throbber

`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________________
`
`APPLE INC.,
`Petitioner
`
`v.
`
`UNILOC LUXEMBOURG S.A.,
`Patent Owner
`
`____________________
`
`Patent No. 8,239,852
`____________________
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 8,239,852
`
`
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`
`TABLE OF CONTENTS
`
`
`INTRODUCTION ........................................................................................... 1
`
`I.
`
`II. MANDATORY NOTICES UNDER 37 C.F.R. § 42.8 ................................... 2
`
`III.
`
`FEE AUTHORIZATION ................................................................................ 2
`
`IV. GROUNDS FOR STANDING ........................................................................ 2
`
`V.
`
`PRECISE RELIEF REQUESTED .................................................................. 3
`
`VI. BACKGROUND ............................................................................................. 4
`
`A. Overview of the ’852 Patent .................................................................. 4
`
`B.
`
`C.
`
`D.
`
`Prosecution History ............................................................................... 5
`
`Level of Ordinary Skill in the Art ......................................................... 6
`
`Claim Construction Under 37 C.F.R. §42.100(B) ................................ 7
`
`VII. SPECIFIC EXPLANATION OF GROUNDS ................................................ 7
`
`A. Ground 1: Michiels and Eisen Render Obvious Claims 1, 5-6,
`and 18 .................................................................................................... 7
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`Overview of Michiels (Ex. 1004) ............................................... 7
`
`Overview of Eisen (Ex. 1005) .................................................... 9
`
`Reasons to Combine ................................................................. 10
`
`Claim 18 .................................................................................... 13
`
`Claim 1 ...................................................................................... 26
`
`Claim 5: “wherein the unique device identifier further
`comprises one or more geo-location codes” ............................. 29
`
`Claim 6: “wherein at least one of the one or more geo-
`location codes comprise an Internet Protocol address of
`the client device” ....................................................................... 30
`
`i
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`Ground 2: Michiels, Eisen, and Villela Render Obvious Claims
`2-4 ........................................................................................................ 31
`
`B.
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`Overview of Villela (Ex. 1008) ................................................ 31
`
`Reasons to Combine ................................................................. 31
`
`Claim 2: “wherein the unique device identifier comprises
`a hash code” .............................................................................. 32
`
`Claim 3: “wherein the computer program, when
`executed, implements at least one irreversible
`transformation such that the machine parameters cannot
`be derived from the unique device identifier” .......................... 34
`
`Claim 4: “wherein the at least one irreversible
`transformation comprises a cryptographic hash function” ....... 34
`
`C.
`
`Ground 3: Michiels, Eisen, and Shakkarwar Render Obvious
`Claims 7, 8, and 16 .............................................................................. 35
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`Overview of Shakkarwar (Ex. 1009) ........................................ 35
`
`Reasons to Combine ................................................................. 35
`
`Claim 7: “wherein the machine parameters comprise
`information regarding at least one of: machine model
`number, machine serial number, machine ROM version,
`machine bus speed, machine manufacturer name,
`machine ROM release date, machine ROM size, machine
`UUID, and machine service tag” .............................................. 36
`
`Claim 8: “wherein the machine parameters comprise
`information regarding at least one of: CPU ID, CPU
`model, CPU details, CPU actual speed, CPU family,
`CPU manufacturer name, CPU voltage, and CPU
`external clock” .......................................................................... 37
`
`Claim 16: “wherein the machine parameters comprise
`information regarding at least one of: device model,
`device model IMEI, device model IMSI, and device
`model LCD” .............................................................................. 37
`
`
`
`
`
`-ii-
`
`
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`D. Ground 4: Michiels, Eisen, and Hughes Render Obvious Claim
`17 ......................................................................................................... 38
`
`1.
`
`2.
`
`3.
`
`Overview of Hughes (Ex. 1010) ............................................... 38
`
`Reasons to Combine ................................................................. 38
`
`Claim 17: “wherein the machine parameters comprise
`information regarding at least one of: wireless 802.11,
`webcam, game controller, silicone serial, and PCI
`controller” ................................................................................. 39
`
`E.
`
`Ground 5: Schull and Sprong Render Obvious Claims 1 and 18 ....... 40
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`Overview of Schull (Ex. 1006) ................................................. 40
`
`Overview of Sprong (Ex. 1007) ................................................ 42
`
`Reasons to Combine ................................................................. 43
`
`Claim 18 .................................................................................... 45
`
`Claim 1 ...................................................................................... 58
`
`F.
`
`Ground 6: Schull, Sprong, and Villela Render Obvious Claims
`2-4 ........................................................................................................ 62
`
`G. Ground 7: Schull, Sprong, and Eisen Render Obvious Claims 5-
`6 ........................................................................................................... 63
`
`H. Ground 8: Schull, Sprong, and Shakkarwar Render Obvious
`Claims 7-8 and 16................................................................................ 64
`
`I.
`
`Ground 9: Schull, Sprong, and Hughes Render Obvious Claims
`17 ......................................................................................................... 65
`
`VIII. THE PROPOSED GROUNDS ARE NOT REDUNDANT ......................... 65
`
`IX. CONCLUSION .............................................................................................. 66
`
`
`
`
`
`
`
`-iii-
`
`
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`LIST OF EXHIBITS
`
`U.S. Patent No. 8,239,852 (“the ’852 Patent”)
`
`Prosecution File History of U.S. Patent No. 8,239,852
`
`Declaration of Mr. James Geier
`
`International Patent Pub. WO 2007/107905 (“Michiels”)
`
`International Patent Pub. WO 2007/001394 (“Eisen”)
`
`U.S. Patent Pub. 2002/0004785 (“Schull”)
`
`U.S. Patent No. 6,134,659 (“Sprong”)
`
`U.S. Patent Pub. 2007/0113090 (“Villela”)
`
`U.S. Patent Pub. 2008/0120195 (“Shakkarwar”)
`
`U.S. Patent Pub. 2004/0059938 (“Hughes”)
`
`Federal Information Processing Standards Publication 180-2,
`
`Secure Hash Standard, issued and published by the National
`
`Institute of Standards and Technology on August 1, 2002
`
`(available at http://csrc.nist.gov/publications/fips/fips180-
`
`2/fips180-2.pdf) (“FIPS 180-2”)
`
`1012
`
`1013
`
`1014
`
`U.S. Patent No. 5,014,234 (“Edwards”)
`
`Curriculum Vitae of Mr. James Geier
`
`U.S. Patent No. 6,243,468 (“Pearce”)
`
`iv
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`
`I.
`
`INTRODUCTION
`
`Apple Inc. (“Petitioner”) requests inter partes review (“IPR”) of Claims 1-8
`
`and 16-18 of U.S. Patent No. 8,239,852 (“the ’852 Patent”; Ex. 1001), assigned to
`
`Uniloc Luxembourg S.A. (“Patent Owner”). This Petition presents several non-
`
`cumulative grounds of invalidity that were not considered during prosecution.
`
`These grounds are each likely to prevail, and this Petition, accordingly, should be
`
`granted on all grounds and the challenged claims should be cancelled.
`
`The ’852 Patent relates to systems “for remotely updating a program
`
`configuration.” Ex. 1001, Abstract. The client device generates a unique device
`
`identifier based on determined machine parameters, which it sends, along with a
`
`unique software identifier, to the update server. Id., Abstract, Claims 1, 18. The
`
`update server analyzes the identifiers and determines an updated program
`
`configuration based on a license associated with the software identifier. Id. The
`
`’852 Patent issued because the prior art discussed during prosecution did not
`
`disclose generating the unique device identifier from the determined machine
`
`parameters or determining whether the client is licensed to receive the upgrade.
`
`See Ex. 1002, 985-1007.1 Each of the primary prior art references relied on in this
`
`Petition teaches this feature and was not discussed during prosecution. For reasons
`
`
`1 Citations to Exhibits 1002 and 1011 refer to the renumbered page numbers.
`
`1
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`set forth in this Petition, Claims 1-8 and 16-18 of the ’852 Patent are obvious over
`
`the prior art.
`
`II. MANDATORY NOTICES UNDER 37 C.F.R. § 42.8
`Real Parties-in-Interest: Apple Inc.
`
`Related Matters: Patent Owner has asserted the ’852 Patent against
`
`Petitioner in Uniloc USA, Inc. et al. v. Apple Inc., No. 2:17-cv-258-JRG (E.D.
`
`Texas).
`
`Lead Counsel: Xin-Yi (Vincent) Zhou (Reg. No. 63,366)
`
`Backup Counsel: Sina S. Aria (Reg. No. 69,490) and Laura A. Bayne (Reg.
`
`No. 72,420). In addition, Petitioner plans to file a motion for pro hac vice
`
`admission for Luann L. Simmons.
`
`Service Information: Petitioner consents to electronic service by email to
`
`APPLEUNILOCIPR@OMM.COM. Please address all correspondence to lead and
`
`backup counsel at O’Melveny & Myers LLP, 400 South Hope Street, Los Angeles,
`
`California 90071 (Telephone: 213-430-6000; Fax: 213-430-6407), with courtesy
`
`copies to the email address identified above.
`
`III. FEE AUTHORIZATION
`The PTO is authorized to charge $23,000 to Deposit Account No. 50-0639
`
`for the fee set forth in 37 C.F.R § 42.15(a) and any other fees.
`
`IV. GROUNDS FOR STANDING
`
`2
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`Petitioner certifies that the ’852 Patent is available for IPR, and Petitioner is
`
`not barred or estopped from requesting IPR on the grounds presented.
`
`V.
`
`PRECISE RELIEF REQUESTED
`
`Petitioner respectfully requests review and cancellation of Claims 1-8 and
`
`16-18 of the ’852 Patent under 35 U.S.C. §103 based on the following grounds:
`
`1. International Patent Pubs. WO 2007/107905 (“Michiels”) and WO
`
`2007/001394 (“Eisen”) render obvious Claims 1, 5-6, and 18;
`
`2. Michiels, Eisen, and U.S. Patent Pub. 2007/0113090 (“Villela”) render
`
`obvious Claims 2-4;
`
`3. Michiels, Eisen, and U.S. Patent Pub. 2008/0120195 (“Shakkarwar”)
`
`render obvious Claims 7-8 and 16;
`
`4. Michiels, Eisen, and U.S. Patent Pub. 2004/0059938 (“Hughes”) render
`
`obvious Claim 17;
`
`5. U.S. Patent Pub. 2002/0004785 (“Schull”) and U.S. Patent No. 6,134,659
`
`(“Sprong”) render obvious Claims 1 and 18;
`
`6. Schull, Sprong, and Villela render obvious Claims 2-4;
`
`7. Schull, Sprong, and Eisen render obvious Claims 5-6;
`
`8. Schull, Sprong, and Shakkarwar render obvious Claims 7-8 and 16;
`
`9. Schull, Sprong, and Hughes render obvious Claim 17.
`
`3
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`None of the references relied on in this Petition was discussed during
`
`prosecution of the ’852 Patent. See generally, Ex. 1002.
`
`VI. BACKGROUND
`A. Overview of the ’852 Patent
`The ’852 Patent discloses systems and devices “for remotely updating a
`
`program configuration.” Ex. 1001, Abstract. The disclosed system controls
`
`program configuration using the “device identifier” and “software identifier” of
`
`each client device. Id., 9:55-57. According to the specification, “[a]n application
`
`[] running on the client device … may generate a device identifier (e.g., a unique
`
`device identifier) using a process that operates on data indicative of the
`
`configuration and hardware of the client device 100.” Id., 6:58-63. The unique
`
`device identifier may include machine parameters such as “hard disk volume
`
`name, user name, computer name, user password, hard disk initialization date,”
`
`“user account information, program information (e.g., serial number); location of a
`
`user within a given application program, and features of the software/hardware the
`
`user is entitled to use.” Id., 5:36-41, 5:51-55.
`
`The client device also generates a “software identifier” by “collect[ing] or
`
`receiv[ing] information regarding the software on the client device 100 by
`
`checking information which is expected to be unique to software, for example, but
`
`not limited to the software serial number.” Id., 9:16-26.
`
`4
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`After generating the device and software identifiers, the “application may
`
`electronically send the device identifier and the software identifier to the auditing
`
`server 110 or directly to the update server 120 via the Internet 102.” Id., 9:55-57.
`
`Next, “[t]he unique identifiers are [] analyzed on the update server,” “an updated
`
`program configuration for the client device [is determined] from the analysis of the
`
`unique identifiers,” and “[t]he updated program configuration is delivered to the
`
`client device.” Id., 4:35-39.
`
`Prosecution History
`
`B.
`The ’852 Patent issued from Application No. 12/818,906, filed on June 18,
`
`2010. Ex. 1001, Cover.
`
`On August 12, 2011, the Examiner issued an office action rejecting all
`
`claims over prior art. Ex. 1002, 817-839. On November 14, 2011, Patent Owner
`
`responded by amending the claims and distinguishing the cited art. Id., 864-877.
`
`Patent Owner argued that the claimed invention “is distinctive because it generates,
`
`from multiple machine parameters, a unique device identifier for a client device to
`
`determine, among other things, whether the client device is licensed to receive a
`
`software upgrade.” Id., 872.
`
`On December 30, 2011, the Examiner issued a final office action, again
`
`rejecting all claims over prior art. Id., 928-960.
`
`5
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`On May 30, 2012, Patent Owner filed an Appeal Brief before the Board of
`
`Patent Appeals and Interferences. Id., 985-1007. Patent Owner again argued that
`
`the cited prior art fails to teach both the generation of a unique device identifier for
`
`the client device from the machine parameters and the determination therefrom of
`
`whether the client is licensed to receive the upgrade. Id., 994. The Examiner
`
`withdrew the rejections and issued a Notice of Allowance on June 28, 2012. Id.,
`
`1013-1024.
`
`C. Level of Ordinary Skill in the Art
`Based on the disclosure of the ’852 Patent, a person of ordinary skill in the
`
`art around the filing of the ’852 Patent (“POSITA”) would have been someone
`
`with a bachelor’s degree in computer science or equivalent, and at least two years
`
`of experience in software engineering, network design, or electronic commerce, or
`
`an equivalent amount of relevant work or research experience. Declaration of
`
`James Geier (Ex. 1003), ¶¶ 20-21.2
`
`
`2 Mr. Geier is an expert in the field of computer systems and telecommunication
`
`networks. Ex. 1003, ¶¶ 5-9; Ex. 1013.
`
`6
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`D. Claim Construction Under 37 C.F.R. §42.100(B)
`Because the ’852 Patent will not expire during this proceeding, Petitioner
`
`interprets its claims based on their broadest reasonable interpretation in light of the
`
`specification.
`
`VII. SPECIFIC EXPLANATION OF GROUNDS
`A. Ground 1: Michiels and Eisen Render Obvious Claims 1, 5-6, and
`18
`1. Overview of Michiels (Ex. 1004)
`Michiels, titled “Protection of Software from Piracy,” was published on
`
`September 27, 2007. Ex. 1004, Cover. Michiels is prior art to the ’852 Patent
`
`under 35 U.S.C. §102(b).
`
`Michiels discloses a computer program having “a plurality of blockades,”
`
`“wherein each blockade, once activated, is arranged to change the functionality of
`
`the application.” Id., 2:21-26. For example, a “blockade” may automatically
`
`activate after a predetermined amount of time to disable certain functions of the
`
`program. Id., 7:1-19.
`
`To continue using functionality controlled by a blockade, the computer must
`
`obtain a “program update to deactivate one of the blockades.” Id., 2:27-30. In
`
`addition, program updates may “fix a breach of a security mechanism” or “fix
`
`other bugs.” Id., 3:9-14. The program updates “can be retrieved [] automatically
`
`7
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`by the program” from a remote server. Id., 3:15-20. Figure 1 below illustrates the
`
`disclosed update process.
`
`
`
`As shown in Figure 1, to receive a program update, “terminal 10” transmits
`
`an “update request” including “authorisation data” to a remote “registration server
`
`40.” Id., Fig. 1. The “authorisation data” is used by the server “to verify that
`
`terminal 10 is authorised to maintain at least the present pertaining functionality of
`
`application 18 and should receive an update.” Id., 8:25-27. The “authorisation
`
`data” includes a “Product ID,” uniquely identifying the copy of the software
`
`program, and a “Terminal ID,” uniquely identifying the user device. Id., 11:18-29,
`
`12:5-6.
`
`8
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`
`2. Overview of Eisen (Ex. 1005)
`Eisen, titled “Method and System for Identifying Users and Detecting Fraud
`
`by Use of the Internet,” was published on January 4, 2007. Ex. 1005, Cover.
`
`Eisen is prior art to the ’852 Patent under at least 35 U.S.C. §102(b).
`
`Eisen discloses a “method and system … to uniquely identify a computer
`
`user [based on] personal information and/or non-personal information, preferably
`
`the Browser ID.” Id., Abstract. As shown in Figure 5 below, Eisen combines
`
`“Customer Personal Information,” “Customer Non-personal Information,” a
`
`“Browser ID,” and a “Delta of Time Parameter” to form a unique “Customer
`
`Computer Identifier.” Id., Fig. 5, [0038].
`
`Figure 5 of Eisen
`Eisen discloses that increasing the number of parameters used for
`
`
`
`authentication improves security. Id., [0026] (“A more accurate PC fingerprint
`
`may be generally developed by considering a greater number of available computer
`
`related parameters.”).
`
`9
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`
`Reasons to Combine
`
`3.
`A POSITA would have found it obvious to combine Michiels and Eisen.
`
`Both references relate to authenticating users and authorizing transactions between
`
`a computer system and a remote server. Ex. 1004, 6:3-5; Ex. 1005, Abstract,
`
`[0002]. Both disclose generating a device identifier by combining machine
`
`parameters associated with a client device to uniquely identify the device in the
`
`authentication process. Ex. 1004, 11:25-28; Ex. 1005, [0038], [0044]. Given that
`
`they are in a common field of endeavor and disclose similar authentication
`
`approaches, a POSITA would have recognized that Eisen’s security features could
`
`be added to and would benefit Michiels’ system. Ex. 1003, ¶ 52. Thus, a POSITA
`
`would have found it obvious to combine Michiels and Eisen because the resulting
`
`combination involves only the use of a known technique to improve a similar
`
`device with no unexpected results. Id.
`
`Moreover, Eisen is aimed at “improving fraud detection” in transactions
`
`such as “downloading information over the Internet.” Ex. 1005, [0002], [0010].
`
`Eisen’s method uniquely identifies a client device and prevents “spoofing” and
`
`“other deceptive practices.” Id., Abstract, [0011]. Michiels discloses a system that
`
`seeks to prevent a specific type of fraud—the unauthorized distribution of
`
`software. Ex. 1004, 1:4-8. Michiels seeks to prevent “multiple registrations of the
`
`same software product installed on terminals” by limiting full use of the software
`
`10
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`to a single terminal. Id., 1:26-2:3. Thus, a POSITA would have been motivated to
`
`apply Eisen’s teachings to improve Michiels by employing Eisen’s techniques for
`
`uniquely identifying a device and preventing deceptive practices by unauthorized
`
`users. Ex. 1003, ¶ 53.
`
`The references also disclose benefits that would have motivated a POSITA
`
`to combine their teachings. For example, Michiels discloses generating a unique
`
`device identifier (a “terminal ID”) from hardware properties, but does not specify
`
`the parameters used to generate the identifier. Ex. 1004, 11:25-28. Michiels,
`
`however, discloses that the disclosed system can work with various authentication
`
`techniques. Id., 13:4-6 (“Additionally or alternatively, other authentication
`
`techniques can be used at this point to authenticate the computer apparatus 10.”).
`
`Eisen specifies various parameters that can be combined to form a unique
`
`“Customer Computer Identifier.” Ex. 1005, [0038], Fig. 5. Eisen further teaches
`
`that increasing the number of factors used to generate the identifier improves its
`
`accuracy, making the authentication system more secure. Id., [0026]. In light of
`
`this disclosure, a POSITA would have been motivated to apply Eisen’s teachings
`
`to Michiels to improve security. Ex. 1003, ¶ 54. Such a combination would
`
`involve, for example, using the parameters disclosed by Eisen to generate the
`
`“terminal ID” disclosed by Michiels. Id. A POSITA would have expected success
`
`11
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`from this combination because Michiels states that its system is designed to work
`
`with different authentication techniques. Id.; Ex. 1004, 13:4-6.
`
`A POSITA also would have been motivated to combine Eisen with Michiels
`
`to improve the efficiency of Michiels’ system. Eisen’s disclosed authorization
`
`server uses the information received from the client device to determine if the user
`
`associated with the unique device identifier is entitled to complete the transaction.
`
`Ex. 1005, [0026], [0031]-[0032], [0037]-[0040], [0044]. The collected information
`
`sent to the authorization server may include “Customer Personal Information” such
`
`as “user or personal name, address, billing information, shipping information,
`
`telephone number(s), e-mail address(es)” and “detailed information such as the
`
`type of content the user can receive.” Id., [0007], [0038], [0041], Fig. 7.
`
`Similarly, in the Michiels system, the authorization server analyzes information
`
`received from the client device to determine if the user associated with the unique
`
`device identifier is entitled to the updated program configuration according to a
`
`license associated with the unique software identifier. Ex. 1004, 2:23-30, 11:18-
`
`29, 12:3-18. A POSITA would have understood that Eisen’s disclosed method of
`
`embedding user account and feature-related information into the identifier could
`
`facilitate feature change, the processing of payments for additional licenses, and
`
`the limiting of licenses to particular users. Ex. 1003, ¶ 55. A POSITA would have
`
`understood Eisen’s disclosed method to be more efficient in eliminating the need
`
`12
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`to separately transmit account and feature identification information, and thus
`
`would have been motivated to apply the teachings of Eisen to Michiels to improve
`
`system efficiency. Id.
`
`4.
`
`Claim 18
`a)
`
`Preamble: “A client device configured to execute a
`computer program to perform a remote update of a
`program configuration on the client device, the client
`device comprising:”
`
`Michiels discloses a client device (“terminal 10”) configured to execute a
`
`computer program (“program 16”) to perform a remote update of a program
`
`configuration on the client device (receiving “program update 34” from
`
`“registration server 40”). Ex. 1004, Fig. 1; see also 11:16-12:18, 12:20-13:17.
`
`Michiels discloses that “terminal 10” is a “computer apparatus” that
`
`executes “program 16” and communicates with the remote update server
`
`
`
`13
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`(“registration server 40”) via the Internet. Id., 6:3-22. The “program update”
`
`received from the server can update the configuration of “program 16” by
`
`“deactivat[ing] one of the blockades” (i.e., enabling certain functions), “fix[ing] a
`
`breach of a security mechanism,” or “fix[ing] other bugs.” Id., 2:27-30, 3:9-14,
`
`11:1-15.
`
`Thus, Michiels discloses the preamble of Claim 18. Ex. 1003, ¶¶ 41-43.
`
`b)
`
`Element [18a]: “the client device comprising: a
`processor”
`
`Michiels’s “terminal 10” includes a “processor 12.” Ex. 1004, 6:3-9, Fig. 1.
`
`Thus, Michiels discloses Element [18a]. Ex. 1003, ¶¶ 44-45.
`
`c)
`
`Element [18b]: “a memory coupled to the processor and
`storing the computer program which, when executed by
`the processor”
`
`Michiels’ “terminal 10” includes a “memory/storage 14” coupled to the
`
`processor, which stores “a program 16 which includes a code module 18 for
`
`performing an application and code 20 for implementing a number (N) of
`
`blockades.” Ex. 1004, 6:1-13, Fig. 1.
`
`Thus, Michiels discloses Element [18b]. Ex. 1003, ¶¶ 46-47.
`
`14
`
`

`

`d)
`
`Petition for Inter Partes Review
`Patent No. 8,239,852
`Element [18b(i)]: “performs physical device recognition
`on the client device to determine machine parameters
`including account information for a user of the client
`device and features of software that the user of the client
`device is entitled to use”
`
`Michiels discloses “collect[ing] details of the hardware configuration at the
`
`terminal where the software has been installed” to uniquely identify the client
`
`device. Ex. 1004, 1:27-2:3. A unique “terminal ID 24” is generated from
`
`properties of the machine hardware. Id., 11:25-28 (“The terminal ID … can be
`
`compiled based on a number of properties of the hardware which, when combined,
`
`form a unique identifier.”).3 A POSITA would have understood that to “collect
`
`details of the hardware configuration” and compile “a number of properties of the
`
`hardware,” the device must perform physical device recognition to determine
`
`machine parameters. Ex. 1003, ¶ 48.
`
`Michiels also discloses or renders obvious determining account information
`
`for a user of the client device. The Michiels system includes a registration step in
`
`which data is sent from the client device to the registration server for storage and
`
`use in authorizing updates. Ex. 1004, 11:18-29. A POSITA would have
`
`understood that such registration would involve collecting account information for
`
`
`3 The ’852 Patent similarly discloses generating a unique device identifier from
`
`various properties of the hardware. Ex. 1001, 7:40-9:15.
`
`15
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`a user of the client device. Ex. 1003, ¶ 49. Indeed, Michiels discloses that it was
`
`known in the art to register software to limit piracy, and Michiels specifically
`
`references U.S. Patent No. 5,014,234 (“Edwards”; Ex. 1012) as a known prior art
`
`method. Ex. 1004, 1:22-2:10. Edwards utilizes blockades similar to those
`
`disclosed by Michiels. Id., 2:6-10; Ex. 1003, ¶ 49. As part of its registration
`
`process, Edwards discloses collecting user account information, such as name and
`
`address. Ex. 1012, Fig. 5. Thus, Michiels, alone or in view of its admitted prior
`
`art, discloses or renders obvious determining account information for a user of the
`
`client device. Ex. 1003, ¶ 49.
`
`Michiels further discloses or renders obvious determining features of
`
`software that the user of the client device is entitled to use. Michiels discloses that
`
`the update request sent from the client device to the registration server “should
`
`preferably include data which can be used, by server 40, to verify that terminal 10
`
`is authorised to maintain at least the present pertaining functionality of application
`
`18 and should receive an update.” Ex. 1004, 8:25-27. Thus, a POSITA would
`
`have understood that Michiels collects information to ensure that the client device
`
`is authorized to maintain the “present pertaining functionality” and to receive an
`
`update. Id.; Ex. 1003, ¶ 50. A POSITA would also have understood this collected
`
`information would specify “features of software that the user of the client device is
`
`entitled to use,” or would have found determining features of software that the user
`
`16
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`of the client device is entitled to use obvious based on this disclosure. Ex. 1003, ¶
`
`50.
`
`In addition, determining account information for a user of the client device
`
`and features of software that the user of the client device is entitled to use are
`
`obvious in view of Eisen. As shown in Figure 5 below, Eisen combines “Customer
`
`Personal Information,” “Customer Non-personal Information,” “Browser ID,” and
`
`a “Delta of Time Parameter” to form a unique “Customer Computer Identifier.”
`
`Ex. 1005, Fig. 5, [0038]. Eisen also discloses performing physical device
`
`recognition by, for example, generating a “PC fingerprint” from measuring the
`
`internal “clock skew” of a device. Id., [0044].
`
`
`
`Figure 5 of Eisen
`Eisen discloses that “Customer Personal Information” may include “user or
`
`personal name, address, billing information, shipping information, telephone
`
`number(s), e-mail address(es).” Id., [0038], [0041], Fig. 7. Thus, Eisen discloses
`
`17
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`determining the account information for a user of the client device and including it
`
`in its device identifier. Ex. 1003, ¶ 57.
`
`Eisen discloses that “Browser ID” may include “information about the user
`
`computer operating system, its current version, its Internet browser and the
`
`language.” Id., [0007]. “The Browser ID may also have more detailed information
`
`such as the type of content the user can receive; for example, this lets the website
`
`operator know if the user can run applications in FLASH-animation, open a PDF-
`
`file, or access a Microsoft Excel document.” Id. Thus, the “Browser ID” includes
`
`information about the version of installed software and features of software (e.g.,
`
`Flash, PDF, and Excel) that the user of the client device is entitled to use. Ex.
`
`1003, ¶ 58.
`
`A POSITA would have been motivated to combine Michiels and Eisen for
`
`reasons discussed above in Section VII.A.3. A POSITA would have expected
`
`success from the combination because Michiels teaches that “[a]dditionally or
`
`alternatively, other authentication techniques can be used at this point to
`
`authenticate the computer apparatus 10. These will be well understood by a skilled
`
`person.” Ex. 1004, 13:4-6. When combined, it would have been obvious to
`
`include user account information as part of the parameters used to generate
`
`Michiels’ “terminal ID.” Ex. 1003, ¶ 59. A POSITA would have been motivated
`
`to make this combination because, as discussed above, Michiels already discloses
`
`18
`
`

`

`Petition for Inter Partes Review
`Patent No. 8,239,852
`or renders obvious collecting user account information as part of the registration
`
`process, and including user account information in the “terminal ID” would
`
`improve the security and efficiency of the system. See Section VII.A.3.
`
`In view of Eisen, it also would have been obvious to include software
`
`version/feature information of Michiels’ “program 16” in its “terminal ID.” Ex.
`
`1003, ¶ 60. Eisen discloses that its “Browser ID” contains “valuable information
`
`for identifying a unique user.” Ex. 1005, [0007]. The “browser” disclosed by
`
`Eisen is an example of a computer program that can be remotely updated using the

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket