throbber
Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 1 of 25
`
`Exhibit A
`
`Patent Owner Exhibit 2003, Page 1 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 2 of 25
`
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`PROXENSE, LLC,
`
`
`Plaintiff,
`
`
`vs.
`
`SAMSUNG ELECTRONICS, CO., LTD.
`AND SAMSUNG ELECTRONICS
`AMERICA, INC.,
`
`Defendant.
`
`
`
`
`Case Nos. 6:21-cv-00210-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`
`
`
`
`
`
`
`DECLARATION OF DR. SETH JAMES NIELSON IN SUPPORT OF SAMSUNG’S
`OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`1
`
`Patent Owner Exhibit 2003, Page 2 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 3 of 25
`
`
`
`I, Seth James Nielson, declare as follows:
`
`
`
`1.
`
`I am qualified and authorized to attest to the matters set forth in this Declaration. I
`
`have knowledge of the facts set forth in this Declaration based on my own personal information
`
`or investigation into the relevant subject matter.
`
`I.
`
`INTRODUCTION
`
`2.
`
`I am over the age of 18 and am competent to make this Declaration. I have personal
`
`knowledge or have developed knowledge of these technologies based upon education, training, or
`
`experience, of the matters set forth herein.
`
`3.
`
`I have been retained by counsel for defendants Samsung Electronics, Co., Ltd. and
`
`Samsung Electronics America, Inc. (collectively, “Samsung”) as an expert to provide opinions
`
`regarding the understanding of a person of ordinary skill in the art (“POSITA”) in connection with
`
`certain terms in the claims of U.S. Patent Nos. 8,352,730 (the “’730 patent”), 9,049,188 (the “’188
`
`patent”), 9,235,700 (the “’700 patent”), 9,298,905 (the “’905 patent”), and 10,698,989 (the “’989
`
`patent”) (collectively, “Patents-in-Suit”).
`
`4.
`
`I am being compensated at my usual hourly rate of $600 per hour. I am also being
`
`reimbursed for any out-of-pocket expenses. I have no financial interest in, or affiliation with,
`
`Samsung. My compensation does not depend in any way on the outcome of this case, the substance
`
`of my testimony, or opinions that I express.
`
`5.
`
`In rendering my opinions, I have considered the patents at issue, their file histories,
`
`the parties’ claim construction disclosures, and any other documents referenced, discussed, or
`
`listed in my declaration, and my own knowledge and experience in the user interface, computer
`
`networking, wireless communications,
`
`telecommunications networks, relational database
`
`
`
`
`2
`
`Patent Owner Exhibit 2003, Page 3 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 4 of 25
`
`
`
`management system, data structures, algorithms, and other computing fields relevant to the
`
`asserted patents.
`
`6.
`
`In forming my opinions, I understand that the claims should be interpreted as they
`
`would be understood by a POSITA of the patent at the time its application was filed. I understand
`
`that the claims are to be construed with reference to the patent’s specification, the claims, the
`
`prosecution history, in light of the plain meaning of the terms used in the claims, and with potential
`
`reference to other sources of information, such as dictionaries, textbooks, and literature or other
`
`patents in the same or related fields.
`
`7.
`
`My analysis of the materials produced in this matter is ongoing and I will continue
`
`to review any new material as it is provided. This declaration represents only those opinions I
`
`have formed to date. I reserve the right to amend or supplement my opinions based on additional
`
`documents or evidence I am presented, including without limitation any arguments or expert
`
`declarations advanced by either party in this case.
`
`I.
`
`QUALIFICATIONS AND EXPERIENCE
`
`8.
`
`My qualifications are summarized below and are addressed more fully in my CV
`
`attached as Exhibit A to this declaration.
`
`9.
`
`I am a subject matter expert in cyber security, including the sub-fields of applied
`
`cryptography and network security. I am the Founder and Chief Scientist of Crimson Vista, a
`
`computer security research and engineering company. Furthermore, I hold appointments at the
`
`University of Texas at Austin as an Adjunct Associate Professor in the Department of Computer
`
`Science and as a Cybersecurity Fellow in the Robert Strauss Center for International Security and
`
`Law.
`
`10.
`
`I have been working professionally in the field of computer security since August
`
`of 2005 and within the field of computer science generally since June 2000. My experience
`
`
`
`
`3
`
`Patent Owner Exhibit 2003, Page 4 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 5 of 25
`
`
`
`includes graduate-level teaching, academic research, industry employment, and consulting
`
`practice.
`
`11.
`
`I received my B.S. in Computer Science in April of 2000. During my final
`
`undergraduate semester, I worked both as a teaching assistant for a Computer Networking course
`
`and as a researcher in the Networked Computing Lab. In these capacities, I assisted students in
`
`debugging and designing TCP/IP protocol stacks, Address Resolution Protocol implementations,
`
`and Remote Procedure Call projects. I have collaborated on investigations of statistical traffic
`
`engineering for bandwidth allocation, including a published paper entitled, “Effective Bandwidth
`
`for Traffic Engineering.”
`
`12.
`
`After graduation (from 2001 through 2003), I worked as a software engineer at
`
`Metrowerks (formerly Lineo, Inc.), where I had substantial responsibilities relating to software
`
`architecture, computer networking, and technical project management.
`
`13.
`
`As part of my technical training and development at Lineo/Metrowerks, I also
`
`gained and employed a wide exposure to computer networking and an introduction to network
`
`security. I tested and evaluated a prototype firewall product, built a custom VPN solution, and
`
`trained in the use of web server and mail server administration. I ran my own personal MTA with
`
`an IMAP and POP3 server based on these tools under development.
`
`14.
`
`Another major networking project involved porting the Embedix SDK from Linux
`
`to Windows. For this project I used a virtual-machine/networked solution. The underlying SDK
`
`engine remained running in a Linux VM while the GUI operated in native Windows. I developed
`
`all of the code for this remote communication system.
`
`15.
`
`Additionally, the SDK provided extensibility through a scripting system based on
`
`Python. A critical task was to make the existing Python scripts, built to run in Linux, work
`
`
`
`
`4
`
`Patent Owner Exhibit 2003, Page 5 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 6 of 25
`
`
`
`unmodified with the new Windows system. I engineered a framework that automatically
`
`intercepted certain Python commands and sent them across the network to the other side, similar
`
`to RPC technology. From the perspective of the scripts, all of the function calls were local when,
`
`in fact, certain operations were executed remotely.
`
`16. While working at Lineo/Metrowerks, I also returned to BYU to pursue my Master’s
`
`degree in Computer Science. In addition to the graduate level course work in wireless computer
`
`networks and compilers, I pursued graduate research in software engineering topics, with a special
`
`emphasis on how programmers think while creating and modifying code. My research included a
`
`study of computer architectural patterns and how those patterns might need to change as
`
`programming languages change and evolve. Based on my research, I proposed a concept called
`
`“Design Dysphasia,” wherein a programmer or software developer becomes trapped in their
`
`approach to solving problems based on the paradigms and design approaches of the programming
`
`language. My research was published as “Design dysphasia and the pattern maintenance cycle,”
`
`in the Journal Information and Software Technology August 2006. This work also was a major
`
`component of my Master’s thesis.
`
`17.
`
`After finishing my Master’s degree, I moved to Houston TX in 2004 to begin a PhD
`
`program at Rice University. At this point, my interest in computer security took priority over my
`
`interests in programming languages and software engineering, and my classes and research were
`
`directed to that topic.
`
`18.
`
`During the 2004 fall semester of my Ph.D. program at Rice University, I identified
`
`a security vulnerability in the Google Desktop Search that could have allowed hackers to
`
`compromise users’ computers and obtain private information. After contacting Google and
`
`assisting them in closing the vulnerability, we published the details of our investigation.
`
`
`
`
`5
`
`Patent Owner Exhibit 2003, Page 6 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 7 of 25
`
`
`
`19.
`
`In 2005, I completed an internship at Google, where I designed and implemented a
`
`solution to privacy loss in Google Web Accelerator. The Google Web Accelerator was designed
`
`to increase the speed of browsing the Internet. Once installed on a user’s computer, the browser
`
`would request all content through a Google Proxy. The proxy performed pre-fetching and
`
`extensive caching in order to provide fast and responsive service to the user. At the time of my
`
`internship, news reports had identified odd problems in which users of the Accelerator were
`
`accessing other individual’s private pages. During my internship, I designed and implemented a
`
`prototype solution for this issue in C++.
`
`20.
`
`In 2005, I published a paper entitled, “A Taxonomy of Rational Attacks.” This
`
`paper categorized and described the various types of attacks that one might see in a decentralized,
`
`peer-to-peer network. When there is no centralized authority, users have to cooperate to obtain
`
`service. The term “rational attacks” refers to the economic incentives to not cooperate while still
`
`exploiting the system for service.
`
`21. My Ph.D. Thesis was entitled “Designing Incentives for Peer-to-Peer Systems,”
`
`and it built on this concept. Given a network where participants cannot be forced to cooperate, the
`
`operation of said network must induce cooperation by design of the outcomes. In other words, it
`
`must be in each participant’s best interest to contribute to the cooperative operation. I conducted
`
`experiments including simulated extensions to the BitTorrent peer-to-peer protocol for long-term
`
`identities and mechanisms for cooperative anonymity.
`
`22.
`
`From 2005 through 2008, with the approval of my PhD adviser, I worked as a
`
`Security Analyst and for Independent Security Evaluators (ISE). Much of my early work was
`
`spent developing a software encryption library, including the necessary tests and procedures for
`
`
`
`
`6
`
`Patent Owner Exhibit 2003, Page 7 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 8 of 25
`
`
`
`FIPS-certification. The encryption library provided advanced operations such as secure data
`
`splitting and recovery.
`
`23.
`
`In 2009, I went to work full time for ISE as a Security Analyst and later as a Senior
`
`Security Analyst. I built a number of advanced projects including a parallel-program for massive
`
`code coverage analysis, GPU hardware-accelerated AES encryption, and encrypted file-system
`
`prototypes.
`
`24.
`
`In addition to the software development, I also performed security evaluation
`
`services that included port-scanning analyses, security protocol analysis using formal and
`
`exploratory methods, and investigated security breaches.
`
`25.
`
`I also designed and managed the implementation of a secure communication
`
`technology that splits trust between multiple SSL Certificate Authorities (CA), so that if one CA
`
`is compromised, the communication stream can still be safely authenticated. My work on the
`
`secure communications technology project led to the issuance of multiple patents. In total, I wrote
`
`hundreds of thousands of lines of code in C, C++, and Python, including projects where I had to
`
`implement the same functionality in two separate languages.
`
`26.
`
`In 2011, I began work as a Research Scientist at Harbor Labs and continued with
`
`that consulting firm until fall 2015. I worked with a wide range of clients, specializing in network
`
`security, network communications, software architecture, and programming languages. I analyzed
`
`an extensive collection of commercial software, including software related to secure email, cloud-
`
`based multimedia delivery, document signing, anti-virus and anti-intrusion, high-performance
`
`routing, networking protocol stacks in mobile devices, PBX telecommunications software, VoIP,
`
`and peer-to-peer communications. I also analyzed security considerations for potential technology
`
`acquisitions.
`
`
`
`
`7
`
`Patent Owner Exhibit 2003, Page 8 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 9 of 25
`
`
`
`27.
`
`Also at Harbor Labs, I reviewed technology and source code for multiple clients
`
`related to accusations of theft and/or misappropriation of trade secrets. These engagements
`
`included an analysis of C, C++, Java, Python, and other source code languages in high-frequency
`
`trading, e-commerce, and other similar systems.
`
`28.
`
`I also assessed the security and privacy technologies and policies provided by a
`
`third-party vendor to the Center for Copyright Infringement (CCI). CCI represents content owners,
`
`such as the RIAA and the MPAA, in finding and reducing piracy online.
`
`29.
`
`For other clients, I have “resurrected” or re-created legacy software systems. For
`
`example, I assisted one client make code from the mid 90’s operational. I helped them identify
`
`the most compatible components from an old CVS repository, obtain the necessary legacy
`
`hardware and software to rebuild the source code, and diagnose why the separate components
`
`weren’t completely compatible with each other. Using tools from the era (i.e., the mid-90’s), I
`
`identified and fixed these issues in C++ and Java code, and successfully demonstrated the
`
`operational system.
`
`30.
`
`In other similar examples, I re-created basic software in x86 Assembly code that
`
`mimicked the behavior of 1990’s era viruses, wrote a file transfer system similar to FTP in pre-2.0
`
`Java, and demonstrated the use of a command-line antivirus software adapted for router/gateway
`
`scanning.
`
`31.
`
`During my final year at Harbor Labs, I was engaged as the principal consultant with
`
`a large biomedical device firm in a twelve-month analysis of the security of their products.
`
`Notably, medical devices were for some time not considered significant threats in terms of
`
`computer security. However, recent demonstrations by security researchers of the various ways
`
`in which a malicious individual might harm a person using a medical device has shifted the
`
`
`
`
`8
`
`Patent Owner Exhibit 2003, Page 9 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 10 of 25
`
`
`
`thinking in the industry. Accordingly, I was engaged to assist this company in the analysis of their
`
`products, their process, and their future roadmap in order to ensure that patients are not harmed.
`
`My team and I analyzed design documents, hardware, and a broad range of additional resources in
`
`order to expose potential problems. The security of these systems depends, in part, on the
`
`architecture and deployment of the networks in which they operate.
`
`32.
`
`In May 2016, I founded Crimson Vista, Inc. as a boutique computer security
`
`engineering company. Similar to the work that I did at Harbor Labs, I continue to provide technical
`
`expertise to a wide range of clients in areas of programming languages, computer networks, and
`
`network security. My expertise in the area of “security engineering” provides comprehensive
`
`analysis, design, and insight into cybersecurity concerns before, during, and after development.
`
`33.
`
`For example, I have been retained by a start-up in telecommunications security to
`
`provide cryptography expertise and evaluations of their protocols and architectures. My team and
`
`I have prototyped new protocols, written up analyses, and presented to potential partners and
`
`investors.
`
`34.
`
`Another start-up company retained me for guidance in matters relating to
`
`Blockchain and Smart Contracts. This technology is very much dealing with a “fad” phase where
`
`there is a lot of misinformation and hype. I guided the start-up company through where these kinds
`
`of technologies would help and where they would not. I have also provided training on Blockchain
`
`at the Data Architecture Summit and Enterprise Data World conferences.
`
`35.
`
`I have also provided technical guidance to an antitrust team in the United States
`
`Department of Justice. Although the technologies and parties are confidential, I can disclose that
`
`I provided in-person training on technical topics and analyses of competing security products.
`
`
`
`
`9
`
`Patent Owner Exhibit 2003, Page 10 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 11 of 25
`
`
`
`36. More recently, I been retained by clients, including a Fortune 100 financial
`
`institution, to provide them with post-data-breach analyses of what went wrong, the impact of the
`
`lost data, and guidance on resolution. In these engagements, I provided reverse engineering of the
`
`data to demonstrate how an attacker can or would use the compromised information, analyzed
`
`software development to determine when the system became vulnerable, and helped identify
`
`impacted customers that had been missed in the investigations.
`
`37.
`
`Through Crimson Vista, I also invest in research and development. Recent projects
`
`include engaging with a partner to implement prototypes of communications security protocols for
`
`next-generation automobiles. I also gave a talk on “Detecting Malicious Sandboxes” at the
`
`Workshop on Defensive Deception and Trust in Autonomy, in association with the 2018 Naval
`
`Applications of Machine Learning Workshop.
`
`38.
`
`I also continue to perform a wide range of code reviews for diverse technologies
`
`including CAD software, video game systems, digital mobile radios (DMRs), video streaming,
`
`and digital rights management (DRM).
`
`39. Moreover, I maintain ties to academia. I have held adjunct appointments at Johns
`
`Hopkins University from 2014 to 2019. From July 2016 to July 2019 I also held an appointment
`
`as the Director of Advanced Research Projects in the Johns Hopkins University Information
`
`Security Institute.
`
`40.
`
`At Johns Hopkins University I taught Network security and Advanced Network
`
`Security. I created a custom curriculum and lab experience wherein students develop their own
`
`security protocols as a class and then attempt to break their own creations. Students learn how
`
`hard it is to get security right, and how easy it is to find something wrong. I published a paper
`
`
`
`
`10
`
`Patent Owner Exhibit 2003, Page 11 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 12 of 25
`
`
`
`about the labwork in the Journal of Computer Science Education entitled, “PLAYGROUND:
`
`Preparing Students for the Cyber Battleground.”
`
`41.
`
`The labwork in the advanced course builds on the same framework, but adds in
`
`mobile, autonomous vehicles in a game-like simulation. Students program “bots” with computer
`
`program “brains,” that are used to gather resources, attack, communicate, and so forth. The
`
`students explore various opportunities for compromising the brains of the other students as part of
`
`the labs.
`
`42.
`
`One of the components of the students’ lab work is to create a protected “sandbox”
`
`for running untrusted code. The sandbox must provide access to the system in a manner that cannot
`
`be exploited. Conversely, the other half of their assignment is to design exploitative code that
`
`attempts to bypass and/or neutralize the protections of the sandbox environment. This
`
`experimental framework enables the students to learn about creating, identifying, and neutralizing
`
`malware such as viruses.
`
`43.
`
`Beyond course instruction, I also mentored Masters students at Johns Hopkins in
`
`their capstone projects. These projects include networking security and privacy concerns across a
`
`wide range of technologies including cryptography, drone security, iOS security, BitCoin, SSL
`
`vulnerabilities, and Twitter “botnets.” My students and I have published multiple papers from
`
`these capstone projects.
`
`44.
`
`During my tenure as the Director of Advanced Research Projects, I was tasked with
`
`developing collaborative research opportunities. Through my efforts, a wide range of student
`
`capstones have been executed with partners from the Johns Hopkins Applied Physics Lab or
`
`outside corporate partners.
`
`
`
`
`11
`
`Patent Owner Exhibit 2003, Page 12 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 13 of 25
`
`
`
`45.
`
`For example, we coordinated with the company OnBoard Security to develop better
`
`security for anti-collision protocols for air traffic. Students demonstrated the potential issues
`
`related to leaving the protocol unsecured and built a working prototype of a secured variant.
`
`OnBoard and Johns Hopkins published press releases which were picked up by aviation-focused
`
`news sources.
`
`46.
`
`I am now an adjunct professor at the University of Texas at Austin. I teach the
`
`undergraduate Network Security and Privacy class in the Computer Science department. I also
`
`teach the Introduction to Cybersecurity Technology class in the Law School
`
`47.
`
`I am also the co-founder and current director of the Crypto Done Right Foundation,
`
`a non-profit. The foundation grew out of a research project initially hosted at Johns Hopkins
`
`University and funded by a grant from Cisco. Crypto Done Right is designed to bridge the gap
`
`between cryptography SME’s and the IT professionals that use it. It provides authoritative
`
`guidance on deployment, lifecycle, and management of cryptography in IT systems, software
`
`development, and technical management.
`
`48.
`
`I am also the author of “Cryptography in Python: Learning Correct Cryptography
`
`by Example.”
`
`II.
`
`LEGAL STANDARDS
`
`A.
`
`Claim Construction
`
`49.
`
`I am not a lawyer, and I do not intend to offer any opinions as to the interpretation
`
`of the law. However, I have a general understanding of claim construction based on my experience
`
`with patents, my work as an expert in other cases, and my conversations with counsel.
`
`50.
`
`I am informed that on the law regarding claim construction and patent claims, a
`
`patent may include two types of claims, independent claims and dependent claims. An
`
`
`
`
`12
`
`Patent Owner Exhibit 2003, Page 13 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 14 of 25
`
`
`
`independent claim stands alone and includes only the limitations it recites. A dependent claim can
`
`depend from an independent claim.
`
`51.
`
`I am informed that claim construction is a matter of law to be decided by the Court.
`
`I understand that claim terms are presumed to have their plain and ordinary meaning, as understood
`
`by a POSITA at the time of the invention, in the context of the patent specification, the prosecution
`
`history, and any other relevant evidence.
`
`52.
`
`I am informed that to determine how a POSITA would understand a claim term,
`
`one should look to those sources available that show what a person of skill in the art would have
`
`understood the disputed claim language to mean. Such sources include the words of the claims
`
`themselves, the remainder of the patent’s specification, the prosecution history of the patent and
`
`the cited references (all considered “intrinsic” evidence), and “extrinsic” evidence, such as
`
`dictionary definitions, learned treatises and the opinions of qualified experts concerning relevant
`
`scientific principles, the meaning of technical terms, and the state of the art.
`
`53.
`
`I am informed that, in construing a claim term, one looks primarily to the intrinsic
`
`patent evidence, including the words of the claims themselves, the remainder of the patent
`
`specification, and the prosecution history.
`
`54.
`
`I am informed that extrinsic evidence, which is evidence external to the patent and
`
`the prosecution history, may also be useful in interpreting patent claims when the intrinsic evidence
`
`itself is insufficient.
`
`55.
`
`In construing claims, the claims themselves, the patent specification, and the
`
`prosecution history are of paramount importance. Additionally, the specification and prosecution
`
`history must be consulted to confirm whether the patentee has acted as its own lexicographer (i.e.,
`
`
`
`
`13
`
`Patent Owner Exhibit 2003, Page 14 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 15 of 25
`
`
`
`provided its own special meaning to any disputed terms), or intentionally disclaimed, disavowed,
`
`or surrendered any claim scope.
`
`56.
`
`I understand that the claims of a patent define the scope of the rights conferred by
`
`the patent. The claims must particularly point out and distinctly claim the subject matter which
`
`the patentee regards as his invention. Because the patentee is required to define precisely what he
`
`claims his invention to be, it is improper to construe claims in a manner different from the plain
`
`import of the terms used consistent with the specification. Accordingly, a claim construction
`
`analysis must begin with and remain centered on the claim language itself. Additionally, the
`
`context in which a term is used in the asserted claim can be highly instructive. Likewise, other
`
`claims of the patent in question, both asserted and unasserted, can inform the meaning of a claim
`
`term. For example, because claim terms are normally used consistently throughout the patent, the
`
`usage of a term in one claim can often illuminate the meaning of the same term in other claims.
`
`Differences among claims can also be a useful guide in understanding the meaning of particular
`
`claim terms.
`
`57.
`
`I understand that a POSITA is deemed to read a claim term not only in the context
`
`of the particular claim in which the disputed term appears, but in the context of the entire patent,
`
`including the specification. For this reason, the words of the claim must be interpreted in view of
`
`the entire specification. The specification is the primary basis for construing the claims and
`
`provides a safeguard such that correct constructions closely align with the specification.
`
`Ultimately, the interpretation to be given a term can only be determined and confirmed with a full
`
`understanding of what the inventors actually invented and intended to envelope with the claim as
`
`set forth in the patent itself.
`
`
`
`
`14
`
`Patent Owner Exhibit 2003, Page 15 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 16 of 25
`
`
`
`58.
`
`I understand that while intrinsic evidence is of primary importance, extrinsic
`
`evidence, e.g., all evidence external to the patent and prosecution history, including expert and
`
`inventor testimony, dictionaries, and learned treatises, can also be considered. For example,
`
`technical dictionaries may help one better understand the underlying technology and the way in
`
`which one of skill in the art might use the claim terms. Extrinsic evidence should not be
`
`considered, however, divorced from the context of the intrinsic evidence. Evidence beyond the
`
`patent specification, prosecution history, and other claims in the patent should not be relied upon
`
`unless the claim language is ambiguous in light of these intrinsic sources. Moreover, while
`
`extrinsic evidence can shed useful light on the relevant art, it is less significant than the intrinsic
`
`record in determining the legally operative meaning of the claim language.
`
`B.
`
`Indefiniteness
`
`59.
`
`I understand that a patent must satisfy a definiteness requirement under 35 U.S.C.
`
`§112, ¶2, which requires that it conclude with one or more claims particularly pointing out and
`
`distinctly claiming the subject matter which the applicant regards as the invention.
`
`60.
`
`I understand that definiteness requires that a patent’s claims, viewed in light of the
`
`specification and file history from the perspective of a person skilled in the relevant art, inform
`
`those skilled in the art about the scope of the invention with reasonable certainty.
`
`61.
`
`I understand that a patent must be precise enough to afford clear notice of what is
`
`claimed and apprise the public of what is still open to them in a manner that avoids a zone of
`
`uncertainty which enterprise and experimentation may enter only at the risk of infringement
`
`claims.
`
`62.
`
`I understand that patents are presumed valid and indefiniteness is an invalidity
`
`defense. So, I understand that indefiniteness must be shown by clear and convincing evidence.
`
`III. LEVEL OF ORDINARY SKILL IN THE ART
`
`
`
`
`15
`
`Patent Owner Exhibit 2003, Page 16 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 17 of 25
`
`
`
`63.
`
`I understand that the claims must be understood from the perspective of a POSITA
`
`at the time of the alleged inventions. I also understand that to determine the level of skill of a
`
`POSITA, one must consider several factors including the types of problems encountered in the art,
`
`the solutions to those problems, the rapidity with which innovations are made, the sophistication
`
`of the technology, and the education level of active workers in the field. I further understand that
`
`the ’730, ’905, and ’989 patents originate from a common application and relate to substantially
`
`similar subject matter, as such the level of ordinary skill in the art of these patents would be the
`
`same. I understand this to be the same with regard to the ’188 and ’700 patents.
`
`64.
`
`In my opinion, with respect to the Patents-in-Suit, a POSITA at the time of the
`
`alleged inventions would have had a bachelor’s degree in computer or electrical engineering (or
`
`an equivalent degree) with at least three years of experience in the field of encryption and security
`
`(or an equivalent). This level of skill is approximate, and more experience would compensate for
`
`less formal education, and vice versa.
`
`65.
`
`I meet these criteria and consider myself a person with at least ordinary skill in the
`
`art pertaining to the asserted patents. I would have been such a person at the time of the invention
`
`of each of the asserted patents.
`
`66.
`
`I applied this level of skill of a POSITA for purposes of my analysis in this
`
`Declaration. To my knowledge, none of Proxense’s experts has yet proposed an alternative level
`
`of skill of a POSITA in this case. If and when they do, I reserve the right to provide further
`
`opinions concerning the appropriateness of that proposed level of skill of a POSITA, and to provide
`
`further opinions concerning any impact that the alternative level of skill of a person of ordinary
`
`skill would have on my analysis.
`
`IV.
`
`PATENTS IN SUIT
`
`
`
`
`16
`
`Patent Owner Exhibit 2003, Page 17 of 25
`
`

`

`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 18 of 25
`
`
`
`67.
`
`I understand the ’730 patent, the ’905 patent and the ’989 patent are all part of the
`
`same family, and are in the same chain of continuations, and therefore share substantially identical
`
`specifications. Furthermore, many of the claims of the ’730 patent, the ’905 patent and the ’989
`
`patent use the same phrases or share similar structure. Because of the substantially identical
`
`specifications and the overlap in claim language, a POSITA would interpret the claim terms of the
`
`’730 patent, the ’905 patent and the ’989 patent in the same context.
`
`68.
`
` Similarly, I understand the ’188 patent and the ’700 patent are part of the same
`
`family, and are in the same chain of continuations, and therefore share substantially identical
`
`specifications. Furthermore, many of the claims of the ’188 patent and the ’700 patent use the
`
`same phrases or share similar structure. Because of the substantially identical specifications and
`
`the overlap in claim language, a POSITA would interpret the claim terms of the ’188 patent and
`
`the ’700 patent in the same context.
`
`V.
`
`“THIRD PARTY TRUSTED AUTHORITY”
`
`69.
`
`In my opinion, a POSITA would not understand the term “third party trusted
`
`authority” to be “a third component that provides a second level of authentication” according to
`
`Proxense’s construction. In particular a POSITA would have understood

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket