throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________
`
`TCL CORPORATION; TCL COMMUNICATION TECHNOLOGY HOLDINGS
`LTD.; TCT MOBILE LIMITED; TCT MOBILE INC.; and TCT MOBILE (US),
`INC.,
`
`Petitioners,
`
`v.
`
`TELEFONAKTIEBOLAGET LM ERICSSON
`
`Patent Owner.
`____________
`
`IPR2015-01628
`
`Patent 7,149,510
`
`____________
`
`DECLARATION OF SEAD MUFTIC, PH.D.
`
`
`
`
`
`
`
`Ericsson Ex. 2010, Page 1
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`TABLE OF CONTENTS
`
`I.
`
`Qualifications ................................................................................................... 1
`
`II. My Status as an Independent Expert Witness ................................................. 4
`
`III. Materials Considered ....................................................................................... 5
`
`IV. Understanding of the Law ............................................................................... 6
`
`A. A Person Having Ordinary Skill in the Relevant Field During the
`Relevant Timeframe ................................................................................... 6
`
`B. Claim Construction ..................................................................................... 8
`
`C. Anticipation ................................................................................................ 9
`
`D. Obviousness ................................................................................................ 9
`
`V. Description of the Relevant Field aT the Relevant Timeframe .................... 11
`
`VI. The ‘510 Patent .............................................................................................. 13
`
`VII. Prosecution History of the ‘510 Patent .......................................................... 24
`
`VIII. Claim Interpretation ....................................................................................... 24
`
`IX. Discussion of Relevant Prior Art ................................................................... 25
`
`E. Summary of Usui ...................................................................................... 28
`
`1. IT Environment ................................................................................. 28
`
`2. The Problem ...................................................................................... 29
`
`3. Approach/Solution ............................................................................ 30
`
`4. Type of Non-native Applications ..................................................... 31
`
`5. Invocation Mechanism ..................................................................... 31
`
`6. Decision Process ............................................................................... 31
`
`7. Parameters in Access Policies .......................................................... 31
`
`
`
`i
`
`Ericsson Ex. 2010, Page 2
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`8. Summary and Recapitulation of the Ideas from Usui ...................... 32
`
`F. Summary of Gong ...................................................................................... 32
`
`1. IT Environment ................................................................................. 32
`
`2. The Problem ...................................................................................... 35
`
`3. Approach/Solution ............................................................................ 36
`
`4. Type of Non-native Applications ..................................................... 37
`
`5. Invocation Mechanism ..................................................................... 38
`
`6. Decision Process ............................................................................... 40
`
`7. Parameters in Access Policies .......................................................... 40
`
`8. Summary and Recapitulation of the Ideas from Gong ..................... 41
`
`G. Summary of Ramamurthy ........................................................................ 42
`
`1. IT Environment ................................................................................. 43
`
`2. The Problem ...................................................................................... 44
`
`3. Approach/Solution ............................................................................ 45
`
`4. Type of Non-native Applications ..................................................... 46
`
`5. Invocation Mechanism ..................................................................... 46
`
`6. Decision Process ............................................................................... 47
`
`7. Parameters in Access Policies .......................................................... 48
`
`8. Summary and Recapitulation of the Ideas from Ramamurthy ......... 48
`
`H. Summary of Spencer ................................................................................ 50
`
`1. IT Environment ................................................................................. 50
`
`2. The Problem ...................................................................................... 51
`
`3. Approach/Solution ............................................................................ 52
`
`
`
`ii
`
`Ericsson Ex. 2010, Page 3
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`4. Type of Non-native Applications ..................................................... 53
`
`5. Invocation Mechanism ..................................................................... 54
`
`6. Decision Process ............................................................................... 55
`
`7. Parameters in Access Policies .......................................................... 55
`
`8. Summary and Recapitulation of the Ideas from Spencer ................. 56
`
`X. Hypothetical Attempted Derivations of Solutions by a Person of
`Ordinary Skill in the Art Based on Usui, Gong and Spencer ........................ 57
`
`A. The Process of A Person of Ordinary Skill .............................................. 57
`
`B. Summary of the Problem .......................................................................... 57
`
`C. Hypothetical Attempted Solution Based on Ideas from Usui .................. 58
`
`D. Hypothetical Attempted Solution Based on Ideas from Gong ................. 60
`
`E. Hypothetical Attempted Solution Based on Ideas from Ramamurthy ..... 65
`
`F. Hypothetical Attempted Solution Based on Ideas from Spencer .............. 66
`
`G. Hypothetical Attempted Solution Based on Combined Ideas
`From Usui, Gong, Ramamurthy, and Spencer ......................................... 69
`
`XI. General Comments on Differences Between the ‘510 Patent and
`the Prior Art ................................................................................................... 71
`
`XII. Patentability of the Challenged ‘510 Claims ................................................. 79
`
`A. Claim 11 Is Not Obvious Over Usui, Gong, and Ramamurthy ............... 79
`
`1. A Person of Ordinary Skill Would Not Have Been Motivated
`to Combine Usui, Gong, and Ramamurthy ...................................... 81
`
`1. Usui Does Not Disclose a “Software Services Component” ........... 92
`
`2. Usui’s “Access Controller” Does Not “Control Access to the
`Software Services Component” ........................................................ 93
`
`3. Gong Does Not Disclose a “Decision Entity” .................................. 96
`
`
`
`iii
`
`Ericsson Ex. 2010, Page 4
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`4. Ramamurthy Does Not Disclose an Interception Module
`that Includes a Cache With the Rules and Policies of the
`Decision Entity ................................................................................. 98
`
`B. Claim 11 Is Not Obvious Over Usui, Gong, Ramamurthy, and
`Spencer ...................................................................................................101
`
`XIII. Additional Comments on Dr. Malek’s Declaration .....................................102
`
`XIV. Conclusions ..................................................................................................149
`
`XIV. Availability for Cross-Examination ............................................................153
`
`XV. Right to Supplement ....................................................................................154
`
`XVI. Jurat ..............................................................................................................154
`
`
`
`iv
`
`Ericsson Ex. 2010, Page 5
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`I, Sead Muftic, Ph.D., declare as follows:
`
`I.
`
`QUALIFICATIONS
`1. My name is Sead Muftic. I have M.Sc. and Ph.D. degrees in the
`
`general area of IT security, with specialization in the area of cyber security. I have
`
`been actively working in this area for over 40 years and I am considered to be one
`
`of the world’s experts in the area of cyber security.
`
`2.
`
`I started my cyber security career in September 1973 when I enrolled
`
`into the M.Sc. program, and later continued with my Ph.D. studies, in the
`
`Department of Computer and Information Systems at the Ohio State University
`
`(Columbus, Ohio). I received my M.Sc. degree in December 1974 (after four
`
`quarters of studies) and subsequently I received my Ph.D. degree in June 1976
`
`(after an additional six quarters of studies). The title of my Ph.D. dissertation is
`
`“Design and Operations of the Secure Computer System.”
`
`3.
`
`Since receiving my Ph.D. degree in 1976, I have continued to work in
`
`the area of cyber security until today. Therefore, my professional career in the area
`
`of cyber security spans over 40 years.
`
`4.
`
`In these 40 years, I have been involved in three types of activities in
`
`the area of Internet and cyber security:
`
`5.
`
`Education and Research: I have been a full professor of computer
`
`security at four universities. Starting in 1978, I was associate professor at the
`
`
`
`1
`
`Ericsson Ex. 2010, Page 6
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`University of Sarajevo (Bosnia and Herzegovina). In 1990, I transferred to
`
`Stockholm University (Stockholm, Sweden) where I was elected as full professor
`
`of computer and Internet security. In 2004, I transferred to the Royal Institute of
`
`Technology – KTH (Stockholm, Sweden), again as the full / tenured professor.
`
`And finally, in the period of 2000 – 2006, I was a guest professor at The George
`
`Washington University – GWU (Washington, DC, USA). During my academic
`
`career of 38 years in Computer and Internet Security, I have taught advanced
`
`(M.Sc. and Ph.D.) courses, advising many M.Sc. and Ph.D. students and
`
`performing advanced research, resulting in many M.Sc. and Ph.D. dissertations and
`
`research publications in the area of Computer and Information Security. The
`
`details of all my courses, M.Sc. and Ph.D. theses, and research publications are
`
`given in Appendix A – Resume and Bibliography. I have published many research
`
`papers, project reports and three books by international publishers.
`
`6.
`
`Besides these four universities, I have often been invited in different
`
`roles to many other international universities, such as University College Dublin
`
`(Dublin, Ireland), University of Trento (Trento, Italy), University of Pireus
`
`(Athens, Greece), and Colombo University (Colombo, Sri Lanka).
`
`7.
`
`International Expertise and Consulting: My second type of
`
`professional activities in the area of Computer and Internet Security, which I
`
`pursued in parallel with my teaching activities, were my consulting, expertise and
`
`
`
`2
`
`Ericsson Ex. 2010, Page 7
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`project management activities. I have been actively involved in such activities for
`
`over 30 years.
`
`8.
`
`I have been engaged as an international expert and consultant by
`
`many international agencies and bodies, coordinating advanced research and
`
`development projects. I was engaged for many years by the EU as director of
`
`projects, coordinator of various promotion activities, evaluator of project
`
`proposals, and adviser to the EC/JRC. I was engaged by SIDA (Swedish
`
`International Development Agency) to coordinate a project in Sri Lanka, I was
`
`engaged by the IADB (Inter American Development Bank) to coordinate a project
`
`in Peru, I was consultant to the World Bank for their PKI project, and I was
`
`engaged in many U.S. government projects, cooperating with NIST, GSA, and
`
`several agencies of the U.S. federal government.
`
`9.
`
`Commercial Development / Deployment Activities: Since 1990,
`
`when I established my first commercial company in the area of computer security
`
`(Computer Security Technologies AB) in Sweden, I have been continuously and
`
`actively involved in the creation, distribution, and deployment of commercial
`
`products in the area of Computer and Internet Security. After COST AB in
`
`Sweden, I raised investment and incorporated my second company – Entegrity
`
`Solutions Corporation in Silicon Valley. After Entegrity, I created SETECS AB – a
`
`Swedish Company, which was later transferred to the USA as the still active
`
`
`
`3
`
`Ericsson Ex. 2010, Page 8
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`company SETECS, Inc. (based in Maryland). With all my companies, I have been
`
`actively involved in the commercial distribution of our security products. These
`
`products are very advanced and unique on the market, as our products are officially
`
`validated and certified by the U.S. government. We have NIST certificates, GSA
`
`approval, and validation for the U.S. government FedRAMP cloud security
`
`program.
`
`10. All my educational, research, consulting and commercial activities are
`
`strictly focused on the area of computer and Internet security and with all these
`
`activities, results, references and achievements, I feel that I am competent to
`
`provide this expert declaration about the issues in this matter.
`
`11. A copy of my latest CV is attached to this declaration as Appendix A.
`
`II. MY STATUS AS AN INDEPENDENT EXPERT WITNESS
`12.
`I have done no work (indirectly or directly) for either Petitioners or
`
`Patent Owner until Oblon hired me as an expert witness to work with it on this
`
`IPR.
`
`13.
`
`I am aware that the named inventors on U.S. Patent No. 7,149,510
`
`(“the ‘510 patent”) are Jonas Hansson and Björn Bjäre. I do not recognize these
`
`individuals’ names, and I believe that I have never met them.
`
`14.
`
`I have no financial interest in either Petitioners or Patent Owner.
`
`
`
`4
`
`Ericsson Ex. 2010, Page 9
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`15. Oblon hired me through an expert witness provider named Cahn
`
`Litigation Services (“Cahn”). Cahn is being compensated at the rate of $725/hr for
`
`my time in connection with this IPR proceeding. Cahn in turn pays me at the rate
`
`of $ 600/hr.
`
`III. MATERIALS CONSIDERED
`16.
`In forming my opinions expressed herein, I considered the following
`
`items, in addition to my own personal knowledge and experience:
`
`• The ‘510 patent and its prosecution history (Exhibits 1001 and
`
`1002);
`
`• The Petition filed by TCL and all exhibits cited therein, with
`
`particular focus on several listed below;
`
`• Kazutoshi Usui et al., Design and Implementation of Java
`
`Application Environment and Software Platform for Mobile
`
`Phones, 42 NEC Res. & Dev. 379 (“Usui”) (Exhibit 1010);
`
`• United States Patent No. 6,125,447 to Gong (“Gong”) (Exhibit
`
`1011);
`
`• United States Patent No. 7,080,077 to Ramamurthy
`
`(“Ramamurthy”) (Exhibit 1401);
`
`
`
`5
`
`Ericsson Ex. 2010, Page 10
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`• Ray Spencer et al., The Flask Security Architecture: System
`
`Support for Diverse Security Policies, Proceedings of the 8th
`
`USENIX Security Symposium (“Spencer”) (Exhibit 1019);
`
`• Nygard, “A Brief Look at Java 2 Micro Edition” (Exhibit
`
`2004);
`
`• Topley, “J2ME in a Nutshell” (Exhibit 2005);
`
`• SATSA: Security and Trust Services APIs for J2ME (JSR 177)
`
`(Exhibit 2007); and
`
`• 3GPP TS 22.057 document (Exhibit 2008).
`
`IV. UNDERSTANDING OF THE LAW
`17. For the purposes of this declaration, I have been informed about
`
`certain aspects of patent law that are relevant to my analysis and opinions, as set
`
`forth in this section of my declaration.
`
`A. A Person Having Ordinary Skill in the Relevant Field During the
`Relevant Timeframe
`18. Counsel has informed me that the disclosures of patents and prior art
`
`references are to be viewed from the perspective of a mythical person of ordinary
`
`skill in the relevant field (sometimes by lawyers referred to as “the relevant art”) at
`
`the relevant timeframe (a “POSITA”). Counsel has informed me that, for purposes
`
`of this IPR proceeding, I should interpret the term POSITA as referring to a
`
`mythical person to whom an expert in the relevant field could have assigned a
`6
`
`
`
`Ericsson Ex. 2010, Page 11
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`routine task with reasonable confidence that the task would be successfully carried
`
`out.
`
`19.
`
`I have been asked to provide my opinion regarding the “level of
`
`ordinary skill in the art” at the time of the invention, which I have been told is on
`
`or before September 23, 2002.
`
`20.
`
`I understand that the hypothetical POSITA is considered to have the
`
`normal skills and knowledge of a person in a certain technical field. I understand
`
`that factors that may be considered in determining the level of ordinary skill in the
`
`art include: (1) the education level of the inventor; (2) the types of problems
`
`encountered in the art; (3) the prior art solutions to those problems; (4) rapidity
`
`with which innovations are made; (5) the sophistication of the technology; and (6)
`
`the education level of active workers in the field. I also understand that “the
`
`person of ordinary skill” is a hypothetical person who is presumed to be aware of
`
`the universe of available prior art.
`
`21.
`
`I also understand the level of ordinary skill in the art can be evidenced
`
`by the prior art. Accordingly, I have also considered the prior art discussed herein
`
`in determining the level of ordinary skill in the art.
`
`22.
`
`In determining whom a POSITA would be, I considered the ‘510
`
`patent, the types of problems encountered in the relevant field, the prior art
`
`solutions to those problems, and the educational level of workers active in the
`
`
`
`7
`
`Ericsson Ex. 2010, Page 12
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`field. Based on these factors, I have concluded that a POSITA during the relevant
`
`timeframe would probably have had a Bachelor’s degree in computer science, with
`
`at least two years’ experience in the field of software security.
`
`23. Based on my experience, I have an understanding of the capabilities
`
`of a POSITA in the relevant field. I have supervised and directed many such
`
`persons over the course of my career. Further, I, myself, had at least those
`
`capabilities at the time the ‘510 patent was effectively filed. Indeed, given my
`
`education and extensive industry experience, I exceed the education and work
`
`experience levels of a POSITA, but I nonetheless provide my opinions herein from
`
`the viewpoint of a POSITA unless I state otherwise.
`
`B. Claim Construction
`24.
`I understand that “claim construction” is the process of determining a
`
`patent claim’s meaning. I also have been informed and understand that the proper
`
`construction of a claim term is the meaning that a POSITA would have given to
`
`that term during the relevant timeframe.
`
`25.
`
`I understand that claims in IPR proceedings are to be given their
`
`broadest reasonable interpretation in light of the specification, which is what I have
`
`done when performing my analysis in this declaration.
`
`
`
`8
`
`Ericsson Ex. 2010, Page 13
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`26. Counsel has also explained to me what the terms “claim” and
`
`“specification” mean in this context. While I am not a patent lawyer, I believe that
`
`I have a reasonable grasp of those concepts.
`
`C. Anticipation
`27.
`I understand that a patent claim is unpatentable as anticipated if a
`
`POSITA during the relevant timeframe would have understood a single prior art
`
`reference to teach every limitation contained in the claim. The disclosure in a
`
`reference does not have to be in the same words as the claim, but all of the
`
`requirements of the claim must be described in enough detail, or necessarily
`
`implied by or inherent in the reference, to enable a POSITA looking at the
`
`reference to make and use at least one embodiment of the claimed invention.
`
`D. Obviousness
`28.
`I understand that a patent claim is unpatentable as obvious if subject
`
`matter within the definition provided by the claim would have been obvious to a
`
`POSITA as of the time of the invention at issue. I understand that the following
`
`factors must be evaluated to determine whether the claimed subject matter was
`
`obvious: (1) the scope and content of the prior art; (2) the difference or differences,
`
`if any, between the subject matter defined by the claim of the patent under
`
`consideration and what is disclosed in the prior art; (3) the level of ordinary skill in
`
`
`
`9
`
`Ericsson Ex. 2010, Page 14
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`the relevant field at the time of the patent’s earliest priority date or, possibly, at an
`
`earlier time; and (4) so-called “objective evidence of non-obviousness.”
`
`29. Counsel has informed me that prior art references can be combined to
`
`support a finding that a claim is unpatentable for obviousness when there was an
`
`apparent reason for one of ordinary skill in the art, at the time of the invention, to
`
`combine the references and that such apparent reasons include, but are not limited
`
`to: (A) identifying a teaching, suggestion, or motivation to combine prior art
`
`references; (B) combining prior art methods according to known methods to yield
`
`predictable results; (C) substituting one known element for another to obtain
`
`predictable results; (D) using a known technique to improve a similar device in the
`
`same way; (E) applying a known technique to a known device ready for
`
`improvement to yield predictable results; (F) trying a small number of identified,
`
`predictable potential solutions, with a reasonable expectation of success; and (G)
`
`identifying that known work in one field of endeavor may prompt variations of it
`
`for use in either the same field or a different one based on design incentives or
`
`other market forces if the variations are predictable to one of ordinary skill in the
`
`relevant field.
`
`30. Moreover, I have been informed by counsel that so-called “objective
`
`indicia of non-obviousness” (also known as “secondary considerations”) like the
`
`following can be considered when assessing obviousness: (1) commercial success;
`
`
`
`10
`
`Ericsson Ex. 2010, Page 15
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`(2) long-felt but unresolved needs; (3) copying of the invention by others in the
`
`field; (4) initial expressions of disbelief by experts in the field; (5) failure of others
`
`to solve the problem that the inventor solved; and (6) unexpected results. I also
`
`understand that evidence of objective indicia of non-obviousness must be
`
`commensurate in scope with the claimed subject matter.
`
`V. DESCRIPTION OF THE RELEVANT FIELD AT THE RELEVANT
`TIMEFRAME
`31.
`
`I have carefully reviewed the ‘510 patent and the relevant materials
`
`listed above.
`
`32. Based on my review of these materials, I believe that the relevant field
`
`for purposes of the ‘510 patent is software security. I have been informed that the
`
`relevant timeframe is on or before September 23, 2002.
`
`33. As described above and as shown in my CV, I have extensive
`
`experience in the field of software security. Based on my experience, education,
`
`and training (both academic and professional), I am well versed in the relevant
`
`field in the relevant timeframe.
`
`34.
`
`I would like to emphasize that with my previous educational, research
`
`and development activities I have been actively and creatively involved in all of
`
`the specific areas addressed by Usui, Gong, Ramamurthy, and Spencer.
`
`35. For the last 25 years at the Royal Institute of Technology, GWU, and
`
`other universities, I have taught the following four M.Sc. level courses:
`
`
`
`11
`
`Ericsson Ex. 2010, Page 16
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`• Introduction to Computer Security;
`
`• Security for Java and e-Commerce Environments;
`
`• Security for Mobile and Wireless Networks; and
`
`• Advanced Aspects of Security in Open Distributed (ODP) Systems.
`
`36.
`
`I have covered basic concepts of access control in the Introduction
`
`course. In the Java and e-Commerce Security course I have covered all aspects of
`
`Java Security. In the course entitled Security for Mobile and Wireless Networks I
`
`have covered much more advanced aspects then those just briefly mentioned in the
`
`patent of Ramamurthy. The general area of Ramamurthy’s patent is a system for
`
`the protection of Web applications, which is something that I covered in my
`
`“Advanced Aspects” course. And finally, in the Advanced Security course I have
`
`covered OS security based on the concept of Security–Enhanced Linux, which is
`
`the overall project whose partial results have been described in the Spencer paper.
`
`Therefore, through my teaching activities (among other things), I have developed a
`
`deep and thorough knowledge and full understanding of all underlying issues,
`
`ideas, and solutions proposed in the four prior art documents.
`
`37.
`
`I was involved with several dissertations pursued in the same period
`
`when Ericsson’s ‘510 patent was filed, but none of them addressed the issues of
`
`access control on mobile devices. The reason is that, at that time, such issues
`
`required very sophisticated solutions, which were very complicated and very
`
`
`
`12
`
`Ericsson Ex. 2010, Page 17
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`dependent on knowledge and expertise regarding mobile communication platforms
`
`which, at that time, only telecom companies possessed. It is important to
`
`emphasize that, contrary to today’s mobile technologies and platforms, which are
`
`very open (iOS, iPhone Development Platform, Android Studio, etc.), at the time
`
`of Ericsson’s ‘510 patent mobile platforms were closed, proprietary to their
`
`vendors, and very specific. The information about technical features and properties
`
`of these platforms were industrial secrets, not publicly available. Knowledge of,
`
`for instance, the Nokia mobile platform, did not help at all to understand the
`
`Motorola platform or the BlackBerry platform. This means that innovations in
`
`those days needed advanced technical knowledge, proprietary information, and
`
`specific expertise that was only available within the teams of individual telecom
`
`equipment vendors, such as Ericsson.
`
`VI. THE ‘510 PATENT
`38. The ‘510 patent disclosed a revolutionary new invention in the field of
`
`software security. The patent addresses the problem of controlling access to the
`
`resources of a “mobile platform” by so-called non–native applications. It is
`
`important to emphasize that the ‘510 patent does not disclose as new and
`
`innovative the general idea of access control as a security service. Nor are its
`
`essential contributions its layered system structure or its modes of operation. The
`
`
`
`13
`
`Ericsson Ex. 2010, Page 18
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`problem addressed by the ‘510 patent was specific to mobile platforms and
`
`applications executed in them.
`
`39. The first important distinction between the mobile applications
`
`considered by the ‘510 patent, compared with applications executed in other IT
`
`environments, described in Gong and Spencer for example, was that these
`
`applications were non–native. To clarify, at the time of the filing, mobile
`
`platforms were closed platforms whose technical details were known only to
`
`platform and device vendors. Therefore, as is well known, at that time all
`
`applications and functions available for use in mobile phones were created by
`
`technology and device vendors. But, the trend was that such applications should be
`
`written by users and/or third parties in some circumstances and loaded into mobile
`
`devices after they were manufactured by their vendors. So, the challenging issue at
`
`that time was how to provide and enforce security (access control) of the
`
`underlying mobile platform against such applications.
`
`40. The issues were that, (1) at that time, mobile devices and platforms
`
`were vendor–specific, with fixed functionality of their mobile platforms (usually
`
`embedded in the SIM chip) so it was not known at that time how to provide
`
`security for different types of non–native applications; and (2) the authors and
`
`sources of such add–on applications, and their trust, qualifications, and roles, were
`
`not known during execution of non–native applications. Importantly, these issues
`
`
`
`14
`
`Ericsson Ex. 2010, Page 19
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`were not relevant for applications developed for the non-mobile environments
`
`considered by Usui and Gong.
`
`41. These two issues indicate that concepts, ideas and solutions suggested
`
`by the Petitioners’ proffered prior art could not have been used, directly or
`
`indirectly, as sources of ideas to arrive at the invention of Ericsson’s ‘510 patent.
`
`The reason is that the platforms that these prior art documents use and describe are
`
`completely different in their nature than mobile platforms of that time. They were
`
`open and all their features were known to application developers. Java—addressed
`
`in different forms in Usui and Gong—was an open platform. This means again that
`
`all applications that Usui and Gong consider as potential security threats are also
`
`native applications, relative to the platform. Spencer describes security of the
`
`UNIX / Linux platform, whose features and properties were known to developers,
`
`so applications for that platform are also native applications, regardless of who
`
`their authors are.
`
`42. Therefore, one of the very important and significant distinctions
`
`between the solutions from the ‘510 patent and solutions from all of Petitioners’
`
`proffered prior art documents is that Ericsson’s ‘510 patent solved the issues of
`
`access control for non–native applications, while the prior art documents only
`
`address the issues of security for native applications. For mobile environments, the
`
`characteristics, features, and components of the platform were not known to
`
`
`
`15
`
`Ericsson Ex. 2010, Page 20
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`application developers. Conversely, the skills and expertise of the application
`
`developers were not known to platform developers. In the case of platforms
`
`described by Usui and Gong (that is, Java) and Spencer (UNIX/Linux) everything
`
`was known in advance.
`
`43. The difference between the two approaches is significant. Security
`
`solutions that can be applied to well-known, native applications, with standard,
`
`open platforms are not even close to solutions required for closed, vendor-specific
`
`platforms.
`
`44. Some of the reasons for this are:
`
`• Mobile devices (especially those that were in use at the time when the
`
`‘510 patent was filed) had very limited resources and capabilities, so
`
`that solutions from servers (e.g., Gong and Spencer) could not be
`
`directly applied;
`
`• Mobile devices also had very limited functionalities, which
`
`prevented direct application of solutions from the prior art into the
`
`mobile environment. An example is Java 2 Micro Edition (J2ME).
`
`For instance, it is well–known that J2ME does not support any
`
`security within the Platform. In particular, it does not have a Secure
`
`Class Loader, which is required to activate a Security Manager and
`
`Access Controller, and it furthermore does not even have a Security
`
`
`
`16
`
`Ericsson Ex. 2010, Page 21
`TCL et al. v Ericsson
`IPR2015-01605
`
`

`
`Manager and/or Access Controller. This shows that ideas and
`
`suggestions from Usui could not have been used as a source of ideas
`
`for attempting to arrive at the invention of Ericsson’s ‘510 patent;
`
`• Security for J2ME (the mobile Java platform) is specified in Sun’s
`
`(now Oracle’s) specifications called SATSA: Security and Trust
`
`Services APIs for J2ME (JSR 177) (Ex. 2007). These specifications
`
`clearly indicate that J2ME does not have any security components of
`
`its own and SATSA simply specified the approach of using external
`
`components, namely Smart Cards. The

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket