throbber

`

`tg
`)nic
`
`~ssed
`
`ions
`
`New York
`
`John Wiley & Sons, Inc.
`• Chichester
`• Brisbane
`• Toronto
`
`• Singapore
`
`TCL Exhibit 1008
`Page 2
`
`

`

`

`

`tg
`)nic
`
`~ssed
`
`ions
`
`New York
`
`John Wiley & Sons, Inc.
`• Chichester
`• Brisbane
`• Toronto
`
`• Singapore
`
`TCL Exhibit 1008
`Page 4
`
`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`TCL Industries Holdings Co., Ltd.,
`Petitioner
`v.
`Koninklijke Philips N.V.,
`Patent Owner
`
`PTAB Case Nos. IPR2021-00495, IPR2021-00496, and IPR2021-00497
`Patent Nos. 9,590,977 B2 and 10,298,564 B2
`_________________________________________
`
`DECLARATION OF JACOB ROBERT MUNFORD
`
`TCL Exhibit 1008
`Page 24
`
`

`

`1. My name is Jacob Robert Munford. I am over the age of 18, have
`
`personal knowledge of the facts set forth herein, and am competent to testify to the
`
`same.
`
`2.
`
`I earned a Master of Library and Information Science (MLIS) from the
`
`University of Wisconsin-Milwaukee in 2009. I have over ten years of experience in
`
`the library/information science field. Beginning in 2004, I have served in various
`
`positions in the public library sector including Assistant Librarian, Youth Services
`
`Librarian and Library Director. I have attached my Curriculum Vitae as Appendix
`
`CV.
`
`3.
`
`During my career in the library profession, I have been responsible for
`
`materials acquisition for multiple libraries. In that position, I have cataloged,
`
`purchased and processed incoming library works. That includes purchasing
`
`materials directly from vendors, recording publishing data from the material in
`
`question, creating detailed material records for library catalogs and physically
`
`preparing that material for circulation. In addition to my experience in acquisitions,
`
`I was also responsible for analyzing large collections of library materials, tailoring
`
`library records for optimal catalog search performance and creating lending
`
`agreements between libraries during my time as a Library Director.
`
`4.
`
`I am fully familiar with the catalog record creation process in the library
`
`sector. In preparing a material for public availability, a library catalog record
`
`TCL Exhibit 1008
`Page 25
`
`

`

`describing that material would be created. These records are typically written in
`
`Machine Readable Catalog (herein referred to as “MARC”) code and contain
`
`information such as a physical description of the material, metadata from the
`
`material’s publisher, and date of library acquisition. In particular, the 008 field of
`
`the MARC record is reserved for denoting the date of creation of the library record
`
`itself. As this typically occurs during the process of preparing materials for public
`
`access, it is my experience that an item’s MARC record indicates the date of an
`
`item’s public availability.
`
`5.
`
`Typically, in creating a MARC record, a librarian would gather various
`
`bits of metadata such as book title, publisher and subject headings among others and
`
`assign each value to a relevant numerical field. For example, a book’s physical
`
`description is tracked in field 300 while title/attribution is tracked in field 245. The
`
`008 field of the MARC record is reserved for denoting the creation of the library
`
`record itself. As this is the only date reflecting the inclusion of said materials within
`
`the library’s collection, it is my experience that an item’s 008 field accurately
`
`indicates the date of an item’s public availability.
`
`6.
`
`This declaration is being drafted as of February 2021. Public and
`
`university libraries in my area have been closed for months due to the COVID-19
`
`pandemic. My state, Pennsylvania, has a travel advisory, which has affected my
`
`ability to travel. In my experience, library catalog records are accurate descriptions
`
`- 1 -
`
`TCL Exhibit 1008
`Page 26
`
`

`

`of a library’s collection and my lack of physical access to libraries at this time creates
`
`no doubt in my determinations of authenticity or availability of the exhibits noted
`
`below.
`
`7.
`
`I have reviewed Exhibit 1008, scans of Applied Cryptography:
`
`Protocols, Algorithms and Source Code in C by Bruce Schneier, 2nd Edition,
`
`provided to me by counsel.
`
`8.
`
`Attached hereto as Appendix CMU01 is a true and correct copy of the
`
`MARC record for Applied Cryptography: Protocols, Algorithms and Source Code
`
`in C as held by the Carnegie-Mellon University library. I secured this record myself
`
`from the library’s public catalog. The MARC record contained within Appendix
`
`CMU01 accurately describes the title, author, publisher, and ISBN number of
`
`Applied Cryptography: Protocols, Algorithms and Source Code in C.
`
`9.
`
`Attached hereto as Appendix UPITT01 is a true and correct copy of the
`
`MARC record for Applied Cryptography: Protocols, Algorithms and Source Code
`
`in C as held by the University of Pittsburgh library. I secured this record myself from
`
`the library’s public catalog. The MARC record contained within AppendixUPITT01
`
`accurately describes the title, author, publisher, and ISBN number of Applied
`
`Cryptography: Protocols, Algorithms and Source Code in C. The 505 field in this
`
`record, designated to describe the formatted contents of the material, accurately
`
`- 2 -
`
`TCL Exhibit 1008
`Page 27
`
`

`

`describes the table of contents of Applied Cryptography: Protocols, Algorithms and
`
`Source Code in C found on page V of Exhibit 1008.
`
`10.
`
`In comparing the information listed in Appendices CMU01 and
`
`UPITT01 to Exhibit 1008, it is my determination that Exhibit 1008 is a true and
`
`correct copy of Applied Cryptography: Protocols, Algorithms and Source Code in
`
`C.
`
`11.
`
`The 008 field of the MARC record noted on page 1 of Appendix
`
`CMU01 indicates that Applied Cryptography: Protocols, Algorithms and Source
`
`Code in C was first cataloged by Carnegie-Mellon University library as of March
`
`27, 1995. The 008 field of the MARC record noted on page 1 of Appendix UPITT01
`
`also indicates that Applied Cryptography: Protocols, Algorithms and Source Code
`
`in C was first cataloged by University of Pittsburgh library as of March 27, 1995.
`
`Based on this information, it is my determination that Applied Cryptography:
`
`Protocols, Algorithms and Source Code in C was made available to the public
`
`shortly after March 1995.
`
`12.
`
`I have been retained on behalf of the Petitioner to provide assistance in
`
`the above-illustrated matter in establishing the authenticity and public availability of
`
`the documents discussed in this declaration. I am being compensated for my services
`
`in this matter at the rate of $100.00 per hour plus reasonable expenses. My
`
`- 3 -
`
`TCL Exhibit 1008
`Page 28
`
`

`

`statements are objective, and my compensation does not depend on the outcome of
`
`this matter.
`
`13.
`
`I declare under penalty of perjury that the foregoing is true and correct.
`
`I hereby declare that all statements made herein of my own knowledge are true and
`
`that all statements made on information and belief are believed to be true; and further
`
`that these statements were made the knowledge that willful false statements and the
`
`like so made are punishable by fine or imprisonment, or both, under Section 1001 of
`
`Title 18 of the United States Code.
`
`Dated: 2/9/2021
`
`_____________________________________
`
`Jacob Robert Munford
`
`- 4 -
`
`TCL Exhibit 1008
`Page 29
`
`

`

`APPENDIX CV
`
`APPENDIX CV
`
`TCL Exhibit 1008
`Page 30
`
`

`

`Appendix A - Curriculum Vitae
`
`Education
`
`University of Wisconsin-Milwaukee - MS, Library & Information Science, 2009
`Milwaukee, WI
`● Coursework included cataloging, metadata, data analysis, library systems,
`management strategies and collection development.
`● Specialized in library advocacy and management.
`
`Grand Valley State University - BA, English Language & Literature, 2008
`Allendale, MI
`● Coursework included linguistics, documentation and literary analysis.
`● Minor in political science with a focus in local-level economics and
`government.
`
`Professional Experience
`
`Researcher / Expert Witness, October 2017 – present
`Freelance
`Pittsburgh, Pennsylvania
`● Material authentication and public accessibility determination. Declarations
`of authenticity and/or public accessibility provided upon research
`completion. Depositions provided on request.
`● Research provided on topics of public library operations, material
`publication history, digital database services and legacy web resources.
`● Past clients include Apple, Fish & Richardson, Erise IP, Baker Botts and
`other firms working in patent law.
`
`Library Director, February 2013 - March 2015
`Dowagiac District Library
`Dowagiac, Michigan
`● Executive administrator of the Dowagiac District Library. Located in
`Southwest Michigan, this library has a service area of 13,000, an annual
`
`TCL Exhibit 1008
`Page 31
`
`

`

`operating budget of over $400,000 and total assets of approximately
`$1,300,000.
`● Developed careful budgeting guidelines to produce a 15% surplus during the
`2013-2014 & 2014-2015 fiscal years.
`● Using this budget surplus, oversaw significant library investments including
`the purchase of property for a future building site, demolition of existing
`buildings and building renovation projects on the current facility.
`● Led the organization and digitization of the library's archival records.
`● Served as the public representative for the library, developing business
`relationships with local school, museum and tribal government entities.
`● Developed an objective-based analysis system for measuring library services
`- including a full collection analysis of the library's 50,000+ circulating
`items and their records.
`
`
`
`November 2010 - January 2013
`Librarian & Branch Manager, Anchorage Public Library
`Anchorage, Alaska
`● Headed the 2013 Anchorage Reads community reading campaign including
`event planning, staging public performances and creating marketing
`materials for mass distribution.
`● Co-led the social media department of the library's marketing team, drafting
`social media guidelines, creating original content and instituting long-term
`planning via content calendars.
`● Developed business relationships with The Boys & Girls Club, Anchorage
`School District and the US Army to establish summer reading programs for
`children.
`
`
`June 2004 - September 2005, September 2006 - October 2013
`Library Assistant, Hart Area Public Library
`Hart, MI
`● Responsible for verifying imported MARC records and original MARC
`cataloging for the local-level collection as well as the Michigan Electronic
`Library.
`● Handled OCLC Worldcat interlibrary loan requests & fulfillment via
`ongoing communication with lending libraries.
`
`TCL Exhibit 1008
`Page 32
`
`

`

`Professional Involvement
`
`Alaska Library Association - Anchorage Chapter
`● Treasurer, 2012
`
`Library Of Michigan
`● Level VII Certification, 2008
`● Level II Certification, 2013
`
`Michigan Library Association Annual Conference 2014
`● New Directors Conference Panel Member
`
`Southwest Michigan Library Cooperative
`● Represented the Dowagiac District Library, 2013-2015
`
`Professional Development
`
`Library Of Michigan Beginning Workshop, May 2008
`Petoskey, MI
`● Received training in cataloging, local history, collection management,
`children’s literacy and reference service.
`
`Public Library Association Intensive Library Management Training, October 2011
`Nashville, TN
`● Attended a five-day workshop focused on strategic planning, staff
`management, statistical analysis, collections and cataloging theory.
`
`Alaska Library Association Annual Conference 2012 - Fairbanks, February 2012
`Fairbanks, AK
`● Attended seminars on EBSCO advanced search methods, budgeting,
`cataloging, database usage and marketing.
`
`TCL Exhibit 1008
`Page 33
`
`

`

`APPENDIX CMU01
`
`APPENDIX CMUOl
`
`TCL Exhibit 1008
`Page 34
`
`

`

`screenshot-cmu.primo.exlibrisgroup.com-2021.02.03-09_25_58
`httsz/cmuprimo. exlibrisgroup.com/discovery/sourceRecord?vid=01 CMU_INS T:01 CMU&docId=aIma991 0020461 09704436&record0wner=0 1 CMU_INST
`03. 02.2021
`
`b
`
`881 8 eng
`
`leader BlSBQpam 32268421 3 4568
`361
`991862846189?34436
`665
`19951214135536.8
`688
`95832?51995
`nyua
`816
`##$a
`95612398
`826
`##$a6d7111?399 (paper
`935
`sn$ads7459—01cmu_inst
`635
`##$a(0CoLC)457459 EQEXL
`835
`fifl$a(Sirsi) 03231168?
`949
`##SaDLC $CDLC
`649
`fit$aPMCC
`956
`B4$aQA?6.9.A2S 5b535 1996
`632
`66333351832 $228
`180
`13$aSchneier, Bruce, $d1963—
`245
`19$anpplied cryptography 1 $bprotocols, algorithms, and source code in C I $cBruce Schneier.
`25a
`fix$32nd ed.
`266
`S¢$aNew York : Sbwiley, $cc1995.
`366
`fifi$axxiii, ?58 p.
`: $bill.
`; $c2a cm.
`564
`nflsalncludes bibliographical references (p. 6?5—?41) and index.
`596
`##$33 9
`656
`§B$aComputer security.
`656
`#65atryntngraphy.
`658
`#GSaTelecommunicatian $x5ecurity measures.
`961
`fifi$aocm3231168?
`982
`nx$a45?459
`983
`$3$a03231168?
`916
`##9319969119
`91?
`##9319951214
`918
`nfl$aRUTHANN
`919
`3x$a281?6321
`923
`#£$aCATASSIST
`949
`##Sd Roy A. Hunt Faundation (c.3)
`999
`##$aQA?6.9 .A25 535 1996 $wLC $c1 $iF1fi6331 $d1f22f2614 9e932432813 $lBY-REQUEST $mOFFSITE $n9? $p$69.95 $q12 SPY $5Y $tBOOK $u1f3131996
`999
`$¥$BQA?6.9 .A25 535 1995 $NLC $C2 $1F146332 $d8f?!2613 $95f14I2913 $lBY—REQUEST $m0FFSITE $n4? $p$45.?1 $q1 $PY $SY StBOOK $U8f16f2331
`999
`##$80A?6‘9 .A25 535 1996 $NLC $C3 $i33482614454693 $dllf29f261? $e8!28!231? $15TACKS $mENGRESCI $n32 $D$45.56 $q2 $PY $5Y $tBOOK $u6f27f2995 FORM=MARC
`
`: acid-Free paper)
`
`TCL Exhibit 1008
`
`Page 35
`
`TCL Exhibit 1008
`Page 35
`
`

`

`APPENDIX UPITT01
`
`APPENDIX UPITTOl
`
`TCL Exhibit 1008
`Page 36
`
`

`

`screenshot—pit't.primo. exlibn'sgroup. com-2021 . 02. 03-09_28_38
`https://pitt.pn'mo.exlibn'sgroup.com/discovery/sourceRecord?vid=01PI7T_INST:01PI7T_INST&docId=aIma9944312113406236&record0wner=01PI'IT_INST
`03022021
`
`leader
`961
`865
`968
`816
`915
`919
`929
`826
`935
`935
`935
`935
`835
`846
`949
`958
`932
`166
`245
`256
`266
`366
`564
`565
`656
`659
`656
`653
`966
`994
`
`b
`
`661 B emg
`
`Bleggcam a2296385 a 4566
`99443l2113466236
`26268824183558.B
`95632751996
`nyua
`##$a
`95612393
`##$aGBQS-3@62
`##$a34281811
`##$a@4?1123457 (cloth : acid~free paper)
`##$38471117899 (paper
`: acid-{Pee paper)
`nfi$a(0CULC)OCm32311687
`##584431211
`##$a(ppiu)44312117pittflb
`##$a(pittdb)443121lipittdb
`##$Z(DCDLC]34231811
`##$aDLC $CDLC $dUKM $dOrLDB—E $dUtOrELM $dUtOPBLW
`nfi$aPITT
`B4$aQA75.9.A25 5b335 1996
`BB$aBQS.Sf2 $229
`l#$a5chneier, Bruce, $61963—
`1B$anpplied cryptography :
`ibpr‘otomlsJ algorithms, and source code in C / icfiruce Schneier.
`##$a2nd ed.
`nfi$aNew Yank : Sbwiley, $c:1996.
`##3axxiii, FEB p.
`: Ebill.
`; $c24 cm.
`##$alnc1udes bibliographical references (p. Sis-741) and index.
`Be$tForewuhd I Erwhitfield Di¥fie —-
`$g1. $tFoundations -—
`$g2. $tPPotncol Building Blocks —-
`#B$aComputer security.
`#a$aTelec0mmunicati0n $xSecurity measures.
`#0$aCPypTogwaphy.
`B#$atryptology
`#fiamj
`##$aEfi $bP11
`
`$g3_ $tBa5ic Protutols --
`
`$g4. $tIntEP
`
`iii)?
`
`TCL Exhibit 1008
`
`Page 37
`
`TCL Exhibit 1008
`Page 37
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket