throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`TCT Mobile (US) Inc., Huizhou TCL Mobile Communication Co., Ltd., and
`
`Shenzhen TCL Creative Cloud Technology Co., Ltd.,
`
`Petitioners,
`
`v.
`
`Ancora Technologies, Inc.,
`
`Patent Owner.
`
`
`
`
`
`
`
`
`
`
`
`PTAB Case No. IPR2020-01034
`
`Patent No. 6,411,941 B1
`
`
`
`
`
`
`
`
`
`
`
`DECLARATION OF ANDREW WOLFE IN SUPPORT OF PETITION FOR
`INTER PARTES REVIEW OF U.S. PATENT NO. 6,411,941
`
`
`
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`
`
`I.
`
`TABLE OF CONTENTS
`
`INTRODUCTION .......................................................................................... 1
`
`A. Qualifications ....................................................................................... 2
`
`1.
`
`Education ................................................................................... 2
`
`2. Work Experience........................................................................ 2
`
`3.
`
`Curriculum Vitae........................................................................ 7
`
`B. Materials Reviewed .............................................................................. 7
`
`C.
`
`D.
`
`Level of Ordinary Skill in the Art ........................................................ 8
`
`Summary of Opinions .......................................................................... 9
`
`II. OVERVIEW OF THE TECHNOLOGY ...................................................... 10
`
`A.
`
`Priority Date of the Claims ................................................................. 10
`
`B. Overview of Relevant Technology When the ’941 Patent Was
`Filed .................................................................................................... 11
`
`1.
`
`2.
`
`Software Licenses .................................................................... 11
`
`Computer BIOS........................................................................ 13
`
`The ’941 Patent .................................................................................. 15
`
`Claim Construction............................................................................. 22
`
`C.
`
`D.
`
`III. OVERVIEW OF THE PRIOR ART ............................................................ 22
`
`A. Hellman .............................................................................................. 22
`
`B.
`
`C.
`
`Chou ................................................................................................... 33
`
`Schneck............................................................................................... 37
`
`IV. UNPATENTABILITY OF THE ’941 PATENT CLAIMS ......................... 44
`
`A.
`
`B.
`
`Standards for Invalidity ...................................................................... 44
`
`Claim 1 ............................................................................................... 45
`
`1.
`
`Preamble: “A method of restricting software operation
`within a license for use with a computer including an
`erasable, non-volatile memory area of a BIOS of the
`computer, and a volatile memory area; the method
`comprising the steps of:” ......................................................... 45
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`2.
`
`3.
`
`4.
`
`5.
`
`Element 1.a: “selecting a program residing in the volatile
`memory” ................................................................................... 55
`
`Element 1.b: “using an agent to set up a verification
`structure in the erasable, non-volatile memory of the
`BIOS, the verification structure accommodating data that
`includes at least one license record” ........................................ 60
`
`Element 1.c: “verifying the program using at least the
`verification structure from the erasable non-volatile
`memory of the BIOS, and” ...................................................... 68
`
`Element 1.d: “acting on the program according to the
`verification.” ............................................................................ 69
`
`C.
`
`Claim 2: “A method according to claim 1, further comprising
`the steps of: establishing a license authentication bureau.” .............. 70
`
`D.
`
`Claim 3 ............................................................................................... 71
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`Preamble: “A method according to claim 2, wherein
`setting up a verification structure further comprising the
`steps of:” .................................................................................. 71
`
`Element 3.a: “establishing, between the computer and
`the bureau, a two-way data-communications linkage;” ........... 71
`
`Element 3.b: “transferring, from the computer to the
`bureau, a request-for-license including an identification
`of the computer and the license-record’s contents from
`the selected program;” ............................................................. 72
`
`Element 3.c: “forming an encrypted license-record at the
`bureau by encrypting parts of the request-for-license
`using part of the identification as an encryption key;” ............ 76
`
`Element 3.d: “transferring, from the bureau to the
`computer, the encrypted license-record; and” ......................... 77
`
`Element 3.e: “storing the encrypted license record in the
`erasable non-volatile memory area of the BIOS.” ................... 78
`
`E.
`
`Claim 6: “A method according to claim 1 wherein selecting a
`program includes the steps of: establishing a licensed-software-
`program in the volatile memory of the computer wherein said
`licensed-software-program includes contents used to form the
`license-record.” ................................................................................... 79
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`F.
`
`Claim 7 ............................................................................................... 80
`
`1.
`
`2.
`
`3.
`
`Preamble: “A method according to claim 6 wherein
`using an agent to set up the verification structure includes
`the steps of:” ............................................................................. 80
`
`Element 7.a: “establishing or certifying the existence of
`a pseudo-unique key in a first non-volatile memory area
`of the computer; and” ............................................................... 80
`
`Element 7.b: “establishing at least one license-record
`location in the first nonvolatile memory area or in the
`erasable, non-volatile memory area of the BIOS.” .................. 82
`
`G.
`
`Claim 8 ............................................................................................... 83
`
`1.
`
`2.
`
`3.
`
`Preamble: “A method according to claim 6 wherein
`establishing a license-record includes the steps of:” ............... 83
`
`Element 8.a: “forming a license-record by encrypting of
`the contents used to form a license-record with other
`predetermined data contents, using the key; and” ................... 83
`
`Element 8.b: “establishing the encrypted license-record
`in one of the at least one established license-record
`locations.” ................................................................................ 84
`
`H.
`
`Claim 9 ............................................................................................... 85
`
`1.
`
`2.
`
`3.
`
`Preamble: “A method according to claim 7 wherein
`verifying the program includes the steps of:” .......................... 85
`
`Element 9.a: “encrypting the licensed-software-
`program's license-record contents from the volatile
`memory area or decrypting the license-record in the
`erasable, non-volatile memory area of the BIOS, using
`the pseudo-unique key; and” .................................................... 85
`
`Element 9.b: “comparing the encrypted licenses-
`software-program’s license-record contents with the
`encrypted license-record in the erasable, non-volatile
`memory area of the BIOS, or comparing the license-
`software-program's license-record contents with the
`decrypted license-record in erasable non-volatile memory
`area of the BIOS.” .................................................................... 86
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`I.
`
`J.
`
`K.
`
`L.
`
`Claim 10: “A method according to claim 9 wherein acting on
`the program includes the step: restricting the program's
`operation with predetermined limitations if the comparing
`yields non-unity or insufficiency.” ..................................................... 88
`
`Claim 11: “A method according to claim 1 wherein the volatile
`memory is a RAM.” ........................................................................... 89
`
`Claim 12: “The method of claim 1, wherein a pseudo-unique
`key is stored in the non-volatile memory of the BIOS.” .................... 89
`
`Claim 13: “The method of claim 1, wherein a unique key is
`stored in a first non-volatile memory area of the computer.” ............ 92
`
`M. Claim 14: “The method according claim 13, wherein the step
`of using the agent to set up the verification record, including the
`license record, includes encrypting a license record data in the
`program using at least the unique key.” ............................................. 93
`
`N.
`
`Claim 16: “The method according to claim 13, wherein the
`step of verifying the program includes a decrypting the license
`record data accommodated in the erasable second non-volatile
`memory area of the BIOS using at least the unique key.” ................. 94
`
`
`
`
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`LIST OF APPENDICES
`
`
`Appendix A
`
`Curriculum Vitae of Andrew Wolfe, Ph.D.
`
`Appendix B
`
`Documents Cited
`
`
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`I.
`
`INTRODUCTION
`
`1.
`
`I, Andrew Wolfe, have been retained by Petitioners TCT Mobile (US)
`
`Inc., Huizhou TCL Mobile Communication Co., Ltd., and Shenzhen TCL Creative
`
`Cloud Technology Co., Ltd (collectively, “Petitioners”) to investigate and opine on
`
`certain issues relating to United States Patent No. 6,411,941 (“the ’941 patent”) in
`
`their Petition for Inter Partes Review of that patent. The Petition requests that the
`
`Patent Trial and Appeal Board (“PTAB” or “Board”) review and cancel claims 1-3,
`
`6-14, and 16 of the ’941 patent.
`
`2.
`
`The opinions set forth in this report are based on my personal
`
`knowledge, my professional judgment, and my analysis of the materials and
`
`information referenced in this report and its exhibits.
`
`3.
`
`I am being compensated for consulting services including time spent
`
`testifying at any hearing that may be held. I am also reimbursed for reasonable and
`
`customary expenses associated with my work in this case. I receive no other forms
`
`of compensation related to this case. My compensation does not depend on the
`
`outcome of this inter partes review or the co-pending district court litigation, and I
`
`have no other financial interest in this inter partes review.
`
`4.
`
`I understand that the ’941 patent has been assigned to Ancora
`
`Technologies, Inc.
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`5.
`
`This declaration is based on the information currently available to me.
`
`To the extent that additional information becomes available, I reserve the right to
`
`continue my investigation and study, which may include a review of documents
`
`and information that may be produced, as well as testimony from depositions that
`
`have not yet been taken.
`
`A. Qualifications
`
`1.
`
`Education
`
`6.
`
`In 1985, I earned a B.S.E.E. degree in Electrical Engineering and
`
`Computer Science from The Johns Hopkins University. In 1987, I received an
`
`M.S. degree in Electrical and Computer Engineering from Carnegie Mellon
`
`University. In 1992, I received a Ph.D. in Computer Engineering from Carnegie
`
`Mellon University. My doctoral dissertation proposed a new approach for the
`
`architecture of a computer processor.
`
`2. Work Experience
`
`7.
`
`I have more than 35 years of experience as a computer architect,
`
`computer system designer, personal computer graphics designer, educator, and
`
`executive in the electronics industry.
`
`8.
`
`In 1983, I began designing touch sensors, microprocessor-based
`
`computer systems, and I/O (input/output) cards for personal computers as a senior
`
`design engineer for Touch Technology, Inc. During the course of my design
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`projects with Touch Technology, I designed I/O cards for PC-compatible computer
`
`systems, including the IBM PC-AT, to interface with interactive touch-based
`
`computer terminals that I designed for use in public information systems. I
`
`continued designing and developing related technology as a consultant to the
`
`Carroll Touch division of AMP, Inc., where in 1986 I designed one of the first
`
`custom touch-screen integrated circuits. I designed the touch/pen input system for
`
`the Linus WriteTop, which many believe to be the first commercial tablet
`
`computer.
`
`9.
`
`From 1986 through 1987, I designed and built a high-performance
`
`computer system as a student at Carnegie Mellon University. From 1986 through
`
`early 1988, I also developed the curriculum and supervised the teaching laboratory
`
`for processor design courses.
`
`10.
`
`In the latter part of 1989, I worked as a senior design engineer for
`
`ESL-TRW Advanced Technology Division. While at ESL-TRW, I designed and
`
`built a bus interface and memory controller for a workstation-based computer
`
`system, and also worked on the design of a multiprocessor system.
`
`11. At the end of 1989, I (along with some partners) reacquired the rights
`
`to the technology I had developed at Touch Technology and at AMP and founded
`
`The Graphics Technology Company. Over the next seven years, as an officer and
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`a consultant for The Graphics Technology Company, I managed the company's
`
`engineering development activities and personally developed dozens of touch
`
`screen sensors, controllers, and interactive touch-based computer systems.
`
`12.
`
`I have consulted, formally and informally, for a number of fabless
`
`semiconductor companies. In particular, I have served on the technical advisory
`
`boards for two processor design companies: BOPS, Inc., where I chaired the board;
`
`and Siroyan Ltd., where I served in a similar role for three networking chip
`
`companies—Intellon, Inc., Comsilica, Inc., and Entridia, Inc.—and one 3D game
`
`accelerator company, Ageia, Inc.
`
`13.
`
`I have also served as a technology advisor to Motorola and to several
`
`venture capital funds in the U.S. and Europe. Currently, I am a director of Turtle
`
`Beach Corporation, providing guidance in its development of premium audio
`
`peripheral devices for a variety of commercial electronic products.
`
`14. From 1991 through 1997, I served on the Faculty of Princeton
`
`University as an Assistant Professor of Electrical Engineering. At Princeton, I
`
`taught undergraduate and graduate-level courses in Computer Architecture,
`
`Advanced Computer Architecture, Display Technology, and Microprocessor
`
`Systems, and conducted sponsored research in the area of computer systems and
`
`related topics. I was also a principal investigator for DOD research in video
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`technology and a principal investigator for the New Jersey Center for Multimedia
`
`Research. From 1999 through 2002, while a Consulting Professor, I taught a
`
`Computer Architecture course to both undergraduate and graduate students at
`
`Stanford University. At Princeton, I received several teaching awards, both from
`
`students and from the School of Engineering. I have also taught advanced
`
`microprocessor architecture to industry professionals in seminars sponsored by the
`
`Institute of Electrical and Electronics Engineers (“IEEE”) and the Association for
`
`Computing Machinery (“ACM”). I am currently a lecturer at Santa Clara
`
`University teaching courses on Microprocessor Systems, Real-Time Computing,
`
`and Mechatronics.
`
`15. From 1997 through 2002, I held a variety of executive positions at a
`
`publicly-held fabless semiconductor company originally called S3, Inc. and later
`
`called SonicBlue Inc. I held the positions of Chief Technology Officer, Vice
`
`President of Systems Integration Products, Senior Vice President of Business
`
`Development, and Director of Technology, among others. At the time I joined S3,
`
`the company supplied graphics accelerators for more than 50% of the PCs sold in
`
`the United States. At S3 I supervised the design of several PC graphics
`
`accelerators. During my time at SonicBlue we launched more than 30 new
`
`consumer electronics products including devices to support copy-protected video
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`and many of the first commercial products to support copy-protected internet audio
`
`content.
`
`16.
`
`I have published more than fifty peer-reviewed papers in computer
`
`architecture and computer systems and IC design. I also have chaired IEEE and
`
`ACM conferences in microarchitecture and integrated circuit design and served as
`
`an associate editor for IEEE and ACM journals. I served on the IEEE Computer
`
`Society Awards committee. I am a Senior Member of IEEE and a Member of
`
`ACM. I am a named inventor on at least fifty-six U.S. patents and thirty-seven
`
`foreign patents, which are listed in my curriculum vitae.
`
`17.
`
`In 2002, I was the invited keynote speaker at the ACM/IEEE
`
`International Symposium on Microarchitecture and at the International Conference
`
`on Multimedia. From 1990 through 2005, I have also been an invited speaker on
`
`various aspects of technology and the PC industry at numerous industry events
`
`including the Intel Developer’s Forum, Microsoft Windows Hardware Engineering
`
`Conference, Microprocessor Forum, Embedded Systems Conference, Comdex, and
`
`Consumer Electronics Show, as well as at the Harvard Business School and the
`
`University of Illinois Law School. I have been interviewed on subjects related to
`
`computer graphics and video technology and the electronics industry by
`
`publications such as the Wall Street Journal, New York Times, Los Angeles
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`Times, Time, Newsweek, Forbes, and Fortune as well as on CNN, NPR, and the
`
`BBC. I have also spoken at dozens of universities including MIT, Stanford,
`
`University of Texas, Carnegie Mellon University, UCLA, University of Michigan,
`
`Rice University, and Duke University.
`
`3.
`
`Curriculum Vitae
`
`18. A copy of my curriculum vitae is attached as Appendix A to this
`
`declaration.
`
`B. Materials Reviewed
`
`19. My opinions expressed in this declaration are based on documents and
`
`materials identified in this declaration, including the ’941 patent, the prior art
`
`references and background materials discussed in this declaration, and the other
`
`references specifically identified in this declaration. I have considered these
`
`materials in their entirety, even if only portions are discussed here.
`
`20.
`
`I have also relied on my own experience and expertise in digital
`
`security, software licensing, and computer architecture.
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`C. Level of Ordinary Skill in the Art
`
`21.
`
`I am not an attorney and offer no legal opinions. I have been
`
`informed about certain aspects of the law for purposes of my analyses and
`
`opinions.1
`
`22.
`
`I understand that in analyzing questions of invalidity, the perspective
`
`of a person having ordinary skill in the art (“POSA”) is often implicated, and the
`
`Board may need assistance in determining that level of skill.
`
`23.
`
`I understand that the claims and written description of a patent must
`
`be understood from the perspective of a POSA. I have been informed that the
`
`following factors may affect the level of skill of a POSA: (1) the educational level
`
`of the inventor; (2) the type of problems encountered in the art; (3) the prior-art
`
`solutions to those problems; (4) the rapidity with which innovations are made; (5)
`
`the sophistication of the technology; and (6) the educational level of active workers
`
`in the field. A person of ordinary skill in the art is also a person of ordinary
`
`creativity in the art.
`
`1 I understand that the patent laws were amended by the America Invents
`Act (AIA), but that the earlier statutory requirements still apply to pre-AIA patents.
`I have been informed that the ’941 Patent is a pre-AIA patent, so the pre-AIA
`requirements control. Unless otherwise stated, my understanding of the law about
`patent invalidity as set forth in this declaration relates to the pre-AIA requirements.
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`24. Based on my experience in digital security, software licensing, and
`
`computer architecture, as well as my reading of the ’941 Patent, it is my opinion
`
`that a person of ordinary skill with respect to the subject matter of the ’941 Patent
`
`at the time of the alleged invention would have had at least a B.S. degree in
`
`computer science, computer engineering, or electrical engineering (or equivalent
`
`experience) and would have had at least two years of experience with computer
`
`science and computer engineering, including information encryption, computer
`
`architecture, and firmware programming. This definition is approximate, and
`
`additional educational experience in computer science and computer engineering
`
`could make up for less work experience and vice versa.
`
`25.
`
`I am a person of at least ordinary skill in the art and was so on the date
`
`to which the ’941 Patent claims priority (May 21, 1998). As shown by my
`
`qualifications and my curriculum vitae attached as Appendix A, I am aware of the
`
`knowledge and skill possessed by a person of ordinary skill in the art at the time of
`
`the alleged invention claimed by the ’941 Patent. In performing my analysis, I
`
`have applied the standard set forth above.
`
`D.
`
`Summary of Opinions
`
`26.
`
`I have reviewed and analyzed the ’941 Patent (Ex. B-1, same as Ex.
`
`1001 in the Petition) as well as prior art references Hellman (U.S. Patent 4,658,093)
`
`(Ex. B-3, same as Ex. 1004 in the Petition), Chou (U.S. Patent 5,892,906) (Ex. B-4,
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`same as Ex. 1005 in Petition), and Schneck (U.S. Patent 5,933,498) (Ex. B-5, same
`
`as Ex. 1006 in Petition).
`
`27. Based on my review and analysis, it is my opinion that claims 1-2, 11,
`
`and 13 of the ’941 Patent are invalid as obvious based on Hellman in view of Chou.
`
`Based on my review and analysis, it is also my opinion that claims 1-3, 6-14, and
`
`16 of the ’941 Patent are invalid as obvious based on Hellman in view of Chou and
`
`Schneck.
`
`II. OVERVIEW OF THE TECHNOLOGY
`
`A.
`
`Priority Date of the Claims
`
`28.
`
`I have been informed that a U.S. patent application may claim the
`
`benefit of the filing date of an earlier patent application if the earlier patent
`
`application disclosed each limitation of the invention claimed in the later-filed U.S.
`
`patent application. I have also been informed that priority is determined on a
`
`claim-by-claim basis so that certain claims of a patent may be entitled to the
`
`priority date of an earlier-filed patent application even if other claims of the same
`
`patent are not entitled to that priority date.
`
`29.
`
`I have also been informed that for patent applications filed before
`
`March 16, 2013, a patented claim is invalid if the claimed invention was patented
`
`or described in a printed publication in any country more than one year before the
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`effective filing date of the claim, regardless of when the applicant conceived of the
`
`claimed invention.
`
`30.
`
`I understand that the ’941 Patent claims a priority date of May 21,
`
`1998.
`
`B. Overview of Relevant Technology When the ’941 Patent Was
`Filed
`
`1.
`
`Software Licenses
`
`31. By the time of the ’941 Patent’s priority date in 1998, the field of
`
`software licensing was well-developed. Since at least the 1980s, practitioners in
`
`the field had widely recognized the new risks to software piracy introduced by the
`
`transformations to digital media.
`
`32. Many entities recognized that one such risk was “copy protection” or
`
`“secondary distribution.” Secondary distribution contrasted with, for example,
`
`preventing an unauthorized user from obtaining access to a software program in
`
`the first place. Secondary distribution dealt with the more challenging problem of
`
`allowing a user to have an authorized access to the software program but
`
`preventing the user from then making unauthorized copies and distributing those
`
`copies. This problem was more challenging because it required some level of trust
`
`in the user but balanced against the possibility that the user may still have
`
`malicious motivations.
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`33. For secondary distribution, as with other forms of piracy prevention,
`
`encryption was considered a key tool to providing protection. Encryption was a
`
`leading solution for various reasons. Encryption was easy to implement but hard
`
`to break, making it an efficient solution. Encryption also allowed user-specific and
`
`device-specific solutions, given that different devices could be given different
`
`encryption/decryption keys.
`
`34. European patent Application EP 0766165A2, Ex. B-6 (“’165
`
`Application”), which published in 1997 from an application filed in 1996,
`
`disclosed a license notification system. The ’164 Application disclosed sending
`
`encoded license information to a user terminal, with the license information
`
`encoded with a key specific to the user terminal. The user terminal checks the
`
`license information when the user operates a software program. If the license
`
`information is valid, then the licensee’s name is displayed.
`
`35. U.S. Patent 5,724,425, Ex. B-6 (“’425 Patent”), which issued in 1998
`
`from an application filed in 1994, disclosed a “software passport.” The software
`
`passport was formed by encrypting a message digest using an application writer’s
`
`private key, a license, and the software program binary code. A user’s computer
`
`uses the encrypted message digest and the license to determine if the software
`
`program is secure to operate. The ’425 Patent disclosed this technique to deal with
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`the risk of users purchasing pirated software when they thought they were
`
`purchasing legitimate software.
`
`2.
`
`Computer BIOS
`
`36. By the time of the ’941 Patent’s priority date in 1998, the field of
`
`computer BIOS was well-developed. BIOS began to be used at least as far back as
`
`the 1970s, for example in 8-bit computers that ran the CP-M operating system.
`
`The usage of BIOS increased rapidly, and by 1998 BIOS was present in essentially
`
`all general-purpose computers, e.g., personal computers and servers. In these
`
`situations, BIOS provided the basic software routines that were run when the
`
`computer was first powered on. One of the primary responsibilities of BIOS was
`
`to load the operating system code and allow it to start executing, often called
`
`“booting” the computer.
`
`37. For many years, including through to 1998, it was typical to provide
`
`BIOS in a separate memory module, apart from the main memory. These came
`
`about for numerous reasons. As one reason, the BIOS programs needed to be
`
`secure and away from other program code. Namely, accidentally overwriting or
`
`destroying the BIOS program could permanently disable the computer. So storing
`
`it on a separate memory module was considered a good approach. As another
`
`reason, early versions of BIOS were expected to remain static through the life of
`
`the device. As such, it was common to provide BIOS programs in a true read only
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`memory (ROM). By “true” ROM, I mean a memory chip that could not have its
`
`contents changed, whether electronically or otherwise. Using true ROM also
`
`provided the benefit of not allowing BIOS to be accidentally modified, which was
`
`beneficial as described above. Additionally, it was advantageous to provide the
`
`BIOS in a non-volatile memory so that it was present when the computer was
`
`powered on.
`
`38. By the 1990s, it became more common to store BIOS programs in
`
`alterable memory, i.e., memory that could be rewritten. This became more
`
`common at least in part because computer manufacturers came to realize that there
`
`was a benefit to being able to modify the BIOS programs “in the field,” as opposed
`
`to have those programs completely static for the life of the devices.
`
`39. Among these forms of rewritable memory, electrically-erasable
`
`programmable read-only memory (EEPROM) was a popular
`
`technology.
`
`EEPROM was considered beneficial for a number of reasons. For one reason,
`
`EEPROM could be rewritten using simple memory access routines that could be
`
`programmatically controlled. This provided the sort of flexibility that computer
`
`manufacturers were seeking. For another reason, EEPROM could be implemented
`
`as “flash memory,” which was both reliable (not prone to unexpected loss of data)
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`and cost effective (relatively less expensive than some other rewritable ROM
`
`technologies).
`
`40. U.S. Patent 6,138,236, Ex. B-7 (“’236 Patent”), which issued in 2000
`
`from an application filed in 1996, disclosed the use of both “boot ROM (read only
`
`memory)” and “boot PROM (programmable read only memory).” The ’236 Patent
`
`explained that the boot PROM could be implemented as flash PROM, “often
`
`referred to as flash memory.”
`
`41. U.S. Patent 5,802,592, Ex. B-8 (“’592 Patent”), which issued in 1998
`
`from an application filed in 1996, disclosed a technique for verifying the integrity
`
`BIOS programs stored in “alterable read only memory (such as FLASH ROM).”
`
`42. U.S. Patent 5,835,594, Ex. B-9 (“’594 Patent”), which issued in 1998
`
`from an application filed 1996, disclosed a system for protecting the content, such
`
`as BIOS updates, in “FLASH memory or erasable programmable read-only-
`
`memory (EPROM).”
`
`C. The ’941 Patent
`
`43. The ’941 Patent describes a “method of restricting software operation
`
`within a license limitation.” ’941 Patent, Abstract. The ’941 Patent explains that
`
`there were many known techniques for restricting the operation of an unauthorized
`
`software program. ’941 Patent, 1:12-17. The ’941 Patent indicates that these
`
`techniques were “primarily motivated by the grand proliferation of illegally copied
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`software, which is engulfing the marketplace,” and commented on the large
`
`financial impact of this illegal copying. ’941 Patent, 1:12-17.
`
`44. The ’941 Patent indicates that one prior art technique involved
`
`“writing a license signature onto the computer’s volatile memory (e.g., hard
`
`disk).” ’941 Patent, 1:19-26. The ’941 Patent explained that this technique was
`
`“very vulnerable to attack at the hands of skilled system’s programmers (e.g.
`
`‘hackers’).” ’941 Patent, 1:19-26.
`
`45. The ’941 Patent indicates that hardware-based techniques, such as the
`
`use of a “dongle” were “expensive, inconvenient, and not particularly suitable for
`
`software that may be sold by downloading.” ’941 Patent, 1:27-32.
`
`46. Against that backdrop, the ’941 Patent discloses its technique with
`
`respect to a computer configuration shown in Figure 1 and a process shown in
`
`Figure 2.
`
`47. The computer configuration of Figure 1 (shown below) contains
`
`numerous storage devices. The storage devices include the first non-volatile
`
`memory area 4, the second non-volatile memory area 5, and the volatile memory
`
`area 6. ’941 Patent, Abstract, Figure 1, 5:9-16. The first non-volatile memory area
`
`4 stores a key 8. ’941 Patent, Figure 1, 5:19-24. The second non-volatile memory
`
`area 5 has a license record area 9 with license records 10, 11, 12. ’941 Patent,
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`Figure 1, 5:25-33. The volatile memory area 6 include a license program 16,
`
`which has license record field 13, 14, and 15. ’941 Patent, Figure 1, 5:25-33. The
`
`computer can communicate with a license bureau 7. ’941 Patent, Figure 1, 5:17-18.
`
`
`
`’941 Patent, Figure 1.
`
`48. The ’941 Patent provides an example implementation of the invention
`
`in a “conventional computer having a conventional BIOS module.” ’941 Patent,
`
`1:43-52. The computer can have a “ROM section” with a key embedded therein at
`
`TCT Mobile - Anacora Exh. 1003
`
`

`

`the time of manufacture. ’941 Patent, 1:43-52. “The key constitutes, effectively, a
`
`unique identification code for the host computer.” ’941 Patent, 1:43-52. The key
`
`cannot be removed or modified. ’941 Patent, 1:43-52.
`
`49. An “application program that is to be licensed to run on the s

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket