throbber

`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`_________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_________________
`
`
`CROWDSTRIKE, INC.,
`Petitioner
`
`v.
`
`TAASERA LICENSING LLC,
`Patent Owner
`_________________
`
`
`Inter Partes Review Case No. IPR2023-01464
`U.S. Patent No. 8,327,441
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 8,327,441
`
`

`

`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`
`TABLE OF CONTENTS
`
`INTRODUCTION ......................................................................................... 1
`I.
`II. GROUNDS FOR STANDING (37 C.F.R. § 42.104(A)) ............................. 1
`III.
`IDENTIFICATION OF CHALLENGE (37 C.F.R. § 42.104(B)) ............. 1
`A.
`CITATION OF PRIOR ART ........................................................................ 1
`B.
`STATUTORY GROUNDS FOR CHALLENGE ............................................... 2
`IV. THE ’441 PATENT ....................................................................................... 2
`A.
`CLAIM OF PRIORITY OF THE ’441 PATENT .............................................. 2
`B. OVERVIEW OF THE ’441 PATENT ............................................................ 2
`C.
`SUMMARY OF THE PROSECUTION HISTORY ............................................ 8
`D.
`LEVEL OF ORDINARY SKILL IN THE ART ................................................ 8
`E.
`CLAIM CONSTRUCTION .......................................................................... 9
`V. HOW THE CLAIMS ARE UNPATENTABLE ......................................... 9
`A. OVERVIEW OF ASSERTED PRIOR ART ................................................... 10
`1. MUNETOH .................................................................................. 10
`2.
`RAJAN ....................................................................................... 12
`B. GROUND 1: CLAIMS 1-7 AND 9 ARE UNPATENTABLE UNDER 35
`U.S.C. § 103(A) AS OBVIOUS IN VIEW OF MUNETOH AND RAJAN ......... 15
`C. MOTIVATION TO COMBINE MUNETOH AND RAJAN .............................. 15
`1.
`CLAIM 1 ..................................................................................... 17
`a)
`[1a.] A method of providing an attestation service
`for an application at runtime executing on a
`computing platform using an attestation server,
`comprising: ..................................................................... 17
`[1b.] receiving, by the attestation server remote
`from the computing platform: ........................................ 20
`[1c.] a runtime execution context indicating
`attributes of the application at runtime, wherein the
`attributes comprise one or more executable file
`binaries of the application and loaded components
`of the application; ........................................................... 21
`[1d.] a security context providing security
`information about the application, wherein the
`security information comprises an execution
`analysis of the one or more executable file binaries
`and the loaded components; ........................................... 23
`
`b)
`
`c)
`
`d)
`
`i
`
`

`

`b)
`
`b)
`
`e)
`
`f)
`
`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`[1e.] generating, by the attestation server, a report
`indicating security risks associated with the
`application based on the received runtime
`execution context and the received security
`context, as an attestation result; and ............................... 26
`[1f.] sending, by the attestation server, the
`attestation result associated with the application. .......... 30
`CLAIM 2 ..................................................................................... 31
`a)
`[2a.] generating, by the attestation server, an
`application artifact as a reference for changes in a
`subsequent execution context; and ................................. 31
`[2b.] sending the generated application artifact
`such that subsequent changes to the runtime
`execution context are tracked based on the
`generated application artifact. ........................................ 33
`CLAIM 3 ..................................................................................... 34
`a)
`[3a.] The method according to claim 2, further
`comprising digitally signing the attestation results: ....... 34
`[3b.] wherein the attributes further comprise
`parent-child process associations of the
`application. ..................................................................... 35
`CLAIM 4 ..................................................................................... 36
`a)
`The method of claim 1, wherein the received
`security context is an introspective security
`context, and wherein the execution analysis is a
`static, dynamic, or virtual analysis of the one or
`more executable file binaries and the loaded
`components. ................................................................... 36
`CLAIM 5 ..................................................................................... 38
`a)
`The method of claim 4, wherein the generating of
`the report indicating security risks associated with
`the application includes generating, by the
`attestation server, one or more security assertions
`that pertain to the received runtime execution
`context and the received introspective security
`context. ........................................................................... 38
`CLAIM 6 ..................................................................................... 39
`a)
`The method according to claim 1, further
`comprising authenticating the application using a
`plurality of collaboration services. ................................. 39
`
`ii
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`

`

`7.
`
`8.
`
`b)
`
`c)
`
`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`CLAIM 7 ..................................................................................... 40
`a)
`The method according to claim 1, further
`comprising controlling a user's transaction with the
`application by applying a set of authorization rules
`in accordance with the attestation results. ...................... 40
`CLAIM 9 ..................................................................................... 41
`a)
`The method according to claim 1, further
`comprising providing confidence metrics in the
`attestation results indicating a level of security risk
`by different classifications such that a restriction
`on a user's transaction with the application are
`applied based on the level of security risk indicated
`by the confidence metrics in the attestation results. ....... 41
`D. GROUND 2: CLAIMS 1-7 AND 9 ARE UNPATENTABLE UNDER 35
`U.S.C. § 103(A) AS OBVIOUS OVER RAJAN IN VIEW OF MUNETOH ........ 42
`E. MOTIVATION TO COMBINE RAJAN AND MUNETOH .............................. 43
`1.
`CLAIM 1 ..................................................................................... 43
`a)
`[1a.] A method of providing an attestation service
`for an application at runtime executing on a
`computing platform using an attestation server,
`comprising: ..................................................................... 43
`[1b.] receiving, by the attestation server remote
`from the computing platform: ........................................ 46
`[1c.] a runtime execution context indicating
`attributes of the application at runtime, wherein the
`attributes comprise one or more executable file
`binaries of the application and loaded components
`of the application; ........................................................... 47
`[1d.] a security context providing security
`information about the application, wherein the
`security information comprises an execution
`analysis of the one or more executable file binaries
`and the loaded components; ........................................... 48
`[1e.] generating, by the attestation server, a report
`indicating security risks associated with the
`application based on the received runtime
`execution context and the received security
`context, as an attestation result; and ............................... 50
`[1f.] sending, by the attestation server, the
`attestation result associated with the application. .......... 52
`
`d)
`
`e)
`
`f)
`
`iii
`
`

`

`b)
`
`b)
`
`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`CLAIM 2 ..................................................................................... 54
`a)
`[2a.] generating, by the attestation server, an
`application artifact as a reference for changes in a
`subsequent execution context; and ................................. 54
`[2b.] sending the generated application artifact
`such that subsequent changes to the runtime
`execution context are tracked based on the
`generated application artifact. ........................................ 55
`CLAIM 3 ..................................................................................... 57
`a)
`[3a.] The method according to claim 2, further
`comprising digitally signing the attestation results: ....... 57
`[3b.] wherein the attributes further comprise
`parent-child process associations of the
`application. ..................................................................... 57
`CLAIM 4 ..................................................................................... 58
`a)
`The method of claim 1, wherein the received
`security context is an introspective security
`context, and wherein the execution analysis is a
`static, dynamic, or virtual analysis of the one or
`more executable file binaries and the loaded
`components. ................................................................... 58
`CLAIM 5 ..................................................................................... 59
`a)
`The method of claim 4, wherein the generating of
`the report indicating security risks associated with
`the application includes generating, by the
`attestation server, one or more security assertions
`that pertain to the received runtime execution
`context and the received introspective security
`context. ........................................................................... 59
`CLAIM 6 ..................................................................................... 59
`a)
`The method according to claim 1, further
`comprising authenticating the application using a
`plurality of collaboration services. ................................. 59
`CLAIM 7 ..................................................................................... 60
`a)
`The method according to claim 1, further
`comprising controlling a user's transaction with the
`application by applying a set of authorization rules
`in accordance with the attestation results. ...................... 60
`CLAIM 9 ..................................................................................... 60
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`iv
`
`

`

`a)
`
`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`The method according to claim 1, further
`comprising providing confidence metrics in the
`attestation results indicating a level of security risk
`by different classifications such that a restriction
`on a user's transaction with the application are
`applied based on the level of security risk indicated
`by the confidence metrics in the attestation results. ....... 60
`VI. NO BASIS FOR DISCRETIONARY DENIAL ....................................... 61
`VII. CONCLUSION ............................................................................................ 63
`VIII. MANDATORY NOTICES (37 C.F.R. § 42.8(A)(1)) ................................ 63
`A.
`REAL PARTY IN INTEREST: .......................................................... 63
`B.
`RELATED MATTERS: ...................................................................... 63
`C.
`LEAD AND BACKUP COUNSEL: ................................................... 65
`D.
`SERVICE INFORMATION: .............................................................. 65
`E.
`PAYMENT OF FEES ......................................................................... 66
`
`
`
`
`
`
`v
`
`

`

`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`TABLE OF AUTHORITIES
`
`Cases
`Advanced Bionics, LLC v. MED-EL Elektromedizinische Gerate GmbH, IPR2019-
`01469, Paper 6 (Feb. 13, 2020) ........................................................................... 62
`Cellco Partnership v. Huawei Device Co., IPR2020-01117, Paper 10 (Feb. 3,
`2021) .................................................................................................................... 63
`Graham v. John Deere Co., 383 U.S. 1 (1966) ................................................. 16, 43
`
`KSR Int’l Co. v. Teleflex, Inc., 550 U.S. 398 (2007) ......................................... 16, 43
`Phillips v. AWH Corp., 415 F.3d 1303 (Fed. Cir. 2005) (en banc) ......................... 10
`Wellman, Inc. v. Eastman Chem. Co., 642 F.3d 1355 (Fed. Cir. 2011) .................. 10
`Statutes
`35 U.S.C. § 102(b) (pre-AIA) ................................................................................... 2
`35 U.S.C. § 102(e) ..................................................................................................... 9
`35 U.S.C. § 103(a) ................. 3, 11, 16, 32, 35, 37, 39, 40, 41, 43, 54, 58, 59, 60, 61
`35 U.S.C. § 325(d) ............................................................................................ 62, 63
`Regulations
`37 C.F.R. § 42.100(b) .............................................................................................. 10
`37 C.F.R. § 42.104(a) ................................................................................................ 2
`37 C.F.R. § 42.104(b) ................................................................................................ 2
`37 C.F.R. § 42.105 .................................................................................................. 68
`37 C.F.R. § 42.24 .................................................................................................... 67
`37 C.F.R. § 42.6(e) .................................................................................................. 68
`37 C.F.R. § 42.8 ...................................................................................................... 67
`37 C.F.R. § 42.8(a)(1) ............................................................................................. 64
`37 C.F.R. § 42.8(b)(2) ............................................................................................. 64
`37 C.F.R. § 42.8(b)(3) ............................................................................................. 65
`
`
`
`
`
`vi
`
`

`

`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`
`APPENDIX OF EXHIBITS
`
`
`Description
`U.S. Patent No. 8,327,441 to Kumar et al.
`Curriculum Vitae of A.L. Seth Nielson, Ph.D.
`Expert Declaration of Dr. Seth Nielson under 37 C.F.R. § 1.68.
`Prosecution History of ’441 to Kumar et al.
`Seiji Munetoh, Integrity management Infrastructure for Trusted
`Computing, IEICE TRANS. INF. & SYST., Vol. E91-D, No. 5,
`1242-1251, (May 2008).
`Hridesh Rajan, Tisa: Toward Trustworthy Services in a Service-
`Oriented Architecture, IEEE Transactions on Services Computing,
`201-213, (October-December 2008).
`Declaration of Ingrid Hsieh-Yee, Ph.D.
`Steve Anderson, Web Services Trust Language (WS-Trust),
`(February 2005).
`George Moncrief, ezHPC Security Architecture, IEEE Computer
`Society, (2006).
`Taasera Licensing LLC, v. Trend Micro Incorporated, Plaintiff’s
`Disclosure of Asserted Claims and Infringement Contentions
`with ’441 Claim Chart, 2:21-cv-00441-JRG-RSP, (Jul 26, 2022).
`Ajay Surie, Rapid Trust Establishment for Pervasive Computing,
`IEEE Computer Society, 24-30, (2007).
`Minjin Kwon, PROBE: A Process Behavior-based Host Intrusion
`Prevention System, Department of Computer Science and
`Engineering, Korea University, Seoul, (2008).
`United States Judicial Panel on Multidistrict Litigation Transfer
`Order
`In re: Taasera Licensing LLC, Patent Litigation, No. 2”22-MD-
`03042-JRG Eighth Amended Docket Control Order
`In re: Taasera Licensing LLC, Patent Litigation, No. 2:22-MD-
`03042-JRG Dkt. 189 Order on Trend’s Motion to Transfer
`
`Exhibit No.
`1001
`1002
`1003
`1004
`1005
`
`1006
`
`1007
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`
`
`
`
`
`vii
`
`

`

`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`
`I.
`
`INTRODUCTION
`CrowdStrike, Inc. (“Petitioner”) petitions for inter partes review of claims 1-
`
`7 and 9 of U.S. Patent No. 8,327,441 (“the ’441 patent,” EX1001).
`
`II. GROUNDS FOR STANDING (37 C.F.R. § 42.104(A))
`Petitioner certifies the ’441 patent is available for inter partes review and
`
`Petitioner is not barred or estopped from requesting an inter partes review
`
`challenging the patent claims on the grounds identified in this Petition.
`
`III.
`
`IDENTIFICATION OF CHALLENGE (37 C.F.R. § 42.104(B))
`A. Citation of Prior Art
`Munetoh, et al. “Integrity Management Infrastructure for Trusted Computing”
`
`IEICE TRANS. INF. & SYST., Vol. E91-D, No. 5, 1242-1251, (May 2008)
`
`(“Munetoh”, EX1005) is prior art under pre-AIA § 102(b) because it was published
`
`and publicly accessible by June 16, 2008, more than one year before the earliest
`
`possible priority date of the ’441 patent. EX1007. Munetoh was not cited or
`
`considered during prosecution of the ’441 patent.
`
`Rajan, et al. “Tisa: Toward Trustworthy Services in a Service-Oriented
`
`Architecture,” IEEE Transactions on Services Computing, 201-213, (October-
`
`December 2008) (“Rajan”, EX1006) is prior art under pre-AIA § 102(b) because it
`
`was published and publicly available no later than March 24, 2009, more than one
`
`1
`
`

`

`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`year before the earliest possible priority date of the ’441 patent. EX1007. Rajan was
`
`not cited or considered during prosecution of the ’441 patent.
`
`B.
`Statutory Grounds for Challenge
`GROUND 1: Claims 1-7 and 9 are unpatentable under 35 U.S.C. § 103(a) as obvious
`
`over Munetoh (EX1005) in view of Rajan (EX1006).
`
`GROUND 2: Claims 1-7 and 9 are unpatentable under 35 U.S.C. § 103(a) as obvious
`
`over Rajan (EX1006) in view of Munetoh (EX1005).
`
`IV. THE ’441 PATENT
`A. Claim of Priority of the ’441 patent
`The ’441 patent issued December 4, 2012, from U.S. Patent Application No.
`
`13/399,065, filed February 17, 2012, which claimed priority to Provisional
`
`Application No. 61/443,854, filed February 17, 2011. EX1001, p.1. Solely for the
`
`purposes of this Petition, the earliest priority date for the ’441 patent is taken to be
`
`February 17, 2011 (the “priority date”), so the Challenged Claims should be
`
`examined under pre-AIA statutes.
`
`B. Overview of the ’441 patent
`The ’441 patent relates to computer security. EX1001, 1:15-18, 5:45-67;
`
`EX1003, ¶71. As background, the patent recognizes that in recent trends in
`
`computing “enterprise software is no longer owned by the customer, but instead the
`
`Information Technology infrastructure can be provided by a third party and the
`
`2
`
`

`

`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`software applications may be sold as service offerings.” Id., 1:20-25. “Security in
`
`such environments may be an emerging challenge.” Id., 5:66-67.
`
`To address such security concerns, the ’441 patent discloses systems and
`
`methods “of providing an attestation service for an application at runtime executing
`
`on a computing platform using an attestation server.” Id., 26:27-29. The application
`
`may be an application targeted for use by a computing platform operated by a user
`
`that may desire an assurance or an attestation that the application is appropriate to
`
`be used. Id., 7:7-12. In an attestation service, “applications may be secured by
`
`signing-on or authenticating applications onto the network using an attestation
`
`process (e.g., via a single factor or multi-factor attestation).” Id., 6:1-4. The patent
`
`discloses a “method, apparatus and/or system to establish user-to-application
`
`connections based on the dynamic attestation of applications” EX1001, 1:41-44.
`
`FIG. 4 reproduced below illustrates the system and methods of the ’441 patent.
`
`3
`
`

`

`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`
`
`
`Referring to FIG. 4, a network 450 may include an instrumented target
`
`platform 400, a runtime monitor 401, an attestation broker or attestation server 402,
`
`collaboration services 403, an interactive user 404, and/or a network access enforcer
`
`405. Id., 14:9-12, 12:64-67.
`
`The specification explains that “[t]he user 404 may establish a physical
`
`connection over network 450 and may initiate an application access request 411 to
`
`commence or initiate a transaction with a target application hosted on the
`
`instrumented target platform 401.” Id., 14:12-16. “Applications running on the
`
`instrumented target platform 400 may be inspected by the runtime monitor 401 for
`
`application execution context and state changes.” Id., 14:17-19.
`
`4
`
`

`

`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`The “runtime monitor may generate a runtime application execution context
`
`(e.g., metadata), which may include, for example, the file hash digests and/or file
`
`attributes for loaded components of the running target application. The running
`
`target application may be registered by the runtime monitor 401 with the attestation
`
`broker 402 via a start notification 406 and the runtime application execution context
`
`(e.g., that may include the metadata) may be sent by the runtime monitor 401 to the
`
`attestation broker 402 via an application execution context change notification 408.”
`
`Id., 14:27-37.
`
`In response, the attestation broker or attestation server 402 “may verify the
`
`authenticity of the running application on the instrumented target platform 400 with
`
`a real time or near real time exchange 409 of the received metadata with one or more
`
`collaboration services 403 and the return of the application security context 410
`
`based on the exchanged metadata.” Id., 14:39-44, 12:64-67.
`
`“A network access enforcer 405 may register or subscribe with the attestation
`
`broker 402 as a web service over a web services protocol interface 412:413 for
`
`notifications (e.g., publications) of application statements or reports (e.g., claims)
`
`for running applications (e.g., all running applications) on a plurality of instrumented
`
`target platforms 400.” Id. 15:5-10. “The network access enforcer 405 may query the
`
`attestation broker 402 for user specific application bindings configured for the
`
`attestation broker 402 to determine authorization controls based on dynamic multi-
`
`5
`
`

`

`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`factor application attestation, and real time (or near real time) confidence metrics
`
`based on the local execution context 408 and assessed security context 410.” Id.,
`
`15:28-34. “[T]he network access enforcer 405…may deny access on an
`
`authenticated user based on the level of concern…as expressed in the user-to-
`
`application policy bindings provisioned for the attestation broker 402.” Id., 15:34-
`
`41.
`
`The Challenged Claims recite a “method of providing an attestation service
`
`for an application at runtime executing on a computing platform using an attestation
`
`server.” Id., 26:27-29.
`
`In the method recited in claim 1, the attestation server receives a runtime
`
`execution context indicating attributes of the application at runtime, and a security
`
`context providing security information about the application. Id., 26:30-39. The
`
`attributes comprise one or more executable file binaries of the application and loaded
`
`components of the application, and the security information comprises an execution
`
`analysis of the one or more executable file binaries and the loaded components. Id.
`
`Based on the received runtime execution context and the received security
`
`context, the attestation server generates as an attestation result. Id., 26:40- 44. The
`
`attestation server then sends the attestation result associated with the application. Id.,
`
`26:44-45. The claim does not identify where the attestation result is sent.
`
`6
`
`

`

`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`Claim 2 expands the method to include the attestation result generating an
`
`application artifact as a reference for changes in a subsequent execution context, and
`
`sending the generated application artifact such that subsequent changes to the
`
`runtime execution context are tracked based on the generated application artifact.
`
`Id., 26:46-52. Again, the claim does not identify where the generated application
`
`artifact is sent. The specification explains that “the attestation service may be
`
`configured to generate an artifact based on a runtime local execution context of the
`
`running application instance on the instrumented target platform.” Id., 2:40-43.
`
`Claim 3 adds digitally signing the attestation results and limits the attributes to
`
`further including parent-child process associations of the application. Id., 26:53-56.
`
`Claim 4 clarifies that the received security context is an introspective security
`
`context, and the execution analysis is a static, dynamic, or virtual analysis of the one
`
`or more executable file binaries and the loaded components. Id., 26:53-56. Claim 5
`
`further clarifies that the attestation server generates one or more security assertions
`
`that pertain to the received runtime execution context and the received introspective
`
`security context. Id., 26:63-67.
`
`Claim 6 adds to the method authenticating the application using a plurality of
`
`collaboration services. Id., 27:1-3. Claim 7 adds to the method controlling a user’s
`
`transaction with the application by applying a set of authorization rules in
`
`accordance with the attestation results. Id., 27:4-7.
`
`7
`
`

`

`C.
`Summary of the Prosecution History
`Prosecution of the 13/399,065 application that issued as the ’441 patent began
`
`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`
`with a non-final Office Action on April 27, 2012, in which claims 1-26 were rejected
`
`under 35 U.S.C. § 102(e) as unpatentable under U.S. Patent Publication
`
`2011/0179477 to Starnes. EX1004, pp.111-119. Applicant initiated an Examiner
`
`Interview on June 7, 2012. EX1004, p.107.
`
`After an Examiner Interview, Taasera responded on June 29, 2012, by
`
`amending claims 1, 3-5, 13-19, and 21-26. Of relevance to the Challenged Claims,
`
`independent claim 1 was amended to recite “wherein the attributes comprise one or
`
`more executable file binaries of the application and loaded components of the
`
`application... wherein the security information comprises an execution analysis of
`
`the one or more executable file binaries and the loaded components”.
`
`A Notice of Allowance then issued September 17, 2012, without an
`
`Examiner’s statement of reasons for allowance. Id., pp.44-45.
`
`D. Level of Ordinary Skill in the Art
`As established by the Declaration of Dr. Seth Nielson dated April 6, 2023
`
`(EX1003), a person having ordinary skill in the art (PHOSITA) at the time of the
`
`earliest claimed priority date for the ’948 patent would have had a bachelor’s degree
`
`in computer science, or a related field, or an equivalent technical degree or
`
`equivalent work experience, and an additional one to two years of education or
`
`8
`
`

`

`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`experience in the field of computer security topics. More education can supplement
`
`practical experience and vice versa. EX1003, ¶81.
`
`E. Claim Construction
`In this proceeding, claims are interpreted under the same standard applied by
`
`Article III courts (i.e., the Phillips standard). 37 C.F.R. § 42.100(b); Phillips v. AWH
`
`Corp., 415 F.3d 1303 (Fed. Cir. 2005) (en banc).
`
`For purposes of this proceeding only, Petitioner proposes that all claim terms
`
`should be given their plain and ordinary meanings and no specific claim
`
`constructions are necessary to apply the asserted prior art to the Challenged Claims.1
`
`See Wellman, Inc. v. Eastman Chem. Co., 642 F.3d 1355, 1361 (Fed. Cir. 2011)
`
`(“[C]laim terms need only be construed to the extent necessary to resolve the
`
`controversy.”).
`
`V. HOW THE CLAIMS ARE UNPATENTABLE
`The following discussion and the accompanying evidence demonstrate that
`
`there is a reasonable likelihood that Petitioner will prevail with respect to the
`
`Challenged Claims.
`
`
`1 Petitioner reserves the right in other proceedings to construe the Challenged Claims
`and pursue indefiniteness theories.
`
`9
`
`

`

`A. Overview of Asserted Prior Art
`Petitioner submits that claims 1-7 and 9 of the ’441 patent are invalid as
`
`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`
`unpatentable under 35 U.S.C. § 103(a) in view of the combination of Munetoh and
`
`Rajan.
`
`1. Munetoh
`Munetoh is directed towards an integrity management infrastructure for
`
`trusted computing based on a standard published by the Trusted Computing Group
`
`(TCG). EX1003, ¶¶83-84; EX1005, p.1. In Munetoh, a chain of trust is used to check
`
`the security and authenticity of various hardware and software components.
`
`EX1005, p.1; EX1003, ¶¶84, 89-91. In addition to managing the integrity of
`
`components on a device, Munetoh describes infrastructure for confirming and
`
`attesting to parties requesting the service can confirm trust in the service. EX1005,
`
`pp.4-5; EX1003, ¶¶86-87,91. Specifically, Munetoh provides an
`
`integrity
`
`management model that includes a remote verifier that provides platform trust
`
`services (PTS). EX1005, p.4, Fig.-1; EX1003, ¶¶87,93. Information about the
`
`trustworthiness of a platform is collected and monitored by a client (agent) installed
`
`on the platform. EX1005, pp.5-6. The system is illustrated in Figure 1 of Munetoh
`
`which is reproduced below.
`
`10
`
`

`

`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`
`
`
`The platform trust services at the remote verifier includes a finite state
`
`machine that records the change of states on a platform received in an integrity
`
`measurement log (IML). Id. The applications running on the server being analyzed
`
`for trust may also be measured and attested by the remote verifier by analyzing the
`
`behavior and integrity of software components that are loaded and executed.
`
`EX1005, pp.3-6. Specifically, hash values are measured for binary images of
`
`software components and these components are verified to ensure they are known
`
`and intact. EX1005, pp.2-3. Therefore, a user (relying party) requesting application
`
`services may be provided by the platform with an attestation (validation result)
`
`generated by the remote verifier. EX1005, p.4; EX1003, ¶¶86-87.
`
`11
`
`

`

`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`Informationally, the remote verifier serves as an information clearinghouse
`
`and analyzer, including receiving reference manifest from third parties that
`
`developed the hardware and software to be attested, receiving a policy that needs to
`
`be met for the relying party, receiving a platform configuration register (PCR) that
`
`is an immutable record of integrity for an application and its components, and
`
`receiving vulnerability data for applications to be analyzed on the platform. EX1005,
`
`pp.3-4,7-8. The PCR data and the IML may be combined in an integrity report which
`
`can also include security policy information. The IR is then compared to the relying
`
`party’s requested security policy to see if the security of the platform meets the
`
`policy, and the relying party is informed of the result in a validation result. EX1005,
`
`pp.4-5; EX1003, ¶¶88,92-93.
`
`2.
`Rajan
`Rajan is directed toward providing trustworthy services in a service-oriented
`
`architecture based on a standard published by the Trusted Computing Group (TCG).
`
`EX1006, p.2; EX1003, ¶¶95,101. This architecture is shown in Fig. 1:
`
`12
`
`

`

`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`
`
`
`EX1006, Fig. 1.
`
`This architecture of Rajan includes components for client, provider, and
`
`broker. Id. Among other things, Rajan discloses “an extension of the traditional
`
`notion of a service-oriented architecture that allows clients, brokers, and providers
`
`to negotiate and validate the integrity of a requirements monitor.” Id., p.1.
`
`Rajan describes several different hashes, keys and certificates that are used to
`
`sign various hardware and software components of server providing services.
`
`EX1006, pp.3,5. Rajan proposes adding a trust negotiation and verification interface
`
`to facilitate negotiation of the desired level of trust between the components.
`
`13
`
`

`

`Petition for Inter Partes Review
`U.S. Patent No. 8,327,441
`EX1006, p.4. Further, a requirem

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket