throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`_________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_________________________
`
`TOSHIBA CORPORATION, TOSHIBA AMERICA ELECTRONIC
`COMPONENTS, INC., AND APRICORN,
`Petitioners
`
`v.
`
`SPEX TECHNOLOGIES, INC.,
`Patent Owner
`_________________________
`
`Case IPR2018-01067
`Patent No. 6,088,802
`_________________________
`
`
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW OF
`U.S. PATENT NO. 6,088,802
`
`
`
`
`
`
`Mail Stop Patent Board
`Patent Trial and Appeal Board
`U.S. Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`

`

`Petition for Inter Partes Review of US Patent No. 6,088,802
`
`TABLE OF CONTENTS
`
`Page
`
`INTRODUCTION AND RELIEF REQUESTED .......................................... 1 
`I. 
`II.  GROUNDS FOR STANDING ........................................................................ 1 
`III.  PROPOSED GROUNDS OF UNPATENTABILITY .................................... 1 
`A. 
`Statutory Grounds for Challenge ........................................................... 2 
`B. 
`Prior Art Offered for the Present Unpatentability Challenges .............. 2 
`IV.  BACKGROUND ............................................................................................. 3 
`A.  Description of the ’802 Patent ............................................................... 4 
`B. 
`Technological Background .................................................................... 6 
`LEVEL OF ORDINARY SKILL IN THE ART ............................................. 7 
`V. 
`VI.  CLAIM CONSTRUCTION ............................................................................ 7 
`“defined interaction” (all Claims) and “interaction with a host
`A. 
`computing device in a defined way” (Claims 38–39) ........................... 8 
`“peripheral device” (all Claims) ............................................................ 9 
`“security means for enabling one or more security operations to
`be performed on data” (Claims 1–2, 6–7, 11–12, 23–25) and
`“means for performing the one or more security operations”
`(Claim 39) ............................................................................................ 10 
`“target means for enabling a defined interaction with a host
`computing device” (Claims 1–2, 6–7, 11–12, 23–25) ........................ 11 
`“means for enabling communication between the security
`means and the target means” (Claims 1–2, 6–7, 11–12, 23–25) ......... 12 
`“means for enabling communication with a host computing
`device” (Claims 1–2, 6–7, 11–12, 23–25) ........................................... 12 
`
`B. 
`C. 
`
`D. 
`
`E. 
`
`F. 
`
`i
`
`

`

`TABLE OF CONTENTS
`(continued)
`
`Page
`
`G. 
`
`H. 
`
`“means for operably connecting the security means and/or the
`target means to the host computing device in response to an
`instruction from the host computing device” (Claims 1–2, 6–7) ........ 13 
`“means for mediating communication of data between the host
`computing device and the target means so that the
`communicated data must first pass through the security means”
`(Claims 1–2, 11–12, 23) ...................................................................... 14 
`“means for providing to a host computing device, in response to
`a request from the host computing device for information
`regarding the type of the peripheral device, information
`regarding the function of the target means” (Claims 6–7, 23–
`25) ........................................................................................................ 14 
`“means for non-volatilely storing data” (Claims 2, 12, 25) ................ 15 
`J. 
`VII.  THE PRIOR ART RENDERS OBVIOUS CLAIMS 1–2, 6–7, 11–12,
`23–25, 38–39 OF THE ’802 PATENT .......................................................... 15 
`A.  Cited Prior Art ..................................................................................... 16 
`1. 
`Harari ................................................................................................... 16 
`2. 
`PCMCIA System Architecture: 16-Bit PC Cards (1995) ................... 19 
`3.  Wang .................................................................................................... 22 
`4. 
`Dumas .................................................................................................. 24 
`B.  Ground 1: Claims 1–2, 6–7, 11–12, 23–25, and 38–39 are
`Rendered Obvious by Harari in View of PCMCIA System
`Architecture ......................................................................................... 25 
`1.  Motivation to Combine Harari and PCMCIA System
`Architecture ......................................................................................... 27 
`Independent Claim 1 ........................................................................... 28 
`Dependent Claim 2 .............................................................................. 45 
`Independent Claim 6 ........................................................................... 46 
`Dependent Claim 7 .............................................................................. 52 
`Independent Claim 11 ......................................................................... 53 
`Dependent Claim 12 ............................................................................ 53 
`Independent Claim 23 ......................................................................... 53 
`Independent Claim 24 ......................................................................... 54 
`
`I. 
`
`2. 
`3. 
`4. 
`5. 
`6. 
`7. 
`8. 
`9. 
`
`ii
`
`

`

`TABLE OF CONTENTS
`(continued)
`
`Page
`
`10.  Dependent Claim 25 ............................................................................ 54 
`11. 
`Independent Claim 38 ......................................................................... 55 
`12. 
`Independent Claim 39 ......................................................................... 57 
`C.  Ground 2: Claims 1–2, 11–12, 23, and 39 are Rendered Obvious
`by Harari in View of Wang ................................................................. 59 
`1.  Motivation to Combine Harari, Wang, and PCMCIA System
`Architecture ......................................................................................... 59 
`2.  Wang Discloses Means for Mediating Communication of Data
`Between the Host Computing Device and the Target Means So
`That the Communicated Data Must First Pass Through the
`Security Means (Elements [1F], [11E], [23E], [39C]) ........................ 61 
`D.  Grounds 3-4: Claims 1–2, 11–12, 23, and 39 are Rendered
`Obvious for the Same Reasons as Grounds 1-2 when
`Considered Further in View of Dumas. .............................................. 64 
`1.  Motivation to Combine Dumas with Harari, PCMCIA System
`Architecture, and Wang ....................................................................... 65 
`Dumas Discloses Mediating Communication of Data Between
`the Host Computing Device and the Target Means So That the
`Communicated Data Must First Pass Through the Security
`Means (Elements [1F], [11E], [23E], and [39C]) ............................... 67 
`VIII.  MANDATORY NOTICES ........................................................................... 68 
`IX.  CONCLUSION .............................................................................................. 71 
`
`
`2. 
`
`iii
`
`

`

`TABLE OF AUTHORITIES
`
`Cases
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ............................................................ 8
`
`In Re Rambus Inc.,
`694 F.3d 42 (Fed. Cir. 2012) ................................................................................ 8
`
`Randall Mfg. v. Rea,
`733 F.3d 1355 (Fed. Cir. 2013) .......................................................................... 15
`
`Williamson v. Citrix Online, LLC,
`792 F.3d 1339 (Fed. Cir. 2015) ............................................................................ 8
`
`Statutes
`
`35 U.S.C. § 102(b) ..................................................................................................... 3
`
`35 U.S.C. § 102(e) ..................................................................................................... 2
`
`35 U.S.C. § 103 .................................................................................................... 2, 15
`
`35 U.S.C. § 311(c) ..................................................................................................... 1
`
`Regulations
`
`37 C.F.R. § 42.10(b) ................................................................................................ 70
`
`37 C.F.R. § 42.100(b) ................................................................................................ 8
`
`
`
`iv
`
`

`

`
`
`Exhibit List
`
`
`
`Exhibit Number
`
`Document
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`U.S. Patent No. 6,088,802 (“the ’802 Patent”)
`
`Summons Returned as Executed, SPEX Techs., Inc. v.
`Western Digital Corp., Case No. 8:16-cv-01799 (C.D. Cal.
`filed Oct. 31, 2016)
`
`File History of the ’802 Patent
`
`U.S. Patent No. 5,887,145 to Harari et al. (“Harari”)
`
`U.S. Patent No. 6,199,163 to Dumas et al. (“Dumas”)
`
`Don Anderson, PCMCIA SYSTEM ARCHITECTURE: 16-
`BIT PC CARDS (MindShare, Inc., 2nd ed. 1995)
`(“PCMCIA Architecture”)
`
`U.S. Patent No. 5,822,196 to Hastings et al. (“Hastings”)
`
`U.S. Patent No. 5,922,060 to Goodrum (“Goodrum”)
`
`U.S. Patent No. 5,941,965 to Moroz et al. (“Moroz”)
`
`U.S. Patent No. 5,943,482 to Culley et al. (“Culley”)
`
`U.S. Patent No. 6,009,151 to Staples (“Staples”)
`
`Windows Developers Journal, Vol. 7, No. 8 (Aug. 1996)
`
`Claim Construction Briefing in SPEX Techs., Inc. v.
`Western Digital Corp., Case No. 16-cv-01799 (C.D. Cal.)
`(“SPEX Claim Construction Brief”)
`
`Tentative Order Regarding Claim Construction, Case No.
`16-cv-01799 (C.D. Cal.) (“Tentative Constructions”)
`
`Declaration of Dr. Martin Kaliski, Ph.D. (“Kaliski Decl.”)
`
`Exhibit A (Updated) to Defendants’ Reply Claim
`
`i
`
`

`

`
`
`Construction Brief
`
`1017
`
`1018
`
`1019
`
`1020
`
`Reporter’s Transcript of Proceedings in SPEX Techs, Inc.
`v. Kingston Tech. Corp., et al., Case No. 16-cv-01790
`(C.D. Cal.) (“Markman Hearing Transcript”)
`
`Declaration of Sylvia Hall-Ellis, Ph.D. (“Hall-Ellis Decl.”)
`
`U.S. Patent No. 5,765,027 to Wang et al. (“Wang”)
`
`MARC Record
`
`’802 Patent Challenged Claims
`
`Claim 1
`[1Pre] A peripheral device, comprising:
`[1A] security means for enabling one or more security operations to be
`performed on data;
`[1B] target means for enabling a defined interaction with a host computing
`device;
`[1C] means for enabling communication between the security means and the
`target means;
`[1D] means for enabling communication with a host computing device;
`[1E] means for operably connecting the security means and/or the target means
`to the host computing device in response to an instruction from the host
`computing device; and
`[1F] means for mediating communication of data between the host computing
`device and the target means so that the communicated data must first pass
`through the security means.
`Claim 2
`[2] A peripheral device as in claim 1, wherein the target means comprises means
`for non-volatilely storing data.
`Claim 6
`[6Pre] A peripheral device, comprising:
`[6A] security means for enabling one or more security operations to be
`performed on data;
`[6B] target means for enabling a defined interaction with a host computing
`device;
`[6C] means for enabling communication between the security means and the
`target means;
`
`ii
`
`

`

`
`
`[6D] means for enabling communication with a host computing device;
`[6E] means for operably connecting the security means and/or the target means
`to the host computing device in response to an instruction from the host
`computing device; and
`[6F] means for providing to a host computing device, in response to a request
`from the host computing device for information regarding the type of the
`peripheral device, information regarding the function of the target means.
`Claim 7
`[7] A peripheral device as in claim 6, wherein the target means comprises means
`for non-volatilely storing data.
`Claim 11
`[11Pre] A peripheral device, comprising:
`[11A] security means for enabling one or more security operations to be
`performed on data;
`[11B] target means for enabling a defined interaction with a host computing
`device;
`[11C] means for enabling communication between the security means and the
`target means;
`[11D] means for enabling communication with a host computing device; and
`[11E] means for mediating communication of data between the host computing
`device and the target means so that the communicated data must first pass
`through the security means.
`Claim 12
`[12] A peripheral device as in claim 11, wherein the target means comprises
`means for non-volatilely storing data.
`Claim 23
`[23Pre] A peripheral device, comprising:
`[23A] security means for enabling one or more security operations to be
`performed on data;
`[23B] target means for enabling a defined interaction with a host computing
`device;
`[23C] means for enabling communication between the security means and the
`target means;
`[23D] means for enabling communication with a host computing device;
`[23E] means for mediating communication of data between the host computing
`device and the target means so that the communicated data must first pass
`through the security means; and
`[23F] means for providing to a host computing device, in response to a request
`from the host computing device for information regarding the type of the
`
`iii
`
`

`

`
`
`peripheral device, information regarding the function of the target means.
`Claim 24
`[24Pre] A peripheral device, comprising:
`[24A] security means for enabling one or more security operations to be
`performed on data;
`[24B] target means for enabling a defined interaction with a host computing
`device;
`[24C] means for enabling communication between the security means and the
`target means;
`[24D] means for enabling communication with a host computing device; and
`[24E] means for providing to a host computing device, in response to a request
`from the host computing device for information regarding the type of the
`peripheral device, information regarding the function of the target.
`Claim 25
`[25] A peripheral device as in claim 24, wherein the target means comprises
`means for non-volatilely storing data.
`Claim 38
`[38Pre.1] For use in a peripheral device
`[38Pre.2] adapted for communication with a host computing device,
`[38Pre.3] performance of one or more security operations on data,
`[38Pre.4] and interaction with a host computing device in a defined way, a
`method comprising the steps of:
`[38A] receiving a request from a host computing device for information
`regarding the type of the peripheral device; and
`[38B] providing to the host computing device, in response to the request,
`information regarding the type of the defined interaction.
`Claim 39
`[39Pre.1] For use in a peripheral device
`[39Pre.2] adapted for communication with a host computing device,
`[39Pre.3] performance of one or more security operations on data,
`[39Pre.4] and interaction with a host computing device in a defined way, a
`method comprising the steps of:
`[39A] communicating with the host computing device to exchange data between
`the host computing device and the peripheral device;
`[39B] performing one or more security operations and the defined interaction on
`the exchanged data; and
`[39C] mediating communication of the exchanged data between the host
`computing device and the peripheral device so that the exchanged data must first
`[p]ass through means for performing the one or more security operations.
`
`iv
`
`

`

`
`
`I.
`
`INTRODUCTION AND RELIEF REQUESTED
`Toshiba Corporation, Toshiba America Electronic Components, Inc., and
`
`Apricorn (“Petitioners”) petition for institution of inter partes review of U.S.
`
`Patent No. 6,088,802 (“the ’802 Patent”) (Ex. 1001). The ’802 Patent issued on
`
`July 11, 2000, and is assigned to SPEX Technologies, Inc. (“Patent-Owner”).
`
`Petitioner respectfully requests cancellation of claims 1–2, 6–7, 11–12, 23–25, and
`
`38–39 of the ’802 Patent based on the grounds of unpatentability detailed herein.
`
`The prior art and other evidence offered with this Petition establishes that all
`
`elements in the challenged claims of the ’802 Patent were well known as of the
`
`earliest alleged priority date, and that the claimed devices and methods recited in
`
`the ’802 Patent are obvious.
`
`II. GROUNDS FOR STANDING
`Petitioners certify that the ’802 Patent is available for review under
`
`35 U.S.C. § 311(c) and that Petitioners are not estopped from requesting an inter
`
`partes review challenging claims 1–2, 6–7, 11–12, 23–25, and 38–39 on the
`
`grounds identified in this Petition.
`
`III. PROPOSED GROUNDS OF UNPATENTABILITY
`The present Petition relies on prior art references that have not been
`
`considered by the Patent Office in the file history of the ’802 Patent, Ex. 1003, and
`
`details how the challenged claims are obvious.
`
`1
`
`

`

`
`
`A.
`
`Statutory Grounds for Challenge
`
` Ground 1: Harari in view of PCMCIA System Architecture renders claims 1–
`
`2, 6–7, 11–12, 23–25, and 38–39 obvious under §103(a);
`
` Ground 2: Harari in view of Wang and in further view of PCMCIA System
`
`Architecture renders claims 1–2, 11–12, and 23 obvious under § 103 (a);
`
` Ground 3: Harari in view of Dumas and PCMCIA System Architecture
`
`renders claims 1–2, 11–12, 23, and 39 obvious under § 103(a); and
`
` Ground 4: Harari in view of Dumas, Wang and PCMCIA System
`
`Architecture renders claims 1–2, 11–12, and 23 obvious under § 103 (a).
`
`Prior Art Offered for the Present Unpatentability Challenges
`
`B.
`Grounds 1-4 rely on the following patents and printed publications:
`
` U.S. Patent No. 5,887,145 to Harari et al. (“Harari”) (Ex. 1004) was filed on
`
`January 9, 1997; this reference is prior art at least under pre-AIA 35 U.S.C.
`
`§ 102(e) (the ’802 Patent’s earliest claimed priority date is June 4, 1997).
`
` U.S. Patent No. 5,765,027 to Wang et al. (“Wang”) (Ex. 1019) was filed on
`
`September, 26 1994; this reference is prior art at least under pre-AIA 35
`
`U.S.C. § 102(e).
`
` U.S. Patent No. 6,199,163 to Dumas et al. (“Dumas”) (Ex. 1005) was filed
`
`on March 26, 1996; this reference is prior art at least under pre-AIA 35
`
`U.S.C. § 102(e).
`
`2
`
`

`

`
`
` Don Anderson, PCMCIA System Architecture: 16-Bit PC Cards
`
`(MindShare, Inc., 2nd ed. 1995) (Ex. 1006). PCMCIA System Architecture
`
`was published in 1995, making it prior art at least under pre-AIA 35 U.S.C.
`
`§ 102(b). PCMCIA System Architecture bears a copyright date of 1995 and
`
`a Library of Congress Cataloging-in-Publication with ISBN and been
`
`referenced as prior art in numerous patents filed before the earliest claim of
`
`priority in this case, including U.S. Patent No. 5,822,196 (filed June 5, 1996)
`
`(Ex. 1007); U.S. Patent No. 5,922,060 (filed December 31, 1996) (Ex.
`
`1008); U.S. Patent No. 5,941,965 (filed July 12, 1996) (Ex. 1009); U.S.
`
`Patent No. 5,943,482 (filed June 5, 1996) (Ex. 1010); U.S. Patent No.
`
`6,009,151 (filed August 27, 1996) (Ex. 1011), to name a few. It also appears
`
`in a number of applications incorporated by reference or as admitted prior
`
`art by the applicant as well, including in the ’965 Patent (Ex. 1009) at 3:33-
`
`36 and the ’151 Patent (Ex. 1011) at 4:34-37, listed above. In addition,
`
`PCMCIA System Architecture was reviewed as a “recent title” in the August
`
`1996 edition of the Windows Developer’s Journal. Ex. 1012 at 61-63.
`
`PCMCIA System Architecture was published and publicly available by
`
`September 22, 1995 according to its MARC record. See Hall-Ellis Decl.,
`
`Ex. 1018 at ¶20; Ex. 1020.
`
`IV. BACKGROUND
`
`3
`
`

`

`
`
`A. Description of the ’802 Patent
`The ’802 Patent relates to a peripheral device that “communicate[s] with a
`
`host computing device to enable one or more security operations to be performed
`
`by the peripheral device on data stored within the host computing device, data
`
`provided from the host computing device to the peripheral device, or data retrieved
`
`by the host computing device from the peripheral device.” ’802 Patent, Ex. 1001,
`
`1:21- 27. The ’802 Patent illustrates the aim of the invention through figures that
`
`contrast the claimed invention with the prior art.
`
`Figures 1 and 2, below, are each a block diagram of an admitted “prior art
`
`system for enabling a host computing device to provide secured data to, and
`
`retrieve secured data from, a portable device.” Ex. 1001, 1:52–54; 2:22–24.
`
`
`
`4
`
`

`

`
`
`
`
`Id., Figs. 1 and 2.
`
`Figure 3A, reproduced below, illustrates how the claimed invention
`
`allegedly differs from the prior art: it moves the security function from either
`
`within the host computing device or a separate external device into the peripheral
`
`device at issue.
`
`
`
`Id., Fig. 3A; id. at 3:49-51. The alleged invention pertains to a peripheral device
`
`“adapted to enable, in a single integral peripheral device, performance of one or
`
`more security operations on data, and a defined interaction with a host computing
`
`5
`
`

`

`
`
`device that has not previously been integrated with security operations in a single
`
`integral device.” Id. at 3:28-33. “[D]efined interactions can provide a variety of
`
`types of functionality (e.g., data storage, data communication, data input and
`
`output, user identification).” Id. at 3:33-35. At bottom, the ’802 Patent is directed
`
`toward combining a security functionality with an additional functionality in the
`
`same peripheral device.
`
`Each challenged claim is directed to a “peripheral device” or a method “[f]or
`
`use in a peripheral device.” Claims 1–2, 6–7, 11–12, and 23–25 are device claims
`
`with means-plus-function elements related to providing security, a defined
`
`interaction, and establishing communications between various computer structures.
`
`Claims 38–39 are method claims with limitations that parallel the elements in the
`
`device claims.
`
`Technological Background
`
`B.
`By the early-to-mid 1990s, computers were household items with ever-
`
`increasing capabilities and an ever-expanding array of available peripheral devices
`
`(i.e., external devices that communicate with a computer) usable with a computer.
`
`Kaliski Decl., Ex. 1015, ¶25. To protect sensitive data and to limit access to
`
`authorized users, skilled artisans developed ways to secure data, such as by
`
`restricting access to data using passwords and encryption. Id., ¶27. Other related
`
`technologies such as public key/private key data encryption dates back to this era
`
`6
`
`

`

`
`
`also. Id., ¶29. Developers began to place encryption within devices that perform
`
`additional functions such as communication or data storage once the physical
`
`capabilities of the devices could support it. Id., ¶¶26-29. At the same time, a need
`
`arose
`
`to easily connect peripheral devices
`
`to host computers
`
`to enable
`
`communication between the two. Id., ¶31. Storage became smaller, lighter, and
`
`more powerful, utilizing solid state (or Flash) memory. Standards were developed
`
`to accomplish this. Id., ¶¶30-31. The Personal Computer Memory Card
`
`International Association (PCMCIA) released a standard in September 1990 that
`
`enabled a PC Card to easily mate with, for example, the portable computers of the
`
`era. Id., ¶32. At first, PCMCIA focused on memory card add-ons, but
`
`input/output devices (such as modems and network devices) followed shortly
`
`thereafter in Release 2.0. Id. With this development of easily portable peripherals,
`
`encryption capabilities, such as those mentioned above, became a critical need for
`
`many of these peripherals. Id.
`
`V. LEVEL OF ORDINARY SKILL IN THE ART
`A person of ordinary skill in the art of the ’802 Patent would have at least a
`
`Bachelor’s degree in electrical engineering or computer science, and at least one
`
`year of experience in computer security and/or computer architecture for peripheral
`
`devices or equivalent education or experience. Kaliski Decl., Ex. 1015, ¶16.
`
`VI. CLAIM CONSTRUCTION
`
`7
`
`

`

`
`
`Claims of an expired patent in inter partes review are construed according to
`
`the standard applied in the district courts under Phillips v. AWH Corp., 415 F.3d
`
`1303 (Fed. Cir. 2005) (en banc). In Re Rambus Inc., 694 F.3d 42, 46 (Fed. Cir.
`
`2012); 37 C.F.R. § 42.100(b). Means-plus-function claim elements are restricted
`
`to “only the structure, materials, or acts described in the specification as
`
`corresponding to the claimed function and equivalents thereof.” Williamson v.
`
`Citrix Online, LLC, 792 F.3d 1339, 1347-48 (Fed. Cir. 2015).
`
`Patent-Owner and Petitioner submitted claim construction briefing in the
`
`DCT Litigation. And the Court issued tentative constructions. Ex. 1014.1 This
`
`petition is based on the claim constructions urged by Patent-Owner in the DCT
`
`Litigation, or as the parties agreed. See Patent-Owner’s Opening Claim
`
`Construction Br. (“Claim Construction Br.”), Ex. 1013.
`
`A.
`
`“defined interaction” (all Claims) and “interaction with a host
`computing device in a defined way” (Claims 38–39)
`
`Patent-Owner argued that “defined interaction” is “a specific, predefined
`
`functionality of the device, such as a data storage, data communication, data input
`
`and output, or user identification.” Ex. 1013 at 3. Patent-Owner also asserted that
`
`“interaction with a host computing device in a defined way” is an “interaction with
`
`1 The Court’s final Order Regarding Claim Construction issued on October 18,
`
`2017. IPR2018-00082, Ex. 2003.
`
`8
`
`

`

`
`
`a host computing device using a specific, predefined functionality of the device,
`
`such as data storage, data communication, data input and output, or user
`
`identification.” Ex. 1013 at 3-4. Outside the claims, the ’802 Patent mentions
`
`“defined interaction” only in the Abstract and the Summary of the Invention where
`
`it states “the peripheral device can be adapted to enable, in a single integral
`
`peripheral device, performance of one or more security operations on data, and a
`
`defined interaction with a host computing device that has not previously been
`
`integrated with security operations in a single integral device.” ’802 Patent, Ex.
`
`1001, at Abstract; 3:28-33. The description further explains, “defined interactions
`
`can provide a variety of types of functionality (e.g., data storage, data
`
`communication, data input and output, user identification).” Id. at 3:33-35. The
`
`district court tentatively rejected that construction, and construed these terms as
`
`meaning: “an interaction [with a host computing device] that can provide a variety
`
`of functionalities.” Ex. 1014 at 6.
`
`“peripheral device” (all Claims)
`
`B.
`The ’802 Patent provides a definition of “peripheral device” stating,
`
`“‘peripheral device’ can refer to any device that operates outside of a host
`
`computing device and that is connected to the host computing device.” ’802
`
`Patent, Ex. 1001, 4:52-55. Patent-Owner thus proposed construing this term as
`
`“any device that operates outside of a host computing device (i.e. the keyboard-
`
`9
`
`

`

`
`
`computer-screen system) and that is connected to the host computing device.
`
`Typical peripheral devices include but are not limited to a disk drive and a printer.”
`
`Ex. 1013 at 6. The district court tentatively rejected that construction, and
`
`construed these terms as meaning: “a device that operates outside of a host
`
`computing device and that is connected to the host computing device, including
`
`such devices in the same housing as the host computing device.” Ex. 1014 at 9.
`
`C.
`
`“security means for enabling one or more security operations to
`be performed on data” (Claims 1–2, 6–7, 11–12, 23–25) and
`“means for performing the one or more security operations”
`(Claim 39)
`
`The parties agree that this is a means-plus-function term and that the recited
`
`function is “enabling one or more security operations to be performed on data”
`
`(Claims 1–2, 6–7, 11–12, 23–25) and “performing the one or more security
`
`operations” (Claim 39). Patent-Owner proposed that the corresponding structures
`
`are: (1) a cryptographic processing device 801 (processor capable of performing
`
`the cryptographic operations) based on ’802 Patent, Ex. 1001, at 15:63–64, Fig. 8;
`
`(2) a security token device that performs security operations and that includes one
`
`or more mechanisms (such as, for example, use of a hardware random number
`
`generator and/or protected memory) to provide security for the content of those
`
`operations based on 5:35–39; (3) a specific hardware component programmed or
`
`configured to perform a security operation based on 18:1–47; (4) a special purpose
`
`10
`
`

`

`
`
`embedded processor, embodied on a single integrated chip and designated as
`
`MYK-82 (and referred to by the name Capstone), which includes an ARM6
`
`processor core and several special purpose cryptographic processing elements that
`
`have been developed by the Department of Defense based on 16:1–6; or (5)
`
`equivalents thereof. Ex. 1013 at 8–9.
`
`The district court tentatively agreed with the proposed function, but limited
`
`the structures to: (1) a specific hardware component programmed or configured to
`
`perform a security operation disclosed in ’802 Patent at 18:1-47 or (2) a special
`
`purpose embedded processor, embodied on a single integrated chip and designated
`
`as MYK-82 (and referred to by the name Capstone), which includes an ARM6™
`
`processor core and several special purpose cryptographic processing elements that
`
`have been developed by the Department of Defense (’802 Patent at 15:67-16:8).
`
`Ex. 1014, at 13–14.
`
`D.
`
`“target means for enabling a defined interaction with a host
`computing device” (Claims 1–2, 6–7, 11–12, 23–25)
`
`The parties agreed on the construction in the DCT Litigation of this means-
`
`plus-function term, subject to Defendants’ argument regarding the indefiniteness of
`
`the term “defined interaction.” Ex. 1016, at Page 5. The recited function is
`
`“enabling a defined interaction with a host computing device.” The agreed
`
`corresponding structures based on the disclosure in the specification, and in view
`
`11
`
`

`

`
`
`of the parties’ proposed constructions for “defined interaction,” are: (1) a memory
`
`module adapted to enable non-volatile storage of data (’802 Patent at 13:27–29);
`
`(2) a communications module adapted to enable communications between the host
`
`computing device and a modem or LAN transceiver (’802 Patent at 13:50–62); (3)
`
`a smart card reader (’802 Patent at 15:24–28); (4) biometric device (’802 Patent at
`
`14:10–19); or (5) equivalents therefore.
`
`E.
`
`“means for enabling communication between the security means
`and the target means” (Claims 1–2, 6–7, 11–12, 23–25)
`
`The parties agreed to the construction in the DCT Litigation for this means-
`
`plus-function term. Ex. 1016, at Page 6. The recited function is “enabling
`
`communication between the security means and the target means.” In the DCT
`
`Litigation, the parties agreed that the corresponding structure is conventional
`
`computer bus 615 based on the disclosure at 6:40-45. Ex. 1016, at Page 6.
`
`F.
`
`“means for enabling communication with a host computing
`device” (Claims 1–2, 6–7, 11–12, 23–25)
`
`This function for this means-plus-function term is “enabling communication
`
`with a host computing device.” Patent-Owner’s proposed corresponding structure
`
`includes: (1) Input/Output (I/O) device, for example a conventional computer bus
`
`based on 6:37-40; (2) PCMCIA based on 5:5-10; (3) Cord between housing and
`
`matching receptacle based on 7:3-5; (4) Wireless communication based on 5:5-10;
`
`(5) Smart card interface based on 5:5-10; (6) Serial interface (such as RS-232)
`
`12
`
`

`

`
`
`based on 5:5-10; (7) Parallel interface based on 5:5-10; (8) SCSI interface based on
`
`5:5-10; (9) IDE interface based on 5:5-10; or (10) equivalents thereof. Ex. 1013 at
`
`15. The district court tentatively agreed with Patent-Owner. Ex. 1014 at 32–33.
`
`G.
`
`“means for operably connecting the security means and/or the
`target means to the host computing device in response to an
`instruction from the host computing device” (Claims 1–2, 6–7)
`
`This means-plus-function term’s function is “operably connecting the
`
`security means and/or the target means to the host computing device in response to
`
`an instruction from the host computing device.”
`
`Patent-Owner proposed the corresponding structure is: (1) PCMCIA
`
`interface and memory section 612a;

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket