`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`__________________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`__________________________________
`
`HTC CORPORATION and HTC AMERICA, INC.
`Petitioners
`
`v.
`
`ANCORA TECHNOLOGIES INC.
`Patent Owner.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case No. TBD
`U.S. Patent No. 6,411,941
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`DECLARATION OF JON B. WEISSMAN, PH.D.
`
`
`HTC EX. 1008
`HTC v. Ancora
`US Patent No. 6,411,941
`
`
`
`I, Jon B. Weissman, declare as follows:
`
`I.
`
`INTRODUCTION
`
`
`
`1.
`
`I have been retained by Knobbe, Martens, Olson, & Bear LLP (“Knobbe
`
`Martens”) on behalf of HTC Corporation and HTC America, Inc. (“HTC” or “Petitioner”) as an
`
`independent expert consultant in this proceeding before the United States Patent and Trademark
`
`Office. Although I am being compensated at my usual rate of $500 per hour for the time I spend
`
`on this matter, no part of my compensation depends on the outcome of this proceeding, and I
`
`have no other interest in this proceeding.
`
`2.
`
`I understand that this proceeding involves U.S. Patent No. 6,411,941 (“the ’941
`
`patent”) (attached as Ex. 1001 to HTC’s petition). The application for the ’941 patent was filed
`
`on October 1, 1998, as U.S. Patent Application No. 09/164,777, and the patent issued on June 25,
`
`2002.
`
`3.
`
`I have been asked by counsel to review relevant materials and render my expert
`
`opinion in connection with technical matters related to the petition for covered business method
`
`review of the ’941 patent. My opinions are set forth below.
`
`II.
`
`QUALIFICATIONS
`
`4.
`
`My academic and professional background is in computer science, specifically in
`
`the areas of distributed systems, file systems, and cloud computing. I am a leading researcher
`
`and educator in these areas. My career includes over 20 years’ experience in industry and
`
`academia. As a systems researcher, I have built practical systems that have application in a wide
`
`variety of settings across many different types of distributed and parallel systems. For example, I
`
`was a lead designer on one of the first distributed Grid computing systems that spanned the
`
`Internet, called Legion. In my current work, I analyze and develop systems that allow mobile
`
`
`
`1
`
`
`
`devices to utilize remote cloud-computing resources to improve performance and save energy.
`
`My curriculum vitae, which includes a more detailed summary of my background, experience,
`
`and publications, is attached as Appendix A. Below I provide a short summary of my education
`
`and experience, which I believe to be most pertinent to the opinions that I express.
`
`5.
`
`I received a Bachelor of Science degree in Applied Mathematics and Computer
`
`Science from Carnegie Mellon University in 1984. I received a Master of Science degree in
`
`Computer Science in 1989 and a Ph.D. degree in Computer Science in 1995, both from the
`
`University of Virginia. My Ph.D. thesis involved developing the first automated scheduling
`
`system for parallel and distributed applications across heterogeneous local and wide-area
`
`networks. After completion of my Ph.D. program, I worked in industry for five years in the area
`
`of distributed systems.
`
`6.
`
`In 1995, I joined the faculty of the University of Texas in San Antonio as an
`
`Assistant Professor of Computer Science. In 1999, I joined the faculty of the University of
`
`Minnesota as Assistant Professor of Computer Science, where I am currently Full Professor of
`
`Computer Science – the highest academic rank at a top-tier research university. At the University
`
`of Minnesota, I lead the Distributed Computing Systems Group, consisting of faculty colleagues
`
`and both graduate and undergraduate students. I also serve as an investigator for the Center for
`
`Research in Intelligent Storage (CRIS), sponsored by the National Science Foundation.
`
`7.
`
`I have published over 100 technical articles, most at highly competitive refereed
`
`conferences and rigorously reviewed journals. I have recently served on the technical editorial
`
`boards of several flagship journals, including IEEE Transactions on Parallel and Distributed
`
`Systems and IEEE Transactions on Computers. I am currently the steering committee chair for
`
`
`
`2
`
`
`
`the ACM International Symposium on High Performance Parallel and Distributed Systems, the
`
`flagship conference in my area.
`
`8.
`
`My research in computer systems has been funded by the National Institutes of
`
`Health, NASA, the National Science Foundation, the Department of Energy, and the Air Force.
`
`With regard to the subject matter of the ’941 patent relating to computer systems and security,
`
`my collaborators and I have obtained over $2 million in grant funding, including:
`
` National Institute of Health, ePCRN: Electronic Primary Care Research Network.
`
`This project explores how to support secure query processing across distributed
`
`networks.
`
` National Science Foundation, “A Data Mining and Exploration Middleware for
`
`Grid and Distributed Computing.” This project explores how to perform intrusion
`
`detection in distributed systems.
`
` National Science Foundation, “One Cloud Does Not Fit All: Minnesota
`
`Integrated Cloud Systems Research Testbed (MIST).” This project seeks to build
`
`a cloud testbed consisting of mobile devices and servers distributed around
`
`campus with security as one of the principle research foci.
`
` Air Force Office of Scientific Research, “Telecommunication Networks for
`
`Mobile and Distributed Computing and Communications.” This project focuses
`
`on developing software technology to securely connect mobile devices to servers
`
`and developing the technology for applications to run across distributed networks,
`
`such as the Grid.
`
`9.
`
`With regard to the subject matter of the ’941 patent relating to secure computing
`
`systems, I have published several papers, here is a small subset:
`
`
`
`3
`
`
`
` “Nebula: Distributed Edge Cloud for Data Intensive Computing,” Mathew
`
`Ryden, Kwangsung Oh, Abhishek Chandra and Jon B. Weissman, IEEE
`
`International Conference on Cloud Engineering, March 2014, Boston, MA.
`
` “A Dynamic Approach for Characterizing Collusion in Desktop Grids,” Louis-
`
`Claude Canon, Emmanuel Jeannot, and Jon B. Weissman, 24th IEEE
`
`International Parallel and Distributed Processing Symposium (IPDPS), 2010.
`
` “Adaptive Reputation-Based Scheduling
`
`on Unreliable Distributed
`
`Infrastructures,” Jason D. Sonnek, Abhishek Chandra, and Jon B. Weissman,
`
`IEEE Transactions on Parallel and Distributed Systems, 18(11), November
`
`2007.
`
`III. MATERIALS REVIEWED
`
`10.
`
`In forming my opinions, I have reviewed the ’941 Patent, the prosecution history
`
`of the ’941 patent, and the exhibits to the covered business method patent petition that this
`
`declaration supports.
`
`IV.
`
`SUMMARY OF FINDINGS
`
`11.
`
`It is my opinion, that Claims 1-19 of the ’941 patent are unpatentable under 35
`
`U.S.C. § 101 because they are directed to ineligible subject matter—in particular, the abstract idea
`
`of controlling software access based on data stored in a particular location. The basic concept is
`
`not patentable and was well known in the prior art. Based on my review of the ’941 patent, I did
`
`not find any concepts recited in the claims that were not conventional and well known to persons
`
`of ordinary skill in the art before 1998.
`
`12.
`
`It is my opinion that the following references render obvious claims 1-3, 5-14,
`
`and 16-17 of the ’914 patent:
`
`
`
`4
`
`
`
` European Patent Application Publication No. EP 0 766 165 A2 (“Hasebe”)
`
`(“Hasebe,” Exh. 1012)
`
` Desktop Management BIOS Specification Version 2.0, March 6, 1996 (“DMI
`
`Spec.,” Exh. 1013)
`
` U.S. Patent No. 5,724,425 (“Chang,” Exh. 1014).
`
` Arbaugh, W.A et al., “A secure and reliable bootstrap architecture,” Security and
`
`Privacy, 1997 IEEE Symposium on , pp.65-71, 4-7 May 1997 (“Arbaugh,” Exh.
`
`1015).
`
` U.S. Patent No. 5,748,804 (“Isikoff,” Exh. 1016).
`
` PCT Publication No. WO 97/36241 (“Shipman,” Exh. 1017).
`
` European Patent Application Publication No. EP 0 824 233 A2 (“Angelo,” Exh.
`
`1018).
`
`13.
`
`It is my opinion, that the ’941 patent is invalid for lack of written description
`
`support for the term “agent” that appears in all of the claims of the ’941 patent.
`
`14.
`
`Furthermore, it is my opinion that the term “agent” in the ’941 patent’s claims is a
`
`mean-plus-function element and the ’941 patent specification fails to link any structure to the
`
`recited function for the “agent,” which renders the claims invalid as indefinite.
`
`V.
`
`LEGAL STANDARDS
`
`A.
`15.
`
`Claim Construction
`
`I have been informed that when construing claim terms in an unexpired patent, a
`
`claim subject to covered business method patent review receives the broadest reasonable
`
`construction in light of the specification of the patent in which it appears. I further understand
`
`that the broadest reasonable construction is the broadest reasonable interpretation (BRI) of the
`
`
`
`5
`
`
`
`claim language, and that any term that lacks a definition in the specification is also given a broad
`
`interpretation. I have also been advised that, at the same time, claim terms are given their
`
`ordinary and accustomed meaning as would be understood by one of ordinary skill in the art. I
`
`have been informed that the construction of a patent term applied during this proceeding may
`
`differ from that in a district court proceeding.
`
`16.
`
`I have been informed that patentees may claim their inventions using purely
`
`functional language, which is known as “means-plus-function” claiming. I have been informed
`
`that courts determine whether a claim is a means-plus-function claim by examining whether the
`
`claim itself recites sufficiently definite structure to perform the recited function. I have been
`
`informed that if the claim recites sufficient structure to perform the recited function, it is not a
`
`means-plus-function claim and vice versa. I also have been informed that a claim limitation
`
`using the word “means” presumptively does not recite sufficient structure, while a claim
`
`limitation that omits “means” presumptively recites sufficient structure. These presumptions can
`
`be overcome by a showing that the claim either does, or does not, recite sufficient structure.
`
`17.
`
`I have been informed that a means-plus-function limitation includes two
`
`components: (1) the recited function; and (2) the corresponding structure in the written
`
`description of the patent for performing the function. I also have been informed that structure
`
`corresponds to the claimed function only if the specification or the prosecution history clearly
`
`links or associates that structure to the recited function.
`
`18.
`
`I have been informed that, if a means-plus-function element recites a computer-
`
`implemented limitation, the structure disclosed in the specification must be more than simply a
`
`general purpose computer or microprocessor. Instead, the specification must disclose an
`
`algorithm for performing the recited function. I also have been informed that, although the
`
`
`
`6
`
`
`
`algorithm may be disclosed in any understandable terms, it must be capable of performing each
`
`and every function to the full extent recited. I have been informed that this is true even if
`
`implementing the recited function would be well understood by persons of ordinary skill in the
`
`art. In other words, even if a person skilled in the art would readily know how to implement the
`
`recited function, the specification still must explain how the recited function is actually
`
`performed. I have been informed that an abstraction that merely describes the function of the
`
`claimed means is not a sufficient disclosure of corresponding structure.
`
`B.
`
`Patent Ineligibility
`
`19.
`
`I understand that a patent claim is invalid under 35 U.S.C. § 101 if it claims a law
`
`of nature, natural phenomenon, or an abstract idea. I further understand that a patent claim would
`
`be ineligible for patent protection, and therefore invalid under 35 U.S.C. § 101, if it claims a
`
`“building block of human ingenuity,” or if it merely recites a generic computer implementation
`
`of an abstract idea. I further understand that a patent claim is invalid under 35 U.S.C. § 101, if,
`
`setting aside any insignificant computer-based or field of use limitations, the claim is directed
`
`solely to an abstract idea. Limiting an abstract idea to a single field of use or adding token post-
`
`solution elements does not make an abstract concept patentable.
`
`20.
`
`I understand that a patent claim involving an abstract idea must contain other
`
`elements or combination of elements, sometimes referred to as an “inventive concept,” that are
`
`sufficient to ensure that the patent in practice amounts to significantly more than a patent upon
`
`the abstract idea itself. I understand that an abstract idea with nothing more than well-
`
`understood, routine, conventional activity added is not patentable. Similarly, merely requiring a
`
`generic computer implementation fails to transform an abstract idea into a patent-eligible
`
`invention.
`
`
`
`7
`
`
`
`21.
`
`I further understand that in determining whether a patent claim recites patentable
`
`subject matter, the claim must be considered as a whole.
`
`C.
`
`Obviousness
`
`22.
`
`I understand that a patent claim may also be invalid if the claimed invention
`
`would have been obvious to a person of ordinary skill in the art at the time of the claim’s
`
`effective filing date. I understand that an invention may be obvious if a person of ordinary skill
`
`in the art with knowledge of the prior art would have conceived the claimed invention, even if all
`
`of the limitations of the claim cannot be found in a single prior art reference.
`
`23.
`
`I understand that, in assessing whether a claimed invention would have been
`
`obvious, the following factors are considered.
`
`24.
`
`First, I understand that the level of ordinary skill that a person working in the field
`
`of the claimed invention would have had at its effective filing date must be considered.
`
`25.
`
`Second, I understand that the scope and content of the prior art must be
`
`considered. I understand that, to be considered as prior art, a reference must be reasonably
`
`related to the claimed invention, which means that the reference is in the same field as the
`
`claimed invention or is from another field to which a person of ordinary skill in the art would
`
`refer to solve a known problem.
`
`26.
`
`Third, I understand that the differences, if any, that existed between the prior art
`
`and the claimed invention must be considered. I understand that the determination of such
`
`differences should focus on the claimed invention as a whole.
`
`27.
`
`Fourth, I understand that other factors, known as “secondary considerations” of
`
`non-obviousness, should be considered. I understand these factors to include: (i) commercial
`
`success of a product due to the merits of the claimed invention; (ii) a long-felt need for the
`
`solution provided by the claimed invention; (iii) unsuccessful attempts by others to find the
`8
`
`
`
`
`
`solution provided by the claimed invention; (iv) copying of the claimed invention by others; (v)
`
`unexpected and superior results from the claimed invention; (vi) praise of the claimed invention
`
`by others in the art; (vii) independent invention of the claimed invention by others before or at
`
`about the same time as it was conceived by the named inventors; (viii) whether others expressed
`
`surprise or disbelief regarding the invention; (ix) whether others sought or obtained rights to the
`
`claimed invention from the patentee; and (x) whether the inventor proceeded contrary to
`
`accepted wisdom in the art.
`
`28.
`
`I understand that it is not sufficient to prove a patent claim obvious to show that
`
`each of its limitations was independently known in the prior art and that there also must have
`
`been a reason for a person of ordinary skill in the art to have combined or modified the elements
`
`or concepts from the prior art in the same way as in the claimed invention. In assessing whether
`
`such a reason existed, I understand that the following may be considered: (i) whether the
`
`combination or modification was merely the predictable result of using prior art elements
`
`according to their known functions; (ii) whether the claimed invention provides an obvious
`
`solution to a known problem in the art; (iii) whether the claimed invention applied a known
`
`technique that had been used to improve a similar device or method in a similar way; (iv)
`
`whether the prior art teaches or suggests making the combination or modification claimed in the
`
`patent; (v) whether the prior art teaches away from combining elements in the claimed invention;
`
`(vi) whether it would have been obvious to try the combination or modification, such as when
`
`there is a design need or market pressure to solve a problem and there are a finite number of
`
`identified, predictable solutions; and (vii) whether the combination or modification resulted more
`
`from design incentives or other market forces.
`
`
`
`9
`
`
`
`29.
`
`I understand that, when considering whether a claimed invention was obvious,
`
`one should be careful not to use the benefit of hindsight and that, instead, one should put oneself
`
`in the position of a person of ordinary skill in the art as of the effective filing date of the claimed
`
`invention and should not consider what is known today or what is learned from the teaching of
`
`the patent.
`
`D. Written Description
`I have been informed that 35 U.S.C. § 112 requires the patent to contain an
`30.
`
`adequate written description of the claimed invention. I understand that the purpose of the
`
`written description requirement is to demonstrate that the inventor was in possession of the
`
`invention at the time the patent application was filed, even though subsequently the claims may
`
`have been changed or new claims may have been added. I understand that this requirement is
`
`met if, at the time of filing of the application for a patent, a person of ordinary skill in the art
`
`reading that application would have recognized that it described the invention as claimed. I
`
`understand that the application does not need to specifically disclose a claim limitation so long as
`
`a person of ordinary skill in the art would understand that the missing requirement is necessarily
`
`implied in the application as originally filed. I understand that the written description inquiry
`
`must take into account the entirety of what is disclosed within the specification. I understand that
`
`it is insufficient that undisclosed subject matter would have been obvious to a person of ordinary
`
`skill in the art. I understand that if a claim is proved to lack an adequate written description by
`
`clear and convincing evidence, the claim is invalid.
`
`E.
`
`Indefiniteness
`
`31.
`
`I have been informed that a patent is invalid for indefiniteness if its claims, read in
`
`light of the specification delineating the patent, and the prosecution history, fail to inform, with
`
`reasonable certainty, those skilled in the art about the scope of the invention. In determining
`
`
`
`10
`
`
`
`whether a claim is indefinite, I have been informed that I should consider both the “intrinsic
`
`evidence” (i.e., the claims, the specification, and the prosecution history) and the “extrinsic
`
`evidence” (e.g., relevant publications contemporaneous with the filing date of the ’941 patent).
`
`32.
`
`I also have been informed that, if the specification fails to clearly link the recited
`
`function of a means-plus-function limitation to structure for performing that function, the claim
`
`containing that limitation is indefinite.
`
`VI.
`
`THE ’941 PATENT
`
`A.
`33.
`
`Overview of the ’941 Patent
`
`The ’941 patent is directed to a method of restricting software operation within a
`
`license limitation that is applicable for a computer having a first non-volatile memory area, a
`
`second non-volatile memory area, and a volatile memory area. (’941 patent at Abstract.) The
`
`method includes the steps of selecting a program residing in the volatile memory, setting up a
`
`verification structure in the non-volatile memories, verifying the program using the structure, and
`
`acting on the program according to the verification. (’941 patent at Abstract.) For example,
`
`Figure 2 (one of only two figures in the ’941 patent) depicts these four basic steps.
`
`
`
`
`
`11
`
`
`
`
`
`34.
`
`The ’941 patent describes these four basic steps at 6:4-52. The “selecting” step is
`
`
`
`broadly described in the specification to include “establishing a licensed-software-program” in
`
`RAM or some other volatile memory. (’941 patent at 6:7-16.) I note that this description of
`
`“selecting” is broader than what is actually claimed in claim 1 of the ’941 patent, which further
`
`requires that the selected program “resides in the volatile memory.” Claim 18, on the other hand,
`
`is closer to the broader “selecting” step in the specification. Specifically,
`
`claim 18
`
`require
`
`“loading the application software program.”
`
`
`
`12
`
`
`
`35.
`
`The “setting up” step is described as applying to the verification structure, similar
`
`to how this step appears in claim 1. (’941 patent at 6:17-21.) The example in the specification
`
`provides that setting up the verification structure includes “establishing or certifying” a key and
`
`“establishing at least one license-record location.”
`
`36.
`
`The “verifying” step is a basic comparison step using the license record to verify
`
`that the program is licensed. In on example, the verifying includes encrypting a license-record
`
`and comparing the encrypted license-record to another encrypted license-record. (’941 patent at
`
`6:29-39.) Alternatively, in another example, the step may include decrypting a license-record and
`
`comparing that to another decrypted license-record. (’941 patent at 6:29-39.)
`
`37.
`
`The “acting” step is done by restricting the program operation in accordance with
`
`the verification. (’941 patent at 6:40-42.) The ’941 patent also describes other steps that may be
`
`part of the “acting,” including erasing the software, providing warnings, and placing charges on a
`
`user’s account. (’941 patent at 6:46-52.)
`
`38.
`
`The ’941 patent describes implementing the steps of Figure 2 in a conventional
`
`computer. (’941 patent at 1:44-52.) For example, Figure 1 depicts a schematic diagram of an
`
`envisioned computer system and license bureau:
`
`
`
`13
`
`
`
`
`
`39.
`
`The only aspect of the claimed method that the ’941 patent purports to be
`
`
`
`inventive is storing the license-record in non-volatile memory of the BIOS. For example, the
`
`’941 patent states that prior art licensing systems existed. (’941 patent 1:19-32.) Additionally, the
`
`’941 patent concedes that storing a key in the BIOS was also “conventional” technology. (’941
`
`patent at 1:45-47.) The ’941 patent only describes one “advantage” of the described licensing
`
`method:
`
`An important advantage in utilizing non-volatile memory such as that
`residing in the BIOS is that the required level of system programming
`expertise that is necessary to intercept or modify commands, interacting
`with the BIOS, is substantially higher than those needed for tampering
`with data residing in volatile memory such as hard disk. Furthermore,
`there is a much higher cost to the programmer, if his tampering is
`unsuccessful, i.e. if data residing in the BIOS (which is necessary for the
`computer's operability) is inadvertently changed by the hacker. This is too
`high of a risk for the ordinary software hacker to pay. Note that various
`recognized means for hindering the professional-like hacker may also be
`utilized (e.g. anti-debuggers, etc.) in conjunction with the present
`invention.
`
`
`
`14
`
`
`
`(’941 patent at 3:4-17.) The ’941 patent does not allege that any other part of the described
`
`licensing system is new. In other words, the ’941 patent does not purport to include any advances
`
`in storage technology, licensing technology, or cryptography. One of the named inventors’
`
`testimony about the alleged invention in the ’941 patent is consistent with the above. (October
`
`15, 2015 Deposition of Miki Mullor at 53:13-22, Exh. 1008; see also, 50:14-57:9, 89:20-90:8.)
`
`B.
`
`Prosecution History of the ’941 Patent
`
`40.
`
`As originally filed, the claims of the application that issued as the ’941 patent
`
`were very broad and mirrored the steps of Figure 2. (Oct. 1, 1998 Application at 12, Exh. 1002.)
`
`After a series of rejections based on prior art, a lack of written description, and lack of
`
`enablement, the applicants made a series of amendments that included specifying that the
`
`verification structure and license-record that it accommodated were stored in erasable, non-
`
`volatile memory of the BIOS. Further, the claim amendments required that an “agent” is used to
`
`setup the verification structure in the erasable, non-volatile memory of the BIOS.
`
`41.
`
`The Examiner found that all of the elements of the claims as issued were present
`
`in the prior art. (Mar. 28, 2002 Notice of Allowance at 3-4, Exh. 1003.) The Examiner, however,
`
`still allowed the claims because the claims used an “agent” to setup the verification structure.
`
`(Mar. 28, 2002 Notice of Allowance at 3-4, Exh. 1003.) The Examiner believed that the prior art
`
`did not enable an operating system to access memory of a BIOS to store license records. As I
`
`explain below, however, the DMI Specification provided the exact functionality that the
`
`Examiner found missing the prior art. Accordingly, the claims as issued should not have been
`
`allowed as they are obvious.
`
`VII. PERSON OF ORDINARY SKILL IN THE ART
`
`42.
`
`In May 1998, a person of ordinary skill in the art of the ’941 patent would have a
`
`bachelor’s degree in computer science or computer engineering, or in a related field, and about
`15
`
`
`
`
`
`two or three years of experience in industry with respect to software security. My opinions would
`
`be the same, however, even if the level of ordinary skill varied somewhat with respect to subject
`
`matter or experience. Industry experience and education may compensate for each other. For
`
`example, a person with a master’s degree or the PhD in the relevant field with relevant
`
`coursework may not need as much industry experience to be a person of ordinary skill in the art.
`
`43.
`
`In 1998, I had a Ph.D. in Computer Science and had been designing, building, and
`
`analyzing computer systems for about 15 years – teaching and working with individuals who met
`
`the above criteria for persons of ordinary skill in the art. In particular, I have taught and worked
`
`with distinct groups of graduate students that entered the graduate program with B.S. degrees in
`
`CS/CE and several years of industry experience (two was a common length). Yet another group
`
`entered with an M.S. degree without any prior industry training to obtain a Ph.D. Many of these
`
`students found employment at companies that had an expressed interest in and need for skills
`
`relating to operating systems and security in this time frame, further corroborating that these
`
`were ordinarily skilled artisans.
`
`VIII. CLAIM CONSTRUCTION
`
`44.
`
`I have been advised that the first step of assessing the validity of a patent claim is
`
`to interpret or construe the meaning of the claim.
`
`45.
`
`I have reviewed the district court’s construction in its claim construction order.
`
`With two exceptions, I generally agree that the court’s constructions are either consistent with
`
`the broadest reasonable constructions for the disputed terms or the constructions are not relevant
`
`to my analysis below.
`
`
`
`16
`
`
`
`46.
`
`The first exception is that I understand the Federal Circuit reversed the court’s
`
`construction of “program” so that it is not limited to applications. I have applied the Federal
`
`Circuit’s construction in my analysis below.
`
`47.
`
`The second exception is that the district court’s construction of “license record” is
`
`narrower than the broadest reasonable interpretation. While the construction is appropriate in
`
`district court under the claim construction standard applied there, under the broadest reasonable
`
`interpretation of “license record,” it means “information for verifying a licensed program.”
`
`Based on my review of the ’941 patent and its prosecution history, I do not see any reason why
`
`this is not a reasonable interpretation. Further, because it is both reasonable and broader than the
`
`district court’s construction, it is the construction that a person of ordinary skill in the art would
`
`have under the broadest reasonable interpretation standard.
`
`48.
`
`As explained below, I believe that the term “agent” is indefinite. To the extent,
`
`however, that the term is found to be definite (and based on the lack of any description of the
`
`“agent” in the ’941 patent specification) I have applied this term as being “a software and/or
`
`hardware computational entity,” which is the broadest reasonable interpretation in light of the
`
`specification. (See, e.g., Dictionary of Computer Science, Engineering, and Technology at 12
`
`(2000), Exh. 1019 (defining “agent” as “a computational entity”).)
`
`IX.
`
`THE ’941 PATENT IS NOT DIRECTED TO PATENTABLE SUBJECT MATTER
`
`49.
`
`I have considered the factors set forth in the legal standards section above to
`
`determine if the claims of the ’941 patent are directed to patentable subject matter. After
`
`considering all of these factors, it is my opinion that Claims 1-19 of the ’941 patent are drawn to
`
`abstract ideas with, at most, the addition of well-understood, routine, and conventional elements
`
`that do not meaningfully limit the claim, and are therefore not patentable, as discussed below.
`
`
`
`17
`
`
`
`A.
`
`The Claims of the ’941 Patent Are Directed to An Abstract Idea
`
`50.
`
`The Summary of the Invention states that “The present invention relates to a
`
`method of restricting software operation within a license limitation.” ’941 patent at 1:38-39.
`
`This describes the abstract idea of controlling software access. The rest of the specification
`
`explains that the method is based on data stored in a particular location. In fact, the next line of
`
`the specification states, “This method strongly relies on the use of a key and of a record, which
`
`have been written into the non-volatile memory of a computer.” Id. at 1:39-42. Based on my
`
`review of the ’941 patent, this first paragraph of the Summary of the Invention describes the
`
`claimed abstract idea. In my opinion, the claims are directed to the abstract idea of controlling
`
`software access based on data stored in a particular location.
`
`51.
`
`The claims of the ’941 patent primarily refer to generic computer technology. In
`
`particular, independent Claims 1 and 18 recite four steps: (1) choosing a program, (2) creating a
`
`way to verify a user’s access to that program, (3) verifying the user’s access, and (4) allowing or
`
`denying access. The specification at column 1, lines 19-32 explains that at least steps (1), (3), and
`
`(4) were not new. Specifically, the Background of the Invention sections states, “Software based
`
`products have been developed to validate authorized software usage by writing a license signature
`
`onto a computer’s volatile memory (e.g. hard disk).” Id. at 1:19-21. That explanation is generally
`
`consistent with my understanding of the state of the art for restricting software operation within a
`
`license in 1998 when the inventors filed for the patent. However, I do not believe that most
`
`people of ordinary skill in the art would refer to a hard disk as volatile memory. In my
`
`experience, a hard disk is almost universally recognized as non-volatile memory because it is used
`
`for persistent storage of data when the computer is turned off. Generally, though, the existing
`
`software products were able to perform the claimed steps of (1) choosing a program, (2) creating a
`
`way to verify a user’s access to that program, (3) verifying the user’s access, and (4) allowing or
`18
`
`
`
`
`
`denying access. None of those steps were an improvement by themselves. However, the
`
`specification describes some advantages to perform the step “creating a way to verify a user’s
`
`access to that program” base on locating data in specific location.
`
`52.
`
`The patent states, “It is important to note that the key is stored in a non-volatile
`
`portion of the BIOS, i.e. it cannot be removed or modified.” Id. at 1:50-52. However, this was
`
`also conventional in computers as explained a few lines before (“Thus, consider a conventional
`
`computer ha