throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`_________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_________________
`
`MICROSOFT CORPORATION,
`Petitioner,
`
`v.
`
`UNILOC 2017 LLC,
`Patent Owner.
`
`U.S. Patent No.: 6,993,049
`Issued: January 31, 2006
`Application No.: 09/876,514
`Filed: June 7, 2001
`Title: COMMUNICATION SYSTEM
`
`_________________
`
`SECOND DECLARATION OF PETER RYSAVY
`Dated: May 19, 2020
`
`
`
`

`

`
`
`TABLE OF CONTENTS
`
`Page(s)
`
`I.
`
`INTRODUCTION AND ENGAGEMENT .................................................... 3
`
`II.
`
`BACKGROUND AND QUALIFICATIONS ................................................. 3
`
`III. MATERIALS CONSIDERED
`AND INFORMATION RELIED UPON ........................................................ 3
`
`IV. CLAIM CONSTRUCTION AND LEVEL OF SKILL .................................. 5
`
`A.
`
`Inquiry Message .................................................................................... 6
`
`V. GROUND 1: LARSSON-BASED COMBINATION ..................................... 9
`
`VI. GROUND 2: 802.11 ......................................................................................21
`
`VII. SIGNATURE .................................................................................................23
`
`
`
`
`
`
`
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 2
`
`

`

`
`
`I, Peter Rysavy, do hereby declare as follows:
`
`I.
`
`INTRODUCTION AND ENGAGEMENT
`
`1. I have been retained as an independent expert by attorneys at
`
`Klarquist Sparkman, LLP, who I understand to represent Microsoft Corporation
`
`in connection with Inter Partes Review (“IPR”) of U.S. Patent No. 6,993,049
`
`(hereinafter “the ’049 Patent”). In this report I provide my analyses and opinions
`
`on certain technical issues related to the ’049 patent.
`
`2. This Second Declaration is in addition to the first declaration that I
`
`prepared for the ’049 patent PTAB proceedings, signed and dated May 6, 2019
`
`(“First Declaration” or “Rysavy Declaration”). In this Second Declaration, I
`
`refer back to and incorporate analysis provided in the First Declaration. For
`
`brevity’s sake, I aim to not repeat analysis provided in that First Declaration.
`
`II. BACKGROUND AND QUALIFICATIONS
`
`3. The First Declaration lays out my education and professional
`
`background in paragraphs 3-11. With this declaration, I attach an updated
`
`version of my CV, as Appendix 1.
`
`III. MATERIALS CONSIDERED AND INFORMATION RELIED UPON
`
`4. In addition to the materials identified in paragraph 13 of the First
`
`Declaration, in connection with my work on this matter, I have reviewed the
`
`following materials and references in forming my opinions. Throughout, this
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 3
`
`

`

`
`
`declaration refers to the references by the shorthand form included in bold text
`
`within the parentheticals.
`
`Ex. No. Description
`
`1029
`
` Modicon Modbus Protocol Reference Guide, PI-MBUS-300, June
`1996 (“Modbus Protocol”).
`
`1030 U.S. Pat. No. 6,434,157 to Dube’ et al. (referencing Modbus Protocol).
`
`1031 ASN.1: Communication Between Heterogeneous Systems, Olivier
`Dubuisson, June 5, 2000, available at
`http://www.oss.com/asn1/resources/books-whitepapers-
`pubs/dubuisson-asn1-book.PDF from
`http://www.oss.com/asn1/resources/books-whitepapers-pubs/asn1-
`books.html (“Dubuisson”).
`
`1032 U.S. Pat. No. 6,687,766 to Casper
`
`1033 Uniloc USA, Inc. v. Samsung Elecs. Am. Inc., No. 2:18-cv-00040-JRG-
`RSP, Dkt. No. 69 (E.D. Tex. Feb. 26, 2019) (“Plaintiff’s Reply Claim
`Construction Brief”).
`
`1034 Qiu et al., A multiple access scheme for multimedia traffic in wireless
`ATM, IEEE/ACM Mobile Networks and Applications 1:259-272 (Jan.
`1996).
`
`1035 U.S. Pat. No. 6,205,498 to Habusha et al.
`
`1036 W. Richard Stevens, TCP/IP Illustrated, Volume 1: The Protocols,
`1994 (“Stevens”)
`
`1037 Webster’s New World Dictionary, 4th Edition, 1999 (“inquiry”)
`
`1038 U.S. Pat. No. 3,523,281 to Willcox et al.
`
`1039 U.S. Pat. No. 5,517,488 to Miyazaki et al.
`
`1040 U.S. Pat. No. 6,119,208 to White et al.
`
`1041 U.S. Pat. No. 6,141,701 to Whitney
`
`1042 U.S. Pat. No. 3,701,971 to Sanner et al.
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 4
`
`

`

`
`
`Ex. No. Description
`
`1043 U.S. Pat. No. 5,812,639 to Bartholomew et al.
`
`1044 David Johnson, David Maltz, Carnegie Mellon University, Dynamic
`Source Routing in Ad Hoc Wireless Networks, 1996,
`https://www.utdallas.edu/~ksarac/Papers/DSR.pdf
`
`1045 Global System for Mobile Communications (GSM) Technical
`Specification: Digital cellular telecommunications system (Phase 2+);
`Mobile radio interface layer 3 specification (GSM 04.08),
`https://www.etsi.org/deliver/etsi_gts/04/0408/05.00.00_60/gsmts_0408
`v050000p.pdf
`
`1046
`
`Federal Standard 1037C, Telecommunications: Glossary of
`Telecommunication Terms, U.S. Federal General Services
`Administration (Aug. 7, 1996)
`
`5. I may also reference other background materials throughout this
`
`declaration.
`
`6. I have also read the December 4, 2019, Institution Decision and the
`
`February 26, 2020, Patent Owner Response submitted in this IPR proceeding.
`
`IV. CLAIM CONSTRUCTION AND LEVEL OF SKILL
`
`7. As stated in my First Declaration, I applied the plain and ordinary
`
`meaning of the challenged claims when rendering my opinion. Since I submitted
`
`my First Declaration, I understand that the Patent Owner has proposed
`
`constructions for the terms “additional data field” and “inquiry message.” I
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 5
`
`

`

`
`
`disagree with the assertions and conclusions that the Patent Owner has stated
`
`with respect to these claim phrases as set forth below.
`
`A.
`
`Inquiry Message
`
`8. In its Response, the Patent Owner proposes that “inquiry message”
`
`should be construed as “a specific type of message used, at least in part, to
`
`discover other devices in the vicinity which may request to join a piconet.” POR,
`
`8-9, 11.
`
`9. A POSITA reading the ’049 patent would have understood the term
`
`“inquiry message” to generally be “a query for information,” or “a message
`
`seeking information.” It is a term that would apply to various networks, and its
`
`exact meaning would depend on the particular context in which it was used. This
`
`understanding is consistent with ordinary dictionary usage of the term “inquiry”:
`
`Webster’s New World College Dictionary (4th ed. 1999).
`
`10. The ’049 patent in its embodiment does not use the inquiry message to
`
`discover other devices in the vicinity which may request to join a piconet. In the
`
`
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 6
`
`

`

`
`
`’049 patent polling mode, in which the additional data field is added, the inquiry
`
`message portion is in fact ignored by the receiver, as explained by the following.
`
`“Since an inquiry mode is necessary to permit access to the host System’s
`
`piconet, it must be provided in the conventional manner for at least some of the
`
`time. There are a range of strategies which may be employed. A first strategy
`
`involves the operation of one radio in two modes, namely set up and polling. In
`
`set up mode the inquiry procedure operates as normal and the HIDs can
`
`establish contact with the host master 100 in the conventional manner. Once all
`
`HIDs have established themselves, the master radio switches to polling mode,
`
`in which the inquiry procedure now operates in polling mode only.” ’049
`
`patent 6:25-35 (emphasis added).
`
`11. In addition, and confirming my understanding that “inquiry message”
`
`would not be understood as a specific type of message, multiple patents use the
`
`term “inquiry message” to refer to a query for information or message seeking
`
`information. These usages of the term do not involve identifying devices with
`
`which to communicate. See the citations from the following patents, going as far
`
`back as 1964. US3523281 (1964 filing) in the abstract, “The changeable portion
`
`of the medium is erased following transmission of each inquiry message, and
`
`means are provided for recording on this erased portion, the reply message
`
`received from the central store.” US5517488 at 6:63-66, “The physical addresses
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 7
`
`

`

`
`
`of the data destinations can be known preliminarily on the basis of
`
`predetermination, inquiry message used in an address resolution protocol, or the
`
`like.” US6119208 at 6:5-7, “The MVS device backup query is implemented via
`
`the use of an ECAM Status Inquiry message, which comprises a status inquiry
`
`message.” US6141701 at 41:1-6, “The master control inquiry queue contains the
`
`response to the known MQF inquiry message. The MQF inquiry response
`
`message describes the current state of the specified MQF queue. There is one
`
`inquiry message response in the master control inquiry queue for every queue in
`
`the MQF describing its properties and state in known MQF format.” US3701971
`
`at 5:9-15, “A poll inquiry message is defined as a message by which the central
`
`data processor 11 interrogates one of a plurality of the addressed remote
`
`terminals and inquires whether the addressed remote terminal has a message
`
`ready for transmission to the central processor.” US5812639 at 10:59-60, “The
`
`trigger causes the SSP to frame a TCAP inquiry message which is directed to the
`
`SCP for instructions.”
`
`12. One example from cellular technology that uses the term “inquiry
`
`message” to refer to a query for information or message seeking information is a
`
`1995 specification for Global System for Mobile Communications (GSM),
`
`which is the predominant 2G cellular technology and still in use today. The
`
`specification, Mobile radio interface layer 3 specification (GSM 04.08)
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 8
`
`

`

`
`
`(https://www.etsi.org/deliver/etsi_gts/04/0408/05.00.00_60/gsmts_0408v050000
`
`p.pdf) describes two different inquiry messages. One is called a CLASSMARK
`
`ENQUIRY message, explained in section 3.4.11.2 on page 58 as, “On receipt of
`
`the CLASSMARK ENQUIRY message the mobile station sends a
`
`CLASSMARK CHANGE message to the network on the main DCCH.” The
`
`other is called a STATUS ENQUIRY message, explained in section 5.5.3.1 on
`
`page 130 as, “Upon receipt of a STATUS ENQUIRY message, the receiver shall
`
`respond with a STATUS message, reporting the current call state and cause
`
`value #30 “response to STATUS ENQUIRY”. Neither of these GSM examples
`
`involve identifying devices with which to communicate.
`
`13. The way the specification uses the word “inquiry” in the specification
`
`passages the Patent Owner cites in its POR—4:23-26, 1:56-57—is consistent
`
`with the plain and ordinary meaning of “seeking information.”
`
`14. Thus, a POSITA would have understood the term “inquiry message”
`
`as simply meaning a message that performs an inquiry to obtain information.
`
`
`
`V. GROUND 1: LARSSON-BASED COMBINATION
`
`15. As explained in my First Declaration, in paragraphs 74-82, the
`
`piggybacking of ARP messages satisfies the “adding … additional data fields”
`
`limitation in claims 11-12. I understand that Patent Owner now argues
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 9
`
`

`

`
`
`otherwise. I explain in the following paragraphs why I disagree with these
`
`arguments.
`
`16. Larsson’s length indicator confirms that there is an additional data
`
`field being added. See Larsson 7:58-61 (“[I]n a protocol where the request for
`
`route message is of a fixed length, a length indicator which indicates a length
`
`longer than the normal fixed length will implicitly indicate that the request
`
`contains piggyback data.”).
`
`17. I understand that the Patent Owner argues that adding data does not
`
`necessarily mean that there is an additional data field. POR, 12-13. But that is
`
`wrong because Larsson’s description of a “normal fixed length” RfR message
`
`means that the message is of fixed length, so any added piggybacked message
`
`would increase the length.
`
`18. It is impossible for the existing fields of the RfR message to carry
`
`more data, because the message would no longer be of the fixed length. So the
`
`presence of the length indicator in Larsson confirms the additional data fields in
`
`the piggybacked ARP (and other) messages.
`
`19. With respect to the length indicator, patent owner states, “it is just
`
`data that accounts for the longer than ‘fixed length’ message” in Larsson. Patent
`
`Owner Response at 13. This statement is incorrect because a “normal fixed
`
`length” means the length is fixed.
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 10
`
`

`

`
`
`20. A POSITA would have understood the end of the RfR message to be
`
`the most logical place to add, or “piggyback,” the additional data. In fact,
`
`placing the additional data anywhere else would have been counter-intuitive.
`
`Because the piggybacked data makes the RfR message “longer than the normal
`
`fixed length,” a POSITA would have recognized that the end of the respective
`
`inquiry message would be the least disruptive place to add the additional
`
`piggybacked data. Nearly all (if not all) communications protocols rely on
`
`predictable field lengths and locations within a packet in order to identify
`
`different message fields and thus compose and process messages in a predictable
`
`fashion. E.g., Ex. 1046, 14 (“The size and content of the various fields in a
`
`[message] packet are defined by a set of rules that are used to assemble the
`
`packet.”). Changing the order and size of these defined fields by placing
`
`additional data in the middle or beginning of a message would have likely
`
`resulted in a lack of protocol compliance and potential transmission errors. Thus,
`
`inserting additional data fields anywhere other than the end would unnecessarily
`
`increase the complexity of the implementation and, in the instance of a
`
`preestablished protocol, increase the likelihood of protocol implementation
`
`errors. For example, Qiu et al., A multiple access scheme for multimedia traffic
`
`in wireless ATM, IEEE/ACM Mobile Networks and Applications, discusses a
`
`piggybacking mechanism and specifically indicates that the authors would
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 11
`
`

`

`
`
`“append a piggyback field to the end of each packet.” Ex. 1034, 262 (emphasis
`
`added). For another example, one patent filed in 1999 describes piggybacking
`
`onto a message packet as “includ[ing] an optional Session Acknowledgment
`
`section 162” at the end of a user message packet 160. Ex. 1035, 8:46-51 and
`
`Fig. 7. That patent explains how the session acknowledgment may piggyback on
`
`a user message packet” and then refers to Fig. 7 (id., 8:46-48), which shows the
`
`session acknowledgment at the end:
`
`
`
`21. The Stevens treatise on TCP/IP confirms how a POSITA would
`
`understand the use of “piggybacking” in Larsson. A POSITA would have known
`
`the term “piggybacking,” which was well understood in networking contexts.
`
`For instance, Stevens, Ex. 1036, is a reference cited by Larsson that describes
`
`the use of piggybacking in TCP/IP communications. “Normally TCP does not
`
`send an ACK the instant it receives data. Instead, it delays the ACK, hoping to
`
`have data going in the same direction as the ACK, so the ACK can be sent along
`
`with the data. (This is sometimes called having the ACK piggyback with the
`
`data.)” Stevens, P265. The citation teaches that the act of combining one
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 12
`
`

`

`
`
`message (the ACK) with another message (the data being sent) constitutes
`
`piggybacking.
`
`22. The IEEE 802.11 specification, Ex. 1007, also refers to
`
`piggybacking. “When polled by the PC, a CFPollable STA may transmit only
`
`one MPDU, which can be to any destination (not just to the PC), and may
`
`‘piggyback’ the acknowledgment of a frame received from the PC using
`
`particular data frame subtypes for this transmission.” 802.11 at 86.
`
`23. Another reference, Dynamic Source Routing in Ad Hoc Wireless
`
`Networks, Ex. 1044, from 1996, discusses source routing in ad hoc wireless
`
`networks, a network similar to Larsson. “4.2. Piggybacking on Route
`
`Discoveries. As described in Section 3.2, when one host needs to send a packet
`
`to another, if the sender does not have a route cached to the destination host, it
`
`must initiate a separate route discovery, either buffering the original packet until
`
`the route reply is returned, or discarding it and relying on a higher-layer protocol
`
`to retransmit it if needed. The delay for route discovery and the total number of
`
`packets transmitted can be reduced by allowing data to be piggybacked on
`
`route request packets.” Ex. 1044, p. 9 (emphasis added).
`
`24. Each of these references makes clear that piggybacking is the
`
`addition of one message to another message. A POSITA would have known that
`
`all networking and communications messages consist of data and this data is
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 13
`
`

`

`
`
`arranged within data fields. An additional message would be carried within a
`
`data field and this data field would constitute an additional data field, relative to
`
`the message to which it is being added. Larsson’s use of term piggybacking is
`
`consistent with the cited examples and means the addition of information within
`
`an additional data field.
`
`25. Larsson’s “request for route” messages (“RfR messages”) are
`
`broadcast by a source node in order to establish communication routes to
`
`destination nodes. See, e.g., Larsson, 2:66-3:25. Using these RfR messages, a
`
`node can establish routes to the various nodes in the network and also reestablish
`
`routes when a route between two nodes is broken. See Larsson, Fig. 3 and 3:12-
`
`29. For example, if a source node cannot communicate with a destination node,
`
`e.g., because the “route to the destination node is not known, … then the source
`
`node broadcasts a request for route message.” Larsson, 2:66-3:2. This allows the
`
`source node to “begin[] sending data over the new route.” Larsson, 8:33-41.
`
`Under the ordinary meaning of “inquiry message” as a query for information or
`
`message seeking information, Larsson satisfies the claim.
`
`26. Larsson’s RfR messages are used to join two unconnected devices
`
`together for communication, thus enabling communications at a higher protocol
`
`layer such as the Internet protocol.
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 14
`
`

`

`
`
`27. The RfR messages in Larsson are used to both “newly establish[]”
`
`network routes between different devices and also re-establish “broken” routes
`
`so that the devices can “begin[] sending data over the new route.” Larsson, Fig.
`
`5, 2:66-3:2 3:12-29, and 8:33-41. Before a source node sends RfR messages and
`
`receives a “route response message” from a destination node, the two devices
`
`cannot communicate because they are not joined to the same network. E.g.,
`
`Larsson, 3:64-68 (“[I]n an ad-hoc network the source node may have to perform
`
`[inter alia] route discovery before the source node can begin to transmit data to
`
`the destination node.”); see also id. 1:33-37 (“[A]d-hoc networking protocols are
`
`based upon the assumption that nodes may not always be located at the same
`
`physical location. Bluetooth is an exemplary ad-hoc networking technology.”);
`
`id., 3:41-45 (“In order to transmit data from a source node to a destination node
`
`the source node may first obtain its own network address, resolve the name of
`
`the destination, obtain the hardware address of the destination node and
`
`determine a route to the destination node.”); see also 4:27-32 and 4:37-43. The
`
`RfR messages in Larsson seek to discover recipient (or destination) devices in
`
`order to join the two devices in network communication.
`
`28. The source node in Larsson is also seeking to identify nodes along the
`
`path to the destination node, so that it can communicate messages through those
`
`intermediary nodes.
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 15
`
`

`

`
`
`29. Like nearly all communications messages, ARP messages contain
`
`numerous data fields. RFC826 describes these data fields, including the “type
`
`field,” “ar$hrd field,” and “Ethernet address field (ar$sha).” See, e.g., RFC826,
`
`3-4, 8 (noting ARP message with a “type field of
`
`ether_type$ADDRESS_RESOLUTION” and “ar$hrd field”). ARP message
`
`creation is also known as “packet generation.” A person of skill in the art would
`
`understand the “type field,” “ar$hrd field,” and “Ethernet address field (ar$sha)”
`
`to be all be fields.
`
`30. RFC826 specifies the “Packet format” for ARP messages, which
`
`includes numerous fields of various lengths, including 48-bit fields for the
`
`destination and sender “Ethernet Address,” and a 16-bit “opcode” field:
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 16
`
`

`

`
`
`RFC826, 3. A person of skill in the art would understand these 48-bit fields for the
`
`destination and sender “Ethernet Address,” and the 16-bit “opcode” field to be
`
`
`
`fields.
`
`31. A person of skill in the art would understand the ar$hrd, ar$hln,
`
`ar$pro, and Ethernet type fields discussed at RCF826, 5, to be fields.
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 17
`
`

`

`
`
`32. RCF826 at 5 explains how ARP message packet buffers may be
`
`“reused” for a reply message because “a reply has the same length as a request,
`
`and several of the fields are the same.” Emphasis added.
`
`33. When an ARP message is piggybacked, all of its fields are necessarily
`
`piggybacked because a failure to do so would result in an incomplete ARP
`
`message being transmitted.
`
`34. While RFC826 specifies the different fields used for ARP messages,
`
`the Stevens textbook provides a clear depiction of these fields along with an
`
`accompanying explanation of the various ARP message fields as can be seen in
`
`Figure 4.3:
`
`Stevens, 56-57.
`
`
`
`35. Piggybacking (or, in other words, adding) ARP messages on the RfR
`
`messages means the addition of data fields, at least because the ARP data fields
`
`are not defined by the underlying protocols associated with the RfR messages
`
`and thus not ordinarily included in the RfR messages.
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 18
`
`

`

`
`
`36. The Address Resolution Protocol (ARP) is not a protocol defined by
`
`the Bluetooth specification. Rather, it is a protocol specified the Internet
`
`Engineering Task Force (IETF) at https://tools.ietf.org/html/rfc826. The fact
`
`that ARP messages are piggybacked in a Bluetooth message does not mean that
`
`ARP is defined or specified by the Bluetooth specification. The Bluetooth
`
`specification does not provide any specification for the composition or
`
`interpretation of this message. Instead it simply delivers the piggybacked
`
`message, much like a UPS delivery person delivers a package to an addressee
`
`without knowing, or needing to know, its contents. Because the ARP messages
`
`are defined by data fields, these data fields are additional data fields to the
`
`Bluetooth message.
`
`37. Even under Patent Owner’s own proposed construction for “inquiry
`
`message” of “a specific type of message used, at least in part, to discover other
`
`devices in the vicinity which may request to join a piconet,” Larsson nonetheless
`
`teaches the recited inquiry messages because in Larsson, the request for route
`
`(RfR) broadcast message is an inquiry message. Larsson RfR messages seek to
`
`establish a route between the source node and the destination node. The
`
`destination node is a node with which a source node wishes to communicate and
`
`the purpose of the RfR messages is for these messages to propagate through the
`
`network, eventually reaching the device which is the destination node. This
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 19
`
`

`

`
`
`destination node sends a response back to the source node and then the source
`
`node can communicate with the destination node over the established route.
`
`Larsson states, “If the node determines that it is not the destination node, in
`
`accordance with the ‘No’ path out of decision step 560, then the node is done
`
`with its processing for this message. However, if the node is the destination
`
`node, in accordance with the ‘Yes’ path out of decision step 560, the node will
`
`send a response back to the source node in accordance with step 565. In step 570
`
`the source node sends the unicast message to the destination node over the newly
`
`established route.” Larsson 3:17-251. Therefore, a POSITA would have
`
`understood the RfR message to seek a response for identifying a device, namely
`
`the destination node, available for joining a piconet.
`
`38. In addition, the route between the source node and destination node in
`
`Larsson involves intermediate nodes, namely the “route.” These intermediate
`
`devices themselves would constitute devices available for communications, ones
`
`identified in response to the RfR inquiry message.
`
`
`1 Note that this citation is in the prior art section of Larsson, but Larsson relies on this
`same request-for-route message mechanism when appending an additional data field. “These and
`other problems, drawbacks and limitations of conventional techniques are overcome according to
`the present invention by placing a broadcast message which the source expects a reply message
`in a broadcast message for route discovery.” Larsson 4:11-15.
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 20
`
`

`

`
`
`VI. GROUND 2: 802.11
`
`39. An 802.11 probe request is an electronic signal comprising an
`
`encoded series of zeroes and ones.
`
`40. The SSID information field box shown in Figure 35 below,
`
`highlighted in yellow, is a field in the SSID element format. When the length
`
`field for a probe request prescribes a zero-length SSID information field—as it
`
`does for “Broadcast” probe requests—the probe request will have nothing after
`
`the octet corresponding to the length field—nothing that corresponds to the
`
`SSID information field.
`
`
`
`
`
`41. Figure 35 is excerpted from 802.11, Ex. 1007 at 55 (highlighting
`
`added).
`
`42. A “Broadcast” probe request itself includes nothing that corresponds
`
`to the SSID information field.
`
`43. The field sequence in the MAC frame proceeds directly from the
`
`Length field of the SSID element to the Element ID field of the Supported rates
`
`element, with no SSID information field, for “Broadcast” probe requests.
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 21
`
`

`

`
`
`44. 802.11 uses the ASN.1 language, which is usually encoded using
`
`Basic Encoding Rules. See, e.g., 802.11, vi-vii (noting use of the ASN.1
`
`language in 802.11 protocol).
`
`45. The null value also has a length of zero, so, under the Basic Encoding
`
`Rules for encoding the ASN.1 language, it is encoded without a value octet, and
`
`may optionally be depicted in a protocol as lacking a third field, as it is in this
`
`excerpt from Dubuisson, Ex. 1031, at 398:
`
`
`
`46. In the excerpt above, the “T” label identifies the tag field, the “L”
`
`label identifies the length field, and the “V” label identifies where the value field
`
`would be if there was a value field. As Dubuisson explains at 398, n.3, the 010
`
`means zero in base 10, which is just zero.
`
`47. Similarly, Dubuisson also discusses the encoding of a value with zero
`
`length, which involves encoding only two octets as there is nothing coded for the
`
`third field (value field) of zero length, at page 397.
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 22
`
`

`

`
`
`48. Similarly, the Modbus Protocol, Ex. 1029, notes how “[t]he data field
`
`can be nonexistent (of zero length) in certain kinds of messages.” Modbus
`
`Protocol, 11.
`
`49. A field “set to zero” has zeros in it and is not the same as a zero-
`
`length field that does not exist. For example, Ex. 1032 (U.S. 6,687,766 B1) at
`
`12:45-50, shows a field with three bits “set to zeros”:
`
`
`
`50. Not every information element must have an information field, even
`
`though information elements generally have the format shown in Figure 34 of
`
`the 802.11 protocol, Ex. 1007 at 55. The SSID element in a “Broadcast” probe
`
`request and the null value in Dubuisson are two examples of information
`
`elements that do not have information fields.
`
`VII. SIGNATURE
`
`51. I, Peter Rysavy, do hereby declare and state that all statements made
`
`herein of my own knowledge are true and that all statements made on
`
`information and belief are believed to be true; and further that these statements
`
`were made with the knowledge that willful false statements and the like so made
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 23
`
`

`

`of the United States Code.
`
`Dated: May 19, 2020
`
`{~ Pct ~C-,
`
`are punishable by fine or imprisonment, or both, under Section 1001 ofTitle 18
`
`Signature
`
`I
`
`SECOND DECLARATION OF PETER RYSAVY
`
`Page 24
`
`

`

`APPENDIX 1
`
`Peter Rysavy – Curriculum Vitae
`
`PO Box 680, Hood River, OR 97031, USA
`+1-541-386-7475, public.temp1@rysavy.com, http://www.rysavy.com
`
`Peter Rysavy is an expert in wireless technology,
`mobile computing, and data networking
`
`Contents
`EDUCATION: .................................................................................................... 2
`WORK EXPERIENCE ......................................................................................... 2
`PATENTS .......................................................................................................... 5
`TESTIFYING AND CONSULTING EXPERIENCE IN LITIGATION.......................... 5
`PUBLIC SPEAKING ........................................................................................... 9
`PUBLISHED ARTICLES AND REPORTS .............................................................. 9
`WIRELESS COURSES ...................................................................................... 18
`
`Education:
`BSEE, MSEE Electrical Engineering, Stanford University, 1979.
`
`Work Experience
`Rysavy Research. 1993 to Present: President
`
`Peter Rysavy is president of Rysavy Research LLC, a consulting firm that has
`specialized in wireless technology and mobile computing since 1993. Projects have
`included evaluation of wireless technology capabilities, network performance
`measurement, reports on the evolution of wireless technology, spectrum analysis for
`broadband services, strategic consultations, system design, articles, courses and
`webcasts, and test reports.
`
`Peter Rysavy has expertise in IEEE 802.11 (Wi-Fi), wireless hotspots, mesh
`networks, metro and municipal Wi-Fi, paging technology, 2G, 3G, 4G, 5G, IMT-
`Advanced, IMT-2020, Global System for Mobile Communications (GSM), General
`Packet Radio Service (GPRS), Enhanced Data Rates for GSM Evolution (EDGE),
`Universal Mobile Telecommunications System (UMTS), Code Division Multiple Access
`(CDMA), Wideband CDMA (WCDMA), High Speed Downlink Packet Access (HSDPA),
`High Speed Uplink Packet Access (HSUPA), High Speed Packet Access (HSPA),
`HSPA+, Long Term Evolution (LTE), LTE-Advanced, LTE-Advanced Pro, LTE-Licensed
`Assisted Access (LAA), LTE-U, CDMA2000, CDMA2000 1XRTT, Evolved Data
`Optimized (EV-DO), Bluetooth, WiMAX, IEEE 802.16 (IEEE 802.16e, IEEE 802.16m),
`wireless security, smartphones, smartphone operating systems, Mobile IP, Evolved
`Packet System (EPS), Evolved Packet Core (EPC), e-mail, wireless e-mail, browsers,
`mobile browsers, media gateways, orthogonal frequency division multiplexing
`(OFDM), orthogonal frequency division multiple access (OFDMA), voice over IP
`(VoIP), mobile video, wireless spectrum, spectrum sharing, spectral efficiency,
`capacity analysis, mobile computing architectures, and TCP/IP networking.
`
`Peter Rysavy Curriculum Vitae
`
`Page 25
`
`

`

`Patent Litigation
`
`Peter Rysavy has worked in numerous cases, both as testifying and consulting
`expert. He has trial experience, reports, and depositions. See section 4 for
`details.
`
`Analysis
`
`Rysavy Research analyzes wireless technologies for capability, compatibility,
`interoperability, and intellectual-property considerations.
`
`Training
`
`Rysavy Research conducts wireless-technology training, both publicly and
`privately.
`
`Testing and Reports
`
`Rysavy Research tests, evaluates, and reports on all major wireless
`technologies.
`
`Application Development and Deployment
`
`Rysavy Research works with companies to define architectures, select
`vendors, perform pilots, and to deploy wireless systems and applications.
`
`Clients (excluding confidential litigation cases) from 1993 to present
`include:
`
`5G Americas, AltaVista, Anchorage Partners, Antenna Software, Apple, Arris,
`AT&T, AT&T Wireless, Aventail, Black Lowe & Graham, Bluetooth SIG,
`Broadbeam, Cingular Wireless, City of Seattle, CMP Media, Compression
`Laboratories, Coinstar, Comverse Network Systems, Cricket Wireless,
`Crosslink Capital, Customer Focused Strategies, Datacomm Research, CTIA –
`The Wireless Association, Data Communications Maga

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket