`
`_____________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_____________________________
`
`SONY MOBILE COMMUNICATIONS AB, SONY MOBILE
`COMMUNICATIONS, INC., SONY ELECTRONICS INC., and
`SONY CORPORATION,
`
`Petitioners,
`
`v.
`
`ANCORA TECHNOLOGIES, INC.,
`
`Patent Owner.
`
`
`_____________________________
`
`IPR2021-00663
`
`Patent No. 6,411,941 B1
`
`_____________________________
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 6,411,941
`
`
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`Page
`INTRODUCTION .......................................................................................... 1
`I.
`II. MANDATORY NOTICES ............................................................................ 2
`A.
`Real party-in-interest ............................................................................ 2
`B.
`Related matters ..................................................................................... 3
`C.
`Counsel and Service Information ......................................................... 4
`III. PAYMENT OF FEES .................................................................................... 5
`IV. REQUIREMENTS FOR INTER PARTES REVIEW ................................... 5
`A. Ground for Standing ............................................................................. 5
`B. Overview of Challenge and Relief Requested ..................................... 5
`1.
`Identification of Prior Art .......................................................... 5
`2.
`Grounds for Challenge ............................................................... 6
`3.
`Statutory Grounds of Challenge and Legal Principles .............. 7
`V. DESCRIPTION OF TECHNOLOGY ............................................................ 7
`A. Overview of the Technology ................................................................ 7
`B. Overview of the ’941 Patent ................................................................. 8
`1.
`The Specification and Alleged Invention .................................. 9
`2.
`Prosecution History and Later Proceedings ............................. 14
`3.
`The Challenged Claims ............................................................ 18
`VI. CLAIM CONSTRUCTION ......................................................................... 18
`VII. LEVEL OF ORDINARY SKILL IN THE ART .......................................... 19
`VIII. SPECIFIC GROUNDS FOR PETITION ..................................................... 20
`A. Ground I: Claims 1–2, 11, and 13 were obvious over the
`combined teachings of Hellman and Chou. ....................................... 20
`1.
`Overview of Hellman ............................................................... 20
`2.
`Overview of Chou .................................................................... 25
`3. Motivations to Combine Hellman and Chou ........................... 26
`4.
`Claim 1 preamble: “A method of restricting software
`operation within a license for use with a computer
`
`-i-
`
`
`
`TABLE OF CONTENTS
`(continued)
`
`Page
`
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`including an erasable, non-volatile memory area of a
`BIOS of the computer, and a volatile memory area; the
`method comprising the steps of:” ............................................ 31
`Claim 1.a: “selecting a program residing in the volatile
`memory,” .................................................................................. 33
`Claim 1.b: “using an agent to set up a verification
`structure in the erasable, non-volatile memory of the
`BIOS, the verification structure accommodating data that
`includes at least one license record,” ....................................... 35
`Claim 1.c: “verifying the program using at least the
`verification structure from the erasable non-volatile
`memory of the BIOS, and” ...................................................... 36
`Claim 1.d: “acting on the program according to the
`verification.” ............................................................................ 37
`Claim 2: “A method according to claim 1, further
`comprising the steps of: establishing a license
`authentication bureau.” ............................................................ 37
`10. Claim 11: “A method according to claim 1 wherein the
`volatile memory is a RAM.” .................................................... 38
`11. Claim 13: “The method of claim 1, wherein a unique key
`is stored in a first non-volatile memory area of the
`computer.” ................................................................................ 38
`B. Ground II: Claims 1–3, 6–14, and 16 were obvious over the
`combined teachings of Hellman, Chou, and Schneck. ....................... 39
`1.
`Overview of Schneck ............................................................... 39
`2. Motivations to Combine Hellman, Chou, and Schneck .......... 40
`3.
`Claim 1. preamble: “A method of restricting software
`operation within a license for use with a computer
`including an erasable, non-volatile memory area of a
`BIOS of the computer, and a volatile memory area; the
`method comprising the steps of:” ............................................ 44
`Claim 1.a: “selecting a program residing in the volatile
`memory,” .................................................................................. 44
`
`4.
`
`-ii-
`
`
`
`TABLE OF CONTENTS
`(continued)
`
`5.
`
`Page
`
`
`8.
`
`Claim 1.b: “using an agent to set up a verification
`structure in the erasable, non-volatile memory of the
`BIOS, the verification structure accommodating data that
`includes at least one license record,” ....................................... 45
`Claim 1.c: “verifying the program using at least the
`verification structure from the erasable non-volatile
`memory of the BIOS, and” ...................................................... 47
`Claim 1.d: “acting on the program according to the
`verification.” ............................................................................ 48
`Claim 2: “A method according to claim 1, further
`comprising the steps of: establishing a license
`authentication bureau.” ............................................................ 48
`Claim 3 preamble: “A method according to claim 2,
`wherein setting up a verification structure further
`comprising the steps of:” ......................................................... 48
`10. Claim 3.a: “establishing, between the computer and the
`bureau, a two-way data-communications linkage;” ................. 48
`11. Claim 3.b: “transferring, from the computer to the
`bureau, a request-for-license including an identification
`of the computer and the license-record’s contents from
`the selected program;” ............................................................. 49
`12. Claim 3.c: “forming an encrypted license-record at the
`bureau by encrypting parts of the request-for-license
`using part of the identification as an encryption key;” ............ 52
`13. Claim 3.d: “transferring, from the bureau to the
`computer, the encrypted license-record; and” ......................... 53
`14. Claim 3.e: “storing the encrypted license record in the
`erasable non-volatile memory area of the BIOS.” ................... 53
`15. Claim 6: “A method according to claim 1 wherein
`selecting a program includes the steps of: establishing a
`licensed-software-program in the volatile memory of the
`computer wherein said licensed-software-program
`includes contents used to form the license-record.” ................ 53
`
`6.
`
`7.
`
`9.
`
`-iii-
`
`
`
`TABLE OF CONTENTS
`(continued)
`
`Page
`
`
`16. Claim 7 preamble: “A method according to claim 6
`wherein using an agent to set up the verification structure
`includes the steps of:” .............................................................. 54
`17. Claim 7.a: “establishing or certifying the existence of a
`pseudo-unique key in a first non-volatile memory area of
`the computer; and” ................................................................... 54
`18. Claim 7.b: “establishing at least one license-record
`location in the first nonvolatile memory area or in the
`erasable, non-volatile memory area of the BIOS.” .................. 54
`19. Claim 8 preamble: “A method according to claim 6
`wherein establishing a license-record includes the steps
`of:” ............................................................................................ 55
`20. Claim 8.a: “forming a license-record by encrypting of the
`contents used to form a license-record with other
`predetermined data contents, using the key; and” ................... 55
`21. Claim 8.b: “establishing the encrypted license-record in
`one of the at least one established license-record
`locations.” ................................................................................ 56
`22. Claim 9 preamble: “A method according to claim 7
`wherein verifying the program includes the steps of:” ............ 56
`23. Claim 9.a: “encrypting the licensed-software-program's
`license-record contents from the volatile memory area or
`decrypting the license-record in the erasable, non-volatile
`memory area of the BIOS, using the pseudo-unique key;
`and” .......................................................................................... 56
`24. Claim 9.b: “comparing the encrypted licenses-software-
`program’s license-record contents with the encrypted
`license-record in the erasable, non-volatile memory area
`of the BIOS, or comparing the license-software-
`program's license-record contents with the decrypted
`license-record in erasable non-volatile memory area of
`the BIOS.” ................................................................................ 57
`25. Claim 10: “A method according to claim 9 wherein
`acting on the program includes the step: restricting the
`
`-iv-
`
`
`
`TABLE OF CONTENTS
`(continued)
`
`Page
`
`
`program's operation with predetermined limitations if the
`comparing yields non-unity or insufficiency.” ........................ 58
`26. Claim 11: “A method according to claim 1 wherein the
`volatile memory is a RAM.” .................................................... 58
`27. Claim 12: “The method of claim 1, wherein a pseudo-
`unique key is stored in the non-volatile memory of the
`BIOS.” ...................................................................................... 59
`28. Claim 13: “The method of claim 1, wherein a unique key
`is stored in a first non-volatile memory area of the
`computer.” ................................................................................ 60
`29. Claim 14: “The method according claim 13, wherein the
`step of using the agent to set up the verification record,
`including the license record, includes encrypting a
`license record data in the program using at least the
`unique key.” ............................................................................. 60
`30. Claim 16: “The method according to claim 13, wherein
`the step of verifying the program includes a decrypting
`the license record data accommodated in the erasable
`second non-volatile memory area of the BIOS using at
`least the unique key.” ............................................................... 60
`IX. THE BOARD SHOULD EXERCISE ITS DISCRETION TO
`INSTITUTE REVIEW ................................................................................. 61
`CONCLUSION ............................................................................................. 64
`
`X.
`
`
`
`-v-
`
`
`
`
`
`
`
`Ex. 1001
`
`Ex. 1002
`
`Ex. 1003
`
`Ex. 1004
`
`Ex. 1005
`
`Ex. 1006
`
`Ex. 1007
`
`Ex. 1008
`
`Ex. 1009
`
`Ex. 1010
`
`Ex. 1011
`
`Ex. 1012
`
`Ex. 1013
`
`Ex. 1014
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`
`EXHIBIT LIST
`
`U.S. Patent No. 6,411,941 to Mullor et al. (“’941 Patent”)
`
`Image File Wrapper of U.S. Patent No. 6,411,941 (“File
`History”)
`
`Declaration of Andrew Wolfe, Ph.D. (“Wolfe Decl.”)
`
`U.S. Patent No. 4,658,093 (“Hellman”)
`
`U.S. Patent No. 5,892,906 (“Chou”)
`
`U.S. Patent No. 5,933,498 (“Schneck”)
`
`Reserved
`
`Reserved
`
`Reserved
`
`Reserved
`
`Claim Construction Order, Ancora Techs., Inc. v. Apple Inc., No.
`4:11-cv-06357 (N.D. Cal. Dec. 31, 2012) (ECF No. 107).
`
`Final Claim Constructions of the Court, Ancora Techs., Inc. v.
`LG Elecs., Inc., No. 1:20-cv-00034 (W.D. Tex. June 2, 2020)
`(ECF No. 69).
`
`Supplemental Claim Construction Order, Ancora Techs., Inc. v.
`LG Elecs., Inc., No. 1:20-cv-00034 (W.D. Tex. Aug. 19, 2020)
`(ECF No. 93).
`
`Joint Claim Construction and Prehearing Statement, Ancora
`Techs., Inc. v. TCT Mobile (US), Inc., No. 8:19-cv-2192 (C.D.
`Cal. July 17, 2020) (ECF No. 49).
`
`x
`
`Declaration of Dr. Erez Zadok
`
`-vi-
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`Pursuant to 35 U.S.C. § 311 and 37 C.F.R. § 42.100, Petitioners request
`
`
`
`
`inter partes review (“IPR”) of U.S. Patent No. 6,411,941 (Ex. 1001).
`
`I.
`
`INTRODUCTION
`The ’941 Patent generally relates to methods for restricting unauthorized
`
`software operation. Specifically, the ’941 Patent claims such a method by storing a
`
`license record in the BIOS memory, which purportedly overcame deficiencies
`
`using a software-based prior art method where a license record was stored in
`
`“volatile memory (e.g., hard disk)” and a hardware-based prior art method. ’941
`
`Patent at 1:10-42. Indeed, storing a license record for a program in the BIOS
`
`memory, and not just any non-volatile memory, is the supposed improvement of
`
`the ‘941 Patent claims over the prior art in prosecution, an ex parte reexamination,
`
`a covered business method review, and two Federal Circuit appeals; even though
`
`those proceedings conceded that a “license record” and “BIOS memory” were both
`
`conventional. But the storage of license records in a BIOS memory was not a
`
`patentable distinction over the prior art as of the priority date in 1998, as
`
`Petitioners demonstrate with the use of three prior art references, Hellman, Chou,
`
`and Schneck.
`
`While the ’941 Patent has been litigated in district court and at the Patent
`
`Office in numerous cases, its invalidity based on prior art publications has been
`
`
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`considered in only one of these proceedings. Neither of the Federal Circuit appeals
`
`considered prior art invalidity. One appeal was limited to claim construction
`
`issues, and one appeal was limited to patent eligibility. The covered business
`
`method review was denied institution on the basis that the ’941 Patent was not
`
`eligible for covered business method review. Despite the Patent Owner having
`
`asserted the ’941 Patent against 10 entities over the course of more than 10 years,
`
`the invalidity of the ’941 Patent’s claims has only been considered on the merits in
`
`one instance, an ex parte reexam.
`
`Petitioners submit that, when fully considered on the merits, the prior art
`
`demonstrates that storing information, a license record or otherwise, in the BIOS
`
`memory, that is used in a method to restrict unauthorized operation of software,
`
`was well-known as a way to provide increased protection against tampering with
`
`that information by, e.g., a software hacker. Petitioners demonstrate through the
`
`combinations of Hellman, Chou, and Schneck that a person of ordinary skill in the
`
`art at the time of the invention (POSA) would have found all challenged claims
`
`obvious.
`
`For the reasons described herein, Petitioners request institution of an inter
`
`partes review and cancellation of all challenged claims of the ’941 Patent.
`
`II. MANDATORY NOTICES
`A. Real party-in-interest
`
`2
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`
`Sony Mobile Communications AB, Sony Mobile Communications, Inc.,
`
`Sony Electronics Inc. (successor in interest to Sony Mobile Communications
`
`(USA), Inc.), and Sony Corporation (collectively, “Petitioners”) are real parties-in-
`
`interest.
`
`B. Related matters
`Patent Owner asserts that Petitioners Sony Mobile Communications AB,
`
`Sony Mobile Communications, Inc., and Sony Mobile Communications (USA),
`
`Inc. infringe the ’941 Patent in Ancora Technologies, Inc. v. Sony Mobile
`
`Communications AB et al., No. 1:19-1703 (CFC) (D. Del.) in which the complaint
`
`was filed on September 11, 2019. Petitioners request their Petition be instituted and
`
`joined pursuant to 35 U.S.C. § 315(c) and 37 C.F.R. §§ 42.22 and 42.122(b) with
`
`the inter partes review proceeding initiated concerning the ’941 patent: TCT
`
`Mobile (US) Inc. v. Ancora Technologies, Inc., IPR2020-01609, which was
`
`instituted February 16, 2021
`
`Patent Owner has asserted the ’941 Patent against the parties in the
`
`following currently-pending district-court lawsuits: Ancora Technologies, Inc. v.
`
`TCT Mobile (US) Inc., No. 8:19-cv-02192 (C.D. Cal.); Ancora Technologies, Inc.
`
`v. Lenovo Group Limited, No. 1:19-cv-01712 (D. Del.); Ancora Technologies, Inc.
`
`v. Sony Corp., No. 1:19-cv-01703 (D. Del.); Ancora Technologies, Inc. v. LG
`
`Electronics, Inc., No. 1:20-cv-00034 (W.D. Tex.); Ancora Technologies, Inc. v.
`
`3
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`
`Samsung Electronics Co., Ltd., No. 6:19-cv-00385 (W.D. Tex.); Ancora
`
`Technologies, Inc. v. HTC America, Inc., No. 2:16-cv-01919 (W.D. Wash.).
`
`Samsung Electronics Co., Ltd., et al. filed a petition for inter partes review
`
`against the ’941 Patent on June 25, 2020, IPR2020-01184, which was
`
`discretionarily denied on January 5, 2021.
`
`More recent petitions for inter partes review against the ’941 Patent were
`
`filed as follows: (1) IPR2021-00570 filed on February 19, 2010 by HTC
`
`Corporation et al.; (2) IPR2021-00583 filed on February 23, 2021 by Samsung
`
`Electronics, Co., Ltd. et al.; and (3) IPR2021-00581 filed February 23, 2021 by LG
`
`Electronics, Inc. et al. All of these petitions are pending and all petitioners seek to
`
`join the instituted TCT IPR Petition.
`
`C. Counsel and Service Information
`Lead counsel is Gregory S. Gewirtz (Reg. No. 36,522), and backup counsel
`
`is Jonathan A. David (Reg. No. 36,494). Service information is Lerner, David,
`
`Littenberg, Krumholz & Mentlik, LLP, 20 Commerce Drive, Cranford, NJ 07016,
`
`Tel.: 908-654-5000, Fax: 908-654-7866. Petitioners consent to electronic service
`
`by email: litigation@lernerdavid.com; ggewirtz@lernerdavid.com;
`
`jdavid@lernerdavid.com. A power of attorney is being filed concurrently.
`
`4
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`
`III. PAYMENT OF FEES
`The Office is authorized to charge any fees due during this proceeding to
`
`Deposit Account No. 121095.
`
`IV. REQUIREMENTS FOR INTER PARTES REVIEW
`A. Ground for Standing
`Petitioners certify that the ’941 Patent is available for IPR and that
`
`Petitioners are not barred or estopped from requesting IPR challenging claims of
`
`the ’941 Patent on the grounds presented here.
`
`B. Overview of Challenge and Relief Requested
`Pursuant to Rules 42.22(a)(1) and 42.104(b)(1)–(2), Petitioners request
`
`cancellation of claims 1–3, 6–14, and 16 of the ’941 Patent under pre-AIA 35
`
`U.S.C. § 103.
`
`1.
`Identification of Prior Art
`Petitioners rely upon the references listed in the Table of Exhibits, including:
`
`U.S. Patent No. 4,658,093 (“Hellman” (Ex. 1004)), issued on April 14, 1987
`
`from an application filed on July 11, 1983. Hellman is prior art under pre-AIA 35
`
`U.S.C. § 102(b).
`
`U.S. Patent No. 5,892,906 (“Chou” (Ex. 1005)), issued on April 6, 1999
`
`from an application filed on July 19, 1996. Chou is prior art under pre-AIA 35
`
`U.S.C. § 102(e).
`
`5
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`
`U.S. Patent No. 5,933,498 (“Schneck” (Ex. 1006)), issued on August 3,
`
`1999 from an application filed on November 5, 1997 and that claims priority to an
`
`application filed on January 11, 1996. Schneck is prior art under pre-AIA 35
`
`U.S.C. § 102(e).
`
`Hellman, Chou, and Scheck were not in front of the Patent Office during the
`
`original examination, the ex parte reexamination, or the covered business method
`
`review of the ’941 Patent.
`
`2. Grounds for Challenge
`
`Ground
`1
`2
`
`Basis
`§ 103
`§ 103
`
`Reference(s)
`Hellman, Chou
`Hellman, Chou, Schneck
`
`Challenged
`Claims
`1–2, 11, 13
`1–3, 6–14, and 16
`
`This Petition, supported by the declaration of Dr. Erez Zadok1 (“Zadok
`
`
`
`Decl.” (Ex. 1015)), demonstrates that there is a reasonable likelihood that
`
`Petitioners will prevail with respect to cancellation of at least one challenged
`
`claim. See 35 U.S.C. § 314(a).
`
`
`1 Sony has retained Dr. Erez Zadok in this proceeding. See Ex. 1015. Dr. Zadok
`
`has adopted the opinions set forth in Ex. 1003, the declaration of Dr. Wolfe, as his
`
`own. Ex. 1015, ¶ 32. While Sony is not relying directly on Dr. Wolfe’s declaration
`
`in this Petition, for expediency this Petition cites only to Ex. 1003.
`
`6
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`
`3.
`Statutory Grounds of Challenge and Legal Principles
`This Petition requests cancellation of claims 1–3, 6–14, and 16 of the ’941
`
`Patent under pre-AIA 35 U.S.C. § 103.
`
`V. DESCRIPTION OF TECHNOLOGY
`A. Overview of the Technology
`By the time of the ’941 Patent’s priority date in 1998, the field of software
`
`licensing was well-developed. Wolfe Decl. ¶¶ 31–35. For more than a decade
`
`prior, practitioners in the field had widely recognized the new risks to software
`
`piracy introduced by the transformations to digital media. Id.
`
`Many entities recognized that one such risk was “copy protection” or
`
`“secondary distribution.” Id. This referred to the situation where a user received a
`
`valid license for a software program, but the user then duplicated the program
`
`and/or the license so as to use it in an unauthorized fashion for more uses, on more
`
`computers, etc. Id. This problem was of particular interest to practitioners because
`
`it required the software owner to provide enough trust to the user to perform at
`
`least one authorized use, as opposed to providing no trust or unlimited trust. Id.
`
`While many solutions were developed, a common theme was to use some
`
`form of encryption to reduce unauthorized secondary distribution of the software
`
`program. Id.
`
`7
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`
`Similarly, by 1998, the field of computer BIOS was well-developed. Wolfe
`
`Decl. ¶¶ 36–42. Nearly all consumer end user devices contained a BIOS program
`
`that was used to start up the device at power-on time. Id. Early personal
`
`computers tended to store BIOS programs in separate, true ROM (read only
`
`memory) memory module, i.e., memory that could not be re-written in the field.
`
`Id. By the 1990s, it was more common to store BIOS programs in “ROM” that
`
`could actually be rewritten in some form. Id. Early forms of this rewritable ROM
`
`often required physically accessing the memory chip with a special device. Id.
`
`By the ’941 Patent’s priority date in 1998, electrically-erasable
`
`programmable read-only memory (EEPROM) was a popular medium for BIOS
`
`memory. Id. EEPROM chips had the benefit of being re-writable by software
`
`without the need to remove the chip from the computer. Id. This aspect of
`
`EEPROM was considered beneficial because it became common prior to the ’941
`
`priority date in 1998 for device manufacturers to provide updates to BIOS while
`
`the devices were in the field. Id. EEPROM allowed that functionality. Id.
`
`B. Overview of the ’941 Patent
`The ’941 Patent issued from U.S. Patent Application No. 09/164,777, filed
`
`on October 1, 1998. It claims priority to Israeli Patent Application 124571, which
`
`was filed on May 21, 1998. ’941 Patent, Cover Page. Therefore, the priority date
`
`of the ’941 Patent is no earlier than May 21, 1998.
`
`8
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`
`1.
`The Specification and Alleged Invention
`The ’941 Patent invention is directed to “restricting an unauthorized
`
`software program’s operation.” ’941 Patent at 1:6–8. The ’941 Patent recognizes
`
`that it was known in the field to store a “license signature” for a program in a
`
`computer’s “volatile memory (e.g. hard disk).”2 Id. at 1:19–21. The ’941 Patent
`
`alleges that such techniques were “appropriate for restricting honest software
`
`users,” but they were “vulnerable to attack at the hands of skilled system’s
`
`programmers (e.g. ‘hackers’).” Id. at 1:21–24.
`
`The ’941 Patent proposes to solve this problem based on “the use of a key
`
`and of a record, which have been written into the non-volatile memory of a
`
`computer.” Id. at 1:38–43. The “key” is stored “during manufacture” in a “ROM
`
`section” of a “BIOS module,” and it “constitutes, effectively, a unique
`
`identification code for the host computer.” Id. at 1:44–52. The “license record” is
`
`stored in “another (second) non-volatile section of the BIOS, e.g. E2PROM (or the
`
`
`2 Despite this contradictory example (i.e., that a hard disk is exemplary of volatile
`
`memory), the Federal Circuit held that “volatile memory” has its ordinary
`
`meaning, Ancora Technologies, Inc. v. Apple, Inc., 744 F.3d 732, 739 (Fed. Cir.
`
`2014), such as “memory whose data is not maintained when the power is
`
`removed,” id. at 737.
`
`9
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`
`ROM).”3 Id.at 1:59–2:1. The ’941 Patent distinguishes the storage location of the
`
`key and the license record: “It should be noted that unlike the first non-volatile
`
`section, the data in the second non-volatile memory may optionally be erased or
`
`modified (using E2PROM manipulation commands), so as to enable to add, modify
`
`or remove licenses.” Id. 2:1–5. The key is used to encrypt the license record,
`
`creating a locally stored, device-specific license record for the program under
`
`license. Id. at 1:59–2:26.
`
`The ’941 Patent alleges two primary benefits of the invention. First, by
`
`encrypting the license record with a key unique to the host computer and stored in
`
`ROM, a program licensed for one computer cannot simply be transferred with the
`
`license record to another computer, because the key for the second computer will
`
`be different. Id. at 2:27–47. “It is important to note that the hacker is unable to
`
`modify the key in the ROM of the second computer to” the key of the first
`
`computer because “the contents of the ROM is established during manufacture and
`
`is practically invariable.” Id. at 2:42–47.
`
`Second: “An important advantage in utilizing non-volatile memory such as
`
`that residing in the BIOS is that the required level of system programming
`
`expertise that is necessary to intercept or modify commands, interacting with the
`
`
`3 E2PROM is another spelling of EEPROM.
`
`10
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`
`BIOS, is substantially higher than those needed for tampering with data residing in
`
`volatile memory such as hard disk.” Id. at 3:4–9. In other words, because
`
`manipulation of E2PROM was more difficult than manipulation of the device’s
`
`RAM or hard disk, the license record could be stored in E2PROM to make it more
`
`tamper proof. Id. at 3:4–17.
`
`The alleged invention is depicted with respect to Figure 1 of the ’941 Patent,
`
`shown below. The first non-volatile memory (4)—“e.g. the ROM section of the
`
`BIOS,” id. at 5:9–16—stores a key (8). The second non-volatile memory (5)—
`
`“e.g. the E2PROM section of the BIOS,” id.—stores license records (10, 11, 12).
`
`The volatile memory (6)—“e.g. the internal RAM memory of the computer,” id.—
`
`stores a license program (16).
`
`11
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`
`’941 Patent at Fig. 1 (annotated by Petitioner).
`With respect to Figure 2, shown below, the ’941 Patent describes a method
`
`
`
`for using the structures described above to effectuate the alleged invention.
`
`12
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`
`’941 Patent at Fig. 2.
`At the selecting (17) step, “a licensed-software-program” is established in
`
`
`
`the volatile memory.” Id. at 6:7–16.
`
`At the setting up (18) step, a “pseudo-unique key” is established (or certified
`
`to already exist) in the first non-volatile memory. Id. at 6:18–21. Further, a
`
`“license-record location” is established in the first or the second non-volatile
`
`memory area,” id., which action includes using the key to form an “encrypted
`
`license-record” in the license-record location, id. at 6:22–27.
`
`13
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`At the verifying (19) step, the license record established in the license-record
`
`location is compared to a result of using the key to encrypt information from the
`
`licensed-software-program. Id. at 6:28–39.
`
`At the acting (20) step, an action, such as “restricting the program’s
`
`operation,” is performed in response to the comparison from the verifying (19)
`
`step, such as if the comparison shows the two values are unequal. Id. at 6:40–52.
`
`Thus, using the structures described with respect to Figure 1 and the process
`
`described with respect to Figure 2, the ’941 Patent’s alleged invention is providing
`
`a license record unique to a specific computer and stored in a harder-to-modify
`
`memory device, BIOS memory, such as BIOS E2PROM, and not just any non-
`
`volatile memory. With these aspects, the invention allowed device-specific, more
`
`tamperproof software licensing.
`
`2.
`Prosecution History and Later Proceedings
`Claim 1 as originally filed covered setting up a verification structure in two
`
`non-volatile memories, and verifying a program in volatile memory based thereon.
`
`See ’941 File Wrapper, Claims, dated Oct. 1, 1998, p. 1.
`
`During prosecution, the Applicant amended claim 1 to change the “setting
`
`up . . .” step to a “using an agent to set up . . .” step. See ’941 File Wrapper, Office
`
`Action Response, dated Dec. 6, 2001, p. 10 (unnumbered page following page 9).
`
`The Applicant also amended the claims to recite, as in its ultimately issued form,
`
`14
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`
`that the verification structure was stored “in the erasable, non-volatile memory of
`
`the BIOS.” Id. The Applicant later argued that this storing of the license record in
`
`the memory of the BIOS was what distinguished claim 1 over the prior art of
`
`record. See ’941 File Wrapper, Office Action Response, dated Feb. 5, 2002, pp. 3–
`
`7. The Applicant alleged that this storage in the memory of the BIOS was
`
`unknown in the prior art both because “[t]here is no OS support whatsoever to
`
`write data to the system BIOS,” and because “no file system is associated with the
`
`BIOS.” Id. at 6.
`
`The Examiner allowed the claims based on this distinction. The prior art of
`
`record disclosed, for instance, a licensing software that stored licenses in a device’s
`
`ordinary “persistent non-volatile storage,” ’941 File Wrapper, Notice of
`
`Allowance, dated Mar. 28, 2002, p. 3 (citing U.S. Pat. No. 6,189,146 at 12:8–31),
`
`and “the use of BIOS memory for storing licensing numbers,” id. at 4 (citing U.S.
`
`Pat. No. 5,479,639). But, according to the Examiner, the prior art failed to show
`
`“licensed programs running at the OS level interacting with a program verification
`
`structure stored in the BIOS . . . [.]” Id. at 4. “Further, it is well known to those of
`
`ordinary skill of the art that a computer BIOS is not setup to manage a software
`
`license verification structure.” Id. According to the Examiner, the ’941 Patent
`
`solved that problem by using the “agent” to set up the verification structure in the
`
`memory of the BIOS. Id.
`
`15
`
`
`
`Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`PTAB Case No. IPR2021-00663
`
`
`The ’941 Patent was subject to an ex parte reexamination identified by
`
`Control Number 90/010,560. The prior art submitted by the requester, U.S. Pat.
`
`No. 5,734,819 (“Lewis”), did disclose license information stored in the non-
`
`volatile memory of a BIOS. See ’560 Reexam File Wrapper, Notice of Intent to
`
`Issue Reexam Certificate, dated Mar. 9, 2010, p. 4 (“NIIRC”). But the Examiner
`
`found that Lewis fell short of discl