`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`TCT Mobile (US) Inc., Huizhou TCL Mobile Communication Co., Ltd., and
`Shenzhen TCL Creative Cloud Technology Co., Ltd.,
`
`Petitioners,
`
`v.
`
`Ancora Technologies, Inc.,
`Patent Owner.
`
`PTAB Case No. IPR2020-01034
`Patent No. 6,411,941 B1
`
`DECLARATION OF ANDREW WOLFE IN SUPPORT OF PETITION FOR
`INTER PARTES REVIEW OF U.S. PATENT NO. 6,411,941
`
`Sony Ex. 1003
`Page 1 of 110
`
`
`
`TABLE OF CONTENTS
`
`I.
`
`INTRODUCTION ..........................................................................................1
`A. Qualifications .......................................................................................2
`1.
`Education ...................................................................................2
`2. Work Experience........................................................................2
`3.
`Curriculum Vitae........................................................................7
`B. Materials Reviewed..............................................................................7
`C.
`Level of Ordinary Skill in the Art ........................................................8
`D.
`Summary of Opinions ..........................................................................9
`II. OVERVIEW OF THE TECHNOLOGY......................................................10
`A.
`Priority Date of the Claims.................................................................10
`B. Overview of Relevant Technology When the ’941 Patent Was
`Filed....................................................................................................11
`1.
`Software Licenses ....................................................................11
`2.
`Computer BIOS........................................................................13
`The ’941 Patent ..................................................................................15
`C.
`Claim Construction.............................................................................22
`D.
`III. OVERVIEW OF THE PRIOR ART ............................................................22
`A. Hellman ..............................................................................................22
`B.
`Chou ...................................................................................................33
`C.
`Schneck...............................................................................................37
`IV. UNPATENTABILITY OF THE ’941 PATENT CLAIMS .........................44
`A.
`Standards for Invalidity......................................................................44
`B.
`Claim 1 ...............................................................................................45
`Preamble: “A method of restricting software operation
`1.
`within a license for use with a computer including an
`erasable, non-volatile memory area of a BIOS of the
`computer, and a volatile memory area; the method
`comprising the steps of:” .........................................................45
`
`Sony Ex. 1003
`Page 2 of 110
`
`
`
`2.
`
`3.
`
`4.
`
`5.
`
`Element 1.a: “selecting a program residing in the volatile
`memory”...................................................................................55
`Element 1.b: “using an agent to set up a verification
`structure in the erasable, non-volatile memory of the
`BIOS, the verification structure accommodating data that
`includes at least one license record” ........................................60
`Element 1.c: “verifying the program using at least the
`verification structure from the erasable non-volatile
`memory of the BIOS, and” ......................................................68
`Element 1.d: “acting on the program according to the
`verification.” ............................................................................69
`Claim 2: “A method according to claim 1, further comprising
`the steps of: establishing a license authentication bureau.”..............70
`Claim 3 ...............................................................................................71
`Preamble: “A method according to claim 2, wherein
`1.
`setting up a verification structure further comprising the
`steps of:” ..................................................................................71
`Element 3.a: “establishing, between the computer and
`the bureau, a two-way data-communications linkage;”...........71
`Element 3.b: “transferring, from the computer to the
`bureau, a request-for-license including an identification
`of the computer and the license-record’s contents from
`the selected program;” .............................................................72
`Element 3.c: “forming an encrypted license-record at the
`bureau by encrypting parts of the request-for-license
`using part of the identification as an encryption key;”............76
`Element 3.d: “transferring, from the bureau to the
`computer, the encrypted license-record; and” .........................77
`Element 3.e: “storing the encrypted license record in the
`erasable non-volatile memory area of the BIOS.”...................78
`Claim 6: “A method according to claim 1 wherein selecting a
`program includes the steps of: establishing a licensed-software-
`program in the volatile memory of the computer wherein said
`licensed-software-program includes contents used to form the
`license-record.”...................................................................................79
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`C.
`
`D.
`
`E.
`
`Sony Ex. 1003
`Page 3 of 110
`
`
`
`F.
`
`G.
`
`H.
`
`2.
`
`3.
`
`2.
`
`3.
`
`Claim 7 ...............................................................................................80
`Preamble: “A method according to claim 6 wherein
`1.
`using an agent to set up the verification structure includes
`the steps of:”.............................................................................80
`Element 7.a: “establishing or certifying the existence of
`a pseudo-unique key in a first non-volatile memory area
`of the computer; and”...............................................................80
`Element 7.b: “establishing at least one license-record
`location in the first nonvolatile memory area or in the
`erasable, non-volatile memory area of the BIOS.”..................82
`Claim 8 ...............................................................................................83
`Preamble: “A method according to claim 6 wherein
`1.
`establishing a license-record includes the steps of:” ...............83
`Element 8.a: “forming a license-record by encrypting of
`the contents used to form a license-record with other
`predetermined data contents, using the key; and” ...................83
`Element 8.b: “establishing the encrypted license-record
`in one of the at least one established license-record
`locations.” ................................................................................84
`Claim 9 ...............................................................................................85
`Preamble: “A method according to claim 7 wherein
`1.
`verifying the program includes the steps of:”..........................85
`Element 9.a: “encrypting the licensed-software-
`program's license-record contents from the volatile
`memory area or decrypting the license-record in the
`erasable, non-volatile memory area of the BIOS, using
`the pseudo-unique key; and”....................................................85
`Element 9.b: “comparing the encrypted licenses-
`software-program’s license-record contents with the
`encrypted license-record in the erasable, non-volatile
`memory area of the BIOS, or comparing the license-
`software-program's license-record contents with the
`decrypted license-record in erasable non-volatile memory
`area of the BIOS.”....................................................................86
`
`2.
`
`3.
`
`Sony Ex. 1003
`Page 4 of 110
`
`
`
`I.
`
`J.
`
`Claim 10: “A method according to claim 9 wherein acting on
`the program includes the step: restricting the program's
`operation with predetermined limitations if the comparing
`yields non-unity or insufficiency.”.....................................................88
`Claim 11: “A method according to claim 1 wherein the volatile
`memory is a RAM.” ...........................................................................89
`Claim 12: “The method of claim 1, wherein a pseudo-unique
`key is stored in the non-volatile memory of the BIOS.”....................89
`Claim 13: “The method of claim 1, wherein a unique key is
`stored in a first non-volatile memory area of the computer.”............92
`M. Claim 14: “The method according claim 13, wherein the step
`of using the agent to set up the verification record, including the
`license record, includes encrypting a license record data in the
`program using at least the unique key.”.............................................93
`Claim 16: “The method according to claim 13, wherein the
`step of verifying the program includes a decrypting the license
`record data accommodated in the erasable second non-volatile
`memory area of the BIOS using at least the unique key.” .................94
`
`N.
`
`K.
`
`L.
`
`Sony Ex. 1003
`Page 5 of 110
`
`
`
`LIST OF APPENDICES
`
`Appendix A
`
`Curriculum Vitae of Andrew Wolfe, Ph.D.
`
`Appendix B
`
`Documents Cited
`
`Sony Ex. 1003
`Page 6 of 110
`
`
`
`I.
`
`INTRODUCTION
`I, Andrew Wolfe, have been retained by Petitioners TCT Mobile (US)
`
`1.
`
`Inc., Huizhou TCL Mobile Communication Co., Ltd., and Shenzhen TCL Creative
`
`Cloud Technology Co., Ltd (collectively, “Petitioners”) to investigate and opine on
`
`certain issues relating to United States Patent No. 6,411,941 (“the ’941 patent”) in
`
`their Petition for Inter Partes Review of that patent. The Petition requests that the
`
`Patent Trial and Appeal Board (“PTAB” or “Board”) review and cancel claims 1-3,
`
`6-14, and 16 of the ’941 patent.
`
`2.
`
`The opinions set forth in this report are based on my personal
`
`knowledge, my professional judgment, and my analysis of the materials and
`
`information referenced in this report and its exhibits.
`
`3.
`
`I am being compensated for consulting services including time spent
`
`testifying at any hearing that may be held. I am also reimbursed for reasonable and
`
`customary expenses associated with my work in this case. I receive no other forms
`
`of compensation related to this case. My compensation does not depend on the
`
`outcome of this inter partes review or the co-pending district court litigation, and I
`
`have no other financial interest in this inter partes review.
`
`4.
`
`I understand that the ’941 patent has been assigned to Ancora
`
`Technologies, Inc.
`
`Sony Ex. 1003
`Page 7 of 110
`
`
`
`5.
`
`This declaration is based on the information currently available to me.
`
`To the extent that additional information becomes available, I reserve the right to
`
`continue my investigation and study, which may include a review of documents
`
`and information that may be produced, as well as testimony from depositions that
`
`have not yet been taken.
`
`A.
`
`6.
`
`Qualifications
`1.
`Education
`In 1985, I earned a B.S.E.E. degree in Electrical Engineering and
`
`Computer Science from The Johns Hopkins University. In 1987, I received an
`
`M.S. degree in Electrical and Computer Engineering from Carnegie Mellon
`
`University.
`
`In 1992, I received a Ph.D. in Computer Engineering from Carnegie
`
`Mellon University. My doctoral dissertation proposed a new approach for the
`
`architecture of a computer processor.
`
`2. Work Experience
`I have more than 35 years of experience as a computer architect,
`
`7.
`
`computer system designer, personal computer graphics designer, educator, and
`
`executive in the electronics industry.
`
`8.
`
`In 1983, I began designing touch sensors, microprocessor-based
`
`computer systems, and I/O (input/output) cards for personal computers as a senior
`
`design engineer for Touch Technology, Inc. During the course of my design
`
`Sony Ex. 1003
`Page 8 of 110
`
`
`
`projects with Touch Technology, I designed I/O cards for PC-compatible computer
`
`systems, including the IBM PC-AT, to interface with interactive touch-based
`
`computer terminals that I designed for use in public information systems. I
`
`continued designing and developing related technology as a consultant to the
`
`Carroll Touch division of AMP, Inc., where in 1986 I designed one of the first
`
`custom touch-screen integrated circuits. I designed the touch/pen input system for
`
`the Linus WriteTop, which many believe to be the first commercial tablet
`
`computer.
`
`9.
`
`From 1986 through 1987, I designed and built a high-performance
`
`computer system as a student at Carnegie Mellon University. From 1986 through
`
`early 1988, I also developed the curriculum and supervised the teaching laboratory
`
`for processor design courses.
`
`10.
`
`In the latter part of 1989, I worked as a senior design engineer for
`
`ESL-TRW Advanced Technology Division. While at ESL-TRW, I designed and
`
`built a bus interface and memory controller for a workstation-based computer
`
`system, and also worked on the design of a multiprocessor system.
`
`11. At the end of 1989, I (along with some partners) reacquired the rights
`
`to the technology I had developed at Touch Technology and at AMP and founded
`
`The Graphics Technology Company. Over the next seven years, as an officer and
`
`Sony Ex. 1003
`Page 9 of 110
`
`
`
`a consultant for The Graphics Technology Company, I managed the company's
`
`engineering development activities and personally developed dozens of touch
`
`screen sensors, controllers, and interactive touch-based computer systems.
`
`12.
`
`I have consulted, formally and informally, for a number of fabless
`
`semiconductor companies. In particular, I have served on the technical advisory
`
`boards for two processor design companies: BOPS, Inc., where I chaired the board;
`
`and Siroyan Ltd., where I served in a similar role for three networking chip
`
`companies—Intellon, Inc., Comsilica, Inc., and Entridia, Inc.—and one 3D game
`
`accelerator company, Ageia, Inc.
`
`13.
`
`I have also served as a technology advisor to Motorola and to several
`
`venture capital funds in the U.S. and Europe. Currently, I am a director of Turtle
`
`Beach Corporation, providing guidance in its development of premium audio
`
`peripheral devices for a variety of commercial electronic products.
`
`14.
`
`From 1991 through 1997, I served on the Faculty of Princeton
`
`University as an Assistant Professor of Electrical Engineering. At Princeton, I
`
`taught undergraduate and graduate-level courses in Computer Architecture,
`
`Advanced Computer Architecture, Display Technology, and Microprocessor
`
`Systems, and conducted sponsored research in the area of computer systems and
`
`related topics. I was also a principal investigator for DOD research in video
`
`Sony Ex. 1003
`Page 10 of 110
`
`
`
`technology and a principal investigator for the New Jersey Center for Multimedia
`
`Research. From 1999 through 2002, while a Consulting Professor, I taught a
`
`Computer Architecture course to both undergraduate and graduate students at
`
`Stanford University. At Princeton, I received several teaching awards, both from
`
`students and from the School of Engineering. I have also taught advanced
`
`microprocessor architecture to industry professionals in seminars sponsored by the
`
`Institute of Electrical and Electronics Engineers (“IEEE”) and the Association for
`
`Computing Machinery (“ACM”). I am currently a lecturer at Santa Clara
`
`University teaching courses on Microprocessor Systems, Real-Time Computing,
`
`and Mechatronics.
`
`15.
`
`From 1997 through 2002, I held a variety of executive positions at a
`
`publicly-held fabless semiconductor company originally called S3, Inc. and later
`
`called SonicBlue Inc. I held the positions of Chief Technology Officer, Vice
`
`President of Systems Integration Products, Senior Vice President of Business
`
`Development, and Director of Technology, among others. At the time I joined S3,
`
`the company supplied graphics accelerators for more than 50% of the PCs sold in
`
`the United States. At S3 I supervised the design of several PC graphics
`
`accelerators. During my time at SonicBlue we launched more than 30 new
`
`consumer electronics products including devices to support copy-protected video
`
`Sony Ex. 1003
`Page 11 of 110
`
`
`
`and many of the first commercial products to support copy-protected internet audio
`
`content.
`
`16.
`
`I have published more than fifty peer-reviewed papers in computer
`
`architecture and computer systems and IC design. I also have chaired IEEE and
`
`ACM conferences in microarchitecture and integrated circuit design and served as
`
`an associate editor for IEEE and ACM journals. I served on the IEEE Computer
`
`Society Awards committee. I am a Senior Member of IEEE and a Member of
`
`ACM. I am a named inventor on at least fifty-six U.S. patents and thirty-seven
`
`foreign patents, which are listed in my curriculum vitae.
`
`17.
`
`In 2002, I was the invited keynote speaker at the ACM/IEEE
`
`International Symposium on Microarchitecture and at the International Conference
`
`on Multimedia. From 1990 through 2005, I have also been an invited speaker on
`
`various aspects of technology and the PC industry at numerous industry events
`
`including the Intel Developer’s Forum, Microsoft Windows Hardware Engineering
`
`Conference, Microprocessor Forum, Embedded Systems Conference, Comdex, and
`
`Consumer Electronics Show, as well as at the Harvard Business School and the
`
`University of Illinois Law School. I have been interviewed on subjects related to
`
`computer graphics and video technology and the electronics industry by
`
`publications such as the Wall Street Journal, New York Times, Los Angeles
`
`Sony Ex. 1003
`Page 12 of 110
`
`
`
`Times, Time, Newsweek, Forbes, and Fortune as well as on CNN, NPR, and the
`
`BBC. I have also spoken at dozens of universities including MIT, Stanford,
`
`University of Texas, Carnegie Mellon University, UCLA, University of Michigan,
`
`Rice University, and Duke University.
`
`Curriculum Vitae
`3.
`18. A copy of my curriculum vitae is attached as Appendix A to this
`
`declaration.
`
`B. Materials Reviewed
`19. My opinions expressed in this declaration are based on documents and
`
`materials identified in this declaration, including the ’941 patent, the prior art
`
`references and background materials discussed in this declaration, and the other
`
`references specifically identified in this declaration. I have considered these
`
`materials in their entirety, even if only portions are discussed here.
`
`20.
`
`I have also relied on my own experience and expertise in digital
`
`security, software licensing, and computer architecture.
`
`Sony Ex. 1003
`Page 13 of 110
`
`
`
`C.
`21.
`
`Level of Ordinary Skill in the Art
`I am not an attorney and offer no legal opinions. I have been
`
`informed about certain aspects of the law for purposes of my analyses and
`
`opinions.1
`
`22.
`
`I understand that in analyzing questions of invalidity, the perspective
`
`of a person having ordinary skill in the art (“POSA”) is often implicated, and the
`
`Board may need assistance in determining that level of skill.
`
`23.
`
`I understand that the claims and written description of a patent must
`
`be understood from the perspective of a POSA. I have been informed that the
`
`following factors may affect the level of skill of a POSA: (1) the educational level
`
`of the inventor; (2) the type of problems encountered in the art; (3) the prior-art
`
`solutions to those problems; (4) the rapidity with which innovations are made; (5)
`
`the sophistication of the technology; and (6) the educational level of active workers
`
`in the field. A person of ordinary skill in the art is also a person of ordinary
`
`creativity in the art.
`
`1 I understand that the patent laws were amended by the America Invents
`Act (AIA), but that the earlier statutory requirements still apply to pre-AIA patents.
`I have been informed that the ’941 Patent is a pre-AIA patent, so the pre-AIA
`requirements control. Unless otherwise stated, my understanding of the law about
`patent invalidity as set forth in this declaration relates to the pre-AIA requirements.
`
`Sony Ex. 1003
`Page 14 of 110
`
`
`
`24. Based on my experience in digital security, software licensing, and
`
`computer architecture, as well as my reading of the ’941 Patent, it is my opinion
`
`that a person of ordinary skill with respect to the subject matter of the ’941 Patent
`
`at the time of the alleged invention would have had at least a B.S. degree in
`
`computer science, computer engineering, or electrical engineering (or equivalent
`
`experience) and would have had at least two years of experience with computer
`
`science and computer engineering, including information encryption, computer
`
`architecture, and firmware programming. This definition is approximate, and
`
`additional educational experience in computer science and computer engineering
`
`could make up for less work experience and vice versa.
`
`25.
`
`I am a person of at least ordinary skill in the art and was so on the date
`
`to which the ’941 Patent claims priority (May 21, 1998). As shown by my
`
`qualifications and my curriculum vitae attached as Appendix A, I am aware of the
`
`knowledge and skill possessed by a person of ordinary skill in the art at the time of
`
`the alleged invention claimed by the ’941 Patent. In performing my analysis, I
`
`have applied the standard set forth above.
`
`D.
`26.
`
`Summary of Opinions
`I have reviewed and analyzed the ’941 Patent (Ex. B-1, same as Ex.
`
`1001 in the Petition) as well as prior art references Hellman (U.S. Patent 4,658,093)
`
`(Ex. B-3, same as Ex. 1004 in the Petition), Chou (U.S. Patent 5,892,906) (Ex. B-4,
`
`Sony Ex. 1003
`Page 15 of 110
`
`
`
`same as Ex. 1005 in Petition), and Schneck (U.S. Patent 5,933,498) (Ex. B-5, same
`
`as Ex. 1006 in Petition).
`
`27. Based on my review and analysis, it is my opinion that claims 1-2, 11,
`
`and 13 of the ’941 Patent are invalid as obvious based on Hellman in view of Chou.
`
`Based on my review and analysis, it is also my opinion that claims 1-3, 6-14, and
`
`16 of the ’941 Patent are invalid as obvious based on Hellman in view of Chou and
`
`Schneck.
`
`II. OVERVIEW OF THE TECHNOLOGY
`A.
`Priority Date of the Claims
`28.
`I have been informed that a U.S. patent application may claim the
`
`benefit of the filing date of an earlier patent application if the earlier patent
`
`application disclosed each limitation of the invention claimed in the later-filed U.S.
`
`patent application. I have also been informed that priority is determined on a
`
`claim-by-claim basis so that certain claims of a patent may be entitled to the
`
`priority date of an earlier-filed patent application even if other claims of the same
`
`patent are not entitled to that priority date.
`
`29.
`
`I have also been informed that for patent applications filed before
`
`March 16, 2013, a patented claim is invalid if the claimed invention was patented
`
`or described in a printed publication in any country more than one year before the
`
`Sony Ex. 1003
`Page 16 of 110
`
`
`
`effective filing date of the claim, regardless of when the applicant conceived of the
`
`claimed invention.
`
`30.
`
`I understand that the ’941 Patent claims a priority date of May 21,
`
`1998.
`
`B.
`
`Overview of Relevant Technology When the ’941 Patent Was
`Filed
`Software Licenses
`1.
`31. By the time of the ’941 Patent’s priority date in 1998, the field of
`
`software licensing was well-developed. Since at least the 1980s, practitioners in
`
`the field had widely recognized the new risks to software piracy introduced by the
`
`transformations to digital media.
`
`32. Many entities recognized that one such risk was “copy protection” or
`
`“secondary distribution.” Secondary distribution contrasted with, for example,
`
`preventing an unauthorized user from obtaining access to a software program in
`
`the first place. Secondary distribution dealt with the more challenging problem of
`
`allowing a user to have an authorized access to the software program but
`
`preventing the user from then making unauthorized copies and distributing those
`
`copies. This problem was more challenging because it required some level of trust
`
`in the user but balanced against the possibility that the user may still have
`
`malicious motivations.
`
`Sony Ex. 1003
`Page 17 of 110
`
`
`
`33.
`
`For secondary distribution, as with other forms of piracy prevention,
`
`encryption was considered a key tool to providing protection. Encryption was a
`
`leading solution for various reasons. Encryption was easy to implement but hard
`
`to break, making it an efficient solution. Encryption also allowed user-specific and
`
`device-specific solutions, given that different devices could be given different
`
`encryption/decryption keys.
`
`34.
`
`European patent Application EP 0766165A2, Ex. B-6 (“’165
`
`Application”), which published in 1997 from an application filed in 1996,
`
`disclosed a license notification system. The ’164 Application disclosed sending
`
`encoded license information to a user terminal, with the license information
`
`encoded with a key specific to the user terminal. The user terminal checks the
`
`license information when the user operates a software program. If the license
`
`information is valid, then the licensee’s name is displayed.
`
`35. U.S. Patent 5,724,425, Ex. B-6 (“’425 Patent”), which issued in 1998
`
`from an application filed in 1994, disclosed a “software passport.” The software
`
`passport was formed by encrypting a message digest using an application writer’s
`
`private key, a license, and the software program binary code. A user’s computer
`
`uses the encrypted message digest and the license to determine if the software
`
`program is secure to operate. The ’425 Patent disclosed this technique to deal with
`
`Sony Ex. 1003
`Page 18 of 110
`
`
`
`the risk of users purchasing pirated software when they thought they were
`
`purchasing legitimate software.
`
`Computer BIOS
`2.
`36. By the time of the ’941 Patent’s priority date in 1998, the field of
`
`computer BIOS was well-developed. BIOS began to be used at least as far back as
`
`the 1970s, for example in 8-bit computers that ran the CP-M operating system.
`
`The usage of BIOS increased rapidly, and by 1998 BIOS was present in essentially
`
`all general-purpose computers, e.g., personal computers and servers. In these
`
`situations, BIOS provided the basic software routines that were run when the
`
`computer was first powered on. One of the primary responsibilities of BIOS was
`
`to load the operating system code and allow it to start executing, often called
`
`“booting” the computer.
`
`37.
`
`For many years, including through to 1998, it was typical to provide
`
`BIOS in a separate memory module, apart from the main memory. These came
`
`about for numerous reasons. As one reason, the BIOS programs needed to be
`
`secure and away from other program code. Namely, accidentally overwriting or
`
`destroying the BIOS program could permanently disable the computer. So storing
`
`it on a separate memory module was considered a good approach. As another
`
`reason, early versions of BIOS were expected to remain static through the life of
`
`the device. As such, it was common to provide BIOS programs in a true read only
`
`Sony Ex. 1003
`Page 19 of 110
`
`
`
`memory (ROM). By “true” ROM, I mean a memory chip that could not have its
`
`contents changed, whether electronically or otherwise. Using true ROM also
`
`provided the benefit of not allowing BIOS to be accidentally modified, which was
`
`beneficial as described above. Additionally, it was advantageous to provide the
`
`BIOS in a non-volatile memory so that it was present when the computer was
`
`powered on.
`
`38. By the 1990s, it became more common to store BIOS programs in
`
`alterable memory, i.e., memory that could be rewritten. This became more
`
`common at least in part because computer manufacturers came to realize that there
`
`was a benefit to being able to modify the BIOS programs “in the field,” as opposed
`
`to have those programs completely static for the life of the devices.
`
`39. Among these forms of rewritable memory, electrically-erasable
`
`programmable read-only memory (EEPROM) was a popular
`
`technology.
`
`EEPROM was considered beneficial for a number of reasons. For one reason,
`
`EEPROM could be rewritten using simple memory access routines that could be
`
`programmatically controlled. This provided the sort of flexibility that computer
`
`manufacturers were seeking. For another reason, EEPROM could be implemented
`
`as “flash memory,” which was both reliable (not prone to unexpected loss of data)
`
`Sony Ex. 1003
`Page 20 of 110
`
`
`
`and cost effective (relatively less expensive than some other rewritable ROM
`
`technologies).
`
`40. U.S. Patent 6,138,236, Ex. B-7 (“’236 Patent”), which issued in 2000
`
`from an application filed in 1996, disclosed the use of both “boot ROM (read only
`
`memory)” and “boot PROM (programmable read only memory).” The ’236 Patent
`
`explained that the boot PROM could be implemented as flash PROM, “often
`
`referred to as flash memory.”
`
`41. U.S. Patent 5,802,592, Ex. B-8 (“’592 Patent”), which issued in 1998
`
`from an application filed in 1996, disclosed a technique for verifying the integrity
`
`BIOS programs stored in “alterable read only memory (such as FLASH ROM).”
`
`42. U.S. Patent 5,835,594, Ex. B-9 (“’594 Patent”), which issued in 1998
`
`from an application filed 1996, disclosed a system for protecting the content, such
`
`as BIOS updates, in “FLASH memory or erasable programmable read-only-
`
`memory (EPROM).”
`
`C.
`43.
`
`The ’941 Patent
`The ’941 Patent describes a “method of restricting software operation
`
`within a license limitation.” ’941 Patent, Abstract. The ’941 Patent explains that
`
`there were many known techniques for restricting the operation of an unauthorized
`
`software program. ’941 Patent, 1:12-17. The ’941 Patent indicates that these
`
`techniques were “primarily motivated by the grand proliferation of illegally copied
`
`Sony Ex. 1003
`Page 21 of 110
`
`
`
`software, which is engulfing the marketplace,” and commented on the large
`
`financial impact of this illegal copying. ’941 Patent, 1:12-17.
`
`44.
`
`The ’941 Patent indicates that one prior art technique involved
`
`“writing a license signature onto the computer’s volatile memory (e.g., hard
`
`disk).” ’941 Patent, 1:19-26. The ’941 Patent explained that this technique was
`
`“very vulnerable to attack at the hands of skilled system’s programmers (e.g.
`
`‘hackers’).” ’941 Patent, 1:19-26.
`
`45.
`
`The ’941 Patent indicates that hardware-based techniques, such as the
`
`use of a “dongle” were “expensive, inconvenient, and not particularly suitable for
`
`software that may be sold by downloading.” ’941 Patent, 1:27-32.
`
`46. Against that backdrop, the ’941 Patent discloses its technique with
`
`respect to a computer configuration shown in Figure 1 and a process shown in
`
`Figure 2.
`
`47.
`
`The computer configuration of Figure 1 (shown below) contains
`
`numerous storage devices. The storage devices include the first non-volatile
`
`memory area 4, the second non-volatile memory area 5, and the volatile memory
`
`area 6. ’941 Patent, Abstract, Figure 1, 5:9-16. The first non-volatile memory area
`
`4 stores a key 8. ’941 Patent, Figure 1, 5:19-24. The second non-volatile memory
`
`area 5 has a license record area 9 with license records 10, 11, 12. ’941 Patent,
`
`Sony Ex. 1003
`Page 22 of 110
`
`
`
`Figure 1, 5:25-33. The volatile memory area 6 include a license program 16,
`
`which has license record field 13, 14, and 15. ’941 Patent, Figure 1, 5:25-33. The
`
`computer can communicate with a license bureau 7. ’941 Patent, Figure 1, 5:17-18.
`
`’941 Patent, Figure 1.
`
`48.
`
`The ’941 Patent provides an example implementation of the invention
`
`in a “conventional computer having a conventional BIOS module.” ’941 Patent,
`
`1:43-52. The computer can have a “ROM section” with a key embedded therein at
`
`Sony Ex. 1003
`Page 23 of 110
`
`
`
`the time of manufacture. ’941 Patent, 1:43-52. “The key constitutes, effectively, a
`
`unique identification code for the host computer.” ’941 Patent, 1:43-52. The key
`
`cannot be removed or modified. ’941 Patent, 1:43-52.
`
`49. An “application program that is to be licensed to run on the specified
`
`computer, is associated with a license record.” ’941 Patent, 1:53-58. “The license
`
`record may be held in either encrypted to explicit form.” ’941 Patent, 1:53-58.
`
`50. A license establishment procedure is then performed. ’941 Patent,
`
`1:59-2:9. “[A] verification structure is set in the BIOS so as to indicate that the
`
`specified program is licensed to run on the specified computer.” ’941 Patent, 1:59