throbber
Paper: 7
`
`
`
`
`
`
`Trials@uspto.gov
` Entered: July 8, 2019
`
`
`
`571-272-7822
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`KINGSTON TECHNOLOGY COMPANY, INC.,
`Petitioner,
`v.
`MEMORY TECHNOLOGIES, LLC,
`Patent Owner.
`____________
`
`Case IPR2019-00638
`Patent 7,827,370 B2
`____________
`
`
`
`Before JAMESON LEE, J. JOHN LEE,
`and JASON M. REPKO, Administrative Patent Judges.
`
`LEE, Administrative Patent Judge.
`
`
`
`
`
`
`
`
`DECISION
`Denying Instituting of Inter Partes Review
`35 U.S.C. § 314
`
`
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`
`I.
`
`INTRODUCTION
`
`A. Background
`On January 29, 2019, Petitioner filed a Petition to institute inter partes
`review of claims 1–3, 5–7, 12–15, 19, and 25 of U.S. Patent No. 7,827,370
`B2 (Ex. 1001, “the ’370 patent”). Paper 1 (“Pet.”). Patent Owner filed a
`Preliminary Response. Paper 6 (“Prelim. Resp.”).
`To institute an inter partes review, we must determine that the
`information presented in the Petition shows “that there is a reasonable
`likelihood that the petitioner would prevail with respect to at least 1 of the
`claims challenged in the petition.” 35 U.S.C. § 314(a). Having considered
`all submissions of both parties, we determine that Petitioner has not
`demonstrated a reasonable likelihood that it would prevail in establishing the
`unpatentability of any of claims 1–3, 5–7, 12–15, 19, and 25.
`The Petition is denied, and no inter partes review is instituted.
`Related Matters
`The parties identify a civil action involving alleged infringement of
`the ’370 patent: Memory Technologies, LLC v. Kingston Technology
`Corporation et al., No. 8-18-cv-00171-JLS-JDE (C.D. Cal.). Pet. 2, Paper
`4, 1. Patent Owner further identifies the following terminated litigations
`involving the ’370 patent: Memory Technologies, LLC v. SanDisk LLC et
`al., No. 8-16-cv-02163 (C.D. Cal.); Certain Memory Devices and
`Components Thereof, No. 337-TA-1034 (ITC). Paper 4, 1. Patent Owner
`additionally identifies another petition for inter partes review of claims in
`the ’370 patent: IPR2017-00868 (terminated prior to institution decision).
`Id. The petitioner in IPR2017-00868 is not the petitioner in this proceeding.
`
`B.
`
`2
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`C.
`
`The ’370 Patent
`The ’370 patent is directed to a method and apparatus that
`permanently write protects just a portion of a memory. Ex. 1001, Abstr.
`“Write protect” in that context means the data written into the protected area
`of memory cannot be written over or erased, like in the case of a read-only-
`memory. See id., at 1:45–48. The ’370 patent explains that preexisting
`memory cards did not provide the ability for a user to permanently write
`protect just a portion of a memory card, although it was possible to
`permanently write protect the entire card. Id. at 1:45–54. The ’370 patent
`further explains that the standard Multi-Media Card (MMC) specification
`provided a command to write protect a portion of the memory card, but that
`protection can be canceled by another command and, thus, was not
`permanent. Id. at 1:66–2:1.
`According to the ’370 patent, a new definition for the MMC standard
`is provided for permanently write protecting a portion of a multi-media card.
`Id. at 2:6–8. A portion of the multi-media card can be permanently write
`protected while other portions are still available to the user. Id. at 2:8–12.
`Specifically, that is achieved by (1) identifying a bit in a specific data
`register of the memory card, (2) setting the bit to have a certain predefined
`value that causes a pre-existing write-protection command to mean
`permanent write protection of a part of the memory of the memory card, (3)
`writing information to that memory, and (4) executing the write-protection
`command concerning that memory. Id. at 2:12–21.
`
`
`
`3
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`
`Claims 1, 12, and 25 are independent and reproduced below:
`1. A method comprising:
`write protecting at least one part of a memory by a command;
`setting at least one bit in a data register configured to indicate
`that permanent write protection of the at least one part of
`the memory is allowed in order to redefine the command
`to allow permanent write protection, that cannot be un-
`protected by a command, of the at least one part of the
`memory; and
`executing the command in order to permanently write protect
`said at least one part of the memory.
`Ex. 1001, 5:55–65.
`12. An apparatus comprising:
`an interface controller arranged to write protect at least one part of
`a memory of said apparatus by a command;
`a data register arranged to define at least one bit to indicate that
`permanent write protection of the at least one part of the
`memory is allowed;
`a controller arranged to set the at least one bit in order to redefine
`the command to allow permanent write protection, that cannot
`be un-protected by a command, of the at least one part of the
`memory of said apparatus, and
`the controller arranged to execute the command in order to
`permanently write protect said at least one part of the memory.
`Id. at 6:31–43.
`25. A memory device having stored therein instructions that, when
`executed, perform:
`write protecting at least one part of a memory by a command;
`setting at least one bit in a data register configured to indicate
`that permanent write protection of the at least one part of
`the memory is allowed in order to redefine the command
`to allow permanent write protection, that cannot be un-
`
`4
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`
`protected by a command, of the at least one part of the
`memory; and
`executing the command in order to permanently write protect
`said at least one part of the memory.
`Id. at 8:10–21.
`
`Evidence Relied Upon
`Petitioner relies on the following references:1
`
`D.
`
`
`
`References
`
`Date
`
`Chevallier U.S. Pub. App. 2004/0083346
`A1
`
`Apr. 29, 2004,
`filed Oct. 24, 2002
`
`Toombs
`
`U.S. Patent No. 6,279,114 B1 Aug. 21, 2001
`
`Estakhri
`
`U.S. Patent No. 6,262,918 B1
`
`July 17, 2001
`
`Exhibit
`
`Ex. 1003
`
`Ex. 1004
`
`Ex. 1005
`
`Petitioner also relies on the Declarations of R. Jacob Baker, Ph.D.,
`P.E. (Ex. 1006).
`
`The Asserted Ground of Unpatentability
`
`E.
`
`
`Claims Challenged
`
`1–3, 5, 6, 12–15, 25
`
`1–3, 5, 6, 12–15, 25
`
`References
`Basis2
`§ 102(a) / 102(e) Chevallier
`
`§ 103(a)
`
`Chevallier3
`
`
`1 The ’370 patent issued from Application 11/176,669, filed July 8, 2005.
`2 The Leahy-Smith America Invents Act (“AIA”), Pub. L. No. 112–29, 125
`Stat. 284, 287–88 (2011), revised 35 U.S.C. § 103 effective March 16, 2013.
`Because the challenged patent was filed before March 16, 2013, we refer to
`the pre-AIA version of § 103.
`3 Petitioner actually asserts the ground as “Chevallier IN VIEW OF THE
`KNOWLEDGE OF A POSA [Person of Ordinary Skill in the Art].” Pet. 40.
`5
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`
`Claims Challenged
`
`1–3, 5–7, 12–15, 19, 25
`
`25
`
`Basis
`§ 103(a)
`
`§ 103(a)
`
`References
`Chevallier and Toombs
`Chevallier, Toombs, and
`Estakhri
`
`A.
`
`II. ANALYSIS
`The Law on Anticipation and Obviousness
`To establish anticipation, each and every element in a claim, arranged
`as recited in the claim, must be found in a single prior art reference.
`Therasense, Inc. v. Becton, Dickinson & Co., 593 F.3d 1325, 1332 (Fed. Cir.
`2010); Net MoneyIN, Inc. v. VeriSign, Inc., 545 F.3d 1359, 1369 (Fed. Cir.
`2008); Karsten Mfg. Corp. v. Cleveland Golf Co., 242 F.3d 1376, 1383 (Fed.
`Cir. 2001). While the elements must be arranged in the same way as is
`recited in the claim, “the reference need not satisfy an ipsissimis verbis test.”
`In re Gleave, 560 F.3d 1331, 1334 (Fed. Cir. 2009); In re Bond, 910 F.2d
`831, 832–33 (Fed. Cir. 1990).
`Thus, to establish anticipation, identity of terminology between the
`prior art reference and the claim is not required. “[I]t is proper to take into
`account not only specific teachings of the reference but also the inferences
`which one skilled in the art would reasonably be expected to draw
`therefrom.” In re Preda, 401 F.2d 825, 826 (CCPA 1968). The dispositive
`question is whether one skilled in the art would reasonably understand or
`infer from a prior art reference that every claim element as required by the
`
`
`But it is unnecessary to expressly state “the knowledge of a person of
`ordinary skill in the art” in the alleged ground of obviousness, because all
`obviousness determinations are made on the basis of the level of ordinary
`skill in the art.
`
`6
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`claim is disclosed in that reference. Eli Lilly v. Los Angeles Biomedical
`Research Institute, 849 F.3d 1073, 1074–75 (Fed. Cir. 2017); see also Dayco
`Prods., Inc. v. Total Containment, Inc., 329 F.3d 1358, 1368 (Fed. Cir.
`2003); In re Baxter Travenol Labs., 952 F.2d 388, 390 (Fed. Cir. 1991).
`The question of obviousness is resolved on the basis of underlying
`factual determinations including: (1) the scope and content of the prior art;
`(2) any differences between the claimed subject matter and the prior art;
`(3) the level of ordinary skill in the art; and (4) when in evidence, objective
`indicia of nonobviousness. Graham v. John Deere Co., 383 U.S. 1, 17–18
`(1966). One seeking to establish obviousness based on more than one
`reference also must articulate sufficient reasoning with rational
`underpinnings to combine teachings. See KSR Int’l Co. v. Teleflex, Inc.,
`550 U.S. 398, 418 (2007).
`
`B.
`
`The Level of Ordinary Skill in the Art
`Petitioner asserts that the level of ordinary skill in the art corresponds
`to “a person with a bachelor’s degree in electrical engineering or a closely
`related field, and two or three years of experience in the field of memory
`device circuit design.” Pet. 21–22. Patent Owner has not articulated a
`different level of ordinary skill and also has not disputed Petitioner’s
`statement of the level of ordinary skill. In this circumstance, we adopt the
`level of ordinary skill as articulated by Petitioner.
`
`C.
`
`Claim Construction
`For petitions filed on or after November 13, 2018, a claim shall be
`construed using the same claim construction standard that would be used to
`construe the claim in a civil action under 35 U.S.C. § 282(b), including
`construing the claim in accordance with the ordinary and customary
`
`7
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`meaning of such claim as understood by one of ordinary skill in the art and
`the prosecution history pertaining to the patent. 37 C.F.R. § 42.100(b)
`(2018). Petitioner filed its Petition on January 29, 2019. Paper 1. Thus, we
`apply the claim construction standard as set forth in Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) (“the Phillips standard”).
`Claim terms are generally given their ordinary and customary
`meaning as would be understood by one with ordinary skill in the art in the
`context of the specification, the prosecution history, other claims, and even
`extrinsic evidence including expert and inventor testimony, dictionaries, and
`learned treatises, although extrinsic evidence is less significant than the
`intrinsic record. Phillips, 415 F.3d at 1312–1317. Usually, the specification
`is dispositive, and it is the single best guide to the meaning of a disputed
`term. Id. at 1315.
`The specification may reveal a special definition given to a claim term
`by the patentee, or the specification may reveal an intentional disclaimer or
`disavowal of claim scope by the inventor. Id. at 1316. If an inventor acts as
`his or her own lexicographer, the definition must be set forth in the
`specification with reasonable clarity, deliberateness, and precision.
`Renishaw PLC v. Marposs Societa’ per Azioni, 158 F.3d 1243, 1249 (Fed.
`Cir. 1998). The disavowal, if any, can be effectuated by language in the
`specification or the prosecution history. Poly-America, L.P. v. API Indus.,
`Inc., 839 F.3d 1131, 1136 (Fed. Cir. 2016). “In either case, the standard for
`disavowal is exacting, requiring clear and unequivocal evidence that the
`claimed invention includes or does not include a particular feature.” Id.
`Only those claim terms that are in controversy need to be construed,
`and only to the extent necessary to resolve the controversy. Nidec Motor
`
`8
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`Corp. v. Zhongshan Broad Ocean Motor Co. Ltd., 868 F.3d 1013, 1017
`(Fed. Cir. 2017); Wellman, Inc. v. Eastman Chem. Co., 642 F.3d 1355, 1361
`(Fed. Cir. 2011); Vivid Techs., Inc. v. Am. Sci. & Eng’g, Inc., 200 F.3d 795,
`803 (Fed. Cir. 1999).
`Petitioner proposes a construction for five claim terms as follows:
`1.
`“a data register” as meaning—a portion of
`memory containing information about a memory card—;
`
`“redefine the command to allow permanent write
`2.
`protection” as meaning—cause a command that would not
`result in permanent write protection to result in permanent write
`protection—;
`
`“wherein said at least one bit has a certain
`3.
`predefined value” as meaning—the bit is set to a value
`associated with permanent write protection—;
`
`“wherein said at least one bit is reprogrammable”
`4.
`as meaning—a bit set to allow permanent write protection when
`a command is executed may have its value changed so that
`permanent write protection does not always occur—; and
`
`“memory group” as meaning —a segment of
`
`5.
`memory—.
`
`Pet. 16–20.
`Patent Owner has not proposed a construction for any claim term, and
`has not expressly disputed any of the proposed constructions by Petitioner.
`Implicit in Patent Owner’s arguments, however, is the position that “redefine
`the command to allow permanent protection” changes the meaning of the
`
`9
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`command not just in any single instance but for all future executions of the
`command until the command is redefined again. To reach our decision on
`whether to institute review, we need to resolve that issue, under the Phillips
`standard, concerning the proper construction of “redefine the command to
`allow permanent write protection,” a phrase that is recited in all three
`independent claims 1, 12, and 25. We need not construe any other term.
`“redefine the command to
`allow permanent write protection”
`Petitioner’s proposed construction—cause a command that would not
`result in permanent write protection to result in permanent write
`protection—lacks sufficient clarity. It is unclear whether a single instance of
`permanent write protection is sufficient to meet the limitation, or whether all
`future executions of the redefined command must result in permanent write
`protection until another redefinition occurs. We determine that, in the
`context of the Specification of the ’370 patent, the redefinition, when
`accomplished, applies to all future executions of the command until it is
`redefined again. It is insufficient to meet the limitation if, after the
`redefinition, the redefined command still may function the way it used to
`function prior to the redefinition.
`The ’370 patent describes, in the Summary of the Invention portion of
`the Specification:
`is achieved by
`This partial permanent write protection
`identifying a bit in a specific data register of the memory card,
`setting that bit to have a certain predefined value that causes
`write protection command to mean permanent write protection
`of part of the memory of the memory card . . . .
`Ex. 1001, 1:12–21 (emphasis added). Here, the “write protection command”
`refers generally to all executions of that command and not just a special case
`
`10
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`thereof. The cited text conveys that after the bit is set, the write protection
`command whenever executed will result in permanent write protection.
`
`The ’370 patent also describes:
`
`First embodiment of the invention for partially write
`protecting a portion of a MMC 1
`is
`to define
`the
`PERM_WRITE_PROTECT bit of the CSD [card-specific data
`register] 2 (bit 13) in such a way that setting of this bit does not
`as much protect the whole card 1. Instead the bit 13 will indicate
`that all
`the write protect groups protected with
`SET_WRITE_PROT command 5 (CMD28) are permanently
`protected
`and
`cannot
`be
`un-protected
`using
`write
`CLR_WRITE_PROT command 5 (CMD29).
`Id. at 2:55–62 (emphasis added). The reference to the
`“SET_WRITE_PROT” command, which is redefined, refers generally to all
`executions of that command and not just a special case thereof. The cited
`text conveys that after the bit is set, the write protection command whenever
`executed will result in permanent write protection.
`
`The ’370 patent further describes:
`
`Second embodiment of the invention for partially write
`protecting a portion of a MMC 1 is to define one of the unused
`CSD 2 bits to indicate that a portion of the multimedia card 1 is
`permanently write protected. This bit can for example be the bit
`17 of the CSD 2, and it can for example be called
`PARTIAL_PERM_WP. The write protection of the portion of
`MMC 1 works similarly as the write protection in the method
`described above. If the PARTIAL_PERM_WP bit is set in the
`CSD 2, the groups protected with SET_WRITE_PROTECT
`command 5 (CMD28) become permanently write protected, and
`cannot be un-protected using CLEAR_WRITE_PROTECT
`command 5 (CMD29).
`Id. at 3:8–30 (emphasis added). The reference to the
`“SET_WRITE_PROTECT” command, which is redefined, refers generally
`to all executions of that command and not just a special case thereof. The
`
`11
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`cited text conveys that after the bit is set, the write protection command
`whenever executed will result in permanent write protection.
`
`The Specification further indicates that the redefinition is effective for
`as long as the associated permanent write protection bit is not
`reprogrammed, i.e., reset. Id. at 3:31–37. We find no description in the
`Specification of the ’370 patent that allows a redefined command to revert
`back to its original meaning without clearing or resetting the bit that was set
`to redefine the command. We determine that, in the context of the
`Specification of the ’370 patent and under the Phillips standard of claim
`construction, the required redefinition must be such that all future executions
`of the redefined command will result in permanent write protection until the
`bit triggering the redefinition has been cleared or reset.4 It is not enough to
`meet the limitation if, after the redefinition, the redefined command still may
`function the way it used to function prior to the redefinition, i.e., providing
`temporary write protection.
`Furthermore, because the phrase at issue refers to “the command,” we
`need to identify the antecedent basis for it in each claim. That antecedent
`basis in each of independent claims 1, 12, and 25 is a command that write
`protects at least one part of a memory. Therefore, we additionally determine
`that the command, prior to its being redefined, already write protects a
`portion of the memory, just not permanently. Such an understanding is fully
`
`
`4 An example of such clearing is described in the Specification of the ’370
`patent. Ex. 1001, 3:32–37. In that example, the triggering bit is
`automatically cleared each time a SET_WRITE_PROTECT command is
`received, to provide the user an opportunity to set or not set the bit for that
`write protection command. Id.
`
`12
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`consistent with the Specification of the ’370 patent. Ex. 1001, 2:12–21;
`2:59–62.
`We further clarify that the “to allow” portion of the limitation
`“redefine the command to allow permanent write protection,” in the context
`of the Specification of the ’370 patent as discussed above, means the
`redefinition itself does not immediately cause permanent protection to occur
`but must wait for the redefined command to be executed. In other words,
`redefining the command “allow[s]” the command to always cause permanent
`write protection when it is executed, from that point onward. It does not
`mean that after redefinition of the write protect command, execution of the
`redefined command may, but does not have to, result in permanent write
`protection. This understanding follows from the Specification as discussed
`above and also is consistent with the construction Petitioner has proposed—
`cause a command that would not result in permanent write protection to
`result in permanent write protection.
`
`D. Alleged Unpatentability of Claims 1–3, 5,
`
`6, 12–15, and 25 as Anticipated by Chevallier
`Chevallier (Ex. 1003)
`1.
`Chevallier is directed to Flash memory and memory block protection.
`Ex. 1003 ¶ 2. Chevallier describes that memory blocks should be protected
`against unintended write operations and that one known method of
`protection uses locking of a memory block. Id. ¶ 6. Chevallier further
`describes that the use of a locking function still exposes the memory blocks
`to inadvertent or malicious corruption of data. Id. ¶ 7. Chevallier states that
`memory blocks may be inadvertently unlocked and erased or overwritten.
`
`13
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`Id. Chevallier further states that there is a need in the art to permanently
`lock memory blocks. Id.
`Chevallier provides, in addition to the locking function for a memory
`block, which is not permanent, a secure function to provide permanent
`memory block protection. Id. ¶ 8. Chevallier describes that its
`embodiments differentiate between a lock function which is temporary and a
`secure function which is permanent. Id. ¶ 16. Chevallier describes that its
`temporary lock function control can be cleared and the memory blocks
`erased, and that its permanent secure function cannot be cleared once it is
`set. Id. Chevallier explains that according to its method, the permanent
`secure function is an added level of security in addition to the temporary
`locking function, and that the secure function overrides the temporary
`locking function in that even if the locking function is not set, setting of the
`secure function would lock the corresponding memory. Id. ¶ 29. That
`arrangement is shown in Chevallier’s Figure 3, reproduced below:
`
`
`Figure 3 illustrates the locked or not locked status of a memory block based
`on application of the locking and/or secure functions. Id. ¶ 11.
`
`14
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`Two bus cycles are used to implement the secure function. Id. ¶ 17.
`
`In the first bus cycle, the secure command is written to a specific register as
`control input. Id. ¶ 19. In the second bus cycle, the identity of the memory
`block or memory blocks to be secured is included in a data word and written
`to a specific unused address. Id. ¶ 21.
`
`Chevallier describes that in one embodiment, the secure command is
`also the same command used for another function within the memory
`device, but that in that circumstance, the command would be written to a
`different register that is assigned to that different function. Id. ¶ 18. For
`example, Chevallier describes that in one embodiment, the secure command
`is the same as the locking command. Id. ¶¶ 8, 20.
`
`Chevallier further discloses an embodiment in which the manufacturer
`of the memory device can, when making the memory device, enable or not
`enable the secure function capability of the manufactured device, by setting
`a secure function bit in the device to a predetermined value. Id. ¶¶ 37–38.
`For instance, if a customer desires that function, then the manufacturer can
`enable that function for the devices sold to that customer, and if the
`customer does not desire the secure function, then the manufacturer of the
`device would not enable it. Id. ¶ 37. Chevallier further describes that
`“[d]isabling the [secure] function bit of the present invention is not typically
`available to a user of the memory device.” Id. ¶ 40. Chevallier explains that
`“[m]aking this function bit available for general use would negate the
`benefits of the security that it provides.” Id.
`Claims 1, 12, and 25
`2.
`Each of claims 1, 12, and 25 requires setting at least one bit in a data
`register “to indicate that permanent write protection for at least one part of
`
`15
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`the memory is allowed” and “to redefine the command to allow permanent
`write protection.” To meet this limitation, Petitioner relies on Chevallier’s
`disclosure of the setting of a secure function bit to enable the secure
`function, and Chevallier’s disclosure of an embodiment in which the secure
`command is the same as the lock command. Pet. 25 (citing Ex. 1003 ¶¶ 8,
`16, 20, 33, 36; Ex. 1006 ¶ 154). Specifically, Petitioner states: “Chevallier
`discloses that when the secure function bit is set, the ‘same’ command
`‘initiates the secure function’ which permanently secures ‘memory blocks
`specified in [a] control data word’ ‘against write and erase operations.’”
`Ex. 1003, ¶¶ 0008, 0033, 0036; Ex. 1006, ¶ 154.” Id.
`The explanation provided by Petitioner, however, is unpersuasive with
`respect to the requirements of “to redefine the command to allow permanent
`write protection” as we have construed and discussed above. Nothing in
`Chevallier as identified by Petitioner indicates that setting the secure
`function bit to some value changes the meaning of the write protect
`command in the sense that it can no longer be used to provide temporary
`write protection, and can be used thereafter, until the next redefinition,
`solely to provide permanent write protection. The secure function bit of
`Chevallier, identified by Petitioner, serves only to enable the secure function
`(Ex. 1003 ¶¶ 37, 38, 40) and is nowhere described in Chevallier as changing
`the meaning of the locking command such that it no longer can be used to
`cause write protection of a memory block temporarily.
`Indeed, with regard to Chevallier’s embodiment in which the secure
`command is the same as the locking command (Ex. 1003 ¶¶ 8, 20), the
`following description of Chevallier is instructive: “The secure command
`used in the present invention, in one embodiment, is also used for another
`
`16
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`function within the memory device. However, in such an embodiment, the
`command is written to a different register that is assigned to that particular
`function.” Ex. 1003 ¶ 18. Thus, in Chevallier it is the location in memory
`where the command is written into that determines the meaning of the
`command for that one instance of execution, and not the setting of the secure
`function bit. We agree with Patent Owner (Prelim. Resp. 23–24) that setting
`the secure function bit in Chevallier does not redefine a command that
`previously meant temporary write protection to mean, thereafter, permanent
`write protection (unless it is redefined again). Indeed, based on the
`description of Chevallier, even after setting of the secure function bit, the
`lock command still serves to lock, not secure, if it is written to the
`recognized location for the lock command. Id. ¶¶ 18, 29; Fig. 3. Thus, it
`cannot reasonably be said that setting of the secure function bit redefines the
`locking command to a secure command. Moreover, Chevallier specifically
`states that its permanent secure function is in addition to its temporary
`locking function. Id. ¶ 29.
`Petitioner also relies on claims 18 and 19 of Chevallier as disclosing
`the limitation of setting at least one bit in a data register to indicate that
`permanent write protection for at least one part of the memory is allowed,
`and “to redefine the command to allow permanent write protection.” Pet.
`25–26. Specifically, Petitioner asserts:
`
`Claims 18 and 19 of Chevallier disclose the “lock”
`command functioning as a “secure” command after enabling the
`secure function by the secure function bit. Ex. 1003, Claims 18–
`19; Ex. 1006, ¶ 155. In particular, Claim 18 recites “a plurality
`of lockable memory blocks” that are “temporarily lockable in
`response to a lock command.” Ex. 1003, Claim 18. Claim 18
`discloses the method involves “enabling a secure function,”
`
`17
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`
`which claim 19 discloses “is enabled by a non-volatile secure
`function bit.” Id., Claims 18–19. Claim 18 further discloses
`“submitting the lock command to the memory device to activate
`the secure function.” Id., Claim 18.
`Id. These claims, however, limitation of setting at least one bit in a data
`register to indicate that permanent write protection for at least one part of the
`memory is allowed, and “to redefine the command to allow permanent write
`protection.”
`
`These claims, however, are consistent with the disclosure of
`Chevallier discussed above, namely using the same command for the lock
`function and for the secure function even after the secure function is
`enabled. Claim 18 recites, “submitting the lock command to the memory
`device to activate the secure function” (emphasis added). Although claims
`18 and 19 disclose enabling the secure function, they do not disclose that the
`lock command no longer performs the lock function. As with the
`Chevallier’s embodiments discussed above, Petitioner does not adequately
`explain how claims 18 and 19 necessarily disclose redefining the lock
`command to always perform permanent write protection, as required to
`satisfy the limitation at hand. Rather, when read in the context of the whole
`reference, they disclose that the location in memory into which the
`command is written, and not the value of a secure function bit, is used to
`determine which function the command performs. Indeed, claim 18 recites
`that the lock command is submitted “to the memory device” to activate the
`secure function.
`For reasons discussed above, Petitioner has not shown a reasonable
`likelihood that it would prevail in establishing that any of claim 1, 12, and
`25 is anticipated by Chevallier.
`
`18
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`
`Claims 2, 3, 5, 6, and 13–15
`3.
`Each of claims 2, 3, and 5 depends from claim 1, and claim 6 depends
`from claim 5. Thus, claims 2, 3, 5, and 6 all incorporate the limitations from
`claim 1. Petitioner’s discussions of claims 2, 3, 5, and 6, however, do not
`relate to and do not cure the deficiency of the Petition as discussed above
`with respect to claim 1. Thus, Petitioner has not shown a reasonable
`likelihood that it would prevail in establishing that any of claims 2, 3, 5, and
`6 is anticipated by Chevallier.
` Claim 13 depends from claim 12; claim 14 depends from claim 13;
`and claim 15 depends from claim 14. Thus, claims 13, 14, and 15 all
`incorporate the limitations from claim 12. Petitioner’s discussions of claims
`13–15, however, do not relate to and do not cure the deficiency of the
`Petition as discussed above with respect to claim 12. Thus, Petitioner has
`not shown a reasonable likelihood that it would prevail in establishing that
`any of claims 13–15 is anticipated by Chevallier.
`
`E. Alleged Unpatentability of Claims 1–3, 5,
`
`6, 12–15, and 25 as Obvious over Chevallier
`Claims 1, 12, and 25
`1.
`Noting that anticipation is the epitome of obviousness, Petitioner
`
`asserts that because claims 1, 12, and 25 are anticipated by Chevallier, they
`would have been rendered obvious by Chevallier. Pet. 41. Thus,
`Petitioner’s assertion of obviousness on this rationale is no better than its
`assertion of anticipation by Chevallier. We already determined above that
`Petitioner has not shown a reasonable likelihood that it would prevail in
`establishing that Chevallier anticipates any one of claims 1, 12, and 15.
`
`
`
`19
`
`

`

`IPR2019-00638
`Patent 7,827,370 B2
`
`
`
`Alternatively, Petitioner argues:
`
`To the extent that Chevallier does not explicitly recite that
`the “secure function bit” is set in order to “redefine” the lock
`command to become the (permanent) secure command, as
`recited in Claims 1, 12, and 25, it would be obvious to use the bit
`in that manner, for example, to eliminate any ambiguity as to
`whether the command meant “lock” or “secure.” Ex. 1006,
`¶¶ 259, 270, 276.
`Id. at 41–42. The argument is unpersuasive for reasons explained below.
`
`Petitioner does not affirmatively take the position that one with
`ordinary skill in the art would have found ambiguity in Chevallier’s
`embodiment in which the same command is used both for “locking

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket