throbber
Paper 9
`
`Entered: January 11, 2017
`
`Trials@uspto.gov
`571-272-7822
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`UNIFIED PATENTS INC.,
`Petitioner,
`
`v.
`
`INTELLECTUAL VENTURES II, LLC,
`Patent Owner.
`____________
`
`Case IPR2016-01404
`Patent 6,968,459 B1
`____________
`
`
`
`Before THOMAS L. GIANNETTI, PETER P. CHEN, and
`KAMRAN JIVANI, Administrative Patent Judges.
`
`JIVANI, Administrative Patent Judge.
`
`
`
`DECISION
`Institution of Inter Partes Review
`37 C.F.R. § 42.108
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`
`I.
`
`INTRODUCTION
`
`Petitioner Unified Patents Inc. requested, on July 11, 2016, inter
`
`partes review of claims 1, 2, 13–15, 18, 33, 34, 39, 46, and 48 (the
`
`“Challenged Claims”) of U.S. Patent No. 6,968,459 B1 (“the ’459 patent”).
`
`Paper 2 (“Petition” or “Pet.”). On October 19, 2016, Patent Owner
`
`Intellectual Ventures II, LLC filed a Preliminary Response. Paper 8
`
`(“Prelim. Resp.”).
`
`Under 35 U.S.C. § 314(a), an inter partes review may not be instituted
`
`unless it is determined that there is “a reasonable likelihood that the
`
`petitioner would prevail with respect to at least 1 of the claims challenged in
`
`the petition.” Based on the information presented in the Petition and
`
`Preliminary Response, we are persuaded that there is a reasonable likelihood
`
`Petitioner would prevail with respect to claims 1, 2, 13, 14, 33, 34, 39, 46,
`
`and 48. We are not persuaded, however, that there is a reasonable likelihood
`
`Petitioner would prevail with respect to claims 15 and 18.
`
`Accordingly, we institute inter partes review of claims 1, 2, 13, 14,
`
`33, 34, 39, 46, and 48 on the grounds specified below. Our factual findings
`
`and conclusions at this stage of the proceeding are based on the evidentiary
`
`record developed thus far. This is not a final decision as to patentability of
`
`claims for which inter partes review is instituted. Further, we decline to
`
`institute inter partes review of claims 15 and 18 for the reasons set forth
`
`below.
`
`
`
`2
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`
`II.
`
`BACKGROUND
`
`A.
`
`The ’459 patent (Ex. 1001)
`
`The ’459 patent seeks to create “a highly secure computing
`
`environment . . . preventing the appropriation of sensitive data.” Ex. 1001,
`
`1:13–31. The ’459 patent describes “a secure computing environment in
`
`which a computer automatically operates in a secure ‘full access’ data
`
`storage mode when the computer detects the presence of a secure removable
`
`storage device.” Id. at 1:35–39. If, however, the computer detects the
`
`presence of a removable storage device that is not secure, “then the
`
`computer automatically operates in a ‘restricted-access’ mode.” Id. at 1:39–
`
`42. Figure 1 of the ’459 patent is reproduced below.
`
`Figure 1 of the ’459 patent depicts a block diagram of a secure
`
`computing environment, including computer 100 that senses whether storage
`
`device 151 is secure. Id. at 1:30–33. To determine whether a removable
`
`storage device is secure, the ’459 patent describes attempting to read
`
`
`
`3
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`“device-specific security information” from the storage device. Id. at 5:7–
`
`10. The device-specific security information is “derived from the unique
`
`format information of the removable storage device.” Id. at 3:65–4:1.
`
`The’459 patent elaborates:
`
`the device-specific security
`In one embodiment,
`information is a function of the low-level format
`information and,
`therefore, uniquely
`identifies
`the
`underlying media of storage device 151. For example, in
`one embodiment the device-specific security information
`is a hash of the addresses of the bad sectors for storage
`device 151. Because it is a function of the physical
`characteristics of the actual storage medium within
`storage device 151, the format information is inherently
`unique to each storage device 151. In other words, the
`addresses of the bad sectors change from device to
`device.
`
`
`Id. at 4:9–19.
`
`According to the ’459 patent, when a computer operates in a secure
`
`“full access” data storage mode, storage management software encrypts and
`
`decrypts data transmitted between the computer and the removable storage
`
`device using a cryptographic key. Id. at 3:61–64. The system of the ’459
`
`patent generates this cryptographic key by combining any number of the
`
`following types of information: “(1) device-specific security information
`
` . . . , (2) manufacturing information that has been etched onto the storage
`
`device, (3) drive-specific information, such as drive calibration parameters,
`
`retrieved from the storage drive, and (4) user-specific information such as a
`
`password or biometric information.” Id. at 3:65–4:5.
`
`When a computer operates in a “restricted-access” data storage mode,
`
`the computer operates the storage device as “read-only” such that the user
`
`4
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`may read data from the device but may not write any data to the device. Id.
`
`at 1:63–66. Alternatively, the user may be permitted “to write the non-
`
`sensitive data to the removable storage device in an unencrypted format.”
`
`Id. at 1:66–2:2.
`
`B.
`
`Illustrative Claim
`
`Claims 1, 15, 18, 33, and 39 are independent claims. Claim 1 is
`
`reproduced below.
`
`1.
`
`A method comprising:
`
`sensing whether a storage device has device-specific
`security information stored thereon;
`
`operating a computer in a full-access mode when the
`storage device has the device-specific security information,
`wherein in the full-access mode the computer permits both read
`and write access to the storage device; and
`
`operating the computer in a restricted-access mode when
`the storage device does not have the device-specific security
`information, wherein
`in
`the restricted-access mode
`the
`computer permits read access to the storage device and prevents
`write access to the storage device.
`
`
`
`C.
`
`Evidence Relied Upon
`
`Petitioner relies on the following references:
`
`1. Bensimon et al., U.S. Patent No. 5,553,125, issued July 2, 1996
`
`(Ex. 1004, “Bensimon”).
`
`2. Takahashi et al., U.S. Patent No. 5,825,878, issued Oct. 20, 1998
`
`(Ex. 1005, “Takahashi”).
`
`3. Kimura, U.S. Patent No. 5,237,609, issued Aug. 17, 1993
`
`(Ex. 1006, “Kimura”).
`
`5
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`
`Petitioner further relies on the Declaration of Dr. Paul Franzon
`
`(Ex. 1002).
`
`D.
`
`Proposed Grounds of Unpatentability
`
`Petitioner advances the following grounds of unpatentability:
`
`References
`
`Statutory Ground Challenged Claims
`
`Bensimon
`
`35 U.S.C. § 102(b) 1, 13, 14, 33, 39, 46,
`and 48
`
`Bensimon & Takahashi 35 U.S.C. § 103(a) 2, 15, and 34
`
`Kimura & Takahashi
`
`35 U.S.C. § 103(a) 18
`
`
`E.
`
`Related Proceedings
`
`Petitioner identifies the following related matters: Intellectual
`
`Ventures I, LLC and Intellectual Ventures II, LLC v. Lenovo Group Ltd.,
`
`Lenovo (United States) Inc., LenovoEMC Products USA, LLC, and EMC
`
`Corp., No. 1:16-cv-10860 (D. Mass); and Intellectual Ventures I, LLC and
`
`Intellectual Ventures II, LLC v. NetApp, Inc., No. 1:16-cv-10868 (D. Mass).
`
`Pet. 2.
`
`
`
`III. CLAIM CONSTRUCTION
`
`Petitioner seeks construction of the following terms: “device-specific
`
`security information,” “device-specific information,” “user-specific security
`
`information,” “status change . . . for the storage device,” and “storage
`
`manager.” Pet. 11–17. Patent Owner urges that we need not construe the
`
`terms of the Challenged Claims. Prelim. Resp. 6. Because construction of
`
`the terms proposed by Petitioner is not necessary to our analysis on whether
`
`to institute a trial, we do not construe these terms. Vivid Techs., Inc. v. Am.
`
`6
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`Sci. & Eng’g, Inc., 200 F.3d 795, 803 (Fed. Cir. 1999) (explaining that only
`
`claim terms in controversy need to be construed, and only to the extent
`
`necessary to resolve the controversy).
`
`
`
`IV. ANALYSIS
`
`A. Overview of Cited References
`
`1.
`
`Bensimon
`
`Bensimon relates to a system for securing removable information
`
`storage devices, including “means for preventing the computer system from
`
`reading from, or writing to, the storage device absent the entry of a selected
`
`password by a user of the host computer system.” Ex. 1004, 2:45–49.
`
`Figure 1 of Bensimon is reproduced below.
`
`
`
`7
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`
`Figure 1 of Bensimon depicts computer 10 and storage device 100,
`
`which Bensimon describes as “an ‘intelligent’ storage device.” Id. at 4:50,
`
`5:32–34. The intelligent storage device of Bensimon includes “a password
`
`security feature at the device level. Password security at the device level
`
`provides an advantage over system-level password security in that a stolen
`
`storage device cannot be used in any computer unless the thief also knows
`
`the password.” Id. at 4:50–56.
`
`Figure 3 of Bensimon is reproduced below.
`
`
`
`8
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`
`Figure 3 of Bensimon depicts “a simplified block diagram of an
`
`intelligent removable information storage device 100 in accordance with the
`
`invention.” Id. at 4:35–45. In a preferred embodiment of Bensimon, “the
`
`password and a password enabling flag are stored in the media 102 itself,
`
`along with the protected data, rather than with the control electronics.” Id. at
`
`6:35–37.
`
`2.
`
`Takahashi
`
`Takahashi teaches a secure memory management unit “fabricated on a
`
`single integrated circuit chip 10.” Ex. 1005, 2:28–30. Figure 1 of Takahashi
`
`is reproduced below.
`
`Figure 1 of Takahashi depicts “a block diagram of a preferred
`
`embodiment of a secure memory management unit” on integrated circuit
`
`chip 10. Id. at 2:26–34. Takahashi’s secure memory management unit
`
`“comprises a memory controller 16 and a secure digital memory access
`
`controller 14.” Id. at 2:48–49. The primary function of this secure memory
`
`9
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`management unit is “to read encrypted external program code instructions
`
`and data stored in the external memory,” decrypt these instructions, and
`
`store the information in a secure random access memory (“RAM”). Id. at
`
`2:32–40.
`
`3.
`
`Kimura
`
`Kimura describes “a portable information memory card and a system
`
`for utilizing such card which provides security without the necessity for an
`
`onboard microprocessor.” Ex. 1006, 18:40–43. The system of Kimura
`
`stores on the portable memory card two separate pieces of information to be
`
`used in a security check comparison: (i) an identification code and (ii)
`
`external identification information. Id. at 18:40–60. The identification code
`
`is internal information specific to the particular memory card and cannot be
`
`easily read out from the card because it “is not available to the interface bus
`
`under any circumstances.” Id. The external identification information is
`
`encrypted and thus must be read out from the card and decrypted in order to
`
`perform the security check comparison. Id.
`
`B.
`Anticipation of Claims 1, 13, 14, 33, 39, 46, and 48 based on
`Bensimon
`
`1.
`
`Claim 1
`
`Petitioner asserts Bensimon anticipates independent claim 1. Pet. 20–
`
`27. We have reviewed the information provided by Petitioner, including the
`
`relevant portions of the supporting Franzon Declaration. Petitioner’s
`
`analysis demonstrates where Bensimon discloses each element of claim 1.
`
`Id. For example, relying on the Franzon Declaration, Petitioner contends
`
`Bensimon’s password and password-enabling flag stored on the storage
`
`media meet the claimed “device-specific security information.” Id. at 22
`
`(citing Ex. 1002 ¶¶ 52–60). According to Petitioner, Bensimon discloses the
`
`10
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`claimed “full-access mode” permitting read and write access when
`
`Bensimon’s storage device 100 has the password-enabling flag and the
`
`read/write password as the “device-specific security information.” Pet. 26
`
`(citing Ex. 1002 ¶ 61); see also Ex. 1004, 6:13–29. Further, Petitioner
`
`contends Bensimon discloses the claimed “restricted-access mode”
`
`permitting read access and preventing write access when Bensimon’s storage
`
`device 100 has the password-enabling flag and the “write protection (read-
`
`only) password” as the “device-specific security information.” See Pet. 27
`
`(citing Ex. 1002 ¶¶ 62–63); see also Ex. 1004, 6:13–29.
`
`Patent Owner argues Bensimon does not disclose the “restricted-
`
`access mode” because when Bensimon’s password security is not enabled,
`
`the device operates in an “unprotected mode.” Prelim. Resp. 10 (citing Ex.
`
`1004, 6:3–4). Similarly, Patent Owner argues Bensimon does not disclose
`
`the “restricted-access mode” because, “if the write protection (read only)
`
`password is not entered correctly, write access and read access are
`
`restricted.” Prelim. Resp. 12. We are not persuaded by Patent Owner’s
`
`arguments. Claim 1 recites, “A method comprising. . . .” “The transition
`
`‘comprising’ in a method claim indicates that the claim is open-ended and
`
`allows for additional steps.” Invitrogen Corp. v. Biocrest Manufacturing,
`
`L.P., 327 F.3d 1364, 1368 (Fed. Cir. 2003). The presence of an additional
`
`“unprotected mode” in Bensimon, therefore, is not excluded by the scope of
`
`claim 1. Similarly, the presence of an additional mode preventing access
`
`due to incorrect password entry is not excluded by the scope of claim 1.
`
`Rather, we agree with Petitioner that Bensimon discloses the claimed
`
`“restricted-access mode” permitting read access and preventing write access
`
`in the situation where Bensimon’s storage device 100 has the password-
`
`11
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`enabling flag and the correctly-entered “write protection (read-only)
`
`password.” See Pet. 27 (citing Ex. 1002 ¶¶ 62–63); see also Ex. 1004, 6:13–
`
`29.
`
`Patent Owner additionally argues Bensimon lacks the claimed
`
`“device-specific security information” because “Bensimon’s passwords are
`
`‘user-specific information’—a user selects and sets the password.” Prelim.
`
`Resp. 15 (emphasis omitted). Thus, according to Patent Owner, “the user
`
`can assign the exact same password to each and every device in Bensimon.”
`
`Id. We are not persuaded by Patent Owner’s argument. To the extent Patent
`
`Owner contends passwords may not be “device-specific security
`
`information,” we disagree. The ’459 patent does not disclose that device-
`
`specific security information must not include passwords, or that all
`
`passwords are user-specific rather than device-specific. See Ex. 1001, 3:65–
`
`4:5. Moreover, Petitioner relies on both Bensimon’s password and its
`
`password-enabling flag, and cites Bensimon’s description of the password-
`
`enabling flag stored on the storage media as a “unique string of characters.”
`
`Pet. 26–27 (citing Ex. 1004, 6:13–29). We agree with Petitioner, based on
`
`the record before us and at this stage of the proceeding, that at least
`
`Bensimon’s password and password-enabling flag stored on the device are
`
`“device-specific” as required by claim 1.
`
`For the reasons discussed above and based on the current record
`
`at this stage of the proceeding, we determine Petitioner has shown a
`
`reasonable likelihood of prevailing on this anticipation challenge to
`
`claim 1.
`
`12
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`
`2.
`
`Claims 33 and 39
`
`Petitioner asserts Bensimon anticipates independent claims 33 and 39,
`
`which Petitioner asserts are of commensurate scope with claim 1. Pet. 29–
`
`30 (analysis of claim 33) and 31–32 (analysis of claim 39). Petitioner does
`
`not present separate arguments on either claim 33 or claim 39, instead
`
`relying on the arguments presented on claim 1. Id. Claim 1 recites a
`
`method, claim 33 recites a computer-readable medium containing
`
`instructions for performing a method, and claim 39 recites a computer
`
`comprising components for performing particular functions. For purposes of
`
`our analysis, we determine that claims 33 and 39, although differing in
`
`format, do not require a separate analysis from claim 1. Accordingly, for the
`
`reasons discussed above in the context of claim 1 and based on the current
`
`record at this stage of the proceeding, we determine Petitioner has shown a
`
`reasonable likelihood of prevailing on this anticipation challenge to claims
`
`33 and 39. See supra Section IV.B.1.
`
`3.
`
`Claims 13 and 14
`
`Petitioner asserts Bensimon anticipates dependent claims 13 and 14.
`
`Pet. 27–28. We have reviewed the information provided by Petitioner,
`
`including the relevant portions of the supporting Franzon Declaration.
`
`Petitioner’s analysis demonstrates where Bensimon discloses each element
`
`of claims 13 and 14. Id. For example, Petitioner contends Bensimon meets
`
`the claim 13 limitation of performing the claimed sensing step “when a
`
`status change is detected” and the claim 14 limitation that “the status change
`
`indicates the insertion of the storage device into the computer” because
`
`Bensimon discloses:
`
`Upon insertion of the pc card 100 into the computer 10,
`“[h]ost systems that are password aware may look at this
`
`13
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`
`data field prior to attempting access, and determine
`whether the password is required to be issued to the
`drive. Preferably, this issuance will be accomplished via
`system prompt of the user.
`
`
`Id. at 28 (citing Ex. 1004, 6:30–34).
`
`Patent Owner argues Bensimon fails to meet the limitations of claim
`
`13 and 14 because “Bensimon does not disclose detecting the insertion of
`
`the PC card, let alone performing the ‘sensing’ step once the detection
`
`occurs.” Prelim. Resp. 18 (emphasis omitted). We are not persuaded by
`
`Patent Owner’s arguments. The passages of Bensimon cited by Petitioner
`
`disclose that “password aware” systems determine whether a password is
`
`required to be issued to the card prior to attempting access to the card (i.e.,
`
`sensing whether a storage device has device-specific security information
`
`stored thereon). Ex. 1004, 6:30–32. If a password is required to be issued,
`
`Bensimon discloses prompting the user to issue the password. Id. at 6:32–
`
`34. According to Bensimon, this process allows the user to enable
`
`protection for a pc card not previously in a password protected mode upon
`
`insertion of the pc card into the computer (i.e., “when a status change is
`
`detected . . . the status change indicates the insertion of the storage device
`
`into the computer”). Id. at 5:32–40. Therefore, we agree with Petitioner,
`
`based on the record before us and at this stage of the proceeding, that
`
`Bensimon meets the limitations of claims 13 and 14.
`
`For the reasons discussed above and based on the current record
`
`at this stage of the proceeding, we determine Petitioner has shown a
`
`reasonable likelihood of prevailing on this anticipation challenge to
`
`claims 13 and 14.
`
`14
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`
`4.
`
`Claims 46 and 48
`
`Petitioner asserts Bensimon anticipates dependent claims 46
`
`and 48. Pet. 32–33. We have reviewed the information provided by
`
`Petitioner, including the relevant portions of the supporting Franzon
`
`Declaration. Petitioner’s analysis demonstrates where Bensimon
`
`discloses each element of claims 46 and 48. Id. Specifically,
`
`Petitioner cites Bensimon’s pc card 100 as meeting the “removable
`
`storage medium” recited in claim 46 and the magnetic disk within pc
`
`card 100 as meeting the “disk-shaped storage medium” recited in
`
`claim 48. Id. at 33. Patent Owner does not present separate
`
`arguments on these issues. See Prelim. Resp. 17–20. Accordingly,
`
`based on the current record at this stage of the proceeding, we
`
`determine Petitioner has shown a reasonable likelihood of prevailing
`
`on this anticipation challenge to claims 46 and 48.
`
`C. Obviousness of Claims 2, 15, and 34 based on Bensimon in
`combination with Takahashi
`
`1.
`
`Claims 2 and 34
`
`Petitioner asserts dependent claims 2 and 34 would have been obvious
`
`in light of Bensimon and Takahashi. Pet. 36–40 (analysis of claim 2) and
`
`42–43 (analysis of claim 34). We have reviewed the information provided
`
`by Petitioner, including the relevant portions of the supporting Franzon
`
`Declaration. Petitioner’s analysis demonstrates where the elements of
`
`claims 2 and 34 are taught or suggested by Bensimon and Takahashi. Id.
`
`For example, Petitioner relies on Takahashi’s secure memory management
`
`unit whose primary function is “to read encrypted external program code
`
`instructions and data stored in the external memory” (Ex. 1005, 2:26–40),
`
`decrypt these instructions, and store the information in a secure RAM as
`
`15
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`teaching or suggesting the claim 2 limitations: “encrypting digital data to be
`
`written to the storage device from the computer” and “decrypting digital data
`
`read from the storage device by the computer.” Pet. 36–38 (citing Ex. 1005,
`
`2:26–39). Petitioner further relies on Takahashi as teaching or suggesting
`
`“encrypting digital data to be written to the storage drive; and decrypting
`
`digital data read from the storage device,” as recited by claim 34. Id. at 42–
`
`43.
`
`Finally, relying on the Franzon Declaration, Petitioner asserts one of
`
`ordinary skill in the art would have been motivated to combine the cited
`
`references because “one of ordinary skill would have recognized that, by
`
`adding Takahashi’s technique to Bensimon’s system, the unauthorized user
`
`would not only have to know the password for the device as described by
`
`Bensimon, but would also need to have the particular encryption firmware as
`
`described by Takahashi.” Id. at 38–40 (citing Ex. 1002 ¶ 81; see also id. ¶
`
`82).
`
`Patent Owner advances no argument on claim 34 and argues regarding
`
`claim 2 that Petitioner fails to show the cited references teach or suggest
`
`automatically performing the encrypting and decrypting. Prelim. Resp. 21.
`
`We are not persuaded by this argument because Takahashi teaches
`
`performing the cited encryption and decryption without user intervention via
`
`direct memory access controller 14 and memory controller 16. Ex. 1005,
`
`2:60–3:20.
`
`For the reasons discussed above and based on the current record
`
`at this stage of the proceeding, we determine Petitioner has shown a
`
`reasonable likelihood of prevailing on this obviousness challenge to
`
`claims 2 and 34.
`
`16
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`
`2.
`
`Claim 15
`
`Claim 15 recites, in relevant part, providing full-access when the
`
`storage device senses device-specific security information by encrypting and
`
`decrypting digital data “using the security information.” Thus, claim 15
`
`requires using the device-specific security information to encrypt and
`
`decrypt digital data.
`
`Petitioner asserts independent claim 15 would have been obvious in
`
`light of Bensimon and Takahashi. Pet. 40–42. More particularly, Petitioner
`
`contends, “It would have been obvious to encrypt the outbound data (i.e., the
`
`data written to the storage device) in Takahashi using the ‘security
`
`information’ of Bensimon.” Pet. 42. This is because, according to
`
`Petitioner, “Bensimon’s ‘security information’ is made up of a password
`
`already shared by the storage device 100 and the host computer 10.” Id.
`
`Petitioner does not proffer any citations from Bensimon in support for this
`
`statement. After concluding the paragraph containing this assertion,
`
`Petitioner directs our attention to paragraphs 82 through 85 of the Franzon
`
`Declaration. Id. Paragraph 85 of the Franzon Declaration summarily asserts
`
`Bensimon’s password is “already shared by the storage device 100 and the
`
`host computer 10,” without citation to Bensimon. Ex. 1002 ¶ 85.
`
`Contrary to Petitioner’s assertions, Patent Owner contends
`
`Bensimon’s “password is stored only on the storage device and not on the
`
`host computer” and “the computer has no need for the password because the
`
`storage device controls access to its memory.” Prelim. Resp. 24–25 (citing
`
`Ex. 1004, 5:65–67). We agree with Patent Owner. Bensimon describes a
`
`user entering a password string and the computer “transfer[ring] the
`
`password string to the device 100.” Ex. 1004, 5:63–65. Petitioner does not
`
`17
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`cite, and we do not find, support in Bensimon for the notion that the
`
`password is “shared” by the computer and the device. Sharing the password
`
`in the manner proposed by Petitioner would be contrary to Bensimon’s
`
`disclosure that password security “at the device level provides an advantage
`
`over system-level password security.” Id. at 4:50–56. Further, Bensimon
`
`describes storing the password and the password enabling flag “in the media
`
`102 itself, along with the protected data, rather than with the control
`
`electronics.” Id. at 6:35–37. Petitioner fails to explain in the record before
`
`us why one of ordinary skill in the art would be motivated to modify
`
`Bensimon’s password—described in the above-cited passages as secured
`
`within the storage media itself—to be shared between the storage media and
`
`the computer such that the computer could use that password to decrypt data.
`
`For the reasons discussed above, we determine Petitioner has
`
`not shown a reasonable likelihood of prevailing on this obviousness
`
`challenge to claim 15.
`
`D. Obviousness of Claim 18 based on Kimura in combination with
`Takahashi
`
`Claim 18 recites, in relevant part, “sensing whether the storage device
`
`has security information generated from a combination of device-specific
`
`information associated with the storage device and user-specific information
`
`associated with a user.” Thus, claim 18 requires a determination of whether
`
`the storage device contains “security information” generated from a
`
`combination of device-specific and user-specific information.
`
`Petitioner relies on Kimura’s “particular security code assigned to the
`
`card in question” as meeting the claimed security information. Pet. 52. Id.
`
`at 52–53 (citing Ex. 1006, 14:12–21, 17:27–37). Petitioner further relies on
`
`Kimura’s comparison of this internal security code (i.e., security
`
`18
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`information) “with another security code ‘deciphered’ from ‘external
`
`information’” as meeting the claimed “sensing whether the storage device
`
`has security information.” Pet. 52.
`
`We are not persuaded by Petitioner’s arguments because they are not
`
`commensurate with the claim language. Claim 18 requires sensing the
`
`presence of security information, which Petitioner contends is taught or
`
`suggested by Kimura’s security code. Pet 52. Petitioner’s contentions,
`
`however, fail to identify adequate teaching or suggestion of sensing the
`
`presence of this secure code. Id. Kimura describes the cited security code
`
`as internal information “assigned to that particular card” and “not available
`
`to the interface bus under any circumstances.” Ex. 1006, 18:40–60. Thus,
`
`Kimura describes the card has the cited security code within its internal
`
`memory once the code has been assigned to that card. See id. Rather than
`
`establishing that Kimura senses the presence of this code in the internal
`
`memory of the card, Petitioner directs our attention to Kimura’s comparison
`
`of a second code to the internal security code. Pet. 52, 57–59. Whether the
`
`two codes match, however, does not address sensing whether Kimura’s card
`
`contains the internal security code—which Kimura teaches is in fact stored
`
`within the card after it is assigned to the card. Ex. 1006, 18:40–60.
`
`For the reasons discussed above and based on the current record
`
`at this stage of the proceeding, we determine Petitioner has not shown
`
`a reasonable likelihood of prevailing on this obviousness challenge to
`
`claim 18.
`
`
`
`19
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`
`V.
`
`SUMMARY
`
`
`
`We determine that Petitioner has demonstrated a reasonable likelihood
`
`of prevailing on its challenges to claims 1, 2, 13, 14, 33, 34, 39, 46, and 48.
`
`Petitioner has failed to demonstrate, however, that there is a reasonable
`
`likelihood Petitioner would prevail with respect to claims 15 and 18. At this
`
`stage of the proceeding, we have not made a final determination as to the
`
`patentability of any of the Challenged Claims.
`
`
`
`VI. ORDER
`
`It is, therefore:
`
`ORDERED that, pursuant to 35 U.S.C. § 314(a), an inter partes
`
`review of the ʼ459 patent is hereby instituted on the following grounds:
`
`A. Anticipation of claims 1, 13, 14, 33, 39, 46, and 48 by Bensimon;
`
`and
`
`B. Obviousness of claims 2 and 34 over Bensimon and Takahashi.
`
`FURTHER ORDERED that review based on any other proposed
`
`grounds of unpatentability is not authorized; and
`
`FURTHER ORDERED that pursuant to 35 U.S.C. § 314(c) and
`
`37 C.F.R. § 42.4, notice is hereby given of the institution of a trial
`
`commencing on the entry date of this decision.
`
`
`
`20
`
`

`
`IPR2016-01404
`Patent 6,968,459 B1
`
`
`
`FOR PETITIONER:
`
`P. Andrew Riley
`James D. Stein
`FINNEGAN, HENDERSON, FARABOW,
`GARRETT & DUNNER, LLP
`Andrew.Riley@finnegan.com
`James.Stein@finnegan.com
`
`Jonathan Stroud
`UNIFIED PATENTS INC.
`jonathan@unifiedpatents.com
`
`
`
`PATENT OWNER:
`
`Lori A. Gordon
`Byron Pickard
`Steven Peters
`STERNE, KESSLER GOLDSTEIN & FOX PLLC
`lgordon-ptab@skgf.com
`bpickard@skgf.com
`speters@skgf.com
`
`
`21

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket