throbber

`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`______________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`______________
`
`KINGSTON TECHNOLOGY COMPANY, INC.
`Petitioner
`
`v.
`
`SPEX TECHNOLOGIES, INC.
`Patent Owner
`
`______________
`
`
`Case IPR: IPR2017-00824
`U.S. Patent No. 6,088,802
`
`______________
`
`Date: January 31, 2017
`
`______________
`
`PETITION FOR INTER PARTES REVIEW
`UNDER 37 C.F.R. § 42.100
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`I. 
`
`V. 
`
`TABLE OF CONTENTS
`INTRODUCTION AND STATEMENT OF RELIEF REQUESTED
`(37 C.F.R. § 42.22(A)) .................................................................................... 1 
`II.  GROUNDS FOR STANDING (37 C.F.R. § 42.104(A)) ................................ 1 
`III.  MANDATORY NOTICES (37 C.F.R. § 42.8(A)(1)) ..................................... 2 
`A. 
`Real Party-In-Interest (37 C.F.R. § 42.8(b)(1)) .................................... 2 
`B. 
`Identification of Related Matters (37 C.F.R. § 42.8(b)(2)) ................... 2 
`C. 
`Counsel and Service Information (37 C.F.R. §§ 42.8(b)(3) &
`(b)(4)) .................................................................................................... 3 
`Payment of fees (37 C.F.R. § 42.103) ................................................... 3 
`D. 
`IV.  REQUEST FOR REVIEW .............................................................................. 3 
`A. 
`Claims to be Reviewed .......................................................................... 3 
`B. 
`Each of the Cited References Is Available as Prior Art ........................ 4 
`C. 
`Identification Of Challenge ................................................................... 5 
`BACKGROUND ............................................................................................. 6 
`A.  Description of the ’802 Patent ............................................................... 6 
`B. 
`Prosecution History ............................................................................. 21 
`C. 
`Level of Ordinary Skill in the Art ....................................................... 23 
`D. 
`State of the Art .................................................................................... 23 
`VI.  CLAIM CONSTRUCTION .......................................................................... 24 
`VII.  THERE IS A REASONABLE LIKELIHOOD THAT CLAIMS 1-3,
`6-8, 11-15, 23-28, and 36-39 ARE UNPATENTABLE ............................... 25 
`A.  Ground I – Obviousness of Claims 1-3, 6-8, 11-15, 23-28, and
`36-39 Based on Jones (Ex. 1003) ........................................................ 25 
`Ground II – Obviousness of Claims 1, 11, 23, 36, and 39 Based
`on Jones (Ex. 1003) in View of Schwartz et al. (Ex. 1004)
`and/or Kimura (Ex. 1005) ................................................................... 62 
`Ground III – Obviousness of Claims 3, 8, 15, and 28 Based on
`Jones (Ex. 1003) in View of Common Interface Specification
`(Ex. 1008) ............................................................................................ 64 
`D.  Ground IV – Obviousness of Claims 14 and 27 Based on Jones
`(Ex. 1003) in View of Clay (Ex. 1007) ............................................... 67 
`VIII.  CONCLUSION .............................................................................................. 67 
`
`B. 
`
`C. 
`
`i
`
`

`

`Exhibit List for Inter Partes Review of U.S. Patent No. 6,088,802
`
`
`Attorney Docket No. 37307-0012IP1
`
`
`Exhibit Description
`
`U.S. Patent No. 6,088,802
`
`Prosecution History of U.S. Patent No. 6,088,802
`
`WO 95/16238, to Jones et al. (“Jones”)
`
`U.S. Patent No. 5,675,645, to Schwartz et al.
`
`U.S. Patent No. 5,237,609, to Kimura
`
`Patent Owner’s Claims Chart, comparing the ’802 patent to a
`Petitioner product that Patent Owner accuses of infringement
`
`U.S. Patent No. 5,465,338, to Clay
`
`Common Interface Specification for Conditional Access and
`Other Digital Video Broadcasting Decoder Applications, Digital
`Video Broadcasting, DVB Document A017, May 1996
`(hereinafter “Common Interface Specification”)
`
`Exhibit No.
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`Declaration by Roy A. Griffin III, P.E. Regarding U.S. Patent No.
`6,088,802 Under 37 C.F.R. § 42.63(a) (hereinafter “Griffin
`Dec.”), with attachment
`
`1009
`
`
`
`ii
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`I.
`
`INTRODUCTION AND STATEMENT OF RELIEF REQUESTED
`(37 C.F.R. § 42.22(A))
`Kingston Technology Company, Inc. (“Petitioner”) hereby petitions for
`
`institution of inter partes review of U.S. Patent No. 6,088,802 (the “’802 patent”)
`
`(Ex. 1001). The ’802 patent issued on July 11, 2000. SPEX Technologies, Inc.
`
`(“Patent Owner”) alleges that it is the assignee of the ’802 patent. Petitioner
`
`respectfully requests cancellation of claims 1-3, 6-8, 11-15, 23-28, and 36-39 of
`
`the ’802 patent based on the grounds of unpatentability herein. The prior art and
`
`other evidence offered with this Petition establishes that all elements in the
`
`challenged claims of the ’802 patent were well known as of the earliest alleged
`
`priority date, and that the claimed methods and systems recited in the ’802 patent
`
`were obvious.
`
`II. GROUNDS FOR STANDING (37 C.F.R. § 42.104(A))
`Petitioner certifies that the ’802 patent is available for review under
`
`35 U.S.C. § 311(c) and that Petitioner is not estopped from requesting an inter
`
`partes review challenging claims 1-3, 6-8, 11-15, 23-28, and 36-39 on the grounds
`
`identified herein.
`
`1
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`III. MANDATORY NOTICES (37 C.F.R. § 42.8(A)(1))
`A. Real Party-In-Interest (37 C.F.R. § 42.8(b)(1))
`The real party in interest is Petitioner Kingston Technology Company, Inc.
`
`Parent company Kingston Technology Corporation and the affiliate company
`
`Kingston Digital Inc. do not have control over this Petition, and, thus, are not
`
`believed to be real parties in interest. However, Petitioner identifies these entities
`
`pursuant to 37 C.F.R. § 42.8(b)(1) as they are related to Petitioner and are co-
`
`Defendants in the pending suit filed by SPEX Technologies, Inc. (see below).
`
`B.
`Identification of Related Matters (37 C.F.R. § 42.8(b)(2))
`The following matter would be affected by a decision in this proceeding:
`
`SPEX Technologies, Inc. v. Kingston Tech. Corp., et al., Case No. 8:16-cv-01790
`
`(C.D. Cal.), filed September 27, 2016. Patent Owner has asserted claim 11 of the
`
`’802 patent against Petitioner in this matter.
`
`Petitioner also is filing a petition for inter partes review of Patent Owner’s
`
`U.S. Patent No. 6,003,135, which was filed the same day and relates to the same
`
`subject matter as the ’802 patent (though the two patents are not related by priority
`
`claim), and which patent also is being asserted against Petitioner in the litigation
`
`identified in the prior paragraph.
`
`2
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`C. Counsel and Service Information (37 C.F.R. §§ 42.8(b)(3) &
`(b)(4))
`Petitioner designates the following Lead and Back-up Counsel.
`
`Concurrently filed with this Petition is a Power of Attorney per 37 C.F.R.
`
`§ 42.10(b). Service via hand-delivery may be made at the postal mailing address
`
`below. Petitioner consents to electronic service by e-mail to the e-mail addresses
`
`listed below.
`
`Lead Counsel
`David Hoffman (Reg. No. 54,174)
`Fish & Richardson P.C.
`3200 RBC Plaza
`60 South Sixth Street
`Minneapolis, MN 55402
`Tel: (512) 472-8154
`Fax: (202) 783-2331
`IPR37307-0012IP1@fr.com
`D.
`Payment of fees (37 C.F.R. § 42.103)
`Petitioner authorizes the Patent and Trademark Office to charge Deposit
`
`Back-Up Counsel
`Martha Hopkins (Reg. No. 46,277)
`Law Offices of S. J. Christine Yang
`17220 Newhope Street
`Suites 101-102
`Fountain Valley, CA 92708
`Tel: (714) 641-4022
`Fax: (714) 641-2082
`IPR@sjclawpc.com
`
`
`
`Account No. 06-1050 for the petition fee and for any other required fees.
`
`IV. REQUEST FOR REVIEW
`A. Claims to be Reviewed
`Petitioner requests review of claims 1-3, 6-8, 11-15, 23-28, and 36-39 of the
`
`’802 patent.
`
`3
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`B.
`Each of the Cited References Is Available as Prior Art
`Each of the references cited in this petition qualifies as prior art. All of the
`
`references have an effective date prior to the earliest potential effective filing date
`
`of the ’802 patent of June 4, 1997.
`
` WO 95/16238, to Jones et al. (“Jones”) (Ex. 1003), which issued as
`
`U.S. Patent No. 5,623,637, was published June 15, 1995.
`
`Accordingly, Jones is prior art under 35 U.S.C. §102(b).
`
`U.S. Patent No. 5,675,645, to Schwartz et al. (Ex. 1004), was filed
`
`April 18, 1995, and thus is prior art under 35 U.S.C. §102(e).
`
` 
`
`
`
`
`
`
`
`U.S. Patent No. 5,237,609, to Kimura (Ex. 1005), issued August 17,
`
`1993, and thus is prior art under 35 U.S.C. §102(b).
`
`
`
`
`
`U.S. Patent No. 5,465,338, to Clay (Ex. 1007), issued November 7,
`
`1995, and thus is prior art under 35 U.S.C. §102(b).
`
`
`
`
`
`Common Interface Specification for Conditional Access and Other
`
`Digital Video Broadcasting Decoder Applications, Digital Video
`
`Broadcasting, DVB Document, May 1996 (hereinafter “Common
`
`4
`
`

`

`Interface Specification”) (Ex. 1008), published May 31, 1996, and
`
`Attorney Docket No. 37307-0012IP1
`
`
`thus is prior art under 35 U.S.C. §102(b).
`
`
`C.
`
`Identification Of Challenge
`
`The ’802 patent is unpatentable based on 35 U.S.C. §103. In particular, the
`
`claims are invalid on the following grounds:
`
`1.
`
`Jones (Ex. 1003) renders claims 1-3, 6-8, 11-15, 23-28, and 36-39 of
`
`the ’802 patent obvious under §103.
`
`2.
`
`Jones (Ex. 1003) in view of Schwartz et al. (Ex. 1004) and/or Kimura
`
`(Ex. 1005) renders claims 1, 11, 23, 36, and 39 of the ’802 patent obvious under
`
`§103.
`
`3.
`
`Jones (Ex. 1003) in view of Common Interface Specification (Ex.
`
`1008) renders claims 3, 8, 15, and 28 of the’802 patent obvious under §103.
`
`4.
`
`Jones (Ex. 1007) in view of Clay (Ex. 1007) renders claims 14 and 27
`
`obvious under §103.
`
`Petitioner evaluates the scope and content of the prior art and, any
`
`differences between the prior art and the claims, and the level of skill of a person
`
`of ordinary skill in the art in accordance with Graham v. John Deere Co., 383
`
`U.S. 1 (1966) and KSR Int’l C. v. Teleflex, Inc., 550 U.S. 398, 417 (2007) (“a court
`
`must ask whether the improvement is more than the predictable use of prior art
`
`elements according to their established functions”) (emphasis added).
`
`5
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`A detailed explanation of why claims 1-3, 6-8, 11-15, 23-28, and 36-39 are
`
`invalid is provided below, including ground stated in the supporting evidentiary
`
`Griffin Dec. (Ex. 1009).
`
`V. BACKGROUND
`A. Description of the ’802 Patent
`The ’802 patent is directed to a peripheral, often portable, device that can
`
`communicate with a host computing device to enable one or more security
`
`operations to be performed by the peripheral device on data stored within the host
`
`computing device, data provided from the host computing device to the peripheral
`
`device, or data retrieved by the host computing device from the peripheral device.
`
`Ex. 1001 at 1:17-27. See generally Griffin Dec. (Ex. 1009), ¶¶ 22-34. The ’802
`
`patent is directed to securing a computational environment wherein a host
`
`computer and a portable peripheral device are connected, such as is the case when
`
`a PCMCIA card is inserted into a PC. Ex. 1001 at 1:29-38. The ’802 patent notes
`
`that such a computational environment is more susceptible to security breaches.
`
`Therefore, prior art mechanisms have been developed to enable increased levels of
`
`environment security to be obtained. Id. at 1:39-2:57.
`
`6
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`Two particular prior art security mechanisms are discussed with reference to
`
`prior art Figures 1 and 2. The lack of data security associated with the Figure 1
`
`prior art can be mitigated by the Figure 2 prior art solution. Ex. 1001 at 2:48-57.
`
`However, the ’802 patent notes remaining deficiencies in the Figure 2 approach.
`
`Id. at 2:58-3:14. Figure 2 of the ‘802 patent is shown below:
`
`The ’802 patent describes the operation of the Figure 2 prior art system as
`
`follows (Ex. 1001 at 2:33-47):
`
`In the system 200, if it is desired to provide secured data
`from the host computing device 201 to the portable
`device 202, the host computing device 201 first causes
`data to be transferred to the security device 203, where
`appropriate cryptographic operations are performed on
`the data. The secured data is then transferred back to the
`host computing device 201, which, in turn, transfers the
`secured data to the portable device 202. Similarly, the
`host computing device 201 can receive secured data from
`
`7
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`the portable device 202 by, upon receipt of secured data,
`transferring the secured data to the security device 203,
`which performs appropriate cryptographic operations on
`the data to convert the data into a form that enables the
`data to be accessed and/or modified by a person who is
`authorized to do so, then transfers the unsecured data
`back to the host computing device 201.
`
`The ’802 patent states that Figure 2’s security mechanism has certain
`
`deficiencies (Ex. 1001 at 2:58-3:14):
`
`However, the system 200 may still not always ensure
`adequately secured data. In particular, unsecured data
`may be provided by the host computing device 201 to the
`portable device 202 if the host computing device 201--
`whether through inadvertent error or deliberate attack by
`a user of the host computing device 201, or through
`malfunction of the host computing device 201--fails to
`first transfer data to the security device 203 for
`appropriate cryptographic treatment before providing the
`data to the portable device 202.
`
`Additionally, the system 200 requires the use of two
`separate peripheral devices (portable device 202 and
`security device 203) to enable the host computing device
`201 to exchange secured data with the portable device
`202. For several reasons, this may be inconvenient.
`First, both devices 202 and 203 may not be available at
`
`8
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`the time that it is desired to perform a secure data
`exchange (e.g., one may have been forgotten or
`misplaced). Second, even if both devices 202 and 203
`are available, it may not be possible to connect both
`devices 202 and 203 at the same time to the host
`computing device 201, making use of the devices 202
`and 203 cumbersome and increasing the likelihood that
`unsecured data is provided by the host computing device
`201 to the portable device 202.
`
`The ’802 patent is directed to a peripheral device that addresses the
`
`deficiencies listed in the prior art of Figure 2. Specifically, the ’802 patent is
`
`directed to a peripheral device that can communicate with a host computing device
`
`to enable one or more security operations to be performed by the peripheral device
`
`on data stored within the host computing device, data provided from the host
`
`computing device to the peripheral device, or data retrieved by the host computing
`
`device from the peripheral device. Ex. 1001 at 1:17-27. The security deficiencies
`
`listed in the ’802 patent are solved by placing the security between the host and the
`
`target, as shown generally in Figure 9A and as described at Ex. 1001 at 16:57-
`
`17:14:
`
`9
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`
`
`Security is enhanced in this topology since communications between the host and
`
`target must necessarily pass through security functionality first en-route to the
`
`target functionality.
`
`The ’802 patent provides a view of such a device’s functionality in Figure 4:
`
`
`
`
`
`As shown and described by the ’802 patent, this embodiment takes the form of a
`
`PCMCIA card that contains both security and target functionality. Ex. 1001 at
`
`5:50-58. The ’802 patent provides in Figure 8 a block diagram view of an
`
`exemplary peripheral device of Figure 4:
`
`10
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`
`
`
`
`The peripheral device 800 has a cryptographic processing device 801 and
`
`connects to a host computing device via PCMCIA connector 806 and to a target
`
`Peripheral Mechanism via connector 807. Id. at 15:42-47. The electrical block
`
`diagram comports well with the arrangement shown in Figure 4, where the security
`
`functionality is a cryptographic processing device and the target functionality is
`
`defined by the Peripheral Mechanism 807.
`
`The ’802 patent describes embodiments where the peripheral device is in
`
`communication with a host computing device via a PCMCIA standard interface.
`
`See, e.g., Ex. 1001 at 5:7-8, 5:57-58; 6:65-67; 8:1-3; 14:59-62. Through this
`
`interface, the host computing device reads the “attribute memory” to determine the
`
`11
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`identity of the card, id. at 8:7, and through this interface the host communicates
`
`instructions to the security device functionality to implement security functionality
`
`and/or to the target functionality to implement target functionality
`
`While the ’802 patent discloses in FIG. 9B the target functionality being
`
`memory functionality (compact flash memory), target functionality is not limited
`
`to a memory module. Exemplary target functionality includes communications
`
`functionality, biometric functionality, and smart card reader functionality. Ex.
`
`1001 at 4:62-5:4. In relation to smart card reader functionality, the ’802 patent
`
`discloses that the smart card reader is used to read an ISO 7816 standard smart
`
`card. Id. at 15:24-41.
`
`The claims of the ’802 patent that are the subject of this inter parties review
`
`petition are reproduced below. Bracketed letters are added, for clarity of the
`
`discussion that follows, as many claim elements appear verbatim in other claims.
`
`1. A peripheral device, comprising:
`[a] security means for enabling one or more security operations to be
`performed on data;
`[b] target means for enabling a defined interaction with a host
`computing device;
`[c] means for enabling communication between the security means
`and the target means;
`[d] means for enabling communication with a host computing device;
`[e] means for operably connecting the security means and/or the target
`
`12
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`means to the host computing device in response to an instruction from
`the host computing device; and
`[f] means for mediating communication of data between the host
`computing device and the target means so that the communicated data
`must first pass through the security means.
`
`2. A peripheral device as in claim 1, wherein the target means
`comprises means for non-volatilely storing data.
`
`3. A peripheral device as in claim 1, wherein the target means
`comprises means for enabling communication between the host
`computing device and a remote device.
`
`6. A peripheral device, comprising:
`[a] security means for enabling one or more security operations to be
`performed on data;
`[b] target means for enabling a defined interaction with a host
`computing device;
`[c] means for enabling communication between the security means
`and the target means,
`[d] means for enabling communication with a host computing device;
`[e] means for operably connecting the security means and/or the target
`means to the host computing device in response to an instruction from
`the host computing device; and
`[f] means for providing to a host computing device, in response to a
`request from the host computing device for information regarding the
`type of the peripheral device, information regarding the function of
`
`13
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`the target means.
`
`7. A peripheral device as in claim 6, wherein the target means
`comprises means for non-volatilely storing data.
`
`8. A peripheral device as in claim 6, wherein the target means
`comprises means for enabling communication between the host
`computing device and a remote device.
`
`11. A peripheral device, comprising:
`[a] security means for enabling one or more security operations to be
`performed on data;
`[b] target means for enabling a defined interaction with a host
`computing device;
`[c] means for enabling communication between the security means
`and the target means;
`[d] means for enabling communication with a host computing device;
`and
`[e] means for mediating communication of data between the host
`computing device and the target means so that the communicated data
`must first pass through the security means.
`
`12. A peripheral device as in claim 11, wherein the target means
`comprises means for non-volatilely storing data.
`
`13. A peripheral device as in claim 12, wherein the means for non-
`volatilely storing data further comprises a solid-state disk storage
`
`14
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`device.
`
`14. A peripheral device as in claim 13, wherein the solid-state disk
`storage device comprises an ATA format flash disk drive.
`
`15. A peripheral device as in claim 11, wherein the target means
`comprises means for enabling communication between the host
`computing device and a remote device.
`
`23. A peripheral device, comprising:
`[a] security means for enabling one or more security operations to be
`performed on data;
`[b] target means for enabling a defined interaction with a host
`computing device;
`[c] means for enabling communication between the security means
`and the target means;
`[d] means for enabling communication with a host computing device;
`[e] means for mediating communication of data between the host
`computing device and the target means so that the communicated data
`must first pass through the security means; and
`[f] means for providing to a host computing device, in response to a
`request from the host computing device for information regarding the
`type of the peripheral device, information regarding the function of
`the target means.
`
`24. A peripheral device, comprising:
`[a] security means for enabling one or more security operations to be
`
`15
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`performed on data;
`[b] target means for enabling a defined interaction with a host
`computing device;
`[c] means for enabling communication between the security means
`and the target means;
`[d] means for enabling communication with a host computing device;
`and
`[e] means for providing to a host computing device, in response to a
`request from the host computing device for information regarding the
`type of the peripheral device, information regarding the function of
`the target.
`
`25. A peripheral device as in claim 24, wherein the target means
`comprises means for non-volatilely storing data.
`
`26. A peripheral device as in claim 25, wherein the means for non-
`volatilely storing data further comprises a solid-state disk storage
`device.
`
`27. A peripheral device as in claim 26, wherein the solid-state disk
`storage device comprises an ATA format flash disk drive.
`
`28. A peripheral device as in claim 24, wherein the target means
`comprises means for enabling communication between the host
`computing device and a remote device.
`
`36. A data security system, comprising:
`
`16
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`[a] a host computing device including one or more device interfaces
`adapted to enable communication with another device;
`[b] a peripheral device, comprising:
`[c] security means for enabling one or more security operations to be
`performed on data;
`[d] target means for enabling a defined interaction with a host
`computing device; and
`[e] means for enabling communication between the security means
`and the target means;
`[f] means for enabling communication with a host computing device;
`and
`[g] means for mediating communication of data between the host
`computing device and the target means so that the communicated data
`must first pass through the security means.
`
`37. A data security system, comprising:
`[a] a host computing device including one or more device interfaces
`adapted to enable communication with another device;
`[b] a peripheral device, comprising:
`[c] security means for enabling one or more security operations to be
`performed on data;
`[d] target means for enabling a defined interaction with a host
`computing device; and
`[e] means for enabling communication between the security means
`and the target means;
`[f] means for enabling communication with a host computing device;
`and
`
`17
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`[g] means for providing to a host computing device, in response to a
`request from the host computing device for information regarding the
`type of the peripheral device, information regarding the function of
`the target means.
`
`38. For use in a peripheral device adapted for communication with a
`host computing device, performance of one or more security
`operations on data, and interaction with a host computing device in a
`defined way, a method comprising the steps of:
`[a] receiving a request from a host computing device for information
`regarding the type of the peripheral device; and
`[b] providing to the host computing device, in response to the request,
`information regarding the type of the defined interaction.
`
`39. For use in a peripheral device adapted for communication with a
`host computing device, performance of one or more security
`operations on data, and interaction with a host computing device in a
`defined way, a method comprising the steps of:
`[a] communicating with the host computing device to exchange data
`between the host computing device and the peripheral device;
`[b] performing one or more security operations and the defined
`interaction on the exchanged data; and
`[c] mediating communication of the exchanged data between the host
`computing device and the peripheral device so that the exchanged data
`must first sass [sic] through means for performing the one or more
`security operations.
`
`
`18
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`The following table groups the claim elements, for clarity:
`
`CLAIM LANGUAGE
`
`ELEMENTS
`
`“[A] peripheral device, comprising”
`
`1, 6, 11, 23, 24, 36b, 37b
`
`“security means for enabling one or more security
`
`1[a], 6[a], 11[a], 23[a],
`
`operations to be performed on data”
`
`24[a], 36[c], 37[c]
`
`“target means for enabling a defined interaction with
`
`1[b], 6[b], 11[b], 23[b],
`
`a host computing device”
`
`24[b], 36[d], 37[d]
`
`“means for enabling communication between the
`
`1[c], 6[c], 11[c], 23[c],
`
`security means and the target means”
`
`24[c], 36[e], 37[e]
`
`“means for enabling communication with a host
`
`1[d], 6[d], 11[d], 23[d],
`
`computing device”
`
`24[d], 36[f], 37[f]
`
`“means for operably connecting the security means
`
`1[e], 6[e]
`
`and/or the target means to the host computing device
`
`in response to an instruction from the host computing
`
`device”
`
`“means for mediating communication of data
`
`1[f], 11[e], 23[e], 36[g]
`
`between the host computing device and the target
`
`means so that the communicated data must first pass
`
`through the security means”
`
`19
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`“the target means comprises means for non-volatilely
`
`2, 7, 12, 25
`
`storing data”
`
`“the target means comprises means for enabling
`
`3, 8, 15, 28
`
`communication between the host computing device
`
`
`
`and a remote device”
`
`“means for providing to a host computing device, in
`
`6[f], 23[f], 24[e], 37[g]
`
`response to a request from the host computing device
`
`for information regarding the type of the peripheral
`
`device, information regarding the function of the
`
`target means”
`
`“the means for non-volatilely storing data further
`
`13, 26
`
`comprises a solid-state disk storage device”
`
`“the solid-state disk storage device comprises an
`
`14, 27
`
`ATA format flash disk drive”
`
`“A data security system, comprising”
`
`36, 37
`
`“a host computing device including one or more
`
`36[a], 37[a]
`
`device interfaces adapted to enable communication
`
`with another device”
`
`“For use in a peripheral device adapted for
`
`38, 39
`
`20
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`communication with a host computing device,
`
`performance of one or more security operations on
`
`data, and interaction with a host computing device in
`
`a defined way, a method comprising the steps of”
`
`
`B.
`Prosecution History
`The application that led to the ’802 patent was filed June 4, 1997, as
`
`Application No. 08/869,305, entitled “Modular Security Device,” with 32 claims.
`
`Ex. 1002.
`
`In a December 11, 1998, Office Action, application claims 6, 7, and 13 were
`
`objected to, and all other claims were either rejected or subjected to a restriction
`
`requirement. Objected-to application claims 6, 7, and 13 read as follows:
`
`6. A peripheral device as in Claim 1, further comprising
`means for mediating communication of data between the
`host computing device and the target means so that the
`communicated data must first pass through the security
`means.
`
`7. A peripheral device as in Claim 1, further comprising
`means for providing to a host computing device, in
`response to a request from the host computing device for
`information regarding the type of the peripheral device,
`information regarding the function of the means for
`
`21
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`enabling a defined interaction with a host computing
`device.
`
`13. A peripheral device as in Claim 8, further
`comprising means for providing to a host computing
`device, in response to a request from the host computing
`device for information regarding the type of the
`peripheral device, information regarding the function of
`the means for enabling a defined interaction with a host
`computing device.
`
`In response, in its March 11, 1999, Response to Office Action (and March
`
`12, 1999, Supplemental Response to Office Action), applicant amended each
`
`independent claim that is the subject of this inter partes review to incorporate a
`
`variation of the language above from application claims 6, 7, and/or 13.
`
`Specifically,
`
`
`
`issued claim elements 1[f], 11[e], 23[e], and 36[g] (see above
`and Griffin Dec. (Ex. 1009), ¶ 35 for nomenclature) were
`amended to include a variation of the objected-to language from
`application claim 6, to recite in issued form, “means for
`mediating communication of data between the host computing
`device and the target means so that the communicated data must
`first pass through the security means”;
`
`
`
`issued claim elements 6[f], 23[f], 24[e], 37[g], and 38[a] were
`amended to include a variation of the objected-to language from
`
`22
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`application claims 7 and 13, to recite in issued form, “means for
`providing to a host computing device, in response to a request
`from the host computing device for information regarding the
`type of the peripheral device, information regarding the
`function of the target means”; and
`
`
`
`issued claim element 39[c] was amended to include a variation
`of the objected-to language from application claim 6, to recite
`in issued form a method that includes “mediating
`communication of the exchanged data between the host
`computing device and the peripheral device so that the
`exchanged data must first sass [sic] through means for
`performing the one or more security operations.”
`
`The claims then were allowed. See Ex. 1002 at June 7, 1999, Notice of
`
`Allowability.
`
`C. Level of Ordinary Skill in the Art
`Petitioner asserts that a person of ordinary skill in the art as of the time of
`
`the ’802 patent would have had a bachelor’s degree in Electrical Engineering and
`
`at least three years of experience working in the fields of digital electronic
`
`interfacing, computing, and electronic data security. Griffin Dec. (Ex. 1009), ¶ 20.
`
`D.
`State of the Art
`At the time of the ’802 patent’s priority date, peripheral security devices
`
`incorporating separate security and target functions were known. One such prior
`
`art security device (known as the DVB common interface) is embodied in a
`
`23
`
`

`

`Attorney Docket No. 37307-0012IP1
`
`
`PCMCIA card that was designed to be plugged into a generic host satellite
`
`television receiver. See Common Interface Specification, Ex. 1008. The PCMCIA
`
`card incorporated on-board circuitry that was used as a common hardware base for
`
`secure descrambling of television broadcast signals. The PCMCIA card also
`
`incorporated a security function to provide access control functionality to the
`
`PCMCIA card so that television subscription authorizations could be ma

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket