throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`DISH NETWORK L.L.C.,
`Petitioner,
`
`v.
`
`WISTARIA TRADING LTD.,
`Patent Owner
`
`
`
`
`IPR2019-01449
`PATENT 9,021,602
`
`
`
`
`
`
`
`
`
`
`
`
`PATENT OWNER PRELIMINARY RESPONSE TO PETITION
`PURSUANT TO 37 C.F.R. § 42.107(a)
`
`
`
`
`
`
`
`
`

`

`
`
`Table of Contents
`
`IPR2019-01449
`U.S. Patent 9,021,602
`
`
`I.
`II.
`
`1
`INTRODUCTION
`1
`THE ’602 PATENT
`1
`A. Overview of the ’602 Patent
`2
`B.
`Person of Ordinary Skill in the Art
` 2
`
`
`
`
`C.
`Claim Construction
`
`
`
`III. THE PETITION SHOULD BE DENIED BECAUSE PETITIONER HAS
`FAILED TO MEET ITS BURDEN
`IV. CONCLUSION
`
`
`
`6
`21
`
`ii
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`
`Table of Authorities
`
`Cases
`
`In re NuVasive, Inc., 841 F.3d 966 (Fed. Cir. 2016) ................................................. 7
`
`Statutes
`
`35 U.S.C. § 103 .......................................................................................................... 7
`
`35 U.S.C. § 316(e) ..................................................................................................... 6
`
`
`
`iii
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`
`Table of Exhibits
`
`1006
`
`1007
`
`1008
`1009
`
`Exhibit Description
`1001
`United States Patent No. 9,021,602 to Moskowitz et al. (“’602 Patent)
`1002
`Declaration of Dr. Vijay K. Madisetti
`1003
`Curriculum Vitae of Dr. Vijay K. Madisetti
`1004
`File History for United States Patent No. 9,021,602
`1005
`File History for Reexamination Request No. 90/014,137 of United
`States Patent No. 9,021,602
`File History for United States Patent No. 9,104,842 (“parent ’842
`Patent”)
`File History for Reexamination Request No. 90/014,138 of United
`States Patent No. 9,104,842
`United States Patent No. 5,757,907 to Cooper et al. (“Cooper”)
`First Amended Complaint for Patent Infringement, Blue Spike LLC v.
`DISH Network Corporation, Civil Action No. 1:19-cv-00160-LPS-
`CJB (filed Mar. 29, 2019) (“District Court Litigation”)
`Complaint, Blue Spike LLC v. DISH Network Corporation et al., Nos.
`6:18-CV-00333-RWS-KNM (E.D. Tex.), 1:18-CV-01512-LPS-CJB
`(D. Del.) (the “Prior Litigation”)
`Order Granting Joint Motion to Transfer to the District of Delaware
`and Stay All Deadlines, 6:18-CV-00333-RWS-KNM, ECF No. 19,
`entered in Prior District Court Litigation
`Notice of Voluntary Dismissal Without Prejudice, served in Prior
`District Court Litigation
`File History for United States Patent No. 6,598,162
`Software Authorization Systems, Paul A. Suhler et al., IEEE Software
`(1986).
`Designing Software to be Used Up and Protecting it from Pirates,
`Bryon K. Ehlmann, ACM SIGSMALL/PC Notes, vol. 11, issue 3
`(Aug. 1985)
`
`1010
`
`1011
`
`1012
`
`1013
`1014
`
`1015
`
`
`
`iv
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`
`I.
`
`INTRODUCTION
`
`Patent Owner Wistaria Trading Ltd. submits this Preliminary Response to
`
`the Petition for Inter Partes Review of United States Patent No. 9,021,602 (“the
`
`’602 Patent”) filed by Petitioner DISH Network L.L.C. (“Petitioner”) (the
`
`“Petition” or “Pet.”).
`
`The Board should dismiss the Petition in its entirety at least because, as
`
`Patent Owner shows below, dispositive claim elements are entirely missing from
`
`the combination of references asserted in each of the Grounds of the Petition.
`
`II. THE ’602 PATENT
`
`
`A. Overview of the ’602 Patent
`
`The ’602 Patent is titled “DATA PROTECTION METHOD AND
`
`DEVICE.” The ʼ602 Patent describes an “apparatus and method for encoding and
`
`decoding additional information into a digital information in an integral manner.
`
`More particularly, the invention relates to a method and device for data
`
`protection.” EX1001, Abstract. The apparatus and method stores application
`
`software in non-transient memory of a computer. The application software stores,
`
`in a personalization data resource, computer configuration information of a
`
`computer as well as a license code entered as a result of prompting the user of the
`
`computer. EX1001, 16:3–13. The application software then generates a proper
`
`1
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`decoding key using the license code. Id. at 16:14–16. The application software
`
`cannot access at least one encoded code resource of the application software unless
`
`the license code is stored in the personalization data resource. Id. at 17–20.
`
`B.
`
`Person of Ordinary Skill in the Art
`
`Petitioner submits that a person of ordinary skill in the art (“POSA”) would
`
`have “a bachelor’s degree in computer science, electrical engineering, or a related
`
`technology field, and at least two to three years of experience related to secure
`
`distribution of digitized information or a related technology field, such as data
`
`integrity and security. Alternatively, a POSA in the relevant timeframe would have
`
`an advanced degree, such as a master’s degree, in computer science, electrical
`
`engineering, or a related technology field, and at least one year of experience
`
`related to secure distribution of digitized information or a related technology field,
`
`such as data integrity and security. A person with less education but more relevant
`
`practical experience, or more relevant education but less practical experience, may
`
`also qualify as a POSA.” Pet. at 17–18. For the purposes of determining whether
`
`to institute the Petition, Patent Owner does not dispute Petitioner’s characterization
`
`of the level of ordinary skill in the art, as it is not dispositive.
`
`C. Claim Construction
`
`i.
`
`“Personalization Information”
`
`
`
`2
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`To the extent that “personalization information” is not expressly defined in
`
`the ’602 Patent, Patent Owner submits that the term “personalization information”
`
`should be interpreted under its plain and ordinary meaning.
`
`Petitioner argues that “personalization information” should be construed as
`
`“information that uniquely identifies the user, including a license code.” Pet. at
`
`18. Patent Owner respectfully submits that Petitioner’s proposed construction is
`
`unnecessary and not commensurate with the scope of the challenged claims.
`
`Specifically, challenged independent claim 1 recites “prompting a user to enter into
`
`said computer personalization information,” as well as “said application software
`
`storing . . . a license code entered in response to said prompting.” EX1001 at 16:7–
`
`13. Thus, challenged independent claim 1 recites two separate claim elements—
`
`“personalization information” and “a license code.” Petitioner’s proposed claim
`
`construction attempts to improperly conflate these two elements, thus reading out
`
`the “license code” limitation. Challenged independent claim 10 recites similar
`
`limitations. Id. at 16:47–55. For at least these reasons, Petitioner’s proposed
`
`construction is improper and the Board should therefore reject Petitioner’s
`
`proposed construction.
`
`ii.
`
`“License Code”
`
`
`3
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`To the extent that “license code” is not expressly defined in the ’602 Patent,
`
`Patent Owner submits that the term “license code” should be interpreted under its
`
`plain and ordinary meaning.
`
`Petitioner argues that “license code” should be construed as “a code required
`
`to be entered into the software application to activate the application, to enable the
`
`application to provide its specified functionality.” Pet. at 18. Patent Owner
`
`respectfully submits that Petitioner’s proposed construction impermissibly limits
`
`the plain and ordinary meaning of a “license code.” For example, Petitioner’s
`
`proposed construction would exclude examples from Petitioner’s own cited art,
`
`which does not limit “specified functionality,” but rather limits the amount of time
`
`for which a user may have access to all functionality of a software application.
`
`See, e.g., EX1008 at 8:39–43. Petitioner’s proposed construction would also
`
`exclude situations in which a license is required to obtain support for a software
`
`application rather than to enable specific functionality. For at least these reasons,
`
`Petitioner’s proposed construction is improper and the Board should therefore
`
`reject Petitioner’s proposed construction.
`
`iii.
`
`“Personalization Data Resource”
`
`To the extent that “personalization data resource” is not expressly defined in
`
`the ’602 Patent, Patent Owner submits that the term “personalization data
`
`resource” should be interpreted under its plain and ordinary meaning.
`
`4
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`Petitioner argues that “personalization data resource” should be construed as
`
`a “non executable file that stores personalization information.” Pet. at 18. Patent
`
`Owner respectfully submits that Petitioner’s proposed construction unnecessarily
`
`limits the plain and ordinary meaning of “personalization data resource.” For
`
`example, Petitioner’s construction unnecessarily limits “personalization data
`
`resource” to a single “file,” rather than any appropriate data structure. Further,
`
`Petitioner’s construction unnecessarily limits a personalization data resource to
`
`storing only personalization information. For at least these reasons, Petitioner’s
`
`proposed construction is improper and the Board should therefore reject
`
`Petitioner’s proposed construction.
`
`iv.
`
`“Encoded Code Resource of Said Software Application”
`
`To the extent that “encoded code resource of said software application” is
`
`not expressly defined in the ’602 Patent, Patent Owner submits that the term
`
`“encoded code resource of said software application” should be interpreted under
`
`its plain and ordinary meaning.
`
`Petitioner argues that “encoded code resource of said software application”
`
`should be construed as a “portion of executable code that has been removed and
`
`stored separately from the other portions of the executable code of the software
`
`application.” Pet. at 18. Patent Owner respectfully submits that Petitioner’s
`
`5
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`proposed construction unnecessarily limits the plain and ordinary meaning of
`
`“encoded code resource of said software application.”
`
`For example, Petitioner’s construction unnecessarily requires the encoded
`
`code resource to be “removed and stored separately from the other portions of the
`
`executable code of the software application.” Id. at 18, 23–25. Petitioner argues
`
`that an “encoded code resource” must necessarily be “removed and stored
`
`separately” because the specification of the ʼ602 Patent states that “essential code
`
`resources” may be “stored as encoded information in data resources.” Id. at 24
`
`(citing EX1001 at 13:14–20). Nothing in Petitioner’s cited portions of the ʼ602
`
`Patent, however, requires that any “code resource” be removed. “Necessary ‘parts’
`
`or code ‘resources’” may be hidden in “digitized sample resources,” EX1001 at
`
`12:26–28, but the ʼ602 Patent does not disclose that any portion of an application
`
`be removed. Petitioner’s proposed construction, therefore, adds unnecessary
`
`limitations that are inconsistent with the plain and ordinary meaning of the claim
`
`language.
`
`For at least these reasons, Petitioner’s proposed construction is improper and
`
`the Board should therefore reject Petitioner’s proposed construction.
`
`III. THE PETITION SHOULD BE DENIED BECAUSE PETITIONER
`HAS FAILED TO MEET ITS BURDEN
`
`
`
`Petitioner has the burden to show that the challenged claims are
`
`unpatentable. 35 U.S.C. § 316(e). When a Petitioner argues that a claim is
`
`6
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`unpatentable as obvious under 35 U.S.C. § 103, the Petitioner must show that each
`
`and every element of the challenged claims is rendered obvious by the combination
`
`of Petitioner’s cited art. The Board may not craft new grounds of unpatentability
`
`not advanced by the petitioner. In re NuVasive, Inc., 841 F.3d 966, 971–72 (Fed.
`
`Cir. 2016).
`
`Petitioner challenges independent claims 1 and 10 of the ’602 Patent and
`
`dependent claims 5 and 8 of the ’602 Patent as being obvious over U.S. Pat. No.
`
`5,757,907 to Cooper et al. (“Cooper”). See Pet. at 25. Petitioner has failed to meet
`
`its burden to demonstrate that the challenged independent claims (i.e., claims 1 and
`
`10) are obvious under 35 U.S.C. § 103.
`
`A. Petitioner Relies on Improper Claim Constructions Throughout the
`Petition and the Petitioner Should Therefore Be Dismissed
`
`Petitioner proposed claim constructions for four terms that are present in
`
`both independent claims 1 and 10 of the ʼ602 Patent. As detailed in Section II
`
`above, all of Petitioner’s proposed constructions improperly attempt to add
`
`unnecessary limitations that are inconsistent with the plain and ordinary meaning
`
`of the claims when read in light of the specification as a whole.
`
`Throughout the Petition, Petitioner relies on its improper construction. For
`
`example, Petitioner relies on its improper constructions for the argument that
`
`Cooper discloses “personalization information,” Pet. at 34–42, “personalization
`
`7
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`data resource,” id. at 42–49, “license code,” id. at 50–53, and “encoded code
`
`resource of said software application,” id. at 54–63. All of Petitioner’s arguments
`
`rely on Petitioner’s faulty, improper constructions. For at least this reason,
`
`Petitioner has failed to meet its burden and the Board should reject the Petition.
`
`B. Petitioner Fails to Provide a Prima Facie Case of Obviousness With
`Respect to Independent Claims 1 and 10 and the Petition Should Therefore Be
`Dismissed
`
`Patent Owner respectfully submits that an inter partes review of the ’602
`
`Patent should not be instituted because Cooper, whether alone or in combination
`
`with the knowledge of one of ordinary skill in the art, fails to disclose or suggest
`
`each and every element of independent claims 1 and 10 of the ’602 Patent.
`
`Therefore, there is no likelihood that independent claim 1 of the ’602 Patent is
`
`obvious over Cooper. Claim 1 of the ’602 Patent recites (emphasis added for
`
`missing element):
`
`1. A computer based method for accessing functionality provided by an application
`software comprising:
`storing said application software in non transient memory of a computer;
`said application software in said computer prompting a user to enter into
`said computer personalization information;
`said application software storing, in said non transient memory, in a
`personalization data resource, both computer configuration information
`of said computer, and a license code entered in response to said
`prompting;
`
`8
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`said application software in said computer generating a proper decoding
`key, said generating comprising using said license code; and
`wherein said application software, in said computer, cannot access at least
`one encoded code resource of said application software, unless said
`license code is stored in said personalization data resource.
`EX1001, 16:2–20.
`
`Cooper, alone or in combination with the knowledge of one of ordinary skill
`
`in the art, fails to disclose or suggest at least: (1) said application software storing,
`
`in said non transient memory, in a personalization data resource, computer
`
`configuration information of said computer, and (2) wherein said application
`
`software, in said computer, cannot access at least one encoded code resource of
`
`said application software, unless said license code is stored in said personalization
`
`data resource, as recited in challenged independent claim 1. Challenged
`
`independent claim 10 recites similar elements. EX1001 at 16: 46–62.
`
`Cooper Fails To Disclose Storing Computer Configuration Information, As
`Recited by Independent Claims 1 and 10
`
`Independent claim 1 recites “said application software storing, in said non
`
`transient memory, in a personalization data resource, both computer configuration
`
`information of said computer, and a license code entered in response to said
`
`prompting.” EX1001, 16:10–13 (emphasis added). Patent Owner respectfully
`
`submits that Cooper does not disclose application software storing computer
`
`configuration information of said computer, as recited by independent claim 1.
`
`9
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`Petitioner argues that Cooper discloses this limitation, stating Cooper’s
`
`“machine identification corresponds to the claimed ‘computer configuration
`
`information’ at least because the machine identification is based on the
`
`configuration of the user’s computer.” Pet. at 44–45 (citing EX1002, ¶ 113).
`
`Petitioner’s argument fails at least because (1) a “machine identification” is not
`
`“computer configuration information,” and (2) any computer configuration
`
`information included in a “machine identification” is not stored by the application
`
`software, as recited by independent claim 1.
`
`First, a “machine identification” is not “computer configuration
`
`information.” Cooper itself distinguishes “machine identification” and
`
`“configuration information” by the explicit terms Petitioner relies on: “The user-
`
`specific attributes of the data processing system are derived in step 353, and
`
`provided as an input to machine identification 355, which is preferably a random
`
`number generator which receives a plurality of binary characters as an input, and
`
`generates a pseudo-random output which is representative of machine
`
`identification 357.” EX1008, 14:37–45 (emphasis added). Thus, the “attributes of
`
`the data processing system” are not equivalent to the machine identification.
`
`Further, according to Cooper, there is no way to reverse the process, i.e.,
`
`there is no way to regain the “attributes of the data processing system” from the
`
`machine identification. The attributes are subjected to a random number generator,
`
`10
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`which supplies a “pseudo-random output.” Cooper discloses no way to re-generate
`
`the “attributes of the data processing system” from the “machine identification.”
`
`Cooper’s “machine identification,” therefore, provides no information about the
`
`machine itself other than a pseudo-random identification number. There is no
`
`information in this number about the configuration of the computer.
`
`Second, Petitioner provides no evidence that any of Cooper’s “attributes of
`
`the data processing system” are stored by the application software in a
`
`personalization data resource. Petitioner argues explicitly that Cooper discloses
`
`the claimed “personalization data resource” through Cooper’s “Key File.” Pet. at
`
`42–43. Cooper’s “Key File” includes four pieces of data: the product key, the
`
`customer key, the clear machine ID, and the trial interval data. E.g., EX1008, FIG.
`
`18. None of these pieces of data correspond to Cooper’s “attributes of the data
`
`processing system.”
`
`Petitioner’s only argument that “computer configuration information” is
`
`stored in the “personalization data resource” is that the “Key File” includes the
`
`“machine identification.” E.g., Pet .at 44. As detailed above, however, the only
`
`“configuration information” in the “machine identification” is a randomized series
`
`of bits sourced from “attributes of the data processing system.” EX1008, 14:37–
`
`45. Cooper does not teach or disclose that computer configuration information is
`
`stored in any personalization data resource.
`
`11
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`For at least these reasons, Cooper fails to disclose “said application software
`
`storing, in said non transient memory, in a personalization data resource, []
`
`computer configuration information of said computer,” as recited in independent
`
`claim 1. EX1001, 16:9–12. For analogous reasons, Cooper fails to disclose “said
`
`application software code storing, in said non transient memory, in a
`
`personalization data resource, [] computer configuration information of said
`
`computer system,” as recited in independent claim 10. Id. at 16:51–55; see also
`
`Pet. at 75.
`
`Therefore, Petitioner fails to establish a prima facie case of obviousness that
`
`independent claims 1 and 10 are obvious over Cooper, whether alone or in
`
`combination with the knowledge of one of ordinary skill in the art. As claims 5
`
`and 8 depend from independent claim 1, Petitioner also fails to establish a prima
`
`facie case of obviousness that claims 5 and 8 are obvious over Cooper, whether
`
`alone or in combination with the knowledge of one of ordinary skill in the art. The
`
`Board should, therefore, dismiss the Petition.
`
`Cooper Fails To Disclose Application Software, As Recited by Independent
`Claims 1 and 10
`
`According to Petitioner, the “trial mode application including the file
`
`management program and a software object disclosed in Cooper corresponds to the
`
`claimed application software.” Pet. at 31. Petitioner’s argument fails at least
`
`because (1) Cooper’s file management program is part of the operating system, not
`
`12
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`application software; and (2) such a combination would be contrary to the plain
`
`language of the ʼ602 Patent.
`
`First, the ʼ602 Patent describes “applications” as expressly distinct from the
`
`operating system. For example, the ʼ602 Patent describes an “executable computer
`
`program is variously referred to as an application, from the point of view of a user,
`
`or executable object code from the point of view of the engineer. A collection of
`
`smaller, atomic (or indivisible) chunks of object code typically comprise the
`
`complete executable object code or application which may also require the present
`
`of certain data resources.” EX1001, 11, 17–23 (emphasis added). The ʼ602 Patent
`
`goes on to state that these “data resources” are separate and apart from the
`
`operating system: “When a program is compiled, then, it consists of a collection of
`
`these sub-objects . . . Some systems may prefix information to the entry point [in
`
`memory of a function or procedure] to the entry point which describes calling
`
`return conventions for the code which follows, an example is the Apple Macintosh
`
`Operating System (MacOS). These sub-objects can be packages into what are
`
`referred to in certain systems as ‘code resources,’ which may be stored separately
`
`from the application, or shared with other applications, although not necessarily.”
`
`Id. at 11:51–66; see also id. at 14:65–15:4 (“Once the code resources of a program
`
`are loaded into memory, they typically remain in a fixed position, unless the
`
`computer operating system finds it necessary to rearrange certain portions of
`
`13
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`memory during ‘system time,’ when the operating system code, not application
`
`code, is running.”). Thus, the ʼ602 Patent makes a clear delineation between
`
`“application software” and the operating system.
`
`In Cooper, the “file management program” on which Petitioner relies so
`
`heavily, is part of the operating system. EX1008, 8:23–25 (“The file management
`
`program is resident in the user-controlled data processing system and becomes a
`
`part of the operating system in the user’s computer.”). Thus, the “file
`
`management program” cannot be properly equated with any portion of the claimed
`
`“application software” of the ʼ602 Patent. Petitioner attempts to salvage its
`
`argument by noting that Cooper discloses that “‘the products being previewed
`
`during the trial interval of operation can only be run from within a customer shell,’
`
`such as the file management program.” Pet. at 30 (citing EX1008, 12:15–17).
`
`Petitioner’s argument only states what Cooper already acknowledges—that an
`
`operating system of some sort is necessary to access software applications. The
`
`fact that a trial application of a word processing program can only be accessed
`
`from within a computer’s operating system only serves to show the very basic fact
`
`that the word processing program is software, not that the operating system itself
`
`should be deemed a part of that software.
`
`Further, Petitioner attempts to justify its position by noting that “Cooper’s
`
`trial mode application is consistent with the description of an ‘application’
`
`14
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`provided in the specification of the ʼ602 Patent, which describes an ‘application’ as
`
`including multiple components.” Pet. at 30 (citing EX1001, 11:19–23). Petitioner
`
`cites to the portion of the ʼ602 Patent cited above, which notes that, while an
`
`application may indeed include multiple components, all of those components are
`
`distinct and apart from the operating system. Petitioner’s argument therefore fails
`
`to establish that Cooper’s underlying “file management program,” which is part of
`
`the operating system, can be properly equated with the claimed “application
`
`software.”
`
`For at least these reasons, Petitions has failed to establish that Cooper
`
`discloses the “application software” recited by challenged claims 1, 5, 8, and 10.
`
`Therefore, Petitioner has failed to establish a prima facie case of obviousness for
`
`challenged claims 1, 5, 8, and 10, and the Board should dismiss the Petition.
`
`Cooper Fails To Disclose An Encoded Code Resource That Cannot Be
`Accessed By Said Application Software Unless Said License Code Is Stored In
`Said Personalization Data Resource, As Recited by Independent Claims 1 and 10
`
`Independent claim 1 recites “wherein said application software, in said
`
`computer, cannot access at least one encoded code resource of said application
`
`software, unless said license code is stored in said personalization data
`
`resource.” EX1001, 16:17–20 (emphasis added). As detailed in Sections II and
`
`III.A above, Petitioner relies on faulty, improper claim constructions to argue that
`
`Cooper discloses this element of challenged independent claims 1 and 10. As
`
`15
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`detailed directly above, Petitioner fails to establish that Cooper discloses the
`
`recited “application software” of challenged independent claims 1 and 10. Even
`
`under Petitioner’s improper constructions and Petitioner’s flawed arguments,
`
`however, Petitioner still has not shown how Cooper discloses the claimed
`
`“encoded code resource of said application software.”
`
`Petitioner argues that a portion of Cooper’s “encrypted software program
`
`that has been displaced, substituted, and stored in another location in a separate
`
`side file” discloses the claimed “encoded code resource.” Pet. at 55. According to
`
`Petitioner, Cooper discloses a process whereby “a ‘first portion of the encrypted
`
`software product’ that ‘ordinarily would comprise part of the encrypted software
`
`product’ is ‘substituted’ out and an ‘encryption header’ is ‘provided in [its] place.’”
`
`Id. (citing EX1008, 16:47–49, 17:13–25). Petitioner then argues at length about
`
`Cooper’s disclosure of the process whereby the encryption header is removed
`
`from, and reattached to, an encrypted software file. E.g., Pet. at 56–58.
`
`Petitioner’s argument, however, is incorrect at least because Petitioner’s
`
`argument relies on inaccessible, encrypted software that cannot meet the other
`
`elements of independent claims 1 and 10.
`
`The claimed “encoded code resource” is “of said application software.”
`
`Independent claim 1 also recites that the application software generates “a proper
`
`decoding key, said generating comprising using said license code.” The
`
`16
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`“application software,” therefore, has access to “said license code.” According to
`
`independent claim 1, the application software “cannot access at least one encoded
`
`code resource of said application software, unless said license code is stored in said
`
`personalization resource.” The “application software,” therefore, has access to said
`
`license code, but cannot access at least one encoded code resource unless said
`
`license code is stored in said personalization resource. Cooper does not teach or
`
`disclose this limitation at least because Cooper’s “application software,” according
`
`to Petitioner, does not have access to said license code because the application
`
`software is encrypted and cannot be decrypted without the license code.
`
`According to Cooper, any key generation occurs prior to decryption. In
`
`other words, Cooper’s encrypted software cannot also generate “a proper decoding
`
`key” that is used to decrypt the software. Therefore, any encrypted software in
`
`Cooper cannot also be equated with the “application software” recited in
`
`independent claims 1 and 10. Cooper states:
`
`If the key is valid, the file management program communicates directly
`with the TSR and enables the trial mode of operation for a particular
`encrypted application. The file management program then kicks off
`the encrypted application. The code which is resident in the operating
`system of the user-controlled data processing system maintains control
`over the operating system. It monitors the use of the trial mode of
`operation keys to allow files to be decrypted and loaded into memory,
`but prevents the encrypted files from being decrypted and copied to
`
`17
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`media. This is done by using the operating system to determine which
`applications are trying to access the data and only allowing the
`application that have permission to access the data to do so.”
`EX1008, 8:43–56 (emphasis added).
`Cooper’s encrypted software does not decrypt itself. According to Cooper,
`
`the operating system is responsible for determining whether or not to decrypt files
`
`based on whether a valid key is present. Id. Only when a valid key is present does
`
`the operating system “determine which applications are trying to access the data
`
`and only allow[s] the applications that have permission to access the data to do so.”
`
`Id.
`
`Petitioner attempts to circumvent this flaw in Cooper by arguing that some
`
`combination of the “file management program” and a “software object”
`
`collectively constitute the claimed “software application.” E.g., Pet. at 31
`
`(“Therefore, the trial mode application including the file management program and
`
`a software object disclosed in Cooper corresponds to the claimed application
`
`software.”). Leaving aside whether the “file management program”—which is part
`
`of the operating system—can properly be equated with the claimed “software
`
`application,” Petitioner includes the “software object” as part of the claimed
`
`“software application” only in an attempt to shoehorn the claimed “encoded code
`
`resource” into Cooper.
`
`18
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`Cooper discloses an operating system that determines whether a valid key
`
`exists prior to activating a software program. If the key exists, then the operating
`
`system may decrypt the software program to make it available to the user. E.g.,
`
`EX1008, 8:43–56. The operating system does all of the work; the “software
`
`object” exists simply to be decrypted. As detailed above, the combination of an
`
`operating system feature and a word processing program cannot be properly
`
`equated with the claimed “application software.” However, even if this were
`
`allowed, Petition still has not met its burden. Petitioner does not specifically point
`
`to which version of the “software object” discloses the claimed “application
`
`software.” The software object is encrypted until after the operating system
`
`determines that a valid key is present. Petitioner does not make clear whether (1)
`
`the combination of the “file management program” and the encrypted software
`
`object or (2) the combination of the “file management program” and the decrypted
`
`software object are intended to disclose the claimed “application software.” If the
`
`former, then Petitioner does not explain how the encrypted software object aids is
`
`storing a license code in a personalization data resource. If the latter, then
`
`Petitioner does not explain how the decrypted software object includes the recited
`
`“at least one encode code resource.” Petitioner cannot have it both ways.
`
`As detailed above, Petitioner has not met its burden to show how Cooper
`
`discloses or suggests “wherein said application software, in said computer, cannot
`
`19
`
`

`

`IPR2019-01449
`U.S. Patent 9,021,602
`access at least one encoded code resource of said application software, unless said
`
`license code is stored in said personalization data resource,” as recited in
`
`independent claim 1. Petitioner has, there

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket