`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`––––––––––––––
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`––––––––––––––
`
`SAMSUNG ELECTRONICS AMERICA, INC,
`Petitioner
`
`v.
`
`PROXENSE, LLC
`Patent Owner
`––––––––––––––
`
`IPR2021-01444
`Patent 8,352,730
`––––––––––––––
`
`DECLARATION OF ANDREW WOLFE IN SUPPORT OF
`PETITION FOR INTER PARTES REVIEW
`
`
`
`
`
`TABLE OF CONTENTS
`
`Ex. 1003
`
`Page
`
`DECLARATION OF ANDREW WOLFE IN SUPPORT OF .......................1
`
`PETITION FOR INTER PARTES REVIEW ...................................................1
`
`I.
`
`II.
`
`INTRODUCTION .................................................................................1
`
`EDUCATION AND WORK EXPERIENCE .......................................1
`
`III. COMPENSATION ................................................................................7
`
`IV. LEGAL PRINCIPLES ...........................................................................7
`
`V.
`
`LEVEL OF SKILL IN THE ART .........................................................8
`
`VI. OVERVIEW OF THE ’730 PATENT ..................................................9
`
`VII. PROSECUTION OF THE ’730 PATENT ......................................... 10
`
`VIII. CLAIM CONSTRUCTION ............................................................... 10
`
`IX. CITED ART ....................................................................................... 11
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`G.
`
`H.
`
`I.
`
`Scott (WO1999056429) ........................................................... 11
`
`Russell (US20040044627) ....................................................... 11
`
`Lapsley (US2001/0000535) ..................................................... 12
`
`Robinson (US2003/0177102) .................................................. 13
`
`Rhoads (US2004/0153649) ...................................................... 13
`
`Berardi (US7239226) ............................................................... 14
`
`Rosen (US6175921) ................................................................. 14
`
`Shreve (US2004/0153649) ....................................................... 14
`
`Kinoshita (US2003/0055792) .................................................. 15
`
`X. GROUND 1: CLAIMS 1-2, 4-9, AND 11 ARE RENDERED
`OBVIOUS BY SCOTT, RUSSELL, AND LAPSLEY. .................... 16
`
`A.
`
`Claim 1 ..................................................................................... 16
`
`1.
`
`2.
`
`[1pre]: A method for verifying a user during authentication
`of an integrated device, comprising the steps of: ...........................16
`
`[1A]: persistently storing biometric data of the user and a
`plurality of codes and other data values comprising a
`device ID code uniquely identifying the integrated device
`and a secret decryption value in a tamper proof format
`
`
`
`i
`
`
`
`
`
`Ex. 1003
`
`written to a storage element on the integrated device that is
`unable to be subsequently altered; .................................................17
`
`(1) Motivation to Combine........................................ 20
`
`(2) Motivation to Combine........................................ 22
`
`[1B]: wherein the biometric data is selected from a group
`consisting of a palm print, a retinal scan, an iris scan, a
`hand geometry, a facial recognition, a signature recognition
`and a voice recognition; .................................................................23
`
`[1C]: responsive to receiving a request for a biometric
`verification of the user, receiving scan data from a
`biometric scan; ...............................................................................23
`
`[1D]: comparing the scan data to the biometric data to
`determine whether the scan data matches the biometric
`data; ................................................................................................24
`
`[1E]: responsive to a determination that the scan data
`matches the biometric data, wirelessly sending one or more
`codes from the plurality of codes and the other data values
`for authentication by an agent that is a third-party trusted
`authority possessing a list of device ID codes uniquely
`identifying legitimate integrated devices, ......................................25
`
`(1) Motivation to Combine........................................ 28
`
`[1F]: wherein the one or more codes and other data values
`includes the device ID code; and ...................................................29
`
`[1G]: responsive to authentication of the one or more
`codes and the other data values by the agent, receiving an
`access message from the agent allowing the user access to
`an application, ................................................................................29
`
`[1H]: wherein the application is selected from a group
`consisting of a casino machine, a keyless lock, a garage
`door opener, an ATM machine, a hard drive, computer
`software, a web site and a file. .......................................................30
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`B.
`
`C.
`
`Claim 2: “[t]he method of claim 1, wherein the one or
`more codes and the other data values are transmitted to
`the agent over a network.” ....................................................... 30
`
`Claim 4: “[t]he method of claim 1, wherein the one or
`more codes and the other data values indicate that the
`biometric verification was successful.” ................................... 30
`
`
`
`ii
`
`
`
`
`
`Ex. 1003
`
`D.
`
`E.
`
`Claim 5: “[t]he method of claim 1, wherein the biometric
`data and the scan data are both based on a fingerprint
`scan by the user” ...................................................................... 31
`
`Claim 6: “[t]he method of claim 1, further comprising:
`establishing a secure communication channel prior to
`sending the one or more codes and the other data values
`for authentication.” ................................................................... 32
`
`F.
`
`Claim 7 ..................................................................................... 32
`
`1.
`
`2.
`
`[7A]: “The method of claim 1, further comprising:
`receiving a request for the one or more codes and the other
`data values without a request for biometric verification; and ........32
`
`[7B]: responsive to receiving the request for the one or
`more codes and the other data values without a request for
`biometric verification, sending the one or more codes and
`the other data values without requesting the scan data. .................34
`
`G.
`
`Claim 8 ..................................................................................... 34
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`[8pre]: An integrated device for verifying a user during
`authentication of the integrated device, comprising: .....................34
`
`[8A]: a memory stores biometric data of a user and a
`plurality of codes and other data values comprising a
`device ID code uniquely identifying the integrated device
`and a secret decryption value in a tamper proof format
`written to the memory that is unable to be subsequently
`altered;............................................................................................34
`
`[8B]:wherein the biometric data is selected from a group
`consisting of a palm print, a retinal scan, an iris scan, a
`hand geometry, a facial recognition, a signature recognition
`and a voice recognition; .................................................................35
`
`[8C]:a verification unit, in communication with the
`memory, receives scan data from a biometric scan for
`comparison against the biometric data, ..........................................35
`
`[8D]:and if the scan data matches the biometric data, ...................36
`
`[8E]:a verification unit … wirelessly sends one or more
`codes from the plurality of codes and the other data values
`for authentication by an agent that is a third-party trusted
`authority possessing a list of device ID codes uniquely
`identifying legitimate integrated devices, wherein the one
`or more codes and the other data values includes the device
`ID code; and ...................................................................................36
`
`
`
`iii
`
`
`
`
`
`Ex. 1003
`
`7.
`
`8.
`
`9.
`
`[8F]:responsive to the agent authenticating the one or more
`codes and the other data values, .....................................................37
`
`[8G]:a radio frequency communicator, receives an access
`message from the agent allowing the user access to an
`application, .....................................................................................37
`
`[8H]:wherein the application is selected from a group
`consisting of a casino machine, a keyless lock, a garage
`door opener, an ATM machine, a hard drive, computer
`software, a web site and a file. .......................................................37
`
`H.
`
`I.
`
`Claim 9: “[t]he integrated device of claim 8, wherein the
`one or more codes and the other data values are
`transmitted to the agent over a network.” ................................ 37
`
`Claim 11: “[t]he integrated device of claim 8, wherein
`the verifier comprises: an LED to be activated for
`requesting the biometric scan.” ................................................ 38
`
`XI. GROUND 2: CLAIMS 3 AND 10 ARE RENDERED
`OBVIOUS BY SCOTT, RUSSELL, LAPSLEY, AND
`ROBINSON. ....................................................................................... 38
`
`A.
`
`B.
`
`Claim 3 ..................................................................................... 38
`
`Claim 10 ................................................................................... 40
`
`XII. GROUND 3: CLAIM 6 IS RENDERED OBVIOUS BY
`SCOTT, RUSSELL, LAPSLEY, AND RHOADS. ........................... 40
`
`A.
`
`Claim 6: “[t]he method of claim 1, further comprising:
`establishing a secure communication channel prior to
`sending the one or more codes and the other data values
`for authentication.” ................................................................... 40
`
`(1) Motivation to Combine........................................ 41
`
`XIII. GROUND 4: CLAIMS 1-2 AND 4-5 ARE RENDERED
`OBVIOUS BY BERARDI, ROSEN, SHREVE, AND
`KINOSHITA. ..................................................................................... 41
`
`A.
`
`Claim 1 ..................................................................................... 41
`
`1.
`
`2.
`
`[1pre]: A method for verifying a user during authentication
`of an integrated device, comprising the steps of: ...........................41
`
`[1A]: persistently storing biometric data of the user and a
`plurality of codes and other data values comprising a
`device ID code uniquely identifying the integrated device
`and a secret decryption value in a tamper proof format
`
`
`
`iv
`
`
`
`
`
`Ex. 1003
`
`written to a storage element on the integrated device that is
`unable to be subsequently altered; .................................................42
`
`(1) Motivation to Combine........................................ 45
`
`[1B]: wherein the biometric data is selected from a group
`consisting of a palm print, a retinal scan, an iris scan, a
`hand geometry, a facial recognition, a signature recognition
`and a voice recognition; .................................................................46
`
`[1C]: responsive to receiving a request for a biometric
`verification of the user, receiving scan data from a
`biometric scan; ...............................................................................46
`
`[1D]: comparing the scan data to the biometric data to
`determine whether the scan data matches the biometric
`data; ................................................................................................47
`
`[1E]: responsive to a determination that the scan data
`matches the biometric data, wirelessly sending one or more
`codes from the plurality of codes and the other data values
`for authentication by an agent that is a third-party trusted
`authority possessing a list of device ID codes uniquely
`identifying legitimate integrated devices, ......................................47
`
`(1) Motivation to Combine........................................ 49
`
`[1F]: wherein the one or more codes and other data values
`includes the device ID code; and ...................................................49
`
`[1G]: responsive to authentication of the one or more
`codes and the other data values by the agent, receiving an
`access message from the agent allowing the user access to
`an application, ................................................................................50
`
`(1) Motivation to Combine........................................ 51
`
`[1H]: wherein the application is selected from a group
`consisting of a casino machine, a keyless lock, a garage
`door opener, an ATM machine, a hard drive, computer
`software, a web site and a file. .......................................................52
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`B.
`
`C.
`
`Claim 2: “[t]he method of claim 1, wherein the one or
`more codes and the other data values are transmitted to
`the agent over a network.” ....................................................... 52
`
`Claim 4: “[t]he method of claim 1, wherein the one or
`more codes and the other data values indicate that the
`biometric verification was successful.” ................................... 52
`
`
`
`v
`
`
`
`
`
`Ex. 1003
`
`D.
`
`E.
`
`Claim 5: “[t]he method of claim 1, wherein the biometric
`data and the scan data are both based on a fingerprint
`scan by the user” ...................................................................... 52
`
`Claim 6: “[t]he method of claim 1, further comprising:
`establishing a secure communication channel prior to
`sending the one or more codes and the other data values
`for authentication.” ................................................................... 53
`
`F.
`
`Claim 8: .................................................................................... 53
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`[8pre]: An integrated device for verifying a user during
`authentication of the integrated device, comprising: .....................53
`
`[8A]: a memory stores biometric data of a user and a
`plurality of codes and other data values comprising a
`device ID code uniquely identifying the integrated device
`and a secret decryption value in a tamper proof format
`written to the memory that is unable to be subsequently
`altered;............................................................................................53
`
`[8B]:wherein the biometric data is selected from a group
`consisting of a palm print, a retinal scan, an iris scan, a
`hand geometry, a facial recognition, a signature recognition
`and a voice recognition; .................................................................54
`
`[8C]:a verification unit, in communication with the
`memory, receives scan data from a biometric scan for
`comparison against the biometric data, ..........................................54
`
`[8D]:and if the scan data matches the biometric data, ...................54
`
`[8E]:a verification unit … wirelessly sends one or more
`codes from the plurality of codes and the other data values
`for authentication by an agent that is a third-party trusted
`authority possessing a list of device ID codes uniquely
`identifying legitimate integrated devices, wherein the one
`or more codes and the other data values includes the device
`ID code; and ...................................................................................55
`
`[8F]: responsive to the agent authenticating the one or
`more codes and the other data values, ...........................................55
`
`[8G]: a radio frequency communicator, receives an access
`message from the agent allowing the user access to an
`application, .....................................................................................55
`
`[8H]:wherein the application is selected from a group
`consisting of a casino machine, a keyless lock, a garage
`door opener, an ATM machine, a hard drive, computer
`software, a web site and a file. .......................................................56
`
`
`
`vi
`
`
`
`
`
`Ex. 1003
`
`G.
`
`H.
`
`Claim 9: “[t]he integrated device of claim 8, wherein the
`one or more codes and the other data values are
`transmitted to the agent over a network.” ................................ 56
`
`Claim 11: “[t]he integrated device of claim 8, wherein
`the verifier comprises: an LED to be activated for
`requesting the biometric scan.” ................................................ 56
`
`XIV. SECONDARY CONSIDERATIONS ................................................ 56
`
`XV. CONCLUSION .................................................................................. 57
`
`
`
`
`vii
`
`
`
`Ex. 1003
`
`LIST OF EXHIBITS
`
`Exhibit
`
`Description
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`U.S. Patent No. 8,352,730
`
`File History for U.S. Patent No. 8,352,730
`
`Declaration of Andrew Wolfe, Ph.D.
`
`Curriculum vitae of Andrew Wolfe, Ph.D.
`
`International App. No. WO 1999056429 to Scott et al.
`
`U.S. Patent Pub. No. 2004/0044627 A1 to Russell et al.
`
`U.S. Patent Pub. No. 2001/0000535 A1 to Lapsley et al.
`
`U.S. Patent Pub. No. 2003/0177102 A1 to Robinson
`
`U.S. Patent Pub. No. 2004/0153649 A1 to Rhoads et al.
`
`U.S. Patent No. 7,239,226 B2 to Berardi et al.
`
`U.S. Patent No. 6,175,921 B1 to Rosen
`
`U.S. Patent Pub. No. 2002/0109580 A1 to Shreve et al.
`
`U.S. Patent Pub. No. 2003/0055792 A1 to Kinoshita et al.
`
`“Applied Cryptography—Protocols, Algorithms, and Source
`Code in C” (1996) by Schneier
`
`Declaration of Sylvia Hall-Ellis, Ph.D.
`
`Proxense’s Infringement Contention Chart for U.S. 8,352,730
`
`
`
`viii
`
`
`
`
`
`
`
`
`
`
`
`Claim
`
`1pre
`
`1A
`
`1B
`
`1C
`
`1D
`
`1E
`
`1F
`
`1G
`
`1H
`
`2
`
`
`
`
`
`
`Ex. 1003
`
`LIST OF CHALLENGED CLAIMS
`
`U.S. Patent No. 8,352,730
`
`A method for verifying a user during authentication of an integrated
`device, comprising the steps of:
`
`persistently storing biometric data of the user and a plurality of
`codes and other data values comprising a device ID code uniquely
`identifying the integrated device and a secret decryption value in a
`tamper proof format written to a storage element on the integrated
`device that is unable to be subsequently altered;
`
`wherein the biometric data is selected from a group consisting of a
`palm print, a retinal scan, an iris scan, a hand geometry, a facial
`recognition, a signature recognition and a voice recognition;
`
`responsive to receiving a request for a biometric verification of the
`user, receiving scan data from a biometric scan;
`
`comparing the scan data to the biometric data to determine whether
`the scan data matches the biometric data;
`
`responsive to a determination that the scan data matches the
`biometric data, wirelessly sending one or more codes from the
`plurality of codes and the other data values for authentication by an
`agent that is a third-party trusted authority possessing a list of
`device ID codes uniquely identifying legitimate integrated devices,
`
`wherein the one or more codes and other data values includes the
`device ID code; and
`
`responsive to authentication of the one or more codes and the other
`data values by the agent, receiving an access message from the
`agent allowing the user access to an application,
`
`wherein the application is selected from a group consisting of a
`casino machine, a keyless lock, a garage door opener, an ATM
`machine, a hard drive, computer software, a web site and a file.
`
`The method of claim 1, wherein the one or more codes and the other
`data values are transmitted to the agent over a network.
`
`ix
`
`
`
`Ex. 1003
`
`Claim
`
`U.S. Patent No. 8,352,730
`
`3
`
`4
`
`5
`
`6
`
`7.
`
`8pre
`
`8A
`
`8B
`
`8C
`
`8D
`
`8E
`
`The method of claim 1, further comprising: registering an age
`verification for the user in association with the device ID code.
`
` The method of claim 1, wherein the one or more codes and the
`other data values indicate that the biometric verification was
`successful.
`
`The method of claim 1, wherein the biometric data and the scan data
`are both based on a fingerprint scan by the user.
`
`The method of claim 1, further comprising: establishing a secure
`communication channel prior to sending the one or more codes and
`the other data values for authentication.
`
`The method of claim 1, further comprising: receiving a request for
`the one or more codes and the other data values without a request
`for biometric verification; and responsive to receiving the request
`for the one or more codes and the other data values without a
`request for biometric verification, sending the one or more codes
`and the other data values without requesting the scan data.
`
`An integrated device for verifying a user during authentication of
`the integrated device, comprising:
`
`a memory stores biometric data of a user and a plurality of codes
`and other data values comprising a device ID code uniquely
`identifying the integrated device and a secret decryption value in a
`tamper proof format written to the memory that is unable to be
`subsequently altered;
`
`wherein the biometric data is selected from a group consisting of a
`palm print, a retinal scan, an iris scan, a hand geometry, a facial
`recognition, a signature recognition and a voice recognition;
`
`a verification unit, in communication with the memory, receives
`scan data from a biometric scan for comparison against the
`biometric data,
`
`and if the scan data matches the biometric data,
`
`wirelessly sends one or more codes from the plurality of codes and
`the other data values for authentication by an agent that is a third-
`
`x
`
`
`
`
`
`
`
`
`Ex. 1003
`
`Claim
`
`U.S. Patent No. 8,352,730
`
`party trusted authority possessing a list of device ID codes uniquely
`identifying legitimate integrated devices, wherein the one or more
`codes and the other data values includes the device ID code; and
`
`responsive to the agent authenticating the one or more codes and the
`other data values,
`
`receives an access message from the agent allowing the user access
`to an application,
`
`wherein the application is selected from a group consisting of a
`casino machine, a keyless lock, a garage door opener, an ATM
`machine, a hard drive, computer software, a web site and a file.
`
`The integrated device of claim 8, wherein the one or more codes and
`the other data values are transmitted to the agent over a network.
`
`The integrated device of claim 9, wherein an age verification is
`registered in association with the device ID code.
`
`The integrated device of claim 8, wherein the verifier comprises: an
`LED to be activated for requesting the biometric scan.
`
`8F
`
`8G
`
`8H
`
`9
`
`10
`
`11
`
`
`
`
`
`xi
`
`
`
`
`
`
`
`
`
`
`Ex. 1003
`
`GROUNDS OF CHALLENGE (37 C.F.R. § 42.204(b)(2))
`
`No. Ground for Challenge
`
`1
`
`2
`
`3
`
`4
`
`Scott, Russell, and Lapsley render obvious Claims 1-2, 4-9, and 11
`
`Scott, Russell, Lapsley, and Robinson render obvious Claims 3 and
`10
`
`Scott, Russell, Lapsley, and Rhoads render obvious Claim 6
`
`Berardi, Rosen, Shreve, and Kinoshita render obvious Claims 1-2,
`4-6, 8-9, and 11
`
`xii
`
`
`
`
`
`
`
`
`
`
`
`
`
`I.
`
`INTRODUCTION
`
`Ex. 1003
`
`1.
`
`I have been retained by Petitioner Samsung Electronics America,
`
`Inc. to provide an opinion on the validity of U.S. Patent No. 8,352,730, owned
`
`by Patent Owner Proxense, LLC. My opinions are based on information
`
`currently available to me. To the extent that additional information becomes
`
`available, I reserve the right to continue my investigation and study, which
`
`may include a review of documents and information that recently have been
`
`or may be produced, as well as testimony from depositions that may yet be
`
`taken in this case. I may thus expand or modify my opinions as my
`
`investigation and study continues. I may also supplement my opinions in
`
`response to any additional information that becomes available to me or that
`
`Patent Owner makes available, any matters raised by Patent Owner and/or
`
`opinions provided by Patent Owner’s experts, or in light of any relevant orders
`
`from the Patent Trial and Appeal Board.
`
`II. EDUCATION AND WORK EXPERIENCE
`
`2.
`
`A copy of my curriculum vitae that fully sets forth my
`
`qualifications can be found at Ex. 1004. Below is a summary of my education,
`
`work experience, and other qualifications.
`
`3.
`
`In 1985, I earned a B.S.E.E. degree in Electrical Engineering and
`
`Computer Science from The Johns Hopkins University. In 1987, I received
`
`
`
`1
`
`
`
`
`
`an M.S. degree in Electrical and Computer Engineering from Carnegie Mellon
`
`Ex. 1003
`
`University. In 1992, I received a Ph.D. in Computer Engineering from
`
`Carnegie Mellon University. My doctoral dissertation proposed a new
`
`approach for the architecture of a computer processor.
`
`4.
`
`I have more than 35 years of experience as a computer architect,
`
`computer system designer, personal computer graphics designer, educator,
`
`and executive in the electronics industry.
`
`5.
`
`In 1983, I began designing touch sensors, microprocessor-based
`
`computer systems, and I/O (input/output) cards for personal computers as a
`
`senior design engineer for Touch Technology, Inc. During the course of my
`
`design projects with Touch Technology, I designed I/O cards for PC-
`
`compatible computer systems, including the IBM PC-AT, to interface with
`
`interactive touch-based computer terminals that I designed for use in public
`
`information systems. I continued designing and developing related
`
`technology as a consultant to the Carroll Touch division of AMP, Inc., where
`
`in 1986 I designed one of the first custom touch-screen integrated circuits. I
`
`designed the touch/pen input system for the Linus WriteTop, which many
`
`believe to be the first commercial tablet computer.
`
`6.
`
`From 1986 through 1987, I designed and built a high-
`
`performance computer system as a student at Carnegie Mellon University.
`
`
`
`2
`
`
`
`
`
`From 1986 through early 1988, I also developed the curriculum and
`
`Ex. 1003
`
`supervised the teaching laboratory for processor design courses.
`
`7.
`
`In the latter part of 1989, I worked as a senior design engineer
`
`for ESL-TRW Advanced Technology Division. While at ESL-TRW, I
`
`designed and built a bus interface and memory controller for a workstation-
`
`based computer system, and also worked on the design of a multiprocessor
`
`system.
`
`8.
`
`At the end of 1989, I (along with some partners) reacquired the
`
`rights to the technology I had developed at Touch Technology and at AMP
`
`and founded The Graphics Technology Company. Over the next seven years,
`
`as an officer and a consultant for The Graphics Technology Company, I
`
`managed the company's engineering development activities and personally
`
`developed dozens of touch screen sensors, controllers, and interactive touch-
`
`based computer systems.
`
`9.
`
`I have consulted, formally and informally, for a number of
`
`fabless semiconductor companies. In particular, I have served on the technical
`
`advisory boards for two processor design companies: BOPS, Inc., where I
`
`chaired the board; and Siroyan Ltd., where I served in a similar role for three
`
`networking chip companies—Intellon, Inc., Comsilica, Inc., and Entridia,
`
`Inc.—and one 3D game accelerator company, Ageia, Inc.
`
`
`
`3
`
`
`
`Ex. 1003
`
`
`
`
`10.
`
`I have also served as a technology advisor to Motorola and to
`
`several venture capital funds in the U.S. and Europe. Currently, I am a
`
`director of Turtle Beach Corporation, providing guidance in its development
`
`of premium audio peripheral devices for a variety of commercial electronic
`
`products.
`
`11. From 1991 through 1997, I served on the Faculty of Princeton
`
`University as an Assistant Professor of Electrical Engineering. At Princeton,
`
`I taught undergraduate and graduate-level courses in Computer Architecture,
`
`Advanced Computer Architecture, Display Technology, and Microprocessor
`
`Systems, and conducted sponsored research in the area of computer systems
`
`and related topics. I was also a principal investigator for DOD research in
`
`video technology and a principal investigator for the New Jersey Center for
`
`Multimedia Research. From 1999 through 2002, while a Consulting Professor,
`
`I taught a Computer Architecture course to both undergraduate and graduate
`
`students at Stanford University. At Princeton, I received several teaching
`
`awards, both from students and from the School of Engineering. I have also
`
`taught advanced microprocessor architecture to industry professionals in
`
`seminars sponsored by the Institute of Electrical and Electronics Engineers
`
`(“IEEE”) and the Association for Computing Machinery (“ACM”). I am
`
`
`
`4
`
`
`
`
`
`currently a lecturer at Santa Clara University teaching courses on
`
`Ex. 1003
`
`Microprocessor Systems, Real-Time Computing, and Mechatronics.
`
`12. From 1997 through 2002, I held a variety of executive positions
`
`at a publicly-held fabless semiconductor company originally called S3, Inc.
`
`and later called SonicBlue Inc. I held the positions of Chief Technology
`
`Officer, Vice President of Systems Integration Products, Senior Vice
`
`President of Business Development, and Director of Technology, among
`
`others. At the time I joined S3, the company supplied graphics accelerators
`
`for more than 50% of the PCs sold in the United States. At S3 I supervised
`
`the design of several PC graphics accelerators. During my time at SonicBlue
`
`we launched more than 30 new consumer electronics products including
`
`devices to support copy-protected video and many of the first commercial
`
`products to support copy-protected internet audio content. These included
`
`some of the first consumer products to support playback of encrypted content
`
`using digital rights management (DRM) based security. I also worked with
`
`Universal Music Group and Sony Entertainment on the development of
`
`systems for distribution and management of secure, encrypted content.
`
`13.
`
`I have published more than fifty peer-reviewed papers in
`
`computer architecture and computer systems and IC design. I also have
`
`chaired IEEE and ACM conferences in microarchitecture and integrated
`
`
`
`5
`
`
`
`
`
`circuit design and served as an associate editor for IEEE and ACM journals.
`
`Ex. 1003
`
`I served on the IEEE Computer Society Awards committee. I am a Senior
`
`Member of IEEE and a Member of ACM. I am a named inventor on at least
`
`fifty-seven U.S. patents and thirty-seven foreign patents, which are listed in
`
`my curriculum vitae. Some of these patents relate to encryption systems.
`
`14.
`
`In 2002, I was the invited keynote speaker at the ACM/IEEE
`
`International Symposium on Microarchitecture and at the International
`
`Conference on Multimedia. From 1990 through 2005, I have also been an
`
`invited speaker on various aspects of technology and the PC industry at
`
`numerous industry events including the Intel Developer’s Forum, Microsoft
`
`Windows Hardware Engineering Conference, Microprocessor Forum,
`
`Embedded Systems Conference, Comdex, and Consumer Electronics Show,
`
`as well as at the Harvard Business School and the University of Illinois Law
`
`School. I have been interviewed on subjects related to computer graphics and
`
`video technology and the electronics industry by publications such as the Wall
`
`Street Journal, New York Times, Los Angeles Times, Time, Newsweek,
`
`Forbes, and Fortune as well as on CNN, NPR, and the BBC. I have also
`
`spoken at dozens of universities including MIT, Stanford, University of Texas,
`
`Carnegie Mellon University, UCLA, University of Michigan, Rice University,
`
`and Duke University.
`
`
`
`6
`
`
`
`
`
`III. COMPENSATION
`
`Ex. 1003
`
`15.
`
`I am being compensated at my usual and customary hourly rate
`
`of $600 for my expert services in connection with this proceeding. My
`
`compensation does not depend in any way upon the outcome of this
`
`proceeding, the opinions I express, or the content of my testimony.
`
`IV. LEGAL PRINCIPLES
`
`16.
`
`I am informed that “prior art” includes patents and printed
`
`publications that existed before the earliest applicable filing date of the ’730
`
`Patent.
`
`17.
`
`I am informed that in order for a claim to be anticipated, each
`
`and every requirement of the claim must be found, expressly or inherently, in
`
`a single prior art reference as recited in the claim.
`
`18.
`
`I am informed that a claimed invention is not patentable if the
`
`claimed invention would have been obvious to a person of ordinary skill in
`
`the field of the invention at the time the invention was made.
`
`19.
`
`I am informed that in order to show obviousness based on a
`
`combin