throbber
IPR2017-00430 Petition
`U.S. Patent 6,088,802
`
`Filed on behalf of Unified Patents Inc.
`By: Vincent J. Galluzzo, Reg. No. 67,830
`
`Teresa Stanek Rea, Reg. No. 30,427
`
`CROWELL & MORING LLP
`
`1001 Pennsylvania Avenue, N.W.
`
`Washington, D.C. 20004
`
`Tel: (202) 624-2781
`
`Email: vgalluzzo@crowell.com
`
`
`
`
`
`
`
`
`
`Jonathan Stroud, Reg. No. 72,518
`Unified Patents Inc.
`1875 Connecticut Avenue, N.W., Floor 10
`Washington, D.C. 20009
`Tel: (202) 805-8931
`Email: jonathan@unifiedpatents.com
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________________________________________
`
`UNIFIED PATENTS INC.
`Petitioner
`
`v.
`
`SPEX TECHNOLOGIES, INC.
`Patent Owner
`
`IPR2017-00430
`Patent 6,088,802
`
`PETITION FOR INTER PARTES REVIEW OF
`U.S. PATENT 6,088,802
`CHALLENGING CLAIMS 1–39
`UNDER 35 U.S.C. § 312 AND 37 C.F.R. § 42.104
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`
`TABLE OF CONTENTS
`
`I.  MANDATORY NOTICES ............................................................................. 1 
`A. 
`Real Party-in-Interest ................................................................................... 1 
`B. 
`Related Matters ............................................................................................ 1 
`C. 
`Counsel ........................................................................................................ 2 
`D. 
`Service Information, Email, Hand Delivery, and Postal ............................. 3 
`II. 
`CERTIFICATION OF GROUNDS FOR STANDING .................................. 3 
`III.  OVERVIEW OF CHALLENGE AND RELIEF REQUESTED .................... 3 
`A. 
`Prior Art Patents and Printed Publications .................................................. 3 
`B. 
`Grounds for Challenge ................................................................................. 4 
`IV. 
`INTRODUCTION ........................................................................................... 4 
`V. 
`TECHNOLOGY BACKGROUND ................................................................. 6 
`VI.  OVERVIEW OF THE ʼ802 PATENT .......................................................... 12 
`A. 
`Summary of the Alleged Invention............................................................ 12 
`B. 
`Level of Ordinary Skill in the Art ............................................................. 14 
`C. 
`Prosecution History .................................................................................... 15 
`VII.  CLAIM CONSTRUCTION .......................................................................... 15 
`VIII.  SPECIFIC GROUNDS FOR PETITION ...................................................... 22 
`Ground I: Claims 1, 2, 6, 7, 11–13, 23–26, and 36–39 are anticipated by
`A. 
`Jones .......................................................................................................... 23 
`Overview of Jones .................................................................................... 23 
`Claims 1, 6, 11, 23, and 24 are anticipated by Jones ............................. 25 
`Claims 2, 7, 12, and 25 are anticipated by Jones ................................... 30 
`Claims 13 and 26 are anticipated by Jones ............................................ 30 
`Claims 36 and 37 are anticipated by Jones ............................................ 31 
`Claim 38 is anticipated by Jones ............................................................. 32 
`Claim 39 is anticipated by Jones ............................................................. 33 
`Ground II: Claims 5, 10, 14, 22, 27, and 35 are obvious over Jones in
`view of Harari ........................................................................................... 34 
`i
`
`1. 
`2. 
`3. 
`4. 
`5. 
`6. 
`7. 
`B. 
`
`
`
`

`

`1. 
`2. 
`3. 
`C. 
`
`4. 
`
`5. 
`
`6. 
`
`1. 
`2. 
`3. 
`
`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`Overview of Harari .................................................................................. 34 
`Claims 5, 10, 22, and 35 are obvious over Jones in view of Harari ........ 35 
`Claims 14 and 27 are obvious over Jones ............................................... 37 
`Ground III: Claims 1–39 are obvious over Clark in view of USB
`Specification ............................................................................................... 37 
`Overview of Clark .................................................................................... 37 
`Overview of USB Specification .............................................................. 41 
`Claims 1, 6, 11, 23, and 24 are obvious over Clark in view of USB
`Specification ............................................................................................ 42 
`Claims 2, 7, 12, and 25 are obvious over Clark in view of USB
`Specification ............................................................................................ 51 
`Claims 3, 8, 15, and 28 are obvious over Clark in view of USB
`Specification ............................................................................................ 52 
`Claims 4, 9, 19, and 32 are obvious over Clark in view of USB
`Specification ............................................................................................ 53 
`Claims 5, 10, 22, and 35 are obvious over Clark in view of USB
`Specification ............................................................................................ 53 
`Claims 13 and 26 are obvious over Clark in view of USB Specification
` ................................................................................................................. 54 
`Claims 14 and 27 are obvious over Clark in view of USB Specification
` ................................................................................................................. 55 
`10.  Claims 16 and 29 are obvious over Clark in view of USB Specification
` ................................................................................................................. 55 
`11.  Claims 17 and 30 are obvious over Clark in view of USB Specification
` ................................................................................................................. 56 
`12.  Claims 18 and 31 are obvious over Clark in view of USB Specification
` ................................................................................................................. 57 
`13.  Claims 20 and 33 are obvious over Clark in view of USB Specification
` ................................................................................................................. 57 
`14.  Claims 21 and 34 are obvious over Clark in view of USB Specification
` ................................................................................................................. 57 
`15.  Claims 36 and 37 are obvious over Clark in view of USB Specification
` ................................................................................................................. 58 
`ii
`
`7. 
`
`8. 
`
`9. 
`
`
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`16.  Claim 38 is obvious over Clark in view of USB Specification ............... 60 
`17.  Claim 39 is obvious over Clark in view of USB Specification ............... 61 
`IX.  CONCLUSION .............................................................................................. 62 
`
`
`
`
`iii
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`
`I. MANDATORY NOTICES
`A. Real Party-in-Interest
`
`Pursuant to 37 C.F.R. § 42.8(b)(1), Unified Patents Inc. (“Unified” or
`
`“Petitioner”) certifies that Unified is the real party-in-interest, and further certifies
`
`that no other party exercised control or could exercise control over Unified’s
`
`participation in this proceeding, the filing of this petition, or the conduct of any
`
`ensuing trial. In this regard, Unified has submitted voluntary discovery. See
`
`EX1027 (Petitioner’s Voluntary Interrogatory Responses).
`
`B. Related Matters
`
`U.S. Patent 6,088,802 (“the ʼ802 Patent” (EX1001)) is owned by SPEX
`
`Technologies, Inc. (“SPEX” or “Patent Owner”). See EX1028 (Kingston
`
`Complaint), at 12.
`
`On September 27, 2016, SPEX filed a lawsuit in the Central District of
`
`California alleging infringement of the ʼ802 Patent in SPEX Technologies, Inc. v.
`
`Kingston Technology Company Inc., et al., No. 8:16-cv-01790 (C.D. Cal. Filed
`
`Sept. 27, 2016).
`
`On September 28, 2016, SPEX filed five additional lawsuits also in the
`
`Central District of California and also alleging infringement of the ʼ802 Patent in
`
`SPEX Technologies, Inc. v. Western Digital Corporation, et al., No. 8:16-cv-01799
`
`(C.D. Cal. Filed Sept. 28, 2016); SPEX Technologies, Inc. v. Toshiba America
`
`1
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`Electronics Components Inc., et al., No. 8:16-cv-01800 (C.D. Cal. Filed Sept. 28,
`
`2016); SPEX Technologies, Inc. v. CMS Products, Inc., No. 8:16-cv-01801 (C.D.
`
`Cal. Filed Sept. 28, 2016); SPEX Technologies, Inc. v. Integral Memory, PLC, No.
`
`8:16-cv-01805 (C.D. Cal. Filed Sept. 28, 2016); and SPEX Technologies, Inc. v.
`
`Apricorn, No. 2:16-cv-07349 (C.D. Cal. Filed Sept. 28, 2016).
`
`SPEX filed against, inter alia, Kingston Technology Company Inc.;
`
`Kingston Digital, Inc.; Kingston Technology Corporation; Imation Corporation;
`
`DataLocker, Inc.; Data Locker International, LLC; Western Digital Corporation;
`
`Western Digital Technologies, Inc.; HGST, Inc.; Toshiba America Electronics
`
`Components Inc.; Toshiba America Information Systems, Inc.; Toshiba America,
`
`Inc.; Toshiba Corporation; CMS Products, Inc.; Integral Memory, PLC; and
`
`Apricorn, claiming that certain of these companies’ products or services infringe
`
`the ʼ802 Patent. These cases are in their early stages and no schedule or trial date
`
`has been set.
`
`C. Counsel
`
`Vincent J. Galluzzo (Reg. No. 67,830) will act as lead counsel; Teresa
`
`Stanek Rea (Reg. No. 30,427) and Jonathan Stroud (Reg. No. 72,518) will act as
`
`back-up counsel.
`
`2
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`Service Information, Email, Hand Delivery, and Postal
`
`D.
`
`Unified consents to electronic service at vgalluzzo@crowell.com and
`
`jonathan@unifiedpatents.com. Petitioner can be reached at Crowell & Moring
`
`LLP, 1001 Pennsylvania Avenue, N.W., Washington, DC 20004, Tel.: (202) 624-
`
`2781, Fax: (202) 628-8844 and Unified Patents Inc., 1875 Connecticut Avenue,
`
`N.W., Floor 10, Washington, D.C. 20009, Tel.: (650) 999-0899.
`
`II. CERTIFICATION OF GROUNDS FOR STANDING
`
`Petitioner certifies pursuant to Rule 42.104(a) that the patent for which
`
`review is sought is available for inter partes review and that Petitioner is not
`
`barred or estopped from requesting an inter partes review challenging the patent
`
`claims on the grounds identified in this Petition.
`
`III. OVERVIEW OF CHALLENGE AND RELIEF REQUESTED
`
`Pursuant to Rules 42.22(a)(1) and 42.104(b)(1)–(2), Petitioner challenges
`
`claims 1–39 of the ʼ802 Patent.
`
`A.
`
`Prior Art Patents and Printed Publications
`
`The following references are pertinent to the grounds of unpatentability
`
`explained below:1
`
`
`1 The ʼ802 Patent issued from a patent application filed prior to enactment of the
`
`America Invents Act (“AIA”). Accordingly, pre-AIA statutory framework applies.
`
`3
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`U.S. Patent 5,623,637 (filed on May 17, 1996, published on April 22,
`
`1.
`
`1997) (“Jones”) (EX1003), which is prior art under 35 U.S.C.
`
`§ 102(a);
`
`2.
`
`U.S. Patent 5,887,145 (filed on January 9, 1997; published on March
`
`23, 1999) (“Harari”) (EX1004), which is prior art under 35 U.S.C.
`
`§ 102(e);
`
`3.
`
`U.S. Patent 5,815,577 (filed on March 24, 1997, published on
`
`September 29, 1998) (“Clark”) (EX1005), which is prior art under 35
`
`U.S.C. § 102(e); and
`
`4.
`
`Compaq Computer Corporation, et al., Universal Serial Bus
`
`Specification Revision 1.0 (published on January 15, 1996) (“USB
`
`Specification”) (EX1006), which is prior art under 35 U.S.C. § 102(b).
`
`B. Grounds for Challenge
`
`This Petition, supported by the Declaration of Ivan Zatkovich (“Zatkovich
`
`Declaration” (EX1002)), requests cancellation of challenged claims 1–39 as
`
`unpatentable under 35 U.S.C. § 103. See 35 U.S.C. § 314(a).
`
`IV.
`
`INTRODUCTION
`
`The admitted “novelty” of the ʼ802 Patent lies in the simple combination of
`
`two separate devices: a “security device” that performs security operations on
`
`behalf of a host computer and a “portable device” that performs some non-security
`
`4
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`function, such as data storage, for that computer. See, e.g., EX1001 (ʼ802 Patent),
`
`at 3:1–3, 3:27–33. Security devices and portable devices were each well-known
`
`individually, as the ʼ802 Patent illustrates in Figure 2 and describes elsewhere in
`
`great detail:
`
`
`
`Id. at 2:22–3:14, Fig. 2. Known security devices could perform cryptographic
`
`operations on information that it provided to the host computer or on information
`
`that the host computer provided to it. Id. at 1:66–2:9. Portable devices like
`
`PCMCIA cards, smart cards, CD-ROMs, and the like, could “perform an
`
`assortment of functions,” such as data storage, for the host computer. Id. at 1:35–
`
`38. The ʼ802 Patent’s alleged contribution is thus no more than the combination of
`
`the two into a single “peripheral device”:
`
`5
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`
`(ALLEGED INVENTION)
`
`
`
`Id. at Figs. 2, 3A (red annotation added).
`
`Yet it was well known in June 1997 to integrate security and portable device
`
`functionality into a single peripheral device, and the applicants of the ’802 Patent
`
`failed to understand the state of the art at the time they filed the application that led
`
`to the ʼ802 Patent. These integrated devices had been used in various industries,
`
`from computer security to remote banking. There was nothing novel about the
`
`combination of a “security” device and a “portable” device into a single peripheral,
`
`and the combination of the two devices and functionalities was obvious in June
`
`1997. Therefore, the ʼ802 Patent is unpatentable over the prior art submitted with
`
`this Petition.
`
`V. TECHNOLOGY BACKGROUND
`
`The technology at issue in this Petition relates generally to peripheral
`
`computing devices, and more particularly, to the combination of the functionality
`
`6
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`of two peripheral computing devices, a security device and a portable device, into
`
`one.
`
`Computer security is a necessary component of all modern computing
`
`devices, but robust computer security methods are complex and dominate
`
`computing resources at the expense of other user-desired processes. To avoid this
`
`bottleneck, those skilled in the art have known since at least the early 1980s to
`
`offload security capabilities from a computer onto a peripheral security device.
`
`See, e.g., EX1007 (Buchanan), at 1; see also EX1008 (Boone). Such a computer
`
`could more quickly perform software processing as it was no longer burdened by
`
`complex security operations. EX1007 (Buchanan), at 1. Coincidentally, security
`
`operations were also faster, as they were consolidated into a single peripheral
`
`controller connected to the computer through a communications channel having
`
`“acceptable data rates.” Id.
`
`Various companies conceived of peripheral security devices that interacted
`
`with a host computer in this way well before June 1997. One idea from Samsung
`
`Electronics included a “security device for a digital computer system having a
`
`peripheral device and a peripheral device controller,” including a “security user
`
`input/output unit” that is connected to the security controller, “thereby allowing a
`
`computer system to interface with an input/output device or a file in a normal state
`
`7
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`while the security device protects the computer system.” EX1009 (Hwang), at
`
`Abstract.
`
`Another security solution from the early 1990s conceived of a storage media
`
`reader (like a CD-ROM drive or smart card reader) with integrated security
`
`functionality and a keypad for entering personal security information like a PIN or
`
`biometric information. See EX1010 (Lang), at 2:23–33, 2:35–41, 3:11–16, 4:64–
`
`5:3, 5:16–25; see also EX1011 (Lane). Yet another solution from the mid-1990s
`
`from IBM consisted of a removable PC card having security functionality that
`
`prevented access to the PC card’s storage media absent valid user credentials.
`
`EX1012 (Bensimon). Other solutions limited access to the host computer itself.
`
`See EX1013 (Wade); EX1014 (Angelo). Many other solutions in the art existed
`
`prior to June 1997, including messaging peripherals that interacted with host
`
`computers via communications standards known at the time (such as PCMCIA),
`
`EX1015 (Macko), peripherals that read data sent between a keyboard and a host
`
`computer, EX1016 (Goodman), and others as described throughout this Petition.
`
`Research into security cards as small as a credit card was well underway at
`
`least as early as 1988. EX1017 (Schamüller-Bichl). These security cards were
`
`effective as a “‘special computer’ for taking over selected security functions” of a
`
`user’s computer in “high-security applications.” Id. at 192. While they had many
`
`potential applications, those skilled in the art knew that the security cards could be
`
`8
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`configured to “encipher all data transmitted between the card and the card reader,”
`
`which was connected to the user’s computer. Id. at 194. The card could also be
`
`used to encrypt external data and store it in the security card’s memory, and then to
`
`“retransmit[]” the data “to the card reader” and thus to the user’s computer. Id.
`
`The user could even use a PIN, or even “biometric parameters” to access the
`
`functionality of the security card on demand. Id. at 193. In each of these
`
`functions, the data communicated between the card and the card reader on a user’s
`
`computer must necessarily pass through the security functionality of the security
`
`card:
`
`9
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`
`Id. at 195. This late-1980s research further suggested that security cards could be
`
`improved by expanding the card’s memory and storing more user and computer
`
`data and to take over more of the security functionality of a user’s computer. Id. at
`
`
`
`198.
`
`One advanced solution came from a Canadian inventor in 1990, which
`
`included a portable card, a peripheral device, and a remote host computer.
`
`EX1018 (Graves), at 3:9–10. The peripheral device contained a microprocessor
`
`and memory, a card reading device to read the portable card, and a fingerprint
`
`10
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`scanner for security. Id. at 3:13–14. When a user inserted the card into the
`
`peripheral, the card verifies that the terminal is valid while the peripheral verifies
`
`that the card was valid and that the user’s fingerprint was valid. Id. at 3:16–19.
`
`Alternatively, the peripheral could verify the user by a retinal or DNA scan. Id. at
`
`3:18–19. Encryption is used in the system both at the card-peripheral interface and
`
`at the peripheral-host computer interface. Id. at 3:33–34, 5:8–10.
`
`The ʼ802 Patent also recognizes some of the state of the art in June 1997 in
`
`its description of some of the prior art systems. One of those systems is where a
`
`host computing device connects separately to a portable device and a security
`
`device, as shown in Figure 2:
`
`
`
`EX1001 (ʼ802 Patent), at Fig. 2. The security device contains software and
`
`hardware sufficient to perform desired cryptographic operations. Id. at 2:30–32.
`
`The portable device can take essentially any form and performs some other
`
`function. Id. at 1:31–38. The host computing device communicates directly with
`
`11
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`the security device and portable device, but the security device and portable device
`
`do not communicate with each other. Id. at 2:22–30. Thus, the prior art has all of
`
`the functionality of an integrated security/portable peripheral device system, but
`
`the security device and portable device must use the host computer as an
`
`intermediary to communicate with each other. Id. at 2:33–47. This difference is
`
`insignificant, and the integrated communications functionality that the ʼ802 Patent
`
`claims as its own was disclosed in the prior art well before June 1997.
`
`VI. OVERVIEW OF THE ʼ802 PATENT
`A.
`
`Summary of the Alleged Invention
`
`The ʼ802 Patent relates to a peripheral device connected to a host computer,
`
`where the peripheral device performs security operations (such as cryptography)
`
`on data communicated between the peripheral device and the host computer as
`
`well as some other operations traditionally done by peripheral devices. Id. at 1:17–
`
`27, 1:35–38, 4:49–5:4. According to the ʼ802 Patent, combining the security
`
`functionality and peripheral, or “target,” functionality into one device did not exist
`
`in the prior art. Instead, there were two systems available: one where a security
`
`function is located in the host computing device, one where the security function is
`
`located in a standalone security device, both as shown below:
`
`12
`
`

`

`Data flow
`
`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`
`Id. at Figs. 1, 2 (red annotations added); id. at 1:51–2:9, 2:22–43. In each of the
`
`prior art examples discussed in the ʼ802 Patent, security operations are performed
`
`on communicated data as it passes through the security function or device en route
`
`from the host computer to the portable device, and vice versa. Id. at 1:51–2:9,
`
`2:22–43.
`
`The ʼ802 Patent simply integrates the previously separate security and
`
`peripheral functions into a single integrated device, as shown in Figure 3A below:
`
`Data flow
`
`
`Id. at Fig. 3A (red annotations added). The ʼ802 Patent admits that its only alleged
`
`“novelty” lies in enabling “a defined interaction with a host computing device that
`
`13
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`has not previously been integrated with security operations in a single integral
`
`device.” Id. at 3:27–33.
`
`Other than integrating the security function into the peripheral device, the
`
`primary security and peripheral functions are unchanged. The security function
`
`still performs well-known security operations on the communicated data. Id. at
`
`4:55–62, 5:22–6:9, 17:52–67. The peripheral device still performs its peripheral
`
`function on the data. Id. at 4:63–5:4. For example, if the peripheral device is a
`
`flash memory, it is still a flash memory. Id. at 13:29–31 (“any such memory
`
`device can be used to embody such target functionality”). If it is a communication
`
`modem, it is still a communication modem. Id. at 13:53–55. If it is a biometric
`
`device, it is still a biometric device. Id. at 14:15–16. And if it is a smart card
`
`reader, it is still a smart card reader. Id. at 15:28–30.
`
`This simple integration of security and peripheral functions is not novel, and
`
`was obvious as of June 1997, and therefore, the ʼ802 Patent is unpatentable over
`
`the prior art discussed throughout this Petition.
`
`B.
`
`Level of Ordinary Skill in the Art
`
`A person of ordinary skill in the art (“POSA”) for the ʼ802 Patent would
`
`have a bachelor’s degree in computer science, electrical engineering, or related
`
`study with two years of experience in design and development of computer
`
`peripheral interfaces. EX1002 (Zatkovich Declaration), at ¶¶ 24—25.
`
`14
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`
`C.
`
`Prosecution History
`
`The ʼ802 Patent issued from U.S. Patent Application 08/869,305 (“the ʼ305
`
`Application”), which was filed on June 4, 1997. EX1001 (ʼ802 Patent), at [21]–
`
`[22]. The ʼ802 Patent states that it is “related to the commonly owned, co-pending
`
`United States patent Application entitled ‘Modular Security Device,’ by William P.
`
`Bialick, Mark J. Sutherland, Janet L. Dolphin-Peterson, Thomas K. Rowland, Kirk
`
`W. Skeba and Russell D. Housely, filed on the same date as the present application
`
`and having Attorney Docket No. SPY-003.” Id. at 1:6–12. Petitioners believe this
`
`reference is to U.S. Patent Application 08/869,120, which was also filed on June 4,
`
`1997, which is subject to a terminal disclaimer to the ʼ802 Patent, and which issued
`
`as U.S. Patent 6,003,135. The ʼ305 Application went through a series of rejections
`
`before it was eventually granted, and issued on July 11, 2000.
`
`The ʼ305 Application was filed after the January 1, 1996 GATT date, and
`
`the ʼ802 Patent is not entitled to any patent term extension. Therefore, the ʼ802
`
`Patent is likely to expire on June 4, 2017. That date is within eighteen months of
`
`the filing date of this Petition, and therefore within eighteen months from any
`
`Notice of Filing Date Accorded to Petition here.
`
`VII. CLAIM CONSTRUCTION
`
`Claim terms of a patent in inter partes review are normally given their
`
`“broadest reasonable construction in light of the specification.” 37 C.F.R.
`
`15
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`§ 42.100(b); Cuozzo Speed Techs., LLC v. Lee, 136 S. Ct. 2131, 2144–46 (2016).
`
`Where the patent term of the claims has expired, however, construction is similar
`
`to that in a district court’s review. In re Rambus, Inc., 694 F.3d 42, 46 (Fed. Cir.
`
`2012). Specifically, the Board applies the principle that the words of a claim are
`
`generally given their ordinary and customary meaning, as understood by a person
`
`of ordinary skill in the art at the time of the invention. Phillips v. AWH Corp., 415
`
`F.3d 1303, 1312–13 (Fed. Cir. 2005) (en banc)
`
`As noted above in Section VI(C), the ʼ802 Patent is likely to expire on June
`
`4, 2017. While Petitioner does not request that the Board apply the Phillips claim
`
`construction standard, Petitioner’s proposed constructions
`
`follow explicit
`
`definitions in the ʼ802 Patent specification or are means-plus-functions limitations
`
`consistent with the specification. Those explicit definitions or means-plus-
`
`functions limitations are therefore consistent with, and would still remain, the
`
`correct constructions under the Phillips standard, should the Board determine to
`
`use that standard here.2
`
`
`2 The construction of means-plus-function terms under pre-AIA 35 U.S.C. § 112,
`
`¶ 6 is statutorily mandated, and thus is consistent whether a “broadest reasonable
`
`interpretation” or Phillips construction standard is used. In re Donaldson Co., 16
`
`(Continued...)
`
`16
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`The following discussion proposes constructions and support for those
`
`constructions. Any claim terms not included in the following discussion should be
`
`given their appropriate construction under the applicable standard used by the
`
`Board in reviewing the ʼ802 Patent.
`
`“peripheral device”
`
`This term should be construed to mean “a device that operates outside of a
`
`host computing device and that is connected to the host computing device,” which
`
`is how the ʼ802 Patent explicitly defines the term. See EX1001 (ʼ802 Patent), at
`
`4:52–55.
`
`“security operations”
`
`This term should be construed to include, without limitation, “[1] operations
`
`that provide one or more of the basic cryptographic functions, such as maintenance
`
`of data confidentiality, [2] verification of data integrity, [3] user authentication and
`
`[4] user non-repudiation,” which are the explicit and non-limiting examples given
`
`of “security operation[s]” in the ’802 Patent. Id. at 5:23–29.
`
`________________________
`F.3d 1189, 1193–95 (Fed. Cir. 1994) (en banc); see also Williamson v. Citrix
`
`Online, LLC, 792 F.3d 1339 (Fed. Cir. 2015) (en banc).
`
`17
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`“defined interaction” and “interaction . . . in a defined way”
`
`These phrases should be construed to include, without limitation, “[1] data
`
`storage, [2] data communication, [3] data input and output, [and 4] user
`
`identification,” which are the explicit and non-limiting examples given of “defined
`
`interactions” in the ’802 Patent. See id. at Abstract; see also id. at 3:33–36.
`
`“security means for enabling one or more security operations to be
`performed on data”
`
`This phrase should be construed under pre-AIA 35 U.S.C. § 112, ¶ 6 to
`
`include the following corresponding structure described in the specification, and
`
`equivalents thereof:
`
`1.
`
`2.
`
`firmware capable of performing
`Hardware, software and/or
`cryptographic or other related mathematical functions, including data
`encryption and decryption. See id. at 12:10–16, 17:52–67, 15:63–67;
`see also id. at 2:30–32.
`
`A device that performs security operations and that includes one or
`more mechanisms to provide security for the content of those
`operations. See id. at 5:32–33.
`
`“target means for enabling a defined interaction with a host computing
`device”
`
`This phrase should be construed under pre-AIA 35 U.S.C. § 112, ¶ 6 to
`
`include the following corresponding structure described in the specification, and
`
`equivalents thereof:
`
`1.
`
`A memory device adapted to enable non-volatile storage of data,
`including solid state memory devices, flash memory devices, ATA
`
`18
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`format flash drives, NAN flash memory devices, SCSI disks, and IDE
`disks. See id. at 13:27–49; see also id. at 4:64–5:4.
`
`A communications device adapted to enable communication between
`the host computing device and a remote device, including modems
`and LAN transceivers. See id. at 13:50–14:9; see also id. at 4:64–5:4.
`
`A biometric device, including fingerprint and retinal scanning devices.
`See id. at 14:10–15:23; see also id. at 4:64–5:4.
`
`A smart card reader device adapted to communicate with a smart card,
`including smart card readers compliant with ISO 7816 standards. See
`id. at 15:24–37; see also id. at 4:64–5:4.
`
`2.
`
`3.
`
`4.
`
`“means for enabling communication between the security means and
`the target means”
`
`This phrase should be construed under pre-AIA 35 U.S.C. § 112, ¶ 6 to
`
`include the following corresponding structure described in the specification, and
`
`equivalents thereof: a computer bus. See id. at 6:40–45.
`
`“means for enabling communication with a host computing device”
`
`This phrase should be construed under pre-AIA 35 U.S.C. § 112, ¶ 6 to
`
`include the following corresponding structure described in the specification, and
`
`equivalents
`
`thereof:
`
` a communications
`
`interface,
`
`including wireless
`
`communication interfaces, PCMCIA interfaces, smart card interfaces, serial
`
`interfaces, parallel interfaces, SCSI interfaces, and IDE interfaces. See id. at 4:50–
`
`52, 5:51–54, 15:42–62; see also id. at 5:5–21.
`
`19
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`“means for operably connecting the security means and/or the target
`means to the host computing device in response to an instruction from
`the host computing device”
`
`This phrase should be construed under pre-AIA 35 U.S.C. § 112, ¶ 6 to
`
`include the following corresponding structure described in the specification, and
`
`equivalents thereof: a standard software device driver, including a peripheral
`
`device driver. See id. at 7:11–24, 8:50–61, 9:42–49, 9:50–51; see also id. at Fig. 7,
`
`10:13–20, 16:64–17:2.
`
`While the phrase “in response to an instruction,” is absent from the
`
`specification of the ʼ802 Patent, device drivers typically enable the host to instruct
`
`the operation of the device. See EX1002 (Zatkovich Declaration), at ¶¶ 28—30.
`
`Thus, the two devices are operatively connected in response to such instructions.
`
`See id. at ¶ 55. This is supported by the ʼ802 Patent specification, which describes
`
`“plug-and-play” functionality where the peripheral device driver is stored in the
`
`peripheral device memory. See EX1001 (ʼ802 Patent), at 9:13–25. The first time
`
`the host and peripheral device are connected, the host causes the peripheral device
`
`driver to be transferred to the host so that the host can execute the driver and
`
`thereby operatively connect with the peripheral device. Id.
`
`20
`
`

`

`IPR2017-00430 Petition
`U.S. Patent 6,088,802
`“means for mediating communication of data between the host
`computing device and the target means so that the communicated data
`must first pass through the security means”
`
`This phrase should be constru

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket