throbber

`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`FACEBOOK, INC., INSTAGRAM, LLC, and WHATSAPP INC.,
`Petitioners
`
`v.
`
`BLACKBERRY LIMITED,
`Patent Owner
`
`
`
`
`
`
`
`
`
`
`
`
`Case No. IPR2019-00923
`Patent No. 7,372,961
`
`
`
`
`
`
`
`
`
`
`
`
`DECLARATION OF MARKUS JAKOBSSON, PH.D.
`
`Page 1
`
`BLACKBERRY 2001
`FACEBOOK V. BLACKBERRY
`IPR2019-00923
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 001
`
`

`

`TABLE OF CONTENTS
`

`INTRODUCTION AND SCOPE OF WORK ................................................ 4 
`I. 
`QUALIFICATIONS ........................................................................................ 5 
`II. 
`III.  MATERIALS CONSIDERED ........................................................................ 9 
`IV.  PERSON OF ORDINARY SKILL IN THE ART ........................................ 10 
`V.  OVERVIEW OF THE ’961 PATENT .......................................................... 11 
`VI. 
`INTERPRETATION OF THE ’961 PATENT CLAIMS AT ISSUE ........... 14 
`VII.  OVERVIEW OF THE CITED REFERENCES ............................................ 16 
`A.  DSS ...................................................................................................... 16 
`B.  
`Rose ..................................................................................................... 19 
`C.   Menezes ............................................................................................... 21 
`D. 
`Schneier ............................................................................................... 23 
`VIII.  THE PETITION FAILS TO ESTABLISH THAT THE CITED
`REFERENCES WOULD HAVE PROVIDED FOR REPETITION OF THE
`REQUISITE OPERATIONS RECITED IN INDEPENDENT CLAIMS 1,
`15, AND 23 .................................................................................................... 23 
`A. 
`The ’961 Claims Require Repetition Of Operations For Both Random
`Seed Value Generation And Hashing Of The Seed Value If A
`Preceding Hashed Value Is Not Less Than Said Order Q .................. 23 
` The References Cited In Grounds 1 And 3 Do Not Disclose Repetition
`Of The Required Operations ............................................................... 26 
`C.   Grounds 2 And 4 Do Not Disclose Repetition Of The Required
`Operations ........................................................................................... 38 
`IX.  SUBSEQUENT DSS RELEASES DEMONSTRATE THAT THE
`PETITIONER’S THEORY WAS ROOTED IN HINDSIGHT, NOT THE
`REALITY AT THE TIME ............................................................................ 48 
`
`B.
`
`Page 2
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 002
`
`

`

`X. 
`
`A. 
`FIPS 186-2 (October 2001) ................................................................. 49 
`FIPS 186-3 (June 2009) ....................................................................... 51 
`B.  
`LEGAL STANDARDS ................................................................................. 55 
`A.  Obviousness ......................................................................................... 55 
`XII.  ADDITIONAL REMARKS .......................................................................... 60 
`
`
`Page 3
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 003
`
`

`

`I, Markus Jakobsson, Ph.D., of Portoloa Valley, California, declare that:
`
`I.
`
`INTRODUCTION AND SCOPE OF WORK
`1.
`I have been retained by Fish & Richardson P.C. as an expert witness
`
`on behalf of BlackBerry Limited (“Blackberry” or “Patent Owner”). I understand
`
`that Facebook, Inc., Instagram, LLC, and WhatsApp Inc. (“Petitioners”) filed a
`
`petition for inter partes review (“IPR”) of claims 1, 2, 5, 15, 16, 19, 23, 24, and 27
`
`of U.S. Patent No. 7,372,961 (“the ’961 patent”), and the case was assigned case
`
`no. IPR2019-00923.
`
`2.
`
`I have been asked to provide my independent analysis of the ’961
`
`patent in light of the materials cited below and my knowledge and experience in
`
`this field during the relevant period. I have been asked to consider what a person
`
`of ordinary skill in the art at the time of the invention of the ’961 patent (a
`
`“POSITA”; refer to ¶¶15-16) would have understood from the teachings of the
`
`’961 patent, including scientific and technical knowledge related to the ’961 patent.
`
`I have also been asked to consider whether the references cited in the petition
`
`anticipate or render obvious the inventions described by independent claims 1, 15,
`
`and 23 of the ’961 patent. I have been told that this is only a preliminary stage of
`
`this proceeding, and accordingly, I address at this stage only certain aspects of the
`
`petition and only some of my analysis of the cited grounds. I reserve the
`
`Page 4
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 004
`
`

`

`opportunity to address other issues and provide further analysis at a later date
`
`should it become necessary.
`
`3.
`
`I am being compensated according to my normal hourly rate for my
`
`time providing my independent analysis in this aforementioned IPR proceeding,
`
`but my compensation is not contingent in any way on the content of my analysis or
`
`the outcome of this proceeding. I am not, and never was, an employee or agent of
`
`BlackBerry Limited, the owner of the ’961 patent.
`
`II. QUALIFICATIONS
`4. My findings, as explained below, are informed by my studies,
`
`experiences, and background as described below and set forth in greater detail in
`
`my Curriculum Vitae (attached as Appendix A). Based on my experience, I
`
`understand and know of the capabilities of persons of ordinary skill in the field of
`
`cryptography during the timeframe leading up to the earliest priority date of
`
`the ’961 patent (December 27, 2000), and indeed, I have personal knowledge and
`
`experience in working directly with many such persons in the field during that
`
`timeframe. I have also relied on my review and analysis of the prior art cited in the
`
`petition, information provided to me in connection with this case, and information
`
`I have independently reviewed. See Section III.
`
`5.
`
`I received a Ph.D. in Computer Science/Cryptography in 1997 from
`
`the University of California San Diego and a M.Sc. in Computer Engineering in
`
`Page 5
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 005
`
`

`

`1994 from the Lund Institute of Technology, Sweden. The title of my doctoral
`
`thesis was “Privacy vs. Authenticity,” and the focus was on secure digital
`
`commerce.
`
`6.
`
`In my professional capacity, I have worked extensively with
`
`technologies related to computer security, mobile security, malware detection,
`
`quantitative and qualitative fraud analysis, and disruptive security. I have studied
`
`and published on many topics including randomness, digital signatures, and
`
`security analysis.
`
`7.
`
`I am currently the Chief of Security and Data Analytics at Amber
`
`Solutions, Inc. My work there is to develop and evaluate algorithms to process
`
`sensor outputs from distributed and mobile sensor networks, which generate
`
`predicates related to the underlying actions of users in the proximity of the sensor
`
`networks; to develop and evaluate algorithms to protect the privacy of such users;
`
`to develop and evaluate algorithms to protect the security of such users; and to
`
`develop and evaluate algorithms that assess the risk of attacks against the system. I
`
`also work as an independent security researcher and consultant in the fields of
`
`computer/mobile security, fraud detection/prevention, digital rights management,
`
`malware, phishing, crimeware, mobile malware, and cryptographic protocols. In
`
`addition, I am a visiting research fellow of the Anti-Phishing Working Group, an
`
`Page 6
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 006
`
`

`

`international consortium focused on unifying the global response to cybercrime in
`
`the public and private sectors.
`
`8.
`
`I have been materially involved in designing, developing, testing, and
`
`assessing technologies for computer and network security, digital rights
`
`management, trust establishment, randomness, cryptography, socio-technical fraud,
`
`malware detection, detection of malicious emails, user interfaces, authentication,
`
`and fraud detection for over twenty years. Between 2013 and 2015, I served as a
`
`Senior Director at Qualcomm where my work focused on mobile security systems
`
`and mobile malware detection.
`
`9.
`
`I have authored or co-authored more than 100 publications including
`
`technical papers, textbooks, textbook chapters, and articles, and have delivered
`
`numerous presentations including keynotes at several international conferences and
`
`workshops, as well as the US Patent and Trademark Office. These publications of
`
`topics including, but not limited to: digital signatures, randomness, security
`
`analysis, crimeware, phishing, electronic identity theft, email security, endpoint
`
`security, network security, digital fraud, software based attestation, remote
`
`transaction security and malware detection. My peer reviewed publications have
`
`been cited at least 14,875 times, according to Google Scholar. I hold more than
`
`100 patents.
`
`Page 7
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 007
`
`

`

`10. Examples of textbooks I have authored or co-authored on the topic of
`
`Internet security include:
`
` “Crimeware: Understanding New Attacks and Defenses” (Symantec
`Press, 2008)
` “Phishing and Countermeasures: Understanding the Increasing Problem
`of Electronic Identity Theft” (Wiley, 2006)
` “The Death of the Internet” (Wiley, 2012)
` “Mobile Authentication: Problems and Solutions” (Springer, 2012)
` “Understanding Social Engineering Based Scams” (Springer, 2016)
` “Towards Trustworthy Elections: New Directions in Electronic Voting”
`(Springer, 2010); and
` “Mobile Authentication: Problems and Solutions” (Springer, 2012)
`11.
`I have authored or provided inventive contributions to numerous
`
`publications regarding randomness and/or digital signatures. Relevant examples of
`
`such publications include:
`
` “A practical secure physical random bit generator”, CCS ’98 Proceedings
`of the 5th ACM conference on Computer and communications security
`(pp. 103-111)
` “How to turn loaded dice into fair coins”, IEEE Transactions on
`Information Theory (Vol. 46, Issue: 3, May 2000)
` U.S. Patent No. 6,317,499
`12.
`In view of the foregoing, I believe I possess the expertise to testify
`
`from the perspective of a POSITA with respect to the technology at issue in this
`
`case.
`
`Page 8
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 008
`
`

`

`III. MATERIALS CONSIDERED
`13.
`In preparing this declaration, I have considered the claims,
`
`specification, and prosecution history of the ’961 patent. I have also read and
`
`considered the petition for inter partes review in Case No. IPR2019-00923. As
`
`part of my analysis for this declaration, I have considered my own knowledge and
`
`experience, including my work and experience in the field of cryptography, and
`
`my experience in working with others in these fields. Some additional materials
`
`that I have reviewed in preparing this declaration include the following documents:
`
` Ex. 1001: U.S. Patent No. 7,372,961 (“the ’961 Patent”)
` Ex. 1002: Declaration of Jonathan Katz, Ph.D. (“Katz Declaration”)
` Ex. 1003: Prosecution History for U.S. Patent Application No.
`10/025,924 (“’961 file history”)
` Ex. 1004: Federal Information Processing (FIPS) Publication 196,
`Digital Signature Standard (“DSS”)
` Ex. 1005: Excerpts from Alfred J. Menezes et al., Handbook of
`Applied Cryptography (“Menezes”)
` Ex. 1006: USENET article by Greg Rose (“Rose”)
` Ex. 1008: Excerpts from Bruce Schneier, Applied Cryptography (2d
`ed. 1996) (“Schneier”)
` Ex. 1018: Excerpts from Thammavarapu R. N. Rao, Error Coding for
`Arithmetic Processors (1974) (“Rao”)
` EX. 1019: Excerpts from Nancy A. Floyd, Essentials of Data
`Processing (1987) (“Floyd”)
`
`Page 9
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 009
`
`

`

` Ex. 2002: FIPS PUB 186-2, Digital Signature Standard (DSS) Change
`Notice (October 5, 2001)
` Ex. 2003: FIPS PUB 186-3, Digital Signature Standard (DSS) (June
`2009)
` Ex. 2004: Corrected Final Ruling on Claim Construction/Markman
`Hearing, Blackberry Limited v. Snap Inc., Case Nos. CV 18-1844-GW
`& 18-2693-GW (C.D. Cal. April 5, 2019) (“Markman Order”)
` Ex. 2005: Serge Vaudenay, Evaluation Report on DSA (2003)
`(“Vaudenay”)
`14. Further, in addition to the exhibits listed above, I have reviewed the
`
`remaining exhibits submitted with the petition in this proceeding—including Ex.
`
`1009 through Ex. 1017 and Ex. 1020 through Ex. 1035, which were listed in the
`
`petition (at petition p. i-iv) but not expressly set forth in the listing of Grounds 1-4
`
`(at petition p. 4).
`
`IV. PERSON OF ORDINARY SKILL IN THE ART
`15.
`I understand that the teaching of the prior art is viewed through the
`
`eyes of a POSITA. My analysis is thus based on the perspective of a POSITA
`
`having this level of knowledge and skill at the relevant time of the invention. For
`
`purposes of my analysis, I have been informed that the priority date of the ’961
`
`patent is no later than the December 27, 2000 timeframe, and I have applied this
`
`timeframe as being the relevant time for the perspective of a POSITA. For
`
`purposes of assessing the level of ordinary skill in the art, I have considered the
`
`Page 10
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 010
`
`

`

`types of problems encountered in the art, the prior solutions to those problems
`
`found in prior art references, the speed with which innovations were made at that
`
`time, the sophistication of the technology, and the level of education of active
`
`workers in the field. As previously described, I have reviewed and understand the
`
`’961 patent. Based on my above-described experience, I am familiar with and
`
`know of the capabilities of a POSITA in this field during the late 1990s and early
`
`2000s.
`
`16. Based upon my knowledge and experience in this area, I believe a
`
`POSITA at the time of the invention would have had a bachelor of science degree
`
`in Computer Science or the equivalent, and approximately three years of work or
`
`research experience in the field of cryptography or an equivalent subject matter; or
`
`an advanced degree (masters or doctorate) in Computer Science or the equivalent,
`
`and less work or research experience (dependent in part on the level of degrees
`
`achieved) in the field of cryptography or an equivalent subject matter. My analysis
`
`as to the level of ordinary skill in the art would remain the same regardless of
`
`whether the time of the invention is found to be in December 2000, or some later
`
`time up until and including the December 26, 2001 filing date of the ’961 patent.
`
`V. OVERVIEW OF THE ’961 PATENT
`17. U.S. Patent 7,372,961 (“the ’961 patent”) is titled “Method of Public
`
`Key Generation,” and its Abstract provides that “[a] potential bias in the generation
`
`Page 11
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 011
`
`

`

`[of] a private key is avoided by selecting the key and comparing it against the
`
`system parameters[,]” and “[i]f a predetermined condition is attained it is
`
`accepted” or “[i]f not it is rejected a new a new key is generated.” EX1001,
`
`Abstract; see also id., 2:65-3:4, 3:64-4:17, FIG. 2.
`
`18. The background section of the ’961 patent discloses that certain
`
`cryptographic functions such as the Digital Signature Algorithm (DSA) “utilize
`
`both long term and ephemeral keys to generate a signature of [a] message.” Id.,
`
`1:54-56. A party that digitally signs a message typically employs a new ephemeral
`
`key k on a per-message or per-session basis in order to obscure the party’s
`
`permanent or long-term private key. Id., 1:33-51.
`
`19. According to the ’961 patent, the selection of a key k should be
`
`randomized within a range of values. However, certain implementations of the
`
`DSA, including the Digital Signature Standard (DSS) that was promulgated by the
`
`National Institute of Standards and Technology (NIST) in the FIPS 186-2 standard,
`
`“inadvertently introduce a bias in to the selection of k.” Id., 2:3-34. This bias
`
`made the selection of some values for the key k within the acceptable range more
`
`likely than others. Id. The’961 patent explained that the bias could be “exploited
`
`to extract a value of the [user’s long-term] private key d and thereafter render the
`
`security of the system vulnerable.” Id., 2:33-36. For example, a security
`
`researcher, Dr. Daniel Bleichenbacher, determined that the method specified in
`
`Page 12
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 012
`
`

`

`DSS for generating the ephemeral key k introduced sufficient bias such that an
`
`examination of 222 signatures could allow a hacker to derive a user’s long-term
`
`private key and effectively be able to pose as the user. Id., 2:56-61. But, despite
`
`Dr. Bleichenbacher’s recognition of a security vulnerability stemming from DSS’s
`
`biased selection of ephemeral key k, a workable solution to the problem had not yet
`
`been resolved before the effective filing date of the ’961 patent (December 27,
`
`2000).
`
`20. The solution proposed by the inventors of the ’961 patent involved
`
`determining a key k by first generating a seed value from a random number
`
`generator, hashing the seed value using a suitable hash function (e.g., SHA), and
`
`comparing the output of the hash function to a parameter related to how the key k
`
`was to be employed (e.g., q in DSS). Id., 3:64-4:17, FIG. 2. Because the length L
`
`of the output of the hash function in terms was at least as long as the length of the
`
`parameter q against which the hash output is compared, the output of the hash
`
`function would sometimes exceed the value of q and fall outside the acceptable
`
`range of values for the key k (e.g., since k must be less than q in DSS). The
`
`inventors proposed to ensure the selection of a compliant key k without introducing
`
`bias by either accepting the hashed seed value as the key k if the hashed value were
`
`less than the compared parameter (e.g., q), and rejecting the hashed value as the
`
`key k if the hashed value were greater than or equal to that parameter. EX1001,
`
`Page 13
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 013
`
`

`

`3:64-4:17, FIG. 2 (reproduced below). If a hashed value was rejected for being too
`
`large, the method would repeat until an acceptable hash value was found that could
`
`be used as the key k. Id. This approach stands in contrast, for example, to DSS’s
`
`method of generating key k where a modulo reduction was performed on the output
`
`of a hash function—thereby introducing the bias that Dr. Bleichenbacher was able
`
`to leverage to compromise the long-term private key of a user. See EX1004, p. 18.
`
`
`
`EX1001, FIG. 2.
`
`VI.
`
`INTERPRETATION OF THE ’961 PATENT CLAIMS AT ISSUE
`21.
`I understand that, for purposes of my analysis in this IPR proceeding,
`
`the terms appearing in the patent claims should be interpreted according to their
`
`plain and ordinary meaning under the Phillips standard. Phillips v. AWH Corp.,
`
`415 F.3d 1303, 1312-13 (Fed. Cir. 2005) (en banc). According to Phillips, the
`
`Page 14
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 014
`
`

`

`structure of the claims, the specification, and the patent prosecution history are
`
`used to construe a claim, and the “ordinary meaning” of a claim term is its
`
`meaning that would have been recognized by a POSITA after reading the entire
`
`patent. Moreover, Phillips provides that even treatises and dictionaries may be
`
`used, albeit under limited circumstances, to determine the meaning attributed by a
`
`POSITA to a claim term at the time of filing. For example, Phillips cautions
`
`against heavy reliance on the dictionary divorced from the intrinsic record of the
`
`patent, such as the patent’s specification. I followed this approach in my analysis.
`
`22.
`
`I also understand that the words of the claims should be interpreted as
`
`they would have been interpreted by a POSITA at the time the invention was made
`
`(not today). For purposes of my analysis here, I have used the December 27, 2000
`
`priority date of the ’961 patent as the date of invention. Without exception,
`
`however, my analysis of the proper meaning of the recited claim elements (under
`
`the Phillips standard) in this declaration would be correct if the date of invention
`
`was anywhere in the late 1990s or early 2000s.
`
`23.
`
`I understand that the district court in a related proceeding involving
`
`the ’961 patent issued a Corrected Final Ruling on Claim Construction (“Markman
`
`Order”) on April 5, 2019. EX2004. I have reviewed the sections of the Markman
`
`Order that pertain to the ’961 patent. I understand that the claim construction
`
`standard under Phillips that applies in this inter partes review is the same standard
`
`Page 15
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 015
`
`

`

`that the court applied in its Markman Order. For purposes of my analysis of the
`
`challenged claims in this IPR proceeding, I have employed the same constructions
`
`that were adopted by the court in the Markman Order. For example, I understand
`
`that the court construed the term “reducing mod q” in the Markman Order to mean
`
`“computing the remainder of dividing a value by q.” EX2004, 36. I have adopted
`
`the construction of this term for purposes of my analysis in this declaration. I note,
`
`however, that all of the shortcomings of Grounds 1-4 (as detailed below) would
`
`remain true even if the alternative interpretation of this claim phrase (as explained
`
`at p. 34-35 of the Markman Order) was implemented.
`
`VII. OVERVIEW OF THE CITED REFERENCES1
`A. DSS
`24.
`I understand that the primary reference cited in each ground of the
`
`petition is the Federal Information Processing Standards Publication (FIPS) 186,
`
`
`
`1 I understand the petition cites Rao (EX1018) and Floyd (EX1019) in combination
`
`with DSS, Rose, and Schneier in Ground 3, and in combination with DSS,
`
`Menezes, and Schneier in Ground 4. Pet., 57-63. The petition’s stated reasons for
`
`reliance on Rao and Floyd are not directly implicated by the particular claim
`
`element addressed in this declaration. Therefore, I did not include specific
`
`summaries of Rao and Floyd in this declaration.
`
`Page 16
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 016
`
`

`

`entitled Digital Signature Standard (“DSS”). See EX1004. DSS describes a
`
`standardized version of the Digital Signature Algorithm. Id., 5. This algorithm,
`
`which is also referenced in the background section of the ’961 patent (specifically,
`
`the ’961 patent refers to the FIPS 186-2 release of DSS), descscribes rules and
`
`parameters for computing a digital signature of an electronic message. Id. The
`
`digital signature allows “the identity of the signatory” of the message to be
`
`verified, and also allows the recipient of a message to verify its integrity. Id. For
`
`example, Figure 1 from DSS (reproduced below) depicts an overview of the
`
`signature generation and verification functions set forth in the standard:
`
`EX1004, FIG. 1.
`
`25. DSS provides for the use of two keys to generate a digital signature of
`
`a message: (1) a long-term secret (private) key x that belongs to the signing party
`
`
`
`Page 17
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 017
`
`

`

`and is used across all messages signed by that party, and (2) a short-term (also
`
`referred to as “ephemeral”) key k that is typically used just once so that every
`
`message signed by a particular party is signed with a different short-term key k.
`
`As the background of the ’961 patent explains, “[t]he ephemeral private key is
`
`generated at the start of each session between a pair of correspondents” (along with
`
`a “corresponding, ephemeral public key”),” and “[o]nce the session is terminated,
`
`the ephemeral key is securely discarded and a new ephemeral key generate for a
`
`new session.” EX1001, 1:38-51.
`
`26. DSS describes the following algorithm for generating a batch of
`
`ephemeral keys k:
`
`EX1004, 18.
`
`Page 18
`
`
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 018
`
`

`

`27. At step 1, the algorithm for generating key k involves first obtaining a
`
`seed-key, referred to as KKEY. Id. A one-way function G() is then applied to
`
`KKEY at Step 3(a). Id. The one-way function G() can be a hash or a block cipher
`
`such as those specified by the Secure Secure Hash Algorithm (SHA) or Data
`
`Encryption Standard (DES), respectively. Id., 17. Because the value of key k must
`
`be less than the a pre-defined prime number q and the output of G() may be larger
`
`than q, DSS provides for a reduction modulo q to be performed on the output of
`
`G() to ensure that the value of key k is less than q. However, as explained in the
`
`background of the ’961 patent, a bias is introduced by the modular reduction due to
`
`a greater likelihood of computing values in a first interval than a second. EX1001,
`
`2:48-55.
`
`28. DSS also allows for generation of a batch of keys k based by
`
`performing a random selection of KKEY just once (at step 1). EX1004, 18. After
`
`the algorithm computes the initial key k in the batch, subsequent keys k are
`
`generated by updating the value of the seed-key (KKEY) using the deterministic
`
`formula from step 3(d): KKEY = (1 + KKEY + k) mod 2b. EX1004, 14.
`
`B. Rose
`29. The Rose reference is an article that was allegedly posted to a pair of
`
`USENET newsgroups in the 1990s. See EX1006. Rose describes a method for
`
`Page 19
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 019
`
`

`

`“roll[ing] a random number in the interval [0, n),” and even provides computer
`
`code for an implementation of its method:
`
`
`
`EX1006, 2.
`
`30. The roll() function specifies several operations for generating a
`
`random number within a desired range [0, n). First, Rose computes the largest
`
`multiple of n that is less than or equal to BIG, where BIG is “the biggest value
`
`returned by random ().” The computed multiple is assigned to the variable
`
`‘biggest.’ Id. Rose then provides a do-while loop that repeatedly determines a
`
`random number using the random() function until the output of the random()
`
`function is less than the value of ‘biggest.’ Id. Because the final output of the
`
`random() function, which is assigned ot ‘rval’, upon exiting the loop is compared
`
`to a multiple of n and thus may be greater than the maximum value of the specified
`
`Page 20
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 020
`
`

`

`range (n-1), Rose’s roll() function computes ‘rval’ modulo n and returns the result
`
`of this operation as the output of the software routine. Id.
`
`C. Menezes
`31. Grounds 2 and 4 of the petition cite the “Handbook of Applied
`
`Cryptography” by Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone
`
`(“Menezes”). See EX1005. While Menezes covers a number of topics, the
`
`petition principally relies upon disclosure from the following paragraph on the
`
`subjects of random numbers and random bit generators:
`
`
`
`EX1005, 69.
`
`32.
`
`In this description, Menezes discloses that a random bit sequence is
`
`converted to an integer. I understand the petition alleges that the operation of
`
`converting a random bit sequence to an integer corresponds to a hashing operation
`
`performed on a seed value, but based on my knowledge and experience in the field,
`
`I am confident a POSITA would have found this contention to be an error. A
`
`POSITA would have known as a basic computer science or engineering matter that
`
`to obtain an integer value from a random bit generator, all it takes would be to
`
`iterate the bit generation process the proper number of times (e.g., 160 times for a
`
`Page 21
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 021
`
`

`

`160-bit integer using a pseudo-random bit generator that produces one bit at a
`
`time) and to concatenate the outputs to form an integer. This type of formatting is
`
`straightforward and can be achieved in a variety of ways, such as using string
`
`concatenation, bit-shift and addition, and more. This is completely different from
`
`the function performed by a hash function, and orders of magnitude less
`
`computationally demanding.
`
`33. Moreover, Menezes describes a solution for obtaining a random
`
`integer in a fundamentally different than that provided by the ’961 claims.
`
`Specifically, Menezes assumes the availability of a perfect random bit generator
`
`that could generate each bit in a sequence without any bias. But a POSITA would
`
`have recognized that such a bit generator that exhibited perfect randomness is
`
`largely theoretical and unavailable for broad adoption on a wide range of systems
`
`(such as the range of systems that typically implemented DSS). By starting with a
`
`perfect random bit generator, Menezes had no need to perform additional
`
`transformations on the random integer produced by the bit generator. In reality,
`
`however, Menezes’ approach is impractical, and so the ’961 patent provides a
`
`materially different solution for generating an unbiased output within a desired
`
`range by first obtaining a seed value from a random number generator, and then
`
`hashing the seed value, thereby removing or obscuring any bias that is often
`
`present in real-world random number generators.
`
`Page 22
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 022
`
`

`

`D.
`Schneier
`34. Each ground of the petition also relies upon the textbook Applied
`
`Cryptography (2nd Ed.) by Bruce Schneier (“Schneier”). See EX1008. The
`
`petition cites Schneier for its discussion of “various techniques for generating
`
`random and pseudorandom numbers” and its alleged description of the “benefit of
`
`[true random numbers] over pseudorandom numbers in cryptographic key
`
`generation.” Pet., 27 (citing EX1008, 146-153).
`
`VIII. THE PETITION FAILS TO ESTABLISH THAT THE CITED
`REFERENCES WOULD HAVE PROVIDED FOR REPETITION OF
`THE REQUISITE OPERATIONS RECITED IN INDEPENDENT
`CLAIMS 1, 15, AND 23
`A. The ’961 Claims Require Repetition Of Operations For Both
`Random Seed Value Generation And Hashing Of The Seed Value
`If A Preceding Hashed Value Is Not Less Than Said Order Q
`I understand that independent claim 1 of the ’961 patent recites the
`
`35.
`
`following language:
`
`generating a seed value SV from a random number
`generator;
`performing a hash function H( ) on said seed value SV
`to provide an output H(SV);
`determining whether said output H(SV) is less than
`said order q prior to reducing mod q;
`accepting said output H(SV) for use as said key k if the
`value of said output H(SV) is less than said order q;
`rejecting said output H(SV) as said key if said value is
`not less than said order q;
`if said output H(SV) is rejected, repeating said
`method;
`
`Page 23
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 023
`
`

`

`
`EX1001, 5:36-51 (emphasis added).
`
`36.
`
` Independent claims 15 and 23 recite corresponding language to the
`
`language quoted above from claim 1. Id., 6:62-64 (claim 15), 7:31-8:6 (claim 23).
`
`37. Notably, each of claims 1, 15, and 23 provides that “if said output
`
`H(SV) is rejected,” then the claimed method is to be repeated. The method that is
`
`to be repeated entails multiple operations as expressly recited in the claims,
`
`including “generating a seed value SV from a random number generator” and
`
`“performing a hash function H( ) on said seed value SV to provide an output
`
`H(SV).” Id., 5:37-40. In other words, if in a first iteration of the method, the
`
`output H(SV) is rejected due to the value of H(SV) not being less than the order q,
`
`the ’961 claims provide that the method must repeate such that, in a second
`
`iteration, a new seed value SV would be generated from a random number
`
`generator and the has function H( ) would be performed on the new seed value SV
`
`to provide another output H(SV). This pattern of operations is confirmed by
`
`Figure 2 of the ’961 patent, in which, after the rejection of H(seed), the flowchart
`
`returns to box 26 where a new seed value is obtained from the output of the
`
`random number generator (RNG):
`
`Page 24
`
`MOBILEIRON, INC. - EXHIBIT 1030
`Page 024
`
`

`

`
`
`EX1001, FIG. 2; see also id., 4:11-17 (“The resultant output H(seed) is tested
`
`against the value of q and a decision made based on the relative values. If
`
`H(seed)<q then it is accepted for use as k. If not, the value is rejected and the
`
`random number generator is conditioned to generate a new value which is again
`
`hashed by the function 28 and tested. This loop continues until a satisfactory value
`
`is obtained.”).
`
`38. Despite the plain requirements of claims 1, 15, and 23, as I explain
`
`below, the petition has failed to establish that it would have been obvious to
`
`provide for rep

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket