that a repository “is a trusted
`
`15
`
`Petitioner Apple Inc. - Ex. 1035, p. 15
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`system.”
`
`B. “Digital Document” (Claims 1, 10, and 18)
`
`
`
`ZTE contends that the claim term “digital document” may be
`
`construed as software. Pet. 6 (citing to Ex. 1001, 6:3-7; 8:21-25; see also
`
`Ex. 1015, ¶ 85). ContentGuard does not challenge ZTE’s claim construction
`
`with respect to that claim term. Because ZTE’s claim construction is
`
`consistent with the specification of the ’072 patent, we agree with ZTE’s
`
`claim construction.
`
`C. “Document Platform” (Claims 1, 10, and 18)
`
`
`
`ZTE contends that the claim term “document platform” does not
`
`appear in the specification of the ’072 patent, other than in the claims
`
`themselves. Pet. 6. ZTE then proceeds to construe the claim term
`
`“document platform” based on the claim limitations recited in independent
`
`claim 1. Id. In response, ContentGuard does not provide a claim
`
`construction for the claim term “document platform.” For purposes of this
`
`decision, it is necessary to construe the claim term “document platform.”
`
`
`
`ZTE’s argument with respect using the claim limitations recited in
`
`independent claim 1 to construe the claim term “document platform” is
`
`misplaced. While a claim may recite other claim features which further limit
`
`a “document platform,” the pivotal issue is the meaning of the claim term
`
`“document platform.” The additional claim features recited in independent
`
`claim 1 narrow the scope of that claim, but do not convey a definition for the
`
`claim term “document platform.” At issue is the meaning of claim term
`
`16
`
`Petitioner Apple Inc. - Ex. 1035, p. 16
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`“document platform,” not the methods steps performed by the document
`
`platform that fall within the scope of independent claim 1.
`
`
`
`Upon reviewing the disclosure of the ’072 patent in its entirety, we
`
`note that the term “document platform” only is discussed in the abstract and
`
`the original claims as filed. The discussion of a “document platform” in the
`
`abstract does not provide sufficient context for construing the claim term
`
`“document platform,” because the abstract merely summarizes the claim
`
`limitations recited in independent claims 1, 10, and 18.
`
`
`
`The specification of the ’072 patent does, however, discuss “a
`
`document playback platform” in the section labeled “Repository
`
`Transactions.” That section of the specification discloses the following:
`
`Transactions occur between two repositories (one acting as a
`server), between a repository and a document playback
`platform (e.g. for executing or viewing), between a repository
`and a credit server or between a repository and an authorization
`server.
`
`Ex. 1001, 26:25-29 (emphasis added). In our view, the discussion of “a
`
`document playback platform” set forth above provides sufficient context for
`
`construing the claim term “document platform.”
`
`
`
`Accordingly, applying the broadest reasonable interpretation
`
`consistent with the specification, we construe the claim term “document
`
`platform” as “any computing system that holds a digital document, such as
`
`software.” For example, a “document platform” may be a computing system
`
`that executes or views software.
`
`
`
`17
`
`Petitioner Apple Inc. - Ex. 1035, p. 17
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`D. Remaining Claim Terms
`
`
`
`All remaining claim terms recited in claims 1-25 are given their
`
`ordinary and customary meaning as would be understood by one with
`
`ordinary skill in the art and need not be further construed at this time.
`
`
`
`III. ANALYSIS
`
`A. 35 U.S.C. § 102(b) Ground of Unpatentability—EP ’139
`
`Claims 1, 10, and 18
`
`ZTE contends that claims 1-25 are anticipated under 35 U.S.C.
`
`§ 102(b) by EP ’139. Pet. 11-27. In particular, ZTE relies upon claim charts
`
`to explain how EP ’139 allegedly describes the subject matter recited in
`
`these claims, and the Declaration of Dr. Vijay K. Madisetti (Ex. 1015) to
`
`support its positions. Id. We are persuaded by ZTE’s analysis and
`
`supporting evidence.
`
`EP ’139 is directed to data processing in connection with a software
`
`copy protection mechanism. Ex. 1012, 1:4-6. In order to implement the
`
`software copy protection mechanism, EP ’139 discloses that each computer
`
`or host that runs a protected software application is associated with a
`
`logically and physically secure coprocessor. Ex. 1012, 1:25-29. For
`
`instance, EP ’139 discloses a source composite processor that includes
`
`source host 10 and source coprocessor 20, and a sink composite processor
`
`that includes sink host 110 and sink coprocessor 120. Ex. 1012, 25:49-52.
`
`The source host 10 and source coprocessor 20 are connected via
`
`communication link or path 14. Ex. 1012, 22:5-6. The source and sink
`
`18
`
`Petitioner Apple Inc. - Ex. 1035, p. 18
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`processors 10, 120 are interconnected via communication link 200. Ex.
`
`1012, 26:5-6. EP ’139 provides that only coprocessors that are “member[s]
`
`of the family” are capable of decrypting and recognizing the information
`
`transmitted thereto. Ex. 1012, 26:7-10, 20-23. EP ’139 then proceeds to
`
`disclose that source coprocessor 20 and sink coprocessor 120 exchange
`
`encrypted information. Ex. 1012, 26:10-20. EP ’139 also discloses that the
`
`source coprocessor 20 can encrypt a right to execute and send it to the sink
`
`coprocessor 120. Ex. 1012, 26:32-35.
`
`ContentGuard contends that EP ’139 does not disclose a “repository,”
`
`as recited in independent claim 1, 10, and 18. Prel. Resp. 31-33. ZTE
`
`proposes two alternative readings of EP ’139, only one of which properly
`
`accounts for the claimed “repository.” Pet. 13-14, 18. In particular, ZTE
`
`takes the position that either disk 16 or, alternatively, source computing
`
`system 10, 20 constitutes the claimed “repository.” Id. We agree with the
`
`latter position.
`
`As set forth above, we have construed a “repository” as “a trusted
`
`system which maintains physical, communications and behavioral integrity,
`
`and supports usage rights.” According to our claim construction, physical
`
`integrity is “preventing access to information by a non-trusted system;”
`
`communications integrity is “only communicates with other devices that are
`
`able to present proof that they are trusted systems, for example, by using
`
`security measures such as encryption, exchange of digital certificates, and
`
`nonces;” and behavioral integrity is “requiring software to include a digital
`
`certificate in order to be installed in the repository.”
`
`19
`
`Petitioner Apple Inc. - Ex. 1035, p. 19
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`EP ’139 discloses that source computing system 10, 20 possesses
`
`physical integrity by “preventing access to information by a non-trusted
`
`system.” That is, EP ’139 discloses that each computer or host that runs a
`
`protected software application is associated with a logically and physically
`
`secure coprocessor—in this case, source computing system 10, 20. Ex.
`
`1012, 1:25-29. EP ’139 also discloses that source computing system 10, 20
`
`possesses communications integrity because it “only communicates with
`
`other devices that are able to present proof that they are trusted systems, e.g.,
`
`by using security measures such as encryption, exchange of digital
`
`certificates, and nonces.” Source coprocessor 20 ensures that sink
`
`coprocessor 120 is a “member of the family” by exchanging encrypted
`
`information therebetween. Ex. 1012, 26:7-23. EP ’139 further discloses that
`
`source computing system 10, 20 possesses behavioral integrity by “requiring
`
`software to include a digital certificate in order to be installed.” Source
`
`coprocessor 20 encrypts a right to execute the protected software application
`
`prior to sending it to sink coprocessor 120. Ex. 1012, 26:32-35.
`
`ContentGuard also contends that EP ’139 does not disclose a
`
`“document platform” that performs the “determining” method step recited in
`
`independent claims 1 and 10. Prel. Resp. 33-35. ZTE proposes two
`
`alternative readings of EP ’139, each of which properly accounts for the
`
`claimed “document platform” that performs the “determining” method step
`
`recited in independent claims 1 and 10. Pet. 15-16, 18-19. In particular,
`
`ZTE takes the position that source computing system 10, 20 or, alternatively,
`
`sink computing system 110, 120 constitutes the claimed “document
`
`20
`
`Petitioner Apple Inc. - Ex. 1035, p. 20
`
`

`

`Case IPR2013-00133
`U.S. Patent No. 7,523,072
`
`
`platform” that performs the “determining” method step. We agree with both
`
`positions.
`
`As set forth above, we have construed a “document platform” as “any
`
`computing system that holds a digital document, such as software.” For
`
`example, a “document platform” may be a computing system that executes
`
`or views software. EP ’139 discloses that as long as the right to execute
`
`associated with the protected software application is retained in the memory
`
`of either source

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket