throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`TCT Mobile (US) Inc., Huizhou TCL Mobile Communication Co., Ltd., and
`Shenzhen TCL Creative Cloud Technology Co., Ltd.,
`
`Petitioners,
`
`v.
`
`Ancora Technologies, Inc.,
`Patent Owner.
`
`
`
`
`
`
`
`
`PTAB Case No. IPR2020-01609
`Patent No. 6,411,941 B1
`
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 6,411,941
`
`
`
`134092-0004.8901/149500475.1
`
`

`

`TABLE OF CONTENTS
`
`
`Page
`
`
`INTRODUCTION .......................................................................................... 1
`I.
`II. MANDATORY NOTICES ............................................................................ 3
`A.
`Real party-in-interest ............................................................................ 3
`B.
`Related matters ..................................................................................... 3
`C.
`Counsel and Service Information ......................................................... 4
`III. REQUIREMENTS FOR INTER PARTES REVIEW ................................... 4
`A. Ground for Standing ............................................................................. 4
`B. Overview of Challenge and Relief Requested ..................................... 5
`1.
`Identification of Prior Art .......................................................... 5
`2.
`Grounds for Challenge ............................................................... 5
`3.
`Statutory Grounds of Challenge and Legal Principles .............. 6
`The Board Should Exercise Its Discretion to Institute Review ........... 6
`C.
`IV. DESCRIPTION OF TECHNOLOGY ............................................................ 9
`A. Overview of the Technology ................................................................ 9
`B. Overview of the ’941 Patent ............................................................... 11
`1.
`The Specification and Alleged Invention ................................ 11
`2.
`Prosecution History and Later Proceedings ............................. 16
`3.
`The Challenged Claims ............................................................ 20
`CLAIM CONSTRUCTION ......................................................................... 20
`V.
`VI. LEVEL OF ORDINARY SKILL IN THE ART .......................................... 21
`VII. SPECIFIC GROUNDS FOR PETITION ..................................................... 21
`A. Ground I: Claims 1–2, 11, and 13 were obvious over the
`combined teachings of Hellman and Chou ........................................ 21
`1.
`Overview of Hellman ............................................................... 21
`2.
`Overview of Chou .................................................................... 27
`3. Motivations to Combine Hellman and Chou ........................... 28
`
`5
`
`10
`
`15
`
`20
`
`25
`
`
`
`
`
`-i-
`
`
`
`

`

`TABLE OF CONTENTS
`(continued)
`
`Page
`
`4.
`
`5.
`
`6.
`
`Claim 1 preamble: “A method of restricting software
`operation within a license for use with a computer
`including an erasable, non-volatile memory area of a
`BIOS of the computer, and a volatile memory area; the
`method comprising the steps of:” ............................................ 33
`Claim 1.a: “selecting a program residing in the volatile
`memory,” .................................................................................. 35
`Claim 1.b: “using an agent to set up a verification
`structure in the erasable, non-volatile memory of the
`BIOS, the verification structure accommodating data that
`includes at least one license record,” ....................................... 37
`Claim 1.c: “verifying the program using at least the
`verification structure from the erasable non-volatile
`memory of the BIOS, and” ...................................................... 38
`Claim 1.d: “acting on the program according to the
`verification.” ............................................................................ 39
`Claim 2: “A method according to claim 1, further
`comprising the steps of: establishing a license
`authentication bureau.” ............................................................ 40
`10. Claim 11: “A method according to claim 1 wherein the
`volatile memory is a RAM.” .................................................... 40
`11. Claim 13: “The method of claim 1, wherein a unique key
`is stored in a first non-volatile memory area of the
`computer.” ................................................................................ 40
`B. Ground II: Claims 1–3, 6–14, and 16 were obvious over the
`combined teachings of Hellman, Chou, and Schneck ........................ 41
`1.
`Overview of Schneck ............................................................... 41
`2. Motivations to Combine Hellman, Chou, and Schneck .......... 42
`
`7.
`
`8.
`
`9.
`
`-ii-
`
`
`
`5
`
`10
`
`15
`
`20
`
`25
`
`
`
`
`
`
`
`

`

`TABLE OF CONTENTS
`(continued)
`
`Page
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`Claim 1. preamble: “A method of restricting software
`operation within a license for use with a computer
`including an erasable, non-volatile memory area of a
`BIOS of the computer, and a volatile memory area; the
`method comprising the steps of:” ............................................ 46
`Claim 1.a: “selecting a program residing in the volatile
`memory,” .................................................................................. 46
`Claim 1.b: “using an agent to set up a verification
`structure in the erasable, non-volatile memory of the
`BIOS, the verification structure accommodating data that
`includes at least one license record,” ....................................... 47
`Claim 1.c: “verifying the program using at least the
`verification structure from the erasable non-volatile
`memory of the BIOS, and” ...................................................... 49
`Claim 1.d: “acting on the program according to the
`verification.” ............................................................................ 50
`Claim 2: “A method according to claim 1, further
`comprising the steps of: establishing a license
`authentication bureau.” ............................................................ 50
`Claim 3 preamble: “A method according to claim 2,
`wherein setting up a verification structure further
`comprising the steps of:” ......................................................... 50
`10. Claim 3.a: “establishing, between the computer and the
`bureau, a two-way data-communications linkage;” ................. 51
`11. Claim 3.b: “transferring, from the computer to the
`bureau, a request-for-license including an identification
`of the computer and the license-record’s contents from
`the selected program;” ............................................................. 52
`12. Claim 3.c: “forming an encrypted license-record at the
`bureau by encrypting parts of the request-for-license
`using part of the identification as an encryption key;” ............ 55
`13. Claim 3.d: “transferring, from the bureau to the
`computer, the encrypted license-record; and” ......................... 55
`-iii-
`
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`
`
`
`
`
`
`

`

`TABLE OF CONTENTS
`(continued)
`
`Page
`
`14. Claim 3.e: “storing the encrypted license record in the
`erasable non-volatile memory area of the BIOS.” ................... 55
`15. Claim 6: “A method according to claim 1 wherein
`selecting a program includes the steps of: establishing a
`licensed-software-program in the volatile memory of the
`computer wherein said licensed-software-program
`includes contents used to form the license-record.” ................ 56
`16. Claim 7 preamble: “A method according to claim 6
`wherein using an agent to set up the verification structure
`includes the steps of:” .............................................................. 56
`17. Claim 7.a: “establishing or certifying the existence of a
`pseudo-unique key in a first non-volatile memory area of
`the computer; and” ................................................................... 57
`18. Claim 7.b: “establishing at least one license-record
`location in the first nonvolatile memory area or in the
`erasable, non-volatile memory area of the BIOS.” .................. 57
`19. Claim 8 preamble: “A method according to claim 6
`wherein establishing a license-record includes the steps
`of:” ............................................................................................ 58
`20. Claim 8.a: “forming a license-record by encrypting of
`the contents used to form a license-record with other
`predetermined data contents, using the key; and” ................... 58
`21. Claim 8.b: “establishing the encrypted license-record in
`one of the at least one established license-record
`locations.” ................................................................................ 58
`22. Claim 9 preamble: “A method according to claim 7
`wherein verifying the program includes the steps of:” ............ 59
`23. Claim 9.a: “encrypting the licensed-software-program's
`license-record contents from the volatile memory area or
`decrypting the license-record in the erasable, non-volatile
`memory area of the BIOS, using the pseudo-unique key;
`and” .......................................................................................... 59
`
`-iv-
`
`
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`
`
`
`
`
`
`

`

`TABLE OF CONTENTS
`(continued)
`
`Page
`
`
`
`24. Claim 9.b: “comparing the encrypted licenses-software-
`program’s license-record contents with the encrypted
`license-record in the erasable, non-volatile memory area
`of the BIOS, or comparing the license-software-
`program's license-record contents with the decrypted
`license-record in erasable non-volatile memory area of
`the BIOS.” ................................................................................ 60
`25. Claim 10: “A method according to claim 9 wherein
`acting on the program includes the step: restricting the
`program's operation with predetermined limitations if the
`comparing yields non-unity or insufficiency.” ........................ 60
`26. Claim 11: “A method according to claim 1 wherein the
`volatile memory is a RAM.” .................................................... 61
`27. Claim 12: “The method of claim 1, wherein a pseudo-
`unique key is stored in the non-volatile memory of the
`BIOS.” ...................................................................................... 61
`28. Claim 13: “The method of claim 1, wherein a unique key
`is stored in a first non-volatile memory area of the
`computer.” ................................................................................ 63
`29. Claim 14: “The method according claim 13, wherein the
`step of using the agent to set up the verification record,
`including the license record, includes encrypting a
`license record data in the program using at least the
`unique key.” ............................................................................. 63
`30. Claim 16: “The method according to claim 13, wherein
`the step of verifying the program includes a decrypting
`the license record data accommodated in the erasable
`second non-volatile memory area of the BIOS using at
`least the unique key.” ............................................................... 63
`VIII. CONCLUSION ............................................................................................. 64
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`
`
`
`
`-v-
`
`
`
`

`

`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2020-01609
`
`EXHIBIT LIST
`U.S. Patent No. 6,411,941 to Mullor et al. (“’941 Patent”)
`
`Ex. 1001
`
`Ex. 1002
`
`Image File Wrapper of U.S. Patent No. 6,411,941 (“File History”)
`
`Ex. 1003
`
`Declaration of Andrew Wolfe, Ph.D. (“Wolfe Decl.”)
`
`Ex. 1004
`
`U.S. Patent No. 4,658,093 (“Hellman”)
`
`Ex. 1005
`
`U.S. Patent No. 5,892,906 (“Chou”)
`
`Ex. 1006
`
`Ex. 1007
`
`Ex. 1008
`
`Ex. 1009
`
`Ex. 1010
`
`Ex. 1011
`
`Ex. 1012
`
`Ex. 1013
`
`U.S. Patent No. 5,933,498 (“Schneck”)
`Scheduling Order, Ancora Techs., Inc. v. TCT Mobile (US), Inc., No.
`8:19-cv-2192 (C.D. Cal. Mar. 17, 2020) (ECF No. 34).
`
`In re: Coronavirus Public Emergency, Order Concerning Phased
`Reopening of the Court, General Order No. 20-09, United States
`District Court for the Central District of California, Aug. 6, 2020.
`Civil Docket, Ancora Techs., Inc. v. Sony Mobile Commc’ns AB, No.
`1:19-cv-01703 (D. Del.).
`
`Civil Docket, Ancora Techs., Inc. v. Lenovo Grp. Ltd., No. 1:19-cv-
`01712 (D. Del.).
`
`Claim Construction Order, Ancora Techs., Inc. v. Apple Inc., No. 4:11-
`cv-06357 (N.D. Cal. Dec. 31, 2012) (ECF No. 107).
`
`Final Claim Constructions of the Court, Ancora Techs., Inc. v. LG
`Elecs., Inc., No. 1:20-cv-00034 (W.D. Tex. June 2, 2020) (ECF No.
`69).
`
`Supplemental Claim Construction Order, Ancora Techs., Inc. v. LG
`Elecs., Inc., No. 1:20-cv-00034 (W.D. Tex. Aug. 19, 2020) (ECF No.
`93).
`
`134092-0004.8901/149500475.1
`
`-vi-
`
`

`

`Ex. 1014
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2020-01609
`
`Joint Claim Construction and Prehearing Statement, Ancora Techs.,
`Inc. v. TCT Mobile (US), Inc., No. 8:19-cv-2192 (C.D. Cal. July 17,
`2020) (ECF No. 49).
`
`134092-0004.8901/149500475.1
`
`-vii-
`
`

`

`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2020-01609
`
`Pursuant to 35 U.S.C. § 311 and 37 C.F.R. § 42.100, Petitioners request inter
`
`partes review (“IPR”) of U.S. Patent No. 6,411,941 (Ex. 1001).
`
`I.
`
`INTRODUCTION
`The ’941 Patent generally relates to methods for restricting unauthorized
`
`software operation. Specifically, the ’941 Patent claims such a method by storing a
`
`license record in the BIOS memory, which purportedly overcame deficiencies
`
`using a software-based prior art method where a license record was stored in
`
`“volatile memory (e.g., hard disk)” and a hardware-based prior art method. ’941
`
`Patent at 1:10-42. Indeed, storing a license record for a program in the BIOS
`
`memory, and not just any non-volatile memory, is the supposed improvement of
`
`the ‘941 Patent claims over the prior art in prosecution, an ex parte reexamination,
`
`a covered business method review, and two Federal Circuit appeals; even though
`
`those proceedings conceded that a “license record” and “BIOS memory” were both
`
`conventional. But the storage of license records in a BIOS memory was not a
`
`patentable distinction over the prior art as of the priority date in 1998, as
`
`Petitioners demonstrate with the use of three prior art references, Hellman, Chou,
`
`and Schneck.
`
`While the ’941 Patent has been litigated in district court and at the Patent
`
`Office in numerous cases, its invalidity based on prior art publications has been
`
`considered in only one of these proceedings. Neither of the Federal Circuit appeals
`
`134092-0004.8901/149500475.1
`
`-1-
`
`

`

`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2020-01609
`
`
`considered prior art invalidity. One appeal was limited to claim construction
`
`issues, and one appeal was limited to patent eligibility. The covered business
`
`method review was denied institution on the basis that the ’941 Patent was not
`
`eligible for covered business method review. Despite the Patent Owner having
`
`asserted the ’941 Patent against 10 entities over the course of more than 10 years,
`
`the invalidity of the ’941 Patent’s claims has only been considered on the merits in
`
`one instance, an ex parte reexam.
`
`Petitioners submit that, when fully considered on the merits, the prior art
`
`demonstrates that storing information, a license record or otherwise, in the BIOS
`
`memory, that is used in a method to restrict unauthorized operation of software,
`
`was well-known as a way to provide increased protection against tampering with
`
`that information by, e.g., a software hacker. Petitioners demonstrate through the
`
`combinations of Hellman, Chou, and Schneck that a person of ordinary skill in the
`
`art at the time of the invention (POSA) would have found all challenged claims
`
`obvious.
`
`For the reasons described herein, Petitioners request institution of an inter
`
`partes review and cancellation of all challenged claims of the ’941 Patent.
`
`134092-0004.8901/149500475.1
`
`-2-
`
`

`

`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2020-01609
`
`
`II. MANDATORY NOTICES
`A. Real party-in-interest
`TCT Mobile (US) Inc., Huizhou TCL Mobile Communication Co., Ltd., and
`
`Shenzhen TCL Creative Cloud Technology Co., Ltd. (collectively, “Petitioners”)
`
`are the real parties-in-interest.
`
`B. Related matters
`Patent Owner asserts that Petitioners infringe the ’941 Patent in Ancora
`
`Technologies, Inc. v. TCT Mobile (US) Inc., No. 8:19-cv-02192 (C.D. Cal.), which
`
`is consolidated with the same-captioned case No. 2:20-cv-01252 (C.D. Cal.). The
`
`latter case was transferred from Ancora Technologies, Inc. v. TCL Corp., 4:19-cv-
`
`00624 (E.D. Tex.), in which the complaint was filed on August 27, 2019.
`
`Patent Owner has asserted the ’941 Patent against other parties in the
`
`following currently-pending district-court lawsuits: Ancora Technologies, Inc. v.
`
`Lenovo Group Limited, No. 1:19-cv-01712 (D. Del.); Ancora Technologies, Inc. v.
`
`Sony Corp., No. 1:19-cv-01703 (D. Del.); Ancora Technologies, Inc. v. LG
`
`Electronics, Inc., No. 1:20-cv-00034 (W.D. Tex.); Ancora Technologies, Inc. v.
`
`Samsung Electronics Co., Ltd., No. 6:19-cv-00385 (W.D. Tex.); Ancora
`
`Technologies, Inc. v. HTC America, Inc., No. 2:16-cv-01919 (W.D. Wash.).
`
`Samsung Electronics Co., Ltd. et al. filed a petition for inter partes review
`
`against the ’941 Patent on June 25, 2020. IPR2020-01184 (“Samsung IPR
`
`134092-0004.8901/149500475.1
`
`-3-
`
`

`

`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2020-01609
`
`
`Petition”). For the reasons set forth below, there is no overlap in grounds or prior
`
`art references between this Petition and the Samsung IPR Petition.
`
`C. Counsel and Service Information
`Lead counsel: John P. Schnurer (Reg. No. 52,196)
`
`Back-up counsel: Yun (Louise) Lu (Reg. No. 72,766), and Kyle R.
`
`Canavera (Reg. No. 72,167)
`
`These attorneys can be reached by mail at Perkins Coie LLP, 11452 El
`
`Camino Real, Suite 300, San Diego, CA 92130, contact numbers of 858-720-5700
`
`(phone) and 858-720-5799 (fax).
`
`Petitioners consent to electronic service. All services and communications
`
`to the attorneys listed above may be sent to: PerkinsServiceTCL-Ancora-
`
`IPR@perkinscoie.com. A power of attorney is being filed concurrently.
`
`III. REQUIREMENTS FOR INTER PARTES REVIEW
`A. Ground for Standing
`Petitioners certify that the ’941 Patent is available for IPR and that
`
`Petitioners are not barred or estopped from requesting IPR challenging claims of
`
`the ’941 Patent on the grounds presented here.
`
`134092-0004.8901/149500475.1
`
`-4-
`
`

`

`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2020-01609
`
`
`B. Overview of Challenge and Relief Requested
`Pursuant to Rules 42.22(a)(1) and 42.104(b)(1)–(2), Petitioners request
`
`cancellation of claims 1–3, 6–14, and 16 of the ’941 Patent under pre-AIA 35
`
`U.S.C. § 103.
`
`Identification of Prior Art
`1.
`Petitioners rely upon the references listed in the Table of Exhibits, including:
`
`U.S. Patent No. 4,658,093 (“Hellman” (Ex. 1004)), issued on April 14, 1987
`
`from an application filed on July 11, 1983. Hellman is prior art under pre-AIA 35
`
`U.S.C. § 102(b).
`
`U.S. Patent No. 5,892,906 (“Chou” (Ex. 1005)), issued on April 6, 1999
`
`from an application filed on July 19, 1996. Chou is prior art under pre-AIA 35
`
`U.S.C. § 102(e).
`
`U.S. Patent No. 5,933,498 (“Schneck” (Ex. 1006)), issued on August 3,
`
`1999 from an application filed on November 5, 1997 and that claims priority to an
`
`application filed on January 11, 1996. Schneck is prior art under pre-AIA 35
`
`U.S.C. § 102(e).
`
`Hellman, Chou, and Scheck were not in front of the Patent Office during the
`
`original examination, the ex parte reexamination, or the covered business method
`
`review of the ’941 Patent.
`
`2. Grounds for Challenge
`
`134092-0004.8901/149500475.1
`
`-5-
`
`

`

`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2020-01609
`
`
`Ground
`
`Basis
`
`Reference(s)
`
`Challenged
`Claims
`1–2, 11, 13
`1–3, 6–14, and 16
`
`1
`2
`
`§ 103
`§ 103
`
`Hellman, Chou
`Hellman, Chou, Schneck
`
`This Petition, supported by the declaration of Dr. Andrew Wolfe (“Wolfe
`
`Decl.” (Ex. 1003)), demonstrates that there is a reasonable likelihood that
`
`Petitioners will prevail with respect to cancellation of at least one challenged
`
`claim. See 35 U.S.C. § 314(a).
`
`Statutory Grounds of Challenge and Legal Principles
`3.
`This Petition requests cancellation of claims 1–3, 6–14, and 16 of the ’941
`
`Patent under pre-AIA 35 U.S.C. § 103.
`
`C. The Board Should Exercise Its Discretion to Institute Review
`Under 35 U.S.C. § 325(d), the Board has discretion to deny institution of
`
`inter partes review if “the same or substantially the same prior art or arguments
`
`previously were presented to the Office.” 35 U.S.C. § 325(d). The Board uses
`
`Becton, Dickinson factors (a), (b), and (d) to determine whether the same or
`
`substantially the same art or arguments previously were presented to the Office.
`
`Advanced Bionics, LLC v. MED-EL Elektromedizinische Geräte GmbH, IPR2019-
`
`01469, Paper 6, 10 (PTAB Feb. 13, 2020) (precedential). These Becton, Dickinson
`
`factors consider: “(a) the similarities and material differences between the asserted
`
`art and the prior art involved during examination; (b) the cumulative nature of the
`
`134092-0004.8901/149500475.1
`
`-6-
`
`

`

`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2020-01609
`
`asserted art and the prior art evaluated during examination; . . . (d) the extent of the
`
`overlap between the arguments made during examination and the manner in which
`
`Petitioner relies on the prior art or Patent Owner distinguishes the prior art.”
`
`Becton, Dickinson & Co. v. B. Braun Melsungen AG, IPR2017-01586, Paper 8,
`
`17–18 (Dec. 15, 2017) (precedential as to § III.C.5, first paragraph).
`
`None of these factors support a finding that the same or substantially the
`
`same prior art or arguments were previously presented to the Office. None of
`
`Hellman, Chou, and Schneck were submitted to the office during prosecution, the
`
`ex parte reexam, the covered business method review, or the Samsung IPR
`
`Petition. Furthermore, the basic invalidity argument presented in this Petition was
`
`not presented previously to the Office, i.e., that Hellman discloses storing a license
`
`record in EEPROM, and Chou shows that a POSA would have used BIOS memory
`
`for that storage, because it would have been one of a limited number of available
`
`EEPROM modules and would have reduced the risk of tampering. Therefore, the
`
`substance of this Petition does not warrant denial of institution under § 325(d).
`
`The Board considers the General Plastics factors to determine whether to
`
`exercise its discretion under § 314(a). General Plastic Indus. Co., Ltd. v. Canon
`
`Kabushiki Kaisha, IPR2016-01357, Paper 19, 16 (Sept. 6, 2017) (precedential as to
`
`§ II.B.4.i). These factors favor institution. First, this Petition is the first petition by
`
`Petitioners (Factors 1, 2, and 5). Second, while the Samsung IPR Petition was
`
`134092-0004.8901/149500475.1
`
`-7-
`
`

`

`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2020-01609
`
`
`filed prior to the present Petition, Patent Owner has not yet filed a preliminary
`
`response and the Board has not issued an institution decision yet (Factor 3).
`
`Petitioners discovered the prior art presented in this Petition in preparation of its
`
`defense in the parallel district court litigation, which was initiated approximately
`
`one year ago, and in which Patent Owner only filed its operative complaint less
`
`than five months ago (Factor 4). The Petition only presents a single base prior art
`
`reference and two grounds, making it more manageable for the Board to issue a
`
`final determination within the statutory time limits (Factor 7).
`
`The parallel district court proceedings involving the ’941 Patent supports
`
`granting institution. First, no trial date has yet been set in the district court case
`
`involving Petitioners. (See Ex. 1007.) The parties are in the middle of claim
`
`construction briefing, and the claim construction hearing has not yet been held.
`
`Second, due to COVID-19, the Central District of California presently is not
`
`permitting jury trials in either criminal or civil cases. (See Ex. 1008.)
`
`Furthermore, once jury trials do resume, it is expected that criminal trials will take
`
`precedence and thus the trial for the parallel civil case for this Petition will likely
`
`be delayed. Third, regardless of the district court case involving Petitioners, the
`
`district court cases brought by Patent Owner against the Sony defendants and
`
`Lenovo defendants have not moved significantly beyond the complaint and
`
`answer. (See Ex. 1009; Ex. 1010.) As such, the issues of the validity of the
`
`134092-0004.8901/149500475.1
`
`-8-
`
`

`

`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2020-01609
`
`
`challenged claims will remain relevant regardless of the timing of the Petitioners’
`
`district court case. Fourth, even though the ’941 Patent is expired, Patent Owner is
`
`presently asserting it against six unrelated groups of entities (i.e., HTC entities, LG
`
`entities, Samsung entities, Lenovo/Motorola entities, Sony entities, and TCL
`
`entities). So the determination of the invalidity of the claims of the ’941 Patent
`
`would provide significant efficiencies to the courts, and merits use of the Board’s
`
`finite resources.
`
`IV. DESCRIPTION OF TECHNOLOGY
`A. Overview of the Technology
`By the time of the ’941 Patent’s priority date in 1998, the field of software
`
`licensing was well-developed. Wolfe Decl. ¶¶ 31–35. For more than a decade
`
`prior, practitioners in the field had widely recognized the new risks to software
`
`piracy introduced by the transformations to digital media. Id.
`
`Many entities recognized that one such risk was “copy protection” or
`
`“secondary distribution.” Id. This referred to the situation where a user received a
`
`valid license for a software program, but the user then duplicated the program
`
`and/or the license so as to use it in an unauthorized fashion for more uses, on more
`
`computers, etc. Id. This problem was of particular interest to practitioners because
`
`it required the software owner to provide enough trust to the user to perform at
`
`least one authorized use, as opposed to providing no trust or unlimited trust. Id.
`
`134092-0004.8901/149500475.1
`
`-9-
`
`

`

`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2020-01609
`
`
`While many solutions were developed, a common theme was to use some form of
`
`encryption to reduce unauthorized secondary distribution of the software program.
`
`Id.
`
`Similarly, by 1998, the field of computer BIOS was well-developed.
`
`Wolfe Decl. ¶¶ 36–42. Nearly all consumer end user devices contained a BIOS
`
`program that was used to start up the device at power-on time. Id. Early personal
`
`computers tended to store BIOS programs in separate, true ROM (read only
`
`memory) memory module, i.e., memory that could not be re-written in the field.
`
`Id. By the 1990s, it was more common to store BIOS programs in “ROM” that
`
`could actually be rewritten in some form. Id. Early forms of this rewritable ROM
`
`often required physically accessing the memory chip with a special device. Id.
`
`By the ’941 Patent’s priority date in 1998, electrically-erasable
`
`programmable read-only memory (EEPROM) was a popular medium for BIOS
`
`memory. Id. EEPROM chips had the benefit of being re-writable by software
`
`without the need to remove the chip from the computer. Id. This aspect of
`
`EEPROM was considered beneficial because it became common prior to the ’941
`
`priority date in 1998 for device manufacturers to provide updates to BIOS while
`
`the devices were in the field. Id. EEPROM allowed that functionality. Id.
`
`134092-0004.8901/149500475.1
`
`-10-
`
`

`

`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2020-01609
`
`
`B. Overview of the ’941 Patent
`The ’941 Patent issued from U.S. Patent Application No. 09/164,777, filed
`
`on October 1, 1998. It claims priority to Israeli Patent Application 124571, which
`
`was filed on May 21, 1998. ’941 Patent, Cover Page. Therefore, the priority date
`
`of the ’941 Patent is no earlier than May 21, 1998.
`
`The Specification and Alleged Invention
`1.
`The ’941 Patent invention is directed to “restricting an unauthorized
`
`software program’s operation.” ’941 Patent at 1:6–8. The ’941 Patent recognizes
`
`that it was known in the field to store a “license signature” for a program in a
`
`computer’s “volatile memory (e.g. hard disk).”1 Id. at 1:19–21. The ’941 Patent
`
`alleges that such techniques were “appropriate for restricting honest software
`
`users,” but they were “vulnerable to attack at the hands of skilled system’s
`
`programmers (e.g. ‘hackers’).” Id. at 1:21–24.
`
`The ’941 Patent proposes to solve this problem based on “the use of a key
`
`and of a record, which have been written into the non-volatile memory of a
`
`computer.” Id. at 1:38–43. The “key” is stored “during manufacture” in a “ROM
`
`
`
` 1
`
` Despite this contradictory example (i.e., that a hard disk is exemplary of volatile
`memory), the Federal Circuit held that “volatile memory” has its ordinary
`meaning, Ancora Technologies, Inc. v. Apple, Inc., 744 F.3d 732, 739 (Fed. Cir.
`2014), such as “memory whose data is not maintained when the power is
`removed,” id. at 737.
`
`134092-0004.8901/149500475.1
`
`-11-
`
`

`

`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2020-01609
`
`
`section” of a “BIOS module,” and it “constitutes, effectively, a unique
`
`identification code for the host computer.” Id. at 1:44–52. The “license record” is
`
`stored in “another (second) non-volatile section of the BIOS, e.g. E2PROM (or the
`
`ROM).”2 Id.at 1:59–2:1. The ’941 Patent distinguishes the storage location of the
`
`key and the license record: “It should be noted that unlike the first non-volatile
`
`section, the data in the second non-volatile memory may optionally be erased or
`
`modified (using E2PROM manipulation commands), so as to enable to add, modify
`
`or remove licenses.” Id. 2:1–5. The key is used to encrypt the license record,
`
`creating a locally stored, device-specific license record for the program under
`
`license. Id. at 1:59–2:26.
`
`The ’941 Patent alleges two primary benefits of the invention. First, by
`
`encrypting the license record with a key unique to the host computer and stored in
`
`ROM, a program licensed for one computer cannot simply be transferred with the
`
`license record to another computer, because the key for the second computer will
`
`be different. Id. at 2:27–47. “It is important to note that the hacker is unable to
`
`modify the key in the ROM of the second computer to” the key of the first
`
`computer because “the contents of the ROM is established during manufacture and
`
`is practically invariable.” Id. at 2:42–47.
`
`
`
` 2
`
` E2PROM is another spelling of EEPROM.
`-12-
`
`134092-0004.8901/149500475.1
`
`

`

`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2020-01609
`
`
`Second: “An important advantage in utilizing non-volatile memory such as
`
`that residing in the BIOS is that the required level of system programming
`
`expertise that is necessary to intercept or modify commands, interacting with the
`
`BIOS, is substantially higher than those needed for tampering with data residing in
`
`volatile memory such as hard disk.” Id. at 3:4–9. In other words, because
`
`manipulation of E2PROM was more difficult than manipulation of the device’s
`
`RAM or hard disk, the license record could be stored in E2PROM to make it more
`
`tamper proof. Id. at 3:4–17.
`
`The alleged invention is depicted with respect to Figure 1 of the ’941 Patent,
`
`shown below. The first non-volatile memory (4)—“e.g. the ROM section of the
`
`BIOS,” id. at 5:9–16—stores a key (8). The second non-volatile memory (5)—
`
`“e.g. the E2PROM section of the BIOS,” id.—stores license records (10, 11, 12).
`
`The volatile memory (6)—“e.g. the inter

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket