throbber

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Paper No. ________
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`_______________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________
`
`KYOCERA INTERNATIONAL, INC.
`Petitioner
`v.
`
`BLUE SPIKE, LLC
`Patent Owner
`
`Patent No. 5,745,569
`Issue Date: April 28, 1998
`Title: METHOD FOR STEGA-CIPHER PROTECTION OF COMPUTER CODE
`_______________
`
`Inter Partes Review No. IPR2017-01061
`____________________________________________________________
`
`
`
`PETITION FOR INTER PARTES REVIEW
`UNDER 35 U.S.C. §§ 311-319 AND 37 C.F.R. § 42.100 ET. SEQ.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`
`
`
`
`
`TABLE OF CONTENTS
`
`
`EXHIBIT LIST ........................................................................................................ iii 
`NOTICE OF LEAD AND BACKUP COUNSEL ..................................................... 1 
`NOTICE OF EACH REAL-PARTY-IN-INTEREST ............................................... 1 
`NOTICE OF RELATED MATTERS ........................................................................ 1 
`NOTICE OF SERVICE INFORMATION ................................................................ 2 
`GROUNDS FOR STANDING .................................................................................. 2 
`STATEMENT OF MATERIAL FACTS .................................................................. 2 
`STATEMENT OF PRECISE RELIEF REQUESTED .............................................. 3 
`THRESHOLD REQUIREMENT FOR INTER PARTES REVIEW ......................... 3 
`STATEMENT OF REASONS FOR RELIEF REQUESTED ................................... 4 
`I. 
`Introduction to the Technology of the ’569 Patent .......................................... 4 
`II. 
`Independent Claims 1, 10, and 16 of the ’569 Patent ...................................... 5 
`III.  Construction of the Claims .............................................................................. 7 
`i. 
`“copy protecting a software application” (Claims 1, 10, 16) ................ 7 
`ii. 
`“during execution of the software application” (Claim 16) ................ 10 
`iii. 
`“intermittently relocating” (Claim 16) ................................................ 12 
`iv. 
`“executable code resources” (Claims 1, 10, 16) ................................. 13 
`IV.  Claim-By-Claim Explanation of Grounds for Unpatentability ..................... 14 
`Ground 1.  Claims 1, 10, and 16 of the ’569 Patent are unpatentable as
`anticipated by Goldreich (Ex. 1003). .................................................. 15 
`Goldreich Is Prior Art Under 35 U.S.C. § 102(b) ............................... 15 
`
`i. 
`
`i
`
`
`
`

`

`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`Goldreich Discloses All Elements of Independent Claims 1, 10, and
`ii. 
`16 ......................................................................................................... 16 
`Ground 2.  Claim 16 of the ’569 Patent is unpatentable as anticipated by U.S.
`Patent No. 5,123,045 (Ex. 1005). ........................................................ 24 
`The ’045 Patent Is Prior Art Under 35 U.S.C. § 102(b) ..................... 24 
`i. 
`The ’045 Patent Discloses All Elements of Independent Claim 16 .... 24 
`ii. 
`Ground 3.  Claim 16 of the ’569 Patent is unpatentable as anticipated by
`Ostrovsky 1992 (Ex. 1004). ................................................................ 32 
`Ostrovsky 1992 Is Prior Art Under 35 U.S.C. § 102(b) ...................... 32 
`i. 
`Ostrovsky 1992 Discloses All Elements of Independent Claim 16 .... 32 
`ii. 
`Ground 4.  Claim 16 of the ’569 Patent is unpatentable as anticipated by
`Ostrovsky 1990 (Ex. 1006). ................................................................ 36 
`Ostrovsky 1990 Is Prior Art Under 35 U.S.C. § 102(b) ...................... 36 
`i. 
`Ostrovsky 1990 Discloses All Elements of Independent Claim 16 .... 37 
`ii. 
`CONCLUSION ........................................................................................................ 41 
`
`
`ii
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`
`
`
`EXHIBIT LIST
`
`
`
`
`
`Exhibit
`Ex. #
`1001 U.S. Patent No. 5,745,569 (“the ’569 Patent”)
`1002
`Image File Wrapper for ’569 Patent
`1003 Oded Goldreich, Towards a Theory of Software Protection and
`Simulation by Oblivious RAMs, 1987 Symposium on Theory of
`Computing 182-194 (May 1987) (“Goldreich”)
`1004 Rafail Ostrovsky, Software Protection and Simulation on Oblivious
`RAMs (May 17, 1992) (MIT Ph.D. Thesis) (“Ostrovsky 1992”)
`1005 U.S. Patent No. 5,123,045 to Rafail Ostrovsky (“the ’045 Patent”)
`1006 Rafail Ostrovsky, Efficient Computation on Oblivious RAMs, 1990
`Symposium on Theory of Computing 514-523 (May 1990) (“Ostrovsky
`1990”)
`Expert Declaration of Rafail Ostrovsky, Ph.D.
`1007
`1008 Claim Construction Order entered May 16, 2016 in an unrelated
`litigation, Blue Spike, LLC v. Huawei Techs. Co. et al., Case No. 6:13-
`cv-00679, Dkt. 194.
`1009 Curriculum Vitae of Rafail Ostrovsky, Ph.D.
`1010
`Image File Wrapper for U.S. Patent No. 8,930,719
`
`
`
`iii
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`
`
`
`
`
`
`NOTICE OF LEAD AND BACKUP COUNSEL
`
`Lead Counsel: Nicola A. Pisano (Reg. No. 34,408) Tel: 858.847.6877
`
`Backup Counsel: Scott R. Kaspar (Reg. No. 54,583) Tel: 312.832.5113
`
`Address: Foley & Lardner LLP, 3579 Valley Centre Drive, San Diego, CA 92130
`
`Fax: 858.792.6773
`
`NOTICE OF EACH REAL-PARTY-IN-INTEREST
`
`The real-parties-in-interest are: Kyocera International, Inc. is a wholly-owned
`
`subsidiary of Kyocera Corporation, a publicly-traded Japanese entity.
`
`NOTICE OF RELATED MATTERS
`
`Patent Owner asserted the ’569 Patent against Kyocera International, Inc. in the
`
`Eastern District of Texas in a case captioned Blue Spike, LLC v. Archos, Inc. et al.,
`
`Case No. 6:16-cv-1142, filed September 2, 2016. Patent Owner voluntarily dismissed
`
`the action on February 9, 2017. On February 10, 2017, Kyocera International, Inc.
`
`filed a complaint for declaratory judgment of non-infringement only in the Southern
`
`District of California in a case captioned Kyocera International, Inc. v. Blue Spike,
`
`LLC, Case No. 3:17-cv-0262-BTM-JMA, which is now pending before the Hon. Barry
`
`T. Moskowitz.
`
`1
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`NOTICE OF SERVICE INFORMATION
`
`
`
`
`
`Please address all correspondence to the lead counsel at the address above.
`
`Petitioner consents to electronic service at: npisano@foley.com; and
`
`skaspar@foley.com.
`
`GROUNDS FOR STANDING
`Petitioner hereby certifies that the patent for which review is sought is available for
`
`inter partes review and that the Petitioner is not barred or estopped from requesting an
`
`inter partes review challenging the patent claims on the grounds identified in the
`
`Petition.
`
`STATEMENT OF MATERIAL FACTS
`
`The ’569 Patent matured from U.S. Patent Application Serial No. 587,943, filed
`
`January 17, 1996, and issued on April 28, 1998. The ’569 Patent expired on January
`
`17, 2016.
`
`The ’569 Patent does not claim priority to any earlier-filed patent applications.
`
`Accordingly, the effective filing date of the ’569 Patent is January 17, 1996. Applying
`
`the Pre-AIA Section 102(b) requirement, prior art to the ’569 Patent is that which was
`
`patented or described in a printed publication more than one year before the effective
`
`filing date of the ’569 Patent (i.e. before January 17, 1995).
`
`The ’569 Patent purports to cover a method for protecting computer code
`
`copyrights by encoding the code into a data resource with a digital watermark. The
`
`’569 Patent describes the problem of skilled computer hackers, who take a “snap-shot”
`2
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`of the code while it is in the computer’s memory, in order to copy it. Ex. 1001 at 7:39-
`
`
`
`
`
`44, 7:52-59, 8:4-10 (describing process by which a skilled technician can overcome
`
`countermeasures using a “snap-shot of the code in memory”).
`
`The ’569 Patent purports to solve the “snap-shot” counterfeiting attacks by
`
`randomly shuffling portions of the executing code in the computer’s memory, such that
`
`any “snap-shot” taken by a would-be hacker is meaningless. Ex. 1001 at 7:52-59, 8:1-
`
`10. Claim 16 of the ’569 Patent, in particular, is directed to guard against hacking by
`
`“intermittently relocating” code resources within the memory in order to provide a
`
`measure of “copy protecting”.
`
`The purported invention claimed in the ’569 Patent, which shuffles code in the
`
`computer memory in order to defeat copying attacks, was well known in the art many
`
`years before the priority date of the ’569 Patent.
`
`STATEMENT OF PRECISE RELIEF REQUESTED
`
`Petitioner respectfully requests the Board initiate an inter partes review and cancel
`
`Claims 1, 10, and 16 of the ’569 Patent as unpatentable pursuant to 35 U.S.C. § 311(b)
`
`based on the four grounds of unpatentability discussed in detail herein.
`
`THRESHOLD REQUIREMENT FOR INTER PARTES REVIEW
`A petition for inter partes review must demonstrate “a reasonable likelihood that
`
`the petitioner would prevail with respect to at least one of the claims challenged in the
`
`petition.” (35 U.S.C. § 314(a).) The Petition meets this threshold. All elements of
`
`3
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`Claims 1, 10, and 16 of the ’569 Patent are taught in the prior art as explained below in
`
`
`
`
`
`the proposed grounds of unpatentability.
`
`STATEMENT OF REASONS FOR RELIEF REQUESTED
`
`I.
`
`Introduction to the Technology of the ’569 Patent
`
`The ’569 Patent, entitled “Method for Stega-Cipher Protection of Computer Code,”
`
`is directed to “[a] method for protecting computer code copyrights by encoding the
`
`code into data resource with a digital watermark.” Ex. 1001, Abstract. The Summary
`
`of Invention further describes that the “goal” of the alleged “present invention” is to
`
`“provide a level of security for executable code on similar grounds as that which can
`
`be provided for digitized samples.” Ex. 1001 at 3:21-23. The Field of Invention of the
`
`’569 Patent describes a problem that the ’569 Patent is purported to solve. According
`
`to that section the ’569 Patent: “With the advent of computer networks and digital
`
`multimedia, protection of intellectual property has become a prime concern for
`
`creators and publishers of digitized copies of copyrightable works, such as musical
`
`recordings, movies, video games, and computer software. One method of protecting
`
`copyrights in the digital domain is to use ‘digital watermarks.’” Ex. 1001 at 1:5-11.
`
`Consequently, the ’569 Patent purports to solve the problem through the use of a
`
`“stegacipher” process: “It is desirable to use a ‘stega-cipher’ or watermarking process
`
`to hide the necessary parts or resources of the executable object code in the digitized
`
`sample resources. Ex. 1001 at 2:1-3.
`
`4
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`The purported invention of the ’569 Patent—i.e., to watermark or to shuffle code in
`
`
`
`
`
`the computer memory—was well known in the prior art many years before the priority
`
`date of the ’569 Patent. In particular, the claimed methods were disclosed at least by
`
`the prior art identified in this Petition, as detailed in the claim charts that follow.
`
`Independent Claims 1, 10, and 16 of the ’569 Patent
`
`II.
`Independent claims 1 and 10 are directed to watermarking, that is, methods of
`
`embedding a resource into the code. Claim 1 states and requires:
`
`1. A method for copy protection of computer software, the
`
`computer software including executable code and a non-
`
`executable digital sample, said method comprising the steps
`
`of:
`
`identifying a portion of the executable code to be
`
`encoded:
`
`generating an encoded code resource from the identified
`
`portion of the executable code; and
`
`embedding the encoded code resource in the non-
`
`executable digital sample.
`
`Similarly, Independent claim 10 states and requires:
`
`10. A method for copy protection of computer software to be
`
`provided to an authorized user, the computer software
`
`5
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`including a plurality of code resources and a plurality of data
`
`
`
`
`
`resources, wherein each of the plurality of code resources
`
`includes a set of executable instructions, said method
`
`comprising the steps of:
`
`selecting a code resource to be encoded;
`
`using information relating to the authorized user to
`
`associate the selected code resource with a data resource; and
`
`encoding the selected code resource within the associated
`
`data resource.
`
`Independent claim 16 is directed to the process of “intermittently relocating”
`
`aspects of the code in the computer memory in order to provide a measure of “copy
`
`protecting”. Claim 16 states and requires:
`
`16. A method for copy protecting a software application
`
`executed by a computer system, the software application
`
`including a plurality of executable code resources loaded in a
`
`memory of the computer system, said method comprising the
`
`steps of:
`
`determining an address within the memory of the
`
`computer system associated with each of the plurality of
`
`executable code resources; and
`
`6
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`intermittently relocating each of the plurality of
`
`
`
`
`
`executable code resources to a different address within the
`
`memory of the computer during execution of the software
`
`application.”
`
`III. Construction of the Claims
`An expired claim in an inter partes review is construed under the standard set forth
`
`in Phillips v. AWH Corp., 415 F.3d 1303, 1312-13 (Fed. Cir. 2005), where claim terms
`
`are presumptively given their ordinary and customary meaning as understood by a
`
`person of ordinary skill in the art at the time of the invention, considering the language
`
`of the claims and specification, and the prosecution history. See Panel Claw, Inc. v.
`
`Sunpower Corp., IPR2014-00386, Paper 7 at 7 (P.T.A.B. June 30, 2014).
`
`In addition to this presumption, Petitioner provides a more detailed explanation of
`
`the ordinary and customary meaning of certain claim terms.
`
`i.
`
`“copy protecting a software application” (Claims 1, 10, 16)
`
`The preambles of Claims 1, 10, and 16 are claim limitations. “If the claim
`
`preamble, when read in the context of the entire claim, recites limitations of the claim,
`
`or, if the claim preamble is ‘necessary to give life, meaning, and vitality’ to the claim,
`
`then the claim preamble should be construed as if in the balance of the claim.” Pitney
`
`Bowes, Inc. v. Hewlett-Packard Co., 182 F.3d 1298, 1305 (Fed. Cir. 1999). “When
`
`limitations in the body of the claim rely upon and derive antecedent basis from the
`
`7
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`preamble, then the preamble may act as a necessary component of the claimed
`
`
`
`
`
`invention.” See Eaton Corp. v. Rockwell Int’l Corp., 323 F.3d 1332, 1339 (Fed. Cir.
`
`2003) (citations omitted).
`
`Here, the preambles provide antecedent basis to multiple claim limitations that
`
`appear in the body of the respective claims. For example, each of the terms “software
`
`application,” “computer system,” “plurality of executable code resources,” and
`
`“memory of the computer system” appear in the preambles and in the body of each of
`
`Claims 1, 10 and 16. The preambles further give life, meaning and vitality to the
`
`claims by teaching that the claimed methods are “for copy [protecting/protection of] a
`
`software application.” Accordingly, the preambles should be considered claim
`
`limitations.
`
`The specification of the ’569 patent repeatedly describes that the disclosed methods
`
`are designed to protect a software application from unauthorized copying. For
`
`example, the specification states that in the purported invention “distribution and
`
`exchange of content would be made more secure from unauthorized copying,” and that
`
`the allegedly inventive methods prevents “unauthorized copies” and prevent hackers
`
`from “forc[ing] the application program to run as an unauthorized copy.” Ex. 1001 at
`
`3:30-41, 4:49-53, 5:51-57, 7:13-17.
`
`8
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`The prosecution history of the ’569 patent confirms that the inventive methods are
`
`
`
`
`
`directed towards preventing unauthorized copying. Specifically, to overcome the
`
`examiner’s rejection over a prior art reference (“Houser”), the applicant argued:
`
`The Examiner acknowledges that Houser does not teach
`
`protection of computer software, but states that it would have
`
`been obvious to one of ordinary skill in the art to use the
`
`Houser invention for that purpose. . . . Such an approach,
`
`however, would not result in the claimed invention. . . .
`
`Application of Houser to computer software would [] fail to
`
`achieve a significant benefit of the claimed invention;
`
`namely, rendering an unauthorized copy of computer
`
`software effectively inoperable.
`
`Ex. 1002, 7/23/1997 Response to Office Action, at pp. 2-3 (emphasis added).
`
`Based on the specification and prosecution history, one of ordinary skill in the art
`
`would understand the phrase “copy [protecting/protection of] a software application”
`
`to mean “protecting a software application from unauthorized copying or the use of
`
`unauthorized copies.” Ex. 1007 at ¶ 38.
`
`The Eastern District of Texas entered this same construction in the unrelated
`
`litigation, Blue Spike, LLC v. Huawei Techs. Co. et al., Case No. 6:13-cv-00679 (“the
`
`Huawei Litigation”). Ex. 1008 at p. 5.
`
`9
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`Accordingly, Petitioner requests that the Board find the preambles to be limiting
`
`
`
`
`
`and adopt the same construction used in the Huawei Litigation in this proceeding by
`
`construing the phrase “copy [protecting/protection of] a software application” to mean
`
`“protecting a software application from unauthorized copying or the use of
`
`unauthorized copies.”
`
`ii.
`
`“during execution of the software application” (Claim 16)
`
`Claim 16 makes a distinction between loading and execution of the software
`
`application. While the preamble of the claim refers to loading (i.e. “plurality of code
`
`resources loaded in a memory”), the body of the claim refers to execution (i.e. “during
`
`execution of the software application”). These different claim terms are presumed to
`
`have different meanings. Applied Med. Res. Corp. v. U.S. Surgical Corp., 448 F.3d
`
`1324, 1333 n.3 (Fed. Cir. 2006). Therefore, Claim 16 requires the executable code
`
`resources to be loaded into memory before the claimed method can be carried out. Ex.
`
`1001 at 10:10-12 (“the software application including a plurality of executable code
`
`resources loaded in a memory of the computer system.”) The body of Claim 16 then
`
`refers to this “software application” and “plurality of executable code resources” and
`
`requires “intermittently relocating each of the plurality of executable code resources to
`
`a different address within the memory of the computer during execution of the
`
`software application.” Ex. 1001 at 10:16-19. Accordingly, the claim requires that the
`
`“execution of the software application” takes place after it is loaded into memory and
`
`10
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`the intermittent relocation of the resources take place during the execution while the
`
`
`
`
`
`software application is running.
`
`The ’569 patent specification likewise confirms that these requirements are distinct.
`
`According to the patent, while the concept of rearranging or relocating code resources
`
`in memory was not a new one, operating systems typically performed such rearranging
`
`during “system time,” which is after the relevant code resources have been loaded into
`
`memory but prior to the execution of the application code: “Once the code resources
`
`of a program are loaded into memory, they typically remain in a fixed position unless
`
`the computer operating system finds it necessary to rearrange certain portions of
`
`memory during ‘system time,’ when the operating system code, not application code,
`
`is running.” Ex. 1001 at 7:30-34.
`
`Thus, consistent with the language of Claim 16, the specification confirms that the
`
`software application is loaded into computer memory first and then during execution
`
`of the software application, which takes place after the application is loaded into
`
`memory, intermittent relocating of the executable code resources occurs. In other
`
`words, the executable code resources are intermittently relocated while the software
`
`application is running.
`
`In the Huawei Litigation, the phrase “during execution of the software application”
`
`was construed to mean “while the software application is running.” Ex. 1008 at p. 6.
`
`Petitioner requests that the Board adopt the same construction in this proceeding.
`
`11
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`“intermittently relocating” (Claim 16)
`iii.
`
`
`
`
`
`During prosecution of the ’569 patent, the examiner stated that “it is unclear what is
`
`meant by ‘relocating’ and by ‘intermittently relocating’.” See Ex. 1002, 6/26/1997
`
`Response to Office Action at p. 7 In response, the applicant made the following
`
`admission:
`
`Applicants respectfully direct the Examiner’s attention to the
`
`disclosure at [Ex. 1001 at 8:1-19] of the Specification, which
`
`describes an embodiment of the present invention wherein
`
`the code resources are ‘shuffled’ in memory at periodic,
`
`random or pseudo-random intervals. See also [Ex. 1001 at
`
`3:38-41 of the] Specification, (‘Attempts to tamper or ‘patch’
`
`substitute code resources can be made highly difficult by
`
`randomizing the location of said resources in memory on an
`
`intermittent basis . . .’). Given the foregoing, the Applicant
`
`respectfully submits that the language of [application]
`
`claim[] 28 would be clear to a person of ordinary skill in the
`
`art.
`
`Ex. 1002, 6/26/1997 Response to Office Action at p. 7. Application claim 28 issued as
`
`independent claim 16 at issue here.
`
`12
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`Applicant’s admission is consistent with the stated object of the ’569 patent. The
`
`
`
`
`
`patent is directed to preventing someone from copying “snapshots” of code located in
`
`memory. Ex. 1001 at 7:41-44. Thus, the specification teaches rearranging code
`
`resources through the “intentional[] shuffl[ing]” of executable code resources “[d]uring
`
`execution time” at “periodic[]” or “random or pseudo-random intervals.” Id. at 8:1-9.
`
`This “shuffling” results in a greater difficulty for “someone trying to analyze snapshots
`
`[because they] cannot be sure they are looking at the same code or organization from
`
`one ‘break’ to the next.” Id. at 8:7-10. Thus, the proposed construction of
`
`“intentionally shuffling at random or pseudo random intervals” is consistent with the
`
`object of the ’569 patent and therefore should be adopted.
`
`Additionally, in the Huawei Litigation, the term “intermittently relocating” was
`
`construed to mean “intentionally shuffling at periodic, random, or pseudo-random
`
`intervals.” Ex. 1008 at p. 8. Petitioner requests that the Board adopt the same
`
`construction in this proceeding.
`
`iv.
`
`“executable code resources” (Claims 1, 10, 16)
`
`The phrase “executable code resources” appears in both the preamble and body of
`
`Claims 1, 10, and 16. As two different method steps of Claim 16 center around actions
`
`performed in relation to the “executable code resources,” a proper construction of this
`
`phrase is necessary to define the scope of Claim 16.
`
`13
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`The specification defines “code resources” in terms of packaged, sub-objects:
`
`
`
`
`
`“subobjects can be packaged into what are referred to as ‘code resources’ . . . .” Ex.
`
`1001 at 4:26. “Sub-objects,” as used in the ’569 patent, refer to discrete executable
`
`segments of a program. Id. at 3:44-4:17. The specification further explains that an
`
`application may be referred to as an “executable object code from the point of view of
`
`the engineer.” Id. at 3:44-47. The specification goes on to teach that “[a] collection of
`
`smaller, atomic (or indivisible) chunks of object code typically comprise the complete
`
`executable object code . . . [t]hose indivisible portions of object code correspond with
`
`the programmers’ function or procedure implementations in higher level languages.”
`
`Id. at 3:47-53. These functions or procedures are compiled and make up an executable
`
`object code (or a program). Id. at 4:13-17. The object code or program includes
`
`instructions executed by the CPU and data called by the instructions. Ex. 1007 at ¶ 50.
`
`The court in the Huawei Litigation construed “executable code resources” to be
`
`“compiled functions or procedures.” Ex. 1008 at 12. Accordingly, Petitioner requests
`
`that the Board adopt the same construction in this proceeding.
`
` Claim-By-Claim Explanation of Grounds for Unpatentability
`
`IV.
`Unpatentability of Claims 1, 10, and 16 of the ’569 Patent is set forth below and
`
`discussed in the accompanying expert declaration (Ex. 1007).
`
`14
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`Ground 1. Claims 1, 10, and 16 of the ’569 Patent are unpatentable as
`anticipated by Goldreich (Ex. 1003).
`
`
`
`
`
`Claims 1, 10, and 16 of the ’569 Patent are unpatentable under 35 U.S.C. § 102(b)
`
`as anticipated by Oded Goldreich, Towards a Theory of Software Protection and
`
`Simulation by Oblivious RAMs, 1987 Symposium on Theory of Computing 182-194
`
`(May 1987) (“Goldreich,” Ex. 1003).
`
`i.
`
`Goldreich Is Prior Art Under 35 U.S.C. § 102(b)
`
`Goldreich was included in the proceedings distributed at the 1987 Symposium on
`
`Theory of Computing (“STOC”) sponsored by the Association for Computing
`
`Machinery (“ACM”), which was held in May 25-27, 1987 in New York, New York.
`
`As shown on Page ii of Goldreich, the proceedings bear a 1987 copyright date, with an
`
`International Standard Book Number (“ISBN”) 0-89791-221-7, which reflects a
`
`copyright date of June 1987. (See http://www.isbnsearch.org/isbn/0897912217). Page
`
`182 of Goldreich also includes a 1987 copyright date, the same ISBN, and a price. The
`
`Board has found the copyright information on technical journal articles, such as that
`
`compiled and published by ACM, to be sufficient to establish that Goldreich was
`
`published and publicly available no later than December 31, 1987. Ericsson Inc. v.
`
`Intellectual Ventures I LLC, IPR2014-00527, Paper 41, at 10-11 (P.T.A.B. May 18,
`
`2015). Moreover, as shown on the cover page of Goldreich, the Library of Congress
`
`stamp indicates that it was received by the Library on February 12, 1989, which is
`
`15
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`more than five years before the critical date of the ’569 patent. Accordingly,
`
`
`
`
`
`Goldreich constitutes a printed publication and is prior art under Section 102(b).
`
`ii.
`
`Goldreich Discloses All Elements of Independent Claims 1, 10, and 16
`
`Independent claims 1 and 10 of the ’569 patent are directed towards a method of
`
`“watermarking” code, or embedding code resources into aspects of the code sought to
`
`be protected from unauthorized copying. Independent claim 16 is directed to the
`
`process of “intermittently relocating” aspects of the code in the computer memory in
`
`order to provide a measure of “copy protecting”.
`
`Goldreich discloses a method of protecting a software application from illegitimate
`
`or unauthorized copying. Ex. 1003 at p. 182. One of ordinary skill would understand
`
`this to be a type of copy protection as claimed by Claims 1, 10, and 16, consistent with
`
`the proposed construction. Ex. 1007 at ¶ 54.
`
`Goldreich discloses use of an oblivious Random Access Machine (“RAM”) model
`
`of computation. Ex. 1007 at ¶ 55. One of ordinary skill would understand the
`
`oblivious RAM model of computation to be a model of computation by which an
`
`operating system runs software applications. Ex. 1007 at ¶ 56. Moreover, one of
`
`ordinary skill would understand the plurality of code resources disclosed in Definition
`
`5 to be applicable to any software application. Ex. 1007 at ¶ 58.
`
`Goldreich discloses mapping portions of the executable code to registers of the
`
`oblivious RAM. Ex. 1003 at p. 188, Sec. 3. One of ordinary skill would understand
`
`16
`
`
`
`

`

`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`that the oblivious RAM registers can be used for guarding against unauthorized
`
`
`
`
`
`copying by either embedding code resources into the computer software (Ex. 1003 at
`
`p. 184), as claimed by Claims 1 and 10, and/or by intermittently relocating, or
`
`intentionally shuffling, the code resources within the executable code (Ex. 1003 at p.
`
`192), as claimed by Claim 16. See Ex. 1007 at ¶ 60.
`
`Each of the elements of Claims 1, 10, and 16 of the ’569 Patent is disclosed and
`
`described by Goldreich, as shown with particularity as follows.
`
`Goldreich (Ex. 1003)
`Goldreich discloses computer software to protect
`against unauthorized copying:
`“[T]he problem of protection against illegitimate
`duplication.” Ex. 1003 at p. 182; Ex. 1007 at
`p. 24.
`
`Goldreich discloses a software application that in
`its compiled form is divided into two parts: the
`first part contains the program instructions and the
`second part contains the data resources. Thus
`Goldreich teaches one or more compiled functions
`or procedures, including executable code (the first
`part) and a non-executable digital sample (the
`second part):
`“The input to the memory (y) is partitioned (by a
`special symbol) into two parts called the program
`(denoted here as π) and the data (denoted as x).
`The output of the memory (on input y-(π, x)), after
`interacting with the CPU, is denoted π(x) and
`called the result of π’s computation on input x.”
`Ex. 1003 at p. 187 (Definition 5 (programs, data,
`and computations)); Ex. 1007 at p. 24.
`Goldreich discloses identifying a portion of the
`executable code by identifying the memory
`addresses relating to the portion of the executable
`17
`
`The ’569 Patent
`1. A method for copy
`protection of computer
`software, the computer software
`including executable code and a
`non-executable digital sample,
`said method comprising the
`steps of:
`
`(a) identifying a portion of the
`executable code to be
`encoded:
`
`
`
`

`

`
`
`
`
`Goldreich (Ex. 1003)
`
`code:
`“Simulate sqrt(m) memory accesses of the original
`RAM. During the simulation we maintain the
`values previously retrieved (during the current
`execution of step (2)!) in locations m+sqrt(m) + 1
`through m+2 sqrt(m) A memory access of the
`original RAM, Say an access to cell i, is simulated
`as follows. First we scan through the special
`sqrt(m) cells and check whether the contents of the
`original i –th cell is in one of these cells. If the i th
`cell is not found there then we retrieve it from cell
`π(i); else we access the next empty cell (i.e. one of
`the original cells m + 1 through m+sqrt(m) which
`was not accessed before).”
`Ex. 1003 at p. 190; Ex. 1007 at p. 25.
`Goldreich discloses generating an encoded, or
`encrypted, code resource from the identified
`portion of executable code:
`“On input n (in unary) algorithm G outputs a
`(legal) key K of length n. On input a key K and a
`message M, algorithm E randomly selects an
`encryption denoted EK(M), such that
`DK(EK(M))=M. Loosely speaking, we say that the
`encryption scheme is secure if on input n (in
`unary), and the messages M1 and M2, their
`probabilistic encryptions EK(M1) and EK(M2)
`(where K=G(n) are polynomially indistinguishable
`(even when given access to a black box
`implementing EK).”
`Ex. 1003 at p. 187; Ex. 1007 at p. 25.
`Goldreich discloses embedding the encoded
`resource in the digital sample using encryption:
`“The first issue is to hide from the adversary the
`values stored and retrieved from memory, and to
`prevent the adversary’s attempts to change these
`values. This is done by an innovative use of
`traditional cryptographic techniques (e.g.
`probabilistic encryption [GM] and message
`authentication [GGM]).” Ex. 1003 at p. 184; Ex.
`18
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`The ’569 Patent
`
`(b) g

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket