`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Paper No. ________
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`_______________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________
`
`KYOCERA INTERNATIONAL, INC.
`Petitioner
`v.
`
`BLUE SPIKE, LLC
`Patent Owner
`
`Patent No. 5,745,569
`Issue Date: April 28, 1998
`Title: METHOD FOR STEGA-CIPHER PROTECTION OF COMPUTER CODE
`_______________
`
`Inter Partes Review No. IPR2017-01061
`____________________________________________________________
`
`
`
`PETITION FOR INTER PARTES REVIEW
`UNDER 35 U.S.C. §§ 311-319 AND 37 C.F.R. § 42.100 ET. SEQ.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`
`
`
`
`
`TABLE OF CONTENTS
`
`
`EXHIBIT LIST ........................................................................................................ iii
`NOTICE OF LEAD AND BACKUP COUNSEL ..................................................... 1
`NOTICE OF EACH REAL-PARTY-IN-INTEREST ............................................... 1
`NOTICE OF RELATED MATTERS ........................................................................ 1
`NOTICE OF SERVICE INFORMATION ................................................................ 2
`GROUNDS FOR STANDING .................................................................................. 2
`STATEMENT OF MATERIAL FACTS .................................................................. 2
`STATEMENT OF PRECISE RELIEF REQUESTED .............................................. 3
`THRESHOLD REQUIREMENT FOR INTER PARTES REVIEW ......................... 3
`STATEMENT OF REASONS FOR RELIEF REQUESTED ................................... 4
`I.
`Introduction to the Technology of the ’569 Patent .......................................... 4
`II.
`Independent Claims 1, 10, and 16 of the ’569 Patent ...................................... 5
`III. Construction of the Claims .............................................................................. 7
`i.
`“copy protecting a software application” (Claims 1, 10, 16) ................ 7
`ii.
`“during execution of the software application” (Claim 16) ................ 10
`iii.
`“intermittently relocating” (Claim 16) ................................................ 12
`iv.
`“executable code resources” (Claims 1, 10, 16) ................................. 13
`IV. Claim-By-Claim Explanation of Grounds for Unpatentability ..................... 14
`Ground 1. Claims 1, 10, and 16 of the ’569 Patent are unpatentable as
`anticipated by Goldreich (Ex. 1003). .................................................. 15
`Goldreich Is Prior Art Under 35 U.S.C. § 102(b) ............................... 15
`
`i.
`
`i
`
`
`
`
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`Goldreich Discloses All Elements of Independent Claims 1, 10, and
`ii.
`16 ......................................................................................................... 16
`Ground 2. Claim 16 of the ’569 Patent is unpatentable as anticipated by U.S.
`Patent No. 5,123,045 (Ex. 1005). ........................................................ 24
`The ’045 Patent Is Prior Art Under 35 U.S.C. § 102(b) ..................... 24
`i.
`The ’045 Patent Discloses All Elements of Independent Claim 16 .... 24
`ii.
`Ground 3. Claim 16 of the ’569 Patent is unpatentable as anticipated by
`Ostrovsky 1992 (Ex. 1004). ................................................................ 32
`Ostrovsky 1992 Is Prior Art Under 35 U.S.C. § 102(b) ...................... 32
`i.
`Ostrovsky 1992 Discloses All Elements of Independent Claim 16 .... 32
`ii.
`Ground 4. Claim 16 of the ’569 Patent is unpatentable as anticipated by
`Ostrovsky 1990 (Ex. 1006). ................................................................ 36
`Ostrovsky 1990 Is Prior Art Under 35 U.S.C. § 102(b) ...................... 36
`i.
`Ostrovsky 1990 Discloses All Elements of Independent Claim 16 .... 37
`ii.
`CONCLUSION ........................................................................................................ 41
`
`
`ii
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`
`
`
`EXHIBIT LIST
`
`
`
`
`
`Exhibit
`Ex. #
`1001 U.S. Patent No. 5,745,569 (“the ’569 Patent”)
`1002
`Image File Wrapper for ’569 Patent
`1003 Oded Goldreich, Towards a Theory of Software Protection and
`Simulation by Oblivious RAMs, 1987 Symposium on Theory of
`Computing 182-194 (May 1987) (“Goldreich”)
`1004 Rafail Ostrovsky, Software Protection and Simulation on Oblivious
`RAMs (May 17, 1992) (MIT Ph.D. Thesis) (“Ostrovsky 1992”)
`1005 U.S. Patent No. 5,123,045 to Rafail Ostrovsky (“the ’045 Patent”)
`1006 Rafail Ostrovsky, Efficient Computation on Oblivious RAMs, 1990
`Symposium on Theory of Computing 514-523 (May 1990) (“Ostrovsky
`1990”)
`Expert Declaration of Rafail Ostrovsky, Ph.D.
`1007
`1008 Claim Construction Order entered May 16, 2016 in an unrelated
`litigation, Blue Spike, LLC v. Huawei Techs. Co. et al., Case No. 6:13-
`cv-00679, Dkt. 194.
`1009 Curriculum Vitae of Rafail Ostrovsky, Ph.D.
`1010
`Image File Wrapper for U.S. Patent No. 8,930,719
`
`
`
`iii
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`
`
`
`
`
`
`NOTICE OF LEAD AND BACKUP COUNSEL
`
`Lead Counsel: Nicola A. Pisano (Reg. No. 34,408) Tel: 858.847.6877
`
`Backup Counsel: Scott R. Kaspar (Reg. No. 54,583) Tel: 312.832.5113
`
`Address: Foley & Lardner LLP, 3579 Valley Centre Drive, San Diego, CA 92130
`
`Fax: 858.792.6773
`
`NOTICE OF EACH REAL-PARTY-IN-INTEREST
`
`The real-parties-in-interest are: Kyocera International, Inc. is a wholly-owned
`
`subsidiary of Kyocera Corporation, a publicly-traded Japanese entity.
`
`NOTICE OF RELATED MATTERS
`
`Patent Owner asserted the ’569 Patent against Kyocera International, Inc. in the
`
`Eastern District of Texas in a case captioned Blue Spike, LLC v. Archos, Inc. et al.,
`
`Case No. 6:16-cv-1142, filed September 2, 2016. Patent Owner voluntarily dismissed
`
`the action on February 9, 2017. On February 10, 2017, Kyocera International, Inc.
`
`filed a complaint for declaratory judgment of non-infringement only in the Southern
`
`District of California in a case captioned Kyocera International, Inc. v. Blue Spike,
`
`LLC, Case No. 3:17-cv-0262-BTM-JMA, which is now pending before the Hon. Barry
`
`T. Moskowitz.
`
`1
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`NOTICE OF SERVICE INFORMATION
`
`
`
`
`
`Please address all correspondence to the lead counsel at the address above.
`
`Petitioner consents to electronic service at: npisano@foley.com; and
`
`skaspar@foley.com.
`
`GROUNDS FOR STANDING
`Petitioner hereby certifies that the patent for which review is sought is available for
`
`inter partes review and that the Petitioner is not barred or estopped from requesting an
`
`inter partes review challenging the patent claims on the grounds identified in the
`
`Petition.
`
`STATEMENT OF MATERIAL FACTS
`
`The ’569 Patent matured from U.S. Patent Application Serial No. 587,943, filed
`
`January 17, 1996, and issued on April 28, 1998. The ’569 Patent expired on January
`
`17, 2016.
`
`The ’569 Patent does not claim priority to any earlier-filed patent applications.
`
`Accordingly, the effective filing date of the ’569 Patent is January 17, 1996. Applying
`
`the Pre-AIA Section 102(b) requirement, prior art to the ’569 Patent is that which was
`
`patented or described in a printed publication more than one year before the effective
`
`filing date of the ’569 Patent (i.e. before January 17, 1995).
`
`The ’569 Patent purports to cover a method for protecting computer code
`
`copyrights by encoding the code into a data resource with a digital watermark. The
`
`’569 Patent describes the problem of skilled computer hackers, who take a “snap-shot”
`2
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`of the code while it is in the computer’s memory, in order to copy it. Ex. 1001 at 7:39-
`
`
`
`
`
`44, 7:52-59, 8:4-10 (describing process by which a skilled technician can overcome
`
`countermeasures using a “snap-shot of the code in memory”).
`
`The ’569 Patent purports to solve the “snap-shot” counterfeiting attacks by
`
`randomly shuffling portions of the executing code in the computer’s memory, such that
`
`any “snap-shot” taken by a would-be hacker is meaningless. Ex. 1001 at 7:52-59, 8:1-
`
`10. Claim 16 of the ’569 Patent, in particular, is directed to guard against hacking by
`
`“intermittently relocating” code resources within the memory in order to provide a
`
`measure of “copy protecting”.
`
`The purported invention claimed in the ’569 Patent, which shuffles code in the
`
`computer memory in order to defeat copying attacks, was well known in the art many
`
`years before the priority date of the ’569 Patent.
`
`STATEMENT OF PRECISE RELIEF REQUESTED
`
`Petitioner respectfully requests the Board initiate an inter partes review and cancel
`
`Claims 1, 10, and 16 of the ’569 Patent as unpatentable pursuant to 35 U.S.C. § 311(b)
`
`based on the four grounds of unpatentability discussed in detail herein.
`
`THRESHOLD REQUIREMENT FOR INTER PARTES REVIEW
`A petition for inter partes review must demonstrate “a reasonable likelihood that
`
`the petitioner would prevail with respect to at least one of the claims challenged in the
`
`petition.” (35 U.S.C. § 314(a).) The Petition meets this threshold. All elements of
`
`3
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`Claims 1, 10, and 16 of the ’569 Patent are taught in the prior art as explained below in
`
`
`
`
`
`the proposed grounds of unpatentability.
`
`STATEMENT OF REASONS FOR RELIEF REQUESTED
`
`I.
`
`Introduction to the Technology of the ’569 Patent
`
`The ’569 Patent, entitled “Method for Stega-Cipher Protection of Computer Code,”
`
`is directed to “[a] method for protecting computer code copyrights by encoding the
`
`code into data resource with a digital watermark.” Ex. 1001, Abstract. The Summary
`
`of Invention further describes that the “goal” of the alleged “present invention” is to
`
`“provide a level of security for executable code on similar grounds as that which can
`
`be provided for digitized samples.” Ex. 1001 at 3:21-23. The Field of Invention of the
`
`’569 Patent describes a problem that the ’569 Patent is purported to solve. According
`
`to that section the ’569 Patent: “With the advent of computer networks and digital
`
`multimedia, protection of intellectual property has become a prime concern for
`
`creators and publishers of digitized copies of copyrightable works, such as musical
`
`recordings, movies, video games, and computer software. One method of protecting
`
`copyrights in the digital domain is to use ‘digital watermarks.’” Ex. 1001 at 1:5-11.
`
`Consequently, the ’569 Patent purports to solve the problem through the use of a
`
`“stegacipher” process: “It is desirable to use a ‘stega-cipher’ or watermarking process
`
`to hide the necessary parts or resources of the executable object code in the digitized
`
`sample resources. Ex. 1001 at 2:1-3.
`
`4
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`The purported invention of the ’569 Patent—i.e., to watermark or to shuffle code in
`
`
`
`
`
`the computer memory—was well known in the prior art many years before the priority
`
`date of the ’569 Patent. In particular, the claimed methods were disclosed at least by
`
`the prior art identified in this Petition, as detailed in the claim charts that follow.
`
`Independent Claims 1, 10, and 16 of the ’569 Patent
`
`II.
`Independent claims 1 and 10 are directed to watermarking, that is, methods of
`
`embedding a resource into the code. Claim 1 states and requires:
`
`1. A method for copy protection of computer software, the
`
`computer software including executable code and a non-
`
`executable digital sample, said method comprising the steps
`
`of:
`
`identifying a portion of the executable code to be
`
`encoded:
`
`generating an encoded code resource from the identified
`
`portion of the executable code; and
`
`embedding the encoded code resource in the non-
`
`executable digital sample.
`
`Similarly, Independent claim 10 states and requires:
`
`10. A method for copy protection of computer software to be
`
`provided to an authorized user, the computer software
`
`5
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`including a plurality of code resources and a plurality of data
`
`
`
`
`
`resources, wherein each of the plurality of code resources
`
`includes a set of executable instructions, said method
`
`comprising the steps of:
`
`selecting a code resource to be encoded;
`
`using information relating to the authorized user to
`
`associate the selected code resource with a data resource; and
`
`encoding the selected code resource within the associated
`
`data resource.
`
`Independent claim 16 is directed to the process of “intermittently relocating”
`
`aspects of the code in the computer memory in order to provide a measure of “copy
`
`protecting”. Claim 16 states and requires:
`
`16. A method for copy protecting a software application
`
`executed by a computer system, the software application
`
`including a plurality of executable code resources loaded in a
`
`memory of the computer system, said method comprising the
`
`steps of:
`
`determining an address within the memory of the
`
`computer system associated with each of the plurality of
`
`executable code resources; and
`
`6
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`intermittently relocating each of the plurality of
`
`
`
`
`
`executable code resources to a different address within the
`
`memory of the computer during execution of the software
`
`application.”
`
`III. Construction of the Claims
`An expired claim in an inter partes review is construed under the standard set forth
`
`in Phillips v. AWH Corp., 415 F.3d 1303, 1312-13 (Fed. Cir. 2005), where claim terms
`
`are presumptively given their ordinary and customary meaning as understood by a
`
`person of ordinary skill in the art at the time of the invention, considering the language
`
`of the claims and specification, and the prosecution history. See Panel Claw, Inc. v.
`
`Sunpower Corp., IPR2014-00386, Paper 7 at 7 (P.T.A.B. June 30, 2014).
`
`In addition to this presumption, Petitioner provides a more detailed explanation of
`
`the ordinary and customary meaning of certain claim terms.
`
`i.
`
`“copy protecting a software application” (Claims 1, 10, 16)
`
`The preambles of Claims 1, 10, and 16 are claim limitations. “If the claim
`
`preamble, when read in the context of the entire claim, recites limitations of the claim,
`
`or, if the claim preamble is ‘necessary to give life, meaning, and vitality’ to the claim,
`
`then the claim preamble should be construed as if in the balance of the claim.” Pitney
`
`Bowes, Inc. v. Hewlett-Packard Co., 182 F.3d 1298, 1305 (Fed. Cir. 1999). “When
`
`limitations in the body of the claim rely upon and derive antecedent basis from the
`
`7
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`preamble, then the preamble may act as a necessary component of the claimed
`
`
`
`
`
`invention.” See Eaton Corp. v. Rockwell Int’l Corp., 323 F.3d 1332, 1339 (Fed. Cir.
`
`2003) (citations omitted).
`
`Here, the preambles provide antecedent basis to multiple claim limitations that
`
`appear in the body of the respective claims. For example, each of the terms “software
`
`application,” “computer system,” “plurality of executable code resources,” and
`
`“memory of the computer system” appear in the preambles and in the body of each of
`
`Claims 1, 10 and 16. The preambles further give life, meaning and vitality to the
`
`claims by teaching that the claimed methods are “for copy [protecting/protection of] a
`
`software application.” Accordingly, the preambles should be considered claim
`
`limitations.
`
`The specification of the ’569 patent repeatedly describes that the disclosed methods
`
`are designed to protect a software application from unauthorized copying. For
`
`example, the specification states that in the purported invention “distribution and
`
`exchange of content would be made more secure from unauthorized copying,” and that
`
`the allegedly inventive methods prevents “unauthorized copies” and prevent hackers
`
`from “forc[ing] the application program to run as an unauthorized copy.” Ex. 1001 at
`
`3:30-41, 4:49-53, 5:51-57, 7:13-17.
`
`8
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`The prosecution history of the ’569 patent confirms that the inventive methods are
`
`
`
`
`
`directed towards preventing unauthorized copying. Specifically, to overcome the
`
`examiner’s rejection over a prior art reference (“Houser”), the applicant argued:
`
`The Examiner acknowledges that Houser does not teach
`
`protection of computer software, but states that it would have
`
`been obvious to one of ordinary skill in the art to use the
`
`Houser invention for that purpose. . . . Such an approach,
`
`however, would not result in the claimed invention. . . .
`
`Application of Houser to computer software would [] fail to
`
`achieve a significant benefit of the claimed invention;
`
`namely, rendering an unauthorized copy of computer
`
`software effectively inoperable.
`
`Ex. 1002, 7/23/1997 Response to Office Action, at pp. 2-3 (emphasis added).
`
`Based on the specification and prosecution history, one of ordinary skill in the art
`
`would understand the phrase “copy [protecting/protection of] a software application”
`
`to mean “protecting a software application from unauthorized copying or the use of
`
`unauthorized copies.” Ex. 1007 at ¶ 38.
`
`The Eastern District of Texas entered this same construction in the unrelated
`
`litigation, Blue Spike, LLC v. Huawei Techs. Co. et al., Case No. 6:13-cv-00679 (“the
`
`Huawei Litigation”). Ex. 1008 at p. 5.
`
`9
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`Accordingly, Petitioner requests that the Board find the preambles to be limiting
`
`
`
`
`
`and adopt the same construction used in the Huawei Litigation in this proceeding by
`
`construing the phrase “copy [protecting/protection of] a software application” to mean
`
`“protecting a software application from unauthorized copying or the use of
`
`unauthorized copies.”
`
`ii.
`
`“during execution of the software application” (Claim 16)
`
`Claim 16 makes a distinction between loading and execution of the software
`
`application. While the preamble of the claim refers to loading (i.e. “plurality of code
`
`resources loaded in a memory”), the body of the claim refers to execution (i.e. “during
`
`execution of the software application”). These different claim terms are presumed to
`
`have different meanings. Applied Med. Res. Corp. v. U.S. Surgical Corp., 448 F.3d
`
`1324, 1333 n.3 (Fed. Cir. 2006). Therefore, Claim 16 requires the executable code
`
`resources to be loaded into memory before the claimed method can be carried out. Ex.
`
`1001 at 10:10-12 (“the software application including a plurality of executable code
`
`resources loaded in a memory of the computer system.”) The body of Claim 16 then
`
`refers to this “software application” and “plurality of executable code resources” and
`
`requires “intermittently relocating each of the plurality of executable code resources to
`
`a different address within the memory of the computer during execution of the
`
`software application.” Ex. 1001 at 10:16-19. Accordingly, the claim requires that the
`
`“execution of the software application” takes place after it is loaded into memory and
`
`10
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`the intermittent relocation of the resources take place during the execution while the
`
`
`
`
`
`software application is running.
`
`The ’569 patent specification likewise confirms that these requirements are distinct.
`
`According to the patent, while the concept of rearranging or relocating code resources
`
`in memory was not a new one, operating systems typically performed such rearranging
`
`during “system time,” which is after the relevant code resources have been loaded into
`
`memory but prior to the execution of the application code: “Once the code resources
`
`of a program are loaded into memory, they typically remain in a fixed position unless
`
`the computer operating system finds it necessary to rearrange certain portions of
`
`memory during ‘system time,’ when the operating system code, not application code,
`
`is running.” Ex. 1001 at 7:30-34.
`
`Thus, consistent with the language of Claim 16, the specification confirms that the
`
`software application is loaded into computer memory first and then during execution
`
`of the software application, which takes place after the application is loaded into
`
`memory, intermittent relocating of the executable code resources occurs. In other
`
`words, the executable code resources are intermittently relocated while the software
`
`application is running.
`
`In the Huawei Litigation, the phrase “during execution of the software application”
`
`was construed to mean “while the software application is running.” Ex. 1008 at p. 6.
`
`Petitioner requests that the Board adopt the same construction in this proceeding.
`
`11
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`“intermittently relocating” (Claim 16)
`iii.
`
`
`
`
`
`During prosecution of the ’569 patent, the examiner stated that “it is unclear what is
`
`meant by ‘relocating’ and by ‘intermittently relocating’.” See Ex. 1002, 6/26/1997
`
`Response to Office Action at p. 7 In response, the applicant made the following
`
`admission:
`
`Applicants respectfully direct the Examiner’s attention to the
`
`disclosure at [Ex. 1001 at 8:1-19] of the Specification, which
`
`describes an embodiment of the present invention wherein
`
`the code resources are ‘shuffled’ in memory at periodic,
`
`random or pseudo-random intervals. See also [Ex. 1001 at
`
`3:38-41 of the] Specification, (‘Attempts to tamper or ‘patch’
`
`substitute code resources can be made highly difficult by
`
`randomizing the location of said resources in memory on an
`
`intermittent basis . . .’). Given the foregoing, the Applicant
`
`respectfully submits that the language of [application]
`
`claim[] 28 would be clear to a person of ordinary skill in the
`
`art.
`
`Ex. 1002, 6/26/1997 Response to Office Action at p. 7. Application claim 28 issued as
`
`independent claim 16 at issue here.
`
`12
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`Applicant’s admission is consistent with the stated object of the ’569 patent. The
`
`
`
`
`
`patent is directed to preventing someone from copying “snapshots” of code located in
`
`memory. Ex. 1001 at 7:41-44. Thus, the specification teaches rearranging code
`
`resources through the “intentional[] shuffl[ing]” of executable code resources “[d]uring
`
`execution time” at “periodic[]” or “random or pseudo-random intervals.” Id. at 8:1-9.
`
`This “shuffling” results in a greater difficulty for “someone trying to analyze snapshots
`
`[because they] cannot be sure they are looking at the same code or organization from
`
`one ‘break’ to the next.” Id. at 8:7-10. Thus, the proposed construction of
`
`“intentionally shuffling at random or pseudo random intervals” is consistent with the
`
`object of the ’569 patent and therefore should be adopted.
`
`Additionally, in the Huawei Litigation, the term “intermittently relocating” was
`
`construed to mean “intentionally shuffling at periodic, random, or pseudo-random
`
`intervals.” Ex. 1008 at p. 8. Petitioner requests that the Board adopt the same
`
`construction in this proceeding.
`
`iv.
`
`“executable code resources” (Claims 1, 10, 16)
`
`The phrase “executable code resources” appears in both the preamble and body of
`
`Claims 1, 10, and 16. As two different method steps of Claim 16 center around actions
`
`performed in relation to the “executable code resources,” a proper construction of this
`
`phrase is necessary to define the scope of Claim 16.
`
`13
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`The specification defines “code resources” in terms of packaged, sub-objects:
`
`
`
`
`
`“subobjects can be packaged into what are referred to as ‘code resources’ . . . .” Ex.
`
`1001 at 4:26. “Sub-objects,” as used in the ’569 patent, refer to discrete executable
`
`segments of a program. Id. at 3:44-4:17. The specification further explains that an
`
`application may be referred to as an “executable object code from the point of view of
`
`the engineer.” Id. at 3:44-47. The specification goes on to teach that “[a] collection of
`
`smaller, atomic (or indivisible) chunks of object code typically comprise the complete
`
`executable object code . . . [t]hose indivisible portions of object code correspond with
`
`the programmers’ function or procedure implementations in higher level languages.”
`
`Id. at 3:47-53. These functions or procedures are compiled and make up an executable
`
`object code (or a program). Id. at 4:13-17. The object code or program includes
`
`instructions executed by the CPU and data called by the instructions. Ex. 1007 at ¶ 50.
`
`The court in the Huawei Litigation construed “executable code resources” to be
`
`“compiled functions or procedures.” Ex. 1008 at 12. Accordingly, Petitioner requests
`
`that the Board adopt the same construction in this proceeding.
`
` Claim-By-Claim Explanation of Grounds for Unpatentability
`
`IV.
`Unpatentability of Claims 1, 10, and 16 of the ’569 Patent is set forth below and
`
`discussed in the accompanying expert declaration (Ex. 1007).
`
`14
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`Ground 1. Claims 1, 10, and 16 of the ’569 Patent are unpatentable as
`anticipated by Goldreich (Ex. 1003).
`
`
`
`
`
`Claims 1, 10, and 16 of the ’569 Patent are unpatentable under 35 U.S.C. § 102(b)
`
`as anticipated by Oded Goldreich, Towards a Theory of Software Protection and
`
`Simulation by Oblivious RAMs, 1987 Symposium on Theory of Computing 182-194
`
`(May 1987) (“Goldreich,” Ex. 1003).
`
`i.
`
`Goldreich Is Prior Art Under 35 U.S.C. § 102(b)
`
`Goldreich was included in the proceedings distributed at the 1987 Symposium on
`
`Theory of Computing (“STOC”) sponsored by the Association for Computing
`
`Machinery (“ACM”), which was held in May 25-27, 1987 in New York, New York.
`
`As shown on Page ii of Goldreich, the proceedings bear a 1987 copyright date, with an
`
`International Standard Book Number (“ISBN”) 0-89791-221-7, which reflects a
`
`copyright date of June 1987. (See http://www.isbnsearch.org/isbn/0897912217). Page
`
`182 of Goldreich also includes a 1987 copyright date, the same ISBN, and a price. The
`
`Board has found the copyright information on technical journal articles, such as that
`
`compiled and published by ACM, to be sufficient to establish that Goldreich was
`
`published and publicly available no later than December 31, 1987. Ericsson Inc. v.
`
`Intellectual Ventures I LLC, IPR2014-00527, Paper 41, at 10-11 (P.T.A.B. May 18,
`
`2015). Moreover, as shown on the cover page of Goldreich, the Library of Congress
`
`stamp indicates that it was received by the Library on February 12, 1989, which is
`
`15
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`more than five years before the critical date of the ’569 patent. Accordingly,
`
`
`
`
`
`Goldreich constitutes a printed publication and is prior art under Section 102(b).
`
`ii.
`
`Goldreich Discloses All Elements of Independent Claims 1, 10, and 16
`
`Independent claims 1 and 10 of the ’569 patent are directed towards a method of
`
`“watermarking” code, or embedding code resources into aspects of the code sought to
`
`be protected from unauthorized copying. Independent claim 16 is directed to the
`
`process of “intermittently relocating” aspects of the code in the computer memory in
`
`order to provide a measure of “copy protecting”.
`
`Goldreich discloses a method of protecting a software application from illegitimate
`
`or unauthorized copying. Ex. 1003 at p. 182. One of ordinary skill would understand
`
`this to be a type of copy protection as claimed by Claims 1, 10, and 16, consistent with
`
`the proposed construction. Ex. 1007 at ¶ 54.
`
`Goldreich discloses use of an oblivious Random Access Machine (“RAM”) model
`
`of computation. Ex. 1007 at ¶ 55. One of ordinary skill would understand the
`
`oblivious RAM model of computation to be a model of computation by which an
`
`operating system runs software applications. Ex. 1007 at ¶ 56. Moreover, one of
`
`ordinary skill would understand the plurality of code resources disclosed in Definition
`
`5 to be applicable to any software application. Ex. 1007 at ¶ 58.
`
`Goldreich discloses mapping portions of the executable code to registers of the
`
`oblivious RAM. Ex. 1003 at p. 188, Sec. 3. One of ordinary skill would understand
`
`16
`
`
`
`
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`that the oblivious RAM registers can be used for guarding against unauthorized
`
`
`
`
`
`copying by either embedding code resources into the computer software (Ex. 1003 at
`
`p. 184), as claimed by Claims 1 and 10, and/or by intermittently relocating, or
`
`intentionally shuffling, the code resources within the executable code (Ex. 1003 at p.
`
`192), as claimed by Claim 16. See Ex. 1007 at ¶ 60.
`
`Each of the elements of Claims 1, 10, and 16 of the ’569 Patent is disclosed and
`
`described by Goldreich, as shown with particularity as follows.
`
`Goldreich (Ex. 1003)
`Goldreich discloses computer software to protect
`against unauthorized copying:
`“[T]he problem of protection against illegitimate
`duplication.” Ex. 1003 at p. 182; Ex. 1007 at
`p. 24.
`
`Goldreich discloses a software application that in
`its compiled form is divided into two parts: the
`first part contains the program instructions and the
`second part contains the data resources. Thus
`Goldreich teaches one or more compiled functions
`or procedures, including executable code (the first
`part) and a non-executable digital sample (the
`second part):
`“The input to the memory (y) is partitioned (by a
`special symbol) into two parts called the program
`(denoted here as π) and the data (denoted as x).
`The output of the memory (on input y-(π, x)), after
`interacting with the CPU, is denoted π(x) and
`called the result of π’s computation on input x.”
`Ex. 1003 at p. 187 (Definition 5 (programs, data,
`and computations)); Ex. 1007 at p. 24.
`Goldreich discloses identifying a portion of the
`executable code by identifying the memory
`addresses relating to the portion of the executable
`17
`
`The ’569 Patent
`1. A method for copy
`protection of computer
`software, the computer software
`including executable code and a
`non-executable digital sample,
`said method comprising the
`steps of:
`
`(a) identifying a portion of the
`executable code to be
`encoded:
`
`
`
`
`
`
`
`
`
`Goldreich (Ex. 1003)
`
`code:
`“Simulate sqrt(m) memory accesses of the original
`RAM. During the simulation we maintain the
`values previously retrieved (during the current
`execution of step (2)!) in locations m+sqrt(m) + 1
`through m+2 sqrt(m) A memory access of the
`original RAM, Say an access to cell i, is simulated
`as follows. First we scan through the special
`sqrt(m) cells and check whether the contents of the
`original i –th cell is in one of these cells. If the i th
`cell is not found there then we retrieve it from cell
`π(i); else we access the next empty cell (i.e. one of
`the original cells m + 1 through m+sqrt(m) which
`was not accessed before).”
`Ex. 1003 at p. 190; Ex. 1007 at p. 25.
`Goldreich discloses generating an encoded, or
`encrypted, code resource from the identified
`portion of executable code:
`“On input n (in unary) algorithm G outputs a
`(legal) key K of length n. On input a key K and a
`message M, algorithm E randomly selects an
`encryption denoted EK(M), such that
`DK(EK(M))=M. Loosely speaking, we say that the
`encryption scheme is secure if on input n (in
`unary), and the messages M1 and M2, their
`probabilistic encryptions EK(M1) and EK(M2)
`(where K=G(n) are polynomially indistinguishable
`(even when given access to a black box
`implementing EK).”
`Ex. 1003 at p. 187; Ex. 1007 at p. 25.
`Goldreich discloses embedding the encoded
`resource in the digital sample using encryption:
`“The first issue is to hide from the adversary the
`values stored and retrieved from memory, and to
`prevent the adversary’s attempts to change these
`values. This is done by an innovative use of
`traditional cryptographic techniques (e.g.
`probabilistic encryption [GM] and message
`authentication [GGM]).” Ex. 1003 at p. 184; Ex.
`18
`
`Petition For Inter Partes Review
`U.S. Patent No. 5,745,569
`The ’569 Patent
`
`(b) g