throbber

`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`__________________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`__________________________________
`
`HTC CORPORATION and HTC AMERICA, INC.
`Petitioners
`
`v.
`
`ANCORA TECHNOLOGIES INC.
`Patent Owner.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case No. TBD
`U.S. Patent No. 6,411,941
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`DECLARATION OF JON B. WEISSMAN, PH.D.
`
`
`HTC EX. 1008
`HTC v. Ancora
`US Patent No. 6,411,941
`
`

`

`I, Jon B. Weissman, declare as follows:
`
`I.
`
`INTRODUCTION
`
`
`
`1.
`
`I have been retained by Knobbe, Martens, Olson, & Bear LLP (“Knobbe
`
`Martens”) on behalf of HTC Corporation and HTC America, Inc. (“HTC” or “Petitioner”) as an
`
`independent expert consultant in this proceeding before the United States Patent and Trademark
`
`Office. Although I am being compensated at my usual rate of $500 per hour for the time I spend
`
`on this matter, no part of my compensation depends on the outcome of this proceeding, and I
`
`have no other interest in this proceeding.
`
`2.
`
`I understand that this proceeding involves U.S. Patent No. 6,411,941 (“the ’941
`
`patent”) (attached as Ex. 1001 to HTC’s petition). The application for the ’941 patent was filed
`
`on October 1, 1998, as U.S. Patent Application No. 09/164,777, and the patent issued on June 25,
`
`2002.
`
`3.
`
`I have been asked by counsel to review relevant materials and render my expert
`
`opinion in connection with technical matters related to the petition for covered business method
`
`review of the ’941 patent. My opinions are set forth below.
`
`II.
`
`QUALIFICATIONS
`
`4.
`
`My academic and professional background is in computer science, specifically in
`
`the areas of distributed systems, file systems, and cloud computing. I am a leading researcher
`
`and educator in these areas. My career includes over 20 years’ experience in industry and
`
`academia. As a systems researcher, I have built practical systems that have application in a wide
`
`variety of settings across many different types of distributed and parallel systems. For example, I
`
`was a lead designer on one of the first distributed Grid computing systems that spanned the
`
`Internet, called Legion. In my current work, I analyze and develop systems that allow mobile
`
`
`
`1
`
`

`

`devices to utilize remote cloud-computing resources to improve performance and save energy.
`
`My curriculum vitae, which includes a more detailed summary of my background, experience,
`
`and publications, is attached as Appendix A. Below I provide a short summary of my education
`
`and experience, which I believe to be most pertinent to the opinions that I express.
`
`5.
`
`I received a Bachelor of Science degree in Applied Mathematics and Computer
`
`Science from Carnegie Mellon University in 1984. I received a Master of Science degree in
`
`Computer Science in 1989 and a Ph.D. degree in Computer Science in 1995, both from the
`
`University of Virginia. My Ph.D. thesis involved developing the first automated scheduling
`
`system for parallel and distributed applications across heterogeneous local and wide-area
`
`networks. After completion of my Ph.D. program, I worked in industry for five years in the area
`
`of distributed systems.
`
`6.
`
`In 1995, I joined the faculty of the University of Texas in San Antonio as an
`
`Assistant Professor of Computer Science. In 1999, I joined the faculty of the University of
`
`Minnesota as Assistant Professor of Computer Science, where I am currently Full Professor of
`
`Computer Science – the highest academic rank at a top-tier research university. At the University
`
`of Minnesota, I lead the Distributed Computing Systems Group, consisting of faculty colleagues
`
`and both graduate and undergraduate students. I also serve as an investigator for the Center for
`
`Research in Intelligent Storage (CRIS), sponsored by the National Science Foundation.
`
`7.
`
`I have published over 100 technical articles, most at highly competitive refereed
`
`conferences and rigorously reviewed journals. I have recently served on the technical editorial
`
`boards of several flagship journals, including IEEE Transactions on Parallel and Distributed
`
`Systems and IEEE Transactions on Computers. I am currently the steering committee chair for
`
`
`
`2
`
`

`

`the ACM International Symposium on High Performance Parallel and Distributed Systems, the
`
`flagship conference in my area.
`
`8.
`
`My research in computer systems has been funded by the National Institutes of
`
`Health, NASA, the National Science Foundation, the Department of Energy, and the Air Force.
`
`With regard to the subject matter of the ’941 patent relating to computer systems and security,
`
`my collaborators and I have obtained over $2 million in grant funding, including:
`
` National Institute of Health, ePCRN: Electronic Primary Care Research Network.
`
`This project explores how to support secure query processing across distributed
`
`networks.
`
` National Science Foundation, “A Data Mining and Exploration Middleware for
`
`Grid and Distributed Computing.” This project explores how to perform intrusion
`
`detection in distributed systems.
`
` National Science Foundation, “One Cloud Does Not Fit All: Minnesota
`
`Integrated Cloud Systems Research Testbed (MIST).” This project seeks to build
`
`a cloud testbed consisting of mobile devices and servers distributed around
`
`campus with security as one of the principle research foci.
`
` Air Force Office of Scientific Research, “Telecommunication Networks for
`
`Mobile and Distributed Computing and Communications.” This project focuses
`
`on developing software technology to securely connect mobile devices to servers
`
`and developing the technology for applications to run across distributed networks,
`
`such as the Grid.
`
`9.
`
`With regard to the subject matter of the ’941 patent relating to secure computing
`
`systems, I have published several papers, here is a small subset:
`
`
`
`3
`
`

`

` “Nebula: Distributed Edge Cloud for Data Intensive Computing,” Mathew
`
`Ryden, Kwangsung Oh, Abhishek Chandra and Jon B. Weissman, IEEE
`
`International Conference on Cloud Engineering, March 2014, Boston, MA.
`
` “A Dynamic Approach for Characterizing Collusion in Desktop Grids,” Louis-
`
`Claude Canon, Emmanuel Jeannot, and Jon B. Weissman, 24th IEEE
`
`International Parallel and Distributed Processing Symposium (IPDPS), 2010.
`
` “Adaptive Reputation-Based Scheduling
`
`on Unreliable Distributed
`
`Infrastructures,” Jason D. Sonnek, Abhishek Chandra, and Jon B. Weissman,
`
`IEEE Transactions on Parallel and Distributed Systems, 18(11), November
`
`2007.
`
`III. MATERIALS REVIEWED
`
`10.
`
`In forming my opinions, I have reviewed the ’941 Patent, the prosecution history
`
`of the ’941 patent, and the exhibits to the covered business method patent petition that this
`
`declaration supports.
`
`IV.
`
`SUMMARY OF FINDINGS
`
`11.
`
`It is my opinion, that Claims 1-19 of the ’941 patent are unpatentable under 35
`
`U.S.C. § 101 because they are directed to ineligible subject matter—in particular, the abstract idea
`
`of controlling software access based on data stored in a particular location. The basic concept is
`
`not patentable and was well known in the prior art. Based on my review of the ’941 patent, I did
`
`not find any concepts recited in the claims that were not conventional and well known to persons
`
`of ordinary skill in the art before 1998.
`
`12.
`
`It is my opinion that the following references render obvious claims 1-3, 5-14,
`
`and 16-17 of the ’914 patent:
`
`
`
`4
`
`

`

` European Patent Application Publication No. EP 0 766 165 A2 (“Hasebe”)
`
`(“Hasebe,” Exh. 1012)
`
` Desktop Management BIOS Specification Version 2.0, March 6, 1996 (“DMI
`
`Spec.,” Exh. 1013)
`
` U.S. Patent No. 5,724,425 (“Chang,” Exh. 1014).
`
` Arbaugh, W.A et al., “A secure and reliable bootstrap architecture,” Security and
`
`Privacy, 1997 IEEE Symposium on , pp.65-71, 4-7 May 1997 (“Arbaugh,” Exh.
`
`1015).
`
` U.S. Patent No. 5,748,804 (“Isikoff,” Exh. 1016).
`
` PCT Publication No. WO 97/36241 (“Shipman,” Exh. 1017).
`
` European Patent Application Publication No. EP 0 824 233 A2 (“Angelo,” Exh.
`
`1018).
`
`13.
`
`It is my opinion, that the ’941 patent is invalid for lack of written description
`
`support for the term “agent” that appears in all of the claims of the ’941 patent.
`
`14.
`
`Furthermore, it is my opinion that the term “agent” in the ’941 patent’s claims is a
`
`mean-plus-function element and the ’941 patent specification fails to link any structure to the
`
`recited function for the “agent,” which renders the claims invalid as indefinite.
`
`V.
`
`LEGAL STANDARDS
`
`A.
`15.
`
`Claim Construction
`
`I have been informed that when construing claim terms in an unexpired patent, a
`
`claim subject to covered business method patent review receives the broadest reasonable
`
`construction in light of the specification of the patent in which it appears. I further understand
`
`that the broadest reasonable construction is the broadest reasonable interpretation (BRI) of the
`
`
`
`5
`
`

`

`claim language, and that any term that lacks a definition in the specification is also given a broad
`
`interpretation. I have also been advised that, at the same time, claim terms are given their
`
`ordinary and accustomed meaning as would be understood by one of ordinary skill in the art. I
`
`have been informed that the construction of a patent term applied during this proceeding may
`
`differ from that in a district court proceeding.
`
`16.
`
`I have been informed that patentees may claim their inventions using purely
`
`functional language, which is known as “means-plus-function” claiming. I have been informed
`
`that courts determine whether a claim is a means-plus-function claim by examining whether the
`
`claim itself recites sufficiently definite structure to perform the recited function. I have been
`
`informed that if the claim recites sufficient structure to perform the recited function, it is not a
`
`means-plus-function claim and vice versa. I also have been informed that a claim limitation
`
`using the word “means” presumptively does not recite sufficient structure, while a claim
`
`limitation that omits “means” presumptively recites sufficient structure. These presumptions can
`
`be overcome by a showing that the claim either does, or does not, recite sufficient structure.
`
`17.
`
`I have been informed that a means-plus-function limitation includes two
`
`components: (1) the recited function; and (2) the corresponding structure in the written
`
`description of the patent for performing the function. I also have been informed that structure
`
`corresponds to the claimed function only if the specification or the prosecution history clearly
`
`links or associates that structure to the recited function.
`
`18.
`
`I have been informed that, if a means-plus-function element recites a computer-
`
`implemented limitation, the structure disclosed in the specification must be more than simply a
`
`general purpose computer or microprocessor. Instead, the specification must disclose an
`
`algorithm for performing the recited function. I also have been informed that, although the
`
`
`
`6
`
`

`

`algorithm may be disclosed in any understandable terms, it must be capable of performing each
`
`and every function to the full extent recited. I have been informed that this is true even if
`
`implementing the recited function would be well understood by persons of ordinary skill in the
`
`art. In other words, even if a person skilled in the art would readily know how to implement the
`
`recited function, the specification still must explain how the recited function is actually
`
`performed. I have been informed that an abstraction that merely describes the function of the
`
`claimed means is not a sufficient disclosure of corresponding structure.
`
`B.
`
`Patent Ineligibility
`
`19.
`
`I understand that a patent claim is invalid under 35 U.S.C. § 101 if it claims a law
`
`of nature, natural phenomenon, or an abstract idea. I further understand that a patent claim would
`
`be ineligible for patent protection, and therefore invalid under 35 U.S.C. § 101, if it claims a
`
`“building block of human ingenuity,” or if it merely recites a generic computer implementation
`
`of an abstract idea. I further understand that a patent claim is invalid under 35 U.S.C. § 101, if,
`
`setting aside any insignificant computer-based or field of use limitations, the claim is directed
`
`solely to an abstract idea. Limiting an abstract idea to a single field of use or adding token post-
`
`solution elements does not make an abstract concept patentable.
`
`20.
`
`I understand that a patent claim involving an abstract idea must contain other
`
`elements or combination of elements, sometimes referred to as an “inventive concept,” that are
`
`sufficient to ensure that the patent in practice amounts to significantly more than a patent upon
`
`the abstract idea itself. I understand that an abstract idea with nothing more than well-
`
`understood, routine, conventional activity added is not patentable. Similarly, merely requiring a
`
`generic computer implementation fails to transform an abstract idea into a patent-eligible
`
`invention.
`
`
`
`7
`
`

`

`21.
`
`I further understand that in determining whether a patent claim recites patentable
`
`subject matter, the claim must be considered as a whole.
`
`C.
`
`Obviousness
`
`22.
`
`I understand that a patent claim may also be invalid if the claimed invention
`
`would have been obvious to a person of ordinary skill in the art at the time of the claim’s
`
`effective filing date. I understand that an invention may be obvious if a person of ordinary skill
`
`in the art with knowledge of the prior art would have conceived the claimed invention, even if all
`
`of the limitations of the claim cannot be found in a single prior art reference.
`
`23.
`
`I understand that, in assessing whether a claimed invention would have been
`
`obvious, the following factors are considered.
`
`24.
`
`First, I understand that the level of ordinary skill that a person working in the field
`
`of the claimed invention would have had at its effective filing date must be considered.
`
`25.
`
`Second, I understand that the scope and content of the prior art must be
`
`considered. I understand that, to be considered as prior art, a reference must be reasonably
`
`related to the claimed invention, which means that the reference is in the same field as the
`
`claimed invention or is from another field to which a person of ordinary skill in the art would
`
`refer to solve a known problem.
`
`26.
`
`Third, I understand that the differences, if any, that existed between the prior art
`
`and the claimed invention must be considered. I understand that the determination of such
`
`differences should focus on the claimed invention as a whole.
`
`27.
`
`Fourth, I understand that other factors, known as “secondary considerations” of
`
`non-obviousness, should be considered. I understand these factors to include: (i) commercial
`
`success of a product due to the merits of the claimed invention; (ii) a long-felt need for the
`
`solution provided by the claimed invention; (iii) unsuccessful attempts by others to find the
`8
`
`
`
`

`

`solution provided by the claimed invention; (iv) copying of the claimed invention by others; (v)
`
`unexpected and superior results from the claimed invention; (vi) praise of the claimed invention
`
`by others in the art; (vii) independent invention of the claimed invention by others before or at
`
`about the same time as it was conceived by the named inventors; (viii) whether others expressed
`
`surprise or disbelief regarding the invention; (ix) whether others sought or obtained rights to the
`
`claimed invention from the patentee; and (x) whether the inventor proceeded contrary to
`
`accepted wisdom in the art.
`
`28.
`
`I understand that it is not sufficient to prove a patent claim obvious to show that
`
`each of its limitations was independently known in the prior art and that there also must have
`
`been a reason for a person of ordinary skill in the art to have combined or modified the elements
`
`or concepts from the prior art in the same way as in the claimed invention. In assessing whether
`
`such a reason existed, I understand that the following may be considered: (i) whether the
`
`combination or modification was merely the predictable result of using prior art elements
`
`according to their known functions; (ii) whether the claimed invention provides an obvious
`
`solution to a known problem in the art; (iii) whether the claimed invention applied a known
`
`technique that had been used to improve a similar device or method in a similar way; (iv)
`
`whether the prior art teaches or suggests making the combination or modification claimed in the
`
`patent; (v) whether the prior art teaches away from combining elements in the claimed invention;
`
`(vi) whether it would have been obvious to try the combination or modification, such as when
`
`there is a design need or market pressure to solve a problem and there are a finite number of
`
`identified, predictable solutions; and (vii) whether the combination or modification resulted more
`
`from design incentives or other market forces.
`
`
`
`9
`
`

`

`29.
`
`I understand that, when considering whether a claimed invention was obvious,
`
`one should be careful not to use the benefit of hindsight and that, instead, one should put oneself
`
`in the position of a person of ordinary skill in the art as of the effective filing date of the claimed
`
`invention and should not consider what is known today or what is learned from the teaching of
`
`the patent.
`
`D. Written Description
`I have been informed that 35 U.S.C. § 112 requires the patent to contain an
`30.
`
`adequate written description of the claimed invention. I understand that the purpose of the
`
`written description requirement is to demonstrate that the inventor was in possession of the
`
`invention at the time the patent application was filed, even though subsequently the claims may
`
`have been changed or new claims may have been added. I understand that this requirement is
`
`met if, at the time of filing of the application for a patent, a person of ordinary skill in the art
`
`reading that application would have recognized that it described the invention as claimed. I
`
`understand that the application does not need to specifically disclose a claim limitation so long as
`
`a person of ordinary skill in the art would understand that the missing requirement is necessarily
`
`implied in the application as originally filed. I understand that the written description inquiry
`
`must take into account the entirety of what is disclosed within the specification. I understand that
`
`it is insufficient that undisclosed subject matter would have been obvious to a person of ordinary
`
`skill in the art. I understand that if a claim is proved to lack an adequate written description by
`
`clear and convincing evidence, the claim is invalid.
`
`E.
`
`Indefiniteness
`
`31.
`
`I have been informed that a patent is invalid for indefiniteness if its claims, read in
`
`light of the specification delineating the patent, and the prosecution history, fail to inform, with
`
`reasonable certainty, those skilled in the art about the scope of the invention. In determining
`
`
`
`10
`
`

`

`whether a claim is indefinite, I have been informed that I should consider both the “intrinsic
`
`evidence” (i.e., the claims, the specification, and the prosecution history) and the “extrinsic
`
`evidence” (e.g., relevant publications contemporaneous with the filing date of the ’941 patent).
`
`32.
`
`I also have been informed that, if the specification fails to clearly link the recited
`
`function of a means-plus-function limitation to structure for performing that function, the claim
`
`containing that limitation is indefinite.
`
`VI.
`
`THE ’941 PATENT
`
`A.
`33.
`
`Overview of the ’941 Patent
`
`The ’941 patent is directed to a method of restricting software operation within a
`
`license limitation that is applicable for a computer having a first non-volatile memory area, a
`
`second non-volatile memory area, and a volatile memory area. (’941 patent at Abstract.) The
`
`method includes the steps of selecting a program residing in the volatile memory, setting up a
`
`verification structure in the non-volatile memories, verifying the program using the structure, and
`
`acting on the program according to the verification. (’941 patent at Abstract.) For example,
`
`Figure 2 (one of only two figures in the ’941 patent) depicts these four basic steps.
`
`
`
`
`
`11
`
`

`

`
`
`34.
`
`The ’941 patent describes these four basic steps at 6:4-52. The “selecting” step is
`
`
`
`broadly described in the specification to include “establishing a licensed-software-program” in
`
`RAM or some other volatile memory. (’941 patent at 6:7-16.) I note that this description of
`
`“selecting” is broader than what is actually claimed in claim 1 of the ’941 patent, which further
`
`requires that the selected program “resides in the volatile memory.” Claim 18, on the other hand,
`
`is closer to the broader “selecting” step in the specification. Specifically,
`
`claim 18
`
`require
`
`“loading the application software program.”
`
`
`
`12
`
`

`

`35.
`
`The “setting up” step is described as applying to the verification structure, similar
`
`to how this step appears in claim 1. (’941 patent at 6:17-21.) The example in the specification
`
`provides that setting up the verification structure includes “establishing or certifying” a key and
`
`“establishing at least one license-record location.”
`
`36.
`
`The “verifying” step is a basic comparison step using the license record to verify
`
`that the program is licensed. In on example, the verifying includes encrypting a license-record
`
`and comparing the encrypted license-record to another encrypted license-record. (’941 patent at
`
`6:29-39.) Alternatively, in another example, the step may include decrypting a license-record and
`
`comparing that to another decrypted license-record. (’941 patent at 6:29-39.)
`
`37.
`
`The “acting” step is done by restricting the program operation in accordance with
`
`the verification. (’941 patent at 6:40-42.) The ’941 patent also describes other steps that may be
`
`part of the “acting,” including erasing the software, providing warnings, and placing charges on a
`
`user’s account. (’941 patent at 6:46-52.)
`
`38.
`
`The ’941 patent describes implementing the steps of Figure 2 in a conventional
`
`computer. (’941 patent at 1:44-52.) For example, Figure 1 depicts a schematic diagram of an
`
`envisioned computer system and license bureau:
`
`
`
`13
`
`

`

`
`
`39.
`
`The only aspect of the claimed method that the ’941 patent purports to be
`
`
`
`inventive is storing the license-record in non-volatile memory of the BIOS. For example, the
`
`’941 patent states that prior art licensing systems existed. (’941 patent 1:19-32.) Additionally, the
`
`’941 patent concedes that storing a key in the BIOS was also “conventional” technology. (’941
`
`patent at 1:45-47.) The ’941 patent only describes one “advantage” of the described licensing
`
`method:
`
`An important advantage in utilizing non-volatile memory such as that
`residing in the BIOS is that the required level of system programming
`expertise that is necessary to intercept or modify commands, interacting
`with the BIOS, is substantially higher than those needed for tampering
`with data residing in volatile memory such as hard disk. Furthermore,
`there is a much higher cost to the programmer, if his tampering is
`unsuccessful, i.e. if data residing in the BIOS (which is necessary for the
`computer's operability) is inadvertently changed by the hacker. This is too
`high of a risk for the ordinary software hacker to pay. Note that various
`recognized means for hindering the professional-like hacker may also be
`utilized (e.g. anti-debuggers, etc.) in conjunction with the present
`invention.
`
`
`
`14
`
`

`

`(’941 patent at 3:4-17.) The ’941 patent does not allege that any other part of the described
`
`licensing system is new. In other words, the ’941 patent does not purport to include any advances
`
`in storage technology, licensing technology, or cryptography. One of the named inventors’
`
`testimony about the alleged invention in the ’941 patent is consistent with the above. (October
`
`15, 2015 Deposition of Miki Mullor at 53:13-22, Exh. 1008; see also, 50:14-57:9, 89:20-90:8.)
`
`B.
`
`Prosecution History of the ’941 Patent
`
`40.
`
`As originally filed, the claims of the application that issued as the ’941 patent
`
`were very broad and mirrored the steps of Figure 2. (Oct. 1, 1998 Application at 12, Exh. 1002.)
`
`After a series of rejections based on prior art, a lack of written description, and lack of
`
`enablement, the applicants made a series of amendments that included specifying that the
`
`verification structure and license-record that it accommodated were stored in erasable, non-
`
`volatile memory of the BIOS. Further, the claim amendments required that an “agent” is used to
`
`setup the verification structure in the erasable, non-volatile memory of the BIOS.
`
`41.
`
`The Examiner found that all of the elements of the claims as issued were present
`
`in the prior art. (Mar. 28, 2002 Notice of Allowance at 3-4, Exh. 1003.) The Examiner, however,
`
`still allowed the claims because the claims used an “agent” to setup the verification structure.
`
`(Mar. 28, 2002 Notice of Allowance at 3-4, Exh. 1003.) The Examiner believed that the prior art
`
`did not enable an operating system to access memory of a BIOS to store license records. As I
`
`explain below, however, the DMI Specification provided the exact functionality that the
`
`Examiner found missing the prior art. Accordingly, the claims as issued should not have been
`
`allowed as they are obvious.
`
`VII. PERSON OF ORDINARY SKILL IN THE ART
`
`42.
`
`In May 1998, a person of ordinary skill in the art of the ’941 patent would have a
`
`bachelor’s degree in computer science or computer engineering, or in a related field, and about
`15
`
`
`
`

`

`two or three years of experience in industry with respect to software security. My opinions would
`
`be the same, however, even if the level of ordinary skill varied somewhat with respect to subject
`
`matter or experience. Industry experience and education may compensate for each other. For
`
`example, a person with a master’s degree or the PhD in the relevant field with relevant
`
`coursework may not need as much industry experience to be a person of ordinary skill in the art.
`
`43.
`
`In 1998, I had a Ph.D. in Computer Science and had been designing, building, and
`
`analyzing computer systems for about 15 years – teaching and working with individuals who met
`
`the above criteria for persons of ordinary skill in the art. In particular, I have taught and worked
`
`with distinct groups of graduate students that entered the graduate program with B.S. degrees in
`
`CS/CE and several years of industry experience (two was a common length). Yet another group
`
`entered with an M.S. degree without any prior industry training to obtain a Ph.D. Many of these
`
`students found employment at companies that had an expressed interest in and need for skills
`
`relating to operating systems and security in this time frame, further corroborating that these
`
`were ordinarily skilled artisans.
`
`VIII. CLAIM CONSTRUCTION
`
`44.
`
`I have been advised that the first step of assessing the validity of a patent claim is
`
`to interpret or construe the meaning of the claim.
`
`45.
`
`I have reviewed the district court’s construction in its claim construction order.
`
`With two exceptions, I generally agree that the court’s constructions are either consistent with
`
`the broadest reasonable constructions for the disputed terms or the constructions are not relevant
`
`to my analysis below.
`
`
`
`16
`
`

`

`46.
`
`The first exception is that I understand the Federal Circuit reversed the court’s
`
`construction of “program” so that it is not limited to applications. I have applied the Federal
`
`Circuit’s construction in my analysis below.
`
`47.
`
`The second exception is that the district court’s construction of “license record” is
`
`narrower than the broadest reasonable interpretation. While the construction is appropriate in
`
`district court under the claim construction standard applied there, under the broadest reasonable
`
`interpretation of “license record,” it means “information for verifying a licensed program.”
`
`Based on my review of the ’941 patent and its prosecution history, I do not see any reason why
`
`this is not a reasonable interpretation. Further, because it is both reasonable and broader than the
`
`district court’s construction, it is the construction that a person of ordinary skill in the art would
`
`have under the broadest reasonable interpretation standard.
`
`48.
`
`As explained below, I believe that the term “agent” is indefinite. To the extent,
`
`however, that the term is found to be definite (and based on the lack of any description of the
`
`“agent” in the ’941 patent specification) I have applied this term as being “a software and/or
`
`hardware computational entity,” which is the broadest reasonable interpretation in light of the
`
`specification. (See, e.g., Dictionary of Computer Science, Engineering, and Technology at 12
`
`(2000), Exh. 1019 (defining “agent” as “a computational entity”).)
`
`IX.
`
`THE ’941 PATENT IS NOT DIRECTED TO PATENTABLE SUBJECT MATTER
`
`49.
`
`I have considered the factors set forth in the legal standards section above to
`
`determine if the claims of the ’941 patent are directed to patentable subject matter. After
`
`considering all of these factors, it is my opinion that Claims 1-19 of the ’941 patent are drawn to
`
`abstract ideas with, at most, the addition of well-understood, routine, and conventional elements
`
`that do not meaningfully limit the claim, and are therefore not patentable, as discussed below.
`
`
`
`17
`
`

`

`A.
`
`The Claims of the ’941 Patent Are Directed to An Abstract Idea
`
`50.
`
`The Summary of the Invention states that “The present invention relates to a
`
`method of restricting software operation within a license limitation.” ’941 patent at 1:38-39.
`
`This describes the abstract idea of controlling software access. The rest of the specification
`
`explains that the method is based on data stored in a particular location. In fact, the next line of
`
`the specification states, “This method strongly relies on the use of a key and of a record, which
`
`have been written into the non-volatile memory of a computer.” Id. at 1:39-42. Based on my
`
`review of the ’941 patent, this first paragraph of the Summary of the Invention describes the
`
`claimed abstract idea. In my opinion, the claims are directed to the abstract idea of controlling
`
`software access based on data stored in a particular location.
`
`51.
`
`The claims of the ’941 patent primarily refer to generic computer technology. In
`
`particular, independent Claims 1 and 18 recite four steps: (1) choosing a program, (2) creating a
`
`way to verify a user’s access to that program, (3) verifying the user’s access, and (4) allowing or
`
`denying access. The specification at column 1, lines 19-32 explains that at least steps (1), (3), and
`
`(4) were not new. Specifically, the Background of the Invention sections states, “Software based
`
`products have been developed to validate authorized software usage by writing a license signature
`
`onto a computer’s volatile memory (e.g. hard disk).” Id. at 1:19-21. That explanation is generally
`
`consistent with my understanding of the state of the art for restricting software operation within a
`
`license in 1998 when the inventors filed for the patent. However, I do not believe that most
`
`people of ordinary skill in the art would refer to a hard disk as volatile memory. In my
`
`experience, a hard disk is almost universally recognized as non-volatile memory because it is used
`
`for persistent storage of data when the computer is turned off. Generally, though, the existing
`
`software products were able to perform the claimed steps of (1) choosing a program, (2) creating a
`
`way to verify a user’s access to that program, (3) verifying the user’s access, and (4) allowing or
`18
`
`
`
`

`

`denying access. None of those steps were an improvement by themselves. However, the
`
`specification describes some advantages to perform the step “creating a way to verify a user’s
`
`access to that program” base on locating data in specific location.
`
`52.
`
`The patent states, “It is important to note that the key is stored in a non-volatile
`
`portion of the BIOS, i.e. it cannot be removed or modified.” Id. at 1:50-52. However, this was
`
`also conventional in computers as explained a few lines before (“Thus, consider a conventional
`
`computer ha

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket