`FOR THE NORTHERN DISTRICT OF TEXAS
`DALLAS DIVISION
`
`
`MAZ ENCRYPTION TECHNOLOGIES
`LLC,
`
`
`
`
`BLACKBERRY LTD., AND
`BLACKBERRY CORPORATION,
`
`
`
`
`Plaintiff,
`
`Defendants.
`
`Civil Action No. 3:17-cv-3267-K
`
`JURY TRIAL DEMANDED
`
`
`
`
`
`
`
`v.
`
`
`
`
`
`
`
`JOINT CLAIM CONSTRUCTION CHART
`
`
`
`Pursuant to the Court’s Scheduling Order (Dkt. No. 27) and N.D. Tex. Misc. Order No.
`
`62, ¶ 4-5(c), Plaintiff MAZ Encryption Technologies LLC and Defendants BlackBerry Limited
`
`and BlackBerry Corporation file this Joint Claim Construction Chart.
`
`DATED December 19, 2018.
`
`
`
`
`Respectfully submitted,
`
`By: /s/ Neal Massand
`Hao Ni
`Texas Bar No. 24047205
`hni@nilawfirm.com
`Timothy T. Wang
`Texas Bar No. 24067927
`twang@nilawfirm.com
`Neal G. Massand
`Texas Bar No. 24039038
`nmassand@nilawfirm.com
`Stevenson Moore V
`Texas Bar No. 24076573
`smoore@nilawfirm.com
`Krystal L. McCool
`Texas Bar No. 24082185
`kmccool@nilawfirm.com
`
`NI, WANG & MASSAND, PLLC
`8140 Walnut Hill Ln., Ste. 500
`Dallas, TX 75231
`
`BlackBerry Corporation Exhibit 1012, pg. 1
`
`
`
`Tel: (972) 331-4600
`Fax: (972) 314-0900
`
`ATTORNEYS FOR PLAINTIFF MAZ
`ENCRYPTION TECHNOLOGIES LLC
`
`
`
`
`
`By: /s/ Shaun W. Hassett
`Shaun W. Hassett
`Texas State Bar No. 24074372
`McGuireWoods LLP
`2000 McKinney Avenue Suite 1400
`Dallas, Texas 75201
`Tel: 214-932-6400
`Fax: 214-932-6499
`shassett@mcguirewoods.com
`
`Tyler T. VanHoutan
`Admitted Pro Hac Vice
`McGuireWoods LLP
`JP Morgan Chase Tower
`600 Travis Street, Suite 7500
`Houston, Texas 77002-2906
`Tel: 832-214-9911
`Fax: 932-214-9924
`tvanhoutan@mcguirewoods.com
`
`ATTORNEYS FOR DEFENDANTS
`BLACKBERRY LIMITED AND
`BLACKBERRY CORPORATION
`
`CERTIFICATE OF SERVICE
`
`I hereby certify that on the 19th day of December, 2018, I electronically filed the foregoing
`
`document with the clerk of the court for the U.S. District Court, Northern District of Texas, Dallas
`Division, using the electronic case filing system of the court. The electronic case filing system
`sent a “Notice of Electronic Filing” to the attorneys of record who have consented in writing to
`accept this Notice as service of this document by electronic means.
`
`
`/s/ Neal Massand___
`Neal Massand
`
`
`
`BlackBerry Corporation Exhibit 1012, pg. 2
`
`
`
`Judge’s Construction
`
`Defendants’
`Proposed
`Construction
`“The Data
`Encryption
`Standard
`Algorithm”
`
`
`
`
`Plaintiff’s
`Proposed
`Construction
`“the
`symmetric-key
`algorithm for
`the encryption
`or decryption
`of electronic
`data developed
`by IBM in the
`early 1970’s or
`its successors”
`
`CLAIM TERMS
`
`DES Algorithm
`[’358 Patent, Claims 4,
`7, and 12.]
`
`4. The process of
`decrypting documents of
`claim 1 further
`comprising decrypting the
`given document with a
`DES algorithm.
`
`7. The computer program
`product of claim 6, the
`program code further for
`causing the processor to
`decrypt the given
`document with a DES
`algorithm.
`
`12. The computer
`program product of claim
`11, the program code
`further for causing the
`processor to encrypt the
`given document with a
`DES algorithm.
`
`BlackBerry Corporation Exhibit 1012, pg. 3
`
`
`
`Agreed
`
`Agreed
`
`“a portion of a software
`program which
`transparently handles the
`encryption of documents
`and the decryption of
`encrypted documents”
`
`“crypto server”
`
`[’358 Patent, Claim 1]
`
`1. A process of
`decrypting documents
`comprising:
`providing plural
`documents having
`respective names
`providing a crypto
`server for causing
`documents to be
`decrypted
`providing a first table
`having
`the names of encrypted
`documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with a
`decryption key value for
`the encrypted document
`detecting an open
`command for a given
`document issuing from a
`user of an application
`program using a user
`input device
`in response to the open
`command, the crypto
`server using the first
`table to determine if the
`given document should
`be decrypted
`if the given document
`should be decrypted, then
`retrieving the key name
`associated with the name
`of the given document
`from the first table
`retrieving the decryption
`key value associated with
`the key name from a
`second table, the second
`
`BlackBerry Corporation Exhibit 1012, pg. 4
`
`
`
`table having at least one
`decryption key value
`causing the given
`document to be
`decrypted.
`
`BlackBerry Corporation Exhibit 1012, pg. 5
`
`
`
`Agreed
`
`Agreed
`
`“a collection of data in
`which each item is
`uniquely identified by a
`label, by its position
`relative to other items, or
`by some other means”
`
`
`“table”
`[’358 Patent, Claim 1, 6,
`and 11]
`
`1. A process of
`decrypting documents
`comprising:
`providing plural
`documents having
`respective names
`providing a crypto server
`for causing documents to
`be decrypted
`providing a first table
`having
`the names of encrypted
`documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with a
`decryption key value for
`the encrypted document
`detecting an open
`command for a given
`document issuing from a
`user of an application
`program using a user
`input device
`in response to the open
`command, the crypto
`server using the first
`table to determine if the
`given document should
`be decrypted
`if the given document
`should be decrypted, then
`retrieving the key name
`associated with the name
`of the given document
`from the first table
`retrieving the decryption
`key value associated with
`the key name from a
`second table, the second
`
`BlackBerry Corporation Exhibit 1012, pg. 6
`
`
`
`table having at least one
`decryption key value
`causing the given
`document to be
`decrypted.
`
`6. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for decrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be decrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with a
`decryption key value for
`the encrypted document
`detect an open command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the open
`command use the first
`table to determine if the
`given document should
`be decrypted
`if the given document
`should be decrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`retrieve the decryption
`key value associated with
`
`BlackBerry Corporation Exhibit 1012, pg. 7
`
`
`
`the key name from a
`second table, the second
`table having at least one
`decryption key value
`cause the given document
`to be decrypted.
`
`11. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for encrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be encrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with an
`encryption key value for
`the encrypted document
`detect a close command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the close
`command use the first
`table to determine if the
`given document should
`be encrypted
`if the given document
`should be encrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`
`BlackBerry Corporation Exhibit 1012, pg. 8
`
`
`
`retrieve the encryption
`key value associated with
`the key name from a
`second table, the second
`table having at least one
`encryption key value and
`at least one key name
`respectively associated
`with a one of the
`encryption key values
`cause the given document
`to be encrypted.
`
`
`
`
`
`BlackBerry Corporation Exhibit 1012, pg. 9
`
`
`
`Agreed
`
`Agreed
`
`“a descriptor for an
`encryption key value or a
`decryption key value
`which may be used by the
`user and/or system
`administrator for
`administering an
`encryption key value or
`decryption key value”
`
`“key name”.
`[’358 Patent, Claim 1, 6,
`and 11]
`
`1. A process of
`decrypting documents
`comprising:
`providing plural
`documents having
`respective names
`providing a crypto server
`for causing documents to
`be decrypted
`providing a first table
`having
`the names of encrypted
`documents
`for each of the names of
`encrypted documents in
`the first table, a key
`name associated with a
`decryption key value for
`the encrypted document
`detecting an open
`command for a given
`document issuing from a
`user of an application
`program using a user
`input device
`in response to the open
`command, the crypto
`server using the first table
`to determine if the given
`document should be
`decrypted
`if the given document
`should be decrypted, then
`retrieving the key name
`associated with the name
`of the given document
`from the first table
`retrieving the decryption
`key value associated with
`the key name from a
`second table, the second
`
`BlackBerry Corporation Exhibit 1012, pg. 10
`
`
`
`table having at least one
`decryption key value
`causing the given
`document to be
`decrypted.
`
`6. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for decrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be decrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key
`name associated with a
`decryption key value for
`the encrypted document
`detect an open command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the open
`command use the first
`table to determine if the
`given document should
`be decrypted
`if the given document
`should be decrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`retrieve the decryption
`key value associated with
`
`BlackBerry Corporation Exhibit 1012, pg. 11
`
`
`
`the key name from a
`second table, the second
`table having at least one
`decryption key value
`cause the given document
`to be decrypted.
`
`11. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for encrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be encrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key
`name associated with an
`encryption key value for
`the encrypted document
`detect a close command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the close
`command use the first
`table to determine if the
`given document should
`be encrypted
`if the given document
`should be encrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`
`BlackBerry Corporation Exhibit 1012, pg. 12
`
`
`
`retrieve the encryption
`key value associated with
`the key name from a
`second table, the second
`table having at least one
`encryption key value and
`at least one key name
`respectively associated
`with a one of the
`encryption key values
`cause the given document
`to be encrypted.
`
`
`BlackBerry Corporation Exhibit 1012, pg. 13
`
`
`
`Agreed
`
`Agreed
`
`“a correlation between a
`key name and key value
`or a key name and names
`of encrypted files”
`
`
`“associated”
`[’358 Patent, Claim 1, 6,
`and 11]
`
`1. A process of
`decrypting documents
`comprising:
`providing plural
`documents having
`respective names
`providing a crypto server
`for causing documents to
`be decrypted
`providing a first table
`having
`the names of encrypted
`documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with a
`decryption key value for
`the encrypted document
`detecting an open
`command for a given
`document issuing from a
`user of an application
`program using a user
`input device
`in response to the open
`command, the crypto
`server using the first table
`to determine if the given
`document should be
`decrypted
`if the given document
`should be decrypted, then
`retrieving the key name
`associated with the name
`of the given document
`from the first table
`retrieving the decryption
`key value associated with
`the key name from a
`second table, the second
`
`BlackBerry Corporation Exhibit 1012, pg. 14
`
`
`
`table having at least one
`decryption key value
`causing the given
`document to be
`decrypted.
`
`6. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for decrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be decrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with a
`decryption key value for
`the encrypted document
`detect an open command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the open
`command use the first
`table to determine if the
`given document should
`be decrypted
`if the given document
`should be decrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`retrieve the decryption
`key value associated with
`
`BlackBerry Corporation Exhibit 1012, pg. 15
`
`
`
`the key name from a
`second table, the second
`table having at least one
`decryption key value
`cause the given document
`to be decrypted.
`
`11. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for encrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be encrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with an
`encryption key value for
`the encrypted document
`detect a close command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the close
`command use the first
`table to determine if the
`given document should
`be encrypted
`if the given document
`should be encrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`
`BlackBerry Corporation Exhibit 1012, pg. 16
`
`
`
`retrieve the encryption
`key value associated with
`the key name from a
`second table, the second
`table having at least one
`encryption key value and
`at least one key name
`respectively associated
`with a one of the
`encryption key values
`cause the given document
`to be encrypted.
`
`
`BlackBerry Corporation Exhibit 1012, pg. 17
`
`
`
`Agreed
`
`Agreed
`
`“a sequence of data that is
`used to encrypt or decrypt
`data”
`
`
`“key value”
`[’358 Patent, Claim 1, 6,
`and 11]
`
`1. A process of
`decrypting documents
`comprising:
`providing plural
`documents having
`respective names
`providing a crypto server
`for causing documents to
`be decrypted
`providing a first table
`having
`the names of encrypted
`documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with a
`decryption key value for
`the encrypted document
`detecting an open
`command for a given
`document issuing from a
`user of an application
`program using a user
`input device
`in response to the open
`command, the crypto
`server using the first table
`to determine if the given
`document should be
`decrypted
`if the given document
`should be decrypted, then
`retrieving the key name
`associated with the name
`of the given document
`from the first table
`retrieving the decryption
`key value associated with
`the key name from a
`second table, the second
`
`BlackBerry Corporation Exhibit 1012, pg. 18
`
`
`
`table having at least one
`decryption key value
`causing the given
`document to be
`decrypted.
`
`6. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for decrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be decrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with a
`decryption key value for
`the encrypted document
`detect an open command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the open
`command use the first
`table to determine if the
`given document should
`be decrypted
`if the given document
`should be decrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`retrieve the decryption
`key value associated with
`
`BlackBerry Corporation Exhibit 1012, pg. 19
`
`
`
`the key name from a
`second table, the second
`table having at least one
`decryption key value
`cause the given document
`to be decrypted.
`
`11. A computer program
`product comprising a
`computer usable medium
`having computer readable
`program code embodied
`therein for encrypting
`documents, the program
`code for causing a
`processor to
`cause plural documents to
`be encrypted, the
`documents having
`respective names
`record in a first table
`the names of the
`encrypted documents
`for each of the names of
`encrypted documents in
`the first table, a key name
`associated with an
`encryption key value for
`the encrypted document
`detect a close command
`for a given document
`issuing from a user of an
`application program using
`a user input device
`in response to the close
`command use the first
`table to determine if the
`given document should
`be encrypted
`if the given document
`should be encrypted, then
`retrieve the key name
`associated with the name
`of the given document
`from the first table
`
`BlackBerry Corporation Exhibit 1012, pg. 20
`
`
`
`retrieve the encryption
`key value associated with
`the key name from a
`second table, the second
`table having at least one
`encryption key value and
`at least one key name
`respectively associated
`with a one of the
`encryption key values
`cause the given document
`to be encrypted.
`
`
`
`
`
`
`BlackBerry Corporation Exhibit 1012, pg. 21
`
`