`
`Exhibit A
`
`Patent Owner Exhibit 2003, Page 1 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 2 of 25
`
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`PROXENSE, LLC,
`
`
`Plaintiff,
`
`
`vs.
`
`SAMSUNG ELECTRONICS, CO., LTD.
`AND SAMSUNG ELECTRONICS
`AMERICA, INC.,
`
`Defendant.
`
`
`
`
`Case Nos. 6:21-cv-00210-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`
`
`
`
`
`
`
`DECLARATION OF DR. SETH JAMES NIELSON IN SUPPORT OF SAMSUNG’S
`OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`1
`
`Patent Owner Exhibit 2003, Page 2 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 3 of 25
`
`
`
`I, Seth James Nielson, declare as follows:
`
`
`
`1.
`
`I am qualified and authorized to attest to the matters set forth in this Declaration. I
`
`have knowledge of the facts set forth in this Declaration based on my own personal information
`
`or investigation into the relevant subject matter.
`
`I.
`
`INTRODUCTION
`
`2.
`
`I am over the age of 18 and am competent to make this Declaration. I have personal
`
`knowledge or have developed knowledge of these technologies based upon education, training, or
`
`experience, of the matters set forth herein.
`
`3.
`
`I have been retained by counsel for defendants Samsung Electronics, Co., Ltd. and
`
`Samsung Electronics America, Inc. (collectively, “Samsung”) as an expert to provide opinions
`
`regarding the understanding of a person of ordinary skill in the art (“POSITA”) in connection with
`
`certain terms in the claims of U.S. Patent Nos. 8,352,730 (the “’730 patent”), 9,049,188 (the “’188
`
`patent”), 9,235,700 (the “’700 patent”), 9,298,905 (the “’905 patent”), and 10,698,989 (the “’989
`
`patent”) (collectively, “Patents-in-Suit”).
`
`4.
`
`I am being compensated at my usual hourly rate of $600 per hour. I am also being
`
`reimbursed for any out-of-pocket expenses. I have no financial interest in, or affiliation with,
`
`Samsung. My compensation does not depend in any way on the outcome of this case, the substance
`
`of my testimony, or opinions that I express.
`
`5.
`
`In rendering my opinions, I have considered the patents at issue, their file histories,
`
`the parties’ claim construction disclosures, and any other documents referenced, discussed, or
`
`listed in my declaration, and my own knowledge and experience in the user interface, computer
`
`networking, wireless communications,
`
`telecommunications networks, relational database
`
`
`
`
`2
`
`Patent Owner Exhibit 2003, Page 3 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 4 of 25
`
`
`
`management system, data structures, algorithms, and other computing fields relevant to the
`
`asserted patents.
`
`6.
`
`In forming my opinions, I understand that the claims should be interpreted as they
`
`would be understood by a POSITA of the patent at the time its application was filed. I understand
`
`that the claims are to be construed with reference to the patent’s specification, the claims, the
`
`prosecution history, in light of the plain meaning of the terms used in the claims, and with potential
`
`reference to other sources of information, such as dictionaries, textbooks, and literature or other
`
`patents in the same or related fields.
`
`7.
`
`My analysis of the materials produced in this matter is ongoing and I will continue
`
`to review any new material as it is provided. This declaration represents only those opinions I
`
`have formed to date. I reserve the right to amend or supplement my opinions based on additional
`
`documents or evidence I am presented, including without limitation any arguments or expert
`
`declarations advanced by either party in this case.
`
`I.
`
`QUALIFICATIONS AND EXPERIENCE
`
`8.
`
`My qualifications are summarized below and are addressed more fully in my CV
`
`attached as Exhibit A to this declaration.
`
`9.
`
`I am a subject matter expert in cyber security, including the sub-fields of applied
`
`cryptography and network security. I am the Founder and Chief Scientist of Crimson Vista, a
`
`computer security research and engineering company. Furthermore, I hold appointments at the
`
`University of Texas at Austin as an Adjunct Associate Professor in the Department of Computer
`
`Science and as a Cybersecurity Fellow in the Robert Strauss Center for International Security and
`
`Law.
`
`10.
`
`I have been working professionally in the field of computer security since August
`
`of 2005 and within the field of computer science generally since June 2000. My experience
`
`
`
`
`3
`
`Patent Owner Exhibit 2003, Page 4 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 5 of 25
`
`
`
`includes graduate-level teaching, academic research, industry employment, and consulting
`
`practice.
`
`11.
`
`I received my B.S. in Computer Science in April of 2000. During my final
`
`undergraduate semester, I worked both as a teaching assistant for a Computer Networking course
`
`and as a researcher in the Networked Computing Lab. In these capacities, I assisted students in
`
`debugging and designing TCP/IP protocol stacks, Address Resolution Protocol implementations,
`
`and Remote Procedure Call projects. I have collaborated on investigations of statistical traffic
`
`engineering for bandwidth allocation, including a published paper entitled, “Effective Bandwidth
`
`for Traffic Engineering.”
`
`12.
`
`After graduation (from 2001 through 2003), I worked as a software engineer at
`
`Metrowerks (formerly Lineo, Inc.), where I had substantial responsibilities relating to software
`
`architecture, computer networking, and technical project management.
`
`13.
`
`As part of my technical training and development at Lineo/Metrowerks, I also
`
`gained and employed a wide exposure to computer networking and an introduction to network
`
`security. I tested and evaluated a prototype firewall product, built a custom VPN solution, and
`
`trained in the use of web server and mail server administration. I ran my own personal MTA with
`
`an IMAP and POP3 server based on these tools under development.
`
`14.
`
`Another major networking project involved porting the Embedix SDK from Linux
`
`to Windows. For this project I used a virtual-machine/networked solution. The underlying SDK
`
`engine remained running in a Linux VM while the GUI operated in native Windows. I developed
`
`all of the code for this remote communication system.
`
`15.
`
`Additionally, the SDK provided extensibility through a scripting system based on
`
`Python. A critical task was to make the existing Python scripts, built to run in Linux, work
`
`
`
`
`4
`
`Patent Owner Exhibit 2003, Page 5 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 6 of 25
`
`
`
`unmodified with the new Windows system. I engineered a framework that automatically
`
`intercepted certain Python commands and sent them across the network to the other side, similar
`
`to RPC technology. From the perspective of the scripts, all of the function calls were local when,
`
`in fact, certain operations were executed remotely.
`
`16. While working at Lineo/Metrowerks, I also returned to BYU to pursue my Master’s
`
`degree in Computer Science. In addition to the graduate level course work in wireless computer
`
`networks and compilers, I pursued graduate research in software engineering topics, with a special
`
`emphasis on how programmers think while creating and modifying code. My research included a
`
`study of computer architectural patterns and how those patterns might need to change as
`
`programming languages change and evolve. Based on my research, I proposed a concept called
`
`“Design Dysphasia,” wherein a programmer or software developer becomes trapped in their
`
`approach to solving problems based on the paradigms and design approaches of the programming
`
`language. My research was published as “Design dysphasia and the pattern maintenance cycle,”
`
`in the Journal Information and Software Technology August 2006. This work also was a major
`
`component of my Master’s thesis.
`
`17.
`
`After finishing my Master’s degree, I moved to Houston TX in 2004 to begin a PhD
`
`program at Rice University. At this point, my interest in computer security took priority over my
`
`interests in programming languages and software engineering, and my classes and research were
`
`directed to that topic.
`
`18.
`
`During the 2004 fall semester of my Ph.D. program at Rice University, I identified
`
`a security vulnerability in the Google Desktop Search that could have allowed hackers to
`
`compromise users’ computers and obtain private information. After contacting Google and
`
`assisting them in closing the vulnerability, we published the details of our investigation.
`
`
`
`
`5
`
`Patent Owner Exhibit 2003, Page 6 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 7 of 25
`
`
`
`19.
`
`In 2005, I completed an internship at Google, where I designed and implemented a
`
`solution to privacy loss in Google Web Accelerator. The Google Web Accelerator was designed
`
`to increase the speed of browsing the Internet. Once installed on a user’s computer, the browser
`
`would request all content through a Google Proxy. The proxy performed pre-fetching and
`
`extensive caching in order to provide fast and responsive service to the user. At the time of my
`
`internship, news reports had identified odd problems in which users of the Accelerator were
`
`accessing other individual’s private pages. During my internship, I designed and implemented a
`
`prototype solution for this issue in C++.
`
`20.
`
`In 2005, I published a paper entitled, “A Taxonomy of Rational Attacks.” This
`
`paper categorized and described the various types of attacks that one might see in a decentralized,
`
`peer-to-peer network. When there is no centralized authority, users have to cooperate to obtain
`
`service. The term “rational attacks” refers to the economic incentives to not cooperate while still
`
`exploiting the system for service.
`
`21. My Ph.D. Thesis was entitled “Designing Incentives for Peer-to-Peer Systems,”
`
`and it built on this concept. Given a network where participants cannot be forced to cooperate, the
`
`operation of said network must induce cooperation by design of the outcomes. In other words, it
`
`must be in each participant’s best interest to contribute to the cooperative operation. I conducted
`
`experiments including simulated extensions to the BitTorrent peer-to-peer protocol for long-term
`
`identities and mechanisms for cooperative anonymity.
`
`22.
`
`From 2005 through 2008, with the approval of my PhD adviser, I worked as a
`
`Security Analyst and for Independent Security Evaluators (ISE). Much of my early work was
`
`spent developing a software encryption library, including the necessary tests and procedures for
`
`
`
`
`6
`
`Patent Owner Exhibit 2003, Page 7 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 8 of 25
`
`
`
`FIPS-certification. The encryption library provided advanced operations such as secure data
`
`splitting and recovery.
`
`23.
`
`In 2009, I went to work full time for ISE as a Security Analyst and later as a Senior
`
`Security Analyst. I built a number of advanced projects including a parallel-program for massive
`
`code coverage analysis, GPU hardware-accelerated AES encryption, and encrypted file-system
`
`prototypes.
`
`24.
`
`In addition to the software development, I also performed security evaluation
`
`services that included port-scanning analyses, security protocol analysis using formal and
`
`exploratory methods, and investigated security breaches.
`
`25.
`
`I also designed and managed the implementation of a secure communication
`
`technology that splits trust between multiple SSL Certificate Authorities (CA), so that if one CA
`
`is compromised, the communication stream can still be safely authenticated. My work on the
`
`secure communications technology project led to the issuance of multiple patents. In total, I wrote
`
`hundreds of thousands of lines of code in C, C++, and Python, including projects where I had to
`
`implement the same functionality in two separate languages.
`
`26.
`
`In 2011, I began work as a Research Scientist at Harbor Labs and continued with
`
`that consulting firm until fall 2015. I worked with a wide range of clients, specializing in network
`
`security, network communications, software architecture, and programming languages. I analyzed
`
`an extensive collection of commercial software, including software related to secure email, cloud-
`
`based multimedia delivery, document signing, anti-virus and anti-intrusion, high-performance
`
`routing, networking protocol stacks in mobile devices, PBX telecommunications software, VoIP,
`
`and peer-to-peer communications. I also analyzed security considerations for potential technology
`
`acquisitions.
`
`
`
`
`7
`
`Patent Owner Exhibit 2003, Page 8 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 9 of 25
`
`
`
`27.
`
`Also at Harbor Labs, I reviewed technology and source code for multiple clients
`
`related to accusations of theft and/or misappropriation of trade secrets. These engagements
`
`included an analysis of C, C++, Java, Python, and other source code languages in high-frequency
`
`trading, e-commerce, and other similar systems.
`
`28.
`
`I also assessed the security and privacy technologies and policies provided by a
`
`third-party vendor to the Center for Copyright Infringement (CCI). CCI represents content owners,
`
`such as the RIAA and the MPAA, in finding and reducing piracy online.
`
`29.
`
`For other clients, I have “resurrected” or re-created legacy software systems. For
`
`example, I assisted one client make code from the mid 90’s operational. I helped them identify
`
`the most compatible components from an old CVS repository, obtain the necessary legacy
`
`hardware and software to rebuild the source code, and diagnose why the separate components
`
`weren’t completely compatible with each other. Using tools from the era (i.e., the mid-90’s), I
`
`identified and fixed these issues in C++ and Java code, and successfully demonstrated the
`
`operational system.
`
`30.
`
`In other similar examples, I re-created basic software in x86 Assembly code that
`
`mimicked the behavior of 1990’s era viruses, wrote a file transfer system similar to FTP in pre-2.0
`
`Java, and demonstrated the use of a command-line antivirus software adapted for router/gateway
`
`scanning.
`
`31.
`
`During my final year at Harbor Labs, I was engaged as the principal consultant with
`
`a large biomedical device firm in a twelve-month analysis of the security of their products.
`
`Notably, medical devices were for some time not considered significant threats in terms of
`
`computer security. However, recent demonstrations by security researchers of the various ways
`
`in which a malicious individual might harm a person using a medical device has shifted the
`
`
`
`
`8
`
`Patent Owner Exhibit 2003, Page 9 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 10 of 25
`
`
`
`thinking in the industry. Accordingly, I was engaged to assist this company in the analysis of their
`
`products, their process, and their future roadmap in order to ensure that patients are not harmed.
`
`My team and I analyzed design documents, hardware, and a broad range of additional resources in
`
`order to expose potential problems. The security of these systems depends, in part, on the
`
`architecture and deployment of the networks in which they operate.
`
`32.
`
`In May 2016, I founded Crimson Vista, Inc. as a boutique computer security
`
`engineering company. Similar to the work that I did at Harbor Labs, I continue to provide technical
`
`expertise to a wide range of clients in areas of programming languages, computer networks, and
`
`network security. My expertise in the area of “security engineering” provides comprehensive
`
`analysis, design, and insight into cybersecurity concerns before, during, and after development.
`
`33.
`
`For example, I have been retained by a start-up in telecommunications security to
`
`provide cryptography expertise and evaluations of their protocols and architectures. My team and
`
`I have prototyped new protocols, written up analyses, and presented to potential partners and
`
`investors.
`
`34.
`
`Another start-up company retained me for guidance in matters relating to
`
`Blockchain and Smart Contracts. This technology is very much dealing with a “fad” phase where
`
`there is a lot of misinformation and hype. I guided the start-up company through where these kinds
`
`of technologies would help and where they would not. I have also provided training on Blockchain
`
`at the Data Architecture Summit and Enterprise Data World conferences.
`
`35.
`
`I have also provided technical guidance to an antitrust team in the United States
`
`Department of Justice. Although the technologies and parties are confidential, I can disclose that
`
`I provided in-person training on technical topics and analyses of competing security products.
`
`
`
`
`9
`
`Patent Owner Exhibit 2003, Page 10 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 11 of 25
`
`
`
`36. More recently, I been retained by clients, including a Fortune 100 financial
`
`institution, to provide them with post-data-breach analyses of what went wrong, the impact of the
`
`lost data, and guidance on resolution. In these engagements, I provided reverse engineering of the
`
`data to demonstrate how an attacker can or would use the compromised information, analyzed
`
`software development to determine when the system became vulnerable, and helped identify
`
`impacted customers that had been missed in the investigations.
`
`37.
`
`Through Crimson Vista, I also invest in research and development. Recent projects
`
`include engaging with a partner to implement prototypes of communications security protocols for
`
`next-generation automobiles. I also gave a talk on “Detecting Malicious Sandboxes” at the
`
`Workshop on Defensive Deception and Trust in Autonomy, in association with the 2018 Naval
`
`Applications of Machine Learning Workshop.
`
`38.
`
`I also continue to perform a wide range of code reviews for diverse technologies
`
`including CAD software, video game systems, digital mobile radios (DMRs), video streaming,
`
`and digital rights management (DRM).
`
`39. Moreover, I maintain ties to academia. I have held adjunct appointments at Johns
`
`Hopkins University from 2014 to 2019. From July 2016 to July 2019 I also held an appointment
`
`as the Director of Advanced Research Projects in the Johns Hopkins University Information
`
`Security Institute.
`
`40.
`
`At Johns Hopkins University I taught Network security and Advanced Network
`
`Security. I created a custom curriculum and lab experience wherein students develop their own
`
`security protocols as a class and then attempt to break their own creations. Students learn how
`
`hard it is to get security right, and how easy it is to find something wrong. I published a paper
`
`
`
`
`10
`
`Patent Owner Exhibit 2003, Page 11 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 12 of 25
`
`
`
`about the labwork in the Journal of Computer Science Education entitled, “PLAYGROUND:
`
`Preparing Students for the Cyber Battleground.”
`
`41.
`
`The labwork in the advanced course builds on the same framework, but adds in
`
`mobile, autonomous vehicles in a game-like simulation. Students program “bots” with computer
`
`program “brains,” that are used to gather resources, attack, communicate, and so forth. The
`
`students explore various opportunities for compromising the brains of the other students as part of
`
`the labs.
`
`42.
`
`One of the components of the students’ lab work is to create a protected “sandbox”
`
`for running untrusted code. The sandbox must provide access to the system in a manner that cannot
`
`be exploited. Conversely, the other half of their assignment is to design exploitative code that
`
`attempts to bypass and/or neutralize the protections of the sandbox environment. This
`
`experimental framework enables the students to learn about creating, identifying, and neutralizing
`
`malware such as viruses.
`
`43.
`
`Beyond course instruction, I also mentored Masters students at Johns Hopkins in
`
`their capstone projects. These projects include networking security and privacy concerns across a
`
`wide range of technologies including cryptography, drone security, iOS security, BitCoin, SSL
`
`vulnerabilities, and Twitter “botnets.” My students and I have published multiple papers from
`
`these capstone projects.
`
`44.
`
`During my tenure as the Director of Advanced Research Projects, I was tasked with
`
`developing collaborative research opportunities. Through my efforts, a wide range of student
`
`capstones have been executed with partners from the Johns Hopkins Applied Physics Lab or
`
`outside corporate partners.
`
`
`
`
`11
`
`Patent Owner Exhibit 2003, Page 12 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 13 of 25
`
`
`
`45.
`
`For example, we coordinated with the company OnBoard Security to develop better
`
`security for anti-collision protocols for air traffic. Students demonstrated the potential issues
`
`related to leaving the protocol unsecured and built a working prototype of a secured variant.
`
`OnBoard and Johns Hopkins published press releases which were picked up by aviation-focused
`
`news sources.
`
`46.
`
`I am now an adjunct professor at the University of Texas at Austin. I teach the
`
`undergraduate Network Security and Privacy class in the Computer Science department. I also
`
`teach the Introduction to Cybersecurity Technology class in the Law School
`
`47.
`
`I am also the co-founder and current director of the Crypto Done Right Foundation,
`
`a non-profit. The foundation grew out of a research project initially hosted at Johns Hopkins
`
`University and funded by a grant from Cisco. Crypto Done Right is designed to bridge the gap
`
`between cryptography SME’s and the IT professionals that use it. It provides authoritative
`
`guidance on deployment, lifecycle, and management of cryptography in IT systems, software
`
`development, and technical management.
`
`48.
`
`I am also the author of “Cryptography in Python: Learning Correct Cryptography
`
`by Example.”
`
`II.
`
`LEGAL STANDARDS
`
`A.
`
`Claim Construction
`
`49.
`
`I am not a lawyer, and I do not intend to offer any opinions as to the interpretation
`
`of the law. However, I have a general understanding of claim construction based on my experience
`
`with patents, my work as an expert in other cases, and my conversations with counsel.
`
`50.
`
`I am informed that on the law regarding claim construction and patent claims, a
`
`patent may include two types of claims, independent claims and dependent claims. An
`
`
`
`
`12
`
`Patent Owner Exhibit 2003, Page 13 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 14 of 25
`
`
`
`independent claim stands alone and includes only the limitations it recites. A dependent claim can
`
`depend from an independent claim.
`
`51.
`
`I am informed that claim construction is a matter of law to be decided by the Court.
`
`I understand that claim terms are presumed to have their plain and ordinary meaning, as understood
`
`by a POSITA at the time of the invention, in the context of the patent specification, the prosecution
`
`history, and any other relevant evidence.
`
`52.
`
`I am informed that to determine how a POSITA would understand a claim term,
`
`one should look to those sources available that show what a person of skill in the art would have
`
`understood the disputed claim language to mean. Such sources include the words of the claims
`
`themselves, the remainder of the patent’s specification, the prosecution history of the patent and
`
`the cited references (all considered “intrinsic” evidence), and “extrinsic” evidence, such as
`
`dictionary definitions, learned treatises and the opinions of qualified experts concerning relevant
`
`scientific principles, the meaning of technical terms, and the state of the art.
`
`53.
`
`I am informed that, in construing a claim term, one looks primarily to the intrinsic
`
`patent evidence, including the words of the claims themselves, the remainder of the patent
`
`specification, and the prosecution history.
`
`54.
`
`I am informed that extrinsic evidence, which is evidence external to the patent and
`
`the prosecution history, may also be useful in interpreting patent claims when the intrinsic evidence
`
`itself is insufficient.
`
`55.
`
`In construing claims, the claims themselves, the patent specification, and the
`
`prosecution history are of paramount importance. Additionally, the specification and prosecution
`
`history must be consulted to confirm whether the patentee has acted as its own lexicographer (i.e.,
`
`
`
`
`13
`
`Patent Owner Exhibit 2003, Page 14 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 15 of 25
`
`
`
`provided its own special meaning to any disputed terms), or intentionally disclaimed, disavowed,
`
`or surrendered any claim scope.
`
`56.
`
`I understand that the claims of a patent define the scope of the rights conferred by
`
`the patent. The claims must particularly point out and distinctly claim the subject matter which
`
`the patentee regards as his invention. Because the patentee is required to define precisely what he
`
`claims his invention to be, it is improper to construe claims in a manner different from the plain
`
`import of the terms used consistent with the specification. Accordingly, a claim construction
`
`analysis must begin with and remain centered on the claim language itself. Additionally, the
`
`context in which a term is used in the asserted claim can be highly instructive. Likewise, other
`
`claims of the patent in question, both asserted and unasserted, can inform the meaning of a claim
`
`term. For example, because claim terms are normally used consistently throughout the patent, the
`
`usage of a term in one claim can often illuminate the meaning of the same term in other claims.
`
`Differences among claims can also be a useful guide in understanding the meaning of particular
`
`claim terms.
`
`57.
`
`I understand that a POSITA is deemed to read a claim term not only in the context
`
`of the particular claim in which the disputed term appears, but in the context of the entire patent,
`
`including the specification. For this reason, the words of the claim must be interpreted in view of
`
`the entire specification. The specification is the primary basis for construing the claims and
`
`provides a safeguard such that correct constructions closely align with the specification.
`
`Ultimately, the interpretation to be given a term can only be determined and confirmed with a full
`
`understanding of what the inventors actually invented and intended to envelope with the claim as
`
`set forth in the patent itself.
`
`
`
`
`14
`
`Patent Owner Exhibit 2003, Page 15 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 16 of 25
`
`
`
`58.
`
`I understand that while intrinsic evidence is of primary importance, extrinsic
`
`evidence, e.g., all evidence external to the patent and prosecution history, including expert and
`
`inventor testimony, dictionaries, and learned treatises, can also be considered. For example,
`
`technical dictionaries may help one better understand the underlying technology and the way in
`
`which one of skill in the art might use the claim terms. Extrinsic evidence should not be
`
`considered, however, divorced from the context of the intrinsic evidence. Evidence beyond the
`
`patent specification, prosecution history, and other claims in the patent should not be relied upon
`
`unless the claim language is ambiguous in light of these intrinsic sources. Moreover, while
`
`extrinsic evidence can shed useful light on the relevant art, it is less significant than the intrinsic
`
`record in determining the legally operative meaning of the claim language.
`
`B.
`
`Indefiniteness
`
`59.
`
`I understand that a patent must satisfy a definiteness requirement under 35 U.S.C.
`
`§112, ¶2, which requires that it conclude with one or more claims particularly pointing out and
`
`distinctly claiming the subject matter which the applicant regards as the invention.
`
`60.
`
`I understand that definiteness requires that a patent’s claims, viewed in light of the
`
`specification and file history from the perspective of a person skilled in the relevant art, inform
`
`those skilled in the art about the scope of the invention with reasonable certainty.
`
`61.
`
`I understand that a patent must be precise enough to afford clear notice of what is
`
`claimed and apprise the public of what is still open to them in a manner that avoids a zone of
`
`uncertainty which enterprise and experimentation may enter only at the risk of infringement
`
`claims.
`
`62.
`
`I understand that patents are presumed valid and indefiniteness is an invalidity
`
`defense. So, I understand that indefiniteness must be shown by clear and convincing evidence.
`
`III. LEVEL OF ORDINARY SKILL IN THE ART
`
`
`
`
`15
`
`Patent Owner Exhibit 2003, Page 16 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 17 of 25
`
`
`
`63.
`
`I understand that the claims must be understood from the perspective of a POSITA
`
`at the time of the alleged inventions. I also understand that to determine the level of skill of a
`
`POSITA, one must consider several factors including the types of problems encountered in the art,
`
`the solutions to those problems, the rapidity with which innovations are made, the sophistication
`
`of the technology, and the education level of active workers in the field. I further understand that
`
`the ’730, ’905, and ’989 patents originate from a common application and relate to substantially
`
`similar subject matter, as such the level of ordinary skill in the art of these patents would be the
`
`same. I understand this to be the same with regard to the ’188 and ’700 patents.
`
`64.
`
`In my opinion, with respect to the Patents-in-Suit, a POSITA at the time of the
`
`alleged inventions would have had a bachelor’s degree in computer or electrical engineering (or
`
`an equivalent degree) with at least three years of experience in the field of encryption and security
`
`(or an equivalent). This level of skill is approximate, and more experience would compensate for
`
`less formal education, and vice versa.
`
`65.
`
`I meet these criteria and consider myself a person with at least ordinary skill in the
`
`art pertaining to the asserted patents. I would have been such a person at the time of the invention
`
`of each of the asserted patents.
`
`66.
`
`I applied this level of skill of a POSITA for purposes of my analysis in this
`
`Declaration. To my knowledge, none of Proxense’s experts has yet proposed an alternative level
`
`of skill of a POSITA in this case. If and when they do, I reserve the right to provide further
`
`opinions concerning the appropriateness of that proposed level of skill of a POSITA, and to provide
`
`further opinions concerning any impact that the alternative level of skill of a person of ordinary
`
`skill would have on my analysis.
`
`IV.
`
`PATENTS IN SUIT
`
`
`
`
`16
`
`Patent Owner Exhibit 2003, Page 17 of 25
`
`
`
`Case 6:21-cv-00210-ADA Document 33-2 Filed 10/28/21 Page 18 of 25
`
`
`
`67.
`
`I understand the ’730 patent, the ’905 patent and the ’989 patent are all part of the
`
`same family, and are in the same chain of continuations, and therefore share substantially identical
`
`specifications. Furthermore, many of the claims of the ’730 patent, the ’905 patent and the ’989
`
`patent use the same phrases or share similar structure. Because of the substantially identical
`
`specifications and the overlap in claim language, a POSITA would interpret the claim terms of the
`
`’730 patent, the ’905 patent and the ’989 patent in the same context.
`
`68.
`
` Similarly, I understand the ’188 patent and the ’700 patent are part of the same
`
`family, and are in the same chain of continuations, and therefore share substantially identical
`
`specifications. Furthermore, many of the claims of the ’188 patent and the ’700 patent use the
`
`same phrases or share similar structure. Because of the substantially identical specifications and
`
`the overlap in claim language, a POSITA would interpret the claim terms of the ’188 patent and
`
`the ’700 patent in the same context.
`
`V.
`
`“THIRD PARTY TRUSTED AUTHORITY”
`
`69.
`
`In my opinion, a POSITA would not understand the term “third party trusted
`
`authority” to be “a third component that provides a second level of authentication” according to
`
`Proxense’s construction. In particular a POSITA would have understood