throbber

`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`_____________________
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________________
`
`
`GOOGLE, INC.
`Petitioner
`
`v.
`
`BLACKBERRY, LTD.
`Patent Owner
`
`_____________________
`
`IPR No. IPR2017-01620
`U.S. Patent 8,489,868
`_____________________
`
`DECLARATION OF DR. GEORGE T. LIGLER
`
`Patent Owner Ex. 2002, p. cover
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`TABLE OF CONTENTS
`
`I.
`
`INTRODUCTION ........................................................................................ 1
`A. ENGAGEMENT .................................................................................................. 1
`B. BACKGROUND AND QUALIFICATIONS .............................................................. 2
`C. LIST OF MATERIALS CONSIDERED/REVIEWED ................................................. 6
`II.
`LEGAL STANDARDS FOR PATENTABILITY ..................................... 7
`A. ANTICIPATION ................................................................................................. 8
`B. OBVIOUSNESS .................................................................................................. 9
`III. THE ‘868 PATENT .................................................................................... 10
`A. OVERVIEW OF THE ‘868 PATENT ................................................................... 10
`B. PRIORITY DATE ............................................................................................. 14
`C. PERSON OF ORDINARY SKILL IN THE ART ...................................................... 14
`IV. CLAIM CONSTRUCTION ...................................................................... 15
`A. “ABRIDGED VERSION OF A SOFTWARE APPLICATION” (CLAIM 86) ............... 17
`V.
`THE CHALLENGED CLAIMS ARE PATENTABLE OVER LIN .... 18
`A. OVERVIEW OF LIN ......................................................................................... 19
`B. DR. MCDANIEL’S ANALYSIS OF INDEPENDENT CLAIMS 1 AND 76 IMPROPERLY
`MIXES LIN’S DISTINCT EMBODIMENTS .......................................................... 20
`C. LIN DOES NOT DISCLOSE “BASED UPON VERIFYING THE DIGITAL SIGNATURE
`AT THE MOBILE DEVICE, THE MOBILE DEVICE ALLOWING THE SOFTWARE
`APPLICATION ACCESS TO THE SENSITIVE API” ............................................... 29
`D. LIN DOES NOT DISCLOSE “WHEREIN THE PRIVATE KEY IS NOT ACCESSIBLE TO
`THE MOBILE DEVICE” ..................................................................................... 39
`VI. CLAIMS 78 AND 81 ARE PATENTABLE OVER LIN ........................ 42
`VII. CLAIMS 85 AND 104 ARE PATENTABLE OVER LIN ...................... 49
`VIII. CLAIM 95 IS PATENTABLE OVER LIN ............................................. 52
`IX. CLAIMS 13, 88, AND 98 ARE PATENTABLE OVER LIN AND
`GARST ........................................................................................................ 54
`A. CLAIMS 13 AND 88 ........................................................................................ 54
`B. CLAIM 98 ....................................................................................................... 56
`X.
`CLAIMS 77, 79 AND 82 ARE PATENTABLE OVER LIN AND
`DAVIS .......................................................................................................... 58
`XI. CLAIM 86 IS PATENTABLE OVER LIN AND SIBERT .................... 61
`
` Patent Owner Ex. 2002, p. i
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`XII. CLAIM 112 IS PATENTABLE OVER LIN AND GONG .................... 65
`A. CLAIMS 112 ................................................................................................... 65
`
`
`
` Patent Owner Ex. 2002, p. ii
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`PETITIONER’S EXHIBITS CONSIDERED
`
`[Ne[FsaibiDeserpdon
`
`1008|The Authoritative Dictionary of IEEE Standards Terms, IEEE Std. 100-
`2000 (7th ed. 2000
`1009|Bruce Schneier, “Applied Cryptography”(2nd ed. 1996)
`
`1014|U-S. Patent No. 5,724,425 (“Chang”)
`
`1015|U.S. Patent No. 7,243,236 (“Sibert”)
`
`
`1016|Li Gong,“Inside Java 2 Platform Security Architecture: Cryptography,
`
`1018|U-S. Patent No. 5,657,378 (“Haddock”)
`
`1019|US. Provisional Patent Application No. 60/146,426
`
`1010|BlackBerry’s First Amended Complaint, BlackBerry LTD.v. Blu
`Products, Inc., Case No. 1:16-cv-23535 (S.D. Fla.
`101]|U-S. Patent No. 6,766,353 (“Lin”)
`
`1012.|U.S. Patent No. 6,188,995 (“Garst’) 1013|U.S. Patent No. 5,844,986 (“Davis”)
`
`Gary McGrawetal., “Securing Java” (1999)
`
`U.S. Patent No. 6,298,354 (“Saulpaugh”)
`
`US. Patent No. 5,421,013 (“Smith”)
`
`Dorothy E. Denning, “Cryptography and Data Security” (1982)
`
`Patent Owner Ex. 2002,p. 111
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`Fm
`
`
`
`1029|U.S. Patent No. 6,721,809 (“Roy”)
`
`1030|U.S. Patent No. 6,678,887 (“Hallman”)
`
`103]|David Flanagan, “Java in a Nutshell” (Nov. 1999)
`
`1032.|Bill Venners, “Inside the Java 2 Virtual Machine” (1999)
`
`PATENT OWNER’S EXHIBITS CONSIDERED
`
`2004|Deposition Transcript of Dr. Patrick D. McDaniel (Feb. 21, 2018)
`
`Exhibit Description
`
`Webster’s NewWorld Dictionary (1984)
`
`Patent OwnerEx. 2002,p. iv
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`I.
`
`INTRODUCTION
`A. Engagement
`1.
`I have been retained on behalf of Patent Owner Blackberry, Ltd.
`
`(“Blackberry”) to offer statements and opinions generally regarding the novelty
`
`and understanding of a person of ordinary skill in the art (“POSA”) in the industry
`
`as it relates to U.S. Patent No. 8,489,868 (Ex. 1001, “the ’868 patent”), which is
`
`entitled “Software Code Signing System and Method.” I understand that Petitioner
`
`Google LLC (“Petitioner”) has challenged claims 1, 13, 76-86, 88-95, 98, 100,
`
`104, 112, 113, 137, 139, and 142 of the ’868 patent as unpatentable over certain
`
`prior art. I have been asked to provide my opinion and analysis of the various
`
`references and opinions advanced in the Declaration of Dr. Patrick D. McDaniel,
`
`which I understand to be Exhibit 1002 to these proceedings (“McDaniel
`
`Declaration”).
`
`2.
`
`I have personal knowledge of the facts and opinions set forth in this
`
`declaration, and believe them to be true. If called upon to do so, I would testify
`
`competently thereto. I have been warned that willful false statements and the like
`
`are punishable by fine or imprisonment, or both.
`
`3.
`
`I am being compensated for my time at the rate of $600 per hour for
`
`my work in connection with this matter. I am being reimbursed for reasonable and
`
`customary expenses associated with my work in this investigation. This
`
`
`
` Patent Owner Ex. 2002, p. 1
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`compensation is not dependent in any way on the contents of this Declaration, the
`
`substance of any further opinions or testimony that I may provide or the ultimate
`
`outcome of this matter.
`
`B.
`4.
`
`Background and Qualifications
`I am self-employed as the sole proprietor of GTL Associates. I
`
`provide consulting services primarily related to systems engineering of computer
`
`systems, both hardware and software, and telecommunications. “Systems
`
`engineering” is the engineering that it takes to put together a computer system,
`
`starting from requirements through design, implementation and fielding. Since I
`
`began GTL Associates in 1988, I have worked with 42 clients in the United States,
`
`Europe and Asia. I have also served on a pro bono basis both (1) on five
`
`panels/committees formed by the National Academies of Sciences, Engineering,
`
`and Medicine to advise the Government on issues related to computer system
`
`technology, design and implementation and, (2) at the request of then-Secretary of
`
`Commerce Gutierrez, on a 2008 Expert Panel related to technology
`
`implementation for the 2010 Census.
`
`5.
`
`I earned a Bachelor’s degree in Mathematics (summa cum laude) from
`
`Furman University in 1971, and Master of Science (M.Sc.) and Doctorate (D.Phil.)
`
`degrees in Computer Science from Oxford University in 1973 and 1975,
`
`respectively. My studies at Oxford were supported by a Rhodes Scholarship. My
`
`
`
` Patent Owner Ex. 2002, p. 2
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`doctoral dissertation was directed to the design of computer programming
`
`languages.
`
`6.
`
`I have forty-one years of professional experience in the design and
`
`development of hardware and software for computer and telecommunications
`
`systems (as well as the design and development of those systems in their entirety)
`
`for a wide variety of applications. These computer systems vary from embedded
`
`real-time microprocessor-based application-specific systems to color graphics
`
`monitors and display generators for industrial control applications to data
`
`communication systems employing cellular telephones to physiological signal
`
`monitoring systems such as pulse oximeters to personal-computer based systems to
`
`major national and international data communications networks. Additionally, I
`
`have reviewed the software and/or hardware for many products, ranging from
`
`operating systems and browsers to cellular phones and base stations and network
`
`middleware.
`
`7.
`
`I have been involved in the research, development, specification,
`
`and/or assessment of a number of systems involving presentation of graphical
`
`images and user interfaces on displays (e.g., graphical user interfaces and data
`
`applications for cellular telephones and personal computers; specialized displays
`
`for air traffic control towers; avionics systems for aeronautical flight management,
`
`navigation, telecommunications, and surveillance; color raster scan monitors and
`
`
`
` Patent Owner Ex. 2002, p. 3
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`display generators for industrial and military control applications; image
`
`processing systems; and artificial intelligence-based systems for pattern
`
`recognition in infrared images). As a specific example, during the 1990s I worked
`
`with a major cellular carrier on cellular data applications for the trucking industry.
`
`This involved, among other things, providing a user interface on a cellular
`
`telephone.
`
`8.
`
`Additionally, I have been involved in the research, development,
`
`specification, and/or assessment of a number of systems involving
`
`information/data security. For example, in the 1980’s I was involved with a
`
`number of data network communication link encryption devices for both classified
`
`and Sensitive but Unclassified Information (SUI)1. One such device was a
`
`commercial product certified by the U.S. National Security Agency for the
`
`protection of SUI. In the early and mid-1990’s, I led and/or participated in the
`
`development of several aviation standards involving integrity and security
`
`considerations for data being communicated between ground facilities and aircraft
`
`(e.g., assuring that data received by the aircraft was the same data as that
`
`transmitted from the ground; assuring that the messages received by the aircraft
`
`
`1 SUI is designation of information in the United States federal government
`
`that, though unclassified, often requires strict controls over its distribution.
`
`
`
` Patent Owner Ex. 2002, p. 4
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`were from a valid ground station in the context of the operation being performed
`
`by the aircraft). I have subsequently been involved in the development and/or
`
`assessment of several systems dealing with database security and database access
`
`controls using cryptographic techniques.
`
`9.
`
`In February 2017, I was elected to membership in the National
`
`Academy of Engineering (NAE) and am a member of the Academy’s Section on
`
`Special Fields and Interdisciplinary Engineering. NAE membership is “one of the
`
`highest professional honors accorded an engineer. Members have distinguished
`
`themselves in business and academic management, in technical positions, as
`
`university faculty, and as leaders in government and private engineering
`
`organizations. Members are elected to NAE membership by their peers (current
`
`NAE members).” (https://www.nae.edu/MembersSection.aspx) Additionally, I am
`
`a Life Senior Member of the Institute for Electrical and Electronics Engineers
`
`(IEEE), and a member of the IEEE Computer Society, the Association for
`
`Computing Machinery (ACM), the Institute of Navigation, and the American
`
`Association of Rhodes Scholars.
`
`10.
`
`I have authored or co-authored twenty-one technical publications in
`
`several fields, including articles relating to computer graphics, computer
`
`programming languages, computer software development methodologies, and
`
`computer/computer system architecture. I have also co-authored five reports of the
`
`
`
` Patent Owner Ex. 2002, p. 5
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`National Academies of Sciences, Engineering and Medicine and been both a leader
`
`and major contributor to the development of six major national/international
`
`standards in the aviation industry for navigation and surveillance systems on
`
`aircraft as well as on the ground. As mentioned above, several of these standards
`
`included consideration of e.g., assuring that data transmitted over a network was
`
`not altered prior to that data being received.
`
`11. A copy of my resume is provided as Exhibit 2003 along with a list of
`
`my publications. My resume lists a number of major awards related to my work in
`
`interdisciplinary computer system engineering for which I have been a recipient or
`
`co-recipient.
`
`12. For the purposes of this Declaration, I have assumed that the priority
`
`date of the ’868 patent is September 21, 2000. Well before September 21, 2000,
`
`my level of skill in the art was at least that of a POSA, as discussed above. I am
`
`qualified to provide opinions concerning what a POSA would have known and
`
`understood at that time, and my analysis and conclusions herein are from the
`
`perspective of a POSA as of September 21, 2000.
`
`C. List of Materials Considered/Reviewed
`13. My opinions are based on my years of education, research, and
`
`experience, as well as my investigation and study of relevant materials. In forming
`
`my opinions, I have considered the materials I identify in this report, those listed in
`
`
`
` Patent Owner Ex. 2002, p. 6
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`the exhibit lists included at the beginning of this report, BlackBerry’s Patent
`
`Owner Preliminary Response, and the Board’s Institution Decision in this
`
`proceeding.
`
`14. This report represents only those opinions I have formed to date. I
`
`reserve the right to revise, supplement, and/or amend my opinions stated herein
`
`based on any new information and on my continuing analysis of the materials
`
`already provided.
`
`II. LEGAL STANDARDS FOR PATENTABILITY
`15. Certain basic legal principles have been explained to me by counsel
`
`for Patent Owner. These legal standards, as they were explained to me, are
`
`described below.
`
`16.
`
`I understand that for an invention claimed in a patent to be found
`
`patentable, it must be, among other things, new and not obvious from what was
`
`known before the invention was made. I understand the information that is used to
`
`evaluate whether an invention is new and not obvious is generally referred to as
`
`“prior art” and can include, for example, patents and printed publications.
`
`17.
`
`I understand that in this proceeding Petitioner Google has the burden
`
`of proving that the claims of the ’868 Patent are unpatentable over the prior art by
`
`a preponderance of the evidence. I understand that “a preponderance of the
`
`evidence” is evidence sufficient to show that a fact is more likely true than it is not.
`
`
`
` Patent Owner Ex. 2002, p. 7
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`18.
`
`I understand that there are two ways in which prior art may render a
`
`patent claim unpatentable. The prior art can be shown to “anticipate” the claim or it
`
`can be shown to have made the claim “obvious.”
`
`A. Anticipation
`
`19.
`
`I understand that, for a patent claim to be “anticipated” by the prior
`
`art, each and every requirement of the claim must be found, expressly or
`
`inherently, in a single prior art reference as recited in the claim.
`
`20.
`
`I understand that claim limitations that are not expressly described in
`
`a prior art reference may still be there if they are “inherent” to the thing or process
`
`being described in the prior art.
`
`21.
`
`I understand that it can be acceptable to consider evidence other than
`
`the information in a particular prior art document to determine if a feature is
`
`necessarily present in or inherently described by that document.
`
`22.
`
`I understand that to be anticipatory, a reference must not only
`
`explicitly or inherently disclose every claimed feature, but those features must also
`
`be “arranged as in the claim.” Differences between the prior art reference and a
`
`claimed invention, however slight, invoke the question of obviousness, not
`
`anticipation.
`
`
`
` Patent Owner Ex. 2002, p. 8
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`B. Obviousness
`
`23.
`
`I understand that a claimed invention is not patentable if it would have
`
`been obvious to a person of ordinary skill in the field of the invention at the time
`
`the invention was made. I understand that in determining whether a patent claim is
`
`obvious, one must consider the following four factors: (i) the scope and content of
`
`the prior art, (ii) the differences between the prior art and the claims at issue, (iii)
`
`the knowledge of a person of ordinary skill in the pertinent art; and (iv) objective
`
`factors indicating obviousness or non-obviousness, if present (such as commercial
`
`success or industry praise).
`
`24.
`
`In addition, I understand that the obviousness inquiry should not be
`
`done in hindsight, but must be done using the perspective of a person of ordinary
`
`skill in the relevant art as of the effective filing date of the patent claim.
`
`25.
`
`I understand that the Supreme Court has rejected a rigid approach to
`
`determining the question of obviousness. I understand that while there is no
`
`requirement to identify a “teaching, suggestion, or motivation to combine” known
`
`elements to establish obviousness, it still is necessary to identify a reason that
`
`would have prompted a person of ordinary skill in the art to combine the known
`
`elements.
`
`26.
`
`I understand that an invention that might be considered an obvious
`
`variation or modification of the prior art may be considered non-obvious if one or
`
`
`
` Patent Owner Ex. 2002, p. 9
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`more prior art references discourages or leads away from the line of inquiry
`
`disclosed in the reference(s). My understanding of the doctrine of teaching away
`
`requires a clear indication that the modification should not be attempted (e.g.,
`
`because it would not work or statements that the modification should not be made).
`
`III. THE ‘868 PATENT
`A. Overview of the ‘868 Patent
`27. The ’868 patent generally describes security protocols involving
`
`software code signing schemes for mobile devices. Ex. 1001 at 1:18-25. The ’868
`
`patent explains that application developers may create software applications that
`
`may require access to one or more application programming interfaces (“APIs”).
`
`Id. at 3:9-45. APIs allow a software application to interact with the device
`
`resources associated with those APIs. Id.
`
`28. Because prior code signing protocols were not “secure and rely solely
`
`on the judgment of the user, there is a serious risk that destructive, ‘Trojan horse’
`
`type software applications may be downloaded and installed onto a mobile
`
`device.” Id. at 1:39-43. The ’868 patent explains that among a device’s APIs,
`
`certain “sensitive” APIs may expose functionality that is particularly vulnerable to
`
`a virus or malicious code in a device software application. Id. at 3:46-50. For
`
`example, APIs “that interface with cryptographic routines, wireless communication
`
`
`
` Patent Owner Ex. 2002, p. 10
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`functions, or proprietary data models such as address book or calendar entries”
`
`may be deemed “sensitive.” Id. at 3:50-54.
`
`29. The ’868 patent further explains that an API on a device may be
`
`classified as a “sensitive” API if, for example, the mobile device manufacturer,
`
`API author, wireless network operator, device owner or operator, or some other
`
`entity could be adversely impacted should a virus or malicious program access the
`
`API. Ex. 1001 at 3:46-54. Figure 3 below shows various API Libraries A, B, C,
`
`and D on mobile device 62. API Libraries A and C include sensitive APIs and API
`
`Libraries B and D do not include sensitive APIs:
`
`Ex. 1001 at Fig. 3; see also id. at 7:19-23.
`
`
`
`
`
` Patent Owner Ex. 2002, p. 11
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`30. To protect against unauthorized access to sensitive APIs, the ‘868
`
`patent provides a mechanism for controlling access to sensitive APIs by using
`
`digital signatures. Ex. 1001 at 3:54-61. For example, as depicted below in Figure
`
`1, in one embodiment, the application developer 12 sends its software application
`
`Y 14 to code signing authority 16, which generates one or more digital signatures,
`
`appends the signature(s) to software application Y 14, and sends the signed
`
`software application Y 22, “comprising the software application Y 14 and the
`
`digital signature,” to the developer 12. Id. at 4:24-43, 3:62-4:12. The signed
`
`software application Y 22 may then be downloaded by mobile device 28. Id. at
`
`4:56-58.
`
`Id. at Fig. 1.
`
`
`
`
`
` Patent Owner Ex. 2002, p. 12
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`31. Once a digitally signed software application is downloaded onto the
`
`mobile device, the mobile device verifies the one or more digital signatures before
`
`granting access to an API library, including an API library classified as sensitive.
`
`Ex. 1001 at 4:66-5:3. The ’868 patent also describes scenarios in which the
`
`software application can be signed with multiple signatures. In some such
`
`scenarios, “all APIs are restricted and locked until a ‘global’ signature is verified
`
`for a software application. . . . Access to sensitive device APIs and libraries, if
`
`any, could then be further restricted” and locked until corresponding digital
`
`signatures are verified. Id. at 4:1-12.
`
`32. The ’868 patent also discloses that the device may display a message
`
`to the user before the software application accesses a sensitive API and after
`
`appropriate digital signatures have been verified, thereby giving the user final
`
`control to grant or deny access to the sensitive API. Id. at 8:11-18, 9:45-51.
`
`33.
`
`Independent claim 76 recites a method related to the above
`
`disclosures:
`
`76. A method for controlling access to an application platform of a mobile
`device, comprising:
`
`storing a plurality of application programming interfaces (APIs) at the
`
`mobile device, wherein at least one API comprises a sensitive API to which
`access is restricted;
`
`receiving, at the mobile device, an indication that a software
`application on the mobile device is requesting access to the sensitive API
`stored at the mobile device;
`
`
`
`
` Patent Owner Ex. 2002, p. 13
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`determining, at the mobile device, whether the software application is
`
`signed, wherein a signed software application includes a digital signature
`generated using a private key of a private key-public key pair, wherein the
`private key is not accessible to the mobile device;
`
`mobile device using a public key of the private key-public key pair to
`
`verify of the digital signature of the software application; and
`
`based upon verifying the digital signature at the mobile device, the
`
`mobile device allowing the software application access to the sensitive API.
`
`B.
`Priority Date
`34. The ‘868 patent issued from Patent Application No. 10/381,219, filed
`
`on March 20, 2003. The ‘868 patent claims priority to U.S. Provisional
`
`Application No. 60/234,152, filed September 21, 2000, U.S. Provisional
`
`Application No. 60/235,354, filed September 26, 2000, and U.S. Provisional
`
`Application No. 60/270,663, filed February 20, 2001. The McDaniel Declaration
`
`uses “the mid-to-late 2000 time frame, including the September 21, 2000 filing
`
`date of the ’152 provisional application” as the timeframe used in his analysis (Ex.
`
`1002 ¶ 17). For purposes of this Declaration, I have assumed the same relevant
`
`time frame.
`
`C.
`35.
`
`Person of Ordinary Skill in the Art
`I understand that with regard to discussions of patent validity, a patent
`
`claim must be analyzed from the perspective of a POSA at the time of the
`
`invention.
`
`
`
` Patent Owner Ex. 2002, p. 14
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`36.
`
`I understand that, in ascertaining the appropriate level of ordinary skill
`
`in a field of art, several factors should be considered, including (1) the types of
`
`problems encountered in the art; (2) the prior art solutions to those problems; (3)
`
`the rapidity with which innovations are made; (4) the sophistication of the
`
`technology; and (5) the educational level of active workers in the field of the
`
`patent.
`
`37.
`
`I further understand that a POSA is not a specific real individual, but
`
`rather is a hypothetical individual having the qualities reflected by the factors
`
`above.
`
`38. Having considered these factors, in my opinion, on or before
`
`September 21, 2000, a POSA in the field of the ’868 patent would likely have had
`
`(1) at least a bachelor’s degree in computer science, or the equivalent and (2) at
`
`least two years of experience in secure systems, including security protocols for
`
`software applications. More education can substitute for practical experience, and
`
`vice-versa.
`
`IV. CLAIM CONSTRUCTION
`39.
`I understand that in an inter partes review proceeding of an unexpired
`
`patent the claims of the patent are to be given their broadest reasonable
`
`interpretation in light of the patent specification. I also understand that, under the
`
`broadest reasonable interpretation standard, the claim terms must be evaluated
`
`
`
` Patent Owner Ex. 2002, p. 15
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`using the ordinary meaning of the words being used in those claims from the
`
`perspective of a person of ordinary skill in the art in light of the specification.
`
`40.
`
`I understand that the ’868 patent is not expired, so the claims must be
`
`given the broadest reasonable interpretation consistent with the specification.
`
`Accordingly, in formulating my opinions, I have applied such a broadest
`
`reasonable interpretation to the claims of the ’868 patent as I perceive a person of
`
`ordinary skill in the art would have understood them at the time of the earliest
`
`priority date of the ’868 patent, after reading the ’868 patent specification and
`
`prosecution file history.
`
`41.
`
`I am concurrently submitting a declaration in IPR2017-01619, which
`
`also involves claims of the ’868 patent. There, I discuss three terms for which I
`
`understand Patent Owner is proposing constructions:
`
`Claim Term
`“signed software application”
`
`Patent Owner’s Proposed Construction
`a software application that is itself signed
`
`“sensitive API”
`
`“non-sensitive API”
`
`
`
`an API that is classified as implicating a
`security concern
`an API that is not classified as implicating
`a security concern
`
`42. As discussed in detail in my declaration in IPR2017-01619, I believe
`
`Patent Owner’s proposed constructions for all three terms are consistent with the
`
`intrinsic and extrinsic record for the ’868 patent. The proper constructions of those
`
`
`
` Patent Owner Ex. 2002, p. 16
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`terms, however, do not impact my analysis in this Declaration. I, therefore, do not
`
`address the proper constructions of those terms in this declaration.
`
`A.
`
`43.
`
`“Abridged Version of a Software Application” (Claim 86)
`
`I understand that Patent Owner has proposed that an “abridged version
`
`of a software application” be construed as “a unique transformation of the software
`
`application that is smaller than the software application.” I believe this is
`
`consistent with both the intrinsic and extrinsic record.
`
`44. The ’868 patent describes the concept of an “abridging scheme or
`
`algorithm,” which is used like a hash function to “generate different outputs for
`
`different inputs.” Ex. 1001, 6:32-37. A POSA would understand this abridging
`
`function to be an example of the application-specific “transformed version of the
`
`information” that the ’868 patent describes when explaining the process through
`
`which signatures are generated. Id., 4:50-55, 10:64-11:2 (“[T]he digital signature
`
`is preferably generated from a hash or otherwise transformed version of the
`
`software application and is therefore application-specific.”).
`
`45. Like a hash function, an abridging function “generates different
`
`outputs for different inputs,” thus ensuring “that every software application will
`
`have a different abridged version and thus a different signature.” Id., 6:37-41. The
`
`abridging schemes used in the context of this signing process have the
`
`characteristic that each of them “generates different outputs for different inputs.”
`
`
`
` Patent Owner Ex. 2002, p. 17
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`Id., 6:32-37. This is consistent with the ordinary meaning of “abridge” generally:
`
`“to reduce in scope, extent, etc.; shorten” and “to shorten by using fewer words
`
`but keeping the main contents; condense.” Ex. 2005 at 3.
`
`46. A POSA would have understood that, in the context of the ’868
`
`patent, an abridging function thus generates a unique transformation of the
`
`software application to be used in a signature process. Ex. 1001, 4:50-55, 6:32-41,
`
`10:64-11:2. This transformation is “unique” to the software application because,
`
`like a hash function, “every software application will have a different abridged
`
`version.” Id., 6:32-41.
`
`V. THE CHALLENGED CLAIMS ARE PATENTABLE OVER LIN
`47. The McDaniel Declaration states and discusses Dr. McDaniel’s
`
`opinion that every limitation of independent claims 1 and 76 of the ‘868 patent is
`
`expressly or necessarily disclosed by Lin. (Ex. 1002 ¶¶ 130-200). I disagree for
`
`the reasons given below. Because Lin does not disclose—either expressly or
`
`inherently—each and every limitation of independent claims 1 and 76, Lin cannot
`
`disclose each and every limitation of the other challenged claims, all of which
`
`depend on either claim 1 or 76.
`
`
`
` Patent Owner Ex. 2002, p. 18
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`A. Overview of Lin
`48. U.S. Patent Number 6,766,353 (Ex. 1011, “Lin”) is entitled “Method
`
`for Authenticating Java Archive (JAR) for Portable Devices.” The patent
`
`application that led to Lin was filed on July 11, 2000.
`
`49. Lin explains that prior art methods of authenticating whether an
`
`application originated from a trusted source were designed for desktop personal
`
`computers, but were not well-suited for small, portable devices (e.g., personal
`
`organizers and mobile communication devices) due to, e.g., the limited memory
`
`resources available on the smaller mobile devices. Ex. 1011 at 1:40-58. In
`
`particular, Lin notes that compared to the limited memory resources of smaller
`
`mobile devices, the X.509 certificates that were widely used for authentication on
`
`desktop computers are large files and that “since the certificate comes bundled
`
`with the application typically, the device must load both the application and the
`
`certificate.” Id. at 1:50-56.
`
`50. Lin proposes solving the problem of downloading and authenticating
`
`the author of an application on a client device with limited computing resources by
`
`creating an application descriptor file (“ADF”) that is digitally signed by the
`
`application developer and contains information associated with an application and
`
`information against which the application can be authenticated. Ex. 1011 at 2:32-
`
`35. Unlike in the prior art, where the X.509 certificate was bundled with the
`
`
`
` Patent Owner Ex. 2002, p. 19
`Google Inc. v. BlackBerry Ltd., IPR2017-01620
`
`

`

`application so that the device must load both, the signed ADF may be downloaded
`
`first onto the client device separately from the application. Id. at 4:66-5:1.
`
`51. Once certain info

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket