throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________
`
`CROWDSTRIKE, INC.
`Petitioner
`
`v.
`
`TAASERA
`Patent Owner
`
`____________
`
`Case No. IPR2024-00027
`Patent No. 7,673,137
` ____________
`
`DECLARATION OF JUNE ANN MUNFORD
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 1
`
`

`

`1. My name is June Ann Munford. I am over the age of 18, have personal
`
`knowledge of the facts set forth herein, and am competent to testify to the
`
`same.
`
`2. I earned a Master of Library and Information Science (MLIS) from the
`
`University of Wisconsin-Milwaukee in 2009. I have over ten years of
`
`experience in the library/information science field. Beginning in 2004, I
`
`have served in various positions in the public library sector including
`
`Assistant Librarian, Youth Services Librarian and Library Director. I have
`
`attached my Curriculum Vitae as Appendix CV.
`
`3. During my career in the library profession, I have been responsible for
`
`materials acquisition for multiple libraries. In that position, I have cataloged,
`
`purchased and processed incoming library works. That includes purchasing
`
`materials directly from vendors, recording publishing data from the material
`
`in question, creating detailed material records for library catalogs and
`
`physically preparing that material for circulation. In addition to my
`
`experience in acquisitions, I was also responsible for analyzing large
`
`collections of library materials, tailoring library records for optimal catalog
`
`1
`
`
`
`
`
`
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 2
`
`

`

`search performance and creating lending agreements between libraries
`
`during my time as a Library Director.
`
`
`4. I am fully familiar with the catalog record creation process in the library
`
`sector. In preparing a material for public availability, a library catalog record
`
`describing that material would be created. These records are typically
`
`written in Machine Readable Catalog (herein referred to as “MARC”) code
`
`and contain information such as a physical description of the material,
`
`metadata from the material’s publisher, and date of library acquisition. In
`
`particular, the 008 field of the MARC record is reserved for denoting the
`
`date of creation of the library record itself. As this typically occurs during
`
`the process of preparing materials for public access, it is my experience that
`
`an item’s MARC record indicates the date of an item’s public availability.
`
`
`5. Typically, in creating a MARC record, a librarian would gather various bits
`
`of metadata such as book title, publisher and subject headings among others
`
`and assign each value to a relevant numerical field. For example, a book’s
`
`physical description is tracked in field 300 while title/attribution is tracked in
`
`field 245. The 008 field of the MARC record is reserved for denoting the
`
`creation of the library record itself. As this is the only date reflecting the
`
`inclusion of said materials within the library’s collection, it is my experience
`
`
`
`2
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 3
`
`

`

`that an item’s 008 field accurately indicates the date of an item’s public
`
`availability.
`
`
`6. I have reviewed Exhibit 1005, an IBM Research Report entitled
`
`ChakraVyuha (CV): A Sandbox Operating System Environment for
`
`Controlled Execution of Alien Code by Asit Dan, Ajay Mohindra, Rajiv
`
`Ramaswami and Dinkar Sitaram.
`
`
`7. Attached hereto as Appendix DAN01 is a true and correct copy of the
`
`MARC record for ChakraVyuha (CV): A Sandbox Operating System
`
`Environment for Controlled Execution of Alien Code as held by the Carnegie
`
`Mellon University Library. I secured this record myself from the library’s
`
`public catalog. The MARC record contained within Appendix DAN01
`
`accurately describes ChakraVyuha (CV): A Sandbox Operating System
`
`Environment for Controlled Execution of Alien Code.
`
`
`8. My determination that the MARC record contained within Appendix
`
`DAN01 accurately describes ChakraVyuha (CV): A Sandbox Operating
`
`System Environment for Controlled Execution of Alien Code is based upon
`
`the accuracy of several fields within this MARC record. The 088 field,
`
`describing the work’s report number, matches the report number of
`
`
`
`3
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 4
`
`

`

`ChakraVyuha (CV): A Sandbox Operating System Environment for
`
`Controlled Execution of Alien Code as represented in Exhibit 1005. The 245
`
`field, describing the title and authorship of the work, matches the title and
`
`authors as represented in Exhibit 1005. The 260 field describing the
`
`publisher of the work is properly attributed to the IBM Corporation, as found
`
`in Exhibit 1005. The 300 field, describing the physical attributes of the
`
`work, matches the page number as represented in Exhibit 1005.
`
`
`9. Attached hereto as Appendix DAN02 is a true and correct copy of
`
`ChakraVyuha (CV): A Sandbox Operating System Environment for
`
`Controlled Execution of Alien Code as held by the Carnegie Mellon
`
`University Library. I secured these scans myself from the library’s
`
`collection. In comparing Exhibit 1005 to Appendix DAN02, it is my
`
`determination that Exhibit 1005 is a true and correct copy of ChakraVyuha
`
`(CV): A Sandbox Operating System Environment for Controlled Execution
`
`of Alien Code by Asit Dan, Ajay Mohindra, Rajiv Ramaswami and Dinkar
`
`Sitaram.
`
`
`10. While Appendix DAN01 does accurately describe the report number, title,
`
`author, publisher and page number of ChakraVyuha (CV): A Sandbox
`
`Operating System Environment for Controlled Execution of Alien Code
`
`
`
`4
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 5
`
`

`

`found within Exhibit 1005, this record also accurately describes the report
`
`number, title, author, publisher and page number of ChakraVyuha (CV): A
`
`Sandbox Operating System Environment for Controlled Execution of Alien
`
`Code as presented in Appendix DAN02. The MARC record presented in
`
`Appendix DAN01 also describes several proprietary elements exclusive to
`
`the Carnegie Mellon University copy of this report presented in Appendix
`
`DAN02. For instance, this paper is organized on Carnegie Mellon’s shelves
`
`by call number – a combination of letters and numbers that ensure library
`
`materials are shelved near other materials with similar topics. This call
`
`number – IBMC 20742 – can be found on page 1 of the MARC record in
`
`field 099, page 2 of the MARC record in the ‘location items’ field, and in
`
`two places on page 1 of Appendix DAN02 – the top left of the page and a
`
`shelving sticker in the bottom left of the page. On page 2 of Appendix
`
`DAN02, a post-it note can be found reading as follows: ‘1. client/server
`
`computer, 2. computer security, 3. coding theory’. These phrases are subject
`
`headings, typically used to describe the topic of a work when creating a
`
`MARC record. These subject headings identically correspond to the subject
`
`heading fields found in field 650 of Appendix DAN01.
`
`
`
`
`
`5
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 6
`
`

`

`11. The 008 field of the MARC record in Appendix DAN01 indicates the date of
`
`record creation. The 008 field of Appendix DAN01 indicates Carnegie
`
`Mellon University library first acquired this book on July 3, 1997.
`
`Considering this information, it is my determination that ChakraVyuha
`
`(CV): A Sandbox Operating System Environment for Controlled Execution
`
`of Alien Code was made available to the public shortly after its initial
`
`acquisition as of July 3, 1997.
`
`
`12. In addition to the 008 field of Appendix DAN01 indicating the first date of
`
`library acquisition, there is additional information regarding availability to
`
`be found within Carnegie Mellon’s copy of ChakraVyuha (CV): A Sandbox
`
`Operating System Environment for Controlled Execution of Alien Code as
`
`presented in Appendix DAN02. On page 25 of Appendix DAN02, there is a
`
`date stamped reading ‘JUL 22 1997’. In my experience preparing library
`
`material for public accessibility, this marking is known as a date stamp and
`
`is added by library staff after the material has been cataloged. In my
`
`experience cataloging and preparing materials for the shelf, this 19-day gap
`
`between the two dates is typical of the cataloging process.
`
`
`13. On page 1 of Appendix DAN02, there is a stamp on the bottom of the page
`
`reading ‘Room Use Only Until AUG 15 1997’. In my experience preparing
`
`
`
`6
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 7
`
`

`

`library materials for public accessibility, this stamp represents a usage
`
`restriction typical of some library materials - the need for the library user to
`
`interact with the material on-site at the library in some type of private
`
`reading room. The date visible on this stamp has been struck, implying that
`
`the usage restriction has expired. I note that this usage restriction would have
`
`no impact on the public accessibility of the material.
`
`
`14. The MARC record for ChakraVyuha (CV): A Sandbox Operating System
`
`Environment for Controlled Execution of Alien Code found within Appendix
`
`DAN01 in combination with features present in the Appendix DAN02
`
`provide a clear timeline of this material’s accessibility via the Carnegie
`
`Library University library. The 008 field of ChakraVyuha (CV): A Sandbox
`
`Operating System Environment for Controlled Execution of Alien Code’s
`
`MARC record indicates this paper was first cataloged by Carnegie Mellon
`
`Librarians as of July 3, 1997. The date stamp on page 25 of Appendix
`
`DAN02 indicates this book was prepared for public accessibility as of July
`
`22, 1997. The usage restriction stamp on page 1 of Appendix DAN01
`
`indicates this material was made available to the public at first with some
`
`usage restrictions, which expired as of August 15, 1997.
`
`
`
`
`
`7
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 8
`
`

`

`15. I am familiar with the Internet Archive, a digital library formally certified by
`
`the State of California as a public library. Among other services that the
`
`Internet Archive makes available to the general public is the Wayback
`
`Machine, an online archive. The Internet Archive’s Wayback Machine
`
`service archives webpages as of a certain capture date to track changes in the
`
`web over time. The Internet Archive has been in operation as a nonprofit
`
`library since 1996 and has hosted the Wayback Machine service since its
`
`inception in 2001. During my time as a librarian, I frequently used the
`
`Internet Archive’s Wayback Machine for research and instruction purposes.
`
`This includes teaching instructional classes on using the Wayback Machine
`
`to library patrons and using the Wayback Machine to research reference
`
`inquiries that require hard-to-find online resources. I consider the Internet
`
`Archive’s recordskeeping to be as rigorous and detailed as other formal
`
`library recordskeeping practices such as MARC records, OCLC records and
`
`Dublin Core.
`
`
`16. Attached hereto as Appendix CMU01 is a screen capture of the Internet
`
`Archive Wayback Machine entry for
`
`http://hathorne.library.cmu.edu/uhtbin/cgisirsi/0/1/0. I secured these screen
`
`captures myself from
`
`
`
`8
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 9
`
`

`

`https://web.archive.org/web/19970301000000*/http://hathorne.library.cmu.e
`
`du/uhtbin/cgisirsi/0/1/0.
`
`
`17. Appendix CMU01 is a webpage entitled Unicorn WebCat – Unicorn Public
`
`Access Choices as published on the Carnegie Mellon University library
`
`website, captured by the Internet Archive on April 24, 1997. This page
`
`describes user options when interacting with the Carnegie Mellon University
`
`library catalog as such: ‘Library materials are described in indexed records
`
`in the online catalog. Under the library catalog you can lookup library
`
`materials using a particular word or phrase, or review lists of the library’s
`
`authors, titles, subjects, series, keywords, or call numbers.’
`
`
`18. Attached hereto as Appendix CMU02 is a screen capture of the Internet
`
`Archive Wayback Machine entry for
`
`http://www.library.cmu.edu/Research/Online/index.html. I secured these
`
`screen captures myself from
`
`https://web.archive.org/web/19971009135520/http://www.library.cmu.edu/R
`
`esearch/Online/index.html.
`
`
`19. Appendix CMU02 is a webpage entitled Catalogs and Databases as
`
`published on the Carnegie Mellon University library website, captured by
`
`
`
`9
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 10
`
`

`

`the Internet Archive on October 9, 1997. This page describes the software
`
`used to manage the library’s online public-facing catalog, a commonly used
`
`software program by the Sirsi Corporation known as WebCat. Carnegie
`
`Mellon’s use of this software indicates that the catalog includes shelving
`
`locations for library materials held at different library facilities. This page
`
`also confirms that the catalog is updated daily, that users can interface with
`
`this catalog via a web browser and that access is unrestricted aside from a
`
`few exceptions detailed within.
`
`
`20. To summarize, Appendix CMU01 indicates that Carnegie Mellon library
`
`materials are described in indexed library catalog records and presented as
`
`an online catalog that allows users to search by words/phrases and review
`
`lists of the library’s authors, titles, subjects, series, keywords, or call
`
`numbers. Appendix CMU02 indicates that Carnegie Mellon University’s
`
`library records are designed to correspond with the library’s holdings in
`
`individual libraries, such as the Hunt Library where ChakraVyuha (CV): A
`
`Sandbox Operating System Environment for Controlled Execution of Alien
`
`Code can be found. Appendix CMU02 also indicates that Carnegie Mellon
`
`University are using Sirsi’s Unicorn and WebCat software to present their
`
`online catalog.
`
`
`
`
`
`10
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 11
`
`

`

`21. Attached hereto as Appendix SIRSI01 is a screen capture of the Internet
`
`Archive Wayback Machine entry for
`
`http://www.sirsi.com/Products/ulms.html. I secured these screen captures
`
`myself from
`
`https://web.archive.org/web/19970627002415/http://www.sirsi.com/Product
`
`s/ulms.html.
`
`
`22. Appendix SIRSI01 is a webpage entitled Unicorn Library Management
`
`System as published on the Sirsi Corporation website, captured by the
`
`Internet Archive on June 27, 1997. This page describes the Unicorn Library
`
`Management software used by Carnegie Mellon University as of 1997,
`
`visible in Appendix CMU01. The page describes the public accessibility
`
`features of the Unicorn software as follows: ‘UNICORN’s highly evolved
`
`public access catalog is designed to address the needs of the beginning
`
`searcher, as well as the researcher. Separate choices are available for
`
`browsing and keyword searching. A full-text index is available as a standard
`
`feature of UNICORN, providing the best possible approach for accessing all
`
`library material. Precise search results are easily retrieved using
`
`UNICORN's sophisticated truncation, boolean, relational, adjacency, and
`
`proximity operators.’
`
`
`
`
`
`11
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 12
`
`

`

`23. Attached hereto as Appendix SIRSI02 is a screen capture of the Internet
`
`Archive Wayback Machine entry for
`
`http://www.sirsi.com/Products/webcat.html. I secured these screen captures
`
`myself from
`
`https://web.archive.org/web/19970627002554/http://www.sirsi.com/Product
`
`s/webcat.html.
`
`
`24. Appendix SIRSI02 is a webpage entitled WebCat with Z39.50 as published
`
`on the Sirsi Corporation website, captured by the Internet Archive on June
`
`27, 1997. This page describes the WebCat Library Catalog software used by
`
`Carnegie Mellon University as of 1997, visible in Appendices CMU01 and
`
`CMU02. Some of the WebCat features are detailed as follows: ‘The easy-to-
`
`use, familiar look and feel of today’s web browsers host WebCat’s powerful
`
`features: quickly create and execute simple or complex search statements,
`
`browse and select terms from heading lists, search related information by
`
`clicking on hypertext terms, view cross-reference information, sort search
`
`results, export selected records to networked printers, files or email, link to
`
`library holdings information on one or more servers [and] execute previous
`
`searches from search history.’
`
`
`
`
`
`12
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 13
`
`

`

`25. To further summarize, Appendix SIRSI01 describes the Unicorn software
`
`implemented by Carnegie Mellon University libraries as of 1997. Based on
`
`Sirsi’s descriptions of the Unicorn software, library catalog users are
`
`presented a full-text index of the library’s holdings and can review those
`
`holdings via browsing or search features. Specifically, the Unicorn program
`
`includes advanced search features such as keyword searching, boolean
`
`operators and proximity operators. Appendix SIRSI02 describes the WebCat
`
`software implemented by Carnegie Mellon University libraries as of 1997.
`
`Based on Sirsi’s descriptions of WebCat, users are presented with an
`
`interactive library catalog when interacting with a WebCat page.
`
`Specifically, the WebCat online catalog supports simple and complex search
`
`statements, cross-references between similar materials, the ability to sort
`
`search results based on user preferences and the ability to browse one’s
`
`search history.
`
`
`26. Appendices CMU01 and CMU02 indicate the Carnegie Mellon University
`
`Library implemented Sirsi’s Unicorn and WebCat software to create a
`
`detailed inventory of the library’s holdings and present users with an
`
`interactive library catalog to search this inventory. Appendices SIRSI01 and
`
`SIRSI02 indicate that Sirsi’s library software enables users to search through
`
`library catalog records using various complex search strategies. As such, it is
`
`
`
`13
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 14
`
`

`

`my determination that ChakraVyuha (CV): A Sandbox Operating System
`
`Environment for Controlled Execution of Alien Code was sufficiently
`
`indexed at the time of its acquisition by the Carnegie Mellon University
`
`Library in July 1997. This indexing via Carnegie Mellon University’s
`
`Library catalog records allows any library catalog user to locate
`
`ChakraVyuha (CV): A Sandbox Operating System Environment for
`
`Controlled Execution of Alien Code via common search engines practices
`
`and access this paper within the Carnegie Mellon University Library’s
`
`collection. Thus, any members of the interested public exercising reasonable
`
`diligence would have been able to locate ChakraVyuha (CV): A Sandbox
`
`Operating System Environment for Controlled Execution of Alien Code in
`
`the Carnegie Mellon University Library as of July 22, 1997.
`
`
`27. I have been retained on behalf of the Petitioner to provide assistance in the
`
`above-illustrated matter in establishing the authenticity and public
`
`availability of the documents discussed in this declaration. I am being
`
`compensated for my services in this matter at the rate of $200.00 per hour
`
`plus reasonable expenses. My statements are objective, and my
`
`compensation does not depend on the outcome of this matter.
`
`
`
`
`
`14
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 15
`
`

`

`28. I declare under penalty of perjury that the foregoing is true and correct. I
`
`hereby declare that all statements made herein of my own knowledge are
`
`true and that all statements made on information and belief are believed to
`
`be true; and further that these statements were made the knowledge that
`
`willful false statements and the like so made are punishable by fine or
`
`imprisonment, or both, under Section 1001 of Title 18 of the United States
`
`Code.
`
`
`
`Dated: 10/20/2023
`
`
`
`June Ann Munford
`
`
`
`15
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 16
`
`

`

`
`
`
`
`
`
`Appendix CV
`Appendix CV
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 17
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 17
`
`

`

`June A. Munford
`Curriculum Vitae
`
`Education
`
`University of Wisconsin-Milwaukee - MS, Library & Information Science, 2009
`Milwaukee, WI
`
`
`● Coursework included cataloging, metadata, data analysis, library systems,
`management strategies and collection development.
`● Specialized in library advocacy, cataloging and public administration.
`
`
`Grand Valley State University - BA, English Language & Literature, 2008
`Allendale, MI
`
` ●
`
` Coursework included linguistics, documentation and literary analysis.
`● Minor in political science with a focus in local-level economics and
`government.
`
`
`
`Professional Experience
`
`Researcher / Expert Witness, October 2017 – present
`Freelance ● Pittsburgh, Pennsylvania & Grand Rapids, Michigan
`
`
`● Material authentication and public accessibility determination.
`Declarations of authenticity and/or public accessibility provided upon
`research completion. Experienced with appeals and deposition process.
`
` ●
`
` Research provided on topics of public library operations, material
`publication history, digital database services and legacy web resources.
`
` ●
`
` Past clients include Alston & Bird, Arnold & Porter, Baker Botts, Fish &
`Richardson, Erise IP, Irell & Manella, O'Melveny & Myers, Perkins-Coie,
`Pillsbury Winthrop Shaw Pittman and Slayden Grubert Beard.
`
`Library Director, February 2013 - March 2015
`Dowagiac District Library ● Dowagiac, Michigan
`
`
`● Executive administrator of the Dowagiac District Library. Located in
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 18
`
`

`

`Southwest Michigan, this library has a service area of 13,000, an annual
`operating budget of over $400,000 and total assets of approximately
`$1,300,000.
`
`● Developed careful budgeting guidelines to produce a 15% surplus during
`the 2013-2014 & 2014-2015 fiscal years while being audited.
`
`
`
` ●
`
` Using this budget surplus, oversaw significant library investments
`including the purchase of property for a future building site, demolition of
`existing buildings and building renovation projects on the current facility.
`
` Led the organization and digitization of the library's archival records.
`
` ●
`
` ●
`
` Served as the public representative for the library, developing business
`relationships with local school, museum and tribal government entities.
`
` ●
`
` Developed an objective-based analysis system for measuring library
`services - including a full collection analysis of the library's 50,000+
`circulating items and their records.
`
`November 2010 - January 2013
`Librarian & Branch Manager, Anchorage Public Library ● Anchorage, Alaska
`
`
`● Headed the 2013 Anchorage Reads community reading campaign
`including event planning, staging public performances and creating
`marketing materials for mass distribution.
`
` ●
`
` Co-led the social media department of the library's marketing team,
`drafting social media guidelines, creating original content and instituting
`long-term planning via content calendars.
`
` ●
`
` Developed business relationships with The Boys & Girls Club, Anchorage
`School District and the US Army to establish summer reading programs for
`children.
`
`
`June 2004 - September 2005, September 2006 - October 2013
`Library Assistant, Hart Area Public Library
`Hart, MI
`
`
`● Responsible for verifying imported MARC records and original MARC
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 19
`
`

`

`
`
`cataloging for the local-level collection as well as the Michigan Electronic
`Library.
`
`● Handled OCLC Worldcat interlibrary loan requests & fulfillment via
`ongoing communication with lending libraries.
`
`
`
`Professional Involvement
`
`Alaska Library Association - Anchorage Chapter
`● Treasurer, 2012
`
`
`Library Of Michigan
`● Level VII Certification, 2008
`● Level II Certification, 2013
`
`
`Michigan Library Association Annual Conference 2014
`● New Directors Conference Panel Member
`
`
`Southwest Michigan Library Cooperative
`● Represented the Dowagiac District Library, 2013-2015
`
`
`
`Professional Development
`
`Library Of Michigan Beginning Workshop, May 2008
`Petoskey, MI
`● Received training in cataloging, local history, collection management,
`children’s literacy and reference service.
`
`
`Public Library Association Intensive Library Management Training, October 2011
`Nashville, TN
`● Attended a five-day workshop focused on strategic planning, staff
`management, statistical analysis, collections and cataloging theory.
`
`
`Alaska Library Association Annual Conference 2012 - Fairbanks, February 2012
`Fairbanks, AK
`● Attended seminars on EBSCO advanced search methods, budgeting,
`cataloging, database usage and marketing.
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 20
`
`

`

`Depositions
`
`2019 ● Fish & Richardson
`Apple v. Qualcomm (IPR2018-001281, 39521-00421IP, IPR2018-01282
`and 39521-00421IP2)
`
`2019 ● Erise IP
`
`Implicit, LLC v. Netscout Systems, Inc (Civil Action No. 2:18-cv-53-JRG)
`
`2019 ● Perkins-Coie
`
`Adobe Inc. v. RAH Color Technologies LLC (Cases IPR2019-00627,
`
`IPR2019-00628, IPR2019-00629 and IPR2019-00646)
`
`2020 ● O’Melveny & Myers
`
`Maxell, Ltd. v. Apple Inc. (Case No. 5:19-cv-00036-RWS)
`
`2021 ● Pillsbury Winthrop Shaw Pittman LLP
`
`Intel v. SRC (IPR2020-1449)
`
`2022 ● Perkins-Coie
`
`Realtek v. Future Link (IPR2021-01182)
`
`2023 ● Fish & Richardson
`
`Neuroderm Ltd. v. Abbvie, Inc (Case No. PGR2022-00040)
`
`2023 ● Fish & Richardson
`
`Nearmap US Inc. v. Pictometry International Corp. (IPR2022-00735)
`
`2023 ● Fish & Richardson
`
`Samsung Electronics v. MemoryWeb LLC (Case No. 39843-0136PS1)
`
`
`
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 21
`
`

`

`Limited Case History & Potential Conflicts
`
`Alston & Bird
`● Ericsson
`
`v. Collision Communications (IPR2022-01233)
`
`● Nokia
` v. Neptune Subsea, Xtera (Case No. 1:17-cv-01876)
`
`● Universal Electronics Inc
` v. Roku Inc (IPR2022-00818)
`
`
`
`
`
`
`
`
`
`
`Arnold & Porter
`● Ivantis
` v. Glaukos (Case No. 8:18-cv-00620)
`
`
`
`● Samsung
` v. Jawbone (Case No. 2:21-cv-00186)
`
`
`
`Benesch Friedlander Coplan & Aronoff
`● Voyis
`
`v. Cathx (Case No. 5:21-cv-00077-RWS)
`
`Erise I.P.
`
`● Apple
`
`
`v. Ericsson Inc. (IPR2022-00715)
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 22
`
`

`

`v. Future Link Systems (IPRs 6317804, 6622108, 6807505, and
`
`7917680)
`v. INVT (Case No. 20-1881)
`v. Navblazer LLC (IPR2020-01253)
`v. Qualcomm (IPR2018-001281, 39521-00421IP, IPR2018-01282,
`39521-00421IP2)
`v. Quest Nettech Corp (Case No. 2:19-cv-00118-JRG)
`v. Telefonaktiebolaget LM Ericsson (IPR2022-00275)
`
`
`
`
`
`
`
`
` ●
`
` Fanduel
` v. CGT (Case No. 19-1393)
`
` ●
`
` Garmin
` v. Phillips North America LLC (Case No. 2:19-cv-6301-AB-KS)
`
` Netscout
`v. Longhorn HD LLC (Case No. 2:20-cv-00349)
`v. Implicit, LLC (Civil Action No. 2:18-cv-53-JRG)
`
`
`
` Sony Interactive Entertainment LLC
`v. Bot M8 LLC (IPR2020-01288)
`v. Infernal Technology LLC (Case No. 2:19-CV-00248-JRG)
`
` Unified Patents
`v. GE Video Compression (Civil Action No. 2:19-cv-248)
`
` ●
`
`
`
`
` ●
`
`
`
`
` ●
`
`
`
`
`
`
`
`
`
`
`
`
`Fish & Richardson
`
`● Apple
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 23
`
`

`

`
`
`
`
`
`
`
`
`
`v. AliveCor (3:21-cv-03958)
`v. LBS Innovations (Case No. 2:19-cv-00119-JRG-RSP)
`v. Koss Corporation (IPR2021-00305)
`v. Masimo (IPR 50095-0012IP1, 50095-0012IP2, 50095-0013IP1,
`50095-0013IP2, 50095-0006IP1, 50095-0135IP1)
`v. Neonode (Case No. 21-cv-08872-EMC)
`v. Qualcomm (IPR2018-001281, 39521-00421IP, IPR2018-01282,
`39521-00421IP2)
`
`● Dell
`
`v. Neo Wireless (IPR2022-00616)
`
`● Dish Network
`
`v. Realtime Adaptive Streaming (Case No. 1:17-CV-02097-RBJ)
`v. TQ Delta LLC (Case No. 18-1798)
`
` ●
`
` Evapco Dry Cooling
`v. SPG Dry Cooling (IPR2021-00688)
`
`
`
`● Genetec
`
`v. Sensormatic Electronics (Case No. 1:20-CV-00760)
`
`● Huawei
` v. Bell Northern Research LLC (IPR2019-01174)
`
` ●
`
` Kianxis
` v. Blue Yonder (Case No. 3:20-cv-03636)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 24
`
`

`

`● LG Electronics
` v. Bell Northern Research LLC (Case No. 3:18-cv-2864-CAB-BLM)
`
` ●
`
` ●
`
` Metaswitch
` v. Sonus Networks (IPR2018-01719)
`
` Microsoft
`v. Throughputer Inc (IPR2022-00757)
`
`
`
` ●
`
` MLC Intellectual Property
` v. MicronTech (Case No. 3:14-cv-03657-SI)
`
` ●
`
` Nearmap Inc
`v. EagleView Technologies (IPR2022-01009)
`
` Neuroderm Ltd.
`v. Abbvie, Inc (Case No. PGR2022-00040)
`
` ●
`
`
`
` ●
`
` Realtek Semiconductor
` v. Future Link (IPR2021-01182)
`
` ●
`
` Quectel
` v. Koninklijke Philips (Case No. 1:20-cv-01710)
`
` Samsung
`v. Aire Technology (IPR2022-00877)
`v. Bell Northern Research (Case No. 2:19-cv-00286-JRG)
`v. Communication Technologies Inc (IPR2022-01221)
`
` ●
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 25
`
`

`

`v. Jawbone Innovations (IPR2022-00865)
`v. MemoryWeb LLC (IPR2022-00885)
`v. Telefonaktiebolaget LM Ericsson (IPR2021-00615)
`
` Texas Instruments
`v. Vantage Micro LLC (IPR2020-01261)
`
` Xilinx
`v. Sentient Sensors LCC (Case No. 1:22-cv-00173)
`
` ●
`
`
`
` ●
`
`
`
`
`Irell & Manella
`
`● Curium
`
`O’Melveny & Myers
`
`● Apple
`
`v. Maxell (Case No. 5:19-cv-00036-RWS)
`
`
`● Samsung
`
` v. Daedalus Prime LLC (1335 Investigation)
`
`
`
`Perkins-Coie
`
`● Heru Industries
`v. The UAB Research Foundation (IPR2022-01148)
`
` Intel Corporation
`v. BitMICRO (Case No. 5:23-cv-00625)
`
` ●
`
`
`
`
`
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 26
`
`

`

`● Realtek Semiconductor
` v. Future Link (IPR2021-01182)
`● Twitter Inc
`
`v. VOIP-Pal.com (Case No. 3:20-cv-02397-JD)
`
` ●
`
` TCL Industries
`v. Koninklijke Philips NV (IPR2021-00495, IPR2021-00496
`
`
` and IPR2021-00497)
`
`
`
`Pillsbury Winthrop Shaw Pittman
`
`
`
`
`
`
`
`
`
`
`
`● Gravel Rating Systems
`
`v. Costco (Case No. 4:21-cv-149)
`
`v. Lowe’s Home Centers (Case No. 4:21-cv-150)
`
`v. T-Mobile USA (Case No. 4:21-cv-152)
`
`v. Kohl’s Inc. (Case No. 4:21-cv-258)
`
`v. Under Armor (Case No. 4:21-cv-356)
`
`● Intel
`
`v. FG SRC LLC (Case No. 6:20-cv-00315)
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 27
`
`

`

`
`
`
`
`
`
`Appendix DAN01
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 28
`
`

`

`10/17/23, 9:38 AM
`
`nimbus screenshot app print
`
`screenshot-cmu.primo.exlibrisgroup.com-2023.10.17-09_37_51
`https://cmu.primo.exlibrisgroup.com/discovery/sourceRecord?vid=01CMU_INST:01CMU&docId=alma991003215149704436&recordOwner=01CMU_INST
`17.10.2023
`
`chrome-extension://bpconcjcammlapcogcnnelfmaeghhagj/edit.html
`
`1/1
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 29
`
`

`

`10/17/23, 9:39 AM
`
`nimbus screenshot app print
`
`screenshot-cmu.primo.exlibrisgroup.com-2023.10.17-09_37_51
`https://cmu.primo.exlibrisgroup.com/discovery/sourceRecord?vid=01CMU_INST:01CMU&docId=alma991003215149704436&recordOwner=01CMU_INST
`17.10.2023
`
`chrome-extension://bpconcjcammlapcogcnnelfmaeghhagj/edit.html
`
`1/2
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 30
`
`

`

`10/17/23, 9:39 AM
`
`nimbus screenshot app print
`
`chrome-extension://bpconcjcammlapcogcnnelfmaeghhagj/edit.html
`
`2/2
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 31
`
`

`

`
`
`
`
`
`
`Appendix DAN02
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 32
`
`

`

`zrBmMc
`“ZOo7HZ
`RC 20742 (91875) 2/20/97
`ComputerScience/Mathematics 22 pages
`
`|
`
`Research Report
`
`Compe,
`TECHNICAL RERNCE DEPT,
`_
`an
`FILE
`F
`
`Chakra Vyuha' (CV): A Sandbox Operating System Environmentfor
`Controlled Execution of Alien Code
`
`Asit Dan, Ajay Mohindra, Rajiv Ramaswami, Dinkar Sitaram
`IBM Research Division
`T.J. Watson Research Center
`P.O. Box 218
`Yorktown Heights, NY 10598
`
`Re 2 Rotl, beso th ernie
`
`7ocs
`
`LIMITED DISTRIBUTION NOTICE
`It has been issued as a
`This report has been submitted for publication outside of IBMandwill probablybe copyrightedif accepted for publication.
`Research Report for early dissemination ofits contents. In viewofthe transfer of copyright to the outside publisher, its distribution outside of IBM
`prior to publication should belimited to peer communications andspecific requests. After outside publication, requests should befilled only by
`reprints or legally obtained copiesofthe article (e.g.. payment ofroyalties).
`
`= ResearchDivision
`Jun](un il
`
`*= Almaden-T.J. Watson - Tokyo+ Zurich * Austin
`
`IBMC20742
`
`ROOM USE ONLY A
`UNTILeae
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 33
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 33
`
`

`

`
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 34
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 34
`
`

`

`ChakraVyuha' (CV): A Sandbox Operating System
`Environment for Controlled Execution of Alien Code
`
`Asit Dan, Ajay Mohindra, Rajiv Ramaswamiand Dinkar Sitaram
`IBM T. J. Watson Research Center
`Yorktown Heights, NY 10598
`{asit, ajay, rajiv, sitaram }@watson.ibm.com
`
`Abstract
`
`Sharing of unknown prog

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket