throbber
Paper No. 8
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`––––––––––––––––––
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`––––––––––––––––––
`
`GOOGLE INC.,
`Petitioner,
`
`v.
`
`BLACKBERRY LTD.,
`Patent Owner.
`
`––––––––––––––––––
`
`Case No. IPR2017-01620
`U.S. Patent No. 8,489,868
`
`––––––––––––––––––
`
`PATENT OWNER’S PRELIMINARY RESPONSE
`
`
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`TABLE OF CONTENTS
`
`I.
`
`II.
`
`Introduction ...................................................................................................... 1
`
`Overview of the ’868 Patent ............................................................................ 2
`
`III. Claim Construction .......................................................................................... 6
`
`A.
`
`“Sensitive API To Which Access Is Restricted”................................... 6
`
`i.
`
`ii.
`
`A “Sensitive API” Is One That Implicates a Security Concern
`Relative to Non-Sensitive APIs .................................................. 6
`
`“[A] Plurality of [APIs] …, Wherein at Least One API
`Comprises a Sensitive API to Which Access Is Restricted”
`Requires the “Sensitive API” to Have Additional Access
`Restrictions Relative to Non-Sensitive APIs .............................. 7
`
`B.
`
`“Determining, at the Mobile Device, Whether the Software
`Application Is Signed, Wherein a Signed Software Application
`Includes a Digital Signature Generated Using a Private Key of a
`Private Key-Public Key Pair” ............................................................. 10
`
`IV. The Petition Fails to Meet the Requirements for Instituting an Inter Partes
`Review ........................................................................................................... 14
`
`A. Overview of Lin (Ex. 1011) ................................................................ 15
`
`B.
`
`C.
`
`Lin Does Not Disclose “A Signed Software Application” ................. 17
`
`Lin Does Not Disclose “A Sensitive API to Which Access Is
`Restricted” ........................................................................................... 20
`
`i.
`
`ii.
`
`Petitioner’s Analysis Reads “Sensitive” Out of the Claims ..... 20
`
`Lin Does Not Disclose Additional Access Restrictions for
`“Sensitive APIs” ....................................................................... 22
`
`D.
`
`Lin Does Not Expressly or Inherently Disclose “Wherein the Private
`Key Is Not Accessible to the Mobile Device” .................................... 23
`
`i
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`E.
`
`The Petition Fails to Show Gong is a Printed Publication (Claims 93,
`100, 112, and 139) ............................................................................... 26
`
`i.
`
`ii.
`
`iii.
`
`Petitioner Fails to Show When Gong Was Publicly
`Accessible ................................................................................. 28
`
`Petitioner Fails to Show Gong Was Sufficiently Indexed ........ 31
`
`Petitioner Relies Exclusively on Inadmissible Hearsay ........... 33
`
`F.
`
`The Board Should Deny the Petition Under 35 U.S.C. § 325(d)
`Because Lin Was Overcome During Prosecution ............................... 34
`
`V.
`
`Conclusion ..................................................................................................... 36
`
`Certificate Of Compliance ....................................................................................... 37
`
`Certificate Of Service............................................................................................... 38
`
`
`
`
`
`
`
`ii
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`ABS Global, Inc. v. Inguran, LLC,
`IPR2016-00927, Paper 33 (PTAB Oct. 2, 2017) .......................................... 29, 32
`Bettcher Indus. v. Bunzl USA, Inc.,
`661 F.3d 629 (Fed. Cir. 2011) ............................................................................ 26
`Blue Calypso, LLC v. Groupon, Inc.,
`815 F.3d 1331 (Fed. Cir. 2016) .................................................................... 27, 31
`In re Cronyn,
`890 F.2d 1158 (Fed. Cir. 1989) .......................................................................... 32
`Elec. Frontier Found. v. Personal Audio,
`LLC, IPR2014-00070, Paper 21 (PTAB Apr. 18, 2014) .................................... 27
`Hill-Rom Servs., Inc. v. Stryker Corp.,
`755 F.3d 1367 (Fed. Cir. 2014) .......................................................................... 12
`In re Klopfenstein,
`380 F.3d 1345 (Fed. Cir. 2004) .......................................................................... 26
`L-3 Comm. Holdings, Inc. v. Power Survey, LLC,
`IPR2014-00832, Paper 9 (PTAB Nov. 14, 2014) ............................................... 26
`In re Lister,
`583 F.3d 1307 (Fed. Cir. 2009) ........................................................ 27, 31, 32, 33
`Neil Ziegman, N.P.Z., Inc. v. Stephens,
`IPR2015-01860, Paper 11 (P.T.A.B. Feb. 24, 2016) .......................................... 35
`Nidec Motor Corp. v. Zhongshan Broad Ocean Motor Co. Ltd,
`851 F.3d 1270 (Fed. Cir. 2017) .......................................................................... 26
`On-Line Techs., Inc. v. Bodenseewerk Perkin-Elmer GmbH,
`386 F.3d 1133 (Fed. Cir. 2004) .......................................................................... 12
`ServiceNow, Inc. v. Hewlett-Packard Co.,
`IPR2015-00707, Paper 12 (PTAB Aug. 26, 2015) ............................................. 34
`iii
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`ServiceNow, Inc. v. Hewlett-Packard Co.,
`IPR2015-00716, Paper 13 (PTAB Aug. 2, 2015) ............................................... 34
`Square,
`CBM2014-00156, Paper 22 ................................................................................ 28
`In re Suitco Surface, Inc.,
`603 F.3d 1255 (Fed. Cir. 2010) .......................................................................... 21
`Unwired Planet, LLC v. Apple Inc.,
`829 F.3d 1353 (Fed. Cir. 2016) .................................................................... 13, 14
`Statutes
`35 U.S.C. § 102(b) ................................................................................................... 27
`35 U.S.C. § 311 ........................................................................................................ 11
`35 U.S.C. § 311(b) ................................................................................................... 26
`35 U.S.C. § 325(d) ............................................................................................... 2, 34
`Other Authorities
`37 C.F.R. § 42.100(b) ................................................................................................ 8
`37 C.F.R. § 42.107 ..................................................................................................... 1
`Fed. R. Evid. 801 ..................................................................................................... 34
`
`
`
`
`iv
`
`

`

`IPR2017-01620
`
`I.
`
`Introduction
`
`Patent Owner’s Preliminary Response
`
`Pursuant to 37 C.F.R. § 42.107, Patent Owner BlackBerry Limited (“Patent
`
`Owner”) submits this Preliminary Response in opposition to the Petition for Inter
`
`Partes Review of U.S. Patent No. 8,489,868 (“’868 patent”). The Petition
`
`challenges the patentability of claims 1, 13, 76-86, 88-95, 98, 100, 104, 112, 113,
`
`137, 139, and 142 across eight different grounds, each of which relies on U.S.
`
`Patent No. 6,766,353 (“Lin”). As explained below, trial should not be instituted
`
`because the Petition fails in at least four independent ways—each of which is fatal
`
`to the Petition.
`
`First, Lin does not disclose “a signed software application,” as required by
`
`each of the challenged claims. Rather, Lin discloses only authentication using a
`
`signed file that is entirely separate from the software application.
`
`Second, Lin does not disclose “a sensitive API,” as required by each of the
`
`challenged claims. To the extent Lin discloses an application programming
`
`interface (“API”) at all, it certainly does not disclose any APIs that are “sensitive,”
`
`i.e., one that implicates additional security concerns relative to a non-sensitive API.
`
`Third, Lin does not disclose “wherein the private key is not accessible to the
`
`mobile device,” as required by each of the challenged claims. Petitioner admits
`
`that Lin does not expressly disclose this element and instead asserts inherency, but
`
`fails to explain why that element would have necessarily been present in Lin.
`
`1
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`Finally, the Board should exercise its discretion and deny the petition under
`
`35 U.S.C. § 325(d) because each of Petitioner’s asserted grounds of unpatentability
`
`relies on Lin, which was considered by the Examiner during prosecution and in
`
`view of which the claims were allowed. Petitioner provides no justification for
`
`why the Board should revisit art that already was considered and overcome during
`
`prosecution. For each of these reasons, the Petition should be denied.
`
`II. Overview of the ’868 Patent
`
`The ’868 patent, entitled “Software Code Signing System and Method,” was
`
`filed on March 20, 2003 and issued on July 16, 2013. The ’868 patent claims
`
`priority to provisional application No. 60/234,152, which was filed on September
`
`21, 2000; provisional application No. 60/235,354, which was filed on September
`
`26, 2000; and provisional application No. 60/270,663, which was filed on February
`
`20, 2001. Petitioner does not dispute that the ’868 patent is entitled to its
`
`September 21, 2000 priority date. See Paper 1 (“Petition”) at 3.
`
`The ’868 patent is generally directed to security protocols involving
`
`software code signing schemes for mobile devices. Ex. 1001 at 1:18-25. The ’868
`
`patent explains that application developers may create software applications that
`
`may require access to one or more application programming interfaces (“APIs”).
`
`Id. at 3:9-45. APIs allow a software application to interact with the device
`
`resources associated with those APIs. Id. Because prior code signing protocols
`
`2
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`were not “secure and rely solely on the judgment of the user, there is a serious risk
`
`that destructive, ‘Trojan horse’ type software applications may be downloaded and
`
`installed onto a mobile device.” Id. at 1:39-43. The ’868 patent explains that
`
`among a device’s APIs, certain “sensitive” APIs may expose functionality that is
`
`particularly vulnerable to a virus or malicious code in a device software
`
`application. Id. at 3:46-50. For example, APIs “that interface with cryptographic
`
`routines, wireless communication functions, or proprietary data models such as
`
`address book or calendar entries” may be deemed “sensitive.” Id. at 3:50-54.
`
`Importantly, the ’868 patent further explains that an API on a device may be
`
`a “sensitive” API if, for example, the mobile device manufacturer, API author,
`
`wireless network operator, device owner or operator, or some other entity could be
`
`adversely impacted should a virus or malicious program access the API. Ex. 1001
`
`at 3:46-54. Figure 3 below shows various API Libraries A, B, C, and D on mobile
`
`device 62. API Libraries A and C include sensitive APIs and API Libraries B and
`
`D do not include sensitive APIs.
`
`3
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`
`
`Ex. 1001 at Fig. 3; see also id. at 7:19-23.
`
`To protect against unauthorized access to sensitive APIs, the ‘868 patent
`
`provides a mechanism for controlling access to sensitive APIs by using digital
`
`signatures. Ex. 1001 at 3:54-61. For example, as depicted below in Figure 1, in
`
`one embodiment, the application developer 12 sends its software application Y 14
`
`to code signing authority 16 which signs the software application Y with one or
`
`more digital signatures and sends the signed software application Y 22,
`
`“comprising the software application Y 14 and the digital signature,” to the
`
`developer 12. Id. at 4:24-43, 3:62-4:12. The signed software application Y 22
`
`may then be downloaded by mobile device 28. Id. at 4:56-58.
`
`4
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`Id. at Fig. 1.
`
`
`
`Once a digitally signed software application is downloaded onto the mobile
`
`device, the mobile device verifies the one or more digital signatures before
`
`granting access to an API library, including a sensitive API library. Ex. 1001 at
`
`4:66-5:3. Due to the nature of sensitive APIs, additional access restrictions apply
`
`to sensitive APIs relative to non-sensitive APIs. For example, where a software
`
`application is signed with multiple signatures “all APIs are restricted and locked
`
`until a ‘global’ signature is verified for a software application. . . . Access to
`
`sensitive device APIs and libraries, if any, could then be further restricted” and
`
`locked until corresponding digital signatures are verified. Id. at 4:1-12. The ’868
`
`patent also discloses that the device may display a message to the user before the
`
`5
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`software application accesses a sensitive API thereby giving the user final control
`
`to grant or deny access to the sensitive API. Id. at 8:11-18, 9:45-51.
`
`III. Claim Construction
`
`A.
`
`“Sensitive API To Which Access Is Restricted”
`
`Claims 1 and 76 recite “storing a plurality of application programming
`
`interfaces (APIs) at the mobile device, wherein at least one API comprises a
`
`sensitive API to which access is restricted.” In this proceeding, Petitioner’s
`
`patentability challenges fail to show (1) a “sensitive API” that implicates a security
`
`concern relative to non-sensitive APIs, and (2) a “sensitive API” that is different in
`
`any respect from an API by, for example, having any additional access restrictions
`
`relative to non-sensitive APIs. Because the claims require both of these elements,
`
`this Petition fails for both of these independent reasons.
`
`i.
`
`A “Sensitive API” Is One That Implicates a Security
`Concern Relative to Non-Sensitive APIs
`
`The term “sensitive API” is not a term of art in this context, and the ’868
`
`patent uses the word “sensitive” to distinguish certain APIs from non-sensitive
`
`APIs that do not implicate the same amount of security concerns. The ’868 patent
`
`explains that because prior art code signing protocols were not “secure and rely
`
`solely on the judgment of the user, there is a serious risk that destructive, ‘Trojan
`
`horse’ type software applications may be downloaded and installed onto a mobile
`
`device.” Ex. 1001 at 1:39-43. Certain “sensitive” APIs may be particularly
`
`6
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`vulnerable to a virus or malicious code in a device software application. Id. at
`
`3:46-50. For example, APIs “that interface with cryptographic routines, wireless
`
`communication functions, or proprietary data models such as address book or
`
`calendar entries” may be classified as “sensitive.” Id. at 3:50-54. The ’868 patent
`
`then discloses ways to “protect against unauthorized access to these sensitive
`
`APIs.” Id. at 3:54-61.
`
`The ’868 patent recognizes that certain APIs expose portions of the device’s
`
`functionality that bad actors—such as “Trojan horse” programs—could exploit to
`
`particular ill-effect and, thus, such APIs require additional protection. The ’868
`
`patent, therefore, describes numerous ways of dealing with that sensitivity using,
`
`for example, cryptographic and non-cryptographic access restrictions. See, e.g.,
`
`Ex. 1001 at 4:1-12 (cryptographic access restrictions), 8:11-18 (non-cryptographic
`
`access restrictions). Each of these access restrictions is used to deal with the
`
`“sensitive” nature of the API—they do not make the API sensitive. A “sensitive”
`
`API is therefore one that implicates greater security concerns relative to a non-
`
`sensitive API.
`
`ii.
`
`“[A] Plurality of [APIs] …, Wherein at Least One API
`Comprises a Sensitive API to Which Access Is Restricted”
`Requires the “Sensitive API” to Have Additional Access
`Restrictions Relative to Non-Sensitive APIs
`
`Independent claims 1 and 76 recite “wherein at least one API [of a plurality
`
`of APIs] comprises a sensitive API to which access is restricted.” This phrase
`7
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`makes clear that a sensitive API is not just any API, and the sensitive API has
`
`greater access restrictions relative to non-sensitive APIs. The claims call out and
`
`differentiate a “sensitive API to which access is restricted” from the “plurality of
`
`APIs” of which it is a part. Thus, according to the plain language of the claims, the
`
`separately identified “sensitive API” has “access [] restrict[ions]” relative to those
`
`“plurality of APIs” that may be non-sensitive.
`
`This reading of the plain language of the claims is consistent with the ’868
`
`patent’s specification. See 37 C.F.R. § 42.100(b). For example, the specification
`
`explains that the “plurality of API libraries 72-78 may include both libraries that
`
`expose a sensitive API 74 and 78 . . . and libraries 72 and 76, that may be accessed
`
`without exposing sensitive APIs.” Ex. 1001 at 7:19-23. In addition, the
`
`specification describes a multiple-signature scenario with at least two layers of
`
`access restrictions where the first layer of restriction applies to all APIs and the
`
`second layer of restriction applies only to sensitive APIs:
`
`In this multiple-signature scenario, all APIs are restricted and locked
`until a “global” signature is verified for a software application. For
`example, a company may wish to prevent its employees from executing
`any software applications onto their devices without first obtaining
`permission from a corporate information technology (IT) or computer
`services department. All such corporate mobile devices may then be
`configured to require verification of at least a global signature before a
`software application can be executed. Access to sensitive device APIs
`
`8
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`and libraries, if any, could then be further restricted dependent upon
`verification of respective corresponding digital signatures.
`
`Ex. 1001 at 4:1-12 (emphasis added); see also id. at 9:5-17 (explaining
`
`embodiment where access restriction applies only to sensitive APIs). The
`
`specification further explains that a third layer of access restriction may also be
`
`applied to sensitive APIs:
`
`Then, once the appropriate digital signature 96 has been located and
`verified, the description string 88 is preferably displayed on the mobile
`device before the software application X or Y is executed and accesses
`the sensitive API. For instance, the description string 88 may display a
`message stating that “Application Y is attempting to access API Library
`A,” and thereby provide the mobile device user with the final control
`to grant or deny access to the sensitive API.
`
`Id. at 8:11-18; see also id. at 9:45-51 (“If the digital signature is authentic,
`
`however, then the description string 88 is preferably displayed in step 112,
`
`warning the mobile device user that the software application requires access to a
`
`sensitive API, and possibly prompting the user for authorization to execute or
`
`load the software application (step 114).” (emphasis added)). Thus, it is apparent
`
`from the claims and specification that the ’868 patent draws a distinction between
`
`sensitive APIs and non-sensitive APIs and treats them differently at least with
`
`respect to the extent to which access is restricted to each category of APIs. The
`
`plain language of the claims therefore requires that “sensitive API[s]” have greater
`9
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`“access [] restrict[ions]” relative to those “plurality of APIs” that may be non-
`
`sensitive.
`
`B.
`
`“Determining, at the Mobile Device, Whether the Software
`Application Is Signed, Wherein a Signed Software Application
`Includes a Digital Signature Generated Using a Private Key of a
`Private Key-Public Key Pair”
`
`Petitioner proposes construction of a single term: it argues that the broadest
`
`reasonable interpretation (“BRI”) of “determining, at the mobile device, whether
`
`the software application is signed, wherein a signed software application includes a
`
`digital signature generated using a private key of a private key-public key pair”
`
`(the “‘determining’ limitation”) is “determining, at the mobile device, whether the
`
`software application includes a digital signature generated using a private key of a
`
`private key-public key pair corresponding to an entity with an interest in protecting
`
`access to the sensitive API, such as a mobile device manufacturer or other entity
`
`that classified the API as sensitive, or from a code signing authority acting on
`
`behalf of the manufacturer.” Pet. at 8. Although Petitioner provides a lengthy
`
`argument regarding construction of the “determining” limitation, its argument
`
`appears to boil down to the assertion that the “digital signature” in the
`
`“determining” limitation cannot include one that is generated using a private key of
`
`an application developer. Id. at 13-14. The Petition is defective for the reasons
`
`detailed in Section IV (below) regardless of whether the “determining” limitation
`
`excludes digital signatures generated using a private key of an application
`10
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`developer, so the Board need not construe the “determining” limitation to deny
`
`institution of the Petition.1
`
`To the extent it must be considered at all, Petitioner’s construction is
`
`incorrect and should be rejected. Contrary to Petitioner’s proposed construction,
`
`
`
`1 Petitioner urges the Board to adopt its proposed construction, but at the same time
`
`acknowledges that its Petition fails under its own narrow proposed construction.
`
`Pet. at 6 (arguing that only “the concurrently-filed petition [] relies on prior art that
`
`discloses the claims under [both the Petitioner’s and Patent Owner’s
`
`interpretations] of the ‘determining’ phrase”), 14 (arguing the present petition
`
`applies only under “PO’s interpretation,” while the prior art filed in IPR2017-
`
`01619 discloses the claims under both “Petitioner’s and PO’s [] constructions”).
`
`Thus, Petitioner is effectively requesting that the Board adopt Petitioner’s proposed
`
`construction and deny institution of this petition. This is an improper use of the
`
`inter partes review process and the Board’s limited resources. See 35 U.S.C. § 311
`
`(“[A] person who is not the owner of a patent may file with the Office a petition to
`
`institute an inter partes review of the patent.” (emphasis added)). Contrary to 35
`
`U.S.C. § 311, here, Petitioner improperly filed a petition seeking denial of inter
`
`partes review in favor of adoption of its proposed construction.
`
`
`
`11
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`the plain language of the claims does not specify whose private key has to be used
`
`(or cannot be used) in generating a digital signature. The only requirement in the
`
`claims is that the “digital signature [be] generated using a private key of a private
`
`key-public key pair.” None of Petitioner’s extraneous language in its proposed
`
`construction (“corresponding to an entity with an interest in protecting access to
`
`the sensitive API, such as a mobile device manufacturer or other entity that
`
`classified the API as sensitive, or from a code signing authority acting on behalf of
`
`the manufacturer”) is supported by the ’868 patent’s specification. And, in fact,
`
`Petitioner’s extraneous language is inconsistent with the specification.
`
`Petitioner’s proposed construction is not the BRI and should be rejected
`
`because it seeks to improperly read in limitations from some embodiments
`
`disclosed in the specification, and excludes other disclosed embodiments. Hill-
`
`Rom Servs., Inc. v. Stryker Corp., 755 F.3d 1367, 1372-73 (Fed. Cir. 2014) (“[W]e
`
`do not import limitations from the specification into the claims”); On-Line Techs.,
`
`Inc. v. Bodenseewerk Perkin-Elmer GmbH, 386 F.3d 1133, 1138 (Fed. Cir. 2004)
`
`(“[A] claim interpretation that excludes a preferred embodiment from the scope of
`
`the claim ‘is rarely, if ever, correct.’”). Petitioner insists its proposed construction
`
`must be correct because “in every embodiment of the specification related to
`
`restricting access to a sensitive API, this authorization scheme involves generating
`
`12
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`a digital signature using a private key corresponding to an entity with an interest in
`
`protecting access to the sensitive API.” Pet. at 10; see also id. at 10-13.
`
`As an initial matter, the Petition provides no explanation as to why an
`
`application developer is not or cannot be “an entity with an interest in protecting
`
`access to the sensitive API.” A legitimate application developer would have such
`
`an interest because, if access to sensitive APIs were not protected and malicious
`
`applications could freely access those sensitive APIs, mobile device users could be
`
`discouraged from downloading applications altogether—e.g., for fear of having
`
`malicious applications access those sensitive APIs and use them for a harmful
`
`purpose—which would negatively impact the legitimate application developer.
`
`And, in any event, it is well-settled that “it is not enough that the only
`
`embodiments, or all of the embodiments, contain a particular limitation to limit
`
`claims beyond their plain meaning.” Unwired Planet, LLC v. Apple Inc., 829 F.3d
`
`1353, 1359 (Fed. Cir. 2016) (quotations omitted). Nor does Petitioner explain why
`
`one entity (e.g., a mobile device manufacturer) could not both act as the code
`
`signing authority and develop its own applications.
`
`Finally, Petitioner argues that the ’868 patent specification disclaims digital
`
`signatures from application developers based on the specification’s description of
`
`how prior code signing schemes operated. Pet. at 9-10, 14. But nothing that
`
`Petitioner points to amounts to “words or expressions of manifest exclusion or
`
`13
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`restriction” that are required to constitute disclaimer. Unwired Planet, 829 F.3d at
`
`1358 (“A disclaimer or disavowal of claim scope must be clear and
`
`unmistakable….”). This is particularly true in view of other portions of the
`
`specification—which Petitioner ignores—that broadly describe the various entities
`
`that can digitally sign a software application. For example, the specification
`
`explains that the code signing authority that digitally signs an application can be
`
`anyone with “knowledge of the operation of the sensitive APIs to which the
`
`software application needs access.” Ex. 1001 at 4:31-35. Because the application
`
`developer creates the software application and determines to which APIs the
`
`application needs access for the application to operate as intended (Id. at 1:9-12),
`
`the application developer must have “knowledge of the operation of [those]
`
`sensitive APIs.” In addition, the specification explains that any “entity with an
`
`interest in protecting access to sensitive device APIs” may provide a digital
`
`signature for the software application. Id. at 3:54-61. And, as explained above, an
`
`application developer would certainly have an interest in protecting access to
`
`sensitive device APIs and fall within that category.
`
`Thus, there is no disclaimer and Petitioner’s construction should be rejected.
`
`IV. The Petition Fails to Meet the Requirements for Instituting an Inter
`Partes Review
`
`The Petition challenges two independent claims—claims 1 and 76—and
`
`asserts that those claims (along with various dependent claims that depend on
`14
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`claim 1 or 76) are anticipated by Lin. The remaining challenged claims all depend
`
`on either claim 1 or 76 and the Petition adds various secondary references to Lin to
`
`argue that the additional limitations in those dependent claims would have been
`
`obvious. The Petition does not argue obviousness for claims 1 or 76. Therefore,
`
`each asserted ground of patentability is based on Petitioner’s assertion that each
`
`and every limitation of claims 1 and 76 is either disclosed or inherent in Lin.
`
`As discussed further below, because Lin does not disclose various
`
`limitations that appear in claims 1 and 76, the Petition fails to demonstrate there is
`
`a reasonable likelihood that any of the challenged claims is unpatentable on any of
`
`the asserted grounds of unpatentability. Accordingly, the Petition should be
`
`denied.
`
`A. Overview of Lin (Ex. 1011)
`
`Lin, entitled “Method for Authenticating Java Archive (JAR) for Portable
`
`Devices,” was filed on July 11, 2000—just over two months before the earliest
`
`provisional application to which the ’868 patent claims priority was filed. Lin
`
`explains that prior art methods of authenticating whether an application originated
`
`from a trusted source were designed for desktop personal computers, but were not
`
`well-suited for small, portable devices (e.g., personal organizers and mobile
`
`communication devices) due to the limited memory resources available on the
`
`smaller mobile devices. Ex. 1011 at 1:40-58. In particular, Lin notes that
`
`15
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`compared to the limited memory resources of smaller mobile devices, the X.509
`
`certificates that were widely used for authentication on desktop computers are
`
`large files and that “since the certificate comes bundled with the application
`
`typically, the device must load both the application and the certificate.” Id. at
`
`1:50-56.
`
`Thus, Lin proposes solving the problem of downloading and authenticating
`
`the author of an application on a client device with limited computing resources by
`
`creating an application descriptor file (“ADF”) that is digitally signed by the
`
`application developer and contains information associated with an application and
`
`information against which the application can be authenticated. Ex. 1011 at 2:32-
`
`35. Unlike in the prior art, where the X.509 certificate was bundled with the
`
`application so that the device must load both, the signed ADF may be downloaded
`
`first onto the client device separately from the application. Id. at 4:66-5:1. Once
`
`the information in the signed ADF is verified by the client device using a public
`
`key, “the client device obtains the network location of the application code or JAR
`
`file, and transmits a request to the server, specifying the particular application
`
`desired” and downloads the application. Id. at 5:6-19. Lin also notes that a signed
`
`ADF is better suited for smaller mobile devices because a “signed ADF is
`
`substantially smaller than the presently used signed JAR file format because a
`
`signed JAR file includes all applications-related files, and is more desirable for use
`
`16
`
`

`

`IPR2017-01620
`
`Patent Owner’s Preliminary Response
`
`with computing devices with relatively limited resources.” Id. at 3:16-20. Once
`
`the signed ADF and application are verified, the application is granted access to all
`
`of the device resources the application and/or developer has permission to access.
`
`See, e.g., Id. at 3:12-14, 5:26-30.
`
`B.
`
`Lin Does Not Disclose “A Signed Software Application”
`
`Lin does not disclose that the software application is signed, as required by
`
`the plain language of the claims. Rather, Lin teaches that the signed component is
`
`a separate file—called an application descriptor file (ADF)—that is used to
`
`authenticate the source of the software application. Ex. 1011 at 2:20-24. While
`
`the signed ADF has some association with a particular software application, Lin
`
`makes clear that the signed ADF is a separately downloadable component
`
`unattached to the software application. Id. at 3:4-5. For example, Lin discloses
`
`that the client device can first download and verify the signed ADF, and once the
`
`ADF is verified, then download the corresponding software application:
`
`Upon receiving the signed ADF, the client device verifies the developer
`certificate with the code signing certificate authority's public key (606).
`The client may also a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket