throbber
Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 1 of 154 Page ID #:285
`
`
`
`[See signature blocks for counsel information]
`
`
`
`UNITED STATES DISTRICT COURT
`
`CENTRAL DISTRICT OF CALIFORNIA
`
`SOUTHERN DIVISION
`
`
`
`Case No. 8:16-CV-01790-JVS-AGR
`
`
`JOINT CLAIM CONSTRUCTION CHART
`
`Case No. 8:16-CV-01799-JVS-AGR
`
`
`
`
`
`
`
`SPEX TECHNOLOGIES, INC.,
`
`
`Plaintiff,
`
`v.
`
`
`
`
`KINGSTON TECHNOLOGY
`CORPORATION, KINGSTON
`DIGITAL, INC., KINGSTON
`TECHNOLOGY COMPANY, INC.,
`IMATION CORPORATION,
`DATALOCKER INC., DATA
`LOCKER INTERNATIONAL, LLC,
`
`
`Defendants.
`SPEX TECHNOLOGIES, INC.,
`Plaintiff,
`
`v.
`
`
`
`
`WESTERN DIGITAL
`CORPORATION, WESTERN
`DIGITAL TECHNOLOGIES, INC.,
`HGST, INC.,
`
`
`Defendants.
`
`
`
`
`
`
`
`JOINT CLAIM CONSTRUCTION CHART
`
`SPEX Technologies, Inc.
`IPR2018-00082 Ex. 2005
`1
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 2 of 154 Page ID #:286
`
`
`SPEX TECHNOLOGIES, INC.,
`
`
`Plaintiff
`
`v.
`
`
`
`
`TOSHIBA AMERICA
`ELECTRONICS COMPONENTS
`INC., TOSHIBA AMERICA
`INFORMATION SYSTEMS, INC.,
`TOSHIBA AMERICA, INC., AND
`TOSHIBA CORPORATION,
`
`
`Defendants.
`SPEX TECHNOLOGIES, INC.,
`
`
`Plaintiff,
`
`
`
`
`
`v.
`
`
`
`
`APRICORN,
`
`
`Defendant.
`
`Case No. 8:16-CV-01800-JVS-AGR
`
`
`
`
`Case No. 2:16-CV-07349-JVS-AGR
`
`
`
`
`
`
`
`2
`
`JOINT CLAIM CONSTRUCTION STATEMENT
`
`2
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 3 of 154 Page ID #:287
`
`
`
`Pursuant to Court order and Northern District of California's Patent L.R. 4-3, Plaintiff
`
`SPEX Technologies, Inc. (“SPEX”) and Defendants Kingston Technology Corporation, Kingston
`
`Digital, Inc., Kingston Technology Company, Inc., Imation Corporation, Datalocker Inc., Data
`
`Locker International, LLC, Western Digital Corporation, Western Digital Technologies, Inc.,
`
`HGST, Inc., Toshiba America Electronics Components Inc., Toshiba America Information
`
`Systems, Inc., Toshiba Corporation and Apricorn. (collectively, “Defendants”) (SPEX and
`
`Defendants are referred to collectively as the “Parties”) hereby provide their Joint Claim
`
`Construction Chart and Prehearing Statement.
`
`I.!
`
`AGREED CONSTRUCTION.
`
`
`Phrase
`“means for non-volatilely storing data”
`
`
`
`Agreed Construction
`Subject to 35 U.S.C. § 112(6).
`
`Recited Function: non-volatilely storing data
`
`Corresponding Structures: Non-volatile memory
`devices; or equivalents thereof.1
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`II.! DISPUTED CONSTRUCTIONS.
`
`Phrase
`1. “defined
`interaction”
`
`“interaction with a
`host computing
`device in a defined
`way”
`
`
`
`
`Defendants’ Proposal
`Proposal for “defined interaction”
`and “interaction… in a defined
`way”: Indefinite under 35 U.S.C. §
`112.
`
`Intrinsic Evidence:
`•! “In particular, the modular
`device can include a security module
`that
`is
`adapted
`to
`enable
`performance of one or more security
`operations on data, and a target
`module that is adapted to enable a
`defined
`interaction with a host
`computing device.” ’135 Patent,
`Abstract; ’802 Patent, Abstract (“In
`
`SPEX's Proposal
`Proposal
`for
`“defined
`a
`specific,
`interaction”:
`
`predefined functionality of
`the
`device, such as data storage, data
`communication, data input and
`output or user identification
`
`Proposal for “interaction with a
`host computing device
`in a
`defined way”: interaction with a
`host computing device using a
`specific, predefined functionality
`of the device, such as data storage,
`data communication, data input
`and output or user identification
`
`1 Although Defendants agree that 35 U.S.C. § 112(6) permits “equivalents” of the disclosed
`structure for the purposes of an infringement analysis, Defendants disagree that “equivalents”
`should be included as part of claim construction or that “equivalents” form part of the
`“corresponding structure,” as “equivalents” are not disclosed in the patent.
`1
`
`
`
`
`
`JOINT CLAIM CONSTRUCTION CHART
`
`3
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 4 of 154 Page ID #:288
`
`
`
`Phrase
`
`SPEX's Proposal
`
`
`Intrinsic Evidence:
`'802 patent at Abstract, Fig.
`•!
`4, Fig. 5, Fig. 6, 3:17-36, 4:62-5:4,
`5:59-6:18,
`7:25-27,
`13:27-41,
`claims 2, 4, 5, 7, 9, 10, 12, 14, 16,
`17, 18, 19, 20, 21, 22, 25, 26, 27,
`29, 30, 31, 32, 33, 34, 35
`•! Petition for Inter Partes
`Review Under 37 C.F.R. § 42.100,
`IPR2017-00824, at 29-30, 41, 45,
`50, 55, 56, 58, 60, and cited
`evidence.
`
`Extrinsic Evidence:
`•! Declaration of Mr. Miguel
`Gomez rebutting
`the opinions
`offered in the declaration of Mark
`T. Jones. Mr. Gomez may also
`declare that the term should be
`construed as proposed by SPEX in
`light of the intrinsic evidence.
`
`
`Defendants’ Proposal
`particular, the peripheral device can
`be adapted to enable, in a single
`integral
`peripheral
`device,
`performance of one or more security
`operations on data, and a defined
`interaction with a host computing
`device that has not previously been
`integrated with security operations
`in a single integral device.”)
`•! “In particular, the modular
`device can include a security module
`that
`is
`adapted
`to
`enable
`performance of one or more security
`operations on data, and a target
`module that is adapted to enable a
`defined
`interaction with a host
`computing device.” ’135 Patent at
`3:27-31; ’802 Patent at 3:27-33 (“In
`particular, the peripheral device can
`be adapted to enable, in a single
`integral
`peripheral
`device,
`performance of one or more security
`operations on data, and a defined
`interaction with a host computing
`device that has not previously been
`integrated with security operations
`in a single integral device.”).
`•! “The peripheral device can
`also be implemented so that the
`security operations are performed in-
`line, i.e., the security operations are
`performed
`between
`the
`communication of data to or from the
`host computing device and
`the
`performance
`of
`the
`defined
`interaction.’).” ’802 Patent at 3:40-
`45.
`
`device
`peripheral
`•! “A
`the
`invention can
`to
`according
`advantageously enable application
`of security operations to a wide
`variety of interactions with a host
`computing device. In particular, a
`peripheral device according to the
`invention
`can
`accomplish
`this
`without necessity
`to use
`two
`peripheral
`devices:
`one
`that
`performs the security operations and
`
`
`
`2
`
`JOINT CLAIM CONSTRUCTION STATEMENT
`
`4
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 5 of 154 Page ID #:289
`
`
`
`Phrase
`
`SPEX's Proposal
`
`Defendants’ Proposal
`that performs
`the defined
`one
`interaction. This can, for example,
`minimize the possibility that the
`device adapted
`to perform
`the
`defined interaction will be used with
`the host computing system without
`proper
`application of
`security
`operations to that interaction.” ’802
`Patent at 3:49-59.
`is
`•! “The
`target module
`adapted
`to
`enable
`a defined
`interaction with a host computing
`device (examples of which are given
`below).” ’135 Patent at 4:18-20.
`•! “In another embodiment of
`the invention, a modular device
`includes a security module that is
`adapted to enable performance of
`one or more security operations on
`data, and a target module that is
`adapted
`to
`enable
`a defined
`interaction with a host computing
`device (such as the interactions
`discussed above with respect to
`exemplary embodiments of
`the
`target module of the previously
`discussed
`embodiment of
`the
`invention).” ’135 Patent at 4:40-47.
`•! “In yet another embodiment
`of the invention, a modular device
`that
`is
`adapted
`to
`enable
`a
`communication with
`host
`computing device, and that includes
`a security module that is adapted to
`enable performance of one or more
`security operations on data and a
`target module that is adapted to
`enable a defined interaction with a
`host computing device, is further
`adapted to enable provision of the
`type of a target module to a host
`computing device in response to a
`request from the host computing
`device for information regarding the
`type of the modular device.” ’135
`Patent at 4:56-65.
`•! “In still another embodiment
`of the invention, a modular device
`
`
`
`3
`
`JOINT CLAIM CONSTRUCTION STATEMENT
`
`5
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 6 of 154 Page ID #:290
`
`
`
`Phrase
`
`SPEX's Proposal
`
`Defendants’ Proposal
`is
`adapted
`to
`enable
`that
`a
`communication with
`host
`computing device, and that includes
`a security module that is adapted to
`enable performance of one or more
`security operations on data and a
`target module that is adapted to
`enable a defined interaction with a
`host computing device, is further
`adapted
`to enable
`the security
`module and/or the target module to
`be operably connected to the host
`computing device in response to an
`instruction from the host computing
`device.” ’135 Patent at 5:1-9.
`•! “In another embodiment of
`the invention, a security module is
`adapted to enable communication
`with a host computing device,
`performance of one or more security
`operations
`on
`data,
`and
`communication with a target module
`that is adapted to enable a defined
`interaction with a host computing
`device.” ’135 Patent at 5:13-18.
`•! “The security module is also
`adapted to enable performance of
`one or more security operations on
`data, and communication with a
`target module that is adapted to
`enable a defined interaction with a
`host computing device.” ’135 Patent
`at 5:32-36.
`further particular
`•! “In a
`the system,
`the
`embodiment of
`modular device further includes a
`target module which is adapted to
`enable
`communication with
`a
`security module, as well as to enable
`a defined interaction with a host
`computing device
`(examples of
`which are discussed above with
`respect to exemplary embodiments
`of the target module of previously
`discussed embodiments of
`the
`invention).” ’135 Patent at 5:36-42.
`•! “A modular device according
`to the invention can advantageously
`
`
`
`4
`
`JOINT CLAIM CONSTRUCTION STATEMENT
`
`6
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 7 of 154 Page ID #:291
`
`
`
`Phrase
`
`SPEX's Proposal
`
`Defendants’ Proposal
`enable
`application of
`security
`operations to a wide variety of
`interactions with a host computing
`device. In particular, a modular
`device according to the invention
`can
`accomplish
`this without
`necessity to use multiple peripheral
`devices that each include security
`functionality
`in addition
`to
`the
`primary
`functionality
`of
`the
`peripheral device. This can, for
`example, facilitate use of peripheral
`devices having security capability
`that operate in a predictable, reliable
`and consistent (yet secure) manner,
`since a single security module can be
`used to provide security to multiple
`types of interaction with a host
`computing device. This can also
`enable ease and flexibility in use of
`secure peripheral devices, since the
`same security module can be used
`with a variety of target modules.
`Moreover, the provision of in-line
`security
`in a modular device
`according to the invention enables a
`more secure exchange of data
`between a host computing device
`and the modular device, overcoming
`the problems identified above in
`previous systems for performing
`security
`operations
`on
`data
`exchanged between such devices.
`Additionally,
`implementing
`a
`modular device according to the
`invention so that the performance of
`security operations by the modular
`device is transparent can reduce or
`eliminate the need to modify aspects
`of
`the operation of
`the host
`computing device
`(e.g., device
`drivers of
`the host computing
`device), making implementation and
`use of a data security system
`including
`the modular device
`simpler and easier. Thus,
`the
`possibility that a user will use the
`system incorrectly (e.g., fail to apply
`
`
`
`5
`
`JOINT CLAIM CONSTRUCTION STATEMENT
`
`7
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 8 of 154 Page ID #:292
`
`
`
`Phrase
`
`SPEX's Proposal
`
`Defendants’ Proposal
`security operations to an interaction
`with the host computing device, or
`apply
`the
`security
`operations
`incorrectly or
`incompletely)
`is
`reduced. Making
`the
`security
`operations
`transparent can also
`enhance
`the security of
`those
`operations.” ’135 Patent at 3:48-
`4:13; ’802 Patent at 3:49-4:10 (“A
`peripheral device according to the
`invention can advantageously enable
`application of security operations to
`a wide variety of interactions with a
`host computing device. In particular,
`a peripheral device according to the
`invention
`can
`accomplish
`this
`without necessity
`to use
`two
`peripheral
`devices:
`one
`that
`performs the security operations and
`one
`that performs
`the defined
`interaction. This can, for example,
`minimize the possibility that the
`device adapted
`to perform
`the
`defined interaction will be used with
`the host computing system without
`proper
`application of
`security
`operations
`to
`that
`interaction.
`Moreover, the provision of in-line
`security
`in a peripheral device
`according to the invention enables a
`more secure exchange of data
`between a host computing device
`and
`the
`peripheral
`device,
`overcoming the problems identified
`above
`in previous systems
`for
`performing security operations on
`data
`exchanged between
`such
`devices. Additionally, implementing
`a modular device according to the
`invention so that the performance of
`security operations by the modular
`device is transparent can reduce or
`eliminate the need to modify aspects
`of
`the operation of
`the host
`computing device
`(e.g., device
`drivers of
`the host computing
`device), making implementation and
`use of a data security system
`
`
`
`6
`
`JOINT CLAIM CONSTRUCTION STATEMENT
`
`8
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 9 of 154 Page ID #:293
`
`
`
`Phrase
`
`SPEX's Proposal
`
`Defendants’ Proposal
`including
`the modular device
`simpler and easier. Thus,
`the
`possibility that a user will use the
`system incorrectly (e.g., fail to apply
`security operations to an interaction
`with the host computing device, or
`apply
`the
`security
`operations
`incorrectly or
`incompletely)
`is
`reduced. Making
`the
`security
`operations
`transparent can also
`enhance
`the security of
`those
`operations.”).
`•! “The particular manner in
`which operation of the operating
`system software is suspended so that
`the modular device can establish its
`identity
`can
`depend
`on
`the
`characteristics of
`the operating
`system software and/or the device
`interface. However,
`for many
`combinations of operating system
`software and device interface, the
`operating system software waits for
`confirmation
`that
`the
`device
`connected to the device interface is
`ready for further interaction with the
`operating system software before the
`operating system software seeks to
`identify the type of the device
`connected
`to
`the
`interface (the
`standard for PCMCIA interfaces, for
`example, specifies such operation).
`In such cases, the modular device
`can be configured to delay informing
`the operating system software that
`the modular device is ready for
`further interaction until the modular
`device has established its identity.”
`’135 Patent at 10:11-25; ’802 Patent
`at 7:44-59 (“The particular manner
`in which operation of the operating
`system software is suspended so that
`the peripheral device can establish
`its
`identity can depend on
`the
`characteristics of
`the operating
`system software and/or the device
`interface. However,
`for many
`combinations of operating system
`
`
`
`7
`
`JOINT CLAIM CONSTRUCTION STATEMENT
`
`9
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 10 of 154 Page ID #:294
`
`
`
`Phrase
`
`SPEX's Proposal
`
`Defendants’ Proposal
`software and device interface, the
`operating system software waits for
`confirmation
`that
`the
`device
`connected to the device interface is
`ready for further interaction with the
`operating system software before the
`operating system software seeks to
`identify the type of the device
`connected
`to
`the
`interface (the
`standard for PCMCIA interfaces, for
`example, specifies such operation).
`In such cases, the peripheral device
`can be configured to delay informing
`the operating system software that
`the peripheral device is ready for
`further
`interaction
`until
`the
`peripheral device has established its
`identity.”).
`the data
`•! “Since use of
`security system is easier (e.g., a user
`need not provide input to cause the
`host driver
`to be appropriately
`tailored to enable desired interaction
`with
`a
`security device),
`the
`possibility that a user will use the
`system incorrectly (e.g., fail to apply
`security operations to an interaction
`with the host computing device, or
`apply
`the
`security
`operations
`incorrectly or
`incompletely)
`is
`reduced.” ’135 Patent at 11:4-11;
`’802 Patent at 8:28-35 (“Since use of
`the data security system is easier
`(e.g., a user need not provide input to
`cause
`the host driver
`to be
`appropriately
`tailored
`to enable
`desired interaction with a security
`device), the possibility that a user
`will use the system incorrectly (e.g.,
`fail to apply security operations to an
`interaction with the host computing
`device, or apply
`the
`security
`operations
`incorrectly
`or
`incompletely) is reduced.”).
`•! “The modular device driver
`can have previously been installed
`on a data storage device (e.g., hard
`disk) of the host computing device
`
`
`
`8
`
`JOINT CLAIM CONSTRUCTION STATEMENT
`
`10
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 11 of 154 Page ID #:295
`
`
`
`Phrase
`
`SPEX's Proposal
`
`Defendants’ Proposal
`(in FIG. 6, the modular device driver
`is shown stored in the memory
`section 606b of the memory device
`606 of the host computing device
`601), or can be made accessible to
`the host computing device via an
`appropriate interface (such as a
`floppy disk drive, CD-ROM drive or
`network connection) at a time when
`the user wishes to initiate interaction
`between the host computing device
`and the modular device.” ’135 Patent
`at 12:28-37; ’802 Patent at 9:5-14
`(“The peripheral device driver can
`have previously been installed on a
`data storage device (e.g., hard disk)
`of the host computing device (in
`FIG. 6, the peripheral device driver
`is shown stored in the memory
`section 606b of the memory device
`606 of the host computing device
`601), or can be made accessible to
`the host computing device via an
`appropriate interface (such as a
`floppy disk drive, CD-ROM drive or
`network connection) at a time when
`the user wishes to initiate interaction
`between the host computing device
`and the peripheral device.”).
`•! “In such an implementation,
`the modular device driver can be
`implemented to automatically cause
`one or more predetermined security
`operations to be performed based
`upon a user-specified interaction
`with
`the
`target module, or
`the
`modular device can be configured to
`cause such security operations to be
`performed any time a specified
`interaction with the target module
`occurs.” ’135 Patent at 16:9-16; ’802
`Patent 12:64-13:4 (“In such an
`implementation,
`the
`peripheral
`device driver can be implemented to
`automatically cause one or more
`predetermined security operations to
`be performed based upon a user-
`specified interaction with the target
`
`
`
`9
`
`JOINT CLAIM CONSTRUCTION STATEMENT
`
`11
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 12 of 154 Page ID #:296
`
`
`
`Phrase
`
`SPEX's Proposal
`
`Defendants’ Proposal
`functionality, or
`the peripheral
`device can be configured to cause
`such security operations
`to be
`performed any time a specified
`interaction with
`the
`target
`functionality occurs.”).
`•! “A
`target module of a
`modular device according to the
`invention can also be embodied as a
`biometric module, which is defined
`herein as any module that is adapted
`to receive input data regarding a
`physical characteristic of a person
`based upon a physical interaction of
`the person with the module.” ’135
`Patent at 17:19-25; ’802 Patent at
`14:9-15 (“Target functionality of a
`peripheral device according to the
`invention can also be embodied as a
`biometric device, which is defined
`herein as any device that is adapted
`to receive input data regarding a
`physical characteristic of a person
`based upon a physical interaction of
`the person with the device.”).
`•! “In the security module 800,
`the interface control device 802
`mediates the interaction between the
`host computing device, the target
`module and
`the cryptographic
`processing device 801.” ’135 Patent
`at 20:1-4; ’802 Patent at 16:40-43
`(“In the peripheral device 800, the
`interface
`control
`device
`802
`mediates the interaction between the
`host computing device, the target
`functionality
`807
`and
`the
`cryptographic processing device
`801.”).
`set of configuration
`•! “A
`registers is maintained for the host
`computing device I/O interface, the
`cryptographic processing device
`interface, and the target module
`interface. In particular, the content of
`the host computing device I/O
`interface configuration registers is
`such that the interaction of the host
`
`
`
`10
`
`JOINT CLAIM CONSTRUCTION STATEMENT
`
`12
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 13 of 154 Page ID #:297
`
`
`
`Phrase
`
`SPEX's Proposal
`
`Defendants’ Proposal
`computing device with the modular
`device is the same as if the security
`functionality were not present
`(unless the data security system is
`operating in security functionality
`only mode).” ’135 Patent at 20:62-
`21:3; ’802 Patent at 17:36-42 (“A set
`of
`configuration
`registers
`is
`maintained for the host computing
`device
`I/O
`interface,
`the
`cryptographic processing device
`interface, and the target functionality
`interface. In particular, the content of
`the host computing device I/O
`interface configuration registers is
`such that the interaction of the host
`computing
`device with
`the
`peripheral device is the same as if the
`security
`functionality were not
`present (unless the data security
`system
`is operating
`in security
`functionality only mode).”).
`
`Extrinsic Evidence:
`•! Declaration of Mark T.
`Jones, Ph.D. In addition to providing
`relevant background
`information,
`Dr. Jones may offer one or more of
`the following opinions regarding
`claim construction:
`
`1. There is no particular meaning
`for “defined
`interaction” (or
`“interaction with
`a
`host
`computing device in a defined
`way”) in the field of computing.
`
`the
`2. The specifications of
`Asserted Patents do not define
`the meaning of the term “defined
`interaction” (or “interaction with
`a host computing device in a
`defined way”).
`
`the
`3. The specifications of
`not
`Asserted
`Patents
`do
`differentiate
`a
`“defined”
`interaction or a “defined way”
`
`
`
`11
`
`JOINT CLAIM CONSTRUCTION STATEMENT
`
`13
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 14 of 154 Page ID #:298
`
`
`
`Phrase
`
`SPEX's Proposal
`
`Defendants’ Proposal
`from,
`e.g.,
`“undefined”
`interactions or interactions that
`are not performed in a “defined
`way.”
`
`4. The Abstract of the ‘802
`Patent
`says
`“The
`defined
`interactions can provide a variety
`of types of functionality (e.g.,
`data
`storage,
`data
`communication, data input and
`output, user identification).” The
`‘802 Patent specification also
`says “The defined interactions
`can provide a variety of types of
`functionality (e.g., data storage,
`data communication, data input
`and output, user identification),
`as described further below.”
`Neither of these are a definition
`of “defined interaction.”
`
`the
`5. The specifications of
`Asserted Patents may purport to
`give non-limiting examples of
`defined interactions, but these do
`not clarify the actual scope of the
`term “defined interaction” (or
`“interaction with
`a
`host
`computing device in a defined
`way”).
`
`6. The language of the asserted
`claims distinguishes between
`“defined
`interaction”
`(or
`“interaction with
`a
`host
`computing device in a defined
`way”)
`and
`other
`claim
`limitations
`(e.g.,
`“communication”, “function” or
`“operation”), exemplifying the
`ambiguity in the term “defined
`interaction” (or “interaction with
`a host computing device in a
`defined way”).
`
`the
`7. The file histories of
`Asserted Patents do not define or
`
`
`
`12
`
`JOINT CLAIM CONSTRUCTION STATEMENT
`
`14
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 15 of 154 Page ID #:299
`
`
`
`Phrase
`
`SPEX's Proposal
`
`2. “peripheral
`device”
`
`
`
`Proposal: Plain and ordinary
`meaning. The plain and ordinary
`meaning is: "a device that is not
`part of the keyboard-computer-
`screen system, but is connected to
`it separately and can exchange
`signals with it. Typical peripheral
`devices include but are not limited
`to a disk drive and a printer."
`
`Intrinsic Evidence:
`'802 patent at Abstract,
`•!
`3:17-4:10, 4:50-5:21, 5:46-
`6:9, 6:19-40, 6:52-7:16,
`12:37-13:4,
`13:49-62,
`claims 1-39
`
`
`Extrinsic Evidence:
`•! Definition of "peripheral"
`in Sinclair, Ian R., The Harper
`Collins Dictionary Computer
`Terms (1991) ("a device that is not
`part of the keyboard-computer-
`screen system, but is connected to
`it separately and can exchange
`signals with
`it.
` Typical
`peripherals are a disk drive, a
`printer…")
`•! Definition of "peripheral"
`in Computer Dictionary (3rd. Ed.)
`(Microsoft Press, 1997)
`("In
`computing, a device, such as a disk
`drive, printer, modem, or joystick,
`that is connected to a computer
`and is controlled by the computer's
`microprocessor.")
`•! Declaration of Mr. Miguel
`Gomez. Mr. Gomez's declaration
`may
`include
`testimony
`that
`SPEX's proposed construction
`reflects the ordinary meaning of
`the term and is consistent with the
`intrinsic evidence.
`
`Defendants’ Proposal
`otherwise clarify the meaning of
`the term “defined interaction”
`(or “interaction with a host
`computing device in a defined
`way”).
`Proposal: Any device that operates
`outside of a host computing device
`and that is connected to the host
`computing device.
`
`Intrinsic Evidence:
`•! “FIG. 1 is a block diagram of
`a prior art system for enabling a host
`computing device to provide secured
`data to, and retrieve secured data
`from, a portable device. In FIG. 1, a
`system 100
`includes
`a host
`computing device 101 and a portable
`device 102. The host computing
`device 101 and portable device 102
`are
`adapted
`to
`enable
`communication between the devices
`101 and 102. The host computing
`device 101
`includes a security
`mechanism 101a (which can be
`embodied
`by
`appropriately
`configured
`hardware,
`software
`and/or
`firmware, such as,
`for
`example,
`a
`general
`purpose
`microprocessor
`operating
`in
`accordance with instructions of one
`or more computer programs stored in
`a data storage device such as a hard
`disk) which can be directed to
`perform one or more cryptographic
`operations.” ’802 patent at 1:52-65.
`•! “FIG. 2 is a block diagram of
`another prior art system for enabling
`a host computing device to provide
`secured data to, and retrieve secured
`data from, a portable device. In FIG.
`2, a system 200 includes a host
`computing device 201, a portable
`device 202 and a security device
`203. The host computing device 201,
`the portable device 202 and security
`device 203 are adapted to enable
`communication between the devices
`
`
`
`13
`
`JOINT CLAIM CONSTRUCTION STATEMENT
`
`15
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 16 of 154 Page ID #:300
`
`
`
`Phrase
`
`SPEX's Proposal
`
`
`Defendants’ Proposal
`201 and 202, and between the
`devices 201 and 203. The security
`device 203 includes appropriately
`configured
`hardware,
`software
`and/or firmware which can be
`directed to perform one or more
`cryptographic operations.
`In the system 200, if it is
`desired to provide secured data from
`the host computing device 201 to the
`portable device 202,
`the host
`computing device 201 first causes
`data to be transferred to the security
`device 203, where appropriate
`cryptographic
`operations
`are
`performed on the data. The secured
`data is then transferred back to the
`host computing device 201, which,
`in turn, transfers the secured data to
`the portable device 202. Similarly,
`the host computing device 201 can
`receive secured data
`from
`the
`portable device 202 by, upon receipt
`of secured data, transferring the
`secured data to the security device
`203, which performs appropriate
`cryptographic operations on the data
`to convert the data into a form that
`enables the data to be accessed
`and/or modified by a person who is
`authorized to do so, then transfers
`the unsecured data back to the host
`computing device 201.” Id. at 2:22-
`47.
`
`device
`peripheral
`•! “A
`the
`invention can
`to
`according
`advantageously enable application
`of security operations to a wide
`variety of interactions with a host
`computing device. In particular, a
`peripheral device according to the
`invention can accomplish
`this
`without necessity
`to use
`two
`peripheral
`devices:
`one
`that
`performs the security operations and
`one
`that performs
`the defined
`interaction. This can, for example,
`minimize the possibility that the
`
`
`
`14
`
`JOINT CLAIM CONSTRUCTION STATEMENT
`
`16
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`RUSS, AUGUST & KABAT
`
`

`

`Case 8:16-cv-01799-JVS-AGR Document 44 Filed 05/30/17 Page 17 of 154 Page ID #:301
`
`
`
`Phrase
`
`SPEX's Proposal
`
`Defendants’ Proposal
`the
`device adapted
`to perform
`defined interaction will be used with
`the host computing system without
`proper
`application of
`security
`operations
`to
`that
`interaction.
`Moreover, the provision of in-line
`security
`in a peripheral device
`according to the invention enables a
`more secure exchange of data
`between a host computing device
`and
`the
`peripheral
`device,
`overcoming the problems identified
`above
`in previous systems for
`performing security operations on
`data
`exchanged between
`such
`devices. Additionally, implementing
`a modular device according to the
`invention so that the performance of
`security operations by the modular
`device is transparent can r

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket