throbber
Trials@uspto.gov
`571-272-7822
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` Paper 15
`
`
` Entered: July 9, 2013
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`
`
`ZTE CORPORATION AND ZTE (USA) INC.
`Petitioners
`
`v.
`
`CONTENTGUARD HOLDINGS, INC.
`Patent Owner
`
`
`
`Case IPR2013-00139
`Patent 7,269,576
`
`
`
`Before JAMESON LEE, MICHAEL W. KIM, and MICHAEL R. ZECHER,
`Administrative Patent Judges.
`
`LEE, Administrative Patent Judge.
`
`
`DECISION
`Institution of Inter Partes Review
`37 C.F.R. § 42.108
`
`
`
`
`
`Petitioner Apple Inc. - Ex. 1038, p. 1
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`
`I.
`
`INTRODUCTION
`
`ZTE Corporation and ZTE (USA) Inc. (“ZTE”) filed a petition requesting an
`inter partes review of claims 1-36 of U.S. Patent No. 7,269,576 (Ex. 1001, “the
`’576 patent”). (Paper 2.) ZTE also filed a corrected petition. (Paper 9, “Pet.”)
`The patent owner, ContentGuard Holdings, Inc. (“ContentGuard”) filed a
`preliminary response. (Paper 14, “Prel. Resp.”) We have jurisdiction under
`35 U.S.C. § 314.
`The standard for instituting an inter partes review is set forth in 35 U.S.C.
`§ 314(a) which provides as follows:
`THRESHOLD -- The Director may not authorize an inter partes
`review to be instituted unless the Director determines that the
`information presented in the petition filed under section 311 and any
`response filed under section 313 shows that there is a reasonable
`likelihood that the petitioner would prevail with respect to at least 1 of
`the claims challenged in the petition.
`
`Upon consideration of the corrected petition and ContentGuard’s
`preliminary response, we determine that the information presented by ZTE
`establishes that there is a reasonable likelihood that ZTE would prevail in showing
`the unpatentability of claims 18-21, 25-28, and 31-36 of the’576 patent.
`Accordingly, we grant the petition and only institute an inter partes review of
`claims 18-21, 25-28, and 31-36 of the ’576 patent.
`A. Related Proceedings
`
`ZTE indicates that the ’576 patent is involved in co-pending litigation
`captioned ContentGuard Holdings Inc. v. ZTE Corp. et al., Case No. 3:12-cv-
`01226 (S.D. Cal.). (Pet. 1.)
`
`2
`
`Petitioner Apple Inc. - Ex. 1038, p. 2
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`
`ZTE also filed five other petitions seeking inter partes review of the
`following patents: U.S. Patent No. 7,523,072 (IPR2013-00133); U.S. Patent No.
`7,225,160 (IPR2013-00134); U.S. Patent No. 7,359,884 (IPR2013-00136); U.S.
`Patent No. 6,963,859 (IPR2013-00137); and U.S. Patent No. 7,139,736 (IPR2013-
`00138). (Pet. 1.)
`
`B. The ’576 Patent
`
`The subject matter of the ’576 patent relates to the distribution of digitally
`encoded works and the enforcement of usage rights. (Ex. 1001, 1:5-6.) According
`to the ’576 patent, an issue facing the publishing and information industries is how
`to prevent the unauthorized and unaccounted distribution or usage of electronically
`published materials. (Ex. 1001, 1:10-13.) In particular, a major concern,
`according to the ’576 patent, is the ease with which electronically published works
`can be “perfectly” reproduced and distributed. (Ex. 1001, 1:24-25.) According to
`the ’576 patent, one way to curb unaccounted distribution is to prevent
`unauthorized copying and transmission. (Ex. 1001, 1:44-46.) Another way,
`according to the ’576 patent, is to distribute software which requires a “key” to
`enable its use. (Ex. 1001, 1:60-61.) The ’576 patent discloses that while such
`distribution and protection schemes prevent unauthorized distributions, they do so
`by sacrificing the potential for subsequent revenue bearing uses. (Ex. 1001, 2:56-
`60.) For example, the ’576 patent discloses that it may be desirable to allow the
`lending of a purchased work to permit exposure of the work to potential buyers,
`permit the creation of a derivative work for a fee, or permit copying the work for a
`fee. (Ex. 1001, 2:60-65.) The ’576 patent discloses that it solves these problems
`
`3
`
`Petitioner Apple Inc. - Ex. 1038, p. 3
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`by both permanently attaching usage rights to digital works, and by placing
`elements in repositories, which store and control the digital works and enforce the
`usage rights associated therewith. (Ex. 1001, 3:53-4:15.)
`Figure 1 of the ’576 patent illustrates the basic operations of the disclosed
`invention. (Ex. 1001, 4:31-34, 6:66-7:1). Figure 1 of the ’736 patent is reproduced
`below:
`
`Figure 1 illustrates the basic operations of repositories 1 and 2.
`
`According to the embodiment of Figure 1, at step 101, a creator creates a
`digital work. (Ex. 1001, 7:1-2.) At step 102, the creator determines the
`
`
`
`4
`
`Petitioner Apple Inc. - Ex. 1038, p. 4
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`appropriate usage rights and fees, attaches them to the digital work, and stores the
`digital work with the associated usage rights and fees in repository 1. (Ex. 1001,
`7:2-7.) At step 103, repository 1 receives a request to access the digital work from
`repository 2. (Ex. 1001, 7:7-9.) Such a request, or session initiation, includes
`steps that help ensure that repository 1 and repository 2 are trustworthy. (Ex. 1001,
`7:7-12.) At step 104, repository 2 requests access to the digital work stored in
`repository 1 for a stated purpose, e.g., to print the digital work or obtain a copy of
`the digital work. (Ex. 1001, 7:13-17.) At step 105, repository 1 checks the usages
`rights associated with the digital work stored therein to determine if access to the
`digital work may be granted. (Ex. 1001, 7:17-24.) At step 106, if access is denied,
`repository 1 terminates the session with repository 2 by transmitting an error
`message. (Ex. 1001, 7:24-25.) At step 107, if access is granted, repository 1
`transmits the digital work to repository 2. (Ex. 1001, 7:25-27.) At step 108, both
`repository 1 and 2 generate billing information prior to transmitting the billing
`information to a credit server. (Ex. 1001, 7:27-30.) The use of both repositories 1
`and 2 for billing prevents attempts to circumvent the billing process. (Ex. 1001,
`7:30-31.)
`One embodiment described in the ’576 patent relates to enforcing usage
`rights in rendering systems. (Ex. 1001, 8:16-67.) Rendering systems are systems
`that can render a digital work into its desired form, such as by printing a file on a
`printer or executing a software program in a processor. (Ex. 1001, 8:19-22, 8:37-
`38, 8:53-55.) Other examples of rendering systems include display, video, or
`audio systems. (Ex. 1001, 51:65-67.) Rendering systems include repositories that
`store digital works and maintain the security features of the ’576 patent. (Ex.
`
`5
`
`Petitioner Apple Inc. - Ex. 1038, p. 5
`
`

`

`Case IPPR2013-00139
`
`
`
`
`Patent 77,269,576
`
`
`
`
`
`
`:25-34.) RRepositoriees in renderring systemms can requuest to
`:22-23, 12
`1001, 8
`
`
`
`
`
`
`
`performm various uusage transaactions, suuch as play or print trransactionss, that obta
`in a
`
`
`
`
`
`
`
`
`ing hed renderio an attachprovide it todigital wwork from a remote rrepository and then p
`
`
`
`device tto be rendeered. (Ex. 1001, 30:223-35, 36:118-37:26.)
`
`
`
`
`FFigure 4a o
`
`
`patent is reeproduced d below:
`f the ’576
`
`
`
`
`
`example oFiggure 4a illuustrates an of a renderiing systemm
`
`
`
`AAccording tto the embbodiment of Figure 4aa, a printerr system (4401), includding
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a print ddevice (4033) and a prrinter repossitory (4022), is attachhed to an eexternal
`
`
`
`
`
`
`
`repositoory (404) thhat containns digital wworks. (Exx. 1001, 8:226-29, 48-551.) The
`
`
`
`
`
`
`
`printer rrepository can obtainn a copy off the digitall work to bbe providedd to the
`
`
`
`
`
`
`
`renderinng device. (Ex. 10011, 8:36-38.)) That is aaccomplishhed by invooking a
`
`
`
`
`
`
`
`specificc type of ussage transaaction calleed a print trransactionn. (Ex. 10001, 36:55-
`
`
`
`
`
`
`
`
`37:26.) A print transaction bbegins withh a requesttor repositoory sendinng a messagge
`
`
`
`
`
`
`
`requestiing permission to obttain and prrint a speciified digitaal work thaat is stored
`in a
`
`
`
`
`
`
`
`
`server rrepository. (Ex. 10011, 36:55-377:26.) Certtain renderring transaactions requuire
`6
`
`Petitioner Apple Inc. - Ex. 1038, p. 6
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`the presence of a digital ticket or an authorization object in a repository requesting
`a digital work before the digital work can be provided. (Ex. 1001, 36:45-46,
`37:18-19, 31:6-9.) Repositories acquire digital tickets through authorization
`transactions that request authorization objects from a remote authorization
`repository. (Ex. 1001, 41:31-42:16.) If the repository requesting the digital work
`is in possession of an authorization object, the server repository determines
`whether the requestor is permitted to perform the transaction based on usage rights
`related to the digital work. (Ex. 1001, 36:45-46, 37:18-19, 30:59-31:49.) Once the
`transaction is determined as being permitted, the digital work is transmitted to the
`repository requesting the digital work, and then the digital work is rendered. (Ex.
`1001, 36:47-50, 37:20-22.)
`
`C. Exemplary Claims
`
`Claims 1 and 18 are independent claims and are directed, respectively, to an
`apparatus and a method. Claims 2-17 directly or indirectly depend from claim 1,
`and claims 19-36 directly or indirectly depend from claim 18. Claims 1 and 18 are
`reproduced below, with a key term bolded for emphasis:
`1. An apparatus for rendering digital content in accordance
`with rights that are enforced by the apparatus, said apparatus
`comprising:
`
` a
`
` a
`
` rendering engine configured to render digital content;
`
` storage for storing the digital content;
`
`
`means for requesting use of the digital content stored in the
`storage; and
`
`
`7
`
`Petitioner Apple Inc. - Ex. 1038, p. 7
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`
`a repository coupled to the rendering engine,
`
`wherein the repository includes:
`
`means for processing a request from the means for requesting,
`
`means for checking whether the request is for a permitted
`rendering of the digital content in accordance with rights specified in
`the apparatus,
`
`means for processing the request to make the digital content
`available to the rendering engine for rendering when the request is for
`a permitted rendering of the digital; and
`
`means for authorizing the repository for making the digital
`content available for rendering, wherein the digital content can be
`made available for rendering only by an authorized repository, the
`repository comprising:
`
`means for making a reauest [sic] for an authorization object
`required to be included within the repository for the apparatus to
`render the digital content; and
`
`means for receiving the authorization object when it is
`determined that the request should be granted.
`
`18. A method for controlling rendering of digital content on
`an apparatus having a rendering engine configured to render digital
`content and a storage for storing the digital content, said method
`comprising:
`
`specifying rights within said apparatus for digital content stored
`in said storage, said rights specifying how digital content can be
`rendered;
`
`storing digital content in said storage;
`8
`
`Petitioner Apple Inc. - Ex. 1038, p. 8
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`
`
`receiving a request for rendering of said digital content stored in
`the storage;
`
`checking whether said request is for a permitted rendering of
`said digital content in accordance with said rights specified within
`said apparatus;
`
`processing the request to make said digital content available to
`the rendering engine for rendering when said request is for a permitted
`rendering of said digital content;
`
`authorizing a repository for making the digital content
`available for rendering, wherein the digital content can be made
`available for rendering only by an authorized repository, the
`repository performing the steps of:
`
`making a request for an authorization object reguired [sic] to be
`included within the repository for rendering of the digital content; and
`
`receiving the authorization object when it is determined that the
`request should be granted.
`
`
`D. Prior Art Relied Upon
`
`ZTE relies upon the following prior art references:
`
`Eur. Pat. Publ’n 0 268 139 (“EP ’139”) May 25, 1988
`Eur. Pat. Publ’n 0 464 306 (“EP ’306”)
`Jan. 8, 1992
`Hendricks
`
`U.S. Patent 5,986,690 Nov. 16, 1999
`Walker
`
`U.S. Patent 4,868,736
`Sept. 19, 1989
`Wyman
`
`U.S. Patent 5,260,999 Nov. 9, 1993
`
`(Ex. 1012)
`(Ex. 1010)
`(Ex. 1013)
`(Ex. 1011)
`(Ex. 1014)
`
`
`
`
`
`
`
`
`9
`
`Petitioner Apple Inc. - Ex. 1038, p. 9
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`
`E.
`
`The Alleged Grounds of Unpatentability
`
`ZTE contends that the challenged claims are unpatentable based on the
`following grounds:
`1. Claims 1-4, 8-11, 14-21, 25-28, and 31-36 are unpatentable under
`35 U.S.C. § 102(b) as anticipated by EP ’139;
`2. Claims 1, 2, 4-9, 12-15, 17-19, 21-26, 29-32, and 34-36 are unpatentable
`under 35 U.S.C. § 102(b) as anticipated by Walker;
`3. Claims 1-4, 7-15, 17-21, 24-32, and 34-36 are unpatentable under
`35 U.S.C. § 102(e) as anticipated by Hendricks;
`4. Claims 1, 2, 4-6, 8-12, 15, 16, 18, 19, 21-23, 25-29, 32, 33, 35, and 36 are
`unpatentable under 35 U.S.C. § 102(b) as anticipated by EP ’306; and
`5. Claims 5, 6, 22, and 23 are unpatentable under 35 U.S.C. § 103(a) as
`obvious over Hendricks in view of Wyman.
`
`
`
`II. ANALYSIS
`
`A. Claim Construction
`
`In an inter partes review, claim terms in an unexpired patent are interpreted
`according to their broadest reasonable construction in light of the specification of
`the patent in which they appear. 37 C.F.R. § 42.100(b). Also, claim terms are
`given their ordinary and customary meaning as would be understood by one of
`ordinary skill in the art in the context of the entire disclosure. Phillips v. AWH
`Corp., 415 F.3d 1303, 1313 (Fed. Cir. 2005) (en banc). An inventor may rebut that
`presumption by providing a definition of the term in the specification with
`
`10
`
`Petitioner Apple Inc. - Ex. 1038, p. 10
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`reasonable clarity, deliberateness, and precision. In re Paulsen, 30 F.3d 1475,
`1480 (Fed. Cir. 1994).
`ContentGuard submits a proposed construction for the claim term
`“repository.” (Prel. Resp. 20-23.) We also note that in independent claim 1 there
`are numerous elements recited in means-plus-function format under 35 U.S.C.
`§ 112, sixth paragraph, within the repository. We will construe each of these claim
`limitations in turn.
`1. “Repository” (Independent Claims 1 and 18)
`
`ContentGuard contends that the term “repository” should be interpreted as
`“a trusted system for supporting usage rights.” (Prel. Resp. 21.) ContentGuard
`cites several portions of the specification which support that construction. (Prel.
`Resp. 21-23, citing Ex. 1001, 4:6-7, 6:50-54, 12:25-34, , 13:25-33, 13:51-56, 52:1-
`6.) ZTE does not provide an explicit construction for “repository.”
`The specification provides a glossary which recites the following meaning
`for “repository”:
`Conceptually a set of functional specifications defining core
`functionality in the support of usage rights. A repository is a trusted
`system
`in that
`it maintains physical, communications and
`behavioral integrity.
`
`(Ex. 1001, 52:1-6, emphasis added.) By setting forth the term in a glossary and
`using the verb “is” following “repository” in the second sentence, the specification
`sets forth an explicit definition of “repository” as “a trusted system in that it
`maintains physical, communications and behavioral integrity.” The first sentence
`is also relevant to the definition of “repository” because it elaborates that the
`
`11
`
`Petitioner Apple Inc. - Ex. 1038, p. 11
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`repository supports usage rights. Accordingly, we construe “repository” as “a
`trusted system which maintains physical, communications and behavioral integrity,
`and supports usage rights.”
`Our analysis does not end here. In order to understand “a trusted system” it
`is necessary to construe “physical integrity,” “communications integrity,” and
`“behavioral integrity.” Those terms are described in a section of the specification
`labeled “[r]epositories.” For “physical integrity,” the specification describes:
`Physical integrity refers to the integrity of the physical devices
`themselves. Physical integrity applies both to the repositories and
`to the protected digital works. Thus, the higher security classes of
`repositories themselves may have sensors that detect when tampering
`is attempted on their secure cases. In addition to protection of the
`repository itself, the repository design protects access to the
`content of digital works. In contrast with the design of conventional
`magnetic and optical devices-such as floppy disks, CD-ROMs, and
`videotapes-repositories never allow non-trusted systems to access
`the works directly. A maker of generic computer systems cannot
`guarantee that their platform will not be used to make unauthorized
`copies. The manufacturer provides generic capabilities for reading
`and writing information, and the general nature of the functionality of
`the general computing device depends on it. Thus, a copy program
`can copy arbitrary data. This copying issue is not limited to general
`purpose computers. It also arises for the unauthorized duplication of
`entertainment “software” such as video and audio recordings by
`magnetic recorders. Again, the functionality of the recorders depends
`on their ability to copy and they have no means to check whether a
`copy is authorized. In contrast, repositories prevent access to the
`raw data by general devices and can test explicit rights and
`conditions before copying or otherwise granting access. Information
`is only accessed by protocol between trusted repositories.
`
`
`
`
`
`
`12
`
`Petitioner Apple Inc. - Ex. 1038, p. 12
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`(Ex. 1001, 12:35-61; emphasis added.) Much of the above description makes use
`of permissive terms such as “may” and “can” and, thus, do not reflect or indicate a
`required limitation for physical integrity. The specification also appears to use the
`terms or phrases in each of the following three groups interchangeably:
`1. data, content, digital work, information;
`2. non-trusted system, general device; and
`3. “never allow access” and “prevent access.”
`When referring to the relationship between the repository and data, the
`specification uses absolute terms such as “never” and “only.”
`In light of the foregoing, we construe “physical integrity” as “preventing
`access to information by a non-trusted system.”
`For “communications integrity,” the specification describes the following:
`Communications
`integrity
`refers
`to
`the
`integrity of
`the
`communications channels between repositories. Roughly speaking,
`communications integrity means that repositories cannot be easily
`fooled by “telling them lies.” Integrity in this case refers to the
`property that repositories will only communicate with other devices
`that are able to present proof that they are certified repositories,
`and furthermore, that the repositories monitor the communications to
`detect “impostors” and malicious or accidental interference. Thus the
`security measures involving encryption, exchange of digital
`certificates, and nonces described below are all security measures
`aimed at reliable communication in a world known to contain active
`adversaries.
`
`(Ex. 1001, 12:62-13:7; emphasis added.) We construe “communications integrity”
`as “only communicates with other devices that are able to present proof that they
`are trusted systems, for example, by using security measures such as encryption,
`
`13
`
`Petitioner Apple Inc. - Ex. 1038, p. 13
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`exchange of digital certificates, and nonces.” The Encyclopedia of Cryptography
`defines “nonce” as “[a] number used in a cryptographic protocol to indicate the
`unique character of a message.” Newton, David E., Encyclopedia of Cryptography
`197 (1997).
`For “behavioral integrity,” the specification describes:
`Behavioral integrity refers to the integrity in what repositories do.
`What repositories do is determined by the software that they execute.
`The integrity of the software is generally assured only by knowledge
`of its source. Restated, a user will trust software purchased at a
`reputable computer store but not trust software obtained off a random
`(insecure) server on a network. Behavioral integrity is maintained
`by requiring that repository software be certified and be
`distributed with proof of such certification,
`i.e. a digital
`certificate. The purpose of the certificate is to authenticate that the
`software has been tested by an authorized organization, which attests
`that the software does what it is supposed to do and that it does not
`compromise the behavioral integrity of a repository. If the digital
`certificate cannot be found in the digital work or the master
`repository which generated the certificate is not known to the
`repository receiving the software, then the software cannot be
`installed.
`
`(Ex. 1001, 13:8-33; emphasis added.) We construe “behavioral integrity” in the
`context of a repository as “requiring software to include a digital certificate in
`order to be installed in the repository.”
`The record is not without evidence in contrary to our interpretation. That is
`not unusual. The nature of interpretation is to come to the appropriate conclusion
`in light of all of the evidence. All of the evidence does not have to point uniformly
`in a single direction.
`
`
`
`
`14
`
`Petitioner Apple Inc. - Ex. 1038, p. 14
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`
`The specification in Table 2 indicates ten different levels of security for
`repositories, and the lowest level, i.e., level “0,” is described as follows:
`Open system. Document transmission is unencrypted. No digital
`certificate is required for identification. The security of the system
`depends mostly on user honesty, since only modest knowledge may
`be needed to circumvent the security measures. The repository has no
`provisions for preventing unauthorized programs from running and
`accessing or copying files. The system does not prevent the use of
`removable storage and does not encrypt stored files.
`
`(Ex. 1001, 15:30-41.) Thus, according to Table 2, repositories are not all trusted
`systems. Level “0” security means having an open system lacking in physical,
`communications, and behavioral integrity, and without support for managing usage
`rights. That is directly contrary to the meaning of “repository” as defined in the
`glossary. For reasons discussed below, we adhere to the definition provided in the
`glossary. The contrary evidence based on level “0” security shown in Table 2 is
`insufficient to outweigh the rest of the evidence including, in particular, the
`explicit definition provided in the glossary. We make our determination based on
`the totality of the evidence.
`As noted above, the disclosed invention is about distribution of and usage
`rights enforcement of digital works. The problems described in the background
`portion of the specification concerns unauthorized and unaccounted distribution or
`usage of electronically published materials. (Ex. 1001, 1:24-43.) The ’576 patent
`states that it solves preexisting problems by both permanently attaching usage
`rights to digital works and placing elements in repositories which enforce those
`usage rights. (Ex. 1001, 3:53-4:15.)
`
`
`15
`
`Petitioner Apple Inc. - Ex. 1038, p. 15
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`
`Here, the definition set forth in the glossary for “repository” is fully
`consistent with the description of the acknowledged prior art and the objective or
`goal to be achieved by the invention. The specification also contains detailed
`preferred embodiments utilizing repositories which are trusted systems to provide
`usage control for digital works. (Ex. 1001, 12:25-34, 26:20-44, 43:36-50:26.)
`The bulk of the disclosure consistently is directed to repositories which are
`trusted systems for providing usage control for digital works. For example, the
`specification states:
`The enforcement elements of the present invention are embodied
`in repositories. Among other things, repositories are used to store
`digital works, control access to digital works, bill for access to digital
`works and maintain the security and integrity of the system.
`
`(Ex. 1001, 6:50-54, emphasis added.) Other references to “repository” in the
`specification that recite necessary features of repositories also support the
`definition in the glossary that a repository is a trusted system.
`The core repository services 1302 comprise a set of functions
`required by each and every repository. The core repository
`services 1302 include the session initiation transactions which are
`defined in greater detail below. This set of services also includes a
`generic ticket agent which is used to “punch” a digital ticket and a
`generic
`authorization
`server
`for
`processing
`authorization
`specifications.
`
`(Ex. 1001, 14:45-51, emphasis added.) In another example, the specification
`discloses that “[a]s a prerequisite to operation, a repository will require possession
`of an identification certificate” and that “identification certificates 1306 are
`required to enable the use of the repository.” (Ex. 1001, 13:42-44, 14:56-57.)
`
`16
`
`Petitioner Apple Inc. - Ex. 1038, p. 16
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`Indeed, by using words such as “require” and “required,” such examples amply
`support the definition provided in the glossary that a repository is a trusted system.
`
`In summary, the weight of the evidence supports the definition provided in
`the glossary, even applying the rule of broadest reasonable construction consistent
`with the specification. We regard as significant that the definition states in no
`equivocal manner that a repository “is a trusted system.”
`2. Repository “means for …” (Claim 1)
`
`Independent claim 1 recites a repository including six different means-plus-
`function claim elements. The meaning of a means-plus-function limitation is
`governed by 35 U.S.C. § 112, sixth paragraph, which provides:1
`An element in a claim for a combination may be expressed as a means
`or step for performing a specified function without the recital of
`structure, material, or acts in support thereof, and such claim shall be
`construed to cover the corresponding structure, material, or acts
`described in the specification and equivalents thereof.
`
`The above-quoted requirement applies regardless of the context in which the
`
`meaning of a means-plus-function claim element arises, i.e., whether in a
`proceeding before the Patent and Trademark Office, or in validity or infringement
`litigation before the courts. In re Donaldson, 16 F.3d 1189, 1193 (Fed. Cir.
`1994)(en banc). More importantly, the established law regarding 35 U.S.C. § 112,
`
`
`1 Section 4(c) of the America Invents Act (“AIA”) re-designated 35 U.S.C. § 112,
`¶ 6, as 35 U.S.C. § 112(f). Because the ’576 patent has a filing date prior to
`September 16, 2012, the effective date of AIA, we refer to the pre-AIA version of
`35 U.S.C. § 112.
`
`17
`
`Petitioner Apple Inc. - Ex. 1038, p. 17
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`sixth paragraph, as applied to computer-implemented means-plus-function
`elements, is articulated in Finisar Corp. v. DirecTV Group, Inc., 523 F.3d 1323,
`1340 (Fed. Cir. 2008):
`For computer-implemented means-plus-function claims where the
`disclosed structure is a computer programmed to implement an
`algorithm, “the disclosed structure is not the general purpose
`computer, but rather the special purpose computer programmed to
`perform the disclosed algorithm.” WMS Gaming, Inc. v. Int’l Game
`Tech., 184 F.3d 1339, 1349 (Fed. Cir. 1999). Thus the patent must
`disclose, at least to the satisfaction of one of ordinary skill in the art,
`enough of an algorithm to provide the necessary structure under 35
`U.S.C. § 112, ¶ 6. This court permits a patentee to express that
`algorithm in any understandable terms including as a mathematical
`formula, in prose, see In re Freeman, 573 F.2d 1237, 1245-46 (CCPA
`1978), or as a flow chart, or in any other manner that provides
`sufficient structure.
`
`The above-quoted law of 35 U.S.C. § 112, sixth paragraph, is well
`
`established. In Aristocrat Techs. Austl. Pty Ltd. v. Int’l Game Tech., 521 F.3d
`1328, 1333 (Fed. Cir. 2008), the Court of Appeals for the Federal Circuit stated:
`
`In cases involving a computer-implemented invention in which the
`inventor has invoked means-plus-function claiming, this court has
`consistently required
`that
`the structure disclosed
`in
`the
`specification be more than simply a general purpose computer or
`microprocessor. The point of the requirement that the patentee
`disclose particular structure in the specification and that the scope of
`the patent claims be limited to that structure and its equivalents is to
`avoid pure functional claiming.
`
`(Emphasis added.)
`
`
`
`
`18
`
`Petitioner Apple Inc. - Ex. 1038, p. 18
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`More recently, the Federal Circuit also indicated that generally disclosing
`
`software without providing detail is not enough disclosure of structure. Function
`Media, L.L.C. v. Google Inc., 708 F.3d 1310, 1318 (Fed. Cir. 2013). In that regard,
`the Federal Circuit stated that when dealing with a special purpose computer-
`implemented means-plus-function limitation, the specification must disclose the
`algorithm for performing the function and that the specification can express the
`algorithm in any understandable terms, such as mathematical formula, prose, or
`flow chart. Id.
`
`Claim 1 is directed towards a system including a repository comprising,
`within it, six means-plus-function claim elements. Each of these claim elements is
`recited in the form of a means for performing a function without recital of any
`structure. As such, they are presumed to have invoked 35 U.S.C. § 112, sixth
`paragraph. Personalized Media Communications LLC v. Int’l Trade Comm’n, 161
`F.3d 696, 703-04 (Fed. Cir. 1998); Sage Prods. v. Devon Indus., Inc., 126 F.3d
`1420, 1427-28 (Fed. Cir. 1997).
`For each of the six means-plus-function elements, ZTE points to processing
`means 1200 as the corresponding structure disclosed in the specification, with the
`sixth means also including external interface 1206. (Pet. 9.) Processing means
`1200 as disclosed in the specification of the ’576 patent is comprised of processor
`element 1201, which may be a microprocessor or other suitable computing
`component, and processor memory 1202 which contains software used by the
`processor. (Ex. 1001, 13:59 to 14:10.) As presented by ZTE, the corresponding
`computing structure for each of the computer-implemented means is no more than
`
`19
`
`Petitioner Apple Inc. - Ex. 1038, p. 19
`
`

`

`Case IPR2013-00139
`Patent 7,269,576
`
`a general purpose computer with generally referenced software. That, however, is
`incorrect.
`
`A general purpose computer executing generally referenced software is
`insufficient to constitute corresponding structure of a claim element expressed in
`means-plus-function form under 35 U.S.C. § 112, sixth paragraph. Finisar,
`523 F.3d at 1340; Aristocrat, 521 F.3d at 1333; see also Function Media, 708 F.3d
`at 1318. Instead, the structure of a computer-implemented means must be a
`“special purpose computer programmed to perform [a] disclosed algorithm.”
`Finisar, 523 F.3d at 1340. In that regard, the specification must disclose the
`computer executed algorithm for performing the recited function, and the
`specification can express the algorithm in any understandable terms, such as
`mathematical formula, prose, or flow chart. Function Media, 708 F.3d at 1318.
`Hereinbelow, we consider each of the six means-plus-function claim
`elements and find algorithms sufficiently expressed in prose, which, in
`combination with the disclosed processor, form their corresponding structures.
`a. means for processing a request from the means for
`requesting;
`
`Claim 1 recites that the repository includes “means for processing a
`request from the means for requesting.” In the context of

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket