`
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________
`
`CROWDSTRIKE, INC.
`Petitioner
`
`v.
`
`TAASERA
`Patent Owner
`
`____________
`
`Case No. IPR2024-00027
`Patent No. 7,673,137
` ____________
`
`DECLARATION OF JUNE ANN MUNFORD
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 1
`
`
`
`1. My name is June Ann Munford. I am over the age of 18, have personal
`
`knowledge of the facts set forth herein, and am competent to testify to the
`
`same.
`
`2. I earned a Master of Library and Information Science (MLIS) from the
`
`University of Wisconsin-Milwaukee in 2009. I have over ten years of
`
`experience in the library/information science field. Beginning in 2004, I
`
`have served in various positions in the public library sector including
`
`Assistant Librarian, Youth Services Librarian and Library Director. I have
`
`attached my Curriculum Vitae as Appendix CV.
`
`3. During my career in the library profession, I have been responsible for
`
`materials acquisition for multiple libraries. In that position, I have cataloged,
`
`purchased and processed incoming library works. That includes purchasing
`
`materials directly from vendors, recording publishing data from the material
`
`in question, creating detailed material records for library catalogs and
`
`physically preparing that material for circulation. In addition to my
`
`experience in acquisitions, I was also responsible for analyzing large
`
`collections of library materials, tailoring library records for optimal catalog
`
`1
`
`
`
`
`
`
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 2
`
`
`
`search performance and creating lending agreements between libraries
`
`during my time as a Library Director.
`
`
`4. I am fully familiar with the catalog record creation process in the library
`
`sector. In preparing a material for public availability, a library catalog record
`
`describing that material would be created. These records are typically
`
`written in Machine Readable Catalog (herein referred to as “MARC”) code
`
`and contain information such as a physical description of the material,
`
`metadata from the material’s publisher, and date of library acquisition. In
`
`particular, the 008 field of the MARC record is reserved for denoting the
`
`date of creation of the library record itself. As this typically occurs during
`
`the process of preparing materials for public access, it is my experience that
`
`an item’s MARC record indicates the date of an item’s public availability.
`
`
`5. Typically, in creating a MARC record, a librarian would gather various bits
`
`of metadata such as book title, publisher and subject headings among others
`
`and assign each value to a relevant numerical field. For example, a book’s
`
`physical description is tracked in field 300 while title/attribution is tracked in
`
`field 245. The 008 field of the MARC record is reserved for denoting the
`
`creation of the library record itself. As this is the only date reflecting the
`
`inclusion of said materials within the library’s collection, it is my experience
`
`
`
`2
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 3
`
`
`
`that an item’s 008 field accurately indicates the date of an item’s public
`
`availability.
`
`
`6. I have reviewed Exhibit 1005, an IBM Research Report entitled
`
`ChakraVyuha (CV): A Sandbox Operating System Environment for
`
`Controlled Execution of Alien Code by Asit Dan, Ajay Mohindra, Rajiv
`
`Ramaswami and Dinkar Sitaram.
`
`
`7. Attached hereto as Appendix DAN01 is a true and correct copy of the
`
`MARC record for ChakraVyuha (CV): A Sandbox Operating System
`
`Environment for Controlled Execution of Alien Code as held by the Carnegie
`
`Mellon University Library. I secured this record myself from the library’s
`
`public catalog. The MARC record contained within Appendix DAN01
`
`accurately describes ChakraVyuha (CV): A Sandbox Operating System
`
`Environment for Controlled Execution of Alien Code.
`
`
`8. My determination that the MARC record contained within Appendix
`
`DAN01 accurately describes ChakraVyuha (CV): A Sandbox Operating
`
`System Environment for Controlled Execution of Alien Code is based upon
`
`the accuracy of several fields within this MARC record. The 088 field,
`
`describing the work’s report number, matches the report number of
`
`
`
`3
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 4
`
`
`
`ChakraVyuha (CV): A Sandbox Operating System Environment for
`
`Controlled Execution of Alien Code as represented in Exhibit 1005. The 245
`
`field, describing the title and authorship of the work, matches the title and
`
`authors as represented in Exhibit 1005. The 260 field describing the
`
`publisher of the work is properly attributed to the IBM Corporation, as found
`
`in Exhibit 1005. The 300 field, describing the physical attributes of the
`
`work, matches the page number as represented in Exhibit 1005.
`
`
`9. Attached hereto as Appendix DAN02 is a true and correct copy of
`
`ChakraVyuha (CV): A Sandbox Operating System Environment for
`
`Controlled Execution of Alien Code as held by the Carnegie Mellon
`
`University Library. I secured these scans myself from the library’s
`
`collection. In comparing Exhibit 1005 to Appendix DAN02, it is my
`
`determination that Exhibit 1005 is a true and correct copy of ChakraVyuha
`
`(CV): A Sandbox Operating System Environment for Controlled Execution
`
`of Alien Code by Asit Dan, Ajay Mohindra, Rajiv Ramaswami and Dinkar
`
`Sitaram.
`
`
`10. While Appendix DAN01 does accurately describe the report number, title,
`
`author, publisher and page number of ChakraVyuha (CV): A Sandbox
`
`Operating System Environment for Controlled Execution of Alien Code
`
`
`
`4
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 5
`
`
`
`found within Exhibit 1005, this record also accurately describes the report
`
`number, title, author, publisher and page number of ChakraVyuha (CV): A
`
`Sandbox Operating System Environment for Controlled Execution of Alien
`
`Code as presented in Appendix DAN02. The MARC record presented in
`
`Appendix DAN01 also describes several proprietary elements exclusive to
`
`the Carnegie Mellon University copy of this report presented in Appendix
`
`DAN02. For instance, this paper is organized on Carnegie Mellon’s shelves
`
`by call number – a combination of letters and numbers that ensure library
`
`materials are shelved near other materials with similar topics. This call
`
`number – IBMC 20742 – can be found on page 1 of the MARC record in
`
`field 099, page 2 of the MARC record in the ‘location items’ field, and in
`
`two places on page 1 of Appendix DAN02 – the top left of the page and a
`
`shelving sticker in the bottom left of the page. On page 2 of Appendix
`
`DAN02, a post-it note can be found reading as follows: ‘1. client/server
`
`computer, 2. computer security, 3. coding theory’. These phrases are subject
`
`headings, typically used to describe the topic of a work when creating a
`
`MARC record. These subject headings identically correspond to the subject
`
`heading fields found in field 650 of Appendix DAN01.
`
`
`
`
`
`5
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 6
`
`
`
`11. The 008 field of the MARC record in Appendix DAN01 indicates the date of
`
`record creation. The 008 field of Appendix DAN01 indicates Carnegie
`
`Mellon University library first acquired this book on July 3, 1997.
`
`Considering this information, it is my determination that ChakraVyuha
`
`(CV): A Sandbox Operating System Environment for Controlled Execution
`
`of Alien Code was made available to the public shortly after its initial
`
`acquisition as of July 3, 1997.
`
`
`12. In addition to the 008 field of Appendix DAN01 indicating the first date of
`
`library acquisition, there is additional information regarding availability to
`
`be found within Carnegie Mellon’s copy of ChakraVyuha (CV): A Sandbox
`
`Operating System Environment for Controlled Execution of Alien Code as
`
`presented in Appendix DAN02. On page 25 of Appendix DAN02, there is a
`
`date stamped reading ‘JUL 22 1997’. In my experience preparing library
`
`material for public accessibility, this marking is known as a date stamp and
`
`is added by library staff after the material has been cataloged. In my
`
`experience cataloging and preparing materials for the shelf, this 19-day gap
`
`between the two dates is typical of the cataloging process.
`
`
`13. On page 1 of Appendix DAN02, there is a stamp on the bottom of the page
`
`reading ‘Room Use Only Until AUG 15 1997’. In my experience preparing
`
`
`
`6
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 7
`
`
`
`library materials for public accessibility, this stamp represents a usage
`
`restriction typical of some library materials - the need for the library user to
`
`interact with the material on-site at the library in some type of private
`
`reading room. The date visible on this stamp has been struck, implying that
`
`the usage restriction has expired. I note that this usage restriction would have
`
`no impact on the public accessibility of the material.
`
`
`14. The MARC record for ChakraVyuha (CV): A Sandbox Operating System
`
`Environment for Controlled Execution of Alien Code found within Appendix
`
`DAN01 in combination with features present in the Appendix DAN02
`
`provide a clear timeline of this material’s accessibility via the Carnegie
`
`Library University library. The 008 field of ChakraVyuha (CV): A Sandbox
`
`Operating System Environment for Controlled Execution of Alien Code’s
`
`MARC record indicates this paper was first cataloged by Carnegie Mellon
`
`Librarians as of July 3, 1997. The date stamp on page 25 of Appendix
`
`DAN02 indicates this book was prepared for public accessibility as of July
`
`22, 1997. The usage restriction stamp on page 1 of Appendix DAN01
`
`indicates this material was made available to the public at first with some
`
`usage restrictions, which expired as of August 15, 1997.
`
`
`
`
`
`7
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 8
`
`
`
`15. I am familiar with the Internet Archive, a digital library formally certified by
`
`the State of California as a public library. Among other services that the
`
`Internet Archive makes available to the general public is the Wayback
`
`Machine, an online archive. The Internet Archive’s Wayback Machine
`
`service archives webpages as of a certain capture date to track changes in the
`
`web over time. The Internet Archive has been in operation as a nonprofit
`
`library since 1996 and has hosted the Wayback Machine service since its
`
`inception in 2001. During my time as a librarian, I frequently used the
`
`Internet Archive’s Wayback Machine for research and instruction purposes.
`
`This includes teaching instructional classes on using the Wayback Machine
`
`to library patrons and using the Wayback Machine to research reference
`
`inquiries that require hard-to-find online resources. I consider the Internet
`
`Archive’s recordskeeping to be as rigorous and detailed as other formal
`
`library recordskeeping practices such as MARC records, OCLC records and
`
`Dublin Core.
`
`
`16. Attached hereto as Appendix CMU01 is a screen capture of the Internet
`
`Archive Wayback Machine entry for
`
`http://hathorne.library.cmu.edu/uhtbin/cgisirsi/0/1/0. I secured these screen
`
`captures myself from
`
`
`
`8
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 9
`
`
`
`https://web.archive.org/web/19970301000000*/http://hathorne.library.cmu.e
`
`du/uhtbin/cgisirsi/0/1/0.
`
`
`17. Appendix CMU01 is a webpage entitled Unicorn WebCat – Unicorn Public
`
`Access Choices as published on the Carnegie Mellon University library
`
`website, captured by the Internet Archive on April 24, 1997. This page
`
`describes user options when interacting with the Carnegie Mellon University
`
`library catalog as such: ‘Library materials are described in indexed records
`
`in the online catalog. Under the library catalog you can lookup library
`
`materials using a particular word or phrase, or review lists of the library’s
`
`authors, titles, subjects, series, keywords, or call numbers.’
`
`
`18. Attached hereto as Appendix CMU02 is a screen capture of the Internet
`
`Archive Wayback Machine entry for
`
`http://www.library.cmu.edu/Research/Online/index.html. I secured these
`
`screen captures myself from
`
`https://web.archive.org/web/19971009135520/http://www.library.cmu.edu/R
`
`esearch/Online/index.html.
`
`
`19. Appendix CMU02 is a webpage entitled Catalogs and Databases as
`
`published on the Carnegie Mellon University library website, captured by
`
`
`
`9
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 10
`
`
`
`the Internet Archive on October 9, 1997. This page describes the software
`
`used to manage the library’s online public-facing catalog, a commonly used
`
`software program by the Sirsi Corporation known as WebCat. Carnegie
`
`Mellon’s use of this software indicates that the catalog includes shelving
`
`locations for library materials held at different library facilities. This page
`
`also confirms that the catalog is updated daily, that users can interface with
`
`this catalog via a web browser and that access is unrestricted aside from a
`
`few exceptions detailed within.
`
`
`20. To summarize, Appendix CMU01 indicates that Carnegie Mellon library
`
`materials are described in indexed library catalog records and presented as
`
`an online catalog that allows users to search by words/phrases and review
`
`lists of the library’s authors, titles, subjects, series, keywords, or call
`
`numbers. Appendix CMU02 indicates that Carnegie Mellon University’s
`
`library records are designed to correspond with the library’s holdings in
`
`individual libraries, such as the Hunt Library where ChakraVyuha (CV): A
`
`Sandbox Operating System Environment for Controlled Execution of Alien
`
`Code can be found. Appendix CMU02 also indicates that Carnegie Mellon
`
`University are using Sirsi’s Unicorn and WebCat software to present their
`
`online catalog.
`
`
`
`
`
`10
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 11
`
`
`
`21. Attached hereto as Appendix SIRSI01 is a screen capture of the Internet
`
`Archive Wayback Machine entry for
`
`http://www.sirsi.com/Products/ulms.html. I secured these screen captures
`
`myself from
`
`https://web.archive.org/web/19970627002415/http://www.sirsi.com/Product
`
`s/ulms.html.
`
`
`22. Appendix SIRSI01 is a webpage entitled Unicorn Library Management
`
`System as published on the Sirsi Corporation website, captured by the
`
`Internet Archive on June 27, 1997. This page describes the Unicorn Library
`
`Management software used by Carnegie Mellon University as of 1997,
`
`visible in Appendix CMU01. The page describes the public accessibility
`
`features of the Unicorn software as follows: ‘UNICORN’s highly evolved
`
`public access catalog is designed to address the needs of the beginning
`
`searcher, as well as the researcher. Separate choices are available for
`
`browsing and keyword searching. A full-text index is available as a standard
`
`feature of UNICORN, providing the best possible approach for accessing all
`
`library material. Precise search results are easily retrieved using
`
`UNICORN's sophisticated truncation, boolean, relational, adjacency, and
`
`proximity operators.’
`
`
`
`
`
`11
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 12
`
`
`
`23. Attached hereto as Appendix SIRSI02 is a screen capture of the Internet
`
`Archive Wayback Machine entry for
`
`http://www.sirsi.com/Products/webcat.html. I secured these screen captures
`
`myself from
`
`https://web.archive.org/web/19970627002554/http://www.sirsi.com/Product
`
`s/webcat.html.
`
`
`24. Appendix SIRSI02 is a webpage entitled WebCat with Z39.50 as published
`
`on the Sirsi Corporation website, captured by the Internet Archive on June
`
`27, 1997. This page describes the WebCat Library Catalog software used by
`
`Carnegie Mellon University as of 1997, visible in Appendices CMU01 and
`
`CMU02. Some of the WebCat features are detailed as follows: ‘The easy-to-
`
`use, familiar look and feel of today’s web browsers host WebCat’s powerful
`
`features: quickly create and execute simple or complex search statements,
`
`browse and select terms from heading lists, search related information by
`
`clicking on hypertext terms, view cross-reference information, sort search
`
`results, export selected records to networked printers, files or email, link to
`
`library holdings information on one or more servers [and] execute previous
`
`searches from search history.’
`
`
`
`
`
`12
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 13
`
`
`
`25. To further summarize, Appendix SIRSI01 describes the Unicorn software
`
`implemented by Carnegie Mellon University libraries as of 1997. Based on
`
`Sirsi’s descriptions of the Unicorn software, library catalog users are
`
`presented a full-text index of the library’s holdings and can review those
`
`holdings via browsing or search features. Specifically, the Unicorn program
`
`includes advanced search features such as keyword searching, boolean
`
`operators and proximity operators. Appendix SIRSI02 describes the WebCat
`
`software implemented by Carnegie Mellon University libraries as of 1997.
`
`Based on Sirsi’s descriptions of WebCat, users are presented with an
`
`interactive library catalog when interacting with a WebCat page.
`
`Specifically, the WebCat online catalog supports simple and complex search
`
`statements, cross-references between similar materials, the ability to sort
`
`search results based on user preferences and the ability to browse one’s
`
`search history.
`
`
`26. Appendices CMU01 and CMU02 indicate the Carnegie Mellon University
`
`Library implemented Sirsi’s Unicorn and WebCat software to create a
`
`detailed inventory of the library’s holdings and present users with an
`
`interactive library catalog to search this inventory. Appendices SIRSI01 and
`
`SIRSI02 indicate that Sirsi’s library software enables users to search through
`
`library catalog records using various complex search strategies. As such, it is
`
`
`
`13
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 14
`
`
`
`my determination that ChakraVyuha (CV): A Sandbox Operating System
`
`Environment for Controlled Execution of Alien Code was sufficiently
`
`indexed at the time of its acquisition by the Carnegie Mellon University
`
`Library in July 1997. This indexing via Carnegie Mellon University’s
`
`Library catalog records allows any library catalog user to locate
`
`ChakraVyuha (CV): A Sandbox Operating System Environment for
`
`Controlled Execution of Alien Code via common search engines practices
`
`and access this paper within the Carnegie Mellon University Library’s
`
`collection. Thus, any members of the interested public exercising reasonable
`
`diligence would have been able to locate ChakraVyuha (CV): A Sandbox
`
`Operating System Environment for Controlled Execution of Alien Code in
`
`the Carnegie Mellon University Library as of July 22, 1997.
`
`
`27. I have been retained on behalf of the Petitioner to provide assistance in the
`
`above-illustrated matter in establishing the authenticity and public
`
`availability of the documents discussed in this declaration. I am being
`
`compensated for my services in this matter at the rate of $200.00 per hour
`
`plus reasonable expenses. My statements are objective, and my
`
`compensation does not depend on the outcome of this matter.
`
`
`
`
`
`14
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 15
`
`
`
`28. I declare under penalty of perjury that the foregoing is true and correct. I
`
`hereby declare that all statements made herein of my own knowledge are
`
`true and that all statements made on information and belief are believed to
`
`be true; and further that these statements were made the knowledge that
`
`willful false statements and the like so made are punishable by fine or
`
`imprisonment, or both, under Section 1001 of Title 18 of the United States
`
`Code.
`
`
`
`Dated: 10/20/2023
`
`
`
`June Ann Munford
`
`
`
`15
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 16
`
`
`
`
`
`
`
`
`
`Appendix CV
`Appendix CV
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 17
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 17
`
`
`
`June A. Munford
`Curriculum Vitae
`
`Education
`
`University of Wisconsin-Milwaukee - MS, Library & Information Science, 2009
`Milwaukee, WI
`
`
`● Coursework included cataloging, metadata, data analysis, library systems,
`management strategies and collection development.
`● Specialized in library advocacy, cataloging and public administration.
`
`
`Grand Valley State University - BA, English Language & Literature, 2008
`Allendale, MI
`
` ●
`
` Coursework included linguistics, documentation and literary analysis.
`● Minor in political science with a focus in local-level economics and
`government.
`
`
`
`Professional Experience
`
`Researcher / Expert Witness, October 2017 – present
`Freelance ● Pittsburgh, Pennsylvania & Grand Rapids, Michigan
`
`
`● Material authentication and public accessibility determination.
`Declarations of authenticity and/or public accessibility provided upon
`research completion. Experienced with appeals and deposition process.
`
` ●
`
` Research provided on topics of public library operations, material
`publication history, digital database services and legacy web resources.
`
` ●
`
` Past clients include Alston & Bird, Arnold & Porter, Baker Botts, Fish &
`Richardson, Erise IP, Irell & Manella, O'Melveny & Myers, Perkins-Coie,
`Pillsbury Winthrop Shaw Pittman and Slayden Grubert Beard.
`
`Library Director, February 2013 - March 2015
`Dowagiac District Library ● Dowagiac, Michigan
`
`
`● Executive administrator of the Dowagiac District Library. Located in
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 18
`
`
`
`Southwest Michigan, this library has a service area of 13,000, an annual
`operating budget of over $400,000 and total assets of approximately
`$1,300,000.
`
`● Developed careful budgeting guidelines to produce a 15% surplus during
`the 2013-2014 & 2014-2015 fiscal years while being audited.
`
`
`
` ●
`
` Using this budget surplus, oversaw significant library investments
`including the purchase of property for a future building site, demolition of
`existing buildings and building renovation projects on the current facility.
`
` Led the organization and digitization of the library's archival records.
`
` ●
`
` ●
`
` Served as the public representative for the library, developing business
`relationships with local school, museum and tribal government entities.
`
` ●
`
` Developed an objective-based analysis system for measuring library
`services - including a full collection analysis of the library's 50,000+
`circulating items and their records.
`
`November 2010 - January 2013
`Librarian & Branch Manager, Anchorage Public Library ● Anchorage, Alaska
`
`
`● Headed the 2013 Anchorage Reads community reading campaign
`including event planning, staging public performances and creating
`marketing materials for mass distribution.
`
` ●
`
` Co-led the social media department of the library's marketing team,
`drafting social media guidelines, creating original content and instituting
`long-term planning via content calendars.
`
` ●
`
` Developed business relationships with The Boys & Girls Club, Anchorage
`School District and the US Army to establish summer reading programs for
`children.
`
`
`June 2004 - September 2005, September 2006 - October 2013
`Library Assistant, Hart Area Public Library
`Hart, MI
`
`
`● Responsible for verifying imported MARC records and original MARC
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 19
`
`
`
`
`
`cataloging for the local-level collection as well as the Michigan Electronic
`Library.
`
`● Handled OCLC Worldcat interlibrary loan requests & fulfillment via
`ongoing communication with lending libraries.
`
`
`
`Professional Involvement
`
`Alaska Library Association - Anchorage Chapter
`● Treasurer, 2012
`
`
`Library Of Michigan
`● Level VII Certification, 2008
`● Level II Certification, 2013
`
`
`Michigan Library Association Annual Conference 2014
`● New Directors Conference Panel Member
`
`
`Southwest Michigan Library Cooperative
`● Represented the Dowagiac District Library, 2013-2015
`
`
`
`Professional Development
`
`Library Of Michigan Beginning Workshop, May 2008
`Petoskey, MI
`● Received training in cataloging, local history, collection management,
`children’s literacy and reference service.
`
`
`Public Library Association Intensive Library Management Training, October 2011
`Nashville, TN
`● Attended a five-day workshop focused on strategic planning, staff
`management, statistical analysis, collections and cataloging theory.
`
`
`Alaska Library Association Annual Conference 2012 - Fairbanks, February 2012
`Fairbanks, AK
`● Attended seminars on EBSCO advanced search methods, budgeting,
`cataloging, database usage and marketing.
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 20
`
`
`
`Depositions
`
`2019 ● Fish & Richardson
`Apple v. Qualcomm (IPR2018-001281, 39521-00421IP, IPR2018-01282
`and 39521-00421IP2)
`
`2019 ● Erise IP
`
`Implicit, LLC v. Netscout Systems, Inc (Civil Action No. 2:18-cv-53-JRG)
`
`2019 ● Perkins-Coie
`
`Adobe Inc. v. RAH Color Technologies LLC (Cases IPR2019-00627,
`
`IPR2019-00628, IPR2019-00629 and IPR2019-00646)
`
`2020 ● O’Melveny & Myers
`
`Maxell, Ltd. v. Apple Inc. (Case No. 5:19-cv-00036-RWS)
`
`2021 ● Pillsbury Winthrop Shaw Pittman LLP
`
`Intel v. SRC (IPR2020-1449)
`
`2022 ● Perkins-Coie
`
`Realtek v. Future Link (IPR2021-01182)
`
`2023 ● Fish & Richardson
`
`Neuroderm Ltd. v. Abbvie, Inc (Case No. PGR2022-00040)
`
`2023 ● Fish & Richardson
`
`Nearmap US Inc. v. Pictometry International Corp. (IPR2022-00735)
`
`2023 ● Fish & Richardson
`
`Samsung Electronics v. MemoryWeb LLC (Case No. 39843-0136PS1)
`
`
`
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 21
`
`
`
`Limited Case History & Potential Conflicts
`
`Alston & Bird
`● Ericsson
`
`v. Collision Communications (IPR2022-01233)
`
`● Nokia
` v. Neptune Subsea, Xtera (Case No. 1:17-cv-01876)
`
`● Universal Electronics Inc
` v. Roku Inc (IPR2022-00818)
`
`
`
`
`
`
`
`
`
`
`Arnold & Porter
`● Ivantis
` v. Glaukos (Case No. 8:18-cv-00620)
`
`
`
`● Samsung
` v. Jawbone (Case No. 2:21-cv-00186)
`
`
`
`Benesch Friedlander Coplan & Aronoff
`● Voyis
`
`v. Cathx (Case No. 5:21-cv-00077-RWS)
`
`Erise I.P.
`
`● Apple
`
`
`v. Ericsson Inc. (IPR2022-00715)
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 22
`
`
`
`v. Future Link Systems (IPRs 6317804, 6622108, 6807505, and
`
`7917680)
`v. INVT (Case No. 20-1881)
`v. Navblazer LLC (IPR2020-01253)
`v. Qualcomm (IPR2018-001281, 39521-00421IP, IPR2018-01282,
`39521-00421IP2)
`v. Quest Nettech Corp (Case No. 2:19-cv-00118-JRG)
`v. Telefonaktiebolaget LM Ericsson (IPR2022-00275)
`
`
`
`
`
`
`
`
` ●
`
` Fanduel
` v. CGT (Case No. 19-1393)
`
` ●
`
` Garmin
` v. Phillips North America LLC (Case No. 2:19-cv-6301-AB-KS)
`
` Netscout
`v. Longhorn HD LLC (Case No. 2:20-cv-00349)
`v. Implicit, LLC (Civil Action No. 2:18-cv-53-JRG)
`
`
`
` Sony Interactive Entertainment LLC
`v. Bot M8 LLC (IPR2020-01288)
`v. Infernal Technology LLC (Case No. 2:19-CV-00248-JRG)
`
` Unified Patents
`v. GE Video Compression (Civil Action No. 2:19-cv-248)
`
` ●
`
`
`
`
` ●
`
`
`
`
` ●
`
`
`
`
`
`
`
`
`
`
`
`
`Fish & Richardson
`
`● Apple
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 23
`
`
`
`
`
`
`
`
`
`
`
`
`v. AliveCor (3:21-cv-03958)
`v. LBS Innovations (Case No. 2:19-cv-00119-JRG-RSP)
`v. Koss Corporation (IPR2021-00305)
`v. Masimo (IPR 50095-0012IP1, 50095-0012IP2, 50095-0013IP1,
`50095-0013IP2, 50095-0006IP1, 50095-0135IP1)
`v. Neonode (Case No. 21-cv-08872-EMC)
`v. Qualcomm (IPR2018-001281, 39521-00421IP, IPR2018-01282,
`39521-00421IP2)
`
`● Dell
`
`v. Neo Wireless (IPR2022-00616)
`
`● Dish Network
`
`v. Realtime Adaptive Streaming (Case No. 1:17-CV-02097-RBJ)
`v. TQ Delta LLC (Case No. 18-1798)
`
` ●
`
` Evapco Dry Cooling
`v. SPG Dry Cooling (IPR2021-00688)
`
`
`
`● Genetec
`
`v. Sensormatic Electronics (Case No. 1:20-CV-00760)
`
`● Huawei
` v. Bell Northern Research LLC (IPR2019-01174)
`
` ●
`
` Kianxis
` v. Blue Yonder (Case No. 3:20-cv-03636)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 24
`
`
`
`● LG Electronics
` v. Bell Northern Research LLC (Case No. 3:18-cv-2864-CAB-BLM)
`
` ●
`
` ●
`
` Metaswitch
` v. Sonus Networks (IPR2018-01719)
`
` Microsoft
`v. Throughputer Inc (IPR2022-00757)
`
`
`
` ●
`
` MLC Intellectual Property
` v. MicronTech (Case No. 3:14-cv-03657-SI)
`
` ●
`
` Nearmap Inc
`v. EagleView Technologies (IPR2022-01009)
`
` Neuroderm Ltd.
`v. Abbvie, Inc (Case No. PGR2022-00040)
`
` ●
`
`
`
` ●
`
` Realtek Semiconductor
` v. Future Link (IPR2021-01182)
`
` ●
`
` Quectel
` v. Koninklijke Philips (Case No. 1:20-cv-01710)
`
` Samsung
`v. Aire Technology (IPR2022-00877)
`v. Bell Northern Research (Case No. 2:19-cv-00286-JRG)
`v. Communication Technologies Inc (IPR2022-01221)
`
` ●
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 25
`
`
`
`v. Jawbone Innovations (IPR2022-00865)
`v. MemoryWeb LLC (IPR2022-00885)
`v. Telefonaktiebolaget LM Ericsson (IPR2021-00615)
`
` Texas Instruments
`v. Vantage Micro LLC (IPR2020-01261)
`
` Xilinx
`v. Sentient Sensors LCC (Case No. 1:22-cv-00173)
`
` ●
`
`
`
` ●
`
`
`
`
`Irell & Manella
`
`● Curium
`
`O’Melveny & Myers
`
`● Apple
`
`v. Maxell (Case No. 5:19-cv-00036-RWS)
`
`
`● Samsung
`
` v. Daedalus Prime LLC (1335 Investigation)
`
`
`
`Perkins-Coie
`
`● Heru Industries
`v. The UAB Research Foundation (IPR2022-01148)
`
` Intel Corporation
`v. BitMICRO (Case No. 5:23-cv-00625)
`
` ●
`
`
`
`
`
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 26
`
`
`
`● Realtek Semiconductor
` v. Future Link (IPR2021-01182)
`● Twitter Inc
`
`v. VOIP-Pal.com (Case No. 3:20-cv-02397-JD)
`
` ●
`
` TCL Industries
`v. Koninklijke Philips NV (IPR2021-00495, IPR2021-00496
`
`
` and IPR2021-00497)
`
`
`
`Pillsbury Winthrop Shaw Pittman
`
`
`
`
`
`
`
`
`
`
`
`● Gravel Rating Systems
`
`v. Costco (Case No. 4:21-cv-149)
`
`v. Lowe’s Home Centers (Case No. 4:21-cv-150)
`
`v. T-Mobile USA (Case No. 4:21-cv-152)
`
`v. Kohl’s Inc. (Case No. 4:21-cv-258)
`
`v. Under Armor (Case No. 4:21-cv-356)
`
`● Intel
`
`v. FG SRC LLC (Case No. 6:20-cv-00315)
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 27
`
`
`
`
`
`
`
`
`
`Appendix DAN01
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 28
`
`
`
`10/17/23, 9:38 AM
`
`nimbus screenshot app print
`
`screenshot-cmu.primo.exlibrisgroup.com-2023.10.17-09_37_51
`https://cmu.primo.exlibrisgroup.com/discovery/sourceRecord?vid=01CMU_INST:01CMU&docId=alma991003215149704436&recordOwner=01CMU_INST
`17.10.2023
`
`chrome-extension://bpconcjcammlapcogcnnelfmaeghhagj/edit.html
`
`1/1
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 29
`
`
`
`10/17/23, 9:39 AM
`
`nimbus screenshot app print
`
`screenshot-cmu.primo.exlibrisgroup.com-2023.10.17-09_37_51
`https://cmu.primo.exlibrisgroup.com/discovery/sourceRecord?vid=01CMU_INST:01CMU&docId=alma991003215149704436&recordOwner=01CMU_INST
`17.10.2023
`
`chrome-extension://bpconcjcammlapcogcnnelfmaeghhagj/edit.html
`
`1/2
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 30
`
`
`
`10/17/23, 9:39 AM
`
`nimbus screenshot app print
`
`chrome-extension://bpconcjcammlapcogcnnelfmaeghhagj/edit.html
`
`2/2
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 31
`
`
`
`
`
`
`
`
`
`Appendix DAN02
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 32
`
`
`
`zrBmMc
`“ZOo7HZ
`RC 20742 (91875) 2/20/97
`ComputerScience/Mathematics 22 pages
`
`|
`
`Research Report
`
`Compe,
`TECHNICAL RERNCE DEPT,
`_
`an
`FILE
`F
`
`Chakra Vyuha' (CV): A Sandbox Operating System Environmentfor
`Controlled Execution of Alien Code
`
`Asit Dan, Ajay Mohindra, Rajiv Ramaswami, Dinkar Sitaram
`IBM Research Division
`T.J. Watson Research Center
`P.O. Box 218
`Yorktown Heights, NY 10598
`
`Re 2 Rotl, beso th ernie
`
`7ocs
`
`LIMITED DISTRIBUTION NOTICE
`It has been issued as a
`This report has been submitted for publication outside of IBMandwill probablybe copyrightedif accepted for publication.
`Research Report for early dissemination ofits contents. In viewofthe transfer of copyright to the outside publisher, its distribution outside of IBM
`prior to publication should belimited to peer communications andspecific requests. After outside publication, requests should befilled only by
`reprints or legally obtained copiesofthe article (e.g.. payment ofroyalties).
`
`= ResearchDivision
`Jun](un il
`
`*= Almaden-T.J. Watson - Tokyo+ Zurich * Austin
`
`IBMC20742
`
`ROOM USE ONLY A
`UNTILeae
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 33
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 33
`
`
`
`
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 34
`
`IPR2024-00027
`CrowdStrike Exhibit 1004 Page 34
`
`
`
`ChakraVyuha' (CV): A Sandbox Operating System
`Environment for Controlled Execution of Alien Code
`
`Asit Dan, Ajay Mohindra, Rajiv Ramaswamiand Dinkar Sitaram
`IBM T. J. Watson Research Center
`Yorktown Heights, NY 10598
`{asit, ajay, rajiv, sitaram }@watson.ibm.com
`
`Abstract
`
`Sharing of unknown prog