`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`DISH NETWORK L.L.C.,
`Petitioner,
`
`v.
`
`WISTARIA TRADING LTD.,
`Patent Owner
`
`
`
`
`IPR2019-01449
`PATENT 9,021,602
`
`
`
`
`
`
`
`
`
`
`
`
`PATENT OWNER PRELIMINARY RESPONSE TO PETITION
`PURSUANT TO 37 C.F.R. § 42.107(a)
`
`
`
`
`
`
`
`
`
`
`
`
`Table of Contents
`
`IPR2019-01449
`U.S. Patent 9,021,602
`
`
`I.
`II.
`
`1
`INTRODUCTION
`1
`THE ’602 PATENT
`1
`A. Overview of the ’602 Patent
`2
`B.
`Person of Ordinary Skill in the Art
` 2
`
`
`
`
`C.
`Claim Construction
`
`
`
`III. THE PETITION SHOULD BE DENIED BECAUSE PETITIONER HAS
`FAILED TO MEET ITS BURDEN
`IV. CONCLUSION
`
`
`
`6
`21
`
`ii
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`
`Table of Authorities
`
`Cases
`
`In re NuVasive, Inc., 841 F.3d 966 (Fed. Cir. 2016) ................................................. 7
`
`Statutes
`
`35 U.S.C. § 103 .......................................................................................................... 7
`
`35 U.S.C. § 316(e) ..................................................................................................... 6
`
`
`
`iii
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`
`Table of Exhibits
`
`1006
`
`1007
`
`1008
`1009
`
`Exhibit Description
`1001
`United States Patent No. 9,021,602 to Moskowitz et al. (“’602 Patent)
`1002
`Declaration of Dr. Vijay K. Madisetti
`1003
`Curriculum Vitae of Dr. Vijay K. Madisetti
`1004
`File History for United States Patent No. 9,021,602
`1005
`File History for Reexamination Request No. 90/014,137 of United
`States Patent No. 9,021,602
`File History for United States Patent No. 9,104,842 (“parent ’842
`Patent”)
`File History for Reexamination Request No. 90/014,138 of United
`States Patent No. 9,104,842
`United States Patent No. 5,757,907 to Cooper et al. (“Cooper”)
`First Amended Complaint for Patent Infringement, Blue Spike LLC v.
`DISH Network Corporation, Civil Action No. 1:19-cv-00160-LPS-
`CJB (filed Mar. 29, 2019) (“District Court Litigation”)
`Complaint, Blue Spike LLC v. DISH Network Corporation et al., Nos.
`6:18-CV-00333-RWS-KNM (E.D. Tex.), 1:18-CV-01512-LPS-CJB
`(D. Del.) (the “Prior Litigation”)
`Order Granting Joint Motion to Transfer to the District of Delaware
`and Stay All Deadlines, 6:18-CV-00333-RWS-KNM, ECF No. 19,
`entered in Prior District Court Litigation
`Notice of Voluntary Dismissal Without Prejudice, served in Prior
`District Court Litigation
`File History for United States Patent No. 6,598,162
`Software Authorization Systems, Paul A. Suhler et al., IEEE Software
`(1986).
`Designing Software to be Used Up and Protecting it from Pirates,
`Bryon K. Ehlmann, ACM SIGSMALL/PC Notes, vol. 11, issue 3
`(Aug. 1985)
`
`1010
`
`1011
`
`1012
`
`1013
`1014
`
`1015
`
`
`
`iv
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`
`I.
`
`INTRODUCTION
`
`Patent Owner Wistaria Trading Ltd. submits this Preliminary Response to
`
`the Petition for Inter Partes Review of United States Patent No. 9,021,602 (“the
`
`’602 Patent”) filed by Petitioner DISH Network L.L.C. (“Petitioner”) (the
`
`“Petition” or “Pet.”).
`
`The Board should dismiss the Petition in its entirety at least because, as
`
`Patent Owner shows below, dispositive claim elements are entirely missing from
`
`the combination of references asserted in each of the Grounds of the Petition.
`
`II. THE ’602 PATENT
`
`
`A. Overview of the ’602 Patent
`
`The ’602 Patent is titled “DATA PROTECTION METHOD AND
`
`DEVICE.” The ʼ602 Patent describes an “apparatus and method for encoding and
`
`decoding additional information into a digital information in an integral manner.
`
`More particularly, the invention relates to a method and device for data
`
`protection.” EX1001, Abstract. The apparatus and method stores application
`
`software in non-transient memory of a computer. The application software stores,
`
`in a personalization data resource, computer configuration information of a
`
`computer as well as a license code entered as a result of prompting the user of the
`
`computer. EX1001, 16:3–13. The application software then generates a proper
`
`1
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`decoding key using the license code. Id. at 16:14–16. The application software
`
`cannot access at least one encoded code resource of the application software unless
`
`the license code is stored in the personalization data resource. Id. at 17–20.
`
`B.
`
`Person of Ordinary Skill in the Art
`
`Petitioner submits that a person of ordinary skill in the art (“POSA”) would
`
`have “a bachelor’s degree in computer science, electrical engineering, or a related
`
`technology field, and at least two to three years of experience related to secure
`
`distribution of digitized information or a related technology field, such as data
`
`integrity and security. Alternatively, a POSA in the relevant timeframe would have
`
`an advanced degree, such as a master’s degree, in computer science, electrical
`
`engineering, or a related technology field, and at least one year of experience
`
`related to secure distribution of digitized information or a related technology field,
`
`such as data integrity and security. A person with less education but more relevant
`
`practical experience, or more relevant education but less practical experience, may
`
`also qualify as a POSA.” Pet. at 17–18. For the purposes of determining whether
`
`to institute the Petition, Patent Owner does not dispute Petitioner’s characterization
`
`of the level of ordinary skill in the art, as it is not dispositive.
`
`C. Claim Construction
`
`i.
`
`“Personalization Information”
`
`
`
`2
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`To the extent that “personalization information” is not expressly defined in
`
`the ’602 Patent, Patent Owner submits that the term “personalization information”
`
`should be interpreted under its plain and ordinary meaning.
`
`Petitioner argues that “personalization information” should be construed as
`
`“information that uniquely identifies the user, including a license code.” Pet. at
`
`18. Patent Owner respectfully submits that Petitioner’s proposed construction is
`
`unnecessary and not commensurate with the scope of the challenged claims.
`
`Specifically, challenged independent claim 1 recites “prompting a user to enter into
`
`said computer personalization information,” as well as “said application software
`
`storing . . . a license code entered in response to said prompting.” EX1001 at 16:7–
`
`13. Thus, challenged independent claim 1 recites two separate claim elements—
`
`“personalization information” and “a license code.” Petitioner’s proposed claim
`
`construction attempts to improperly conflate these two elements, thus reading out
`
`the “license code” limitation. Challenged independent claim 10 recites similar
`
`limitations. Id. at 16:47–55. For at least these reasons, Petitioner’s proposed
`
`construction is improper and the Board should therefore reject Petitioner’s
`
`proposed construction.
`
`ii.
`
`“License Code”
`
`
`3
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`To the extent that “license code” is not expressly defined in the ’602 Patent,
`
`Patent Owner submits that the term “license code” should be interpreted under its
`
`plain and ordinary meaning.
`
`Petitioner argues that “license code” should be construed as “a code required
`
`to be entered into the software application to activate the application, to enable the
`
`application to provide its specified functionality.” Pet. at 18. Patent Owner
`
`respectfully submits that Petitioner’s proposed construction impermissibly limits
`
`the plain and ordinary meaning of a “license code.” For example, Petitioner’s
`
`proposed construction would exclude examples from Petitioner’s own cited art,
`
`which does not limit “specified functionality,” but rather limits the amount of time
`
`for which a user may have access to all functionality of a software application.
`
`See, e.g., EX1008 at 8:39–43. Petitioner’s proposed construction would also
`
`exclude situations in which a license is required to obtain support for a software
`
`application rather than to enable specific functionality. For at least these reasons,
`
`Petitioner’s proposed construction is improper and the Board should therefore
`
`reject Petitioner’s proposed construction.
`
`iii.
`
`“Personalization Data Resource”
`
`To the extent that “personalization data resource” is not expressly defined in
`
`the ’602 Patent, Patent Owner submits that the term “personalization data
`
`resource” should be interpreted under its plain and ordinary meaning.
`
`4
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`Petitioner argues that “personalization data resource” should be construed as
`
`a “non executable file that stores personalization information.” Pet. at 18. Patent
`
`Owner respectfully submits that Petitioner’s proposed construction unnecessarily
`
`limits the plain and ordinary meaning of “personalization data resource.” For
`
`example, Petitioner’s construction unnecessarily limits “personalization data
`
`resource” to a single “file,” rather than any appropriate data structure. Further,
`
`Petitioner’s construction unnecessarily limits a personalization data resource to
`
`storing only personalization information. For at least these reasons, Petitioner’s
`
`proposed construction is improper and the Board should therefore reject
`
`Petitioner’s proposed construction.
`
`iv.
`
`“Encoded Code Resource of Said Software Application”
`
`To the extent that “encoded code resource of said software application” is
`
`not expressly defined in the ’602 Patent, Patent Owner submits that the term
`
`“encoded code resource of said software application” should be interpreted under
`
`its plain and ordinary meaning.
`
`Petitioner argues that “encoded code resource of said software application”
`
`should be construed as a “portion of executable code that has been removed and
`
`stored separately from the other portions of the executable code of the software
`
`application.” Pet. at 18. Patent Owner respectfully submits that Petitioner’s
`
`5
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`proposed construction unnecessarily limits the plain and ordinary meaning of
`
`“encoded code resource of said software application.”
`
`For example, Petitioner’s construction unnecessarily requires the encoded
`
`code resource to be “removed and stored separately from the other portions of the
`
`executable code of the software application.” Id. at 18, 23–25. Petitioner argues
`
`that an “encoded code resource” must necessarily be “removed and stored
`
`separately” because the specification of the ʼ602 Patent states that “essential code
`
`resources” may be “stored as encoded information in data resources.” Id. at 24
`
`(citing EX1001 at 13:14–20). Nothing in Petitioner’s cited portions of the ʼ602
`
`Patent, however, requires that any “code resource” be removed. “Necessary ‘parts’
`
`or code ‘resources’” may be hidden in “digitized sample resources,” EX1001 at
`
`12:26–28, but the ʼ602 Patent does not disclose that any portion of an application
`
`be removed. Petitioner’s proposed construction, therefore, adds unnecessary
`
`limitations that are inconsistent with the plain and ordinary meaning of the claim
`
`language.
`
`For at least these reasons, Petitioner’s proposed construction is improper and
`
`the Board should therefore reject Petitioner’s proposed construction.
`
`III. THE PETITION SHOULD BE DENIED BECAUSE PETITIONER
`HAS FAILED TO MEET ITS BURDEN
`
`
`
`Petitioner has the burden to show that the challenged claims are
`
`unpatentable. 35 U.S.C. § 316(e). When a Petitioner argues that a claim is
`
`6
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`unpatentable as obvious under 35 U.S.C. § 103, the Petitioner must show that each
`
`and every element of the challenged claims is rendered obvious by the combination
`
`of Petitioner’s cited art. The Board may not craft new grounds of unpatentability
`
`not advanced by the petitioner. In re NuVasive, Inc., 841 F.3d 966, 971–72 (Fed.
`
`Cir. 2016).
`
`Petitioner challenges independent claims 1 and 10 of the ’602 Patent and
`
`dependent claims 5 and 8 of the ’602 Patent as being obvious over U.S. Pat. No.
`
`5,757,907 to Cooper et al. (“Cooper”). See Pet. at 25. Petitioner has failed to meet
`
`its burden to demonstrate that the challenged independent claims (i.e., claims 1 and
`
`10) are obvious under 35 U.S.C. § 103.
`
`A. Petitioner Relies on Improper Claim Constructions Throughout the
`Petition and the Petitioner Should Therefore Be Dismissed
`
`Petitioner proposed claim constructions for four terms that are present in
`
`both independent claims 1 and 10 of the ʼ602 Patent. As detailed in Section II
`
`above, all of Petitioner’s proposed constructions improperly attempt to add
`
`unnecessary limitations that are inconsistent with the plain and ordinary meaning
`
`of the claims when read in light of the specification as a whole.
`
`Throughout the Petition, Petitioner relies on its improper construction. For
`
`example, Petitioner relies on its improper constructions for the argument that
`
`Cooper discloses “personalization information,” Pet. at 34–42, “personalization
`
`7
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`data resource,” id. at 42–49, “license code,” id. at 50–53, and “encoded code
`
`resource of said software application,” id. at 54–63. All of Petitioner’s arguments
`
`rely on Petitioner’s faulty, improper constructions. For at least this reason,
`
`Petitioner has failed to meet its burden and the Board should reject the Petition.
`
`B. Petitioner Fails to Provide a Prima Facie Case of Obviousness With
`Respect to Independent Claims 1 and 10 and the Petition Should Therefore Be
`Dismissed
`
`Patent Owner respectfully submits that an inter partes review of the ’602
`
`Patent should not be instituted because Cooper, whether alone or in combination
`
`with the knowledge of one of ordinary skill in the art, fails to disclose or suggest
`
`each and every element of independent claims 1 and 10 of the ’602 Patent.
`
`Therefore, there is no likelihood that independent claim 1 of the ’602 Patent is
`
`obvious over Cooper. Claim 1 of the ’602 Patent recites (emphasis added for
`
`missing element):
`
`1. A computer based method for accessing functionality provided by an application
`software comprising:
`storing said application software in non transient memory of a computer;
`said application software in said computer prompting a user to enter into
`said computer personalization information;
`said application software storing, in said non transient memory, in a
`personalization data resource, both computer configuration information
`of said computer, and a license code entered in response to said
`prompting;
`
`8
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`said application software in said computer generating a proper decoding
`key, said generating comprising using said license code; and
`wherein said application software, in said computer, cannot access at least
`one encoded code resource of said application software, unless said
`license code is stored in said personalization data resource.
`EX1001, 16:2–20.
`
`Cooper, alone or in combination with the knowledge of one of ordinary skill
`
`in the art, fails to disclose or suggest at least: (1) said application software storing,
`
`in said non transient memory, in a personalization data resource, computer
`
`configuration information of said computer, and (2) wherein said application
`
`software, in said computer, cannot access at least one encoded code resource of
`
`said application software, unless said license code is stored in said personalization
`
`data resource, as recited in challenged independent claim 1. Challenged
`
`independent claim 10 recites similar elements. EX1001 at 16: 46–62.
`
`Cooper Fails To Disclose Storing Computer Configuration Information, As
`Recited by Independent Claims 1 and 10
`
`Independent claim 1 recites “said application software storing, in said non
`
`transient memory, in a personalization data resource, both computer configuration
`
`information of said computer, and a license code entered in response to said
`
`prompting.” EX1001, 16:10–13 (emphasis added). Patent Owner respectfully
`
`submits that Cooper does not disclose application software storing computer
`
`configuration information of said computer, as recited by independent claim 1.
`
`9
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`Petitioner argues that Cooper discloses this limitation, stating Cooper’s
`
`“machine identification corresponds to the claimed ‘computer configuration
`
`information’ at least because the machine identification is based on the
`
`configuration of the user’s computer.” Pet. at 44–45 (citing EX1002, ¶ 113).
`
`Petitioner’s argument fails at least because (1) a “machine identification” is not
`
`“computer configuration information,” and (2) any computer configuration
`
`information included in a “machine identification” is not stored by the application
`
`software, as recited by independent claim 1.
`
`First, a “machine identification” is not “computer configuration
`
`information.” Cooper itself distinguishes “machine identification” and
`
`“configuration information” by the explicit terms Petitioner relies on: “The user-
`
`specific attributes of the data processing system are derived in step 353, and
`
`provided as an input to machine identification 355, which is preferably a random
`
`number generator which receives a plurality of binary characters as an input, and
`
`generates a pseudo-random output which is representative of machine
`
`identification 357.” EX1008, 14:37–45 (emphasis added). Thus, the “attributes of
`
`the data processing system” are not equivalent to the machine identification.
`
`Further, according to Cooper, there is no way to reverse the process, i.e.,
`
`there is no way to regain the “attributes of the data processing system” from the
`
`machine identification. The attributes are subjected to a random number generator,
`
`10
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`which supplies a “pseudo-random output.” Cooper discloses no way to re-generate
`
`the “attributes of the data processing system” from the “machine identification.”
`
`Cooper’s “machine identification,” therefore, provides no information about the
`
`machine itself other than a pseudo-random identification number. There is no
`
`information in this number about the configuration of the computer.
`
`Second, Petitioner provides no evidence that any of Cooper’s “attributes of
`
`the data processing system” are stored by the application software in a
`
`personalization data resource. Petitioner argues explicitly that Cooper discloses
`
`the claimed “personalization data resource” through Cooper’s “Key File.” Pet. at
`
`42–43. Cooper’s “Key File” includes four pieces of data: the product key, the
`
`customer key, the clear machine ID, and the trial interval data. E.g., EX1008, FIG.
`
`18. None of these pieces of data correspond to Cooper’s “attributes of the data
`
`processing system.”
`
`Petitioner’s only argument that “computer configuration information” is
`
`stored in the “personalization data resource” is that the “Key File” includes the
`
`“machine identification.” E.g., Pet .at 44. As detailed above, however, the only
`
`“configuration information” in the “machine identification” is a randomized series
`
`of bits sourced from “attributes of the data processing system.” EX1008, 14:37–
`
`45. Cooper does not teach or disclose that computer configuration information is
`
`stored in any personalization data resource.
`
`11
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`For at least these reasons, Cooper fails to disclose “said application software
`
`storing, in said non transient memory, in a personalization data resource, []
`
`computer configuration information of said computer,” as recited in independent
`
`claim 1. EX1001, 16:9–12. For analogous reasons, Cooper fails to disclose “said
`
`application software code storing, in said non transient memory, in a
`
`personalization data resource, [] computer configuration information of said
`
`computer system,” as recited in independent claim 10. Id. at 16:51–55; see also
`
`Pet. at 75.
`
`Therefore, Petitioner fails to establish a prima facie case of obviousness that
`
`independent claims 1 and 10 are obvious over Cooper, whether alone or in
`
`combination with the knowledge of one of ordinary skill in the art. As claims 5
`
`and 8 depend from independent claim 1, Petitioner also fails to establish a prima
`
`facie case of obviousness that claims 5 and 8 are obvious over Cooper, whether
`
`alone or in combination with the knowledge of one of ordinary skill in the art. The
`
`Board should, therefore, dismiss the Petition.
`
`Cooper Fails To Disclose Application Software, As Recited by Independent
`Claims 1 and 10
`
`According to Petitioner, the “trial mode application including the file
`
`management program and a software object disclosed in Cooper corresponds to the
`
`claimed application software.” Pet. at 31. Petitioner’s argument fails at least
`
`because (1) Cooper’s file management program is part of the operating system, not
`
`12
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`application software; and (2) such a combination would be contrary to the plain
`
`language of the ʼ602 Patent.
`
`First, the ʼ602 Patent describes “applications” as expressly distinct from the
`
`operating system. For example, the ʼ602 Patent describes an “executable computer
`
`program is variously referred to as an application, from the point of view of a user,
`
`or executable object code from the point of view of the engineer. A collection of
`
`smaller, atomic (or indivisible) chunks of object code typically comprise the
`
`complete executable object code or application which may also require the present
`
`of certain data resources.” EX1001, 11, 17–23 (emphasis added). The ʼ602 Patent
`
`goes on to state that these “data resources” are separate and apart from the
`
`operating system: “When a program is compiled, then, it consists of a collection of
`
`these sub-objects . . . Some systems may prefix information to the entry point [in
`
`memory of a function or procedure] to the entry point which describes calling
`
`return conventions for the code which follows, an example is the Apple Macintosh
`
`Operating System (MacOS). These sub-objects can be packages into what are
`
`referred to in certain systems as ‘code resources,’ which may be stored separately
`
`from the application, or shared with other applications, although not necessarily.”
`
`Id. at 11:51–66; see also id. at 14:65–15:4 (“Once the code resources of a program
`
`are loaded into memory, they typically remain in a fixed position, unless the
`
`computer operating system finds it necessary to rearrange certain portions of
`
`13
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`memory during ‘system time,’ when the operating system code, not application
`
`code, is running.”). Thus, the ʼ602 Patent makes a clear delineation between
`
`“application software” and the operating system.
`
`In Cooper, the “file management program” on which Petitioner relies so
`
`heavily, is part of the operating system. EX1008, 8:23–25 (“The file management
`
`program is resident in the user-controlled data processing system and becomes a
`
`part of the operating system in the user’s computer.”). Thus, the “file
`
`management program” cannot be properly equated with any portion of the claimed
`
`“application software” of the ʼ602 Patent. Petitioner attempts to salvage its
`
`argument by noting that Cooper discloses that “‘the products being previewed
`
`during the trial interval of operation can only be run from within a customer shell,’
`
`such as the file management program.” Pet. at 30 (citing EX1008, 12:15–17).
`
`Petitioner’s argument only states what Cooper already acknowledges—that an
`
`operating system of some sort is necessary to access software applications. The
`
`fact that a trial application of a word processing program can only be accessed
`
`from within a computer’s operating system only serves to show the very basic fact
`
`that the word processing program is software, not that the operating system itself
`
`should be deemed a part of that software.
`
`Further, Petitioner attempts to justify its position by noting that “Cooper’s
`
`trial mode application is consistent with the description of an ‘application’
`
`14
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`provided in the specification of the ʼ602 Patent, which describes an ‘application’ as
`
`including multiple components.” Pet. at 30 (citing EX1001, 11:19–23). Petitioner
`
`cites to the portion of the ʼ602 Patent cited above, which notes that, while an
`
`application may indeed include multiple components, all of those components are
`
`distinct and apart from the operating system. Petitioner’s argument therefore fails
`
`to establish that Cooper’s underlying “file management program,” which is part of
`
`the operating system, can be properly equated with the claimed “application
`
`software.”
`
`For at least these reasons, Petitions has failed to establish that Cooper
`
`discloses the “application software” recited by challenged claims 1, 5, 8, and 10.
`
`Therefore, Petitioner has failed to establish a prima facie case of obviousness for
`
`challenged claims 1, 5, 8, and 10, and the Board should dismiss the Petition.
`
`Cooper Fails To Disclose An Encoded Code Resource That Cannot Be
`Accessed By Said Application Software Unless Said License Code Is Stored In
`Said Personalization Data Resource, As Recited by Independent Claims 1 and 10
`
`Independent claim 1 recites “wherein said application software, in said
`
`computer, cannot access at least one encoded code resource of said application
`
`software, unless said license code is stored in said personalization data
`
`resource.” EX1001, 16:17–20 (emphasis added). As detailed in Sections II and
`
`III.A above, Petitioner relies on faulty, improper claim constructions to argue that
`
`Cooper discloses this element of challenged independent claims 1 and 10. As
`
`15
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`detailed directly above, Petitioner fails to establish that Cooper discloses the
`
`recited “application software” of challenged independent claims 1 and 10. Even
`
`under Petitioner’s improper constructions and Petitioner’s flawed arguments,
`
`however, Petitioner still has not shown how Cooper discloses the claimed
`
`“encoded code resource of said application software.”
`
`Petitioner argues that a portion of Cooper’s “encrypted software program
`
`that has been displaced, substituted, and stored in another location in a separate
`
`side file” discloses the claimed “encoded code resource.” Pet. at 55. According to
`
`Petitioner, Cooper discloses a process whereby “a ‘first portion of the encrypted
`
`software product’ that ‘ordinarily would comprise part of the encrypted software
`
`product’ is ‘substituted’ out and an ‘encryption header’ is ‘provided in [its] place.’”
`
`Id. (citing EX1008, 16:47–49, 17:13–25). Petitioner then argues at length about
`
`Cooper’s disclosure of the process whereby the encryption header is removed
`
`from, and reattached to, an encrypted software file. E.g., Pet. at 56–58.
`
`Petitioner’s argument, however, is incorrect at least because Petitioner’s
`
`argument relies on inaccessible, encrypted software that cannot meet the other
`
`elements of independent claims 1 and 10.
`
`The claimed “encoded code resource” is “of said application software.”
`
`Independent claim 1 also recites that the application software generates “a proper
`
`decoding key, said generating comprising using said license code.” The
`
`16
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`“application software,” therefore, has access to “said license code.” According to
`
`independent claim 1, the application software “cannot access at least one encoded
`
`code resource of said application software, unless said license code is stored in said
`
`personalization resource.” The “application software,” therefore, has access to said
`
`license code, but cannot access at least one encoded code resource unless said
`
`license code is stored in said personalization resource. Cooper does not teach or
`
`disclose this limitation at least because Cooper’s “application software,” according
`
`to Petitioner, does not have access to said license code because the application
`
`software is encrypted and cannot be decrypted without the license code.
`
`According to Cooper, any key generation occurs prior to decryption. In
`
`other words, Cooper’s encrypted software cannot also generate “a proper decoding
`
`key” that is used to decrypt the software. Therefore, any encrypted software in
`
`Cooper cannot also be equated with the “application software” recited in
`
`independent claims 1 and 10. Cooper states:
`
`If the key is valid, the file management program communicates directly
`with the TSR and enables the trial mode of operation for a particular
`encrypted application. The file management program then kicks off
`the encrypted application. The code which is resident in the operating
`system of the user-controlled data processing system maintains control
`over the operating system. It monitors the use of the trial mode of
`operation keys to allow files to be decrypted and loaded into memory,
`but prevents the encrypted files from being decrypted and copied to
`
`17
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`media. This is done by using the operating system to determine which
`applications are trying to access the data and only allowing the
`application that have permission to access the data to do so.”
`EX1008, 8:43–56 (emphasis added).
`Cooper’s encrypted software does not decrypt itself. According to Cooper,
`
`the operating system is responsible for determining whether or not to decrypt files
`
`based on whether a valid key is present. Id. Only when a valid key is present does
`
`the operating system “determine which applications are trying to access the data
`
`and only allow[s] the applications that have permission to access the data to do so.”
`
`Id.
`
`Petitioner attempts to circumvent this flaw in Cooper by arguing that some
`
`combination of the “file management program” and a “software object”
`
`collectively constitute the claimed “software application.” E.g., Pet. at 31
`
`(“Therefore, the trial mode application including the file management program and
`
`a software object disclosed in Cooper corresponds to the claimed application
`
`software.”). Leaving aside whether the “file management program”—which is part
`
`of the operating system—can properly be equated with the claimed “software
`
`application,” Petitioner includes the “software object” as part of the claimed
`
`“software application” only in an attempt to shoehorn the claimed “encoded code
`
`resource” into Cooper.
`
`18
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`Cooper discloses an operating system that determines whether a valid key
`
`exists prior to activating a software program. If the key exists, then the operating
`
`system may decrypt the software program to make it available to the user. E.g.,
`
`EX1008, 8:43–56. The operating system does all of the work; the “software
`
`object” exists simply to be decrypted. As detailed above, the combination of an
`
`operating system feature and a word processing program cannot be properly
`
`equated with the claimed “application software.” However, even if this were
`
`allowed, Petition still has not met its burden. Petitioner does not specifically point
`
`to which version of the “software object” discloses the claimed “application
`
`software.” The software object is encrypted until after the operating system
`
`determines that a valid key is present. Petitioner does not make clear whether (1)
`
`the combination of the “file management program” and the encrypted software
`
`object or (2) the combination of the “file management program” and the decrypted
`
`software object are intended to disclose the claimed “application software.” If the
`
`former, then Petitioner does not explain how the encrypted software object aids is
`
`storing a license code in a personalization data resource. If the latter, then
`
`Petitioner does not explain how the decrypted software object includes the recited
`
`“at least one encode code resource.” Petitioner cannot have it both ways.
`
`As detailed above, Petitioner has not met its burden to show how Cooper
`
`discloses or suggests “wherein said application software, in said computer, cannot
`
`19
`
`
`
`IPR2019-01449
`U.S. Patent 9,021,602
`access at least one encoded code resource of said application software, unless said
`
`license code is stored in said personalization data resource,” as recited in
`
`independent claim 1. Petitioner has, there