throbber
Ex. 1003
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`––––––––––––––
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`––––––––––––––
`
`SAMSUNG ELECTRONICS AMERICA, INC,
`Petitioner
`
`v.
`
`PROXENSE, LLC
`Patent Owner
`––––––––––––––
`
`IPR2021-01448
`Patent 10,698,989
`––––––––––––––
`
`DECLARATION OF ANDREW WOLFE IN SUPPORT OF
`PETITION FOR INTER PARTES REVIEW
`
`

`

`
`
`TABLE OF CONTENTS
`
`Ex. 1003
`
`Page
`
`DECLARATION OF ANDREW WOLFE IN SUPPORT OF .......................1
`
`PETITION FOR INTER PARTES REVIEW ...................................................1
`
`I.
`
`II.
`
`INTRODUCTION .................................................................................1
`
`EDUCATION AND WORK EXPERIENCE .......................................1
`
`III. COMPENSATION ................................................................................7
`
`IV. LEGAL PRINCIPLES ...........................................................................7
`
`V.
`
`LEVEL OF SKILL IN THE ART .........................................................8
`
`VI. OVERVIEW OF THE ’989 PATENT ..................................................9
`
`VII. PROSECUTION OF THE ’989 PATENT ............................................9
`
`VIII. CLAIM CONSTRUCTION ............................................................... 11
`
`IX. CITED ART ....................................................................................... 11
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`G.
`
`H.
`
`I.
`
`Scott (WO1999056429) ........................................................... 11
`
`Russell (US20040044627) ....................................................... 12
`
`Lapsley (US2001/0000535) ..................................................... 13
`
`Robinson (US2003/0177102) .................................................. 13
`
`Rhoads (US2004/0153649) ...................................................... 14
`
`Berardi (US 7239226) .............................................................. 14
`
`Rosen (US6175921) ................................................................. 15
`
`Shreve (US2004/0153649) ....................................................... 15
`
`Kinoshita (US2003/0055792) .................................................. 16
`
`X. GROUND 1: CLAIMS 1-9 ARE RENDERED OBVIOUS BY
`SCOTT AND LAPSLEY. .................................................................. 16
`
`A.
`
`Claim 1 ..................................................................................... 16
`
`1.
`
`2.
`
`[1pre]: A method comprising: ...................................... 16
`
`[1A]: receiving, at a smartphone, an identification
`(ID) code from a third-party trusted authority, the
`ID code uniquely identifying the smartphone
`among a plurality of smartphones; ................................ 17
`
`
`
`i
`
`

`

`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`10.
`
`
`
`Ex. 1003
`
`[1B]: persistently storing biometric data and the ID
`code on the smartphone, ................................................ 18
`
`[1C]: wherein the biometric data is one selected
`from a group consisting of facial recognition, a
`fingerprint scan, and a retinal scan of a legitimate
`user; ................................................................................ 19
`
`[1D]: receiving, at the smartphone, scan data from
`a biometric scan using the smartphone; ......................... 20
`
`[1E]: comparing, using the smartphone, the scan
`data to the biometric data; .............................................. 21
`
`[1F]: determining whether the scan data matches
`the biometric data; and ................................................... 21
`
`[1G]: responsive to a determination that the scan
`data matches the biometric data, wirelessly
`sending, from the smartphone, the ID code for
`comparison by the third-party trusted authority
`against one or more previously registered ID codes
`maintained by the third-party trusted authority, ............ 21
`
`(1) Motivation to Combine........................................ 24
`
`[1H]: a transaction being completed responsive to
`the third-party trusted authority successfully
`authenticating the ID code, ............................................ 25
`
`[1I]: wherein the transaction being completed
`includes accessing one or more from a group
`consisting of a casino machine, a keyless lock, an
`ATM machine, a web site, a file and a financial
`account. .......................................................................... 26
`
`B.
`
`Claim 2: “[t]he method of claim 1, further comprising:
`Receiving a request for biometric verification, and
`responsive to a determination that the scan data does not
`match the biometric data, indicating the smartphone
`cannot verify the scan data as being from the legitimate
`user, the smartphone does not send the ID code.” ................... 26
`
`(1) Motivation to Combine........................................ 27
`
`C.
`
`Claim 3: “[t]he method of claim 1, wherein completing
`the transaction includes accessing an application.” ................. 28
`
`
`
`ii
`
`

`

`
`
`Ex. 1003
`
`D.
`
`Claim 4: “[t]he method of claim 1, wherein the
`transaction being completed responsive to the third-party
`trusted authority successfully authenticating the ID code
`includes the third-party trusted authority sending an
`indication that the third-party trusted authority
`authenticated the ID code to another party.” ........................... 28
`
`E.
`
`Claim 5: .................................................................................... 29
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`10.
`
`[5pre]: A smartphone comprising: ................................. 29
`
`[5A]: a persistent storage having an input that
`receives an identification (ID) code from a third-
`party trusted authority, and biometric data, ................... 29
`
`[5B]: wherein the biometric data is one selected
`from a group consisting of facial recognition, a
`fingerprint scan, and a retinal scan, of a legitimate
`user ................................................................................. 29
`
`[5C]: the ID code uniquely identifying the
`smartphone among a plurality of smartphones .............. 30
`
`[5D]: the persistent storage storing the biometric
`data and the ID code, ..................................................... 30
`
`[5E]: the persistent storage having an output
`configured to provide a first set of biometric data
`and the ID code for use on the smartphone; .................. 30
`
`[5F]: a validation module, coupled to
`communicate with the persistent storage to receive
`the biometric data from the persistent storage, .............. 30
`
`[5G]: the validation module having a scan pad to
`capture scan data from a biometric scan, ....................... 31
`
`[5H]: the validation module comparing the scan
`data to the biometric data to determine whether the
`scan data matches the biometric data; and ..................... 31
`
`[5I]: a wireless transceiver that, responsive to a
`determination that the scan data matches the
`biometric data, sends the ID code for comparison
`by the third-party trusted authority against one or
`more previously registered ID codes maintained by
`the third-party trusted authority, .................................... 31
`
`
`
`iii
`
`

`

`
`
`Ex. 1003
`
`11.
`
`12.
`
`[5J]: a transaction being completed responsive to
`the third-party trusted authority successfully
`authenticating the ID code, ............................................ 31
`
`[5K]: wherein the transaction being completed
`includes accessing one or more from a group
`consisting of a casino machine, a keyless lock, an
`ATM machine, a web site, a file and a financial
`account. .......................................................................... 32
`
`F.
`
`Claim 6: “[t]he smartphone of claim 5, wherein the ID
`code is transmitted to the third-party trusted authority
`over a network.” ....................................................................... 32
`
`G.
`
`Claim 7 ..................................................................................... 32
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`[7pre]: A system, comprising: ...................................... 32
`
`[7A]: a smartphone that persistently stores
`biometric data and an ID code ....................................... 32
`
`[7B]: wherein the biometric data is one selected
`from a group consisting of facial recognition, a
`fingerprint scan, and a retinal scan data of a
`legitimate user ................................................................ 32
`
`[7C]: and the ID code is received from a third-
`party trusted authority, the ID code uniquely
`identifying the smartphone among a plurality of
`smartphones ................................................................... 33
`
`[7D]: the smartphone configured to indicate that a
`biometric authentication is requested ............................ 33
`
`[7E]: the smartphone configured to wirelessly send
`the ID code to the third-party trusted authority for
`authentication responsive to determining that scan
`data from a biometric scan performed using the
`smartphone matches the biometric data of the
`legitimate user, ............................................................... 34
`
`[7F]: wherein a transaction is completed
`responsive to successful authentication of the ID
`code by the third-party trusted authority ....................... 34
`
`[7G]: wherein the transaction being completed
`includes accessing one or more from a group
`
`
`
`iv
`
`

`

`
`
`Ex. 1003
`
`9.
`
`10.
`
`consisting of a casino machine, a keyless lock, an
`ATM machine, a web site, a file and a financial
`account; and ................................................................... 35
`
`[7H]: the third-party trusted authority operated by
`a third party .................................................................... 35
`
`[7I]: the third-party trusted authority storing a
`plurality of legitimate ID codes and authenticating
`the ID code received based on a comparison of the
`ID code received and the legitimate ID codes
`included in the plurality of the legitimate ID codes. ..... 36
`
`H.
`
`Claim 8: “[t]he system of claim 7, wherein the
`smartphone receives an authentication request, and in
`response, requests biometric scan from a user to generate
`the scan data and, when the smartphone cannot verify the
`scan data as being from the legitimate user, the
`smartphone does not send the ID code.” .................................. 36
`
`I.
`
`Claim 9: “[t]he system of claim 7, wherein completing
`the transaction includes accessing an application.” ................. 36
`
`XI. GROUND 2: CLAIMS 1-9 ARE RENDERED OBVIOUS BY
`BERARDI, SHREVE, AND KINOSHITA. ...................................... 36
`
`A.
`
`Claim 1 ..................................................................................... 36
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`[1pre]: A method comprising: ...................................... 36
`
`[1A]: receiving, at a smartphone, an identification
`(ID) code from a third-party trusted authority, the
`ID code uniquely identifying the smartphone
`among a plurality of smartphones; ................................ 37
`
`[1B]: persistently storing biometric data and the ID
`code on the smartphone, ................................................ 39
`
`[1C]: wherein the biometric data is one selected
`from a group consisting of facial recognition, a
`fingerprint scan, and a retinal scan of a legitimate
`user; ................................................................................ 40
`
`[1D]: receiving, at the smartphone, scan data from
`a biometric scan using the smartphone; ......................... 40
`
`
`
`v
`
`

`

`6.
`
`7.
`
`8.
`
`9.
`
`10.
`
`
`
`Ex. 1003
`
`[1E]: comparing, using the smartphone, the scan
`data to the biometric data; .............................................. 41
`
`[1F]: determining whether the scan data matches
`the biometric data; and ................................................... 41
`
`[1G]: responsive to a determination that the scan
`data matches the biometric data, wirelessly
`sending, from the smartphone, the ID code for
`comparison by the third-party trusted authority
`against one or more previously registered ID codes
`maintained by the third-party trusted authority, ............ 41
`
`(1) Motivation to Combine........................................ 43
`
`[1H]: a transaction being completed responsive to
`the third-party trusted authority successfully
`authenticating the ID code, ............................................ 43
`
`(1) Motivation to Combine........................................ 44
`
`[1I]: wherein the transaction being completed
`includes accessing one or more from a group
`consisting of a casino machine, a keyless lock, an
`ATM machine, a web site, a file and a financial
`account. .......................................................................... 45
`
`B.
`
`C.
`
`D.
`
`Claim 2: “[t]he method of claim 1, further comprising:
`Receiving a request for biometric verification, and
`responsive to a determination that the scan data does not
`match the biometric data, indicating the smartphone
`cannot verify the scan data as being from the legitimate
`user, the smartphone does not send the ID code.” ................... 45
`
`Claim 3: “[t]he method of claim 1, wherein completing
`the transaction includes accessing an application.” ................. 47
`
`Claim 4: “[t]he method of claim 1, wherein the
`transaction being completed responsive to the third-party
`trusted authority successfully authenticating the ID code
`includes the third-party trusted authority sending an
`indication that the third-party trusted authority
`authenticated the ID code to another party.” ........................... 48
`
`E.
`
`Claim 5: .................................................................................... 48
`
`1.
`
`[5pre]: A smartphone comprising: ................................. 48
`
`
`
`vi
`
`

`

`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`10.
`
`11.
`
`12.
`
`
`
`Ex. 1003
`
`[5A]: a persistent storage having an input that
`receives an identification (ID) code from a third-
`party trusted authority, and biometric data, ................... 48
`
`[5B]: wherein the biometric data is one selected
`from a group consisting of facial recognition, a
`fingerprint scan, and a retinal scan, of a legitimate
`user ................................................................................. 49
`
`[5C]: the ID code uniquely identifying the
`smartphone among a plurality of smartphones .............. 49
`
`[5D]: the persistent storage storing the biometric
`data and the ID code, ..................................................... 49
`
`[5E]: the persistent storage having an output
`configured to provide a first set of biometric data
`and the ID code for use on the smartphone; .................. 50
`
`[5F]: a validation module, coupled to
`communicate with the persistent storage to receive
`the biometric data from the persistent storage, .............. 50
`
`[5G]: the validation module having a scan pad to
`capture scan data from a biometric scan, ....................... 50
`
`[5H]: the validation module comparing the scan
`data to the biometric data to determine whether the
`scan data matches the biometric data; and ..................... 50
`
`[5I]: a wireless transceiver that, responsive to a
`determination that the scan data matches the
`biometric data, sends the ID code for comparison
`by the third-party trusted authority against one or
`more previously registered ID codes maintained by
`the third-party trusted authority, .................................... 51
`
`[5J]: a transaction being completed responsive to
`the third-party trusted authority successfully
`authenticating the ID code, ............................................ 51
`
`[5K]: wherein the transaction being completed
`includes accessing one or more from a group
`consisting of a casino machine, a keyless lock, an
`ATM machine, a web site, a file and a financial
`account. .......................................................................... 51
`
`
`
`vii
`
`

`

`
`
`Ex. 1003
`
`F.
`
`Claim 6: “[t]he smartphone of claim 5, wherein the ID
`code is transmitted to the third-party trusted authority
`over a network.” ....................................................................... 51
`
`G.
`
`Claim 7 ..................................................................................... 51
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`10.
`
`[7pre]: A system, comprising: ...................................... 51
`
`[7A]: a smartphone that persistently stores
`biometric data and an ID code ....................................... 52
`
`[7B]: wherein the biometric data is one selected
`from a group consisting of facial recognition, a
`fingerprint scan, and a retinal scan data of a
`legitimate user ................................................................ 52
`
`[7C]: and the ID code is received from a third-
`party trusted authority, the ID code uniquely
`identifying the smartphone among a plurality of
`smartphones ................................................................... 52
`
`[7D]: the smartphone configured to indicate that a
`biometric authentication is requested ............................ 52
`
`[7E]: the smartphone configured to wirelessly send
`the ID code to the third-party trusted authority for
`authentication responsive to determining that scan
`data from a biometric scan performed using the
`smartphone matches the biometric data of the
`legitimate user, ............................................................... 52
`
`[7F]: wherein a transaction is completed
`responsive to successful authentication of the ID
`code by the third-party trusted authority ....................... 52
`
`[7G]: wherein the transaction being completed
`includes accessing one or more from a group
`consisting of a casino machine, a keyless lock, an
`ATM machine, a web site, a file and a financial
`account; and ................................................................... 53
`
`[7H]: the third-party trusted authority operated by
`a third party .................................................................... 53
`
`[7I]: the third-party trusted authority storing a
`plurality of legitimate ID codes and authenticating
`the ID code received based on a comparison of the
`
`
`
`viii
`
`

`

`
`
`Ex. 1003
`
`ID code received and the legitimate ID codes
`included in the plurality of the legitimate ID codes. ..... 53
`
`H.
`
`Claim 8: “[t]he system of claim 7, wherein the
`smartphone receives an authentication request, and in
`response, requests biometric scan from a user to generate
`the scan data and, when the smartphone cannot verify the
`scan data as being from the legitimate user, the
`smartphone does not send the ID code.” .................................. 53
`
`I.
`
`Claim 9: “[t]he system of claim 7, wherein completing
`the transaction includes accessing an application.” ................. 54
`
`XII. SECONDARY CONSIDERATIONS ................................................ 54
`
`XIII. CONCLUSION .................................................................................. 54
`
`
`
`
`ix
`
`

`

`Ex. 1003
`
`LIST OF EXHIBITS
`
`Exhibit
`
`Description
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`U.S. Patent No. 10,698,989
`
`File History for U.S. Patent No. 10,698,989
`
`Declaration of Andrew Wolfe, Ph.D.
`
`Curriculum vitae of Andrew Wolfe, Ph.D.
`
`International App. No. WO 1999056429 to Scott et al.
`
`Intentionally Left Blank
`
`U.S. Patent Pub. No. 2001/0000535 A1 to Lapsley et al.
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`U.S. Patent No. 7,239,226 B2 to Berardi et al.
`
`Intentionally Left Blank
`
`U.S. Patent Pub. No. 2002/0109580 A1 to Shreve et al.
`
`U.S. Patent Pub. No. 2003/0055792 A1 to Kinoshita et al.
`
`“Applied Cryptography—Protocols, Algorithms, and Source
`Code in C” (1996) by Schneier
`
`Declaration of Sylvia Hall-Ellis, Ph.D.
`
`Intentionally Left Blank
`
`
`
`x
`
`
`
`
`
`
`
`
`
`

`

`Ex. 1003
`
`LIST OF CHALLENGED CLAIMS
`
`Claim
`
`U.S. Patent No. 9,298,905
`
`1pre
`
`A method comprising:
`
`1A
`
`1B
`
`1C
`
`1D
`
`1E
`
`2
`
`3
`
`4
`
`5
`
`persistently storing biometric data of a legitimate user and an ID code on
`an integrated device;
`
`responsive to receiving a request for a biometric verification of a user,
`receiving, from a biometric sensor, scan data from a biometric scan
`performed by the biometric sensor;
`
`comparing the scan data to the biometric data to determine whether the
`scan data matches the biometric data;
`
`responsive to a determination that the scan data matches the biometric
`data, wirelessly sending the ID code for comparison by a third-party
`trusted authority against one or more previously registered ID codes
`maintained by the third-party trusted authority; and
`
`responsive to receiving an access message from the third-party trusted
`authority-indicating that the third-party trusted authority successfully
`authenticated the ID code, allowing the user to complete a financial
`transaction.
`
`The method of claim 1, further comprising: registering an age
`verification for the user in association with the ID code.
`
`The method of claim 1, wherein an indication that the biometric
`verification was successful is sent with the ID code.
`
`The method of claim 1, wherein the biometric data includes data from
`one or more of a fingerprint, palm print, a retinal scan, an iris scan, a
`hand geometry, a facial recognition, a signature recognition and a voice
`recognition.
`
`The method of claim 1, wherein the integrated device comprises one or
`more of a mobile phone, tablet, laptop, mp3 player, mobile gaming
`device, watch and a key fob.
`
`xi
`
`
`
`
`
`
`

`

`Ex. 1003
`
`
`
`
`6
`
`7
`
`The method of claim 1, wherein completing the financial transaction
`includes accessing an application.
`
`he method of claim 1, wherein completing the financial transaction
`includes accessing one or more of a casino machine, a keyless lock, an
`ATM machine, a web site, a file and a financial account.
`
`8pre
`
`The method of claim 1, further comprising:
`
`8A
`
`8B
`
`responsive to determining the action does not require biometric
`verification, receiving a request for the ID code without a request for
`biometric verification; and
`
`wherein the biometric data is selected from a group consisting of a palm
`print, a retinal scan, an iris scan, a hand geometry, a facial recognition, a
`signature recognition and a voice recognition;
`
`9pre
`
`An integrated device comprising:
`
`9A
`
`9B
`
`9C
`
`10
`
`11
`
`12
`
`a persistent storage media that persistently stores biometric data of a user
`and an ID code;
`
`a validation module, coupled to communicate with the persistent storage
`media, that receives scan data from a biometric scan for comparison
`against the biometric data,
`a validation module . . .that sends the ID code for comparison by a third-
`party trusted authority against one or more previously registered ID
`codes maintained by the third-party trusted authority; and
`
`a radio frequency communication module that receives an access
`message from the third-party trusted authority indicating that the third-
`party trusted authority successfully authenticated the ID code sent to the
`third-party trusted authority based on the comparison of the ID code and
`allowing the user to—complete a financial transaction.
`
`The integrated device of claim 7, wherein the ID code is transmitted to
`the third-party trusted authority over a network.
`
`The integrated device of claim 7, wherein an age verification is
`registered in association with the ID code.
`
`The integrated device of claim 7, wherein the integrated device
`comprises one or more of a mobile phone, tablet, laptop, mp3 player,
`mobile gaming device, watch and a key fob.
`
`
`
`xii
`
`

`

`
`
`
`
`
`
`
`Ex. 1003
`Ex. 1003
`
`
`
`
`
`xiii
`xiii
`
`

`

`Ex. 1003
`
`GROUNDS OF CHALLENGE (37 C.F.R. § 42.204(b)(2))
`
`No. Ground for Challenge
`
`1
`
`2
`
`3
`
`Scott and Lapsley render obvious Claims 1, 3-10, and 12
`
`Scott, Lapsley, and Robinson render obvious Claims 2 and 11
`
`Berardi, Shreve, and Kinoshita render obvious Claims 1, 3-7, 9-10,
`and 12
`
`xiv
`
`
`
`
`
`
`
`
`
`

`

`
`
`I.
`
`INTRODUCTION
`
`Ex. 1003
`
`1.
`
`I have been retained by Petitioner Samsung Electronics America,
`
`Inc. to provide an opinion on the validity of U.S. Patent No. 10,698,989,
`
`owned by Patent Owner Proxense, LLC. My opinions are based on
`
`information currently available to me. To the extent that additional
`
`information becomes available, I reserve the right to continue my
`
`investigation and study, which may include a review of documents and
`
`information that recently have been or may be produced, as well as testimony
`
`from depositions that may yet be taken in this case. I may thus expand or
`
`modify my opinions as my investigation and study continues. I may also
`
`supplement my opinions in response to any additional information that
`
`becomes available to me or that Patent Owner makes available, any matters
`
`raised by Patent Owner and/or opinions provided by Patent Owner’s experts,
`
`or in light of any relevant orders from the Patent Trial and Appeal Board.
`
`II. EDUCATION AND WORK EXPERIENCE
`
`2.
`
`A copy of my curriculum vitae that fully sets forth my
`
`qualifications can be found at Ex. 1004. Below is a summary of my education,
`
`work experience, and other qualifications.
`
`3.
`
`In 1985, I earned a B.S.E.E. degree in Electrical Engineering and
`
`Computer Science from The Johns Hopkins University. In 1987, I received
`
`
`
`1
`
`

`

`
`
`an M.S. degree in Electrical and Computer Engineering from Carnegie Mellon
`
`Ex. 1003
`
`University. In 1992, I received a Ph.D. in Computer Engineering from
`
`Carnegie Mellon University. My doctoral dissertation proposed a new
`
`approach for the architecture of a computer processor.
`
`4.
`
`I have more than 35 years of experience as a computer architect,
`
`computer system designer, personal computer graphics designer, educator,
`
`and executive in the electronics industry.
`
`5.
`
`In 1983, I began designing touch sensors, microprocessor-based
`
`computer systems, and I/O (input/output) cards for personal computers as a
`
`senior design engineer for Touch Technology, Inc. During the course of my
`
`design projects with Touch Technology, I designed I/O cards for PC-
`
`compatible computer systems, including the IBM PC-AT, to interface with
`
`interactive touch-based computer terminals that I designed for use in public
`
`information systems. I continued designing and developing related
`
`technology as a consultant to the Carroll Touch division of AMP, Inc., where
`
`in 1986 I designed one of the first custom touch-screen integrated circuits. I
`
`designed the touch/pen input system for the Linus WriteTop, which many
`
`believe to be the first commercial tablet computer.
`
`6.
`
`From 1986 through 1987, I designed and built a high-
`
`performance computer system as a student at Carnegie Mellon University.
`
`
`
`2
`
`

`

`
`
`From 1986 through early 1988, I also developed the curriculum and
`
`Ex. 1003
`
`supervised the teaching laboratory for processor design courses.
`
`7.
`
`In the latter part of 1989, I worked as a senior design engineer
`
`for ESL-TRW Advanced Technology Division. While at ESL-TRW, I
`
`designed and built a bus interface and memory controller for a workstation-
`
`based computer system, and also worked on the design of a multiprocessor
`
`system.
`
`8.
`
`At the end of 1989, I (along with some partners) reacquired the
`
`rights to the technology I had developed at Touch Technology and at AMP
`
`and founded The Graphics Technology Company. Over the next seven years,
`
`as an officer and a consultant for The Graphics Technology Company, I
`
`managed the company's engineering development activities and personally
`
`developed dozens of touch screen sensors, controllers, and interactive touch-
`
`based computer systems.
`
`9.
`
`I have consulted, formally and informally, for a number of
`
`fabless semiconductor companies. In particular, I have served on the technical
`
`advisory boards for two processor design companies: BOPS, Inc., where I
`
`chaired the board; and Siroyan Ltd., where I served in a similar role for three
`
`networking chip companies—Intellon, Inc., Comsilica, Inc., and Entridia,
`
`Inc.—and one 3D game accelerator company, Ageia, Inc.
`
`
`
`3
`
`

`

`Ex. 1003
`
`
`
`
`10.
`
`I have also served as a technology advisor to Motorola and to
`
`several venture capital funds in the U.S. and Europe. Currently, I am a
`
`director of Turtle Beach Corporation, providing guidance in its development
`
`of premium audio peripheral devices for a variety of commercial electronic
`
`products.
`
`11.
`
`From 1991 through 1997, I served on the Faculty of Princeton
`
`University as an Assistant Professor of Electrical Engineering. At Princeton,
`
`I taught undergraduate and graduate-level courses in Computer Architecture,
`
`Advanced Computer Architecture, Display Technology, and Microprocessor
`
`Systems, and conducted sponsored research in the area of computer systems
`
`and related topics. I was also a principal investigator for DOD research in
`
`video technology and a principal investigator for the New Jersey Center for
`
`Multimedia Research. From 1999 through 2002, while a Consulting Professor,
`
`I taught a Computer Architecture course to both undergraduate and graduate
`
`students at Stanford University. At Princeton, I received several teaching
`
`awards, both from students and from the School of Engineering. I have also
`
`taught advanced microprocessor architecture to industry professionals in
`
`seminars sponsored by the Institute of Electrical and Electronics Engineers
`
`(“IEEE”) and the Association for Computing Machinery (“ACM”). I am
`
`
`
`4
`
`

`

`
`
`currently a lecturer at Santa Clara University teaching courses on
`
`Ex. 1003
`
`Microprocessor Systems, Real-Time Computing, and Mechatronics.
`
`12.
`
`From 1997 through 2002, I held a variety of executive positions
`
`at a publicly-held fabless semiconductor company originally called S3, Inc.
`
`and later called SonicBlue Inc. I held the positions of Chief Technology
`
`Officer, Vice President of Systems Integration Products, Senior Vice
`
`President of Business Development, and Director of Technology, among
`
`others. At the time I joined S3, the company supplied graphics accelerators
`
`for more than 50% of the PCs sold in the United States. At S3 I supervised
`
`the design of several PC graphics accelerators. During my time at SonicBlue
`
`we launched more than 30 new consumer electronics products including
`
`devices to support copy-protected video and many of the first commercial
`
`products to support copy-protected internet audio content. These included
`
`some of the first consumer products to support playback of encrypted content
`
`using digital rights management (DRM) based security. I also worked with
`
`Universal Music Group and Sony Entertainment on the development of
`
`systems for distribution and management of secure, encrypted content.
`
`13.
`
`I have published more than fifty peer-reviewed papers in
`
`computer architecture and computer systems and IC design. I also have
`
`chaired IEEE and ACM conferences in microarchitecture and integrated
`
`
`
`5
`
`

`

`
`
`circuit design and served as an associate editor for IEEE and ACM journals.
`
`Ex. 1003
`
`I served on the IEEE Computer Society Awards committee. I am a Senior
`
`Member of IEEE and a Member of ACM. I am a named inventor on at least
`
`fifty-seven U.S. patents and thirty-seven foreign patents, which are listed in
`
`my curriculum vitae. Some of these patents relate to encryption systems
`
`14.
`
`In 2002, I was the invited keynote speaker at the ACM/IEEE
`
`International Symposium on Microarchitecture and at the International
`
`Conference on Multimedia. From 1990 through 2005, I have also been an
`
`invited speaker on various aspects of technology and the PC industry at
`
`numerous industry events including the Intel Developer’s Forum, Microsoft
`
`Windows Hardware Engineering Conference, Microprocessor Forum,
`
`Embedded Systems Conference, Comdex, and Consumer Electronics Show,
`
`as well as at the Harvard Business School and the University of Illinois Law
`
`School. I have been interviewed on subjects related to computer graphics and
`
`video technology and the electronics industry by publications such as the Wall
`
`Street Journal, New York Times, Los Angeles Times, Time, Newsweek,
`
`Forbes, and Fortune as well as on CNN, NPR, and the BBC. I have also
`
`spoken at dozens of universities including MIT, Stanford, University of Texas,
`
`Carnegie Mellon University, UCLA, University of Michigan, Rice University,
`
`and Duke University.
`
`
`
`6
`
`

`

`
`
`III. COMPENSATION
`
`Ex. 1003
`
`15.
`
`I am being comp

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket