throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`Nehushtan et al.
`In re Patent of:
`9,642,002 Attorney Docket No.: 50095-0122IP1
`U.S. Patent No.:
`May 2, 2017
`
`Issue Date:
`Appl. Serial No.: 14/591,947
`
`Filing Date:
`January 8, 2015
`
`
`
`
`Title:
`CELLULAR DEVICE SECURITY APPARATUS AND METHOD
`
`
`
`
`
`
`DECLARATION OF DR. PATRICK G. TRAYNOR
`
`
`APPLE 1003
`
`1
`
`

`

`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`
`
`
`
`I.
`
`II.
`
`TABLE OF CONTENTS
`
`ASSIGNMENT .............................................................................................. 4
`
`QUALIFICATIONS ...................................................................................... 4
`
`III.
`
`SUMMARY OF CONCLUSIONS FORMED .............................................. 8
`
`IV. LEVEL OF ORDINARY SKILL IN THE ART ........................................... 8
`
`V.
`
`LEGAL PRINCIPLES ................................................................................... 9
`
`A.
`
`B.
`
`C.
`
`Claim Interpretation .......................................................................... 10
`
`Priority ............................................................................................... 10
`
`Anticipation ....................................................................................... 10
`
`D. Obviousness ....................................................................................... 11
`
`VI. MATERIALS CONSIDERED .................................................................... 13
`
`VII. TECHNOLOGY OVERVIEW.................................................................... 16
`
`A. Device Access Control ...................................................................... 16
`
`B.
`
`C.
`
`Device-Unique Credentials ............................................................... 18
`
`Remote Administration Systems ....................................................... 20
`
`VIII. OVERVIEW OF THE ’002 PATENT ........................................................ 21
`
`A.
`
`B.
`
`C.
`
`Specification ...................................................................................... 21
`
`Claims ................................................................................................ 25
`
`Prosecution History ........................................................................... 30
`
`IX.
`
`INTERPRETATION OF THE ’002 PATENT CLAIMS ........................... 31
`
`X.
`
`SUMMARY OF RELEVANT PRIOR ART .............................................. 32
`
`A. Overview of Shahbazi ....................................................................... 32
`
`B.
`
`C.
`
`Overview of Fam ............................................................................... 38
`
`Overview of Geiger ........................................................................... 43
`
`D. Overview of Shirai ............................................................................ 46
`
`XI. ANALYSIS OF SHAHBAZI ...................................................................... 48
`
`A.
`
`B.
`
`The Shahbazi Combination ............................................................... 48
`
`Analysis of Claims 1-29 .................................................................... 50
`
`2
`
`

`

`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`Claim 1 .................................................................................... 50
`
`Elements of Claims 5 and 24 .................................................. 68
`
`Claims 2-4 ............................................................................... 72
`
`Claims 6-15 and 21 ................................................................. 75
`
`Elements of Claims 16-20, 22, 23, 25-29 ............................... 88
`
`XII. ANALYSIS OF FAM AND GEIGER ........................................................ 92
`
`A.
`
`B.
`
`The Combination of Fam and Geiger ................................................ 92
`
`Analysis of Claims 1-10, 13-19, 21-25, 27-29 .................................. 94
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`Claim 1 .................................................................................... 94
`
`Elements of Claims 5 and 24 ................................................ 107
`
`Claims 2-4 ............................................................................. 110
`
`Claims 6-10, 13-15, 21 .......................................................... 113
`
`Elements of Claims 15-19, 22, 23, 25, 27-29 ....................... 119
`
`XIII. ANALYSIS OF FAM, GEIGER, AND SHIRAI ...................................... 124
`
`A.
`
`B.
`
`The Combination of Fam, Geiger, and Shirai ................................. 124
`
`Analysis of Claims 11, 12, 20, 26 ................................................... 125
`
`1.
`
`2.
`
`Claims 11 and 12................................................................... 125
`
`Elements of Claims 20 and 26 .............................................. 127
`
`XIV. CONCLUSION .......................................................................................... 128
`
`
`
`
`
`
`
`3
`
`

`

`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`
`I, Dr. Patrick G. Traynor, of Gainesville, Florida, declare that:
`
`I.
`
`ASSIGNMENT
`
`1.
`
`I have been retained on behalf of Apple Inc. (“Apple” or “Petitioner”)
`
`to offer technical opinions related to U.S. Patent No 9,642,002 (“the ’002 patent”)
`
`(APPLE-1001). I understand that Apple is requesting that the Patent Trial and
`
`Appeal Board (“PTAB” or “Board”) to institute an inter partes review (“IPR”)
`
`proceeding of the ’002 patent.
`
`2.
`
`I have been asked to provide my independent analysis of the ’002
`
`patent based on the prior art publications cited in this declaration.
`
`3.
`
`I am not and never have been, an employee of Apple. I received no
`
`compensation for this declaration beyond my normal hourly compensation based
`
`on my time actually spent analyzing the ’002 patent, the prior art publications cited
`
`below, and issues related thereto, and I will not receive any added compensation
`
`based on the outcome of any IPR or other proceeding involving the ’002 patent.
`
`II. QUALIFICATIONS
`
`4.
`
`I am over the age of 18 and am competent to write this declaration. I
`
`have personal knowledge, or have developed knowledge of these technologies
`
`based upon education, training, or experience, of the matters set forth herein.
`
`5.
`
`I earned a B.S. in Computer Science from the University of Richmond
`
`in 2002 and an M.S. and a Ph.D. in Computer Science and Engineering from the
`
`4
`
`

`

`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`
`Pennsylvania State University in 2004 and 2008, respectively. My dissertation,
`
`entitled “Characterizing the Impact of Rigidity on the Security of Cellular
`
`Telecommunications Networks,” focused on security problems that arise in cellular
`
`infrastructure when gateways to the Internet are created.
`
`6.
`
`I am currently a Professor in the Department of Computer and
`
`Information Science and Engineering (CISE) at the University of Florida. I was
`
`hired under the “Rise to Preeminence” Hiring campaign and serve as the Associate
`
`Chair for Research for my Department. I am also the John and Mary Lou Dasburg
`
`Preeminent Chair in Engineering.
`
`7.
`
`Prior to joining the University of Florida, I was an Associate Professor
`
`from March to August 2014 and an Assistant Professor of Computer Science from
`
`2008 to March 2014 at the Georgia Institute of Technology. I have supervised
`
`many Ph.D., M.S., and undergraduate students during the course of my career.
`
`8. My area of expertise is security, especially as it applies to mobile
`
`systems and networks, including cellular networks. As such, I regularly teach
`
`students taking my courses and participating in my research group to program and
`
`evaluate software and architectures for mobile and cellular systems. I have taught
`
`courses on the topics of network and systems security, cellular networks, and
`
`mobile systems at both Georgia Tech and the University of Florida. I also advised
`
`5
`
`

`

`
`and instructed the Information Assurance Officer Training Program for the United
`
`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`States Army Signal Corps in the spring of 2010.
`
`9.
`
`I have received numerous awards for research and teaching, including
`
`being named a Kavli Fellow (2017), a Fellow of the Center for Financial Inclusion
`
`(2016), and a Research Fellow of the Alfred P. Sloan Foundation (2014). I also
`
`won the Lockheed Inspirational Young Faculty Award (2012), was awarded a
`
`National Science Foundation (NSF) CAREER Award (2010), and the Center for
`
`the Enhancement of Teaching and Learning at Georgia Tech’s “Thanks for Being a
`
`Great Teacher” Award (2009, 2012, 2013).
`
`10.
`
`I have published over 100 articles in the top journals and conferences
`
`in the areas of information security, mobility, and networking. Many of my results
`
`are highly cited, and I have received multiple “Best Paper” Awards. I have also
`
`written a book entitled Security for Telecommunications Networks, which is used
`
`in wireless and cellular security courses at a number of top universities.
`
`11.
`
`I am a Senior Member of the Association for Computing Machinery
`
`(ACM) and the Institute of Electrical and Electronics Engineers (IEEE). I am also
`
`a member of the USENIX Advanced Computing Systems Association.
`
`12.
`
`I serve as an Associate Editor for IEEE Security and Privacy
`
`Magazine, have been the Program Chair for seven conferences and workshops, and
`
`have served as a member of the Program Committee for over 50 different
`
`6
`
`

`

`
`conferences and workshops. I am also currently the Security Subcommittee Chair
`
`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`for the ACM US Technology Policy Committee (USACM).
`
`13.
`
`I was a co-Founder and Research Fellow for the private start-up,
`
`Pindrop Security, from 2012 to 2014. Pindrop provides anti-fraud and
`
`authentication solutions for Caller-ID spoofing attacks in enterprise call centers by
`
`creating and matching acoustic fingerprints.
`
`14.
`
`I was a co-Founder and Chief Executive of a private start-up,
`
`CryptoDrop. CryptoDrop developed a ransomware detection and recovery tool to
`
`provide state of the art protection to home, small business and enterprise users.
`
`15.
`
`I was a co-Founder and Chief Executive of a private start-up, Skim
`
`Reaper. Skim Reaper developed tools to detect credit card skimming devices, and
`
`currently works with a range of banks, law enforcement, regulators, and retailers.
`
`16.
`
`I am a named inventor on nine United States patents. These patents
`
`detail methods for determining the origin and path taken by phone calls as they
`
`traverse networks, cryptographically authenticating phone calls, providing a secure
`
`means of indoor localization using mobile/wireless devices, detecting credit card
`
`skimmers, identifying cloned credit cards, and blocking ransomware from
`
`encrypting data.
`
`17. My curriculum vitae, attached as Exhibit A, includes a list of
`
`publications on which I am a named author. It contains further details regarding
`
`7
`
`

`

`
`my experience, education, publications, and other qualifications to render an expert
`
`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`opinion in connection with this proceeding.
`
`III. SUMMARY OF CONCLUSIONS FORMED
`
`18. This Declaration explains the conclusions that I have formed based on
`
`my analysis. To summarize those conclusions:
`
`
`
`Ground 1: Based upon my knowledge and experience and my review of the
`
`prior art publications in this declaration, I believe that claims 1-29 of the
`
`’002 patent are made obvious by Shahbazi
`
`
`
`Ground 2A: Based upon my knowledge and experience and my review of
`
`the prior art publications in this declaration, I believe that claims 1-10 and
`
`13-19, 21-25, and 27-29 of the ’002 patent are made obvious by Fam and
`
`Geiger
`
`
`
`Ground 2B: Based upon my knowledge and experience and my review of
`
`the prior art publications in this declaration, I believe that claims 11, 12, 20,
`
`and 26 of the ’002 patent are made obvious by Fam, Geiger, and Shirai
`
`IV. LEVEL OF ORDINARY SKILL IN THE ART
`
`19.
`
`I have been informed that a person of ordinary skill in the art
`
`(“POSITA”) is a hypothetical person who is presumed to have the skill and
`
`experience of an ordinary worker in the field at the time of the alleged invention.
`
`The ’002 patent was filed January 8, 2015, and claims priority through a string of
`
`8
`
`

`

`
`applications that includes U.S. Provisional Application No. 60/550,305 filed March
`
`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`8, 2004 (“Critical Date”). Because I do not know at what date the invention as
`
`claimed was made, if ever, I have used the Critical Date of the ’002 patent as the
`
`point in time for claim interpretation purposes. My opinion does not change if the
`
`invention date is earlier.
`
`20. Based on my knowledge and experience in the field and my review of
`
`the ’002 patent and file history, I believe that a person of ordinary skill in the art in
`
`this matter would have had at least a Bachelor’s Degree in an academic area
`
`emphasizing electrical engineering, computer science, or a similar discipline, and
`
`at least one year of experience in wireless communication systems. Superior
`
`education could compensate for a deficiency in work experience, and vice-versa.
`
`Based on my experiences, I have a good understanding of the capabilities of a
`
`POSITA. Indeed, I have taught, mentored, advised, and collaborated closely with
`
`many such individuals over the course of my career.
`
`V. LEGAL PRINCIPLES
`
`21.
`
`I am not a lawyer and I will not provide any legal opinions in this IPR.
`
`Although not a lawyer, I have been advised that certain legal standards are to be
`
`applied by technical experts in forming opinions regarding the meaning and
`
`validity of patent claims.
`
`9
`
`

`

`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`
`
`A. Claim Interpretation
`
`22.
`
`I understand that claim terms are generally given their plain and
`
`ordinary meaning based on the patent’s specification and file history as understood
`
`by a person of ordinary skill in the art at the time of the purported invention. In that
`
`regard, I understand that the best indicator of claim meaning is its usage in the
`
`context of the patent specification as understood by a POSITA. I further
`
`understand that the words of the claims should be given their plain meaning unless
`
`that meaning is inconsistent with the patent specification or the patent’s history of
`
`examination before the Patent Office. I also understand that the words of the
`
`claims should be interpreted as they would have been interpreted by a POSITA at
`
`the time of the invention was made (not today).
`
`B.
`
`Priority
`
`23.
`
`I understand that a continuation application is a later-filed application
`
`that has the same disclosure (specification and figures) as an earlier filed
`
`application to which the later-filed application claims priority. A continuation is
`
`generally entitled to the same priority date as the later-filed application to which it
`
`claims priority.
`
`C. Anticipation
`
`24.
`
`I understand that a patent claim is invalid as anticipated if each and
`
`every element as set forth in the claim is found, either expressly or inherently
`
`10
`
`

`

`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`
`described, in a single prior art reference. I also understand that, to anticipate, the
`
`reference must teach all of the limitations arranged or combined in the same way
`
`as described in the claim. I do not rely on anticipation in this declaration.
`
`25. With respect to inherency, I understand that the fact that a certain
`
`result or characteristic may occur or be present in the prior art is not sufficient to
`
`establish the inherency of that result or characteristic. Instead, the inherent
`
`characteristic must necessarily flow from the teaching of the prior art.
`
`D. Obviousness
`
`26.
`
`I understand that a patent claim is invalid if the claimed invention
`
`would have been obvious to a person of ordinary skill in the field at the time of the
`
`purported invention, which is often considered the time the application was filed.
`
`Even if all of the claim limitations are not found in a single prior art reference that
`
`anticipates the claim, the claim can still be invalid.
`
`27. To obtain a patent, a claimed invention must have, as of the priority
`
`date, been nonobvious in view of the prior art in the field. I understand that an
`
`invention is obvious when the differences between the subject matter sought to be
`
`patented and the prior art are such that the subject matter as a whole would have
`
`been obvious at the time the invention was made to a person having ordinary skill
`
`in the art.
`
`11
`
`

`

`
`
`28.
`
`I understand that, to prove that prior art or a combination of prior art
`
`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`makes a patent obvious it is necessary to: (1) identify the particular references that,
`
`singly or in combination, make the patent obvious; (2) specifically identify which
`
`elements of the patent claim appear in each of the asserted references; and (3)
`
`explain a motivation, teaching, need, market pressure or other legitimate reason
`
`that would have inspired a person of ordinary skill in the art to combine prior art
`
`references to solve a problem.
`
`29.
`
`I also understand that certain objective indicia can be important
`
`evidence regarding whether a patent is obvious or nonobvious. Such indicia
`
`include:
`
` Commercial success of products covered by the patent claims;
`
` A long-felt need for the invention;
`
` Failed attempts by others to make the invention;
`
` Copying of the invention by others in the field;
`
` Unexpected results achieved by the invention as compared to the
`
`closest prior art;
`
` Praise of the invention by the infringer or others in the field;
`
` The taking of licenses under the patent by others;
`
`12
`
`

`

`
`
` Expressions of surprise by experts and those skilled in the art at the
`
`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`making of the invention; and
`
` The patentee proceeded contrary to the accepted wisdom of the
`
`prior art.
`
`30. To the extent these factors have been brought to my attention, if at all,
`
`I have taken them into consideration in rendering my opinions and conclusions.
`
`VI. MATERIALS CONSIDERED
`
`31. My analysis and conclusions set forth in this declaration are based on
`
`my educational background and experiences in the field (see Section II). Based on
`
`my knowledge and experience, I believe that I am considered to be an expert in the
`
`field. Also, based on my knowledge and experience, I understand and know of the
`
`capabilities of persons of ordinary skill in the field during the early 1990s–2010s,
`
`and I taught, participated in organizations, and worked closely with many such
`
`persons in the field during that time frame.
`
`32. As part of my independent analysis for this declaration, I have
`
`considered the following: the background knowledge/technologies that were
`
`commonly known to persons of ordinary skill in this art during the time before the
`
`earliest claimed priority date for the ’002 patent; my own knowledge and
`
`experiences gained from my work experience in the field of the ’002 patent and
`
`13
`
`

`

`
`related disciplines; and my experience in working with others involved in this field
`
`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`and related disciplines.
`
`33.
`
`In addition, I have analyzed the following publications and materials:
`
` U.S. Patent No. 8,635,661 (“Shahbazi”) (APPLE-1004)
`
` U.S. Patent No. 7,181,726 (“Fam”) (APPLE-1005)
`
` U.S. Patent No. 6,463,534 (“Geiger”) (APPLE-1006)
`
` U.S. Patent Application Publication No. 2001/0051519 (“Shirai”)
`
`(APPLE-1007)
`
`
`
` Klemetti, Aarne, “PDA Operating Systems,” EVTEK, Media
`
`Technology, 2002 (APPLE-1008)
`
` “The Symbian Platform Version 6.0: Power and Innovation,” The
`
`Wayback Machine (accessed 10/11/2022), available at
`
`https://web.archive.org/web/20010303233643/http://www.symbian
`
`devnet.com (APPLE-1009)
`
` U.S. Provisional Application No. 60/531,668 (“Shahbazi
`
`Provisional”) (APPLE-1011)
`
` United States Department of Defense, Department of Defense
`
`Standard, “Trusted Computer System Evaluation Criteria”, DoD
`
`5200.28-STD (APPLE-1012)
`
`14
`
`

`

`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`
`
` Polly Sprenger, “Pirates Sneer at Intel Chip,” Wired, 22 Jan. 1999,
`
`https://www.wired.com/1999/01/pirates-sneer-at-intel-chip/
`
`(APPLE-1013)
`
` Jason Miller, Federal News Network, “10 Years Later, CAC is
`
`securely part of DoD” (APPLE-1014)
`
` Arnis Parsovs, “Estonian Electronic Identity Card: Security Flaws
`
`in Key Management”, USENIX Security 2020 (APPLE-1015)
`
` C. Stephen Carr, “Network Subsystem for Time Sharing Hosts”,
`
`IETF RFC 15, 25 September, 1969 (APPLE-1016)
`
` ITU-T Recommendation E.212 (1993) (APPLE-1017)
`
` GSMA, https://www.gsma.com/aboutus/history, Accessed 16 Nov.
`
`2022 (APPLE-1018)
`
` Research in Motion, 2001 Annual Report (APPLE-1019)
`
` U.S. Pat. No. 7,239,877 (“Corneille”) (APPLE-1020)
`
` GSM 03.48 v8.0.0 (1999-07) (APPLE-1021)
`
` U.S. Patent Application Publication No. 2006/0031407
`
`(“Dispensa”) (APPLE-1022)
`
`15
`
`

`

`
`
`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
` Sascha Segan, “The Evolution of the Blackberry, From 957 to
`
`Z10,” PCMag, 28 Jan. 2013, https://www.pcmag.com/news/the-
`
`evolution-of-the-blackberry-from-957-to-z10 (APPLE-1023)
`
` Symbian S600, https://nokia.fandom.com/wiki/Symbian_S60,
`
`Accessed 16 Nov. 2022 (APPLE-1024)
`
`34. My analysis and conclusions set forth in this declaration are based on
`
`the perspective of a POSITA.
`
`VII. TECHNOLOGY OVERVIEW
`
`A. Device Access Control
`
`35. Access control is the process of selectively granting use of a
`
`computing resource. Such decisions are traditionally made through the explicit
`
`naming of a resource (e.g., a file) and a specific party’s rights to interact with that
`
`resource (e.g., read, write, execute). These permissions are often stored in Access
`
`Control Lists (ACLs).
`
`36. Access control has been a primary mechanism of security policy
`
`enforcement in virtually all operating systems. For instance, the first known
`
`implementation of ACLs came as part of the MULTICS operating system in 1965.
`
`All operating systems since the creation of MULTICS incorporate some form of
`
`access control.
`
`16
`
`

`

`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`
`
`37.
`
` There are two general categories of access control: Discretionary
`
`Access Control (DAC) and Mandatory Access Control (MAC). Both forms are
`
`well-known and were formalized by the United States Department of Defense
`
`(DoD) in the Trusted Computer System Evaluation Criteria (TCSEC, also known
`
`as the “Orange Book”) in 1985. APPLE-1012.
`
`38. DAC systems allow users with permissions to a specific resource to
`
`pass their rights to another user. For instance, the creator of a file could share the
`
`file directly with another user without the direct intervention of the system
`
`administrator. MAC systems constrain access to resources based on a centrally
`
`administered policy. Unlike DAC systems, users do not have the ability to override
`
`these policy decisions, and changes to MAC policies can only be performed by an
`
`administrator.
`
`39. Modern operating systems implement a combination of MAC and
`
`DAC. For instance, operations that might involve sensitive files/directories or
`
`programs can be specified by the system administrator using MAC policies. For
`
`less sensitive operations, users can be given latitude to specify their own policies
`
`for resources. For example, a system may restrict access to directories containing
`
`intellectual property or classified government materials using MAC policies. Only
`
`a limited set of applications and users could then access the contents of those files.
`
`However, for less sensitive information (e.g., calendars), users could rely on DAC
`
`17
`
`

`

`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`
`policies to specify who should be given access to their information. While the
`
`Orange Book was published in 1985, the problem of securing “remote-access,
`
`resource-sharing computer systems” (p7, Trusted Computer System Evaluation
`
`Criteria) was first discussed by the Defense Science Board in October of 1967.
`
`APPLE-1012. The secure administration and update of remote machines has been
`
`a well-known concern in the government and private sectors for nearly six decades.
`
`Id.
`
`B. Device-Unique Credentials
`
`40.
`
`Identifying devices and users using credentials (e.g., passphrase,
`
`username) is important to ensuring that access control is performed properly. Once
`
`a credential is provided to a verifying party, the party with the credential is then
`
`granted the rights affiliated with it. For example, the holder of a
`
`username/password credential on a computer would be allowed to operate in the
`
`role of that particular user (and access that user’s files, perform that user’s duties,
`
`etc.).
`
`41. Credentials have long preceded computing systems, with some of the
`
`earliest recorded uses (e.g., passwords) dating as far back as the Roman Empire.
`
`Modern computing systems rely on device-unique credentials as part of the process
`
`of authenticating themselves to other parties. For mobile phones, the best-known
`
`credential is the International Mobile Subscriber Identity (“IMSI”). Originally
`
`18
`
`

`

`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`
`standardized in 1988 by the International Telecommunications Union, the IMSI
`
`uniquely identifies the SIM card in a user’s mobile phone. APPLE-1017, 1.
`
`42. Similar to the IMSI is the International Mobile Equipment Identity
`
`(IMEI). Introduced as the same time as the IMSI, the IMEI specifically identifies
`
`the user’s mobile phone hardware and is assigned by the manufacturer. A user
`
`changing SIM cards in a phone would change IMSIs, but the IMEI would remain
`
`the same. Conversely, a user moving their SIM card to a new mobile phone would
`
`keep the same IMSI, but their IMEI would change.
`
`43. The use of IMSIs has been common since 2G GSM networks and
`
`became universal in the late 1990s. APPLE-1017, 1; APPLE-1018. There are
`
`currently billions of devices that rely on IMSIs as their primary identification
`
`credential. Starting with 2G cellular networks, all mobile phones were also
`
`equipped with a unique, long-term symmetric key known as the Individual
`
`Subscriber Authentication Key (or “Ki”). In combination with the IMSI, these two
`
`credentials are used to cryptographically authenticate a mobile phone to the
`
`network so that services and billing could be tailored to the account associated with
`
`that specific mobile phone. Id.
`
`44. Mobile phones are not the only systems that have offered device-
`
`unique credentials. In 1999, Intel’s Pentium III processor came equipped with a
`
`unique Processor Serial Number (PSN). While the feature was removed in the
`
`19
`
`

`

`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`
`Pentium IV, Intel intended the PSN to be used for tasks including asset
`
`management, information flow/leak control, and potentially advertising via web
`
`tracking. The PSN was viewed as a means of restricting software installations and
`
`functionality to specific set of machines. Intel marketed this feature as a means of
`
`combatting software piracy and cloning. APPLE-1013.
`
`45. Device-unique credentials can take many other forms as well. One
`
`example is a device-unique public-key certificate. Such credentials can be kept in
`
`traditional hard disks or a variety of other platforms. For example, the DoD
`
`launched its Common Access Card (CAC) in 1999, which stored unique
`
`cryptographic credentials for each DoD employee. APPLE-1014. Similarly, the
`
`government of Estonia began its rollout of national ID cards equipped with
`
`smartcards storing unique public-key certificates in 2002. APPLE-1015.
`
`C. Remote Administration Systems
`
`46. The ability to remotely use and administer machines is nearly as old
`
`computer networks themselves. Soon after the first computers were connected via
`
`the ARPANET (the precursor to the Internet) in 1969, the Telnet protocol was
`
`proposed. APPLE-1016.
`
`47. Telnet addressed two specific problems. First, direct access to every
`
`computer was constrained given their relatively large size. As such, small
`
`inexpensive terminals were needed to access computers. Second, as the number
`
`20
`
`

`

`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`
`and location of computers grew, so too did the need to be able to administer them
`
`efficiently. While Telnet was built for a closed, largely academic Internet, it was
`
`not designed to address with the security concerns of the current Internet. As such,
`
`it was eventually replaced by the introduction of the Secure Shell Protocol (SSH)
`
`in the 1990s. Graphical interfaces such as Virtual Network Computing (VNC),
`
`which allowed for an experience more similar to modern computer use, became
`
`available in the late 1990s. Id.
`
`48. Traditional computers were not the only devices for which remote
`
`administration tools were developed. For instance, the Blackberry Enterprise
`
`Server (BES) allowed enterprises to manage messaging and email access for
`
`associated Blackberry mobile devices in early 1999. APPLE-1019, 9-10. As such,
`
`tools for the remote administration have been long known and used throughout real
`
`networks. As new devices are introduced, it is expected that they too will be
`
`managed through such systems.
`
`VIII. OVERVIEW OF THE ’002 PATENT
`
`A.
`
`Specification
`
`49. The ’002 patent focuses on cellular device security and describes a
`
`“security system for protection of data and access,” including “read and write
`
`access to configuration data, in a cellular telephony device.” APPLE-1001, 1:20-
`
`24. According to the ’002 patent, “[a] security vulnerability exists in cellular
`
`21
`
`

`

`
`device” in that “it is possible to read sensitive information” and “write it into a new
`
`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`cellular device (destination) thus making the destination device identical to the
`
`source device with regards to the cellular network.” Id., 1:25-35. This “enables the
`
`destination device to make calls, which are then billed to the source device.” Id.
`
`50. The ’002 patent identifies four types of sensitive information in a
`
`cellular device: (1) an “Electronic Serial Number” supplied by the manufacturer of
`
`the cellular device (ESN), (2) “cellular device’s phone number” supplied by the
`
`cellular provider (NUM), (3) “authentication key” for authenticating the identity of
`
`a cellular device by the cellular provider (A-KEY), and (4) an “identifier” created
`
`by the cellular network in combination with additional information from the
`
`cellular provider’s database and used to identify the cellular device when a call is
`
`made (SSD). APPLE-1001, 1:46-58. This information is “generally located in the
`
`cellular device along with the operating system located on the chipset.” Id. Access
`
`to this sensitive information is provided during a “Data Mode”—“a mode in which
`
`the device allows any access to the device to change settings and/or accepts
`
`commands, via its serial interface, which can be used to read and write
`
`information.” APPLE-1001, 1:63-2:6.
`
`51. The ’002 patent describes solving security vulnerabilities associated
`
`with sensitive information stored on a cellular device by limiting device access.
`
`Figure 2 shows a system in which “a cellular telephone is connected through a data
`
`22
`
`

`

`
`connection to a reprogramming device and to a secure server.” APPLE-1001,
`
`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`6:66-7:2.
`
`APPLE-1001, Fig. 2
`
`
`
`Device 20 is connected to reprogramming computer 24 for “upgrading according
`
`to an upgrading configuration.” APPLE-1001, 9:1-15. Device 20 is placed in a
`
`“data mode for allowing reading and writing of data to change the settings and
`
`generally to allow reprogramming.” Id. Device 20 is “configured to restrict use of
`
`the data mode” using a “unique security setting belonging to the device.” Id. This
`
`ensures “the data mode cannot be used unless the device unique security setting is
`
`23
`
`

`

`
`provided” and “it is no longer possible to obtain a single password and thereby
`
`Declaration of Dr. Patrick G. Traynor
`APPLE-1003
`
`compromise a large number of devices.” Id.
`
`52. Device 20 includes a “mode management unit 22” (or “an access

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket