throbber
Ex. 1003
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`––––––––––––––
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`––––––––––––––
`
`SAMSUNG ELECTRONICS AMERICA, INC,
`Petitioner
`
`v.
`
`PROXENSE, LLC
`Patent Owner
`––––––––––––––
`
`IPR2021-01444
`Patent 8,352,730
`––––––––––––––
`
`DECLARATION OF ANDREW WOLFE IN SUPPORT OF
`PETITION FOR INTER PARTES REVIEW
`
`

`

`
`
`TABLE OF CONTENTS
`
`Ex. 1003
`
`Page
`
`DECLARATION OF ANDREW WOLFE IN SUPPORT OF .......................1
`
`PETITION FOR INTER PARTES REVIEW ...................................................1
`
`I.
`
`II.
`
`INTRODUCTION .................................................................................1
`
`EDUCATION AND WORK EXPERIENCE .......................................1
`
`III. COMPENSATION ................................................................................7
`
`IV. LEGAL PRINCIPLES ...........................................................................7
`
`V.
`
`LEVEL OF SKILL IN THE ART .........................................................8
`
`VI. OVERVIEW OF THE ’730 PATENT ..................................................9
`
`VII. PROSECUTION OF THE ’730 PATENT ......................................... 10
`
`VIII. CLAIM CONSTRUCTION ............................................................... 10
`
`IX. CITED ART ....................................................................................... 11
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`G.
`
`H.
`
`I.
`
`Scott (WO1999056429) ........................................................... 11
`
`Russell (US20040044627) ....................................................... 11
`
`Lapsley (US2001/0000535) ..................................................... 12
`
`Robinson (US2003/0177102) .................................................. 13
`
`Rhoads (US2004/0153649) ...................................................... 13
`
`Berardi (US7239226) ............................................................... 14
`
`Rosen (US6175921) ................................................................. 14
`
`Shreve (US2004/0153649) ....................................................... 14
`
`Kinoshita (US2003/0055792) .................................................. 15
`
`X. GROUND 1: CLAIMS 1-2, 4-9, AND 11 ARE RENDERED
`OBVIOUS BY SCOTT, RUSSELL, AND LAPSLEY. .................... 16
`
`A.
`
`Claim 1 ..................................................................................... 16
`
`1.
`
`2.
`
`[1pre]: A method for verifying a user during authentication
`of an integrated device, comprising the steps of: ...........................16
`
`[1A]: persistently storing biometric data of the user and a
`plurality of codes and other data values comprising a
`device ID code uniquely identifying the integrated device
`and a secret decryption value in a tamper proof format
`
`
`
`i
`
`

`

`
`
`Ex. 1003
`
`written to a storage element on the integrated device that is
`unable to be subsequently altered; .................................................17
`
`(1) Motivation to Combine........................................ 20
`
`(2) Motivation to Combine........................................ 22
`
`[1B]: wherein the biometric data is selected from a group
`consisting of a palm print, a retinal scan, an iris scan, a
`hand geometry, a facial recognition, a signature recognition
`and a voice recognition; .................................................................23
`
`[1C]: responsive to receiving a request for a biometric
`verification of the user, receiving scan data from a
`biometric scan; ...............................................................................23
`
`[1D]: comparing the scan data to the biometric data to
`determine whether the scan data matches the biometric
`data; ................................................................................................24
`
`[1E]: responsive to a determination that the scan data
`matches the biometric data, wirelessly sending one or more
`codes from the plurality of codes and the other data values
`for authentication by an agent that is a third-party trusted
`authority possessing a list of device ID codes uniquely
`identifying legitimate integrated devices, ......................................25
`
`(1) Motivation to Combine........................................ 28
`
`[1F]: wherein the one or more codes and other data values
`includes the device ID code; and ...................................................29
`
`[1G]: responsive to authentication of the one or more
`codes and the other data values by the agent, receiving an
`access message from the agent allowing the user access to
`an application, ................................................................................29
`
`[1H]: wherein the application is selected from a group
`consisting of a casino machine, a keyless lock, a garage
`door opener, an ATM machine, a hard drive, computer
`software, a web site and a file. .......................................................30
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`B.
`
`C.
`
`Claim 2: “[t]he method of claim 1, wherein the one or
`more codes and the other data values are transmitted to
`the agent over a network.” ....................................................... 30
`
`Claim 4: “[t]he method of claim 1, wherein the one or
`more codes and the other data values indicate that the
`biometric verification was successful.” ................................... 30
`
`
`
`ii
`
`

`

`
`
`Ex. 1003
`
`D.
`
`E.
`
`Claim 5: “[t]he method of claim 1, wherein the biometric
`data and the scan data are both based on a fingerprint
`scan by the user” ...................................................................... 31
`
`Claim 6: “[t]he method of claim 1, further comprising:
`establishing a secure communication channel prior to
`sending the one or more codes and the other data values
`for authentication.” ................................................................... 32
`
`F.
`
`Claim 7 ..................................................................................... 32
`
`1.
`
`2.
`
`[7A]: “The method of claim 1, further comprising:
`receiving a request for the one or more codes and the other
`data values without a request for biometric verification; and ........32
`
`[7B]: responsive to receiving the request for the one or
`more codes and the other data values without a request for
`biometric verification, sending the one or more codes and
`the other data values without requesting the scan data. .................34
`
`G.
`
`Claim 8 ..................................................................................... 34
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`[8pre]: An integrated device for verifying a user during
`authentication of the integrated device, comprising: .....................34
`
`[8A]: a memory stores biometric data of a user and a
`plurality of codes and other data values comprising a
`device ID code uniquely identifying the integrated device
`and a secret decryption value in a tamper proof format
`written to the memory that is unable to be subsequently
`altered;............................................................................................34
`
`[8B]:wherein the biometric data is selected from a group
`consisting of a palm print, a retinal scan, an iris scan, a
`hand geometry, a facial recognition, a signature recognition
`and a voice recognition; .................................................................35
`
`[8C]:a verification unit, in communication with the
`memory, receives scan data from a biometric scan for
`comparison against the biometric data, ..........................................35
`
`[8D]:and if the scan data matches the biometric data, ...................36
`
`[8E]:a verification unit … wirelessly sends one or more
`codes from the plurality of codes and the other data values
`for authentication by an agent that is a third-party trusted
`authority possessing a list of device ID codes uniquely
`identifying legitimate integrated devices, wherein the one
`or more codes and the other data values includes the device
`ID code; and ...................................................................................36
`
`
`
`iii
`
`

`

`
`
`Ex. 1003
`
`7.
`
`8.
`
`9.
`
`[8F]:responsive to the agent authenticating the one or more
`codes and the other data values, .....................................................37
`
`[8G]:a radio frequency communicator, receives an access
`message from the agent allowing the user access to an
`application, .....................................................................................37
`
`[8H]:wherein the application is selected from a group
`consisting of a casino machine, a keyless lock, a garage
`door opener, an ATM machine, a hard drive, computer
`software, a web site and a file. .......................................................37
`
`H.
`
`I.
`
`Claim 9: “[t]he integrated device of claim 8, wherein the
`one or more codes and the other data values are
`transmitted to the agent over a network.” ................................ 37
`
`Claim 11: “[t]he integrated device of claim 8, wherein
`the verifier comprises: an LED to be activated for
`requesting the biometric scan.” ................................................ 38
`
`XI. GROUND 2: CLAIMS 3 AND 10 ARE RENDERED
`OBVIOUS BY SCOTT, RUSSELL, LAPSLEY, AND
`ROBINSON. ....................................................................................... 38
`
`A.
`
`B.
`
`Claim 3 ..................................................................................... 38
`
`Claim 10 ................................................................................... 40
`
`XII. GROUND 3: CLAIM 6 IS RENDERED OBVIOUS BY
`SCOTT, RUSSELL, LAPSLEY, AND RHOADS. ........................... 40
`
`A.
`
`Claim 6: “[t]he method of claim 1, further comprising:
`establishing a secure communication channel prior to
`sending the one or more codes and the other data values
`for authentication.” ................................................................... 40
`
`(1) Motivation to Combine........................................ 41
`
`XIII. GROUND 4: CLAIMS 1-2 AND 4-5 ARE RENDERED
`OBVIOUS BY BERARDI, ROSEN, SHREVE, AND
`KINOSHITA. ..................................................................................... 41
`
`A.
`
`Claim 1 ..................................................................................... 41
`
`1.
`
`2.
`
`[1pre]: A method for verifying a user during authentication
`of an integrated device, comprising the steps of: ...........................41
`
`[1A]: persistently storing biometric data of the user and a
`plurality of codes and other data values comprising a
`device ID code uniquely identifying the integrated device
`and a secret decryption value in a tamper proof format
`
`
`
`iv
`
`

`

`
`
`Ex. 1003
`
`written to a storage element on the integrated device that is
`unable to be subsequently altered; .................................................42
`
`(1) Motivation to Combine........................................ 45
`
`[1B]: wherein the biometric data is selected from a group
`consisting of a palm print, a retinal scan, an iris scan, a
`hand geometry, a facial recognition, a signature recognition
`and a voice recognition; .................................................................46
`
`[1C]: responsive to receiving a request for a biometric
`verification of the user, receiving scan data from a
`biometric scan; ...............................................................................46
`
`[1D]: comparing the scan data to the biometric data to
`determine whether the scan data matches the biometric
`data; ................................................................................................47
`
`[1E]: responsive to a determination that the scan data
`matches the biometric data, wirelessly sending one or more
`codes from the plurality of codes and the other data values
`for authentication by an agent that is a third-party trusted
`authority possessing a list of device ID codes uniquely
`identifying legitimate integrated devices, ......................................47
`
`(1) Motivation to Combine........................................ 49
`
`[1F]: wherein the one or more codes and other data values
`includes the device ID code; and ...................................................49
`
`[1G]: responsive to authentication of the one or more
`codes and the other data values by the agent, receiving an
`access message from the agent allowing the user access to
`an application, ................................................................................50
`
`(1) Motivation to Combine........................................ 51
`
`[1H]: wherein the application is selected from a group
`consisting of a casino machine, a keyless lock, a garage
`door opener, an ATM machine, a hard drive, computer
`software, a web site and a file. .......................................................52
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`B.
`
`C.
`
`Claim 2: “[t]he method of claim 1, wherein the one or
`more codes and the other data values are transmitted to
`the agent over a network.” ....................................................... 52
`
`Claim 4: “[t]he method of claim 1, wherein the one or
`more codes and the other data values indicate that the
`biometric verification was successful.” ................................... 52
`
`
`
`v
`
`

`

`
`
`Ex. 1003
`
`D.
`
`E.
`
`Claim 5: “[t]he method of claim 1, wherein the biometric
`data and the scan data are both based on a fingerprint
`scan by the user” ...................................................................... 52
`
`Claim 6: “[t]he method of claim 1, further comprising:
`establishing a secure communication channel prior to
`sending the one or more codes and the other data values
`for authentication.” ................................................................... 53
`
`F.
`
`Claim 8: .................................................................................... 53
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`[8pre]: An integrated device for verifying a user during
`authentication of the integrated device, comprising: .....................53
`
`[8A]: a memory stores biometric data of a user and a
`plurality of codes and other data values comprising a
`device ID code uniquely identifying the integrated device
`and a secret decryption value in a tamper proof format
`written to the memory that is unable to be subsequently
`altered;............................................................................................53
`
`[8B]:wherein the biometric data is selected from a group
`consisting of a palm print, a retinal scan, an iris scan, a
`hand geometry, a facial recognition, a signature recognition
`and a voice recognition; .................................................................54
`
`[8C]:a verification unit, in communication with the
`memory, receives scan data from a biometric scan for
`comparison against the biometric data, ..........................................54
`
`[8D]:and if the scan data matches the biometric data, ...................54
`
`[8E]:a verification unit … wirelessly sends one or more
`codes from the plurality of codes and the other data values
`for authentication by an agent that is a third-party trusted
`authority possessing a list of device ID codes uniquely
`identifying legitimate integrated devices, wherein the one
`or more codes and the other data values includes the device
`ID code; and ...................................................................................55
`
`[8F]: responsive to the agent authenticating the one or
`more codes and the other data values, ...........................................55
`
`[8G]: a radio frequency communicator, receives an access
`message from the agent allowing the user access to an
`application, .....................................................................................55
`
`[8H]:wherein the application is selected from a group
`consisting of a casino machine, a keyless lock, a garage
`door opener, an ATM machine, a hard drive, computer
`software, a web site and a file. .......................................................56
`
`
`
`vi
`
`

`

`
`
`Ex. 1003
`
`G.
`
`H.
`
`Claim 9: “[t]he integrated device of claim 8, wherein the
`one or more codes and the other data values are
`transmitted to the agent over a network.” ................................ 56
`
`Claim 11: “[t]he integrated device of claim 8, wherein
`the verifier comprises: an LED to be activated for
`requesting the biometric scan.” ................................................ 56
`
`XIV. SECONDARY CONSIDERATIONS ................................................ 56
`
`XV. CONCLUSION .................................................................................. 57
`
`
`
`
`vii
`
`

`

`Ex. 1003
`
`LIST OF EXHIBITS
`
`Exhibit
`
`Description
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`U.S. Patent No. 8,352,730
`
`File History for U.S. Patent No. 8,352,730
`
`Declaration of Andrew Wolfe, Ph.D.
`
`Curriculum vitae of Andrew Wolfe, Ph.D.
`
`International App. No. WO 1999056429 to Scott et al.
`
`U.S. Patent Pub. No. 2004/0044627 A1 to Russell et al.
`
`U.S. Patent Pub. No. 2001/0000535 A1 to Lapsley et al.
`
`U.S. Patent Pub. No. 2003/0177102 A1 to Robinson
`
`U.S. Patent Pub. No. 2004/0153649 A1 to Rhoads et al.
`
`U.S. Patent No. 7,239,226 B2 to Berardi et al.
`
`U.S. Patent No. 6,175,921 B1 to Rosen
`
`U.S. Patent Pub. No. 2002/0109580 A1 to Shreve et al.
`
`U.S. Patent Pub. No. 2003/0055792 A1 to Kinoshita et al.
`
`“Applied Cryptography—Protocols, Algorithms, and Source
`Code in C” (1996) by Schneier
`
`Declaration of Sylvia Hall-Ellis, Ph.D.
`
`Proxense’s Infringement Contention Chart for U.S. 8,352,730
`
`
`
`viii
`
`
`
`
`
`
`
`
`
`

`

`Claim
`
`1pre
`
`1A
`
`1B
`
`1C
`
`1D
`
`1E
`
`1F
`
`1G
`
`1H
`
`2
`
`
`
`
`
`
`Ex. 1003
`
`LIST OF CHALLENGED CLAIMS
`
`U.S. Patent No. 8,352,730
`
`A method for verifying a user during authentication of an integrated
`device, comprising the steps of:
`
`persistently storing biometric data of the user and a plurality of
`codes and other data values comprising a device ID code uniquely
`identifying the integrated device and a secret decryption value in a
`tamper proof format written to a storage element on the integrated
`device that is unable to be subsequently altered;
`
`wherein the biometric data is selected from a group consisting of a
`palm print, a retinal scan, an iris scan, a hand geometry, a facial
`recognition, a signature recognition and a voice recognition;
`
`responsive to receiving a request for a biometric verification of the
`user, receiving scan data from a biometric scan;
`
`comparing the scan data to the biometric data to determine whether
`the scan data matches the biometric data;
`
`responsive to a determination that the scan data matches the
`biometric data, wirelessly sending one or more codes from the
`plurality of codes and the other data values for authentication by an
`agent that is a third-party trusted authority possessing a list of
`device ID codes uniquely identifying legitimate integrated devices,
`
`wherein the one or more codes and other data values includes the
`device ID code; and
`
`responsive to authentication of the one or more codes and the other
`data values by the agent, receiving an access message from the
`agent allowing the user access to an application,
`
`wherein the application is selected from a group consisting of a
`casino machine, a keyless lock, a garage door opener, an ATM
`machine, a hard drive, computer software, a web site and a file.
`
`The method of claim 1, wherein the one or more codes and the other
`data values are transmitted to the agent over a network.
`
`ix
`
`

`

`Ex. 1003
`
`Claim
`
`U.S. Patent No. 8,352,730
`
`3
`
`4
`
`5
`
`6
`
`7.
`
`8pre
`
`8A
`
`8B
`
`8C
`
`8D
`
`8E
`
`The method of claim 1, further comprising: registering an age
`verification for the user in association with the device ID code.
`
` The method of claim 1, wherein the one or more codes and the
`other data values indicate that the biometric verification was
`successful.
`
`The method of claim 1, wherein the biometric data and the scan data
`are both based on a fingerprint scan by the user.
`
`The method of claim 1, further comprising: establishing a secure
`communication channel prior to sending the one or more codes and
`the other data values for authentication.
`
`The method of claim 1, further comprising: receiving a request for
`the one or more codes and the other data values without a request
`for biometric verification; and responsive to receiving the request
`for the one or more codes and the other data values without a
`request for biometric verification, sending the one or more codes
`and the other data values without requesting the scan data.
`
`An integrated device for verifying a user during authentication of
`the integrated device, comprising:
`
`a memory stores biometric data of a user and a plurality of codes
`and other data values comprising a device ID code uniquely
`identifying the integrated device and a secret decryption value in a
`tamper proof format written to the memory that is unable to be
`subsequently altered;
`
`wherein the biometric data is selected from a group consisting of a
`palm print, a retinal scan, an iris scan, a hand geometry, a facial
`recognition, a signature recognition and a voice recognition;
`
`a verification unit, in communication with the memory, receives
`scan data from a biometric scan for comparison against the
`biometric data,
`
`and if the scan data matches the biometric data,
`
`wirelessly sends one or more codes from the plurality of codes and
`the other data values for authentication by an agent that is a third-
`
`x
`
`
`
`
`
`
`

`

`Ex. 1003
`
`Claim
`
`U.S. Patent No. 8,352,730
`
`party trusted authority possessing a list of device ID codes uniquely
`identifying legitimate integrated devices, wherein the one or more
`codes and the other data values includes the device ID code; and
`
`responsive to the agent authenticating the one or more codes and the
`other data values,
`
`receives an access message from the agent allowing the user access
`to an application,
`
`wherein the application is selected from a group consisting of a
`casino machine, a keyless lock, a garage door opener, an ATM
`machine, a hard drive, computer software, a web site and a file.
`
`The integrated device of claim 8, wherein the one or more codes and
`the other data values are transmitted to the agent over a network.
`
`The integrated device of claim 9, wherein an age verification is
`registered in association with the device ID code.
`
`The integrated device of claim 8, wherein the verifier comprises: an
`LED to be activated for requesting the biometric scan.
`
`8F
`
`8G
`
`8H
`
`9
`
`10
`
`11
`
`
`
`
`
`xi
`
`
`
`
`
`
`
`
`

`

`Ex. 1003
`
`GROUNDS OF CHALLENGE (37 C.F.R. § 42.204(b)(2))
`
`No. Ground for Challenge
`
`1
`
`2
`
`3
`
`4
`
`Scott, Russell, and Lapsley render obvious Claims 1-2, 4-9, and 11
`
`Scott, Russell, Lapsley, and Robinson render obvious Claims 3 and
`10
`
`Scott, Russell, Lapsley, and Rhoads render obvious Claim 6
`
`Berardi, Rosen, Shreve, and Kinoshita render obvious Claims 1-2,
`4-6, 8-9, and 11
`
`xii
`
`
`
`
`
`
`
`
`
`

`

`
`
`I.
`
`INTRODUCTION
`
`Ex. 1003
`
`1.
`
`I have been retained by Petitioner Samsung Electronics America,
`
`Inc. to provide an opinion on the validity of U.S. Patent No. 8,352,730, owned
`
`by Patent Owner Proxense, LLC. My opinions are based on information
`
`currently available to me. To the extent that additional information becomes
`
`available, I reserve the right to continue my investigation and study, which
`
`may include a review of documents and information that recently have been
`
`or may be produced, as well as testimony from depositions that may yet be
`
`taken in this case. I may thus expand or modify my opinions as my
`
`investigation and study continues. I may also supplement my opinions in
`
`response to any additional information that becomes available to me or that
`
`Patent Owner makes available, any matters raised by Patent Owner and/or
`
`opinions provided by Patent Owner’s experts, or in light of any relevant orders
`
`from the Patent Trial and Appeal Board.
`
`II. EDUCATION AND WORK EXPERIENCE
`
`2.
`
`A copy of my curriculum vitae that fully sets forth my
`
`qualifications can be found at Ex. 1004. Below is a summary of my education,
`
`work experience, and other qualifications.
`
`3.
`
`In 1985, I earned a B.S.E.E. degree in Electrical Engineering and
`
`Computer Science from The Johns Hopkins University. In 1987, I received
`
`
`
`1
`
`

`

`
`
`an M.S. degree in Electrical and Computer Engineering from Carnegie Mellon
`
`Ex. 1003
`
`University. In 1992, I received a Ph.D. in Computer Engineering from
`
`Carnegie Mellon University. My doctoral dissertation proposed a new
`
`approach for the architecture of a computer processor.
`
`4.
`
`I have more than 35 years of experience as a computer architect,
`
`computer system designer, personal computer graphics designer, educator,
`
`and executive in the electronics industry.
`
`5.
`
`In 1983, I began designing touch sensors, microprocessor-based
`
`computer systems, and I/O (input/output) cards for personal computers as a
`
`senior design engineer for Touch Technology, Inc. During the course of my
`
`design projects with Touch Technology, I designed I/O cards for PC-
`
`compatible computer systems, including the IBM PC-AT, to interface with
`
`interactive touch-based computer terminals that I designed for use in public
`
`information systems. I continued designing and developing related
`
`technology as a consultant to the Carroll Touch division of AMP, Inc., where
`
`in 1986 I designed one of the first custom touch-screen integrated circuits. I
`
`designed the touch/pen input system for the Linus WriteTop, which many
`
`believe to be the first commercial tablet computer.
`
`6.
`
`From 1986 through 1987, I designed and built a high-
`
`performance computer system as a student at Carnegie Mellon University.
`
`
`
`2
`
`

`

`
`
`From 1986 through early 1988, I also developed the curriculum and
`
`Ex. 1003
`
`supervised the teaching laboratory for processor design courses.
`
`7.
`
`In the latter part of 1989, I worked as a senior design engineer
`
`for ESL-TRW Advanced Technology Division. While at ESL-TRW, I
`
`designed and built a bus interface and memory controller for a workstation-
`
`based computer system, and also worked on the design of a multiprocessor
`
`system.
`
`8.
`
`At the end of 1989, I (along with some partners) reacquired the
`
`rights to the technology I had developed at Touch Technology and at AMP
`
`and founded The Graphics Technology Company. Over the next seven years,
`
`as an officer and a consultant for The Graphics Technology Company, I
`
`managed the company's engineering development activities and personally
`
`developed dozens of touch screen sensors, controllers, and interactive touch-
`
`based computer systems.
`
`9.
`
`I have consulted, formally and informally, for a number of
`
`fabless semiconductor companies. In particular, I have served on the technical
`
`advisory boards for two processor design companies: BOPS, Inc., where I
`
`chaired the board; and Siroyan Ltd., where I served in a similar role for three
`
`networking chip companies—Intellon, Inc., Comsilica, Inc., and Entridia,
`
`Inc.—and one 3D game accelerator company, Ageia, Inc.
`
`
`
`3
`
`

`

`Ex. 1003
`
`
`
`
`10.
`
`I have also served as a technology advisor to Motorola and to
`
`several venture capital funds in the U.S. and Europe. Currently, I am a
`
`director of Turtle Beach Corporation, providing guidance in its development
`
`of premium audio peripheral devices for a variety of commercial electronic
`
`products.
`
`11. From 1991 through 1997, I served on the Faculty of Princeton
`
`University as an Assistant Professor of Electrical Engineering. At Princeton,
`
`I taught undergraduate and graduate-level courses in Computer Architecture,
`
`Advanced Computer Architecture, Display Technology, and Microprocessor
`
`Systems, and conducted sponsored research in the area of computer systems
`
`and related topics. I was also a principal investigator for DOD research in
`
`video technology and a principal investigator for the New Jersey Center for
`
`Multimedia Research. From 1999 through 2002, while a Consulting Professor,
`
`I taught a Computer Architecture course to both undergraduate and graduate
`
`students at Stanford University. At Princeton, I received several teaching
`
`awards, both from students and from the School of Engineering. I have also
`
`taught advanced microprocessor architecture to industry professionals in
`
`seminars sponsored by the Institute of Electrical and Electronics Engineers
`
`(“IEEE”) and the Association for Computing Machinery (“ACM”). I am
`
`
`
`4
`
`

`

`
`
`currently a lecturer at Santa Clara University teaching courses on
`
`Ex. 1003
`
`Microprocessor Systems, Real-Time Computing, and Mechatronics.
`
`12. From 1997 through 2002, I held a variety of executive positions
`
`at a publicly-held fabless semiconductor company originally called S3, Inc.
`
`and later called SonicBlue Inc. I held the positions of Chief Technology
`
`Officer, Vice President of Systems Integration Products, Senior Vice
`
`President of Business Development, and Director of Technology, among
`
`others. At the time I joined S3, the company supplied graphics accelerators
`
`for more than 50% of the PCs sold in the United States. At S3 I supervised
`
`the design of several PC graphics accelerators. During my time at SonicBlue
`
`we launched more than 30 new consumer electronics products including
`
`devices to support copy-protected video and many of the first commercial
`
`products to support copy-protected internet audio content. These included
`
`some of the first consumer products to support playback of encrypted content
`
`using digital rights management (DRM) based security. I also worked with
`
`Universal Music Group and Sony Entertainment on the development of
`
`systems for distribution and management of secure, encrypted content.
`
`13.
`
`I have published more than fifty peer-reviewed papers in
`
`computer architecture and computer systems and IC design. I also have
`
`chaired IEEE and ACM conferences in microarchitecture and integrated
`
`
`
`5
`
`

`

`
`
`circuit design and served as an associate editor for IEEE and ACM journals.
`
`Ex. 1003
`
`I served on the IEEE Computer Society Awards committee. I am a Senior
`
`Member of IEEE and a Member of ACM. I am a named inventor on at least
`
`fifty-seven U.S. patents and thirty-seven foreign patents, which are listed in
`
`my curriculum vitae. Some of these patents relate to encryption systems.
`
`14.
`
`In 2002, I was the invited keynote speaker at the ACM/IEEE
`
`International Symposium on Microarchitecture and at the International
`
`Conference on Multimedia. From 1990 through 2005, I have also been an
`
`invited speaker on various aspects of technology and the PC industry at
`
`numerous industry events including the Intel Developer’s Forum, Microsoft
`
`Windows Hardware Engineering Conference, Microprocessor Forum,
`
`Embedded Systems Conference, Comdex, and Consumer Electronics Show,
`
`as well as at the Harvard Business School and the University of Illinois Law
`
`School. I have been interviewed on subjects related to computer graphics and
`
`video technology and the electronics industry by publications such as the Wall
`
`Street Journal, New York Times, Los Angeles Times, Time, Newsweek,
`
`Forbes, and Fortune as well as on CNN, NPR, and the BBC. I have also
`
`spoken at dozens of universities including MIT, Stanford, University of Texas,
`
`Carnegie Mellon University, UCLA, University of Michigan, Rice University,
`
`and Duke University.
`
`
`
`6
`
`

`

`
`
`III. COMPENSATION
`
`Ex. 1003
`
`15.
`
`I am being compensated at my usual and customary hourly rate
`
`of $600 for my expert services in connection with this proceeding. My
`
`compensation does not depend in any way upon the outcome of this
`
`proceeding, the opinions I express, or the content of my testimony.
`
`IV. LEGAL PRINCIPLES
`
`16.
`
`I am informed that “prior art” includes patents and printed
`
`publications that existed before the earliest applicable filing date of the ’730
`
`Patent.
`
`17.
`
`I am informed that in order for a claim to be anticipated, each
`
`and every requirement of the claim must be found, expressly or inherently, in
`
`a single prior art reference as recited in the claim.
`
`18.
`
`I am informed that a claimed invention is not patentable if the
`
`claimed invention would have been obvious to a person of ordinary skill in
`
`the field of the invention at the time the invention was made.
`
`19.
`
`I am informed that in order to show obviousness based on a
`
`combin

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket