throbber
IPR2016-01404
`US. Patent No. 6,968,459
`
`
`
`
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`________________________
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_________________________
`
`
`UNIFIED PATENTS, INC.
`Petitioner
`v.
`
`INTELLECTUAL VENTURES II, LLC
`Patent Owner
`_________________________
`
`U.S. Patent No. 6,968,459
`IPR2016-01404
`__________________________
`
`PETITIONER’S REPLY TO PATENT OWNER’S RESPONSE
`
`
`
`

`

`
`
`TABLE OF CONTENTS
`
`I.
`
`INTRODUCTION ........................................................................................... 1
`
`II. ARGUMENT ................................................................................................... 4
`
`A.
`
`B.
`
`C.
`
`The Claimed “Device-specific Security Information” Need Not
`Be “Unique” .......................................................................................... 4
`
`Bensimon Anticipates Claims 1, 13, 14, 33, 39, 46, and 48 ............... 13
`
`The Combination of Bensimon and Takahashi Renders Obvious
`Claims 2 and 34. .................................................................................. 25
`
`III. CONCLUSION .............................................................................................. 25
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`i
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`
`Exhibit 1001.
`
`LIST OF EXHIBITS
`
`U.S. Patent No. 6,968,459 to Jeffrey Morgan, et al. (“the ’459
`Patent”).
`
`Exhibit 1002.
`
`Declaration of Expert: Dr. Paul Franzon.
`
`Exhibit 1003.
`
`Excerpts of Prosecution History for U.S. Patent No. 6,968,459.
`
`Exhibit 1004.
`
`Exhibit 1005.
`
`U.S. Patent No. 5,533,125 to Daniel Bensimon, et al.
`(“Bensimon”).
`
`U.S. Patent No. 5,825,878 Richard Takahashi, et al.
`(“Takahashi”).
`
`Exhibit 1006.
`
`U.S. Patent No. 5,237,609 to Masatoshi Kimura (“Kimura”).
`
`Exhibit 1007.
`
`Petitioner’s Voluntary Interrogatory Responses.
`
`Exhibit 1008.
`
`U.S. Patent No. 6,738,877 to Yamakawa et al. (“Yamakawa”)
`
`Exhibit 1009.
`
`U.S. Patent No. 6,012,145 to Mathers et al. (“Mathers”)
`
`Exhibit 1010.
`
`Curriculum Vitae of Dr. Paul Franzon.
`
`Exhibit 1011.
`
`Transcript of 8/25/2017 Deposition of Dr. Goldschlag (newly
`submitted).
`
`Exhibit 1012.
`
`Supplemental Declaration of Dr. Franzon (newly submitted).
`
`Exhibit 1013.
`
`Excerpt of Microsoft Computer Dictionary (newly submitted).
`
`Exhibit 1014.
`
`Excerpts of Merriam Webster’s Collegiate® Dictionary (newly
`submitted).
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`TABLE OF AUTHORITIES
`
`IPR2016-01404
`US. Patent No. 6,968,459
`
` Page(s)
`
`Federal Cases
`Apple, Inc. v. Ameranth, Inc.,
`842 F.3d 1229 (Fed. Cir. 2016) ............................................................................ 7
`
`Braintree Laboratories, Inc. v. Novel Laboratories, Inc.,
`749 F.3d 1349, 2014 WL 1584451 (Fed. Cir. 2014) ............................................ 4
`
`EPOS Technologies Ltd. v. Pegasus Technologies Ltd.,
`766 F.3d 1338 (Fed. Cir. 2014) ............................................................................ 9
`
`Intel Corp. v. U.S. Intern. Trade Com’n,
`F.2d 821, 836 (Fed. Cir. 1991) ............................................................................. 5
`
`Karlin Technology, Inc. v. Surgical Dynamics, Inc.,
`F.3d 968 (Fed. Cir. 1999) ..................................................................................... 4
`
`In re Katz Interactive Call Processing Patent Litigation,
`2011 WL 607381 (Fed. Cir. 2011) ....................................................................... 4
`
`Liebel-Flarsheim Co. v. Medrad, Inc.,
`358 F.3d 898 (Fed. Cir. 2004) .............................................................................. 9
`
`PSN Illinois, LLC v. Ivoclar Vivadent, Inc.,
`525 F.3d 1159 (Fed. Cir. 2008) ............................................................................ 6
`
`Regulations
`
`77 Fed. Reg. 48764 (Aug. 14, 2012) ......................................................................... 1
`
`
`
`
`
`
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`
`I.
`
`INTRODUCTION
`This Reply responds to Patent Owner’s Response to the Petition filed May
`
`16, 2017 (Paper 19). For the reasons below, Petitioner requests the Board to cancel
`
`challenged claims 1, 2 13, 14, 33, 34, 39, 46, and 48.
`
`Rather than moving to amend its claims,1 Patent Owner tries to rewrite them
`
`through argument and claim construction. Patent Owner proposes to construe
`
`“device-specific security information” as “information that is unique to the storage
`
`device and used to secure access to the storage device.” Paper 19 at 7 (emphasis
`
`added). This construction wrongly reads out the broader term “specific” and
`
`replaces it with the narrower tem “unique.” See Paper 9, 6-7 (Board finding that
`
`construction is not necessary); Paper 2 at 11-13 (Petitioner proposing a
`
`construction consistent with the claim language that does not read “specific” out of
`
`the claims). Additionally, Patent Owner and its expert improperly attempt to
`
`import the characteristics of examples of allegedly-unique types of “device-
`
`specific security information” from the specification into the claims.
`
`1 See 77 Fed. Reg. 48764 (Aug. 14, 2012) (“Should the Patent Owner, to
`
`avoid the prior art, contend that a claim term has a construction different from its
`
`broadest reasonable interpretation, the appropriate course is for the Patent Owner
`
`to seek to amend the claim to expressly correspond to its contentions in this
`
`proceeding.”).
`
`
`
`1
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`Patent Owner contends that its revision is needed to ensure the claims
`
`achieve a stated goal of the ’459 Patent—preventing an authorized user from using
`
`data in an unauthorized way. Paper 19 at 9-10; EX2004 at ¶¶28-29. But Patent
`
`Owner and its expert admit that this purpose is actually accomplished by an
`
`unclaimed feature: encrypting the data written to the storage device using device-
`
`specific security information that is unique. Paper 19 at 9-10; EX2004 at ¶¶28-29,
`
`EX1011, 107:10-108:5. This unclaimed feature should not be read into the
`
`independent claims.
`
`Patent Owner then attempts to argue that Bensimon does not teach the
`
`rewritten claims, but does not dispute that Bensimon’s read/write password
`
`qualifies as device-specific security information under Petitioner’s construction or
`
`the Board’s view that construction is unnecessary. See Paper 19 at 13-18.
`
`Moreover, a person of ordinary skill in the art would have understood Bensimon’s
`
`read/write password to be unique, EX1013, so Bensimon discloses the feature even
`
`with Petitioner’s rewrite.
`
`Patent Owner also argues that Bensimon does not disclose “operating the
`
`computer in a restricted-access mode when the storage device does not have the
`
`device-specific security information” (claims 1 and 33). First, Patent Owner
`
`wrongly interprets these open-ended claims as closed. Paper 19 at 26-29. Patent
`
`Owner then argues that Bensimon’s restricted-access mode does not meet the
`
`
`
`2
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`closed claim language because Petitioner contends that the absence of the
`
`read/write password (the claimed device-specific security information) plus the
`
`presence of a different password (write-protection) causes Bensimon’s system to
`
`enter the restricted access mode. Id. But the claim language is not so narrow—the
`
`claims are open-ended. Moreover, Petitioner relies on Bensimon’s read/write
`
`password, not the write-protection password, as the claimed “device-specific
`
`security information.”
`
`Second, Patent Owner contends that it would be “illogical” for Bensimon’s
`
`storage device to have a write-protection (read-only) password and not a read/write
`
`password. Paper 19 at 21; EX2004 at ¶50. But their opinion does not change the
`
`fact that Bensimon discloses configuring the storage device a password—which
`
`can be a write-protection password. EX1004 5:29-51. Besides, a POSITA would
`
`have recognized logical reasons for Bensimon’s storage device having only a write-
`
`protection password.
`
`Patent Owner also contends that Bensimon does not disclose the claimed
`
`“restricted-access mode” because, “in Bensimon, the PC card, and not the
`
`computer, prevents write access.” Paper 19 at 30 (citing EX2004 at ¶70).
`
`Although Bensimon’s storage device checks the password entered by the user
`
`before permitting access, the host computer of Bensimon also prevents access to
`
`the storage device.
`
`
`
`3
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`Because the Board should address the claims as issued rather than as
`
`rewritten by Patent Owner, the Board should cancel the challenged claims.
`
`II.
`
`ARGUMENT
`A. The Claimed “Device-specific Security Information” Need Not Be
`“Unique”
`Patent Owner is wrong to require “device-specific security information” to
`
`be unique because this construction: (1) reads “specific” out of the claims, (2)
`
`improperly imports embodiments from the specification into the independent
`
`claims, (3) ignores dependent claims directed to such embodiments, and (4)
`
`improperly imports a purpose statement from the specification into the independent
`
`claims. Each of these reasons alone is sufficient to reject Patent Owner’s
`
`construction. See, e.g., In re Katz Interactive Call Processing Patent Litigation,
`
`2011 WL 607381, *14 (Fed. Cir. 2011) (rejecting construction importing a
`
`limitation from one of the disclosed embodiments while also reading out other
`
`disclosed embodiments from the scope of the claim); Karlin Technology, Inc. v.
`
`Surgical Dynamics, Inc., F.3d 968 (Fed. Cir. 1999) (different words or phrases
`
`used in separate patent claims are presumed to indicate that the claims have
`
`different meanings and scope, and limitations in dependent claims are normally not
`
`to be read into their independent claim); Braintree Laboratories, Inc. v. Novel
`
`Laboratories, Inc., 749 F.3d 1349, 1354-55, 2014 WL 1584451, *3-*4 (Fed. Cir.
`
`2014) (district court properly refused to read into claim a term a requirement that
`
`
`
`4
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`an alleged goal be achieved because it was not claimed); Intel Corp. v. U.S. Intern.
`
`Trade Com’n, F.2d 821, 836 (Fed. Cir. 1991) (refusing to read limitations about a
`
`goal from the specification into the claims because the goal was not contained in
`
`the claims).
`
`1.
`Patent Owner reads “specific” out of the claims.
`Independent claims 1, 33, and 39 recite “device-specific security
`
`information,” not “device-unique security information” (emphases added). Patent
`
`Owner, however, asks the Board to construe “device-specific security information”
`
`in a way that reads “specific” out of the claims: “information that is unique to the
`
`storage device and used to secure access to the storage device.” Paper 19 at 7
`
`(emphasis added).
`
`“Unique” is narrower than “specific.” Unique means “being the only one” or
`
`“being without a like or equal.” EX1014, 4. While “specific” requires some degree
`
`of particularity, it does not require the one-of-a-kind precision of “unique.” See,
`
`e.g., EX1014, 3 (“constituting or falling into a specifiable category,” “sharing or
`
`being those properties of something that allow it to be referred to a particular
`
`category”). Thus, device-specific information refers to information particular to,
`
`but not necessarily unique to, a device. EX1012 at ¶5. Patent Owner’s construction
`
`improperly replaces the broader term “specific” with the narrower term “unique.”
`
`
`
`5
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`For example, in PSN Illinois, LLC v. Ivoclar Vivadent, Inc., the Federal
`
`Circuit ruled that the district court construed “ready for mounting” too narrowly by
`
`excluding any finishing steps before mounting when the specification suggested
`
`that some finishing steps may be performed before mounting. 525 F.3d 1159, 1162
`
`(Fed. Cir. 2008). Here, Patent Owner construes device-specific information too
`
`narrowly by excluding all information that is specific to the storage device but not
`
`necessarily unique, and the ’459 Patent does not require device-specific security
`
`information to be unique. For example, the specification states: “depending on the
`
`necessary level of security, the system uses format information that is unique to the
`
`removable storage device, manufacturing-specific information that is etched on the
`
`storage device….” EX1004 9:2-5 (emphases added). This passage suggests that
`
`whether the information is unique may depend on the necessary level of security,
`
`which the challenged claims never address. EX1012 at ¶6.
`
`The summary of the invention section does not even mention the word
`
`“unique,” much less require that device-specific security information be “unique.”
`
`EX1001 1:33-2:2; EX1011 92:13-93:4 (Patent Owner’s expert conceding this
`
`point). And when the specification lists examples of allegedly-unique, device-
`
`specific information, it characterizes them as non-limiting using language like “in
`
`one embodiment” and “depending on the [selected] security level.” See, e.g.,
`
`EX1001 1:47-55, 3:64-4:5, 4:9-19, 5:10-13, 5:49-57, 9:2-7; EX1012 at ¶8. If
`
`
`
`6
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`Patent Owner intended for the claimed security information to be unique, the
`
`Patent Owner could have used that term. In fact, Patent Owner used “unique” in
`
`claims 9 and 17 but not in the claims at issue.
`
`Different words in the same claim are generally presumed to have different
`
`meanings, and constructions that do so are preferred over ones that do not. See,
`
`e.g., Apple, Inc. v. Ameranth, Inc., 842 F.3d 1229 (Fed. Cir. 2016). On appeal from
`
`a CBM proceeding, the Federal Circuit in Apple v. Ameranth found that the PTAB
`
`correctly construed the term “menu” to be “a list of options available to a user
`
`displayable on a computer.” Id. 1236. The patent owner had argued that menu
`
`should be construed as “computer data representing collections of [hierarchical]
`
`linked levels of choices or options intended for display in a graphical user
`
`interface.” Id. (emphasis added). The Federal Circuit rejected the patent owner’s
`
`construction and found “[t]he Board was correct to not include in its construction
`
`of ‘menu’ features of menus that are [already] expressly recited in the
`
`claims. Ideally, claim constructions give meaning to all of a claim’s terms.” Id.,
`
`1237. Here, Patent Owner’s proposed construction requiring “unique” in the
`
`independent claims eliminates the meaning of “unique” recited in dependent
`
`claims 9 and 17.
`
`Because Patent Owner’s construction improperly reads terms out of the
`
`claims, it should be rejected.
`
`
`
`7
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`Patent Owner improperly imports examples from the
`specification into the claims.
`Patent Owner’s construction improperly imports mere examples of “unique”
`
`2.
`
`security information into the claims. Patent Owner and its expert repeatedly omit
`
`the fact that the ’459 Patent expressly prefaces those examples with the phrase “in
`
`one embodiment” or other qualifying language. See, e.g., EX1001, 1:47-55, 3:64-
`
`4:5, 4:9-19, 5:10-13, 5:49-57, 9:2-7. For example, in paragraph 26 of his
`
`declaration, Dr. Goldschlag identifies allegedly-unique examples of the claimed
`
`device-specific information mentioned in the ’459 Patent. He contends “[t]he ’459
`
`Patent states that low-level format information qualifies as device-specific security
`
`information and ‘uniquely identifies the underlying media of storage device 151.’”
`
`EX2004 at ¶26 (citing EX1001, 4:9-12); see also Paper 19 at 8-9. But both Dr.
`
`Goldschlag and Patent Owner fail to mention that this passage prefaces this
`
`example with the phrase “in one embodiment”:
`
`In one embodiment, the device-specific security information is a
`function of the low-level format information and, therefore,
`uniquely identifies the underlying media of storage device 151.
`
`EX1001 4:9-12 (emphases added). Properly understood, this passage means that, in
`
`one embodiment—not
`
`in all embodiments—the device-specific security
`
`information uniquely identifies the underling media of the storage device. EX1011
`
`The Federal Circuit has held “it is improper to read limitations from a preferred
`
`
`
`8
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`embodiment described in the specification—even if it is the only embodiment—
`
`into the claims absent a clear indication in the intrinsic record that the patentee
`
`intended the claims to be so limited.” EPOS Technologies Ltd. v. Pegasus
`
`Technologies Ltd., 766 F.3d 1338, 1343 (Fed. Cir. 2014) (emphasis added)
`
`(quoting Liebel-Flarsheim Co. v. Medrad, Inc., 358 F.3d 898, 913 (Fed. Cir.
`
`2004)). Thus, even if the only examples in the specification of device-specific
`
`information were unique, it would still be improper to import this characteristic
`
`into the challenged claims.
`
`The patent never states that the “device-specific security information” must
`
`be unique. See id.; EX1012 at ¶¶8, 21. Indeed, the ’459 Patent uses the prefix
`
`“unique” before “device-specific information,” meaning that ordinarily, device-
`
`specific information need not be unique. EX1001, 7:43-46 (“… how a unique,
`
`device-specific security
`
`information can be generated
`
`from
`
`the unique
`
`characteristics of the underlying storage medium.” (emphasis added); see also id.
`
`8:57-58 (“generation of a unique, device-specific key.” (emphasis added).);
`
`EX1012 at ¶9. Even Patent Owner’s expert admitted that examples may exist in
`
`which device-specific security information is not unique. EX1011:97:17-98:6.
`
`The only intrinsic evidence relied upon by Patent Owner is a set of citations
`
`purportedly demonstrating that “[t]he specification only recites examples of
`
`
`
`9
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`device-specific information that is unique to the device.” EX2004 at ¶27; Paper 19
`
`at 8-9. But none of these passages supports Patent Owner’s construction.
`
`As explained above, the final citation, ’459 Patent 7:43–46, uses the prefix
`
`“unique” before “device-specific information,” meaning that ordinary device-
`
`specific information is not unique. EX1001, 7:43-46 (“… how a unique, device-
`
`specific security information can be generated from the unique characteristics of
`
`the underlying storage medium.” (emphasis added). This supports Petitioner’s
`
`construction, not Patent Owner’s.
`
`The first cited passage, in the Summary of the Invention section, does not
`
`even use the word “unique.” See EX1001, 1:33-2:2. Patent Owner and its expert
`
`misquote the passage as stating that “‘the cryptographic key is generated by
`
`combining one or more of the following: (1) device-specific security information
`
`derived from the unique format information of the removable storage device….’”
`
`EX2004 at ¶26 (citing EX1001, 1:46–54) (emphasis in original). Not so. The
`
`Summary of the Invention section does not even use the word “unique.” See
`
`EX1011, 104:20-105:6, 105:21-106:15. Moreover,
`
`that passage discusses
`
`encryption while the claims at issue do not require encryption—claims 3, 4, 15-19,
`
`28, and 29 of ’459 Patent recite such features. Patent Owner’s expert concurred.
`
`See EX1011, 107:1-103:18-109:2. Thus, this passage also supports Petitioner’s
`
`construction, not Patent Owner’s.
`
`
`
`10
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`The second passage likewise does not support Patent Owner’s position.
`
`EX1001, 3:66-4:1. Patent Owner failed to mention that the examples of this
`
`passage “depend[] on the selected security level”:
`
`Depending upon the selected security level, the cryptographic
`key is generated by combining one or more of the following:
`(1) device-specific security information derived from the
`unique format information of the removable storage device, ….
`
`EX1004 3:64-4:1. This passage suggests that the type of device-specific security
`
`information or other information used to generate the key depends on a selected
`
`security level. EX1012 at ¶10. But no claim even mentions a “security level,”
`
`much less recites a particular security level that demands device-specific security
`
`information to be unique. Id.
`
`Not only does the next cited passage (4:9-12) also recite “[i]n one
`
`embodiment,” Patent Owner ignored the previous sentence that recites “device-
`
`specific security information” without mentioning it needs to be unique. EX1001,
`
`4:6-9 (“computer 100 determines whether device-specific security information was
`
`written to storage device 151”); EX1012 at ¶11. In context, this passage supports
`
`Petitioner rather than Patent Owner because it makes clear that the recited unique,
`
`device-specific security information was merely an example.
`
`
`
`11
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`Because Patent Owner’s construction improperly imports examples from the
`
`specification into the claims, it should be rejected.
`
`3.
`
`Patent Owner improperly imports a purpose of the ’459
`Patent into the claims.
`Patent Owner and its expert also contend that device-specific security
`
`information must be unique because “a goal of the ’459 Patent is to ‘prevent an
`
`authorized user from appropriating sensitive data by simply copying the sensitive
`
`data to a removable storage device.’” EX2004 at ¶28 (quoting EX1001 1:23–26);
`
`Paper 19 at 9. Dr. Goldschlag, however, goes on to explain that this goal is
`
`accomplished because “[t]he data can only be stored on the original storage device
`
`… because
`
`it was encrypted with a key comprised of device-specific
`
`information--information unique to the device.” EX2004 at ¶28 (emphasis added);
`
`see also Paper 19 at 9-10. Dr. Goldshlag confirmed that the ’459 Patent
`
`accomplishes the goal through encryption:
`
`Q. And you also explained in paragraph 28 that this [goal] is
`accomplished by encrypting the data on the storage device
`using the unique device-specific security information, right?
`
`A. Yes. So paragraph 28 says that unlike the Bensimon, where
`a password is used to control access to the data on the device, in
`’459, the computer uses device-specific security information
`to-as part of a cryptographic key, in some cases, to encrypt the
`
`
`
`12
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`data that ends up on the device. So that even if the data is read
`off of the device, the data is not available to somebody else.
`
`EX1011, 107:16-108:5. However, as explained above and admitted by Dr.
`
`Goldschlag, dependent claims recite the encryption feature. EX1001, claims 3, 4,
`
`15-19, 28, and 29; see also EX1011, 108:6-109:2. The independent claims do not.
`
`This demonstrates that Patent Owner is wrong to require “device-specific
`
`security information” to be unique in order to satisfy an unclaimed purpose recited
`
`in the specification. Not only does this improperly import a limitation from the
`
`specification, it ignores the fact that dependent claims recite what is required to
`
`satisfy the purpose identified in the specification (as admitted by the Patent
`
`Owner’s expert).
`
`B.
`
`Bensimon Anticipates Claims 1, 13, 14, 33, 39, 46, and 48
`1. Bensimon discloses the claimed “device-specific security
`information”
`Independent claims 1, 33, and 39 each recites “device-specific security
`
`information.” Petitioner contends that Bensimon’s read/write password or the
`
`combination of the read/write password and the password-enabling flag disclose
`
`the claimed “device-specific security information.” Paper 2 at 21-25. According to
`
`Patent Owner, neither of these discloses “device-specific security information”
`
`because “Bensimon’s read-write password … is not unique.” Paper 19 at 16. Not
`
`so, for at least two reasons.
`
`
`
`13
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`First, none of the claims at issue requires the device-specific information to
`
`be unique. See supra Section II.A. Nor does Patent Owner dispute that Bensimon’s
`
`read/write password qualifies as device-specific security information under
`
`Petitioner’s construction or the Board’s view that construction is unnecessary. See
`
`Paper 19 at 21:16-19; Paper 2 at 13-14. Thus, Bensimon’s read/write password
`
`alone or together with the password-enabling flag discloses the claimed “device-
`
`specific security information” under a correct construction of this term.
`
`Second, a person of ordinary skill in the art would have understood
`
`Bensimon’s password to be unique. EX1012 at ¶16. A technical dictionary at the
`
`time defined “password” in the computer context to be unique. See, e.g. EX1013, 8
`
`(“[a] unique character string that a user types to access a computer, network, or an
`
`application such as a database or a Web-based service.” (emphasis added). This
`
`corresponds to the understanding of a person of ordinary skill in the art at the time.
`
`EX1012 at ¶16.
`
`Hence, Bensimon discloses
`
`the claimed “device-specific
`
`security
`
`information” under Petitioner’s construction, the Board’s construction, or Patent
`
`Owner’s incorrect construction.
`
`
`
`14
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`2. Bensimon discloses “operating the computer in a restricted-
`access mode when the storage device does not have the device-
`specific security information” by configuring the storage
`device 100 with only a write-protection password.
`Independent claims 1 and 33 of the ’459 Patent recite “operating the
`
`computer in a restricted-access mode when the storage device does not have the
`
`device-specific security information.”2 The Petition explained that Bensimon
`
`satisfies this feature as follows:
`
`The [operating in a restricted access mode] step … is met in a
`situation where Bensimon’s storage device 100 does not have
`the
`read-write password
`as
`‘device-specific
`security
`information’ but instead has the write-only password. In this
`case, if the user correctly enters the write-only password on the
`storage device 100 at the ‘comparison’ step, the user is given
`only write access to the storage device 100. See [EX1004] at
`6:13–29.
`
`
`2 Independent claim 39 is broader in this respect because it recites
`
`“selectively configure the drive to operate in a full-access mode of operation or a
`
`restricted-access mode of operation as a function of the device-specific security
`
`information stored on the storage device.” It does not require the storage device to
`
`not have the device-specific security information to operate in restricted access
`
`mode.
`
`
`
`15
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`Paper 2 at 27. Bensimon’s read/write password alone, or together with the
`
`password-enabling flag, discloses “device-specific security information.” Supra
`
`Section II.B.1. Thus, when Bensimon’s storage device 100 only has the write-
`
`protection (read-only) password, Bensimon discloses that the storage device does
`
`not have “device-specific security information” because it does not have the read-
`
`write password. EX1012 at ¶18.
`
`First, Patent Owner contends that Petitioner’s interpretation of Bensimon
`
`rewrites the claims to have two different instances of “device-specific security
`
`information” because, “if Bensimon’s read-write password constitutes device-
`
`specific security information, then the write-protection password must as well.”
`
`Id., 17. But this argument reveals that it is Patent Owner that is redrafting the
`
`claim; whether Bensimon’s write-protection password can be characterized as an
`
`item of “device-specific security information” is irrelevant.
`
`Under the correct interpretation, much more so under the broadest
`
`reasonable interpretation, these claims recite operating in one mode if “the device-
`
`specific security information” (i.e., that instance of device-specific security
`
`information) is present, and operating in another mode if “the device-specific
`
`security information” (i.e., that instance of device-specific security information) is
`
`not present.
`
`
`
`16
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`Instead of seeking to amend its claims, Patent Owner incorrectly attempts to
`
`rewrite the claims as operating based on whether any device-specific security
`
`information is present: “operating the computer in a restricted-access mode when
`
`the storage device does not have the any device-specific security information.”
`
`Hence, whether Bensimon’s write-protection password is considered “device-
`
`specific security information” is irrelevant—Bensimon disclosing operating in the
`
`two claimed modes depending on the presence of the read-write password (“the
`
`device-specific security information”) is sufficient. EX1012 at ¶19. Thus, Patent
`
`Owner’s argument should be rejected.
`
`Second, Patent Owner contends that Petitioner is wrong that “Bensimon’s
`
`system can store a read only password alone, without also storing a read-write
`
`password.” Paper 19 at 20-21. According to Patent Owner, “Bensimon does not
`
`contemplate a mode of operation where only its read-only password would be
`
`stored without a read-write password.” Paper 19 at 20-21; EX2004 at ¶¶49-52. But
`
`this is wrong.
`
`First, a person of ordinarys skill int the art would have understood Bensimon
`
`to disclose configuring the storage device 100 with one password. EX1012 at ¶21.
`
`As explained in the Petition, Bensimon teaches that “[t]here are two classes of
`
`passwords: (1) Write protection (read-only); and (2) Read/Write protection.”
`
`EX1004 6:13-14 (emphases added); Paper 2 at 22-23. A person of ordinary skill
`
`
`
`17
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`would have understood this to mean that the storage device can use a write-
`
`protection password, a read/write protection password, or both types of passwords.
`
`EX1012 at ¶21. Bensimon never says that both types of passwords must always be
`
`put on the storage device. Id. Dr. Goldschlag could not identify any language in
`
`Bensimon requiring both passwords to be stored on the device. EX1011, 86:16-
`
`88:13.
`
`Bensimon supports such a reading when it discloses the process for
`
`configuring the storage device 100 with “a password” using a “Password-Enable
`
`command.” EX1004 5:30-51 (emphasis added). Bensimon describes this process as
`
`transferring one password (i.e., either a read/write password or a write-protection
`
`password) to the storage device:
`
`If the pc card is not previously in a password protected mode
`and the owner wishes to make the card 100 password protected,
`he or she would enter a valid password into the computer unit
`10 along with a Password-Enable command. The computer unit
`10 would then transfer the password string to the card 100 thus
`enabling a protection mode in the device 100.
`
`EX1004 5:34-43 (emphases added). This passage explains that the Password-
`
`Enable command transfers one password to the storage device (at least at a time).
`
`Patent Owner’s expert agreed that this is the literal understanding of this passage.
`
`See EX1011, 72:2-73:9, 78:2-18, 83:1-13. And given Bensimon’s disclosure of two
`
`
`
`18
`
`

`

`IPR2016-01404
`US. Patent No. 6,968,459
`types of passwords, the one password sent to the storage device could be either a
`
`read-write password or a write-protection password. EX1012 at ¶22.
`
`Patent Owner’s incorrect view that Bensimon’s storage device must always
`
`store both types of password stems not from the actual disclosure of Bensimon but
`
`from their opinion that a read-only configuration in Bensimon is “illogical.” Paper
`
`19 at 21; EX2004 at ¶50; EX1011, 87:5-13.
`
`First, Patent Owner suggests that it would be illogical to equip the storage
`
`device with only a write-protection password because data could never be written
`
`to the device. Paper 19 at 21. This argument fails because Bensimon discloses that
`
`the storage device initially has no password or security mode, and a user adds the
`
`password using the password-enable command. EX1004 5:34-41 (“If the pc card is
`
`not previously in a password protected mode and the owner wishes to make the
`
`card 100 password protected, he or she would enter a valid password into the
`
`computer unit 10 along with a Password-Enable command. The computer unit 10
`
`would then transfer the password string to the card 100 thus enabling a protection
`
`mode in the device 100.”); EX1012 at ¶17. Patent Owner overlooks that the owner
`
`could put data on the card before configuring it with the write-protection password.
`
`EX1012 at ¶23.
`
`Second, Patent Owner contends that “[s]uch a system would be illogical
`
`because the password can be used to enable or disable password protection.”
`
`
`
`19
`
`

`

`IPR2016-01404
`US. Patent No.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket