throbber
Filed: February 19, 2021
`
`Filed on behalf of
`
`Petitioners HTC Corporation and HTC America, Inc.
`By:
`Irfan A. Lateef
`
`Brian C. Claassen
`Daniel C. Kiang
`KNOBBE, MARTENS, OLSON & BEAR, LLP
`2040 Main Street, Fourteenth Floor
`Irvine, CA 92614
`Tel.: (949) 760-0404
`Fax: (949) 760-9502
`Email:
`BoxHTCCOL.056LP@knobbe.com
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`__________________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`__________________________________
`
`HTC CORPORATION and HTC AMERICA, INC.,
`
`Petitioners
`v.
`
`ANCORA TECHNOLOGIES, INC.
`
`Patent Owner.
`
`Case No. IPR2021-00570
`U.S. Patent 6,411,941 B1
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 6,411,941
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`Page
`
`I.
`INTRODUCTION .......................................................................................... 1
`II. MANDATORY NOTICES ............................................................................ 3
`A.
`Real party-in-interest ............................................................................ 3
`B.
`Related matters ..................................................................................... 3
`C.
`Counsel and Service Information ......................................................... 4
`III. REQUIREMENTS FOR INTER PARTES REVIEW ................................... 4
`A. Ground for Standing ............................................................................. 4
`B. Overview of Challenge and Relief Requested ..................................... 5
`1.
`Identification of Prior Art .......................................................... 5
`2.
`Grounds for Challenge ............................................................... 5
`3.
`Statutory Grounds of Challenge and Legal Principles ............... 6
`C.
`The Board Should Exercise Its Discretion to Institute Review ............ 6
`IV. DESCRIPTION OF TECHNOLOGY ............................................................ 6
`A. Overview of the Technology ................................................................ 6
`B. Overview of the ’941 Patent ................................................................. 8
`1.
`The Specification and Alleged Invention .................................. 8
`2.
`Prosecution History and Later Proceedings ............................. 13
`3.
`The Challenged Claims ............................................................ 17
`V. CLAIM CONSTRUCTION ......................................................................... 17
`VI. LEVEL OF ORDINARY SKILL IN THE ART .......................................... 18
`VII. SPECIFIC GROUNDS FOR PETITION ..................................................... 19
`A. Ground I: Claims 1–2, 11, and 13 were obvious over the
`combined teachings of Hellman and Chou ........................................ 19
`1.
`Overview of Hellman ............................................................... 19
`2.
`Overview of Chou .................................................................... 24
`3. Motivations to Combine Hellman and Chou ........................... 25
`
`-i-
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`(continued)
`
`Page
`
`4.
`
`5.
`
`6.
`
`Claim 1 preamble: “A method of restricting software
`operation within a license for use with a computer
`including an erasable, non-volatile memory area of a
`BIOS of the computer, and a volatile memory area; the
`method comprising the steps of:”............................................. 30
`Claim 1.a: “selecting a program residing in the volatile
`memory,” .................................................................................. 32
`Claim 1.b: “using an agent to set up a verification
`structure in the erasable, non-volatile memory of the
`BIOS, the verification structure accommodating data that
`includes at least one license record,” ....................................... 35
`Claim 1.c: “verifying the program using at least the
`verification structure from the erasable non-volatile
`memory of the BIOS, and” ...................................................... 36
`Claim 1.d: “acting on the program according to the
`verification.” ............................................................................ 36
`Claim 2: “A method according to claim 1, further
`comprising the steps of: establishing a license
`authentication bureau.” ............................................................ 37
`10. Claim 11: “A method according to claim 1 wherein the
`volatile memory is a RAM.” .................................................... 37
`11. Claim 13: “The method of claim 1, wherein a unique key
`is stored in a first non-volatile memory area of the
`computer.” ................................................................................ 37
`B. Ground II: Claims 1–3, 6–14, and 16 were obvious over the
`combined teachings of Hellman, Chou, and Schneck ........................ 48
`1.
`Overview of Schneck ............................................................... 48
`2. Motivations to Combine Hellman, Chou, and Schneck ........... 39
`
`7.
`
`8.
`
`9.
`
`-ii-
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`TABLE OF CONTENTS
`(continued)
`
`Page
`
`3.
`
`Claim 1. preamble: “A method of restricting software
`operation within a license for use with a computer
`including an erasable, non-volatile memory area of a
`BIOS of the computer, and a volatile memory area; the
`method comprising the steps of:”............................................. 43
`Claim 1.a: “selecting a program residing in the volatile
`memory,” .................................................................................. 43
`Claim 1.b: “using an agent to set up a verification
`structure in the erasable, non-volatile memory of the
`BIOS, the verification structure accommodating data that
`includes at least one license record,” ....................................... 44
`Claim 1.c: “verifying the program using at least the
`verification structure from the erasable non-volatile
`memory of the BIOS, and” ...................................................... 46
`Claim 1.d: “acting on the program according to the
`verification.” ............................................................................ 47
`Claim 2: “A method according to claim 1, further
`comprising the steps of: establishing a license
`authentication bureau.” ............................................................ 47
`Claim 3 preamble: “A method according to claim 2,
`wherein setting up a verification structure further
`comprising the steps of:” .......................................................... 48
`10. Claim 3.a: “establishing, between the computer and the
`bureau, a two-way data-communications linkage;” ................. 48
`11. Claim 3.b: “transferring, from the computer to the
`bureau, a request-for-license including an identification
`of the computer and the license-record’s contents from
`the selected program;” ............................................................. 49
`12. Claim 3.c: “forming an encrypted license-record at the
`bureau by encrypting parts of the request-for-license
`using part of the identification as an encryption key;” ............ 52
`13. Claim 3.d: “transferring, from the bureau to the
`computer, the encrypted license-record; and” ......................... 52
`-iii-
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`(continued)
`
`Page
`
`14. Claim 3.e: “storing the encrypted license record in the
`erasable non-volatile memory area of the BIOS.” ................... 53
`15. Claim 6: “A method according to claim 1 wherein
`selecting a program includes the steps of: establishing a
`licensed-software-program in the volatile memory of the
`computer wherein said licensed-software-program
`includes contents used to form the license-record.” ................ 53
`16. Claim 7 preamble: “A method according to claim 6
`wherein using an agent to set up the verification structure
`includes the steps of:” .............................................................. 54
`17. Claim 7.a: “establishing or certifying the existence of a
`pseudo-unique key in a first non-volatile memory area of
`the computer; and” ................................................................... 54
`18. Claim 7.b: “establishing at least one license-record
`location in the first nonvolatile memory area or in the
`erasable, non-volatile memory area of the BIOS.” .................. 54
`19. Claim 8 preamble: “A method according to claim 6
`wherein establishing a license-record includes the steps
`of:” ............................................................................................ 55
`20. Claim 8.a: “forming a license-record by encrypting of
`the contents used to form a license-record with other
`predetermined data contents, using the key; and” ................... 55
`21. Claim 8.b: “establishing the encrypted license-record in
`one of the at least one established license-record
`locations.” ................................................................................ 55
`22. Claim 9 preamble: “A method according to claim 7
`wherein verifying the program includes the steps of:” ............ 56
`23. Claim 9.a: “encrypting the licensed-software-program's
`license-record contents from the volatile memory area or
`decrypting the license-record in the erasable, non-volatile
`memory area of the BIOS, using the pseudo-unique key;
`and” .......................................................................................... 56
`
`-iv-
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`(continued)
`
`Page
`
`24. Claim 9.b: “comparing the encrypted licenses-software-
`program’s license-record contents with the encrypted
`license-record in the erasable, non-volatile memory area
`of the BIOS, or comparing the license-software-
`program's license-record contents with the decrypted
`license-record in erasable non-volatile memory area of
`the BIOS.” ................................................................................ 57
`25. Claim 10: “A method according to claim 9 wherein
`acting on the program includes the step: restricting the
`program's operation with predetermined limitations if the
`comparing yields non-unity or insufficiency.” ........................ 58
`26. Claim 11: “A method according to claim 1 wherein the
`volatile memory is a RAM.” .................................................... 58
`27. Claim 12: “The method of claim 1, wherein a pseudo-
`unique key is stored in the non-volatile memory of the
`BIOS.” ...................................................................................... 59
`28. Claim 13: “The method of claim 1, wherein a unique key
`is stored in a first non-volatile memory area of the
`computer.” ................................................................................ 60
`29. Claim 14: “The method according claim 13, wherein the
`step of using the agent to set up the verification record,
`including the license record, includes encrypting a
`license record data in the program using at least the
`unique key.” ............................................................................. 60
`30. Claim 16: “The method according to claim 13, wherein
`the step of verifying the program includes a decrypting
`the license record data accommodated in the erasable
`second non-volatile memory area of the BIOS using at
`least the unique key.” ............................................................... 60
`VIII. CONCLUSION ............................................................................................. 61
`
`-v-
`
`

`

`Ex. 1001
`Ex. 1002
`
`Ex. 1003
`Ex. 1004
`Ex. 1005
`Ex. 1006
`Ex. 1007
`
`Ex. 1008
`
`Ex. 1009
`
`Ex. 1010
`
`Ex. 1011
`
`Ex. 1012
`
`Ex. 1013
`
`Ex. 1014
`
`EXHIBIT LIST
`
`U.S. Patent No. 6,411,941 to Mullor et al. (“’941 Patent”)
`Image File Wrapper of U.S. Patent No. 6,411,941 (“File
`History”)
`Declaration of Andrew Wolfe, Ph.D. (“Wolfe Decl.”)
`U.S. Patent No. 4,658,093 (“Hellman”)
`U.S. Patent No. 5,892,906 (“Chou”)
`U.S. Patent No. 5,933,498 (“Schneck”)
`Scheduling Order, Ancora Techs., Inc. v. TCT Mobile (US),
`Inc., No. 8:19-cv-2192 (C.D. Cal. Mar. 17, 2020) (ECF No.
`34).
`In re: Coronavirus Public Emergency, Order Concerning
`Phased Reopening of the Court, General Order No. 20-09,
`United States District Court for the Central District of
`California, Aug. 6, 2020.
`Civil Docket, Ancora Techs., Inc. v. Sony Mobile Commc’ns
`AB, No. 1:19-cv-01703 (D. Del.).
`Civil Docket, Ancora Techs., Inc. v. Lenovo Grp. Ltd., No.
`1:19-cv-01712 (D. Del.).
`Claim Construction Order, Ancora Techs., Inc. v. Apple Inc.,
`No. 4:11-cv-06357 (N.D. Cal. Dec. 31, 2012) (ECF No.
`107).
`Final Claim Constructions of the Court, Ancora Techs., Inc.
`v. LG Elecs., Inc., No. 1:20-cv-00034 (W.D. Tex. June 2,
`2020) (ECF No. 69).
`Supplemental Claim Construction Order, Ancora Techs., Inc.
`v. LG Elecs., Inc., No. 1:20-cv-00034 (W.D. Tex. Aug. 19,
`2020) (ECF No. 93).
` Joint Claim Construction and Prehearing Statement, Ancora
`
`Techs., Inc. v. TCT Mobile (US), Inc., No. 8:19-cv-2192
`(C.D. Cal. July 17, 2020) (ECF No. 49).
`
`Exhibit List Page 1
`
`

`

`Ex. 1015
`
`Ex. 1016
`
`Ex. 1017
`
`Ex. 1018
`
`Ex. 1019
`
`Final Ruling on Claim Construction of the Court, Ancora
`Techs., Inc. v. TCT Mobile, No. 19-cv-2192 (C.D. Cal. Nov.
`12, 2020) (ECF No. 66)
`Decision Granting Institution of Inter Partes Review, TCT
`Mobile, et al. v. Ancora Techs, IPR2020-01609 (Paper 7)
`Western District of Washington General Order 18-20
`
`Civil Docket, Ancora Techs. V. Sony Mobile Commc’ns, No.
`1:19-cv-1703 (D. Del.) – Update of Ex. 1009 as of 2/19/2021
`Civil Docket, Ancora Techs., Inc. v. Lenovo Grp. Ltd., No.
`1:19-cv-01712 (D. Del.) – Update of Ex. 1010 as of
`2/19/2021
`
`Exhibit List Page 2
`
`

`

`Review of U.S. Patent 6,411,941 B1
`HTC Corp, et al. v. Ancora Techs.
`
`
`Petitioners request inter partes review (“IPR”) of U.S. Patent No. 6,411,941
`
`(Ex. 1001). Petitioner is filing a Motion to Join the IPR in TCT Mobile (US) Inc. v.
`
`Ancora Technologies, Inc., IPR2020-01609 (“TCT IPR Petition”).
`
`I.
`
`INTRODUCTION
`The ’941 Patent generally relates to methods for restricting unauthorized
`
`software operation. Specifically, the ’941 Patent claims such a method by storing a
`
`license record in the BIOS memory, which purportedly overcame deficiencies
`
`using a software-based prior art method where a license record was stored in
`
`“volatile memory (e.g., hard disk)” and a hardware-based prior art method. ’941
`
`Patent at 1:10-42. Indeed, storing a license record for a program in the BIOS
`
`memory, and not just any non-volatile memory, is the supposed improvement of
`
`the ‘941 Patent claims over the prior art in prosecution, an ex parte reexamination,
`
`a covered business method review, and two Federal Circuit appeals; even though
`
`those proceedings conceded that a “license record” and “BIOS memory” were both
`
`conventional. But the storage of license records in a BIOS memory was not a
`
`patentable distinction over the prior art as of the priority date in 1998, as
`
`Petitioners demonstrate with the use of three prior art references, Hellman, Chou,
`
`and Schneck.
`
`While the ’941 Patent has been litigated in district court and at the Patent
`
`Office in numerous cases, its invalidity based on prior art publications has been
`
`considered in only one of these proceedings. Neither of the Federal Circuit appeals
`
`
`
`-1-
`
`

`

`Review of U.S. Patent 6,411,941 B1
`HTC Corp, et al. v. Ancora Techs.
`
`
`
`
`
`considered prior art invalidity. One appeal was limited to claim construction
`
`issues, and one appeal was limited to patent eligibility. The covered business
`
`method review was denied institution on the basis that the ’941 Patent was not
`
`eligible for covered business method review. Despite the Patent Owner having
`
`asserted the ’941 Patent against 10 entities over the course of more than 10 years,
`
`the invalidity of the ’941 Patent’s claims has only been considered on the merits in
`
`one instance, an ex parte reexam.
`
`Petitioners submit that, when fully considered on the merits, the prior art
`
`demonstrates that storing information, a license record or otherwise, in the BIOS
`
`memory, that is used in a method to restrict unauthorized operation of software,
`
`was well-known as a way to provide increased protection against tampering with
`
`that information by, e.g., a software hacker. Petitioners demonstrate through the
`
`combinations of Hellman, Chou, and Schneck that a person of ordinary skill in the
`
`art at the time of the invention (POSA) would have found all challenged claims
`
`obvious.
`
`For the reasons described herein, Petitioners request institution of an inter
`
`partes review and cancellation of all challenged claims of the ’941 Patent.
`
`
`
`
`
`-2-
`
`

`

`Review of U.S. Patent 6,411,941 B1
`HTC Corp, et al. v. Ancora Techs.
`
`
`
`
`
`II. MANDATORY NOTICES
`A. Real party-in-interest
`HTC Corporation and HTC America, Inc. (collectively, “Petitioners”)
`
`are the real parties-in-interest.
`
`B. Related matters
`Patent Owner asserts that Petitioners infringe the ’941 Patent in Ancora
`
`Techs., Inc. v. HTC, Inc., No. 2:16-cv-1919 (W.D. Wash.), filed December 15,
`
`2016. Petitioners request their Petition be instituted and joined pursuant to 35
`
`U.S.C. § 315(c) and 37 C.F.R. §§ 42.22 and 42.122(b) with the inter partes review
`
`proceeding initiated concerning the ’941 patent: TCT Mobile (US) Inc. v. Ancora
`
`Technologies, Inc., IPR2020-01609, which was instituted February 16, 2021.
`
`Patent Owner has asserted the ’941 Patent against other parties in the
`
`following currently-pending district-court lawsuits: Ancora Technologies, Inc. v.
`
`TCT Mobile (US) Inc., No. 8:19-cv-02192 (C.D. Cal.); Ancora Technologies, Inc.
`
`v. Lenovo Group Limited, No. 1:19-cv-01712 (D. Del.); Ancora Technologies, Inc.
`
`v. Sony Corp., No. 1:19-cv-01703 (D. Del.); Ancora Technologies, Inc. v. LG
`
`Electronics, Inc., No. 1:20-cv-00034 (W.D. Tex.); Ancora Technologies, Inc. v.
`
`Samsung Electronics Co., Ltd., No. 6:19-cv-00385 (W.D. Tex.).
`
`Samsung Electronics Co., Ltd. et al. filed a petition for inter partes review
`
`against the ’941 Patent on June 25, 2020. IPR2020-01184 (“Samsung IPR
`
`
`
`
`
`-3-
`
`

`

`
`
`
`
`
`
`Review of U.S. Patent 6,411,941 B1
`HTC Corp, et al. v. Ancora Techs.
`
`Petition”). The Board denied the Samsung IPR on January 5, 2021. For the
`
`reasons set forth below, there is no overlap in grounds or prior art references
`
`between this Petition and the Samsung IPR Petition.
`
`C. Counsel and Service Information
`Lead counsel: Irfan A. Lateef (Reg. No. 51,922)
`
`Back-up counsel: Brian C. Claassen (Reg. No. 63,051), and Daniel C.
`
`Kiang (Reg. No. 79,631)
`
`These attorneys can be reach by mail at Knobbe Martens, 2040 Main Street
`
`14th Floor, Irvine, CA 92614, contact numbers of 949-760-0404 (phone) and 949-
`
`760-9502 (fax).
`
`Petitioners consent to electronic service. All services and communications
`
`to the attorneys listed above may be sent to: BoxHTC57@knobbe.com. A
`
`power of attorney is being filed concurrently.
`
`III. REQUIREMENTS FOR INTER PARTES REVIEW
`A. Ground for Standing
`Petitioners certify that the ’941 Patent is available for IPR and that
`
`Petitioners are not barred or estopped from requesting joinder under 37 C.F.R.
`
`§ 42.122, to an IPR challenging claims of the ’941 Patent on the grounds
`
`presented here.
`
`
`
`
`
`-4-
`
`

`

`Review of U.S. Patent 6,411,941 B1
`HTC Corp, et al. v. Ancora Techs.
`
`Overview of Challenge and Relief Requested
`B.
`Pursuant to Rules 42.22(a)(1) and 42.104(b)(1)–(2), Petitioners request
`
`cancellation of claims 1–3, 6–14, and 16 of the ’941 Patent under pre-AIA 35
`
`U.S.C. § 103.
`
`Identification of Prior Art
`1.
`Petitioners rely upon the references listed in the Table of Exhibits, including:
`
`U.S. Patent No. 4,658,093 (“Hellman” (Ex. 1004)), issued on April 14, 1987
`
`from an application filed on July 11, 1983. Hellman is prior art under pre-AIA 35
`
`U.S.C. § 102(b).
`
`U.S. Patent No. 5,892,906 (“Chou” (Ex. 1005)), issued on April 6, 1999
`
`from an application filed on July 19, 1996. Chou is prior art under pre-AIA 35
`
`U.S.C. § 102(e).
`
`U.S. Patent No. 5,933,498 (“Schneck” (Ex. 1006)), issued on August 3,
`
`1999 from an application filed on November 5, 1997 and that claims priority to an
`
`application filed on January 11, 1996. Schneck is prior art under pre-AIA 35
`
`U.S.C. § 102(e).
`
`Hellman, Chou, and Scheck were not in front of the Patent Office during the
`
`original examination, the ex parte reexamination, or the covered business method
`
`review of the ’941 Patent.
`
`2.
`
`Grounds for Challenge
`
`-5-
`
`

`

`Review of U.S. Patent 6,411,941 B1
`HTC Corp, et al. v. Ancora Techs.
`
`Ground
`
`Basis
`
`Reference(s)
`
`1
`2
`
`§ 103
`§ 103
`
`Hellman, Chou
`Hellman, Chou, Schneck
`
`Challenged
`Claims
`1–2, 11, 13
`1–3, 6–14, and 16
`
`This Petition, supported by the declaration of Dr. Andrew Wolfe (“Wolfe
`
`Decl.” (Ex. 1003)), demonstrates that there is a reasonable likelihood that
`
`Petitioners will prevail with respect to cancellation of at least one challenged
`
`claim. See 35 U.S.C. § 314(a).
`
`Statutory Grounds of Challenge and Legal Principles
`3.
`This Petition requests cancellation of claims 1–3, 6–14, and 16 of the ’941
`
`Patent under pre-AIA 35 U.S.C. § 103.
`
`IV. DESCRIPTION OF TECHNOLOGY
`A.
`Overview of the Technology
`By the time of the ’941 Patent’s priority date in 1998, the field of software
`
`licensing was well-developed. Wolfe Decl. ¶¶ 31–35. For more than a decade
`
`prior, practitioners in the field had widely recognized the new risks to software
`
`piracy introduced by the transformations to digital media. Id.
`
`Many entities recognized that one such risk was “copy protection” or
`
`“secondary distribution.” Id. This referred to the situation where a user received a
`
`valid license for a software program, but the user then duplicated the program
`
`and/or the license so as to use it in an unauthorized fashion for more uses, on more
`
`computers, etc. Id. This problem was of particular interest to practitioners because
`-6-
`
`

`

`
`
`
`
`Review of U.S. Patent 6,411,941 B1
`HTC Corp, et al. v. Ancora Techs.
`it required the software owner to provide enough trust to the user to perform at
`
`least one authorized use, as opposed to providing no trust or unlimited trust. Id.
`
`While many solutions were developed, a common theme was to use some form of
`
`encryption to reduce unauthorized secondary distribution of the software program.
`
`Id.
`
`Similarly, by 1998, the field of computer BIOS was well-developed.
`
`Wolfe Decl. ¶¶ 36–42. Nearly all consumer end user devices contained a BIOS
`
`program that was used to start up the device at power-on time. Id. Early personal
`
`computers tended to store BIOS programs in separate, true ROM (read only
`
`memory) memory module, i.e., memory that could not be re-written in the field.
`
`Id. By the 1990s, it was more common to store BIOS programs in “ROM” that
`
`could actually be rewritten in some form. Id. Early forms of this rewritable ROM
`
`often required physically accessing the memory chip with a special device. Id.
`
`By the ’941 Patent’s priority date in 1998, electrically-erasable
`
`programmable read-only memory (EEPROM) was a popular medium for BIOS
`
`memory. Id. EEPROM chips had the benefit of being re-writable by software
`
`without the need to remove the chip from the computer. Id. This aspect of
`
`EEPROM was considered beneficial because it became common prior to the ’941
`
`priority date in 1998 for device manufacturers to provide updates to BIOS while
`
`the devices were in the field. Id. EEPROM allowed that functionality. Id.
`
`
`
`
`
`-7-
`
`

`

`
`
`
`
`
`
`
`
`
`
`Review of U.S. Patent 6,411,941 B1
`HTC Corp, et al. v. Ancora Techs.
`
`B. Overview of the ’941 Patent
`The ’941 Patent issued from U.S. Patent Application No. 09/164,777, filed
`
`on October 1, 1998. It claims priority to Israeli Patent Application 124571, which
`
`was filed on May 21, 1998. ’941 Patent, Cover Page. Therefore, the priority date
`
`of the ’941 Patent is no earlier than May 21, 1998.
`
`1.
`The Specification and Alleged Invention
`The ’941 Patent invention is directed to “restricting an unauthorized
`
`software program’s operation.” ’941 Patent at 1:6–8. The ’941 Patent recognizes
`
`that it was known in the field to store a “license signature” for a program in a
`
`computer’s “volatile memory (e.g. hard disk).”1 Id. at 1:19–21. The ’941 Patent
`
`alleges that such techniques were “appropriate for restricting honest software
`
`users,” but they were “vulnerable to attack at the hands of skilled system’s
`
`programmers (e.g. ‘hackers’).” Id. at 1:21–24.
`
`The ’941 Patent proposes to solve this problem based on “the use of a key
`
`and of a record, which have been written into the non-volatile memory of a
`
`computer.” Id. at 1:38–43. The “key” is stored “during manufacture” in a “ROM
`
`1 Despite this contradictory example (i.e., that a hard disk is exemplary of volatile
`memory), the Federal Circuit held that “volatile memory” has its ordinary
`meaning, Ancora Technologies, Inc. v. Apple, Inc., 744 F.3d 732, 739 (Fed. Cir.
`2014), such as “memory whose data is not maintained when the power is
`removed,” id. at 737.
`
`
`
`-8-
`
`

`

`
`
`
`
`
`
`
`
`
`Review of U.S. Patent 6,411,941 B1
`HTC Corp, et al. v. Ancora Techs.
`
`section” of a “BIOS module,” and it “constitutes, effectively, a unique
`
`identification code for the host computer.” Id. at 1:44–52. The “license record” is
`
`stored in “another (second) non-volatile section of the BIOS, e.g. E2PROM (or the
`
`ROM).”2 Id.at 1:59–2:1. The ’941 Patent distinguishes the storage location of the
`
`key and the license record: “It should be noted that unlike the first non-volatile
`
`section, the data in the second non-volatile memory may optionally be erased or
`
`modified (using E2PROM manipulation commands), so as to enable to add, modify
`
`or remove licenses.” Id. 2:1–5. The key is used to encrypt the license record,
`
`creating a locally stored, device-specific license record for the program under
`
`license. Id. at 1:59–2:26.
`
`The ’941 Patent alleges two primary benefits of the invention. First, by
`
`encrypting the license record with a key unique to the host computer and stored in
`
`ROM, a program licensed for one computer cannot simply be transferred with the
`
`license record to another computer, because the key for the second computer will
`
`be different. Id. at 2:27–47. “It is important to note that the hacker is unable to
`
`modify the key in the ROM of the second computer to” the key of the first
`
`computer because “the contents of the ROM is established during manufacture and
`
`is practically invariable.” Id. at 2:42–47.
`
`2 E2PROM is another spelling of EEPROM.
`-9-
`
`
`
`

`

`Review of U.S. Patent 6,411,941 B1
`HTC Corp, et al. v. Ancora Techs.
`
`
`
`
`
`Second: “An important advantage in utilizing non-volatile memory such as
`
`that residing in the BIOS is that the required level of system programming
`
`expertise that is necessary to intercept or modify commands, interacting with the
`
`BIOS, is substantially higher than those needed for tampering with data residing in
`
`volatile memory such as hard disk.” Id. at 3:4–9. In other words, because
`
`manipulation of E2PROM was more difficult than manipulation of the device’s
`
`RAM or hard disk, the license record could be stored in E2PROM to make it more
`
`tamper proof. Id. at 3:4–17.
`
`The alleged invention is depicted with respect to Figure 1 of the ’941 Patent,
`
`shown below. The first non-volatile memory (4)—“e.g. the ROM section of the
`
`BIOS,” id. at 5:9–16—stores a key (8). The second non-volatile memory (5)—
`
`“e.g. the E2PROM section of the BIOS,” id.—stores license records (10, 11, 12).
`
`The volatile memory (6)—“e.g. the internal RAM memory of the computer,” id.—
`
`stores a license program (16).
`
`
`
`
`
`-10-
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`Review of U.S. Patent 6,411,941 B1
`HTC Corp, et al. v. Ancora Techs.
`
`’941 Patent at Fig. 1 (annotated by Petitioner).
`
`With respect to Figure 2, shown below, the ’941 Patent describes a method
`
`for using the structures described above to effectuate the alleged invention.
`
`
`
`
`
`-11-
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`Review of U.S. Patent 6,411,941 B1
`HTC Corp, et al. v. Ancora Techs.
`
`’941 Patent at Fig. 2.
`
`
`
`At the selecting (17) step, “a licensed-software-program” is established in
`
`the volatile memory.” Id. at 6:7–16.
`
`At the setting up (18) step, a “pseudo-unique key” is established (or certified
`
`to already exist) in the first non-volatile memory. Id. at 6:18–21. Further, a
`
`“license-record location” is established in the first or the second non-volatile
`
`memory area,” id., which action includes using the key to form an “encrypted
`
`license-record” in the license-record location, id. at 6:22–27.
`
`
`
`-12-
`
`

`

`Review of U.S. Patent 6,411,941 B1
`HTC Corp, et al. v. Ancora Techs.
`
`
`
`
`
`At the verifying (19) step, the license record established in the license-record
`
`location is compared to a result of using the key to encrypt information from the
`
`licensed-software-program. Id. at 6:28–39.
`
`At the acting (20) step, an action, such as “restricting the program’s
`
`operation,” is performed in response to the comparison from the verifying (19)
`
`step, such as if the comparison shows the two values are unequal. Id. at 6:40–52.
`
`Thus, using the structures described with respect to Figure 1 and the process
`
`described with respect to Figure 2, the ’941 Patent’s alleged invention is providing
`
`a license record unique to a specific computer and stored in a harder-to-modify
`
`memory device, BIOS memory, such as BIOS E2PROM, and not just any non-
`
`volatile memory. With these aspects, the invention allowed device-specific, more
`
`tamperproof software licensing.
`
`2.
`Prosecution History and Later Proceedings
`Claim 1 as originally filed covered setting up a verification structure in two
`
`non-volatile memories, and verifying a program in volatile memory based thereon.
`
`See ’941 File Wrapper, Claims, dated Oct. 1, 1998, p. 1.
`
`During prosecution, the Applicant amended claim 1 to change the “setting
`
`up . . .” step to a “using an agent to set up . . .” step. See ’941 File Wrapper, Office
`
`Action Response, dated Dec. 6, 2001, p. 10 (unnumbered page following page 9).
`
`The Applicant also amended the claims to recite, as in its ultimately issued form,
`
`
`
`
`
`-13-
`
`

`

`Review of U.S. Patent 6,411,941 B1
`HTC Corp, et al. v. Ancora Techs.
`
`
`
`
`
`that the verification structure was stored “in the erasable, non-volatile memory of
`
`the BIOS.” Id. The Applicant later argued that this storing of the license record in
`
`the memory of the BIOS was what distinguished claim 1 over the prior art of
`
`record. See ’941 File Wrapper, Office Action Response, dated Feb. 5, 2002, pp. 3–
`
`7. The Applicant alleged that this storage in the memory of the BIOS was
`
`unknown in the prior art both because “[t]here is no OS support whatsoever to
`
`write data to the system BIOS,” and because “no file system is associated with the
`
`BIOS.” Id. at 6.
`
`The Examiner allowed the claims based on this distinction. The prior art of
`
`record disclosed, for instance, a licensing software that stored licenses in a device’s
`
`ordinary “persistent non-volatile storage,” ’941 File Wrapper, Notice of
`
`Allowance, dated Mar. 28, 2002, p. 3 (citing U.S. Pat. No. 6,189,146 at 12:8–31),
`
`and “the use of BIOS memory for storing licensing numbers,” id. at 4 (citing U.S.
`
`Pat. No. 5,479,639). But, according to the Examiner, the prior art failed to show
`
`“licensed programs running at the OS level interacting with a program verification
`
`structure stored in the BIOS . . . [.]” Id. at 4. “Further, it is well known to those of
`
`ordinary skill of the art that a computer BIOS is not setup to manage a software
`
`license verification structure.” Id. According to the Examiner, the ’941 Patent
`
`solved that problem by using the “agent” to set up the verification structure in the
`
`memory of the BIOS. Id.
`
`
`
`
`
`-14-
`
`

`

`Review of U.S. Patent 6,411,941 B1
`HTC Corp, et al. v. Ancora Techs.
`
`
`
`
`
`The ’941 Patent was subject to an ex parte reexamination identified by
`
`Control Number 90/010,560. The prior art submitted by the requester, U.S. Pat.
`
`No. 5,734,819 (“Lewis”), did disclose license information stored in the non-
`
`volatile memory of a BIOS. See ’560 Reexam File Wrapper, Notice of Intent to
`
`Issue Reexam Certificate, dated Mar. 9, 2010, p. 4 (“NIIRC”). But the Examiner
`
`found that Lewis fell short of disclosing claim 1 because the system in Lewis used
`
`the license information to verify the device itself, not a program running on the
`
`device. Id. at 4–5. That is, i

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket