throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`SAMSUNG ELECTRONICS CO., LTD., and
`SAMSUNG ELECTRONICS AMERICA, INC.,
`Petitioners
`v.
`ANCORA TECHNOLOGIES, INC.,
`Patent Owner.
`
`Case No. IPR2020-01184
`U.S. Patent No. 6,411,941
`
`DECLARATION OF EREZ ZADOK, PH.D. IN SUPPORT OF PETITION
`FOR INTER PARTES REVIEW OF U.S. PATENT NO. 6,411,941
`
`0
`
`SAMSUNG EX. 1002 - 1/172
`
`

`

`
`
`TABLE OF CONTENTS
`
`
`BACKGROUND AND QUALIFICATIONS ................................................ 2
`I.
`II. MATERIALS CONSIDERED ..................................................................... 12
`III. LEVEL OF ORDINARY SKILL IN THE ART .......................................... 13
`IV. TECHNOLOGY BACKGROUND .............................................................. 13
`A.
`Introduction ........................................................................................ 13
`B.
`Architecture of PCs ............................................................................ 13
`C.
`Executing Computer Programs .......................................................... 17
`D.
`Software for PCs, BIOS, and BIOS Memory Areas .......................... 18
`E.
`Unique vs. Pseudo-Unique Numbers and Keys ................................. 25
`1.
`The ’941 Patent ........................................................................ 25
`2.
`The Domain of Uniqueness ..................................................... 26
`3.
`Ensuring Uniqueness ............................................................... 27
`4.
`Pseudo Unique Number Schemes ............................................ 30
`Symmetric vs. Public-Key Encryption Systems ................................ 33
`F.
`Problems and Prior Art Solutions....................................................... 35
`G.
`SUMMARY OF THE ’941 PATENT .......................................................... 37
`A.
`Summary of the Invention .................................................................. 37
`B.
`Alleged Benefits Over Prior Art......................................................... 46
`VI. BRIEF SUMMARY OF THE ’941 PATENT PROSECUTION
`HISTORY ..................................................................................................... 48
`A.
`First Office Action.............................................................................. 48
`
`V.
`
`i
`
`
`SAMSUNG EX. 1002 - 2/172
`
`

`

`
`
`Second Office Action ......................................................................... 49
`B.
`Third Office Action ............................................................................ 50
`C.
`D. Notice of Allowance ........................................................................... 51
`VII. CLAIMS 1-3 and 6-17 OF THE ’941 PATENT .......................................... 52
`VIII. CLAIM CONSTRUCTION ......................................................................... 52
`IX. LEGAL STANDARDS FOR OBVIOUSNESS ........................................... 56
`X.
`THE PRIOR ART ......................................................................................... 58
`A. Hasebe ................................................................................................ 58
`B.
`Shipman .............................................................................................. 60
`C.
`Schwartz ............................................................................................. 63
`D. Yee ...................................................................................................... 66
`XI. GROUND 1: CLAIMS 1-2 AND 6-17 OF THE ’941 PATENT
`WOULD HAVE BEEN OBVIOUS OVER THE COMBINATION
`OF SCHWARTZ AND YEE ........................................................................ 69
`A.
`Claim 1 ............................................................................................... 69
`1.
`1.p: A method of restricting software operation within a
`license for use with a computer including an erasable,
`non-volatile memory area of a BIOS of the computer,
`and a volatile memory area; the method comprising the
`steps of: .................................................................................... 69
`1.a: selecting a program residing in the volatile memory, ....... 74
`1.b: using an agent to set up a verification structure in the
`erasable, non-volatile memory of the BIOS, the
`verification structure accommodating data that includes
`at least one license record, ....................................................... 75
`1.c: verifying the program using at least the verification
`structure from the erasable non-volatile memory of the
`BIOS, and ................................................................................. 83
`
`2.
`3.
`
`4.
`
`ii
`
`SAMSUNG EX. 1002 - 3/172
`
`

`

`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`
`
`1.d: acting on the program according to the verification. ........ 84
`5.
`Claim 2 ............................................................................................... 85
`1.
`A method according to claim 1, further comprising the
`steps of: establishing a license authentication bureau. ............ 85
`Claim 6 ............................................................................................... 86
`1.
`A method according to claim 1 wherein selecting a
`program includes the steps of: establishing a licensed-
`software-program in the volatile memory of the computer
`wherein said licensed-software-program includes
`contents used to form the license-record. ................................ 87
`Claim 7 ............................................................................................... 87
`1.
`A method according to claim 6 wherein using an agent to
`set up the verification structure includes the steps of:
`establishing or certifying the existence of a pseudo-
`unique key in a first non-volatile memory area of the
`computer; and ........................................................................... 87
`establishing at least one license-record location in the
`first nonvolatile memory area or in the erasable, non-
`volatile memory area of the BIOS. .......................................... 87
`Claim 8 ............................................................................................... 87
`1.
`A method according to claim 6 wherein establishing a
`license-record includes the steps of: forming a license-
`record by encrypting of the contents used to form a
`license-record with other predetermined data contents,
`using the key; and .................................................................... 88
`establishing the encrypted license-record in one of the at
`least one established license-record locations. ........................ 88
`Claim 9 ............................................................................................... 88
`1.
`A method according to claim 7 wherein verifying the
`program includes the steps of: encrypting the licensed-
`software-program’s license-record contents from the
`
`2.
`
`2.
`
`iii
`
`SAMSUNG EX. 1002 - 4/172
`
`

`

`
`
`2.
`
`volatile memory area or decrypting the license-record in
`the erasable, non-volatile memory area of the BIOS,
`using the pseudo-unique key; and ............................................ 89
`comparing the encrypted licenses-software-program’s
`license-record contents with the encrypted license-record
`in the erasable, non-volatile memory area of the BIOS, or
`comparing the license-software-program’s license-record
`contents with the decrypted license-record in erasable
`non-volatile memory area of the BIOS. ................................... 90
`Claim 10 ............................................................................................. 90
`1.
`A method according to claim 9 wherein acting on the
`program includes the step: restricting the program's
`operation with predetermined limitations if the
`comparing yields non-unity or insufficiency. .......................... 90
`Claim 11 ............................................................................................. 90
`1.
`A method according to claim 1 wherein the volatile
`memory is a RAM. ................................................................... 91
`Claim 12 ............................................................................................. 91
`1.
`The method of claim 1, wherein a pseudo-unique key is
`stored in the non-volatile memory of the BIOS. ...................... 91
`Claim 13 ............................................................................................. 92
`1.
`The method of claim 1, wherein a unique key is stored in
`a first non-volatile memory area of the computer. .................. 92
`Claim 14 ............................................................................................. 93
`1.
`The method according [to] claim 13, wherein the step of
`using the agent to set up the verification record, including
`the license record, includes encrypting a license record
`data in the program using at least the unique key. ................... 93
`Claim 15 ............................................................................................. 93
`
`G.
`
`H.
`
`I.
`
`J.
`
`K.
`
`L.
`
`iv
`
`SAMSUNG EX. 1002 - 5/172
`
`

`

`1.
`
`2.
`
`N.
`
`The method according to claim 14, wherein the
`verification comprises: extracting the license record from
`the software program ............................................................... 93
`encrypting the license record using the unique key stored
`in the first non-volatile memory area of the computer to
`form second encrypted license information; and ..................... 94
`comparing the encrypted license information stored in the
`erasable, non-volatile memory area of the BIOS of the
`computer with the second encrypted license information. ...... 95
`M. Claim 16 ............................................................................................. 95
`1.
`The method according to claim 13, wherein the step of
`verifying the program includes a decrypting the license
`record data accommodated in the erasable second non-
`volatile memory area of the BIOS using at least the
`unique key. ............................................................................... 95
`Claim 17 ............................................................................................. 96
`1.
`The method according to claim 13, wherein the step of
`verifying the program includes encrypting the license
`record that is accommodated in the program using at least
`the unique key. ......................................................................... 96
`O. Motivation to Combine Schwartz and Yee and/or POSITA
`knowledge .......................................................................................... 97
`1.
`Schwartz and Yee are in the Same Field ................................. 97
`2.
`Schwartz and Yee Use Similar Techniques ............................. 99
`3.
`Schwartz and Yee are From the Same Time Frame .............. 101
`4. Motivation to Improve on Schwartz’s Network Server
`System with Yee’s Remote Network Software
`Repository .............................................................................. 101
`5. Motivation to Improve on Schwartz’s Use of Keys and
`Ciphers with Yee’s Disclosures ............................................. 106
`
`3.
`
`
`
`v
`
`SAMSUNG EX. 1002 - 6/172
`
`

`

`2.
`3.
`
`XII. GROUND 2: HASEBE IN VIEW OF SHIPMAN RENDERS
`OBVIOUS CLAIMS 1-3, 6-15, and 17 ...................................................... 112
`A.
`Claim 1 ............................................................................................. 112
`1.
`A method of restricting software operation within a
`license for use with a computer including an erasable,
`non-volatile memory area of a BIOS of the computer,
`and a volatile memory area; the method comprising the
`steps of: .................................................................................. 112
`selecting a program residing in the volatile memory, ............ 117
`using an agent to set up a verification structure in the
`erasable, non-volatile memory of the BIOS the
`verification structure accommodating data that includes
`at least one license record, ..................................................... 118
`verifying the program using at least the verification
`structure from the erasable non-volatile memory of the
`BIOS, and ............................................................................... 129
`acting on the program according to the verification. ............. 131
`5.
`Claim 2 ............................................................................................. 132
`1.
`A method according to claim 1, further comprising the
`steps of: establishing a license authentication bureau. .......... 132
`Claim 3 ............................................................................................. 133
`1.
`A method according to claim 2, wherein setting up a
`verification structure further comprising the steps of:
`establishing, between the computer and the bureau, a
`two-way data-communications linkage; ................................ 133
`transferring, from the computer to the bureau, a request-
`for-license including an identification of the computer
`and the license-record's contents from the selected
`program; ................................................................................. 135
`
`4.
`
`2.
`
`
`
`vi
`
`B.
`
`C.
`
`SAMSUNG EX. 1002 - 7/172
`
`

`

`3.
`
`4.
`
`5.
`
`forming an encrypted license-record at the bureau by
`encrypting parts of the request-for-license using part of
`the identification as an encryption key; ................................. 135
`transferring, from the bureau to the computer, the
`encrypted license-record; and ................................................ 137
`storing the encrypted license record in the erasable non-
`volatile memory area of the BIOS. ........................................ 137
`Claim 6 ............................................................................................. 139
`1.
`A method according to claim 1 wherein selecting a
`program includes the steps of: establishing a licensed-
`software-program in the volatile memory of the computer
`wherein said licensed-software-program includes
`contents used to form the license-record. .............................. 139
`Claim 7 ............................................................................................. 143
`1.
`A method according to claim 6 wherein using an agent to
`set up the verification structure includes the steps of:
`establishing or certifying the existence of a pseudo-
`unique key in a first non-volatile memory area of the
`computer; and ......................................................................... 143
`establishing at least one license-record location in the
`first nonvolatile memory area or in the erasable, non-
`volatile memory area of the BIOS. ........................................ 143
`Claim 8 ............................................................................................. 144
`1.
`A method according to claim 6 wherein establishing a
`license-record includes the steps of: forming a license-
`record by encrypting of the contents used to form a
`license-record with other predetermined data contents,
`using the key; and .................................................................. 144
`establishing the encrypted license-record in one of the at
`least one established license-record locations. ...................... 146
`Claim 9 ............................................................................................. 146
`
`
`
`vii
`
`D.
`
`E.
`
`F.
`
`G.
`
`2.
`
`2.
`
`SAMSUNG EX. 1002 - 8/172
`
`

`

`
`
`1.
`
`2.
`
`A method according to claim 7 wherein verifying the
`program includes the steps of: encrypting the licensed-
`software-program’s license-record contents from the
`volatile memory area or decrypting the license-record in
`the erasable, non-volatile memory area of the BIOS,
`using the pseudo-unique key; and .......................................... 146
`comparing the encrypted licenses-software-program’s
`license-record contents with the encrypted license-record
`in the erasable, non-volatile memory area of the BIOS, or
`comparing the license-software-program’s license-record
`contents with the decrypted license-record in erasable
`non-volatile memory area of the BIOS. ................................. 147
`Claim 10 ........................................................................................... 147
`1.
`A method according to claim 9 wherein acting on the
`program includes the step: restricting the program's
`operation with predetermined limitations if the
`comparing yields non-unity or insufficiency. ........................ 148
`Claim 11 ........................................................................................... 148
`1.
`A method according to claim 1 wherein the volatile
`memory is a RAM. ................................................................. 148
`Claim 12 ........................................................................................... 149
`1.
`The method of claim 1, wherein a pseudo-unique key is
`stored in the non-volatile memory of the BIOS. .................... 149
`Claim 13 ........................................................................................... 151
`1.
`The method of claim 1, wherein a unique key is stored in
`a first non-volatile memory area of the computer. ................ 151
`Claim 14 ........................................................................................... 151
`1.
`The method according claim 13, wherein the step of
`using the agent to set up the verification record, including
`the license record, includes encrypting a license record
`data in the program using at least the unique key. ................. 151
`
`H.
`
`I.
`
`J.
`
`K.
`
`L.
`
`viii
`
`SAMSUNG EX. 1002 - 9/172
`
`

`

`
`
`2.
`
`3.
`
`M. Claim 15 ........................................................................................... 152
`1.
`The method according to claim 14, wherein the
`verification comprises: extracting the license record from
`the software program; ............................................................ 152
`encrypting the license record using the unique key stored
`in the first non-volatile memory area of the computer to
`form second encrypted license information; and ................... 154
`comparing the encrypted license information stored in the
`erasable, non-volatile memory area of the BIOS of the
`computer with the second encrypted license information. .... 155
`Claim 17 ........................................................................................... 156
`1.
`The method according to claim 13, wherein the step of
`verifying the program includes encrypting the license
`record that is accommodated in the program using at least
`the unique key. ....................................................................... 156
`O. Motivation to Combine Hasebe and Shipman ................................. 156
`XIII. DECLARATION IN LIEU OF OATH ...................................................... 162
`
`N.
`
`
`
`ix
`
`SAMSUNG EX. 1002 - 10/172
`
`

`

`Ex-1001
`Ex-1004
`Ex-1005
`Ex-1006
`
`Ex-1007
`Ex-1008
`Ex-1010
`
`Ex-1011
`
`EXHIBITS CONSIDERED
`
`U.S. Patent No. 6,411,941
`Prosecution History of U.S. Patent No. 6,411,941
`U.S. Patent No. 6,153,835 (“Schwartz”)
`Ph.D. Thesis of Bennett Yee, “Using Secure Coprocessors”,
`Carnegie-Mellon University, CMU-CS-94-149 (“Yee”)
`U.S. Patent No. 5,935,243 (“Hasebe”)
`U.S. Patent No. 5,852,736 (“Shipman”)
`Israel Application No. 124,571, filed May 21, 1998 (“the IL’571
`application”)
`“Final Claim Constructions of the Court”, Claim Construction
`Order dated June 2, 2020 in Ancora Technologies, Inc. v.
`Samsung Electronics Co., Ltd. and Samsung Electronics America,
`Inc., Case No. 1:20-cv-00034-ADA (W.D. Tex.)
`Desktop Management BIOS Specification Version 2.0, March 6,
`1996 (“DMI Spec.”)
`Microsoft Computer Dictionary, 3rd edition (1997) (“Microsoft”)
`Silberschatz, Operating System Concepts, 5th edition (1997)
`(“Silberschatz”)
`Prosecution History for Ex Parte Reexamination of U.S. Patent
`No. 6,411,941, filed May 28, 2009, Control No. 90/010,560
`Scheduling Order, dated January 2, 2020, in Ancora
`Technologies, Inc. v. Samsung Electronics Co., Ltd. and Samsung
`Electronics America, Inc., Case No. 6:19-cv-00384 (W.D. Tex.)
`U.S. Patent No. 5,892,900 (“Ginter”)
`U.S. Patent No. 5,748,804 (“Isikoff”)
`B. Schneier, Applied Cryptography, Second Edition (1996)
`(“Schneier”)
`Ex-1025 W.R. Cheswick et al., Firewalls and Internet Security (1994)
`(“Cheswick”)
`Intel-28F001BX-B-datasheet (“Intel”)
`U.S. Patent No. 6,009,524 (“Olarig”)
`U.S. Patent No. 5,802,592 (“Chess”)
`U.S. Patent No. 6,138,236 (“Mirov”)
`U.S. Patent No. 5,684,951 (“Goldman”)
`U.S. Patent No. 6,189,146 (“Misra”)
`U.S. Patent No. 5,479,639 (“Ewertz”)
`U.S. Patent No. 6,009,177 (“Sudia”)
`1
`
`
`Ex-1026
`Ex-1027
`Ex-1028
`Ex-1029
`Ex-1033
`Ex-1034
`Ex-1035
`Ex-1037
`
`Ex-1012
`
`Ex-1013
`Ex-1014
`
`Ex-1018
`
`Ex-1019
`
`Ex-1020
`Ex-1021
`Ex-1024
`
`SAMSUNG EX. 1002 - 11/172
`
`

`

`
`
`I, Erez Zadok, Ph.D., hereby declare under penalty of perjury:
`BACKGROUND AND QUALIFICATIONS
`I.
`I have been retained by Petitioners Samsung Electronics Co., Ltd. and
`1.
`
`Samsung Electronics America, Inc. (“Samsung”) to provide my opinions regarding
`
`claims 1-2, 6-14 and 16 of U.S. Patent No. 6,411,941 (“the ’941 patent”).
`
`2.
`
`I am a Professor in the Computer Science Department at Stony Brook
`
`University (part of the State University of New York (“SUNY”) system). I direct
`
`the File-systems and Storage Lab (FSL) at Stony Brook’s Computer Science
`
`Department. My research interests include file systems and storage systems,
`
`operating systems, information technology and system administration, security and
`
`information assurance, networking and distributed systems, energy efficiency,
`
`performance and benchmarking, compilers, applied machine learning, and software
`
`engineering.
`
`3.
`
`I studied at a professional high school in Israel, focusing on electrical
`
`engineering (“EE”), and graduated in 1982. I spent one more year at the high
`
`school’s college division, receiving a special Certified Technician’s degree in EE.
`
`During that time, I used and programmed PROM, EPROM, and EEPROM devices.
`
`I then went on to serve in the Israeli Defense Forces for three years (1983–1986). I
`
`received my Bachelor of Science degree in computer science (“CS”) in 1991, my
`
`2
`
`SAMSUNG EX. 1002 - 12/172
`
`

`

`
`
`Master’s degree in CS in 1994, and my Ph.D. in CS in 2001—all from Columbia
`
`University in New York.
`
`4. When I began my undergraduate studies at Columbia University, I
`
`also started working as a student assistant in the various campus-wide computer
`
`labs, eventually becoming an assistant to the head labs manager, who was
`
`managing all public computer labs on campus. During that time, I also became
`
`more involved with research within the CS Department at Columbia University,
`
`conducting research on operating systems, file and storage systems, security, and
`
`other topics. I also assisted the CS department’s computer administrators in
`
`managing the department’s computers, which included storage, IT, networking,
`
`and cyber-security related duties.
`
`5.
`
`During the late 1980’s, I became exposed to and aware of information
`
`assurance topics. As the then fledgling Internet was growing in popularity, so were
`
`security problems and cyber-attacks of various sorts. For example, I was an
`
`undergraduate student working on computer programming assignments when the
`
`infamous “Morris Worm” hit the Internet in November of 1988.
`
`6.
`
`In 1991, I joined Columbia University’s CS department as a full-time
`
`systems administrator, studying towards my MS degree part-time. My MS thesis
`
`topic related to file system reliability, fault tolerance, replication, and failover in
`
`mobile networked systems. My main duties as a systems administrator involved
`
`3
`
`SAMSUNG EX. 1002 - 13/172
`
`

`

`
`
`installing, configuring, and managing many networked servers, proxies, and
`
`desktops running several operating systems, as well as network devices setup; this
`
`included many hardware upgrades, device upgrades, and BIOS firmware/chipset
`
`updates/upgrades. My duties also included ensuring reliable, secure, authenticated
`
`access to networked systems and licensed software, as well as software updates,
`
`security, and bug fixes. Examples of servers and their protocols included email
`
`(SMTP), file transfer (FTP), domain names (DNS), network file systems (NFS),
`
`network news systems (NNTP), and Web (HTTP).
`
`7.
`
`In 1994, I left my systems administrator position to pursue my
`
`doctoral studies at Columbia University. My Ph.D. thesis topic was on versatile
`
`file system development, with examples in the fields of security and encryption,
`
`efficiency, reliability, and failover. I continued to work part-time as a systems
`
`administrator at the CS department, and eventually I was asked to serve as
`
`manager to the entire information technology (“IT”) staff. From 1991 to 2001, I
`
`was a member of the faculty-level Facilities Committee that oversaw all IT
`
`operations at the CS department. During this entire time, topics of information
`
`assurance and software protection became more prominent and time-consuming in
`
`the lives of system administrators worldwide, and my work at Columbia was no
`
`different. For example, configuring/maintaining firewalls and proxies and
`
`applying security patches, and [re]licensing software, became more important and
`
`4
`
`SAMSUNG EX. 1002 - 14/172
`
`

`

`
`
`a dominant part of everyday IT duties, as well as defending against a growing list
`
`of copyright violations and malicious software threats (e.g., viruses, worms,
`
`Trojans, spyware, and more).
`
`8.
`
`As part of my Ph.D. studies at Columbia, I collaborated on projects to
`
`develop advanced AI-like techniques to detect previously unknown viruses (a.k.a.
`
`“zero-day malware”), using data mining and rule-based detection. This work led
`
`to several highly cited papers (over 1,100 citations for one of the papers alone),
`
`and two patents. I also became a Teaching Assistant (TA) for a first-ever
`
`Computer Security course given at Columbia University’s CS department with Dr.
`
`Matt Blaze as instructor.
`
`9.
`
`From 1990 to 1998, I consulted for SOS Corporation and HydraWEB
`
`Technologies, as a systems administrator and programmer, managing data storage
`
`use and backup/restore duties, as well as information assurance and cyber-security
`
`(e.g., malware protection, software licensing). From 1994 to 2000, I led projects at
`
`HydraWEB Technologies, and then became the Director of Software
`
`Development—overseeing the development of several products and appliances
`
`such as stateful firewalls and HTTP load-balancers. I helped design and
`
`implement HydraWEB’s licensing method which used an encrypted, hashed
`
`content including information unique to the licensed software (e.g., serial numbers,
`
`5
`
`SAMSUNG EX. 1002 - 15/172
`
`

`

`
`
`MAC addresses). Since 2009, I have consulted for Packet General Networks, a
`
`startup specializing in secure storage and applications’ data security in the cloud.
`
`10.
`
`In 2001, I joined the faculty of Stony Brook University, a position I
`
`have held since. In 2002, I joined the Operations Committee, which oversees the
`
`IT operations of the CS department at Stony Brook University. From 2006 to
`
`2010, I was the Director of IT Operations of the CS department; my day-to-day
`
`duties included setting policies regarding computing, hiring and training new staff,
`
`assisting any staff with topics of my specialty, defining requirements for new
`
`software/hardware, and purchasing. From 2010 to 2015, I have served as the Co-
`
`Chair to the Operations Committee. From 2016 to 2019, I oversaw the IT
`
`Operations as the Chair of the Operations Committee. A significant component of
`
`these duties included defining and helping implement policies for access control,
`
`firewalling, software licensing, anti-malware, anti-denial-of-service, and intrusion
`
`prevention—so as to ensure the security of users and their data, while minimizing
`
`the inconvenience and performance impact to users. These duties include
`
`protecting users from external threats as well as protecting the outside world from
`
`inside threats (e.g., infected laptops that start to spam outsiders or steal and
`
`transmit sensitive information). Since late 2019, I’ve been a member of the
`
`department’s Executive Committee that also oversees all IT operations.
`
`6
`
`SAMSUNG EX. 1002 - 16/172
`
`

`

`
`
`11.
`
`In 2017, I became the department’s Graduate Academic Adviser,
`
`advising all Masters students (over 400 on average) and many other graduate
`
`students on an assortment of academic matters.
`
`12. Since 2001, I personally configured and managed my own research
`
`lab’s network. This includes setting up and configuring a bi-directional Linux
`
`based stateful packet firewall, Web proxies, SSL-based services (secure HTTP,
`
`email, etc.), and Denial-of-Service prevention techniques. I’ve personally
`
`installed, configured, licensed, changed, replaced parts, and upgraded components
`
`in numerous devices from handhelds to laptops to servers.
`
`13. Throughout the 1990’s and at least until 2004, I continued to
`
`personally use, install, configure, and train others on anti-malware software to
`
`protect users from viruses, Trojans, worms, spyware, and more. I’ve personally
`
`used software from Norton, Symantec, Trend Micro, McAfee, and others. I’ve
`
`used this software on Microsoft Windows, Linux systems, and on Apple Mac OS
`
`X systems.
`
`14. Since 1995, I have taught courses on operating systems, storage and
`
`file systems, advanced systems programming in Unix/C, systems administration,
`
`data structures, data/software security, and more. My courses often use storage,
`
`file systems, distributed systems, and system/network security as key teaching
`
`principles and practical examples for assignments and projects. I have taught these
`
`7
`
`SAMSUNG EX. 1002 - 17/172
`
`

`

`
`
`concepts and techniques to my students, both to my direct advisees as well as in
`
`my courses. For example, in my graduate Operating Systems course, I often cover
`
`Linux’s kernel mechanisms to protect users, applications, and data files. And in
`
`the System Administration undergraduate course, I covered many topics such as
`
`networking, firewalling, and cyber-security—including configuring and
`
`maintaining site security policies, DDoS handling, and the impact on anti-malware
`
`scanners on system performance.
`
`15. My research often investigates computer systems from many angles:
`
`security, efficiency, energy use, scalability, reliability, portability, survivability,
`
`usability, ease-of-use, versatility, flexibility, and more. My research gives special
`
`attention to balancing five often-conflicting aspects of computer systems:
`
`performance, reliability, energy use, security, and ease-of-use. Since joining Stony
`
`Brook University in 2001, my group in the File-systems and Storage Lab (FSL)
`
`has developed many file systems and operating system extensions; examples
`
`include a highly-secure cryptographic file system, a portable copy-on-write (COW)
`
`versioning file system, a tracing file system useful to detect intrusions, a replaying
`
`file system useful for forensics, a snapshotting and sandboxing file system, a
`
`namespace unification file system (that uses stackable, file-based COW), an anti-
`
`virus file system, an integrity-checking file system, a load balancing and
`
`replication/mirroring file system, network file system extensions for security,
`
`8
`
`SAMSUNG EX. 1002 - 18/172
`
`

`

`
`
`distributed secure cloud-based storage systems, a compiler to convert user-level C
`
`code to in-kernel efficient yet safe code, GCC plugins, stackable file system
`
`templates, and a Web-based backup system. I continue to maintain and release
`
`newer versions of some of these file systems and software.
`
`16.
`
`I have published over 120 refereed publications (in ACM, IEEE,
`
`USENIX, and more). To date, my publications have been cited more than 7,700
`
`times (as per Google Scholar as of June 12, 2020). My papers cover a wide range
`
`of related technologies such as file systems, storage systems, security, performance
`
`benchmarking and optimization, energy efficiency, system administration, and
`
`more. I also published a book titled “Linux NFS and Automounter
`
`Administration” (Sybex, 2001), covering systems administration topics related to
`
`network storage a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket