throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`U.S. Patent No. 9,021,602 B2
`: Attorney Docket No. 081841.0119
`In Re:
`Inventor: Moskowitz, Scott A.
`:
`Filed:
`Mar. 11, 2013
`:
`Issued:
`Apr. 28, 2015
`: IPR No.: 2019-01449
`Assignee: Wistaria Trading Ltd.
`:
`Title:
`Data Protection Method
`and Device
`
`:
`
`
`
`Mail Stop PATENT BOARD
`Patent Trial and Appeal Board
`U.S. Patent and Trademark Office
`P.O. Box 1450
`Alexandria, Virginia 22313-1450
`Submitted Electronically via the Patent Trial and Appeal Board End to End System
`PETITION FOR INTER PARTES REVIEW OF CLAIMS 1, 5, 8, AND 10 OF
`U.S. PATENT NO. 9,021,602 UNDER 35 U.S.C. §§ 311-319 AND
`37 C.F.R. §§ 42.100 ET SEQ.
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`I.
`
`II.
`
`TABLE OF CONTENTS
`MANDATORY NOTICES UNDER 37 C.F.R. §42.8 AND FEES ................ 1
`REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R.
`§42.104 ............................................................................................................ 3
`A. Grounds for Standing (37 C.F.R. §42.104(a)) ......................................... 3
`B. Publications Relied Upon ........................................................................ 3
`C.
`Identification for Challenge (37 C.F.R. §42.104(b)) ............................... 3
`III. OVERVIEW OF THE ’602 PATENT ............................................................ 4
`A. Summary of the Claimed Subject Matter ................................................ 4
`B. Prosecution History of the ’602 Patent .................................................... 6
`C. Filing Date and Priority ......................................................................... 10
`SUMMARY OF THE APPLIED PRIOR ART ............................................ 11
`CLAIM CONSTRUCTION UNDER 37 C.F.R. §42.104(b)(3) ................... 17
`A. Level of Ordinary Skill in the Art .......................................................... 17
`B. Claim Terms ........................................................................................... 18
`THE ASSERTED GROUND RENDERS ALL CHALLENGED CLAIMS
`INVALID ....................................................................................................... 25
`VII. CONCLUSION ............................................................................................. 76
`
`IV.
`V.
`
`VI.
`
`i
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`LIST OF EXHIBITS
`
`Exhibit No.
`
`Description of Document
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`U.S. Patent No. 9,021,602 to Moskowitz et al. (“’602 Patent”)
`
`Declaration of Dr. Vijay K. Madisetti
`
`Curriculum Vitae of Dr. Vijay K. Madisetti
`
`File History for U.S. Patent No. 9,021,602
`
`File History for Reexamination Request No. 90/014,137 of U.S. Patent
`No. 9,021,602
`
`File History for U.S. Patent No. 9,104,842 (“parent ’842 Patent”)
`
`File History for Reexamination Request No. 90/014,138 of U.S. Patent
`No. 9,104,842
`
`U.S. Patent No. 5,757,907 to Cooper et al. (“Cooper”)
`
`First Amended Complaint for Patent Infringement, Blue Spike LLC v.
`DISH Network Corporation, Civil Action No. 1:19-cv-00160-LPS-CJB
`(filed Mar. 29, 2019) (“District Court Litigation”)
`
`Complaint, Blue Spike LLC v. DISH Network Corporation et al., Nos.
`6:18-CV-00333-RWS-KNM (E.D. Tex.),
`1:18-CV-01512-LPS-CJB (D. Del.) (the “Prior Litigation”)
`
`Order Granting Joint Motion to Transfer to the District of Delaware and
`Stay All Deadlines, 6:18-CV-00333-RWS-KNM, ECF No. 19, entered in
`Prior District Court Litigation
`
`Notice of Voluntary Dismissal Without Prejudice, served in Prior District
`Court Litigation
`
`File History for U.S. Patent No. 6,598,162
`
`Software Authorization Systems, Paul A. Suhler et al., IEEE Software
`(1986).
`
`ii
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`Exhibit No.
`
`1015
`
`Description of Document
`
`Designing Software to be Used Up and Protecting it from Pirates, Bryon
`K. Ehlmann, ACM SIGSMALL/PC Notes, vol. 11, issue 3 (Aug. 1985)
`
`iii
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`I.
`
`MANDATORY NOTICES UNDER 37 C.F.R. §42.8 AND FEES
`
`Real Party in Interest Under 37 C.F.R. §42.8(b)(1): DISH Network
`
`Corporation, DISH Network L.L.C., and DISH Network Service L.L.C. (collectively,
`
`“Petitioner” or “DISH”) are the Petitioner. DISH is a provider of direct broadcast
`
`satellite services. Non-party DISH Technologies L.L.C. is a real party in interest.
`
`DISH Technologies L.L.C. provides set top boxes to DISH that are used to provide
`
`direct broadcast satellite services to customers.
`
`Related Matters Under 37 C.F.R. §42.8(b)(2): U.S. Patent No. 9,021,602 is
`
`currently involved in a pending lawsuit involving Petitioner entitled, Blue Spike LLC
`
`et al. v. DISH Network Corporation et al., United States District Court for the
`
`District of Delaware, Case No. 1:19-CV-00160-LPS-CJB (the “District Court
`
`Litigation”). See Ex[1009]. Patent Owner asserts U.S. Patent No. 9,021,602
`
`against Petitioner in the District Court Litigation. Id. ¶¶ 98-110. Patent Owner
`
`asserted U.S. Patent No. 9,021,602 against Petitioner in an earlier lawsuit, entitled,
`
`Blue Spike LLC v. DISH Network Corporation et al., Case Nos. 6:18-CV-00333-
`
`RWS-KNM (E.D. Tex.) and 1:18-CV-01512-LPS-CJB (D. Del.) (the “Prior
`
`Litigation”). See Ex[1010] 101-109. This prior lawsuit was transferred from the
`
`United States District Court for the Eastern District of Texas to the United States
`
`District Court for the District of Delaware, see Ex[1011], and subsequently
`
`voluntarily dismissed by Blue Spike, see Ex[1012]. DISH asserted Patent Owner
`
`lacked standing to bring these two initial lawsuits.
`
`1
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`Lead Counsel and Request for Authorization Under 37 C.F.R. §42.8(b)(3):
`
`Pursuant to 37 C.F.R. §§42.8(b)(3) and 42.10(a), Petitioner designates the following:
`
`lead counsel is Eliot D. Williams (Reg. No. 50,822) of Baker Botts L.L.P.; back-up
`
`counsel is G. Hopkins Guy (Reg. No. 35,886) and Ali Dhanani (Reg. No. 66,233) of
`
`Baker Botts L.L.P.
`
`Service Information Under 37 C.F.R. §42.8(b)(4): Service information is as
`
`follows: Baker Botts L.L.P., 1001 Page Mill Rd., Palo Alto, CA 94304-1007
`
`Tel. 650 739 7500; Fax 650-739-7699. Petitioner consents to service by electronic
`
`mail
`
`at
`
`eliot.williams@bakerbotts.com,
`
`hop.guy@bakerbotts.com,
`
`and
`
`ali.dhanani@bakerbotts.com. A Power of Attorney is filed concurrently herewith
`
`under 37 C.F.R. §42.10(b).
`
`Fees: The Office is authorized to charge the fee set forth in 37 C.F.R. §42.15(b)
`
`to Deposit Account No. 02-0384 as well as any additional fees that might be due in
`
`connection with this Petition.
`
`2
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`II.
`
`REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R.
`§42.104
`
`A.
`
`Grounds for Standing (37 C.F.R. §42.104(a))
`
`Petitioner challenges claims 1, 5, 8, and 10 of U.S. Patent No. 9,021,602 (the
`
`“’602 Patent”). See Ex[1001]. Petitioner certifies that the ’602 Patent is eligible
`
`for inter partes review and certifies that Petitioner is not barred or estopped from
`
`requesting this inter partes review.
`
`B.
`
`Publications Relied Upon
`
`As explained below in Sections III.B-C, the assumed priority date for the ’602
`
`Patent is March 24, 1998. Therefore, Petitioner relies upon the following patent as
`
`prior art:
`
`Ex[1008] — U.S. Patent No. 5,757,907 by Cooper et al., entitled “Method
`
`and apparatus for enabling trial period use of software products: method and
`
`apparatus for generating a machine-dependent identification” (“Cooper”), filed on
`
`April 25, 1994, and issued on May 26, 1998. Cooper is available as prior art to
`
`the ’602 Patent under 35 U.S.C. §102(e) as of its April 25, 1994 filing date.
`
`C.
`
`Identification for Challenge (37 C.F.R. §42.104(b))
`
`Petitioner requests cancellation of the claims on the ground that claims 1, 5,
`
`8, and 10 are obvious over Cooper.
`
`3
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`III. OVERVIEW OF THE ’602 PATENT
`
`A.
`
`Summary of the Claimed Subject Matter
`
`The claims of the ’602 Patent relate to the restricted use and protection of
`
`licensed computer software while resident on a user’s computer. See Ex[1001]
`
`1:46-49, 1:51-54, 7:22-40. The preamble of claim 1, for example, states that it is a
`
`“computer based method for accessing functionality provided by an application
`
`software.” Id. claim 1. As was known in the art prior to the ’602 Patent, the
`
`method begins by storing the application in computer memory and prompting a user
`
`to enter personal information into the computer. See id.; see also Ex[1005] 295
`
`(inventor stating that “it was well known for computer software to prompt a use [sic]
`
`for information at startup”).
`
`The claim then recites the step of storing “both computer configuration
`
`information of said computer, and a license code entered in response to said
`
`prompting” together in a “personalization data resource.” Ex[1001] claim 1. The
`
`user-entered license code must be used by the computer to “generat[e] a proper
`
`decoding key” that is used to access specially encoded code resources of the
`
`application software. Id. As discussed in the next section, this storage and key
`
`generation arrangement was the primary reason for allowance.
`
`Last, regarding restricting access to the application software, the claim recites
`
`that the application software “cannot access at least one encoded code resource of
`
`said application software, unless said license code is stored in said personalization
`
`4
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`data resource.” Id. As such, the application software must have “at least one
`
`encoded code resource.”
`
`The term “code resource” is explained in the specification as referring to a
`
`portion of the executable code of the application software. See e.g., Id. 11:63-66.
`
`The specification states that an executable computer program is comprised of a
`
`“collection of smaller, atomic (or indivisible) chunks of object code” that together
`
`form “the complete executable object code or application,” and “may also require
`
`the presence of certain data resources,” which are separate non-executable portions
`
`of the program. Id. 11:19-23. The ’602 Patent refers to the smaller chunks as
`
`“sub-objects” or “portions” of the larger program, and states that “[t]hese sub-objects
`
`can be packaged into what are referred to in certain systems as ‘code resources,’
`
`which may be stored separately from the application, or shared with other
`
`applications, although not necessarily.” Id. 11:63-66, 11:30-33 (“Each function, or
`
`procedure, written in the programming language, represents a self-contained portion
`
`of the larger program, and implements, typically, a very small piece of its
`
`functionality.”). Thus, the “code resources” are portions of executable computer
`
`code that collectively form the complete software application.
`
`The term “encoded code resource” appears only one time in the specification
`
`of the ’602 Patent. See Id. 13:52-55. The only portion of the specification that
`
`mentions an “encoded code resource” describes the process of storing certain code
`
`resources separately from the other code resources of the application, such that they
`
`5
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`are removed and only accessible with the proper decoding key. See Id. 13:15-21.
`
`For example, an “encoded code resource” may be stored in “data resources” of the
`
`application, separately from the application’s code. Id. And, because the
`
`“encoded code resources” are stored separate from the bulk of the executable code,
`
`the specification states that the “application must also contain a data resource which
`
`specifies in which data resource a particular code resource is encoded.” Id. 13:55-
`
`57. The only way to access these “encoded code resources” is to have the correct
`
`licensing information stored in the personalization data resource, because the
`
`“proper decoding key” needed to access the “encoded code resource” is generated
`
`using the licensing information. Id. 13:66-67 (“Once it has the license code, it can
`
`then generate the proper decoding key to access the essential code resources.”),
`
`14:21-25 (“That, in turn, means the license information in the software copy must
`
`remain fixed, so that the correct key is available to the software. The key and the
`
`license information are, in fact, interchangeable. One is merely more readable than
`
`the other.”).
`
`B.
`
`Prosecution History of the ’602 Patent
`
`U.S. patent No. 9,021,602 (“’602 Patent”) issued on April 28, 2015 from U.S.
`
`Application No. 13/794,584 (“’584 Application”), which was filed on March 11,
`
`2013. On May 9, 2014, the Examiner issued a non-final rejection rejecting all
`
`pending claims of the ’584 Application as being obvious over references named
`
`Holmes and Eyres. See Ex[1004] 137-144. In response, the Applicant amended
`
`6
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`the claims closer to their current form, as shown below.
`
`See Ex[1004] 221 (highlighting added). The Applicant argued that “[n]either
`
`Holmes nor Eyres suggest storing both a license code and computer configuration
`
`information in the same data resource,” thereby indicating that this newly added
`
`limitation was important to the allowance of the alleged invention. Id. 226.
`
`Further indicating the importance of the amendments, the Applicant directly argued
`
`that this amendment was made to overcome the obviousness rejection by stating that
`
`“[t]he amended claim 58 recitation ‘said application software storing, in said non
`
`transient memory, in a personalization data resource, both computer configuration
`
`information, and a license code entered in response to said prompt;’ addresses the
`
`Holmes and Eyres rejection. These references do not suggest storing both
`
`7
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`computer configuration information and a license code in the same data resource.”
`
`Id. 226-27 (underline in original).
`
`In response to these amendments and remarks, the Examiner issued a notice
`
`of allowance with an Examiner’s amendment, as shown below.
`
`Id. 306 (highlighting added). Relying on the subject matter of the Applicant’s prior
`
`amendment and arguments as well as the Examiner’s proposed amendment, the
`
`examiner stated that “[t]he primary reason for allowance of the claims is the
`
`limitation of storing in a personalization data resource, both computer
`
`configuration information of said computer and a license code which is used to
`
`generate a proper decoding key.” Ex[1004] 308. Subsequently, the ’602 Patent
`
`issued with claim 1 corresponding to original claim 58, as amended.
`
`The ’602 Patent underwent ex parte reexamination pursuant to a request for
`
`reexamination made on May 11, 2018. See Ex[1005] 599-600. The Examiner
`
`issued a non-final action rejecting claims 1-5, 8, 10, and 12 as anticipated by
`
`8
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`Cooperman under 35 U.S.C. 102(a), claims 1, 2, 5, 8, 10, and 12 as anticipated by
`
`Hicks under 35 U.S.C. 102(e), and claims 3 and 4 as obvious considering Hicks in
`
`view of Rhoads under 35 U.S.C. 103(a), and claims 1-5, 8, 10, and 12 as anticipated
`
`by Moskowitz et al. (U.S. Patent No. 5,745,569) under 35 U.S.C. 102(g). See
`
`Ex[1005] 169-183. The Patentee did not expressly contest that the applied prior art
`
`disclosed each and every element of the claims—not even for the limitation that was
`
`the “primary reason for allowance of the claims” as discussed above.
`
`Instead, rather than argue novelty or distinguish the claims of the ’602 Patent
`
`from the prior art to overcome the rejections as was done during the initial
`
`prosecution, the Patentee maneuvered around the applied prior art by: (a) correcting
`
`inventorship of the ’602 Patent to add Marc Cooperman as inventor to the ’602
`
`Patent; (b) asserting entitlement to the benefit of U.S. Application No. 09/046,627
`
`filed March 24, 1998 as identified on the face of the ’602 Patent, thereby preventing
`
`the applied prior art from being statutory bars under 35 U.S.C. 102(b); and (c)
`
`providing a declaration under 37 CFR 1.131 asserting prior invention of the ’602
`
`Patent claimed subject matter no later than January 17, 1996 as evidenced by U.S.
`
`Patent Application No. 08/587,943 filed that day, thereby antedating the non-
`
`statutory bar prior art. See Ex[1005] 184-86, 275-282. However, the Patentee’s
`
`first attempt to avoid the prior art was unsuccessful, and the Examiner denied the
`
`Patentee’s petition for failing to satisfy all of the necessary requirements. See Id.
`
`164-168. Again, rather than substantively distinguish the claimed invention from
`
`9
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`the prior art, the Patentee persisted in its plan to move around the prior art and refiled
`
`its petitions with additional support. See e.g., id.
`
`Ultimately, the Patentee’s strategy of avoiding the merits of the prior art was
`
`successful, and on March 27, 2019 the Examiner issued a Notice of Intent to Issue a
`
`Reexam Certificate. See Ex[1005] 594-598. But the Examiner’s statement of
`
`reasons for patentability and/or confirmation of the claims did not state that the
`
`claims were novel and nonobvious; rather, the Examiner’s stated only that “the cited
`
`prior art, including Cooperman, Hicks, Rhoads, and Moskowitz et al., were
`
`previously applied, but are now not eligible as prior art under 102(a), (e), or (g).
`
`Patent Owner has established invention by both Scott Moskowitz and Marc
`
`Cooperman (see granted petition 12/12/2018). Further, the declaration under 37 CFR
`
`1.131 (01/23/2019) has been considered and establishes invention prior to Hicks and
`
`Rhoades [sic].” Ex[1005] 597.
`
`C.
`
`Filing Date and Priority
`
`The earliest application to which the ’602 Patent claims benefit was filed on
`
`March 24, 1998. Ex[1001] [60] (claiming the benefit of “application No.
`
`09/046,627, filed on Mar. 24, 1998, now Pat. No. 6,598,162”). During prosecution
`
`of the ’602 Patent, the applicant intentionally deleted a benefit claim to Application
`
`No. 08/587,943, now Patent No. 5,745,569, filed on January 16, 1996. See
`
`Ex[1004] 4. Therefore, Petitioner assumes for purposes of this Petition that the
`
`filing date and priority date of the ’602 Patent are March 24, 1998.
`
`10
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`However, Petitioner is aware that the Patent Owner swore behind the prior art
`
`applied during the reexamination of the ’602 Patent using an alleged invention date
`
`of January 16, 1996. See Ex[1005] 279-80, 287-302. If Patent Owner advances
`
`this argument again and is successful, the challenged claims are still invalid under
`
`the asserted grounds. The invalidity analysis does not change because Cooper is
`
`prior art to the ’602 Patent under 35 U.S.C. § 102(e) using either a March 24, 1998
`
`or January 16, 1996 priority date for the ’602 Patent. See Ex[1002] ¶ 30.
`
`Moreover, the obviousness analysis or knowledge of the POSA would not change
`
`because the subject matter of the challenged claims was known before either date.
`
`Id.
`
`IV.
`
`SUMMARY OF THE APPLIED PRIOR ART
`
`The ’602 Patent claims what was well-known in the prior art, as illustrated by
`
`Cooper. Cooper relates “to techniques for security access to software objects, and
`
`in particular to techniques for temporarily encrypting and restricting access to
`
`software objects.” Ex[1008] 1:35-38. Cooper describes a software application
`
`including one or more software objects, such as the well-known user programs Lotus,
`
`WordPerfect, DrawPerfect, and/or Norton Utilities, and an associated file
`
`management program. Ex[1002] ¶ 70-71; Ex[1008] 2:31-33 (“[P]roviding a
`
`software object on a computer-accessible memory media along with a file
`
`management program.”). Cooper describes that the software object and file
`
`management program are loaded into the memory of a computer. See Ex[1008]
`
`11
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`3:12-14 (“The encrypted software object is loaded onto a user-controlled data
`
`processing system having a particular configuration.”), 3:39-31 (“[T]he file
`
`management program is loaded onto a user-controlled data processing system and
`
`associated with an operating system for the user-controlled data processing
`
`system.”). Once loaded, the file management program portion of the application
`
`prompts the user to input personal information into the computer via a series of form
`
`prompts. See Id. 13:9-15 (stating that the file management program “provides a
`
`plurality of user-interface screens to the software customer which gathers
`
`information about the customer … and receives the customer selections of the
`
`software products for which a trial interval is desired.”), 9:66-10:3 (“The file
`
`management program includes a plurality of interface screens which facilitate
`
`interaction between the vendor and the customer, which and which set forth the
`
`options available to the customer.”).
`
`Cooper also explains that a “temporary product key,” a “machine
`
`identification number,” and other personal information are stored together in a “key
`
`file” on the computer. Ex[1008] 15:61-65. The temporary product key is used by
`
`the computer “to generate a real key which can be utilized to decrypt one or more
`
`software objects.” Id. 6:15-18; see also 27:47-50 (“a file management program,
`
`which includes said key generator as a component thereof.”). Therefore, Cooper
`
`discloses the same storage and key generation arrangement that was the primary
`
`reason for allowance of the ’602 Patent.
`
`12
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`Last, regarding restricting access to the application software, Cooper discloses
`
`that the file management program “returns an ‘access denied’ response” if the key
`
`file does not exist. Id. 18:24-30. And, the temporary product key must be stored
`
`in the key file and remain unchanged in order to generate the real key that is used to
`
`decrypt and access the encrypted software object. See Id. 13:66-14:3 (“the key file
`
`contains the product key”), 14:3-5 (“[a]ll three items,” which includes the product
`
`key, “must remain unchanged in order for the decryption tool to derive the real
`
`encryption key”).
`
`Cooper, like the ’602 Patent, stores a portion of the encrypted software object
`
`separately from the other code resources of the software object, such that they are
`
`removed and only accessible with the proper decryption key. See Id. 19:1-10
`
`(“[t]he clear text copy of the software product (represented as clear file 531) is
`
`encrypted in accordance with a conventional routine, to form encrypted file 533.
`
`The front portion of encrypted file 533 is copied to side file 539 so that the overlaid
`
`data of encrypted file 533 is preserved.”), 18:4-9 (stating that “prior to performing
`
`the decryption operations of FIG. 23, the contents of the corresponding side file must
`
`be substituted back into the encrypted software product in lieu of encryption header
`
`451. This ensures that the encrypted software product is complete prior to the
`
`commencement of decryption operations”).
`
`Cooper was not used as a basis for any rejection during the prosecution of
`
`the ’602 Patent or parent applications or even identified and, therefore, does not
`
`13
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`appear on the face of the ’602 Patent or parent applications. However, for purposes
`
`of completeness, Petitioners have discovered an attenuated and indirect connection
`
`between Cooper and the ’602 Patent, but it is not enough to support denying
`
`institution under 35 U.S.C. § 325(d). See Becton, Dickinson & Co. v. Braun
`
`Melsungen AG, IPR2017-01586, slip op. at 16-18 (Paper 8) (PTAB Dec. 15, 2017)
`
`(informative).
`
`Specifically, as used herein, Cooper is U.S. Patent No. 5,757,907, which
`
`shares a specification with U.S. Patent No. 5,737,416 (“Cooper ’416”). Cooper
`
`and Cooper ’416 share a common specification and were filed the same day, but
`
`each names a different set of inventors and are otherwise unrelated. In the ’602
`
`Patent family, Cooper ’416 was cited as a basis for rejecting certain claims of the
`
`earlier application leading to U.S. Patent No. 6,598,162 (“’162 Patent”), which is the
`
`2nd great-grandparent to the challenged ’602 Patent. The graphic below represents
`
`these relationships.
`
`14
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`See Ex[1005] 599 (listing Related U.S. Application Data in Field [60]).
`
`Cooper ’416 was applied as a basis for rejection as to claims 6, 13, 14-17, 19-21,
`
`and 25 of the ’162 Patent application and was not cited again as claims were
`
`subsequently amended or new claims were added in prosecuting the ’602 Patent
`
`family.
`
`Despite the ’162 Patent and ’602 Patent being related, none of the ’162 Patent
`
`claims are related to access restriction or restricting access to software as now
`
`claimed in the ’602 Patent and disclosed in Cooper. The ’842 divisional shown in
`
`the graphic above actually includes a restriction requirement that separated the new
`
`claims between scrambling and encoding, access restriction, and watermarking.
`15
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`See Ex[1006] at 1158-1166.
`
`The prosecution history of the ’162 Patent reveals these basic differences
`
`between the claims and purported inventions of the ’162 and ’602 Patents. To
`
`traverse the rejection over Cooper ’416, the Applicant argued with respect to
`
`the ’162 Patent that “information access restriction” is “contrary to an object of the
`
`present invention. The present invention does not encourage access restriction,
`
`but rather encourages information distribution which can have a quality parameter
`
`encourage purchase of a ‘partner’ or associated key.” Ex[1013] 78. Based on this
`
`characterization, the Applicant argued for allowance in the ’162 patent prosecution
`
`that “Cooper [’416] is directed to access restriction, which is contrary to an object
`
`of the present invention.” Id. 79. This statement in the ’162 patent prosecution
`
`contrasts with the claims of the ’602 Patent which were added later and recite a
`
`“method for accessing functionality provided by an application software . . .
`
`wherein said application software, in said computer, cannot access at least one
`
`encoded code resource of said application software, unless said license code is
`
`stored in said personalization data resource.” Ex[1001] claim 1; see also Id.
`
`claim 10. Thus, while the Cooper’s disclosure has been applied (via Cooper ’416)
`
`to a patent that is related to the challenged ’602 Patent, Cooper’s disclosure was only
`
`considered in a context that was “contrary” to the claims of the ’162 Patent then
`
`under consideration and not the later claims added in prosecution in the ’602 Patent.
`
`As such, Cooper has never been applied to the subsequent claims added
`
`16
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`during prosecution that expressly recite elements of access restriction, such as those
`
`that are challenged in this Petition. Accordingly, Cooper is new and relevant to
`
`the ’602 Patent for the same reason that Cooper ’416 was irrelevant to the ’162
`
`Patent— “because it is directed to access restriction.” Ex[1013] 79.
`
`V.
`
`CLAIM CONSTRUCTION UNDER 37 C.F.R. §42.104(b)(3)
`
`Under 37 CFR §42.100, claims should be construed “using the same claim
`
`construction standard that would be used to construe the claim in a civil action under
`
`35 U.S.C. 282(b)” (hereinafter the “Phillips standard”).1
`
`A.
`
`Level of Ordinary Skill in the Art
`
`A Person of Ordinary Skill in the Art (“POSA”) at the relevant time would
`
`have “a bachelor’s degree in computer science, electrical engineering, or a related
`
`technology field, and at least two to three years of experience related to secure
`
`distribution of digitized information or a related technology field, such as data
`
`integrity and security. Alternatively, a POSA in the relevant timeframe would have
`
`an advanced degree, such as a master’s degree, in computer science, electrical
`
`engineering, or a related technology field, and at least one year of experience related
`
`to secure distribution of digitized information or a related technology field, such as
`
`data integrity and security. A person with less education but more relevant
`
`1 Petitioner reserves the right to seek different claim constructions in the District
`Court Action.
`
`17
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`practical experience, or more relevant education but less practical experience, may
`
`also qualify as a POSA.” Ex[1002] ¶ 43.
`
`B.
`
`Claim Terms
`
`The table below provides a summary of the Petitioner’s constructions for
`
`certain claim terms of the claims of the ’602 Patent. Each proposed construction is
`
`explained a respective section below.
`
`Claim Term
`
`Phillips Construction
`
`“personalization
`information”
`
`“license code”
`
`“information that uniquely identifies the user, including
`a license code”
`
`“a code required to be entered into the software
`application to activate the application, to enable the
`application to provide its specified functionality”
`
`“personalization data
`resource”
`
`“a non executable file that stores personalization
`information”
`
`“encoded code
`resource of said
`software
`application”
`
`“a portion of executable code that has been removed and
`stored separately from the other portions of the
`executable code of the software application”
`
`1. “personalization information”
`
`The phrase “personalization information” should be construed for purposes of
`
`this IPR as “information that uniquely identifies the user, including a license code.”
`
`A POSA would understand “personalization information” to have this construction
`
`based on the plain language of the claim itself in view of the specification of the ’602
`
`Patent and the prosecution history. See Ex[1002] ¶¶ 58-60.
`
`18
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`The claims recite the limitation of “said application software in said computer
`
`prompting a user to enter into said computer personalization information” and the
`
`limitation of “a license code entered in response to said prompting.” Ex[1001]
`
`claim 1, claim 10. Thus, the claim language itself makes clear that personalization
`
`information is obtained from a user in response to prompting by the software and
`
`includes at least a license code. The specification of the ’602 Patent does not
`
`explain the meaning of “personalization information” other than to state that it
`
`includes “the license code” and “can include a particular computer configuration.”
`
`Ex[1001] 13:60-63.
`
`In addition, Patent Owner has accused a “user’s zip code and [] Account
`
`Number” as corresponding to the claimed personalization information. See
`
`Ex[1009] ¶ 149. Thus, if Patent Owner’s accusations are viable, the claimed
`
`“personalization information” should also encompass a user’s zip code and account
`
`number that are obtained from the user.
`
`2. “license code”
`
`The phrase “license code” as used in claims 1 and 10 of the ’602 Patent should
`
`be construed for purposes of this IPR as “a code required to be entered into the
`
`software application to activate the application, to enable the application to provide
`
`its specified functionality.” A POSA would understand “license code” to have this
`
`construction based on the plain language of the claim itself in view of the
`
`19
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 9,021,602
`
`specification of the ’602 Patent and the prosecution history. See Ex[1002] ¶¶ 61-
`
`62.
`
`Claims 1 and 10 of the ’602 Patent include the limitation of “wherein said
`
`application software, in said computer, cannot access at least one encoded code
`
`resource of said application software, unless said license code is stored in said
`
`personalization data resource.” Ex[1001] claim 1, claim 10. Thus, the claim
`
`language itself makes clear that at least a pa

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket