throbber
IN THE UNITED STATES DISTRICT COURT
`FOR THE NORTHERN DISTRICT OF TEXAS
`DALLAS DIVISION
`
`
`MAZ ENCRYPTION TECHNOLOGIES
`LLC,
`
`
`
`
`BLACKBERRY LTD., AND
`BLACKBERRY CORPORATION,
`
`
`
`
`Plaintiff,
`
`Defendants.
`
`Civil Action No. 3:17-cv-3267-K
`
`JURY TRIAL DEMANDED
`
`
`
`
`
`
`
`v.
`
`
`
`
`
`
`
`JOINT CLAIM CONSTRUCTION CHART
`
`
`
`Pursuant to the Court’s Scheduling Order (Dkt. No. 27) and N.D. Tex. Misc. Order No.
`
`62, ¶ 4-5(c), Plaintiff MAZ Encryption Technologies LLC and Defendants BlackBerry Limited
`
`and BlackBerry Corporation file this Joint Claim Construction Chart.
`
`DATED December 19, 2018.
`
`
`
`
`Respectfully submitted,
`
`By: /s/ Neal Massand
`Hao Ni
`Texas Bar No. 24047205
`hni@nilawfirm.com
`Timothy T. Wang
`Texas Bar No. 24067927
`twang@nilawfirm.com
`Neal G. Massand
`Texas Bar No. 24039038
`nmassand@nilawfirm.com
`Stevenson Moore V
`Texas Bar No. 24076573
`smoore@nilawfirm.com
`Krystal L. McCool
`Texas Bar No. 24082185
`kmccool@nilawfirm.com
`
`NI, WANG & MASSAND, PLLC
`8140 Walnut Hill Ln., Ste. 500
`Dallas, TX 75231
`
`BlackBerry Corporation Exhibit 1012, pg. 1
`
`

`

`Tel: (972) 331-4600
`Fax: (972) 314-0900
`
`ATTORNEYS FOR PLAINTIFF MAZ
`ENCRYPTION TECHNOLOGIES LLC
`
`
`
`
`
`By: /s/ Shaun W. Hassett
`Shaun W. Hassett
`Texas State Bar No. 24074372
`McGuireWoods LLP
`2000 McKinney Avenue Suite 1400
`Dallas, Texas 75201
`Tel: 214-932-6400
`Fax: 214-932-6499
`shassett@mcguirewoods.com
`
`Tyler T. VanHoutan
`Admitted Pro Hac Vice
`McGuireWoods LLP
`JP Morgan Chase Tower
`600 Travis Street, Suite 7500
`Houston, Texas 77002-2906
`Tel: 832-214-9911
`Fax: 932-214-9924
`tvanhoutan@mcguirewoods.com
`
`ATTORNEYS FOR DEFENDANTS
`BLACKBERRY LIMITED AND
`BLACKBERRY CORPORATION
`
`CERTIFICATE OF SERVICE
`
`I hereby certify that on the 19th day of December, 2018, I electronically filed the foregoing
`
`document with the clerk of the court for the U.S. District Court, Northern District of Texas, Dallas
`Division, using the electronic case filing system of the court. The electronic case filing system
`sent a “Notice of Electronic Filing” to the attorneys of record who have consented in writing to
`accept this Notice as service of this document by electronic means.
`
`
`/s/ Neal Massand___
`Neal Massand
`
`
`
`BlackBerry Corporation Exhibit 1012, pg. 2
`
`

`

`Judge’s Construction
`
`Defendants’
`Proposed
`Construction
`“The Data
`Encryption
`Standard
`Algorithm”
`
`
`
`
`Plaintiff’s
`Proposed
`Construction
`“the
`symmetric-key
`algorithm for
`the encryption
`or decryption
`of electronic
`data developed
`by IBM in the
`early 1970’s or
`its successors”
`
`CLAIM TERMS
`
`DES Algorithm
`[’358 Patent, Claims 4,
`7, and 12.]
`
`4. The process of
`decrypting documents of
`claim 1 further
`comprising decrypting the
`given document with a
`DES algorithm.
`
`7. The computer program
`product of claim 6, the
`program code further for
`causing the processor to
`decrypt the given
`document with a DES
`algorithm.
`
`12. The computer
`program product of claim
`11, the program code
`further for causing the
`processor to encrypt the
`given document with a
`DES algorithm.
`
`BlackBerry Corporation Exhibit 1012, pg. 3
`
`

`

`Agreed
`
`Agreed
`
`“a portion of a software
`program which
`transparently handles the
`encryption of documents
`and the decryption of
`encrypted documents”
`
`“crypto server”
`
`[’358 Patent, Claim 1]
`
`1. A process of
`decrypting documents
`comprising:
`providing plural
`documents having
`respective names
`providing a crypto
`server for causing
`documents to be
`decrypted
`providing a first table
`having
`the names of encrypted
`documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with a
`decryption key value for
`the encrypted document
`detecting an open
`command for a given
`document issuing from a
`user of an application
`program using a user
`input device
`in response to the open
`command, the crypto
`server using the first
`table to determine if the
`given document should
`be decrypted
`if the given document
`should be decrypted, then
`retrieving the key name
`associated with the name
`of the given document
`from the first table
`retrieving the decryption
`key value associated with
`the key name from a
`second table, the second
`
`BlackBerry Corporation Exhibit 1012, pg. 4
`
`

`

`table having at least one
`decryption key value
`causing the given
`document to be
`decrypted.
`
`BlackBerry Corporation Exhibit 1012, pg. 5
`
`

`

`Agreed
`
`Agreed
`
`“a collection of data in
`which each item is
`uniquely identified by a
`label, by its position
`relative to other items, or
`by some other means”
`
`
`“table”
`[’358 Patent, Claim 1, 6,
`and 11]
`
`1. A process of
`decrypting documents
`comprising:
`providing plural
`documents having
`respective names
`providing a crypto server
`for causing documents to
`be decrypted
`providing a first table
`having
`the names of encrypted
`documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with a
`decryption key value for
`the encrypted document
`detecting an open
`command for a given
`document issuing from a
`user of an application
`program using a user
`input device
`in response to the open
`command, the crypto
`server using the first
`table to determine if the
`given document should
`be decrypted
`if the given document
`should be decrypted, then
`retrieving the key name
`associated with the name
`of the given document
`from the first table
`retrieving the decryption
`key value associated with
`the key name from a
`second table, the second
`
`BlackBerry Corporation Exhibit 1012, pg. 6
`
`

`

`table having at least one
`decryption key value
`causing the given
`document to be
`decrypted.
`
`6. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for decrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be decrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with a
`decryption key value for
`the encrypted document
`detect an open command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the open
`command use the first
`table to determine if the
`given document should
`be decrypted
`if the given document
`should be decrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`retrieve the decryption
`key value associated with
`
`BlackBerry Corporation Exhibit 1012, pg. 7
`
`

`

`the key name from a
`second table, the second
`table having at least one
`decryption key value
`cause the given document
`to be decrypted.
`
`11. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for encrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be encrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with an
`encryption key value for
`the encrypted document
`detect a close command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the close
`command use the first
`table to determine if the
`given document should
`be encrypted
`if the given document
`should be encrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`
`BlackBerry Corporation Exhibit 1012, pg. 8
`
`

`

`retrieve the encryption
`key value associated with
`the key name from a
`second table, the second
`table having at least one
`encryption key value and
`at least one key name
`respectively associated
`with a one of the
`encryption key values
`cause the given document
`to be encrypted.
`
`
`
`
`
`BlackBerry Corporation Exhibit 1012, pg. 9
`
`

`

`Agreed
`
`Agreed
`
`“a descriptor for an
`encryption key value or a
`decryption key value
`which may be used by the
`user and/or system
`administrator for
`administering an
`encryption key value or
`decryption key value”
`
`“key name”.
`[’358 Patent, Claim 1, 6,
`and 11]
`
`1. A process of
`decrypting documents
`comprising:
`providing plural
`documents having
`respective names
`providing a crypto server
`for causing documents to
`be decrypted
`providing a first table
`having
`the names of encrypted
`documents
`for each of the names of
`encrypted documents in
`the first table, a key
`name associated with a
`decryption key value for
`the encrypted document
`detecting an open
`command for a given
`document issuing from a
`user of an application
`program using a user
`input device
`in response to the open
`command, the crypto
`server using the first table
`to determine if the given
`document should be
`decrypted
`if the given document
`should be decrypted, then
`retrieving the key name
`associated with the name
`of the given document
`from the first table
`retrieving the decryption
`key value associated with
`the key name from a
`second table, the second
`
`BlackBerry Corporation Exhibit 1012, pg. 10
`
`

`

`table having at least one
`decryption key value
`causing the given
`document to be
`decrypted.
`
`6. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for decrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be decrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key
`name associated with a
`decryption key value for
`the encrypted document
`detect an open command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the open
`command use the first
`table to determine if the
`given document should
`be decrypted
`if the given document
`should be decrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`retrieve the decryption
`key value associated with
`
`BlackBerry Corporation Exhibit 1012, pg. 11
`
`

`

`the key name from a
`second table, the second
`table having at least one
`decryption key value
`cause the given document
`to be decrypted.
`
`11. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for encrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be encrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key
`name associated with an
`encryption key value for
`the encrypted document
`detect a close command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the close
`command use the first
`table to determine if the
`given document should
`be encrypted
`if the given document
`should be encrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`
`BlackBerry Corporation Exhibit 1012, pg. 12
`
`

`

`retrieve the encryption
`key value associated with
`the key name from a
`second table, the second
`table having at least one
`encryption key value and
`at least one key name
`respectively associated
`with a one of the
`encryption key values
`cause the given document
`to be encrypted.
`
`
`BlackBerry Corporation Exhibit 1012, pg. 13
`
`

`

`Agreed
`
`Agreed
`
`“a correlation between a
`key name and key value
`or a key name and names
`of encrypted files”
`
`
`“associated”
`[’358 Patent, Claim 1, 6,
`and 11]
`
`1. A process of
`decrypting documents
`comprising:
`providing plural
`documents having
`respective names
`providing a crypto server
`for causing documents to
`be decrypted
`providing a first table
`having
`the names of encrypted
`documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with a
`decryption key value for
`the encrypted document
`detecting an open
`command for a given
`document issuing from a
`user of an application
`program using a user
`input device
`in response to the open
`command, the crypto
`server using the first table
`to determine if the given
`document should be
`decrypted
`if the given document
`should be decrypted, then
`retrieving the key name
`associated with the name
`of the given document
`from the first table
`retrieving the decryption
`key value associated with
`the key name from a
`second table, the second
`
`BlackBerry Corporation Exhibit 1012, pg. 14
`
`

`

`table having at least one
`decryption key value
`causing the given
`document to be
`decrypted.
`
`6. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for decrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be decrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with a
`decryption key value for
`the encrypted document
`detect an open command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the open
`command use the first
`table to determine if the
`given document should
`be decrypted
`if the given document
`should be decrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`retrieve the decryption
`key value associated with
`
`BlackBerry Corporation Exhibit 1012, pg. 15
`
`

`

`the key name from a
`second table, the second
`table having at least one
`decryption key value
`cause the given document
`to be decrypted.
`
`11. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for encrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be encrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with an
`encryption key value for
`the encrypted document
`detect a close command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the close
`command use the first
`table to determine if the
`given document should
`be encrypted
`if the given document
`should be encrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`
`BlackBerry Corporation Exhibit 1012, pg. 16
`
`

`

`retrieve the encryption
`key value associated with
`the key name from a
`second table, the second
`table having at least one
`encryption key value and
`at least one key name
`respectively associated
`with a one of the
`encryption key values
`cause the given document
`to be encrypted.
`
`
`BlackBerry Corporation Exhibit 1012, pg. 17
`
`

`

`Agreed
`
`Agreed
`
`“a sequence of data that is
`used to encrypt or decrypt
`data”
`
`
`“key value”
`[’358 Patent, Claim 1, 6,
`and 11]
`
`1. A process of
`decrypting documents
`comprising:
`providing plural
`documents having
`respective names
`providing a crypto server
`for causing documents to
`be decrypted
`providing a first table
`having
`the names of encrypted
`documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with a
`decryption key value for
`the encrypted document
`detecting an open
`command for a given
`document issuing from a
`user of an application
`program using a user
`input device
`in response to the open
`command, the crypto
`server using the first table
`to determine if the given
`document should be
`decrypted
`if the given document
`should be decrypted, then
`retrieving the key name
`associated with the name
`of the given document
`from the first table
`retrieving the decryption
`key value associated with
`the key name from a
`second table, the second
`
`BlackBerry Corporation Exhibit 1012, pg. 18
`
`

`

`table having at least one
`decryption key value
`causing the given
`document to be
`decrypted.
`
`6. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for decrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be decrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with a
`decryption key value for
`the encrypted document
`detect an open command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the open
`command use the first
`table to determine if the
`given document should
`be decrypted
`if the given document
`should be decrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`retrieve the decryption
`key value associated with
`
`BlackBerry Corporation Exhibit 1012, pg. 19
`
`

`

`the key name from a
`second table, the second
`table having at least one
`decryption key value
`cause the given document
`to be decrypted.
`
`11. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for encrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be encrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with an
`encryption key value for
`the encrypted document
`detect a close command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the close
`command use the first
`table to determine if the
`given document should
`be encrypted
`if the given document
`should be encrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`
`BlackBerry Corporation Exhibit 1012, pg. 20
`
`

`

`retrieve the encryption
`key value associated with
`the key name from a
`second table, the second
`table having at least one
`encryption key value and
`at least one key name
`respectively associated
`with a one of the
`encryption key values
`cause the given document
`to be encrypted.
`
`
`
`
`
`
`BlackBerry Corporation Exhibit 1012, pg. 21
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket