`
`_____________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_____________________________
`
`Samsung Electronics Co., Ltd. and Samsung Electronics America, Inc.,
`
`
`Petitioners,
`
`v.
`
`Ancora Technologies, Inc.,
`
`Patent Owner.
`
`
`_____________________________
`
`PTAB Case No. IPR2021-00583
`
`Patent No. 6,411,941 B1
`
`_____________________________
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 6,411,941
`
`
`
`
`
` DC: 7490388-3
`
`
`
`
`
`TABLE OF CONTENTS
`
`Page
`INTRODUCTION .......................................................................................... 1
`I.
`II. MANDATORY NOTICES ............................................................................ 2
`A.
`Real party-in-interest ............................................................................ 2
`B.
`Related matters ..................................................................................... 3
`C.
`Counsel and Service Information ......................................................... 4
`III. PAYMENT OF FEES .................................................................................... 4
`IV. REQUIREMENTS FOR INTER PARTES REVIEW ................................... 4
`A. Ground for Standing ............................................................................. 4
`B. Overview of Challenge and Relief Requested ..................................... 4
`1.
`Identification of Prior Art .......................................................... 5
`2.
`Grounds for Challenge ............................................................... 5
`3.
`Statutory Grounds of Challenge and Legal Principles .............. 6
`V. DESCRIPTION OF TECHNOLOGY ............................................................ 6
`A. Overview of the Technology ................................................................ 6
`B. Overview of the ’941 Patent ................................................................. 8
`1.
`The Specification and Alleged Invention .................................. 8
`2.
`Prosecution History and Later Proceedings ............................. 13
`3.
`The Challenged Claims ............................................................ 17
`VI. CLAIM CONSTRUCTION ......................................................................... 17
`VII. LEVEL OF ORDINARY SKILL IN THE ART .......................................... 18
`VIII. SPECIFIC GROUNDS FOR PETITION ..................................................... 19
`A. Ground I: Claims 1–2, 11, and 13 were obvious over the
`combined teachings of Hellman and Chou. ....................................... 19
`1.
`Overview of Hellman ............................................................... 19
`Overview of Chou .................................................................... 24
`2.
`3. Motivations to Combine Hellman and Chou ........................... 25
`4.
`Claim 1 preamble: “A method of restricting software
`operation within a license for use with a computer
`
`-i-
`
`
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`including an erasable, non-volatile memory area of a
`BIOS of the computer, and a volatile memory area; the
`method comprising the steps of:” ............................................ 30
`Claim 1.a: “selecting a program residing in the volatile
`memory,” .................................................................................. 32
`Claim 1.b: “using an agent to set up a verification
`structure in the erasable, non-volatile memory of the
`BIOS, the verification structure accommodating data that
`includes at least one license record,” ....................................... 34
`Claim 1.c: “verifying the program using at least the
`verification structure from the erasable non-volatile
`memory of the BIOS, and” ...................................................... 35
`Claim 1.d: “acting on the program according to the
`verification.” ............................................................................ 36
`Claim 2: “A method according to claim 1, further
`comprising the steps of: establishing a license
`authentication bureau.” ............................................................ 36
`10. Claim 11: “A method according to claim 1 wherein the
`volatile memory is a RAM.” .................................................... 37
`11. Claim 13: “The method of claim 1, wherein a unique key
`is stored in a first non-volatile memory area of the
`computer.” ................................................................................ 37
`B. Ground II: Claims 1–3, 6–14, and 16 were obvious over the
`combined teachings of Hellman, Chou, and Schneck. ....................... 38
`1.
`Overview of Schneck ............................................................... 38
`2. Motivations to Combine Hellman, Chou, and Schneck .......... 39
`3.
`Claim 1. preamble: “A method of restricting software
`operation within a license for use with a computer
`including an erasable, non-volatile memory area of a
`BIOS of the computer, and a volatile memory area; the
`method comprising the steps of:” ............................................ 43
`Claim 1.a: “selecting a program residing in the volatile
`memory,” .................................................................................. 43
`
`4.
`
`TABLE OF CONTENTS
`(continued)
`
`Page
`
`
`-ii-
`
`
`
`TABLE OF CONTENTS
`(continued)
`
`Page
`
`
`6.
`
`5.
`
`Claim 1.b: “using an agent to set up a verification
`structure in the erasable, non-volatile memory of the
`BIOS, the verification structure accommodating data that
`includes at least one license record,” ....................................... 44
`Claim 1.c: “verifying the program using at least the
`verification structure from the erasable non-volatile
`memory of the BIOS, and” ...................................................... 46
`Claim 1.d: “acting on the program according to the
`verification.” ............................................................................ 47
`Claim 2: “A method according to claim 1, further
`comprising the steps of: establishing a license
`authentication bureau.” ............................................................ 47
`Claim 3 preamble: “A method according to claim 2,
`wherein setting up a verification structure further
`comprising the steps of:” ......................................................... 47
`10. Claim 3.a: “establishing, between the computer and the
`bureau, a two-way data-communications linkage;” ................. 47
`11. Claim 3.b: “transferring, from the computer to the
`bureau, a request-for-license including an identification
`of the computer and the license-record’s contents from
`the selected program;” ............................................................. 48
`12. Claim 3.c: “forming an encrypted license-record at the
`bureau by encrypting parts of the request-for-license
`using part of the identification as an encryption key;” ............ 51
`13. Claim 3.d: “transferring, from the bureau to the
`computer, the encrypted license-record; and” ......................... 52
`14. Claim 3.e: “storing the encrypted license record in the
`erasable non-volatile memory area of the BIOS.” ................... 52
`15. Claim 6: “A method according to claim 1 wherein
`selecting a program includes the steps of: establishing a
`licensed-software-program in the volatile memory of the
`computer wherein said licensed-software-program
`includes contents used to form the license-record.” ................ 52
`
`7.
`
`8.
`
`9.
`
`-iii-
`
`
`
`TABLE OF CONTENTS
`(continued)
`
`Page
`
`
`16. Claim 7 preamble: “A method according to claim 6
`wherein using an agent to set up the verification structure
`includes the steps of:” .............................................................. 53
`17. Claim 7.a: “establishing or certifying the existence of a
`pseudo-unique key in a first non-volatile memory area of
`the computer; and” ................................................................... 53
`18. Claim 7.b: “establishing at least one license-record
`location in the first nonvolatile memory area or in the
`erasable, non-volatile memory area of the BIOS.” .................. 53
`19. Claim 8 preamble: “A method according to claim 6
`wherein establishing a license-record includes the steps
`of:” ............................................................................................ 54
`20. Claim 8.a: “forming a license-record by encrypting of the
`contents used to form a license-record with other
`predetermined data contents, using the key; and” ................... 54
`21. Claim 8.b: “establishing the encrypted license-record in
`one of the at least one established license-record
`locations.” ................................................................................ 55
`22. Claim 9 preamble: “A method according to claim 7
`wherein verifying the program includes the steps of:” ............ 55
`23. Claim 9.a: “encrypting the licensed-software-program's
`license-record contents from the volatile memory area or
`decrypting the license-record in the erasable, non-volatile
`memory area of the BIOS, using the pseudo-unique key;
`and” .......................................................................................... 55
`24. Claim 9.b: “comparing the encrypted licenses-software-
`program’s license-record contents with the encrypted
`license-record in the erasable, non-volatile memory area
`of the BIOS, or comparing the license-software-
`program's license-record contents with the decrypted
`license-record in erasable non-volatile memory area of
`the BIOS.” ................................................................................ 56
`25. Claim 10: “A method according to claim 9 wherein
`acting on the program includes the step: restricting the
`
`-iv-
`
`
`
`TABLE OF CONTENTS
`(continued)
`
`Page
`
`
`program's operation with predetermined limitations if the
`comparing yields non-unity or insufficiency.” ........................ 57
`26. Claim 11: “A method according to claim 1 wherein the
`volatile memory is a RAM.” .................................................... 57
`27. Claim 12: “The method of claim 1, wherein a pseudo-
`unique key is stored in the non-volatile memory of the
`BIOS.” ...................................................................................... 58
`28. Claim 13: “The method of claim 1, wherein a unique key
`is stored in a first non-volatile memory area of the
`computer.” ................................................................................ 59
`29. Claim 14: “The method according claim 13, wherein the
`step of using the agent to set up the verification record,
`including the license record, includes encrypting a
`license record data in the program using at least the
`unique key.” ............................................................................. 59
`30. Claim 16: “The method according to claim 13, wherein
`the step of verifying the program includes a decrypting
`the license record data accommodated in the erasable
`second non-volatile memory area of the BIOS using at
`least the unique key.” ............................................................... 59
`IX. THE BOARD SHOULD EXERCISE ITS DISCRETION TO
`INSTITUTE REVIEW ................................................................................. 60
`CONCLUSION ............................................................................................. 65
`
`X.
`
`
`
`-v-
`
`
`
`
`
`
`
`Ex. 1001
`Ex. 1002
`
`Ex. 1003
`Ex. 1004
`Ex. 1005
`Ex. 1006
`Ex. 1007
`Ex. 1008
`Ex. 1009
`Ex. 1010
`Ex. 1011
`
`Ex. 1012
`
`Ex. 1013
`
`Ex. 1014
`
`Ex. 1015
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`
`EXHIBIT LIST
`
`U.S. Patent No. 6,411,941 to Mullor et al. (“’941 Patent”)
`Image File Wrapper of U.S. Patent No. 6,411,941 (“File
`History”)
`Declaration of Andrew Wolfe, Ph.D. (“Wolfe Decl.”)
`U.S. Patent No. 4,658,093 (“Hellman”)
`U.S. Patent No. 5,892,906 (“Chou”)
`U.S. Patent No. 5,933,498 (“Schneck”)
`Reserved
`Reserved
`Reserved
`Reserved
`Claim Construction Order, Ancora Techs., Inc. v. Apple Inc., No.
`4:11-cv-06357 (N.D. Cal. Dec. 31, 2012) (ECF No. 107).
`Final Claim Constructions of the Court, Ancora Techs., Inc. v.
`LG Elecs., Inc., No. 1:20-cv-00034 (W.D. Tex. June 2, 2020)
`(ECF No. 69).
`Supplemental Claim Construction Order, Ancora Techs., Inc. v.
`LG Elecs., Inc., No. 1:20-cv-00034 (W.D. Tex. Aug. 19, 2020)
`(ECF No. 93).
`Joint Claim Construction and Prehearing Statement, Ancora
`Techs., Inc. v. TCT Mobile (US), Inc., No. 8:19-cv-2192 (C.D.
`Cal. July 17, 2020) (ECF No. 49).
`Declaration of Dr. Erez Zadok
`
`-vi-
`
`
`
`Ex. 1016
`
`Transcript of January 26, 2021 Discovery Hearing (via Zoom) in
`Ancora Technologies v. LG Electronics Inc. et al., Samsung
`Electronics Co., Ltd. et al., Case No. AU-20-CV-34 (W.D. Tex.)
`
`
`
`
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`Pursuant to 35 U.S.C. § 311 and 37 C.F.R. § 42.100, Petitioners request
`
`
`
`
`inter partes review (“IPR”) of U.S. Patent No. 6,411,941 (Ex. 1001).
`
`I.
`
`INTRODUCTION
`The ’941 Patent generally relates to methods for restricting unauthorized
`
`software operation. Specifically, the ’941 Patent claims such a method by storing a
`
`license record in the BIOS memory, which purportedly overcame deficiencies
`
`using a software-based prior art method where a license record was stored in
`
`“volatile memory (e.g., hard disk)” and a hardware-based prior art method. ’941
`
`Patent at 1:10-42. Indeed, storing a license record for a program in the BIOS
`
`memory, and not just any non-volatile memory, is the supposed improvement of
`
`the ‘941 Patent claims over the prior art in prosecution, an ex parte reexamination,
`
`a covered business method review, and two Federal Circuit appeals; even though
`
`those proceedings conceded that a “license record” and “BIOS memory” were both
`
`conventional. But the storage of license records in a BIOS memory was not a
`
`patentable distinction over the prior art as of the priority date in 1998, as
`
`Petitioners demonstrate with the use of three prior art references, Hellman, Chou,
`
`and Schneck.
`
`While the ’941 Patent has been litigated in district court and at the Patent
`
`Office in numerous cases, its invalidity based on prior art publications has been
`
`
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`considered in only one of these proceedings. Neither of the Federal Circuit appeals
`
`considered prior art invalidity. One appeal was limited to claim construction
`
`issues, and one appeal was limited to patent eligibility. The covered business
`
`method review was denied institution on the basis that the ’941 Patent was not
`
`eligible for covered business method review. Despite the Patent Owner having
`
`asserted the ’941 Patent against 10 entities over the course of more than 10 years,
`
`the invalidity of the ’941 Patent’s claims has only been considered on the merits in
`
`one instance, an ex parte reexam.
`
`Petitioners submit that, when fully considered on the merits, the prior art
`
`demonstrates that storing information, a license record or otherwise, in the BIOS
`
`memory, that is used in a method to restrict unauthorized operation of software,
`
`was well-known as a way to provide increased protection against tampering with
`
`that information by, e.g., a software hacker. Petitioners demonstrate through the
`
`combinations of Hellman, Chou, and Schneck that a person of ordinary skill in the
`
`art at the time of the invention (POSA) would have found all challenged claims
`
`obvious.
`
`For the reasons described herein, Petitioners request institution of an inter
`
`partes review and cancellation of all challenged claims of the ’941 Patent.
`
`II. MANDATORY NOTICES
`A. Real party-in-interest
`
`2
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`
`Samsung Electronics Co., Ltd., and Samsung Electronics America, Inc.
`
`(collectively, “Petitioners”) are the real parties-in-interest.
`
`B. Related matters
`Patent Owner asserts that Petitioners infringe the ’941 Patent in Ancora
`
`Technologies, Inc. v. Samsung Electronics Co., Ltd. et al, No. 6-19-cv-00385
`
`(W.D. Tex.), which is consolidated with Ancora Technologies, Inc. v. LG
`
`Electronics, Inc. et al, 1-20-cv-00034 (W.D. Tex.) in which the complaint was
`
`filed on June 19, 2019.
`
`Patent Owner has asserted the ’941 Patent against other parties in the
`
`following currently-pending district-court lawsuits: Ancora Technologies, Inc. v.
`
`TCT Mobile (US) Inc., No. 8:19-cv-02192 (C.D. Cal.); Ancora Technologies, Inc.
`
`v. Lenovo Group Limited, No. 1:19-cv-01712 (D. Del.); Ancora Technologies, Inc.
`
`v. Sony Corp., No. 1:19-cv-01703 (D. Del.); Ancora Technologies, Inc. v. LG
`
`Electronics, Inc., No. 1:20-cv-00034 (W.D. Tex.); Ancora Technologies, Inc. v.
`
`Samsung Electronics Co., Ltd., No. 6:19-cv-00385 (W.D. Tex.); Ancora
`
`Technologies, Inc. v. HTC America, Inc., No. 2:16-cv-01919 (W.D. Wash.).
`
`Samsung Electronics Co., Ltd., et al. filed a petition for inter partes review
`
`against the ’941 Patent on June 25, 2020. IPR2020-01184 (“Samsung IPR
`
`Petition”). For the reasons set forth below, there is no overlap in grounds or prior
`
`art references between this Petition and the Samsung IPR Petition.
`
`3
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`
`C. Counsel and Service Information
`Lead counsel is Anupam Sharma (Reg. No. 55,609), and backup counsel are
`
`Peter P. Chen (Reg. No. 39,631), Gregory S. Discher (Reg. No. 42,488), Sinan
`
`Utku (Reg. No. 46,137) and Richard L. Rainey (Reg. No. 47,879). Service
`
`information is Covington & Burling LLP, 850 10th St. N.W., Washington, D.C.,
`
`20001, Tel.: 202.662.6000, Fax: 202.778.5485, and 3000 El Camino Real, 5 Palo
`
`Alto Square, 10th Floor, Palo Alto, California 94306, Tel.: 650.632.4700, Fax:
`
`650.632.4800. Petitioner consents to electronic service by email: Samsung-
`
`Ancora-IPR@cov.com. A power of attorney is being filed concurrently.
`
`III. PAYMENT OF FEES
`The Office is authorized to charge any fees due during this proceeding to
`
`Deposit Account No. 603160.
`
`IV. REQUIREMENTS FOR INTER PARTES REVIEW
`A. Ground for Standing
`Petitioners certify that the ’941 Patent is available for IPR and that
`
`Petitioners are not barred or estopped from requesting IPR challenging claims of
`
`the ’941 Patent on the grounds presented here.
`
`B. Overview of Challenge and Relief Requested
`
`4
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`
`Pursuant to Rules 42.22(a)(1) and 42.104(b)(1)–(2), Petitioners request
`
`cancellation of claims 1–3, 6–14, and 16 of the ’941 Patent under pre-AIA 35
`
`U.S.C. § 103.
`
`Identification of Prior Art
`1.
`Petitioners rely upon the references listed in the Table of Exhibits, including:
`
`U.S. Patent No. 4,658,093 (“Hellman” (Ex. 1004)), issued on April 14, 1987
`
`from an application filed on July 11, 1983. Hellman is prior art under pre-AIA 35
`
`U.S.C. § 102(b).
`
`U.S. Patent No. 5,892,906 (“Chou” (Ex. 1005)), issued on April 6, 1999
`
`from an application filed on July 19, 1996. Chou is prior art under pre-AIA 35
`
`U.S.C. § 102(e).
`
`U.S. Patent No. 5,933,498 (“Schneck” (Ex. 1006)), issued on August 3,
`
`1999 from an application filed on November 5, 1997 and that claims priority to an
`
`application filed on January 11, 1996. Schneck is prior art under pre-AIA 35
`
`U.S.C. § 102(e).
`
`Hellman, Chou, and Scheck were not in front of the Patent Office during the
`
`original examination, the ex parte reexamination, or the covered business method
`
`review of the ’941 Patent.
`
`2. Grounds for Challenge
`
`5
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`
`Ground
`1
`2
`
`Basis
`§ 103
`§ 103
`
`Reference(s)
`Hellman, Chou
`Hellman, Chou, Schneck
`
`Challenged
`Claims
`1–2, 11, 13
`1–3, 6–14, and 16
`
`This Petition, supported by the declaration of Dr. Erez Zadok1 (“Zadok
`
`
`
`Decl.” (Ex. 1015)), demonstrates that there is a reasonable likelihood that
`
`Petitioners will prevail with respect to cancellation of at least one challenged
`
`claim. See 35 U.S.C. § 314(a).
`
`Statutory Grounds of Challenge and Legal Principles
`3.
`This Petition requests cancellation of claims 1–3, 6–14, and 16 of the ’941
`
`Patent under pre-AIA 35 U.S.C. § 103.
`
`V. DESCRIPTION OF TECHNOLOGY
`A. Overview of the Technology
`By the time of the ’941 Patent’s priority date in 1998, the field of software
`
`licensing was well-developed. Wolfe Decl. ¶¶ 31–35. For more than a decade
`
`
`1 Samsung has retained Dr. Erez Zadok in this proceeding. See Ex. 1015. Dr.
`
`Zadok has adopted the opinions set forth in Ex. 1003, the declaration of Dr. Wolfe,
`
`as his own. Ex. 1015, ¶ 32. While Samsung is not relying directly on Dr. Wolfe’s
`
`declaration in this Petition, for expediency this Petition cites only to Ex. 1003.
`
`6
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`
`prior, practitioners in the field had widely recognized the new risks to software
`
`piracy introduced by the transformations to digital media. Id.
`
`Many entities recognized that one such risk was “copy protection” or
`
`“secondary distribution.” Id. This referred to the situation where a user received a
`
`valid license for a software program, but the user then duplicated the program
`
`and/or the license so as to use it in an unauthorized fashion for more uses, on more
`
`computers, etc. Id. This problem was of particular interest to practitioners because
`
`it required the software owner to provide enough trust to the user to perform at
`
`least one authorized use, as opposed to providing no trust or unlimited trust. Id.
`
`While many solutions were developed, a common theme was to use some
`
`form of encryption to reduce unauthorized secondary distribution of the software
`
`program. Id.
`
`Similarly, by 1998, the field of computer BIOS was well-developed. Wolfe
`
`Decl. ¶¶ 36–42. Nearly all consumer end user devices contained a BIOS program
`
`that was used to start up the device at power-on time. Id. Early personal
`
`computers tended to store BIOS programs in separate, true ROM (read only
`
`memory) memory module, i.e., memory that could not be re-written in the field.
`
`Id. By the 1990s, it was more common to store BIOS programs in “ROM” that
`
`could actually be rewritten in some form. Id. Early forms of this rewritable ROM
`
`often required physically accessing the memory chip with a special device. Id.
`
`7
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`
`By the ’941 Patent’s priority date in 1998, electrically-erasable
`
`programmable read-only memory (EEPROM) was a popular medium for BIOS
`
`memory. Id. EEPROM chips had the benefit of being re-writable by software
`
`without the need to remove the chip from the computer. Id. This aspect of
`
`EEPROM was considered beneficial because it became common prior to the ’941
`
`priority date in 1998 for device manufacturers to provide updates to BIOS while
`
`the devices were in the field. Id. EEPROM allowed that functionality. Id.
`
`B. Overview of the ’941 Patent
`The ’941 Patent issued from U.S. Patent Application No. 09/164,777, filed
`
`on October 1, 1998. It claims priority to Israeli Patent Application 124571, which
`
`was filed on May 21, 1998. ’941 Patent, Cover Page. Therefore, the priority date
`
`of the ’941 Patent is no earlier than May 21, 1998.
`
`The Specification and Alleged Invention
`1.
`The ’941 Patent invention is directed to “restricting an unauthorized
`
`software program’s operation.” ’941 Patent at 1:6–8. The ’941 Patent recognizes
`
`that it was known in the field to store a “license signature” for a program in a
`
`computer’s “volatile memory (e.g. hard disk).”2 Id. at 1:19–21. The ’941 Patent
`
`
`2 Despite this contradictory example (i.e., that a hard disk is exemplary of volatile
`
`memory), the Federal Circuit held that “volatile memory” has its ordinary
`
`8
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`
`alleges that such techniques were “appropriate for restricting honest software
`
`users,” but they were “vulnerable to attack at the hands of skilled system’s
`
`programmers (e.g. ‘hackers’).” Id. at 1:21–24.
`
`The ’941 Patent proposes to solve this problem based on “the use of a key
`
`and of a record, which have been written into the non-volatile memory of a
`
`computer.” Id. at 1:38–43. The “key” is stored “during manufacture” in a “ROM
`
`section” of a “BIOS module,” and it “constitutes, effectively, a unique
`
`identification code for the host computer.” Id. at 1:44–52. The “license record” is
`
`stored in “another (second) non-volatile section of the BIOS, e.g. E2PROM (or the
`
`ROM).”3 Id.at 1:59–2:1. The ’941 Patent distinguishes the storage location of the
`
`key and the license record: “It should be noted that unlike the first non-volatile
`
`section, the data in the second non-volatile memory may optionally be erased or
`
`modified (using E2PROM manipulation commands), so as to enable to add, modify
`
`or remove licenses.” Id. 2:1–5. The key is used to encrypt the license record,
`
`
`meaning, Ancora Technologies, Inc. v. Apple, Inc., 744 F.3d 732, 739 (Fed. Cir.
`
`2014), such as “memory whose data is not maintained when the power is
`
`removed,” id. at 737.
`
`3 E2PROM is another spelling of EEPROM.
`
`9
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`
`creating a locally stored, device-specific license record for the program under
`
`license. Id. at 1:59–2:26.
`
`The ’941 Patent alleges two primary benefits of the invention. First, by
`
`encrypting the license record with a key unique to the host computer and stored in
`
`ROM, a program licensed for one computer cannot simply be transferred with the
`
`license record to another computer, because the key for the second computer will
`
`be different. Id. at 2:27–47. “It is important to note that the hacker is unable to
`
`modify the key in the ROM of the second computer to” the key of the first
`
`computer because “the contents of the ROM is established during manufacture and
`
`is practically invariable.” Id. at 2:42–47.
`
`Second: “An important advantage in utilizing non-volatile memory such as
`
`that residing in the BIOS is that the required level of system programming
`
`expertise that is necessary to intercept or modify commands, interacting with the
`
`BIOS, is substantially higher than those needed for tampering with data residing in
`
`volatile memory such as hard disk.” Id. at 3:4–9. In other words, because
`
`manipulation of E2PROM was more difficult than manipulation of the device’s
`
`RAM or hard disk, the license record could be stored in E2PROM to make it more
`
`tamper proof. Id. at 3:4–17.
`
`The alleged invention is depicted with respect to Figure 1 of the ’941 Patent,
`
`shown below. The first non-volatile memory (4)—“e.g. the ROM section of the
`
`10
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`
`BIOS,” id. at 5:9–16—stores a key (8). The second non-volatile memory (5)—
`
`“e.g. the E2PROM section of the BIOS,” id.—stores license records (10, 11, 12).
`
`The volatile memory (6)—“e.g. the internal RAM memory of the computer,” id.—
`
`stores a license program (16).
`
`’941 Patent at Fig. 1 (annotated by Petitioner).
`With respect to Figure 2, shown below, the ’941 Patent describes a method
`
`
`
`for using the structures described above to effectuate the alleged invention.
`
`11
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`
`’941 Patent at Fig. 2.
`At the selecting (17) step, “a licensed-software-program” is established in
`
`
`
`the volatile memory.” Id. at 6:7–16.
`
`At the setting up (18) step, a “pseudo-unique key” is established (or certified
`
`to already exist) in the first non-volatile memory. Id. at 6:18–21. Further, a
`
`“license-record location” is established in the first or the second non-volatile
`
`memory area,” id., which action includes using the key to form an “encrypted
`
`license-record” in the license-record location, id. at 6:22–27.
`
`12
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`At the verifying (19) step, the license record established in the license-record
`
`location is compared to a result of using the key to encrypt information from the
`
`licensed-software-program. Id. at 6:28–39.
`
`At the acting (20) step, an action, such as “restricting the program’s
`
`operation,” is performed in response to the comparison from the verifying (19)
`
`step, such as if the comparison shows the two values are unequal. Id. at 6:40–52.
`
`Thus, using the structures described with respect to Figure 1 and the process
`
`described with respect to Figure 2, the ’941 Patent’s alleged invention is providing
`
`a license record unique to a specific computer and stored in a harder-to-modify
`
`memory device, BIOS memory, such as BIOS E2PROM, and not just any non-
`
`volatile memory. With these aspects, the invention allowed device-specific, more
`
`tamperproof software licensing.
`
`Prosecution History and Later Proceedings
`2.
`Claim 1 as originally filed covered setting up a verification structure in two
`
`non-volatile memories, and verifying a program in volatile memory based thereon.
`
`See ’941 File Wrapper, Claims, dated Oct. 1, 1998, p. 1.
`
`During prosecution, the Applicant amended claim 1 to change the “setting
`
`up . . .” step to a “using an agent to set up . . .” step. See ’941 File Wrapper, Office
`
`Action Response, dated Dec. 6, 2001, p. 10 (unnumbered page following page 9).
`
`The Applicant also amended the claims to recite, as in its ultimately issued form,
`
`13
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`
`that the verification structure was stored “in the erasable, non-volatile memory of
`
`the BIOS.” Id. The Applicant later argued that this storing of the license record in
`
`the memory of the BIOS was what distinguished claim 1 over the prior art of
`
`record. See ’941 File Wrapper, Office Action Response, dated Feb. 5, 2002, pp. 3–
`
`7. The Applicant alleged that this storage in the memory of the BIOS was
`
`unknown in the prior art both because “[t]here is no OS support whatsoever to
`
`write data to the system BIOS,” and because “no file system is associated with the
`
`BIOS.” Id. at 6.
`
`The Examiner allowed the claims based on this distinction. The prior art of
`
`record disclosed, for instance, a licensing software that stored licenses in a device’s
`
`ordinary “persistent non-volatile storage,” ’941 File Wrapper, Notice of
`
`Allowance, dated Mar. 28, 2002, p. 3 (citing U.S. Pat. No. 6,189,146 at 12:8–31),
`
`and “the use of BIOS memory for storing licensing numbers,” id. at 4 (citing U.S.
`
`Pat. No. 5,479,639). But, according to the Examiner, the prior art failed to show
`
`“licensed programs running at the OS level interacting with a program verification
`
`structure stored in the BIOS . . . [.]” Id. at 4. “Further, it is well known to those of
`
`ordinary skill of the art that a computer BIOS is not setup to manage a software
`
`license verification structure.” Id. According to the Examiner, the ’941 Patent
`
`solved that problem by using the “agent” to set up the verification structure in the
`
`memory of the BIOS. Id.
`
`14
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00583
`
`
`The ’941 Patent was subject to an ex parte reexamination identified by
`
`Control Number 90/010,560. The prior art submitted by the requester, U.S. Pat.
`
`No. 5,734,819 (“Lewis”), did disclose license information stored in the non-
`
`volatile memory of a BIOS. See ’560 Reexam File Wrapper, Notice of Intent to
`
`Issue Reexam Certificate, dated Mar. 9, 2010, p. 4 (“NIIRC”). But the Examiner
`
`found that Lewis fell short of disclosing claim 1 because the system in Lewis used
`
`the license information to verify the device itself, not a program running on the
`
`device. Id. at 4–5. That is, in Lewis, the program used the encrypted license
`
`information in the BIOS memory to verify that the serial number of the device had
`
`not been altered, instead of using the encrypted license information to v