throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`APPLE INC
`Petitioner
`
`v.
`
`ANCORA
`Patent Owner
`
`
`
`Patent No. 6,411,941
`
`
`
`DECLARATION OF JON B. WEISSMAN
`
`
`
`
`
`
`
`Apple Inc. Exhibit 1008 Page 1
`
`

`
`TABLE OF CONTENTS
`
`I.
`
`Introduction ...................................................................................................... 1
`
`II.
`
`Qualifications ................................................................................................... 1
`
`III. Materials Reviewed ......................................................................................... 5
`
`IV. Summary of Findings ...................................................................................... 5
`
`V.
`
`Legal Standards ............................................................................................... 7
`
`A.
`
`Claim Construction................................................................................ 7
`
`B.
`
`Obviousness ........................................................................................... 9
`
`C. Written Description ............................................................................. 12
`
`D.
`
`Indefiniteness ....................................................................................... 12
`
`VI. The ’941 Patent .............................................................................................. 13
`
`A. Overview of the ’941 Patent ................................................................ 13
`
`B.
`
`Prosecution History of the ’941 Patent ............................................... 17
`
`VII. Person of Ordinary Skill in the Art ................................................................ 18
`
`VIII. Claim Construction ........................................................................................ 19
`
`IX. The ’941 Patent is Indefinite ......................................................................... 21
`
`A.
`
`The Term “Agent” ............................................................................... 21
`
`1.
`
`2.
`
`The Term “Agent” Does Not Connote Definite Structure ....... 21
`
`The Claimed Agent Functions Are Not Linked to
`Structure in the Specification .................................................... 22
`
`X.
`
`Lack of Written Description .......................................................................... 22
`
`XI. Overview of Prior Art for the ’941 Patent ..................................................... 24
`
`
`
`i
`
`Apple Inc. Exhibit 1008 Page 2
`
`

`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`Hasebe ....................................................................................... 25
`
`DMI Specification ..................................................................... 27
`
`Chang ........................................................................................ 28
`
`Arbaugh ..................................................................................... 29
`
`Isikoff ........................................................................................ 30
`
`Shipman .................................................................................... 31
`
`Angelo ....................................................................................... 31
`
`XII. Claims 1-3, 5-14, and 16-17 of the ’941 Patent Are Obvious ....................... 32
`
`A. Hasebe in view of the DMI Specification Renders Obvious
`Claims 1-3, 5-14, and 16-17 ................................................................ 32
`
`1.
`
`’941 Patent, Claim 1 – A method of restricting software
`operation within a license for use with a computer
`including an erasable, non-volatile memory area of a
`BIOS of the computer, and a volatile memory area; the
`method comprising the steps of: ............................................... 32
`
`(i)
`
`(ii)
`
`Step 1[a] – selecting a program residing in
`the volatile memory .............................................. 33
`
`Step 1[b] – using an agent to set up a
`verification structure in the erasable, non-
`volatile memory of the BIOS, the
`verification structure accommodating data
`that includes at least one license record ............... 34
`
`(iii) Step 1[c] – verifying the program using at
`least the verification structure from the
`erasable non-volatile memory of the BIOS .......... 40
`
`(iv) Step 1[d] – acting on the program according
`to the verification. ................................................ 40
`
`
`
`ii
`
`Apple Inc. Exhibit 1008 Page 3
`
`

`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`’941 Patent, Claim 2 – A method according to claim 1,
`further comprising the steps of: establishing a license
`authentication bureau. ............................................................... 40
`
`’941 Patent, Claim 3 – A method according to claim 2,
`wherein setting up a verification structure further
`comprising the steps of: establishing, between the
`computer and the bureau, a two-way data-
`communications linkage; transferring, from the computer
`to the bureau, a request-for-license including an
`identification of the computer and the license-record's
`contents from the selected program; forming an
`encrypted license-record at the bureau by encrypting
`parts of the request-for-license using part of the
`identification as an encryption key; transferring, from the
`bureau to the computer, the encrypted license-record; and
`storing the encrypted license record in the erasable non-
`volatile memory area of the BIOS. ........................................... 41
`
`’941 Patent, Claim 5 - A method according to claim 3
`wherein the identification of the computer includes the
`unique key. ................................................................................ 42
`
`’941 Patent, Claim 6 – A method according to claim 1
`wherein selecting a program includes the steps of:
`establishing a licensed-software-program in the volatile
`memory of the computer wherein said licensed-software-
`program includes contents used to form the license-
`record......................................................................................... 42
`
`’941 Patent, Claim 7 – A method according to claim 6
`wherein using an agent to set up the verification structure
`includes the steps of: establishing or certifying the
`existence of a pseudo-unique key in a first non-volatile
`memory area of the computer; and establishing at least
`one license-record location in the first nonvolatile
`memory area or in the erasable, non-volatile memory
`area of the BIOS. ....................................................................... 43
`
`
`
`iii
`
`Apple Inc. Exhibit 1008 Page 4
`
`

`
`7.
`
`8.
`
`9.
`
`10.
`
`11.
`
`12.
`
`13.
`
`’941 Patent, Claim 8– A method according to claim 6
`wherein establishing a license-record includes the steps
`of: forming a license-record by encrypting of the contents
`used to form a license-record with other predetermined
`data contents, using the key; and establishing the
`encrypted license-record in one of the at least one
`established license-record locations. ......................................... 44
`
`’941 Patent, Claim 9– A method according to claim 7
`wherein verifying the program includes the steps of:
`encrypting the licensed-software-program's license-
`record contents from the volatile memory area or
`decrypting the license-record in the erasable, non-volatile
`memory area of the BIOS, using the pseudo-unique key;
`and comparing the encrypted licenses-software-program's
`license-record contents with the encrypted license-record
`in the erasable, non-volatile memory area of the BIOS, or
`comparing the license-software-program's license-record
`contents with the decrypted license-record in erasable
`non-volatile memory area of the BIOS. .................................... 45
`
`’941 Patent, Claim 10– A method according to claim 9
`wherein acting on the program includes the step:
`restricting the program's operation with predetermined
`limitations if the comparing yields non-unity or
`insufficiency. ............................................................................. 45
`
`’941 Patent, Claim 11– A method according to claim 1
`wherein the volatile memory is a RAM. ................................... 46
`
`’941 Patent, Claim 12– The method of claim 1, wherein a
`pseudo-unique key is stored in the non-volatile memory
`of the BIOS. .............................................................................. 46
`
`’941 Patent, Claim 13 – The method of claim 1, wherein
`a unique key is stored in a first non-volatile memory area
`of the computer. ........................................................................ 46
`
`’941 Patent, Claim 14 – The method according claim 13,
`wherein the step of using the agent to set up the
`verification record, including the license record, includes
`
`
`
`iv
`
`Apple Inc. Exhibit 1008 Page 5
`
`

`
`encrypting a license record data in the program using at
`least the unique key. .................................................................. 47
`
`14.
`
`15.
`
`’941 Patent, Claim 16 – The method according to claim
`13, wherein the step of verifying the program includes a
`decrypting the license record data accommodated in the
`erasable second non-volatile memory area of the BIOS
`using at least the unique key. .................................................... 47
`
`’941 Patent, Claim 17 – The method according to claim
`13, wherein the step of verifying the program includes
`encrypting the license record that is accommodated in the
`program using at least the unique key. ..................................... 48
`
`B.
`
`C.
`
`Hasebe in view of the DMI Specification and Chang Renders
`Obvious Claims 1-3, 5-14, and 16-17 ................................................. 48
`
`Hasebe in view of the DMI Specification and Arbaugh Renders
`Obvious Claims 1-3, 5-14, and 16-17 ................................................. 49
`
`D. Hasebe in view of the DMI Specification and Isikoff Renders
`Obvious Claims 1-3, 5-14, and 16-17 ................................................. 50
`
`E.
`
`Hasebe in view of the DMI Specification, Shipman, and Angelo
`Renders Obvious Claims 1-3, 5-14, and 16-17 ................................... 50
`
`XIII. Conclusion ..................................................................................................... 51
`
`
`
`v
`
`Apple Inc. Exhibit 1008 Page 6
`
`

`
`
`
`I.
`
`I, Jon B. Weissman, declare as follows:
`
`Introduction
`
`1.
`
`I have been retained by Apple, Inc. (“Apple” or “Petitioner”) as an
`
`independent expert consultant in this proceeding before the United States Patent
`
`and Trademark Office. Although I am being compensated at my usual rate for the
`
`time I spend on this matter, no part of my compensation depends on the outcome
`
`of this proceeding, and I have no other interest in this proceeding.
`
`2.
`
`I understand that this proceeding involves U.S. Patent No. 6,411,941
`
`(“the ’941 patent”) (attached as Ex. 1001 to Apple’s petition). The application for
`
`the ’941 patent was filed on October 1, 1998, as U.S. Patent Application No.
`
`09/164,777, and the patent issued on June 25, 2002.
`
`3.
`
`I have been asked to consider three things. First, whether the claims of
`
`the ’941 patent distinctly identify the claimed invention. Second, whether the
`
`specification makes it clear that the inventors were in possession of the invention
`
`as set forth in the claims. Third, whether certain references in combination disclose
`
`or suggest the features recited in the claims of the ’941 patent. My opinions are set
`
`forth below.
`
`II. Qualifications
`
`4. My academic and professional background is in computer science,
`
`specifically in the areas of distributed systems, file systems, and cloud computing.
`
`
`
`1
`
`Apple Inc. Exhibit 1008 Page 7
`
`

`
`I am a leading researcher and educator in these areas. My career includes over 20
`
`years’ experience in industry and academia. As a systems researcher, I have built
`
`practical systems that have application in a wide variety of settings across many
`
`different types of distributed and parallel systems. For example, I was a lead
`
`designer on one of the first distributed Grid computing systems that spanned the
`
`Internet, called Legion. In my current work, I analyze and develop systems that
`
`allow mobile devices to utilize remote cloud-computing resources to improve
`
`performance and save energy. My curriculum vitae, which includes a more
`
`detailed summary of my background, experience, and publications, is attached as
`
`Appendix A. Below I provide a short summary of my education and experience,
`
`which I believe to be most pertinent to the opinions that I express.
`
`5.
`
`I received a Bachelor of Science degree in Applied Mathematics and
`
`Computer Science from Carnegie Mellon University in 1984. I received a Master
`
`of Science degree in Computer Science in 1989 and a Ph.D. degree in Computer
`
`Science in 1995, both from the University of Virginia. My Ph.D. thesis involved
`
`developing the first automated scheduling system for parallel and distributed
`
`applications across heterogeneous local and wide-area networks. After completion
`
`of my Ph.D. program, I worked in industry for five years in the area of distributed
`
`systems.
`
`
`
`2
`
`Apple Inc. Exhibit 1008 Page 8
`
`

`
`6.
`
`In 1995, I joined the faculty of the University of Texas in San Antonio
`
`as Assistant Professor of Computer Science. In 1999, I joined the faculty of the
`
`University of Minnesota as Assistant Professor of Computer Science, where I am
`
`currently Full Professor of Computer Science – the highest academic rank at a top-
`
`tier research University. At the University of Minnesota, I lead the Distributed
`
`Computing Systems Group, consisting of faculty colleagues and both graduate and
`
`undergraduate students. I also serve as an investigator for the Center for Research
`
`in Intelligent Storage (CRIS), sponsored by the National Science Foundation.
`
`7.
`
`I have published over 90 technical articles, most at highly competitive
`
`refereed conferences and rigorously reviewed journals. I have recently served on
`
`the technical editorial boards of several flagship journals, including IEEE
`
`Transactions on Parallel and Distributed Systems and IEEE Transactions on
`
`Computers. I am currently the steering committee chair for the ACM International
`
`Symposium on High Performance Parallel and Distributed Systems, the flagship
`
`conference in my area.
`
`8. My research in computer systems has been funded by the National
`
`Institutes of Health, NASA, the National Science Foundation, the Department of
`
`Energy, and the Air Force. With regard to the subject matter of the ’941 patent
`
`relating to computer systems and security, my collaborators and I have obtained
`
`over $2 million in grant funding, including:
`
`
`
`3
`
`Apple Inc. Exhibit 1008 Page 9
`
`

`
`• National Institute of Health, ePCRN: Electronic Primary Care
`
`Research Network. This project explores how to support secure query
`
`processing across distributed networks.
`
`• National Science Foundation, “A Data Mining and Exploration
`
`Middleware for Grid and Distributed Computing.” This project
`
`explores how to perform intrusion detection in distributed systems.
`
`• National Science Foundation, “One Cloud Does Not Fit All:
`
`Minnesota Integrated Cloud Systems Research Testbed (MIST).” This
`
`project seeks to build a cloud testbed consisting of mobile devices and
`
`servers distributed around campus with security as one of the principle
`
`research foci.
`
`• Air Force Office of Scientific Research, “Telecommunication
`
`Networks
`
`for Mobile
`
`and Distributed Computing
`
`and
`
`Communications.” This project focuses on developing software
`
`technology to securely connect mobile devices to servers and
`
`developing the technology for applications to run across distributed
`
`networks, such as the Grid.
`
`9. With regard to the subject matter of the ’941 patent relating to secure
`
`computing systems, I have published several papers, here is a small subset:
`
`
`
`4
`
`Apple Inc. Exhibit 1008 Page 10
`
`

`
`• “Nebula: Distributed Edge Cloud for Data Intensive Computing,”
`
`Mathew Ryden, Kwangsung Oh, Abhishek Chandra and Jon B.
`
`Weissman, IEEE International Conference on Cloud Engineering,
`
`March 2014, Boston, MA.
`
`• “A Dynamic Approach for Characterizing Collusion in Desktop Grids,”
`
`Louis-Claude Canon, Emmanuel Jeannot, and Jon B. Weissman, 24th
`
`IEEE International Parallel and Distributed Processing Symposium
`
`(IPDPS), 2010.
`
`• “Adaptive Reputation-Based Scheduling on Unreliable Distributed
`
`Infrastructures,” Jason D. Sonnek, Abhishek Chandra, and Jon B.
`
`Weissman, IEEE Transactions on Parallel and Distributed Systems,
`
`18(11), November 2007.
`
`III. Materials Reviewed
`
`10.
`
`In forming my opinions, I have reviewed the ’941 Patent, the
`
`prosecution history of the ’941 patent, and the exhibits to the covered business
`
`method patent petition that this declaration supports.
`
`IV.
`
`Summary of Findings
`
`11.
`
`It is my opinion that the following references render obvious claims 1-
`
`3, 5-14, and 16-17 of the ’914 patent:
`
`
`
`5
`
`Apple Inc. Exhibit 1008 Page 11
`
`

`
`• European Patent Application Publication No. EP 0 766 165 A2
`
`(“Hasebe”) (“Hasebe,” Exh. 1012)
`
`• Desktop Management BIOS Specification Version 2.0, March 6, 1996
`
`(“DMI Spec.,” Exh. 1013)
`
`• U.S. Patent No. 5,724,425 (“Chang,” Exh. 1014).
`
`• Arbaugh, W.A et al., “A secure and reliable bootstrap architecture,”
`
`Security and Privacy, 1997 IEEE Symposium on , pp.65-71, 4-7 May
`
`1997 (“Arbaugh,” Exh. 1015).
`
`• U.S. Patent No. 5,748,804 (“Isikoff,” Exh. 1016).
`
`• PCT Publication No. WO 97/36241 (“Shipman,” Exh. 1017).
`
`• European Patent Application Publication No. EP 0 824 233 A2
`
`(“Angelo,” Exh. 1018).
`
`12.
`
`It is my opinion, that the ’941 patent is invalid for lack of written
`
`description support for the term “agent” that appears in all of the claims of the ’941
`
`patent.
`
`13. Furthermore, it is my opinion that the term “agent” in the ’941
`
`patent’s claims is a mean-plus-function element and the ’941 patent specification
`
`fails to link any structure to the recited function for the “agent,” which renders the
`
`claims invalid as indefinite.
`
`
`
`6
`
`Apple Inc. Exhibit 1008 Page 12
`
`

`
`V.
`
`Legal Standards
`
`A.
`
`14.
`
`Claim Construction
`
`I have been informed that when construing claim terms in an
`
`unexpired patent, a claim subject to covered business method patent review
`
`receives the broadest reasonable construction in light of the specification of the
`
`patent in which it appears. I further understand that the broadest reasonable
`
`construction is the broadest reasonable interpretation (BRI) of the claim language,
`
`and that any term that lacks a definition in the specification is also given a broad
`
`interpretation. I have also been advised that, at the same time, claim terms are
`
`given their ordinary and accustomed meaning as would be understood by one of
`
`ordinary skill in the art. I have been informed that the construction of a patent term
`
`applied during this proceeding may differ from that in a district court proceeding.
`
`15.
`
`I have been informed that patentees may claim their inventions using
`
`purely functional language, which is known as “means-plus-function” claiming. I
`
`have been informed that courts determine whether a claim is a means-plus-function
`
`claim by examining whether the claim itself recites sufficiently definite structure to
`
`perform the recited function. I have been informed that if the claim recites
`
`sufficient structure to perform the recited function, it is not a means-plus-function
`
`claim and vice versa. I also have been informed that a claim limitation using the
`
`word “means” presumptively does not recite sufficient structure, while a claim
`
`
`
`7
`
`Apple Inc. Exhibit 1008 Page 13
`
`

`
`limitation that omits “means” presumptively recites sufficient structure. These
`
`presumptions can be overcome by a showing that the claim either does, or does not,
`
`recite sufficient structure.
`
`16.
`
`I have been informed that a means-plus-function limitation includes
`
`two components: (1) the recited function; and (2) the corresponding structure in
`
`the written description of the patent for performing the function. I also have been
`
`informed that structure corresponds to the claimed function only if the
`
`specification or the prosecution history clearly links or associates that structure to
`
`the recited function.
`
`17.
`
`I have been informed that, if a means-plus-function element recites a
`
`computer-implemented limitation, the structure disclosed in the specification must
`
`be more than simply a general purpose computer or microprocessor. Instead, the
`
`specification must disclose an algorithm for performing the recited function. I also
`
`have been informed that, although the algorithm may be disclosed in any
`
`understandable terms, it must be capable of performing each and every function to
`
`the full extent recited. I have been informed that this is true even if implementing
`
`the recited function would be well understood by persons of ordinary skill in the
`
`art. In other words, even if a person skilled in the art would readily know how to
`
`implement the recited function, the specification still must explain how the recited
`
`function is actually performed. I have been informed that an abstraction that
`
`
`
`8
`
`Apple Inc. Exhibit 1008 Page 14
`
`

`
`merely describes the function of the claimed means is not a sufficient disclosure of
`
`corresponding structure.
`
`B. Obviousness
`
`18.
`
`I understand that a patent claim may also be invalid if the claimed
`
`invention would have been obvious to a person of ordinary skill in the art at the
`
`time of the claim’s effective filing date. I understand that an invention may be
`
`obvious if a person of ordinary skill in the art with knowledge of the prior art
`
`would have conceived the claimed invention, even if all of the limitations of the
`
`claim cannot be found in a single prior art reference.
`
`19.
`
`I understand that, in assessing whether a claimed invention would
`
`have been obvious, the following factors are considered.
`
`20. First, I understand that the level of ordinary skill that a person
`
`working in the field of the claimed invention would have had at its effective filing
`
`date must be considered.
`
`21. Second, I understand that the scope and content of the prior art must
`
`be considered. I understand that, to be considered as prior art, a reference must be
`
`reasonably related to the claimed invention, which means that the reference is in
`
`the same field as the claimed invention or is from another field to which a person
`
`of ordinary skill in the art would refer to solve a known problem.
`
`
`
`9
`
`Apple Inc. Exhibit 1008 Page 15
`
`

`
`22. Third, I understand that the differences, if any, that existed between
`
`the prior art and the claimed invention must be considered. I understand that the
`
`determination of such differences should focus on the claimed invention as a whole.
`
`23. Fourth, I understand that other factors, known as “secondary
`
`considerations” of non-obviousness, should be considered. I understand these
`
`factors to include: (i) commercial success of a product due to the merits of the
`
`claimed invention; (ii) a long-felt need for the solution provided by the claimed
`
`invention; (iii) unsuccessful attempts by others to find the solution provided by the
`
`claimed invention; (iv) copying of the claimed invention by others; (v) unexpected
`
`and superior results from the claimed invention; (vi) praise of the claimed
`
`invention by others in the art; (vii) independent invention of the claimed invention
`
`by others before or at about the same time as it was conceived by the named
`
`inventors; (viii) whether others expressed surprise or disbelief regarding the
`
`invention; (ix) whether others sought or obtained rights to the claimed invention
`
`from the patentee; and (x) whether the inventor proceeded contrary to accepted
`
`wisdom in the art.
`
`24.
`
`I understand that it is not sufficient to prove a patent claim obvious to
`
`show that each of its limitations was independently known in the prior art and that
`
`there also must have been a reason for a person of ordinary skill in the art to have
`
`combined or modified the elements or concepts from the prior art in the same way
`
`
`
`10
`
`Apple Inc. Exhibit 1008 Page 16
`
`

`
`as in the claimed invention. In assessing whether such a reason existed, I
`
`understand that the following may be considered: (i) whether the combination or
`
`modification was merely the predictable result of using prior art elements
`
`according to their known functions; (ii) whether the claimed invention provides an
`
`obvious solution to a known problem in the art; (iii) whether the claimed invention
`
`applied a known technique that had been used to improve a similar device or
`
`method in a similar way; (iv) whether the prior art teaches or suggests making the
`
`combination or modification claimed in the patent; (v) whether the prior art teaches
`
`away from combining elements in the claimed invention; (vi) whether it would
`
`have been obvious to try the combination or modification, such as when there is a
`
`design need or market pressure to solve a problem and there are a finite number of
`
`identified, predictable solutions; and (vii) whether the combination or modification
`
`resulted more from design incentives or other market forces.
`
`25.
`
`I understand that, when considering whether a claimed invention was
`
`obvious, one should be careful not to use the benefit of hindsight and that, instead,
`
`one should put oneself in the position of a person of ordinary skill in the art as of
`
`the effective filing date of the claimed invention and should not consider what is
`
`known today or what is learned from the teaching of the patent.
`
`
`
`11
`
`Apple Inc. Exhibit 1008 Page 17
`
`

`
`C. Written Description
`
`26.
`
`I have been informed that 35 U.S.C. § 112 requires the patent to
`
`contain an adequate written description of the claimed invention. I understand that
`
`the purpose of the written description requirement is to demonstrate that the
`
`inventor was in possession of the invention at the time the patent application was
`
`filed, even though subsequently the claims may have been changed or new claims
`
`may have been added. I understand that this requirement is met if, at the time of
`
`filing of the application for a patent, a person of ordinary skill in the art reading
`
`that application would have recognized that it described the invention as claimed.
`
`I understand that the application does not need to specifically disclose a claim
`
`limitation so long as a person of ordinary skill in the art would understand that the
`
`missing requirement is necessarily implied in the application as originally filed. I
`
`understand that the written description inquiry must take into account the entirety
`
`of what is disclosed within the specification. I understand that it is insufficient that
`
`undisclosed subject matter would have been obvious to a person of ordinary skill in
`
`the art. I understand that if a claim is proved to lack an adequate written
`
`description by clear and convincing evidence, the claim is invalid.
`
`D.
`
`27.
`
`Indefiniteness
`
`I have been informed that a patent is invalid for indefiniteness if its
`
`claims, read in light of the specification delineating the patent, and the prosecution
`
`
`
`12
`
`Apple Inc. Exhibit 1008 Page 18
`
`

`
`history, fail to inform, with reasonable certainty, those skilled in the art about the
`
`scope of the invention. In determining whether a claim is indefinite, I have been
`
`informed that I should consider both the “intrinsic evidence” (i.e., the claims, the
`
`specification, and the prosecution history) and the “extrinsic evidence” (e.g.,
`
`relevant publications contemporaneous with the filing date of the ’941 patent).
`
`28.
`
`I also have been informed that, if the specification fails to clearly link
`
`the recited function of a means-plus-function limitation to structure for performing
`
`that function, the claim containing that limitation is indefinite.
`
`VI. The ’941 Patent
`
`A. Overview of the ’941 Patent
`
`29. The ’941 patent is directed to a method of restricting software
`
`operation within a license limitation that is applicable for a computer having a first
`
`non-volatile memory area, a second non-volatile memory area, and a volatile
`
`memory area. (’941 patent at Abstract.) The method includes the steps of selecting
`
`a program residing in the volatile memory, setting up a verification structure in the
`
`non-volatile memories, verifying the program using the structure, and acting on the
`
`program according to the verification. (’941 patent at Abstract.) For example,
`
`Figure 2 (one of only two figures in the ’941 patent) depicts these four basic steps.
`
`
`
`13
`
`Apple Inc. Exhibit 1008 Page 19
`
`

`
`
`
`30. The ’941 patent describes these four basic steps at 6:4-52. The
`
`“selecting” step is broadly described in the specification to include “establishing a
`
`licensed-software-program” in RAM or some other volatile memory. (’941 patent
`
`at 6:7-16.) I note that this description of “selecting” is broader than what is
`
`actually claimed in claim 1 of the ’941 patent, which further requires that the
`
`selected program “resides in the volatile memory.” Claim 18, on the other hand, is
`
`
`
`14
`
`Apple Inc. Exhibit 1008 Page 20
`
`

`
`closer to the broader “selecting” step in the specification. Specifically, claim 18
`
`require “loading the application software program.”
`
`31. The “setting up” step is described as applying to the verification
`
`structure, similar to how this step appears in claim 1. (’941 patent at 6:17-21.)
`
`The example in the specification provides that setting up the verification structure
`
`includes “establishing or certifying” a key and “establishing at least one license-
`
`record location.”
`
`32. The “verifying” step is a basic comparison step using the license
`
`record to verify that the program is licensed. In on example, the verifying includes
`
`encrypting a license-record and comparing the encrypted license-record to another
`
`encrypted license-record. (’941 patent at 6:29-39.) Alternatively, in another
`
`example, the step may include decrypting a license-record and comparing that to
`
`another decrypted license-record. (’941 patent at 6:29-39.)
`
`33. The “acting” step is done by restricting the program operation in
`
`accordance with the verification. (’941 patent at 6:40-42.) The ’941 patent also
`
`describes other steps that may be part of the “acting,” including erasing the
`
`software, providing warnings, and placing charges on a user’s account. (’941
`
`patent at 6:46-52.)
`
`
`
`15
`
`Apple Inc. Exhibit 1008 Page 21
`
`

`
`34. The ’941 patent describes implementing the steps of Figure 2 in a
`
`conventional computer. (’941 patent at 1:44-52.) For example, Figure 1 depicts a
`
`schematic diagram of an envisioned computer system and license bureau:
`
`
`
`35. The only aspect of the claimed method that the ’941 patent purports to
`
`be inventive is storing the license-record in non-volatile memory of the BIOS. For
`
`example, the ’941 patent states that prior art licensing systems existed. (’941
`
`patent 1:19-32.) Additionally, the ’941 patent concedes that storing a key in the
`
`BIOS was also “conventional” technology. (’941 patent at 1:45-47.) The ’941
`
`patent only describes one “advantage” of the described licensing method:
`
`An important advantage in utilizing non-volatile memory
`such as that residing in the BIOS is that the required level
`of system programming expertise that is necessary to
`intercept or modify commands, interacting with the BIOS,
`is substantially higher than those needed for tampering
`
`
`
`16
`
`Apple Inc. Exhibit 1008 Page 22
`
`

`
`with data residing in volatile memory such as hard disk.
`Furthermore, there is a much higher cost to the
`programmer, if his tampering is unsuccessful, i.e. if data
`residing in the BIOS (which is necessary for the
`computer's operability) is inadvertently changed by the
`hacker. This is too high of a risk for the ordinary
`software hacker to pay. Note that various recognized
`means for hindering the professional-like hacker may
`also be utilized (e.g. anti-debuggers, etc.) in conjunction
`with the present invention.
`
`(’941 patent at 3:4-17.) The ’941 patent does not allege that any other part of the
`
`described licensing system is new. In other words, the ’94

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket