throbber
Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 1 of 87
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`AUSTIN DIVISION
`
`ANCORA TECHNOLOGIES, INC.,
`
`CIVIL ACTION NO. 1:20-cv-0034
`
`Plaintiff,
`
`v.
`
`LG ELECTRONICS INC. and LG
`ELECTRONICS U.S.A., INC.,
`
`Defendants.
`
`JURY TRIAL DEMANDED
`
`ANCORA TECHNOLOGIES, INC.,
`
`CIVIL ACTION NO. 1:20-cv-0034
`
`Plaintiff,
`
`
`
`v.
`
`JURY TRIAL DEMANDED
`
`SAMSUNG ELECTRONICS CO., LTD. and
`SAMSUNG ELECTRONICS AMERICA,
`INC.,
`
`Defendants.
`
`DECLARATION OF EREZ ZADOK, PH.D. IN SUPPORT
`OF CLAIM CONSTRUCTION FOR U.S. PATENT NO. 6,411,941
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 2 of 87
`
`Table of Contents
`
`I.
`
`II.
`
`INTRODUCTION .............................................................................................................. 1
`
`BACKGROUND AND QUALIFICATIONS .................................................................... 1
`
`III. MATERIALS CONSIDERED ........................................................................................... 8
`
`IV.
`
`LEGAL STANDARDS ...................................................................................................... 9
`
`A.
`
`B.
`
`Background Principles ............................................................................................ 9
`
`Means-Plus-Function .............................................................................................. 9
`
`PERSON OF ORDINARY SKILL IN THE ART (“POSITA”) ...................................... 10
`
`BACKGROUND OF THE ’941 TECHNOLOGY ........................................................... 11
`
`V.
`
`VI.
`
`VII. OPINIONS ........................................................................................................................ 16
`
`A.
`
`The Term “Agent” Does Not Connote Sufficient Structure ................................. 17
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 3 of 87
`
`I, Erez Zadok, Ph.D. declare as follows:
`
`I.
`
`INTRODUCTION
`
`1.
`
`I have been retained as a technical consultant by Defendants LG Electronics Inc.,
`
`LG Electronics U.S.A., Inc., Samsung Electronics Co., Ltd., and Samsung Electronics America,
`
`Inc. I have been asked by counsel for Defendants to provide certain opinions and views related
`
`to U.S. Patent No. 6,411,941 (the “’941 patent”) in this declaration.
`
`2.
`
`I am over 18 years of age. I have personal knowledge of the facts stated in this
`
`Declaration and could testify competently to them if asked to do so.
`
`3.
`
`My findings and opinions in this matter are based on my education, experience,
`
`and background in the field. My opinion and the underlying reasoning for this opinion is set
`
`forth below.
`
`II.
`
`BACKGROUND AND QUALIFICATIONS
`
`4.
`
`I am a Professor in the Computer Science Department at Stony Brook University
`
`(part of the State University of New York (“SUNY”) system). I direct the File-systems and
`
`Storage Lab (FSL) at Stony Brook’s Computer Science Department. My research interests
`
`include file systems and storage systems, operating systems, information technology and system
`
`administration, security and information assurance, networking, energy efficiency, performance
`
`and benchmarking, compilers, applied machine learning, and software engineering.
`
`5.
`
`I studied at a professional high school in Israel, focusing on electrical engineering
`
`(“EE”), and graduated in 1982. I spent one more year at the high school’s college division,
`
`receiving a special Certified Technician’s degree in EE. I then went on to serve in the Israeli
`
`Defense Forces for three years (1983–1986). I received my Bachelor of Science degree in
`
`computer science (“CS”) in 1991, my Master’s degree in CS in 1994, and my Ph.D. in CS in
`
`2001—all from Columbia University in New York.
`
`1
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 4 of 87
`
`
`
`6.
`
`When I began my undergraduate studies at Columbia University, I also started
`
`working as a student assistant in the various campus-wide computer labs, eventually becoming
`
`an assistant to the head labs manager, who was managing all public computer labs on campus.
`
`During that time, I also became more involved with research within the CS Department at
`
`Columbia University, conducting research on operating systems, file and storage systems,
`
`security, and other topics. I also assisted the CS department’s computer administrators in
`
`managing the department’s computers, which included storage, IT, networking, and cyber-
`
`security related duties.
`
`7.
`
`During the late 1980’s, I became exposed to and aware of information assurance
`
`topics. As the then fledgling Internet was growing in popularity, so were cyber-attacks of
`
`various sorts. For example, I was an undergraduate student working on computer programming
`
`assignments when the infamous “Morris Worm” hit the Internet in November of 1988.
`
`8.
`
`In 1991, I joined Columbia University’s CS department as a full-time systems
`
`administrator, studying towards my MS degree part-time. My MS thesis topic related to file
`
`system reliability, fault tolerance, replication, and failover in mobile networked systems. My
`
`main duties as a systems administrator involved installing, configuring, and managing many
`
`networked servers, proxies, and desktops running several operating systems, as well as network
`
`devices setup; this included many hardware upgrades, device upgrades, and BIOS
`
`firmware/chipset updates/upgrades. My duties also included ensuring reliable, secure,
`
`authenticated access to networked systems and licensed software, as well as software updates,
`
`security and bug fixes. Examples of servers and their protocols included email (SMTP), file
`
`transfer (FTP), domain names (DNS), network file systems (NFS), network news systems
`
`(NNTP), and Web (HTTP).
`
`2
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 5 of 87
`
`9.
`
`In 1994, I left my systems administrator position to pursue my doctoral studies at
`
`Columbia University. My Ph.D. thesis topic was on versatile file system development, with
`
`examples in the fields of security and encryption, efficiency, reliability, and failover. I continued
`
`to work part-time as a systems administrator at the CS department, and eventually I was asked to
`
`serve as manager to the entire information technology (“IT”) staff. From 1991 to 2001, I was a
`
`member of the faculty-level Facilities Committee that oversaw all IT operations at the CS
`
`department. During this entire time, topics of information assurance and software protection
`
`became more prominent and time-consuming in the lives of system administrators worldwide,
`
`and my work at Columbia was no different. For example, configuring/maintaining firewalls and
`
`proxies and applying security patches, and [re]licensing software, became more important and a
`
`dominant part of everyday IT duties, as well as defending against a growing list of copyright
`
`violations and malicious software threats (e.g., viruses, worms, Trojans, spyware, and more).
`
`10.
`
`As part of my Ph.D. studies at Columbia, I collaborated on projects to develop
`
`advanced AI-like techniques to detect previously unknown viruses (a.k.a. “zero-day malware”),
`
`using data mining and rule-based detection. This work led to several highly cited papers (1,100
`
`citations for one of the papers alone), and two patents. I also became a Teaching Assistant (TA)
`
`for a first-ever Computer Security course given at Columbia University’s CS department with
`
`Dr. Matt Blaze as instructor.
`
`11.
`
`From 1990 to 1998, I consulted for SOS Corporation and HydraWEB
`
`Technologies, as a systems administrator and programmer, managing data storage use and
`
`backup/restore duties, as well as information assurance and cyber-security (e.g., malware
`
`protection, software licensing). From 1994 to 2000, I led projects at HydraWEB Technologies,
`
`and then became the Director of Software Development—overseeing the development of several
`
`3
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 6 of 87
`
`products and appliances such as stateful firewalls and HTTP load-balancers. Since 2009, I have
`
`consulted for Packet General Networks, a startup specializing in secure storage and applications’
`
`data security.
`
`12.
`
`In 2001, I joined the faculty of Stony Brook University, a position I have held
`
`since. In 2002, I joined the Operations Committee, which oversees the IT operations of the CS
`
`department at Stony Brook University. From 2006 to 2010, I was the Director of IT Operations
`
`of the CS department; my day-to-day duties include setting policies regarding computing, hiring
`
`and training new staff, assisting any staff with topics of my specialty, defining requirements for
`
`new software/hardware, and purchasing. From 2010 to 2015, I have served as the Co-Chair to
`
`the Operations Committee. From 2016 to 2019, I oversaw the IT Operations as the Chair of the
`
`Operations Committee. A significant component of these duties included defining and helping
`
`implement policies for access control, firewalling, software licensing, anti-malware, anti-denial-
`
`of-service, and intrusion prevention—so as to ensure the security of users and their data, while
`
`minimizing the inconvenience and performance impact to users. These duties include protecting
`
`users from external threats as well as protecting the outside world from inside threats (e.g.,
`
`infected laptops that start to spam outsiders or steal and transmit sensitive information). Since
`
`late 2019, I’ve been a member of the department’s Executive Committee that also oversees all IT
`
`operations.
`
`13.
`
`In 2017, I became the department’s Graduate Academic Adviser, advising all
`
`Masters students (over 400 on average) and many other graduate students on an assortment of
`
`matters.
`
`14.
`
`Since 2001, I personally configured and managed my own research lab’s network.
`
`This includes setting up and configuring a bi-directional Linux based stateful packet firewall,
`
`4
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 7 of 87
`
`Web proxies, SSL-based services (secure HTTP, email, etc.), and Denial-of-Service prevention
`
`techniques. I’ve personally installed, configured, changed, replaced parts, and upgraded
`
`components in numerous devices from laptops to servers.
`
`15.
`
`Throughout the 1990’s and at least until 2004, I continued to personally use,
`
`install, configure, and train others on anti-malware software to protect users from viruses,
`
`Trojans, worms, spyware, and more. I’ve personally used software from Norton, Symantec,
`
`Trend Micro, McAfee, and others. I’ve used this software on Microsoft Windows, Linux
`
`systems, and on Apple Mac OS systems.
`
`16.
`
`Since 1995, I have taught courses on operating systems, storage and file systems,
`
`advanced systems programming in Unix/C, systems administration, data structures, data/software
`
`security, and more. My courses often use storage, file systems, distributed systems, and
`
`system/network security as key teaching principles and practical examples for assignments and
`
`projects. I have taught these concepts and techniques to my students, both to my direct advisees
`
`as well as in my courses. For example, in my graduate Operating Systems course, I often cover
`
`Linux’s kernel mechanisms to protect users, applications, and data files. And in the System
`
`Administration undergraduate course, I covered many topics such as networking, firewalling,
`
`and cyber-security—including configuring and maintaining site security policies, DDoS
`
`handling, and the impact on anti-malware scanners on system performance.
`
`17. My research often investigates computer systems from many angles: security,
`
`efficiency, energy use, scalability, reliability, portability, survivability, usability, ease-of-use,
`
`versatility, flexibility, and more. My research gives special attention to balancing five often-
`
`conflicting aspects of computer systems: performance, reliability, energy use, security, and ease-
`
`of-use. Since joining Stony Brook University in 2001, my group in the File-systems and Storage
`
`5
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 8 of 87
`
`
`
`Lab (FSL) has developed many file systems and operating system extensions; examples include
`
`a highly-secure cryptographic file system, a portable copy-on-write (COW) versioning file
`
`system, a tracing file system useful to detect intrusions, a replaying file system useful for
`
`forensics, a snapshotting and sandboxing file system, a namespace unification file system (that
`
`uses stackable, file-based COW), an anti-virus file system, an integrity-checking file system, a
`
`load balancing and replication/mirroring file system, network file system extensions for security,
`
`distributed secure cloud-based storage systems, a compiler to convert user-level C code to in-
`
`kernel efficient yet safe code, GCC plugins, stackable file system templates, and a Web-based
`
`backup system. I continue to maintain and release newer versions of some of these file systems
`
`and software.
`
`18.
`
`I have published over 120 refereed publications (in ACM, IEEE, USENIX, and
`
`more). To date, my publications have been cited more than 7,500 times (as per Google Scholar
`
`as of March 15, 2020). My papers cover a wide range of related technologies such as file
`
`systems, storage systems, security, performance benchmarking and optimization, energy
`
`efficiency, system administration, and more. I also published a book entitled “Linux NFS and
`
`Automounter Administration” (Sybex, 2001), covering systems administration topics related to
`
`network storage and data security.
`
`19.
`
`Some of my research has led to public software releases that have been used
`
`worldwide. I have publicly maintained the Amd Berkeley Automounter in a package called
`
`“am-utils” since 1992; this software helps administrators manage the multitude of file system
`
`mounts on dozens of different Unix systems. Since 1997, I have maintained and released several
`
`stackable file system software projects for Linux, FreeBSD, and/or Solaris, in a package called
`
`FiST. One of my stackable file system encryption projects, called Cryptfs, became the basis for
`
`6
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 9 of 87
`
`
`
`IBM’s public release of eCryptfs, now part of Linux. Packet General Networks, for whom I
`
`have provided consulting services since 2009, licensed another encryption file system called
`
`Ncryptfs. Another popular file system released in 2003, called Unionfs, offers namespace
`
`unification, transparent shadow copying (a.k.a. copy-on-write or COW), file system snapshotting
`
`(e.g., useful for forensics), and the ability to save disk space by sharing a read-only copy of data
`
`among several computers, among other features.
`
`20. My research and teaching make extensive use of security features. For example,
`
`each time I taught the graduate operating system course, the first homework assignment includes
`
`the creation of a new system call that performs new or added functionality, often for encrypting a
`
`file or verifying its integrity; many of my other assignments cover topics of user/process access
`
`control, anti-virus filtering, and more. Since 2001, over 1,000 graduate students were exposed to
`
`these simple principles directly through my teaching and research at Stony Brook University.
`
`21.
`
`In another, undergraduate course titled “Advanced Systems Programming in
`
`Unix/C,” I cover many topics of system security and vulnerabilities, such as the structure of
`
`UNIX processes, memory segments such as the heap and stack, how the stack often grows
`
`“upwards,” how buffer overflow attacks can hijack a program by overriding the caller/return
`
`address, and an assortment of tools and techniques to prevent bugs from being exploited by
`
`malware. Often, the first assignment for this course is to develop a tool to encrypt/decrypt files
`
`using advanced ciphers, and use digital signatures to certify the cipher keys used. Since 2001,
`
`several hundred undergraduate students were exposed to these principles directly through my
`
`teaching and research at Stony Brook University.
`
`22.
`
`In yet another undergraduate course, System Administration, I taught network
`
`configuration, firewall security, and system security.
`
`7
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 10 of 87
`
`
`
`23. My research has been supported by many federal and state grants as well as
`
`industry awards, including an NSF CAREER award, two IBM Faculty awards, two NetApp
`
`Faculty awards, a Western Digital award, several Dell-EMC awards, and several equipment gifts.
`
`I was the winner of the 2004 Computer Science Department bi-annual Graduate Teaching
`
`Award, the winner of the 2006 Computer Science Department bi-annual Research Excellence
`
`Award, and a recipient of the 2008 SUNY Chancellor’s Excellence in Teaching award (an award
`
`that can be given only once a lifetime).
`
`24.
`
`I am a named inventor on four patents, two titled “Systems and Methods for
`
`Detection of New Malicious Executables” (U.S. Patent No. 7,979,907, issued July 12, 2011; and
`
`U.S. Patent No. 7,487,544, issued February 3, 2009); and two more titled “Multi-Tier Caching,”
`
`(U.S. Patent No. 9,355,109, issued May 31, 2016; and U.S. Patent 9,959,279, issued May 1,
`
`2018).
`
`25.
`
`I have been disclosed as a testifying expert in twelve cases (including IPRs) in the
`
`past four years. I have been deposed ten times and testified in trial twice.
`
`26.
`
`A complete copy of my curriculum vitae, which includes a list of my publications
`
`and contains further details on my education, experience, publications, patents, and other
`
`qualifications to render an expert opinion, is attached as Ex. A.
`
`27.
`
`The compensation I receive through my consulting company, Zadoks Consulting,
`
`LLC, is $450 per hour for my time, plus out-of-pocket expenses. This compensation is not
`
`dependent in any way on the contents of this Declaration, the substance of any testimony I may
`
`provide, or the outcome of this proceeding.
`
`III. MATERIALS CONSIDERED
`
`28.
`
`In addition to my general knowledge gained as a result of my education and
`
`experience in the field, I have reviewed and considered the references found in Ex. B.
`
`8
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 11 of 87
`
`
`
`IV.
`
`LEGAL STANDARDS
`
`29.
`
`In forming my opinions, I am relying upon certain legal principles that counsel
`
`has explained to me, which I have summarized below.
`
`A.
`
`30.
`
`Background Principles
`
`I understand that the purpose of claim construction is to determine the meaning
`
`and scope of the patent claims at issue. I understand that the terms in patent claims are generally
`
`given the meaning that the terms would have to a person of ordinary skill in the art at the time of
`
`the alleged invention.
`
`31.
`
`I understand that a person of ordinary skill in the art is deemed to read the claim
`
`terms not only in the context of the particular claims in which the disputed terms appear, but in
`
`the context of the entire patent, including the specification and the prosecution history. I further
`
`understand that while a claim is to be read in light of the specification, one must generally avoid
`
`importing limitations into the claim from the specification. I also understand that when a
`
`patentee explicitly defines a claim term or disavows the full scope of a claim term, the customary
`
`meaning does not apply.
`
`32.
`
`I understand that a person of ordinary skill in the art may also look beyond the
`
`intrinsic evidence (e.g., the specification and the prosecution history) to consult “extrinsic
`
`evidence,” such as dictionaries, in order to understand, for example, the background technology
`
`or the way in which one of skill in the art might use the claim terms during the relevant time
`
`period. However, I understand that extrinsic evidence is generally given less weight than
`
`intrinsic evidence.
`
`B. Means-Plus-Function
`
`33.
`
`I understand from counsel that whether a term or phrase invokes “means-plus-
`
`function” claiming under a particular statute, 35 U.S.C. § 112 ¶ 6, turns on whether the words of
`
`9
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 12 of 87
`
`
`
`the claim are understood by a person of ordinary skill in the art to have a sufficiently definite
`
`meaning as the name for structure.
`
`34.
`
`I understand that if the claims do not use the word “means,” there is a
`
`presumption that 35 U.S.C. § 112 ¶ 6 does not apply; however, the presumption can be overcome
`
`if it can be demonstrated that the claims fail to recite sufficiently definite structure or else recite
`
`function without reciting sufficient structure for performing that function. I further understand
`
`that if the claims simply replace the term “means” with well-known “nonce” words that reflect
`
`nothing more than verbal constructions, the presumption that 35 U.S.C. § 112 ¶ 6 does not apply
`
`may be overcome. I understand that some examples of these well-known “nonce” words include
`
`“module,” “mechanism,” “element,” and “device.”
`
`35.
`
`I understand that if a term is found not to have a sufficiently definite meaning as
`
`the name for structure, the court must determine what structure, if any, disclosed in the
`
`specification corresponds to the claimed function. I further understand that the structure
`
`disclosed in the specification qualifies as a corresponding structure if the intrinsic evidence links
`
`or associates the structure to the function recited in the claim. I also understand that in terms of
`
`computer-implemented means-plus-function claims (e.g., claims relying on software) the
`
`specification must disclose an algorithm to perform the function associated with the limitation. I
`
`understand that, in these instances, absent the disclosure of an algorithm, the claims may be
`
`found indefinite.
`
`V.
`
`PERSON OF ORDINARY SKILL IN THE ART (“POSITA”)
`
`36.
`
`Counsel has informed me of the legal standard governing the determination of the
`
`level of ordinary skill in the art. I understand that factors that may be considered in determining
`
`the level of ordinary skill in the art include the following: the type of problems encountered in
`
`10
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 13 of 87
`
`
`
`the art, prior art solutions to those problems, the rapidity with which innovations are made, the
`
`sophistication of the technology, and the educational level of active workers in the field.
`
`37.
`
`For purposes of this declaration, I have been asked to assume that the priority date
`
`for the ’941 patent is May 21, 1998, i.e., the foreign application priority date listed on the face of
`
`the patent.
`
`38.
`
`In my opinion, a POSITA at the time of the alleged invention of the patent (i.e.,
`
`on or around the priority date) would have had a bachelor’s degree in computer science,
`
`computer engineering, or in a related field, and about two or three years of experience in industry
`
`with respect to software security, storage systems, and operating systems. An advanced degree
`
`in a relevant field may substitute for a lesser amount of experience and vice versa.
`
`VI.
`
`BACKGROUND OF THE ’941 TECHNOLOGY
`
`39.
`
`The ’941 patent is entitled “Method of Restricting Software Operation Within a
`
`License Limitation,” and describes a method of identifying and restricting unauthorized use of a
`
`software program on a computer. ’941 patent at 1:6-8.
`
`40.
`
`The ’941 patent explains that “[n]umerous methods ha[d] been devised for the
`
`identifying and restricting of an unauthorized software program’s operation” prior to the alleged
`
`invention. ’941 patent at 1:12-14. These methods included both software-based methods, which
`
`wrote a license signature onto the computer’s volatile memory, as well as hardware-based
`
`methods, which authorized software usage by accessing an associated physical dongle device.
`
`’941 patent at 1:19-32. According to the ’941 patent, the problem with these prior-art methods
`
`was that the software-based methods were “very vulnerable to attack” by hackers, while the
`
`hardware-based methods were “expensive, inconvenient, and not particularly suitable for
`
`software that may be sold by downloading.” ’941 patent at 1:19-32. The ’941 patent purports to
`
`find a solution that minimizes and/or eliminates these drawbacks.
`
`11
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 14 of 87
`
`
`
`41.
`
`By way of background, the ’941 provides Figure 1, which illustrates a computer
`
`on which the claimed method can be practiced. As shown in Figure 1, reproduced below, the
`
`computer contains a processor (1). ’941 patent at 5:10-16. The processor (1) contains a first
`
`non-volatile memory area (4) (e.g., the ROM section of the BIOS) and a second non-volatile
`
`memory area (5) (e.g., the E2PROM section of the BIOS). ’941 patent at 5:10-16. The processor
`
`further comprises a volatile memory area (6) (e.g., the internal RAM memory of the computer).
`
`’941 patent at 5:10-16.
`
`
`
`42.
`
`“ROM” is a commonly understood term of art that stands for “Read-Only
`
`Memory,” i.e., a non-volatile memory that can be read from, but cannot be written to or
`
`modified. Commands and data in ROM are generally put into that memory by the manufacturer
`
`during manufacturing and cannot be subsequently changed. “E2PROM” (or “EEPROM”) is a
`
`12
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 15 of 87
`
`
`
`commonly understood term of art that stands for “Electrically Erasable Programmable Read-
`
`Only Memory.” E2PROM is a type of ROM that can be re-programmed using a special signal.
`
`“RAM” is a commonly understood term of art that stands for “Random-Access Memory.”
`
`Unlike ROM, RAM can be both read from and written to.
`
`43.
`
`The ’941 patent describes two asserted improvements that purportedly overcome
`
`the problems associated with the prior art software- and hardware-based solutions. The first
`
`improvement involves the use of a key and license record, which have been written into the non-
`
`volatile memories of a computer. ’941 patent at 1:38-42. The “key” represents a unique
`
`identification code for the computer, and it is embedded in the ROM of the computer’s BIOS
`
`module. ’941 patent at 1:45-50. Accordingly, the key “cannot be removed or modified.” ’941
`
`patent at 1:50-52. The license record is a record associated with a program with information for
`
`verifying that the program is licensed, e.g., the author name, program name, and a number of
`
`licensed users. ’941 patent at 1:53-58. The “key” (or portions thereof) is used to encrypt and/or
`
`decrypt the license record information (or portions thereof). ’941 patent at 1:59-65.
`
`44.
`
`Based on this disclosure, the ’941 patent explains that “any attempt to run a
`
`program at an unlicensed site will be immediately detected.” ’941 patent at 2:27-29. As the
`
`’941 patent explains, if a program is licensed to run on a given computer having a first
`
`identification code (k1) stored in the ROM portion of the BIOS, the license record (LR) of the
`
`program will be encrypted resulting in (LR)k1 being stored in the computer’s EEPROM. ’941
`
`patent at 1:29-35.
`
`45.
`
`If a hacker attempts to run the same program on a second computer having a
`
`second identification code (k2) stored in the ROM portion of the BIOS, even though the hacker
`
`may be able to copy the encrypted license record, (LR)k1 , to the second computer, the “hacker is
`
`13
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 16 of 87
`
`
`
`unable to modify the key in the ROM of the second computer to K1, since . . . the contents of the
`
`ROM is established during manufacture and is practically invariable.” ’941 patent at 2:42-46.
`
`Accordingly, when the license verifier attempts to confirm that the program is licensed to run on
`
`the second computer, it encrypts the license record (LR) using key (k2) of the second computer,
`
`which gives rise to encrypted record (LR)k2. ’941 patent at 2:48-53. When the second computer
`
`compares the new encrypted license record, (LR)k2, and the copied encrypted license record,
`
`(LR)k1, it will result in a mismatch, and the application’s use can therefore be restricted. ’941
`
`patent at 2:56-59.
`
`46.
`
`The second alleged improvement that is highlighted by the ’941 patent is the use
`
`of BIOS memory, rather than some other memory space, to store the encrypted license records.
`
`’941 patent at 1:59-2:5, 4:43-47. The ’941 patent notes that the memory of the BIOS is a
`
`particularly sensitive memory area. “[T]he required level of system programming expertise that
`
`is necessary to intercept or modify commands, interacting with the BIOS, is substantially higher
`
`than those needed for tampering with data residing in volatile memory such as hard disk.” ’941
`
`patent at 3:4-9. “Furthermore, there is a much higher cost to the programmer, if his tampering is
`
`unsuccessful, i.e., if data residing in the BIOS (which is necessary for the computer’s operability)
`
`is inadvertently changed by the hacker.” ’941 patent at 3:9-13. As noted by the ’941 patent,
`
`“[t]his is too high of a risk for the ordinary software hacker to pay.” ’941 patent at 3:13-14.
`
`47.
`
`The ’941 patent claims a method of restricting software operation within a
`
`license, taking advantage of the above alleged improvements. At a high level, the patent requires
`
`four steps outlined in Figure 2, reproduced below:
`
`14
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 17 of 87
`
`
`
`
`
`48.
`
`In describing Figure 2, the ’941 patent explains that the “selecting” step
`
`includes the step of “establishing a licensed-software-program in the volatile memory of the
`
`computer wherein the licensed-software-program includes contents used to form a license-
`
`record.” ’941 patent at 6:7-10.
`
`49.
`
`The “setting up” step is described as “establishing or certifying the
`
`existence of a pseudo unique key in the first non-volatile memory area; and establishing at least
`
`one license-record location in the first or the second nonvolatile memory area.” ’941 patent at
`
`6:19-22. “Establishing a license-record includes the steps of: forming a license-record by
`
`encrypting of the contents used to form a license-record with other predetermined data contents,
`
`15
`
`IPR2021-00663
`ANCORA EX2011
`
`

`

`Case 1:20-cv-00034-ADA Document 45-1 Filed 03/20/20 Page 18 of 87
`
`
`
`using the key; and establishing the encrypted license-record in one of the at least one established
`
`license record locations.” ’941 patent at 6:23-28.
`
`50.
`
`The “verifying” step is described as “encrypting the licensed-software-
`
`program’s license-record contents from the volatile memory area or decrypting the license record
`
`in the first or the second non-volatile memory area, using the key; and comparing the encrypted
`
`licensed software-program’s license-record contents with the encrypted license-record in the first
`
`or the second non-volatile memory area, or comparing the licensed-software-program’s license-
`
`record contents with the decrypted license-record in the first or the second non-volatile memory
`
`area.” ’941 patent at 6:29-39.
`
`51.
`
`Finally, the “acting” step is described as “restricting the program’s
`
`operation with predetermined limitations if the comparing yields non-unity or insufficiency,” i.e.,
`
`restricting the program’s operation if the comparison in the verifying step fails. ’941 patent at
`
`6:40-42.
`
`VII. OPINIONS
`
`52.
`
`I have been asked to provide my opinion with respect to the term “using
`
`an agent to set up a verification structure in the erasable, non-volatile memory of the BIOS”
`
`(claim 1).
`
`53.
`
`I understand that the parties dispute whether the term “using an agent to
`
`set up a verification structure in the erasable, non-volatile memory of the BIOS,” as described in
`
`claim 1, is a means-plus-function limitati

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket