throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`_________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_________________
`
`MICROSOFT CORPORATION,
`Petitioner,
`
`v.
`
`UNILOC 2017 LLC,
`Patent Owner.
`
`IPR2020-00101
`U.S. Patent No.: 8,495,359
`Issued: July 23, 2013
`Application No.: 12/792,249
`Filed: June 2, 2010
`
`Title: SYSTEM AND METHOD FOR
`SECURING AN ELECTRONIC COMMUNICATION
`_________________
`
`
`PETITION FOR
`INTER PARTES REVIEW OF U.S. PATENT NO. 8,495,359
`
`
`
`

`

`TABLE OF CONTENTS
`
`IPR2020-00101
`Patent 8,495,359
`
`Page(s)
`
`LIST OF EXHIBITS .................................................................................................. v
`
`MANDATORY NOTICES UNDER 37 C.F.R. § 42.8 ........................................... vi
`
`1.
`
`2.
`
`3.
`
`Real Party-In-Interest ................................................................ vi
`
`Related Matters ......................................................................... vi
`
`Lead And Back-Up Counsel, And Service Information ........... vi
`
`I.
`
`INTRODUCTION ........................................................................................... 1
`
`II. GROUNDS FOR STANDING PER SECTION 42.104(A) ............................ 2
`
`III.
`
`IDENTIFICATION OF CHALLENGE .......................................................... 2
`
`A.
`
`Statement Of The Precise Relief Requested / Statutory Grounds ......... 2
`
`B.
`
`The Board Should Not Use Its Discretion To Deny This Petition ........ 3
`
`IV. THE ’359 PATENT ......................................................................................... 7
`
`V.
`
`LEVEL OF SKILL IN THE ART, AND STATE OF THE ART ................... 9
`
`VI. CLAIM CONSTRUCTION ............................................................................ 9
`
`VII. GROUND 1: CLAIMS 1-15 ARE UNPATENTABLE
`AS OBVIOUS OVER OLKIN IN VIEW OF KIM ......................................10
`
`A. Olkin ....................................................................................................11
`
`B. Kim ......................................................................................................11
`
`C.
`
`Rationale And Motivation To Combine Olkin With Kim ..................11
`
`D.
`
`Independent Claims 1 And 6 ...............................................................14
`
`E.
`
`Dependent Claims 2-5, 7-10................................................................29
`
`1.
`
`Claims 2 And 7 .........................................................................29
`
`Page ii
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`2.
`
`3.
`
`4.
`
`5.
`
`Claims 3 And 9 .........................................................................30
`
`Claims 4 And 10 .......................................................................31
`
`Claim 5 ......................................................................................32
`
`Claim 8 ......................................................................................32
`
`F.
`
`Independent Claim 11 .........................................................................32
`
`G. Dependent Claims 12-15 .....................................................................38
`
`1.
`
`2.
`
`3.
`
`4.
`
`Claim 12 ....................................................................................38
`
`Claim 13 ....................................................................................39
`
`Claim 14 ....................................................................................39
`
`Claim 15 ....................................................................................39
`
`VIII. NO OBJECTIVE INDICIA OF NON-OBVIOUSNESS ..............................40
`
`IX. CONCLUSION ..............................................................................................40
`
`CERTIFICATE OF COMPLIANCE .......................................................................42
`
`
`
`
`
`Page iii
`
`

`

`TABLE OF AUTHORITIES
`
`IPR2020-00101
`Patent 8,495,359
`
`Page(s)
`
`Cases
`
`Nidec Motor Corp. v. Zhongshan Borad Ocean Motor Co.,
`868 F.3d 1013 (Fed. Cir. 2017) .............................................................................. 9
`
`O2 Micro Int’l Ltd. v. Beyond Innovation Tech. Co.,
`521 F.3d 1351 (Fed. Cir. 2008) ............................................................................10
`
` Board Decisions
`
`Aurobindo Pharma USA, Inc. v. Andrx Corp. et al.,
`IPR2017-01648, Paper 34 (PTAB Dec. 28, 2018) ................................................. 9
`
`General Plastic Industrial Co., Ltd. v. Canon Kabushiki Kaisha,
`IPR2016-01357, Paper 19 (PTAB Sept. 6, 2017) ..............................................3, 5
`
`Statutes
`
`35 U.S.C. § 102 ................................................................................................. 10, 11
`
`35 U.S.C. § 103 .......................................................................................................... 2
`
`35 U.S.C. § 314 .......................................................................................................... 3
`
`35 U.S.C. § 316 ......................................................................................................4, 6
`
`35 U.S.C. § 325 .......................................................................................................... 6
`
`Other Authorities
`
`H.R. Rep. No. 112-98, pt. 1, at 40 (2011) .................................................................. 5
`
`Rules
`
`37 C.F.R § 42.104 ...................................................................................................... 2
`
`37 C.F.R. § 42.15 ....................................................................................................... 2
`
`
`
`
`
`Page iv
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`LIST OF EXHIBITS
`
`No.
`
`Description
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
` U.S. Patent No. 8,495,359 (“the ’359 Patent”)
`
` File History of U.S. Patent No. 8,495,359
`
` U.S. Patent No. 7,376,835 (“Olkin”)
`
` U.S. Patent Publication No. 2009/0055648 A1 (“Kim”)
`
` J. Klensin, Simple Mail Transfer Protocol, IETF Request for
`Comments No. 5321 (October 2008) (“RFC5321”)
`
` David C. Plummer, An Ethernet Address Resolution Protocol,
`IETF Request for Comments No.826 (November 1982)
`(“RFC826”)
`
` Excerpts of Dictionary of Information Security, 2006
`
` Declaration of Henry Houh, dated October 31, 2019 (“Houh
`Decl.”)
`
` Uniloc 2017 LLC v. Microsoft Corporation, SACV 18-02053
`(Lead Case) Stay Order (August 9, 2019)
`
`
`
`
`
`
`
`Page v
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`MANDATORY NOTICES UNDER 37 C.F.R. § 42.8
`
`1.
`
`Real Party-In-Interest
`
`Microsoft Corporation is the sole real party-in-interest.
`
`
`
`2.
`
`Related Matters
`
`The ’359 Patent (Ex. 1001) is asserted in the following litigations:
`
`•
`
`Uniloc 2017 LLC v. Microsoft Corporation, 8:19-cv-00783 (C.D. Cal.),
`
`filed April 29, 2019.
`
`3.
`
`Lead And Back-Up Counsel, And Service Information
`
`Lead Counsel
`Todd M. Siegel, Reg. No. 73,232
`todd.siegel@klarquist.com
`
`Back-up Counsel
`(First Back-Up)
`Andrew M. Mason, Reg. No. 64,034
`andrew.mason@klarquist.com
`
`Robert F. Scotti, Reg. No. 39,830
`robert.scotti@klarquist.com
`
`Joseph T. Jakubek, Reg. No. 34,190
`joseph.jakubek@klarquist.com
`KLARQUIST SPARKMAN, LLP
`121 SW Salmon Street, Suite 1600
`Portland, Oregon, 97204
`503-595-5300 (phone)
`503-595-5301 (fax)
`
`Petitioner consents to service via email at the above email addresses.
`
`Pursuant to 37 C.F.R. § 42.10(b), concurrently filed with this Petition is a
`
`Power of Attorney executed by Petitioner and appointing the above counsel.
`
`
`
`Page vi
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`Microsoft Corporation (“Petitioner”) respectfully requests inter partes review
`
`(“IPR”) of claims 1-15 of U.S. Patent No. 8,495,359 (“’359 patent”) (Ex. 1001),
`
`allegedly assigned to Uniloc 2017 LLC (“Patent Owner”). For the reasons set forth
`
`below, these claims should be found unpatentable and cancelled.
`
`I.
`
`INTRODUCTION
`
`The ’359 patent is directed at securing communication between two
`
`computing devices. In between the two computing devices is a gateway server
`
`configured to receive and store information about the first computing device,
`
`including a device identifier. The gateway server also receives information from the
`
`second computing device, including an encryption key request. The gateway server
`
`purports to derive an encryption key from the device identifier for the first computing
`
`device, and then sends the key to the second computing device. Finally, the gateway
`
`server confirms to the first computing device that the key was requested by and sent
`
`to the second computing device.
`
`Such subject matter was well known in the prior art. For example, the prior
`
`art references relied on herein, the combinations of secure communication U.S.
`
`Patent No. 7,376,835 (“Olkin”) with U.S. Patent Application Publication No.
`
`2009/0055648 (“Kim”), disclosed each of the limitations of the ’359 patent
`
`rendering the claims unpatentable as obvious.
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 1
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`II. GROUNDS FOR STANDING PER SECTION 42.104(A)
`
`Petitioner certifies that the ’359 patent is available for IPR and that Petitioner
`
`is not barred or estopped from requesting an IPR challenging the patent claims on
`
`the grounds identified in this petition.
`
`III.
`
`IDENTIFICATION OF CHALLENGE
`
`A.
`
`Statement Of The Precise Relief Requested / Statutory Grounds
`
`Petitioner requests inter partes review of claims 1-15 (the “Challenged
`
`Claims”) of the ’359 Patent, on the following statutory grounds:
`
`
`
`Reference(s)
`
`Basis
`
`Claims
`
`Ground 1 U.S. Patent No. 7,376,835 (“Olkin”)
`in view of U.S. Patent Application
`Publication No. US 2009/0055648
`A1 (“Kim”)
`
`35 U.S.C. § 103
`
`1-15
`
`In Section VII below, the petition presents evidence of unpatentability and
`
`establishes a reasonable likelihood that the Petitioner will prevail in establishing that
`
`each Challenged Claim is unpatentable.
`
`With the filing of this petition an electronic payment of $30,500 is being
`
`charged to deposit account no. 02-4550. 37 C.F.R. § 42.15(a). Any fee adjustments
`
`may be debited/credited to the deposit account.
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 2
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`B.
`
`The Board Should Not Use Its Discretion To Deny This Petition
`
`This is the first petition challenging a claim of the ’359 patent. Nothing
`
`warrants discretionary denial under 35 U.S.C. § 314(a). As explained in the
`
`following paragraphs, none of the factors in General Plastic Industrial Co., Ltd. v.
`
`Canon Kabushiki Kaisha warrant discretionary denial of institution. See IPR2016-
`
`01357 (Paper 19) at 9-10 (Sept. 6, 2017) (precedential, in pertinent part) [hereinafter
`
`“General Plastic”]. The factors are as follows:
`
`1. whether the same petitioner previously filed a petition
`
`directed to the same claims of the same patent;
`
`2. whether at the time of filing of the first petition the
`
`petitioner knew of the prior art asserted in the second
`
`petition or should have known of it;
`
`3. whether at the time of filing of the second petition the
`
`petitioner already
`
`received
`
`the patent owner’s
`
`preliminary response to the first petition or received the
`
`Board’s decision on whether to institute review in the
`
`first petition;
`
`4. the length of time that elapsed between the time the
`
`petitioner learned of the prior art asserted in the second
`
`petition and the filing of the second petition;
`
`5. whether the petitioner provides adequate explanation
`
`for the time elapsed between the filings of multiple
`
`petitions directed to the same claims of the same patent;
`
`6. the finite resources of the Board; and
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 3
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`7. the requirement under 35 U.S.C. § 316(a)(11) to issue a
`
`final determination not later than 1 year after the date on
`
`which the Director notices institution of review.
`
`Id.
`
`Factor 1: This is the first petition filed by Petitioner directed to claims of
`
`the ’359 patent, and Petitioner is unaware of any other party filing a petition
`
`challenging any claim of the ’359 patent. Indeed, Petitioner is unaware of any other
`
`party being served with a complaint alleging infringement of the ’359 patent. The
`
`parallel district court litigation is in its relative infancy, with trial not scheduled until
`
`June 2021.
`
`Factors 2-5: This is the first petition challenging the ’359 patent and these
`
`factors thus counsel against discretionary denial. Petitioner is filing this Petition
`
`approximately six months from being first served with the complaint asserting
`
`infringement of the ’359 patent.
`
`Factor 6: This is the first petition challenging the ’359 patent, and thus
`
`warrants use of the Board’s finite resources. The parallel district court litigation is
`
`in its relative infancy, with trial not scheduled until June 20211.
`
`
`1 Petitioner notes that, in the district court litigation, Petitioner asserts that it is
`licensed to the ’359 patent, and Patent Owner asserts that Petitioner is not licensed.
`Petitioner does not expect the district court to resolve that issue until after
`Petitioner’s one-year bar passes for filing this Petition.
`
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 4
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`Moreover, this Petition is especially worthy of the Board’s time as, at the time
`
`of this filing, the district court has been presented with adjudication of 18 different
`
`patents asserted by Patent Owner against Petitioner.2 That sheer volume of patents
`
`makes IPR particularly important to furthering the Congressional goal of
`
`“improv[ing] patent quality and limit[ing] unnecessary and counterproductive
`
`litigation costs.” H.R. Rep. No. 112-98, pt. 1, at 40 (2011) (cited by General Plastic
`
`at 16); see also General Plastic at 16–17 (recognizing “that an objective of the AIA
`
`is to provide an effective and efficient alternative to district court litigation” and that
`
`the goals of the AIA include “mak[ing] the patent system more efficient by the use
`
`of post-grant review procedures”).
`
`The Board and district court resources consumed by the Uniloc assertion
`
`campaign, including the ’359 patent, are unnecessarily multiplied by Patent Owner’s
`
`strategic choice to assert over 100 patents against numerous defendants in a drawn-
`
`out fashion over the course of years. While Petitioner respects greatly the finite
`
`resources of the Board, the Board’s efficiency and expertise in evaluating
`
`unpatentability is perhaps of no greater importance than in response to litigation
`
`campaigns such as the one now waged by Uniloc.
`
`
`2 The district court has stayed litigation on the first eleven patents to be asserted,
`pending resolution of IPR petitions filed by Petitioner. Ex. 1009 (finding
`“simplification of the issues [weighs] at least slightly in favor of a stay”).
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 5
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`Factor 7: the requirement under 35 U.S.C. § 316(a)(11) to issue a final
`
`determination not later than 1 year after the date on which the Director notices
`
`institution of review
`
`Petitioner is unaware of any facts that would compromise the Board’s ability
`
`to comply with 35 U.S.C. § 316(a)(11) and, thus, this factor counsels against
`
`discretionary denial.
`
`Furthermore, neither “the same [n]or substantially the same prior art or
`
`arguments previously were presented to the Office.” 35 U.S.C. § 325(d). Neither
`
`prior art reference Olkin, nor prior art reference Kim, was cited or discussed during
`
`prosecution. Additionally, none of these prior art references is referenced in the ’359
`
`patent. The combination of Olkin and Kim provides express teachings of the
`
`limitations of the Challenged Claims. In particular, as discussed further below, the
`
`claim limitations that the Examiner did not find in the prior art – “[confirming] to
`
`the first computing device that the encryption key was requested by the second
`
`computing device,” and that the “device identifier is generated by the first computing
`
`device from a combination of user-configurable and non-user-configurable
`
`parameters of the first computing device” – are disclosed by the Olkin and Kim prior
`
`art references discussed herein. As the teachings of Olkin in view of Kim were not
`
`considered by the Examiner, this petition should not be denied under § 325(d).
`
`
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 6
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`IV. THE ’359 PATENT
`
`The ’359 patent, titled “System And Method For Securing An Electronic
`
`Communication” issued on July 23, 2013. Ex. 1001. The ’359 Patent issued from
`
`U.S. Patent Application No. 12/792,249 (the “’249 Application”), filed on June 2,
`
`2010, and claims priority to a provisional application (No. 61/219,062) filed on June
`
`22, 2009.
`
`During prosecution, the Examiner rejected the 20 claims then pending as
`
`being unpatentable as obvious over Saito (US 2003/0070067 A1) in view of
`
`McGrew (US 2010/0034207 A1). The Applicant responded by arguing that the prior
`
`art relied on “does not teach that the session key is derived from a device identifier
`
`of the recipient computer, as recited in claim 1.” Ex. 1002, 104/1171. Specifically,
`
`the Applicant distinguished the prior art because although it disclosed using an
`
`identifier to generate an encryption key, it did not teach using an identifier that “is
`
`uniquely associated with a particular computing device.” Id., 105/1171 (emphasis
`
`in original).
`
`The Examiner subsequently entered a new rejection relying on a different
`
`secondary reference, Kudou (US 2007/0005974 A1) in combination with Saito. Id.,
`
`64/1171. The Applicant responded by amending two of the then pending
`
`independent claims (1 and 7) to explicitly recite the following newly added
`
`limitation: “and confirm[ing] to the first computing device that the encryption key
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 7
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`was sent to the second computing device.” Id., 41-42/1171. The Applicant also
`
`amended independent claim 12 to explicitly recite the following newly added
`
`limitation: “the device identifier generated from a combination of user-configurable
`
`and non-user-configurable machine parameters of the recipient computing device.”
`
`Id., 43/1171.
`
`With respect to the “confirming” step limitation added to claims 1 and 7, the
`
`Applicant argued that the “confirming” step is a non-trivial distinction over the prior
`
`art in that it provides “an independent verification step for authenticating the
`
`communication.” Id., 46/1171. Regarding the amendment to claim 12, the Applicant
`
`argued that the “[u]ser configurable machine parameters [] provide the user of the
`
`recipient computer device with greater flexibility, i.e. the ability to customize or
`
`change the unique device identifier without having to change out internal hardware
`
`components of his computing device.” Id., 48/1171. The Applicant also added two
`
`new claims (21 and 22) that added both of the confirming step and user configurable
`
`and non-user-configurable machine parameter limitations. Id., 49-50/1171. The
`
`Examiner responded by requesting that the Applicant amend the independent claims
`
`to include both of these limitations and to cancel claims 21 and 22. The Applicant
`
`agreed to so amend independent claims 1 and 7, and canceled claims 16-22. The
`
`’359 patent then issued.
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 8
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`V. LEVEL OF SKILL IN THE ART, AND STATE OF THE ART
`
`The person having ordinary skill in the art in June 2009 (“PHOSITA”) would
`
`have a bachelor’s degree in computer science, electrical and/or computer
`
`engineering, or equivalent training, and two years of experience in computer
`
`networking and information security. Additional experience may substitute for
`
`education, and addition education may substitute for experience. Declaration of
`
`Henry Houh (Ex. 1008), ¶ 43.
`
`VI. CLAIM CONSTRUCTION
`
`For this IPR, Petitioner applies the plain and ordinary meaning to a PHOSITA
`
`of all claim terms and contends that no claim terms require specific construction to
`
`resolve the unpatentability issues presented herein. See, e.g., Aurobindo Pharma
`
`USA, Inc. v. Andrx Corp. et al., IPR2017-01648, Paper 34 at 11 (PTAB Dec. 28,
`
`2018) (“We address the construction of only certain claim terms raised by the parties,
`
`and we do so only to the extent necessary to determine whether Petitioner has
`
`demonstrated unpatentability by a preponderance of the evidence.”) (citing Nidec
`
`Motor Corp. v. Zhongshan Borad Ocean Motor Co., 868 F.3d 1013, 1017 (Fed. Cir.
`
`2017)). Indeed, Petitioner contends that in view of the Board’s expertise in patent
`
`law and technology, that the ’359 patent recites claims that do not require proposed
`
`constructions that differ from the claim language in order for the Board to compare
`
`the prior art to the claims.
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 9
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`On the other hand, construction of certain claim terms may be relevant to
`
`issues in the parallel district court litigation, e.g., as part of resolving non-
`
`infringement disputes or to “clarify and when necessary to explain” terms for
`
`“determination of infringement” by the factfinder; i.e., judges and juries who are not
`
`as familiar with patent law and technology as the Board. O2 Micro Int’l Ltd. v.
`
`Beyond Innovation Tech. Co., 521 F.3d 1351, 1362 (Fed. Cir. 2008) (citation
`
`omitted). Therefore, Petitioner does not waive its right to raise additional issues of
`
`claim construction in any proceeding, nor does it waive any argument in any
`
`proceeding that claim terms are indefinite. Petitioner intends to advise the Board of
`
`pertinent claim construction positions taken in district court filings, although it does
`
`not intend to file every exchange related to the district court claim construction
`
`process.
`
`VII. GROUND 1: CLAIMS 1-15 ARE UNPATENTABLE
`AS OBVIOUS OVER OLKIN IN VIEW OF KIM
`
`As explained below, claims 1-15 are unpatentable as obvious over U.S. Patent
`
`No. 7,376,835 (“Olkin”) in view of U.S. Patent Application Publication No. US
`
`2009/0055648 A1 (“Kim”). Ex. 1008, ¶¶ 45-93.
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 10
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`A. Olkin
`
`Olkin, titled “Implementing Nonrepudiation And Audit Using Authentication
`
`Assertions And Key Servers,” issued on May 20, 2008, thus qualifying as prior art
`
`to the ’359 patent under at least 35 U.S.C. §§ 102(a), (b). Ex. 1003.
`
`B. Kim
`
`Kim, titled “Method Of And Apparatus For Sharing Secret Information
`
`Between Device In Home Network,” published on February 26, 2009. Ex. 1004.
`
`Since Kim published prior to the earliest possible effective filing date of the ’359
`
`patent, Kim qualifies as prior art under at least pre-AIA 35 U.S.C. § 102(a). Kim
`
`also qualifies as prior art under pre-AIA 35 U.S.C. § 102(e) as it claims priority to
`
`U.S. Patent Application No. 12/194,079, filed August 19, 2008, and Korean Patent
`
`Application No. 10-2007-0083494, filed August 20, 2007, and ultimately issued as
`
`U.S. Patent No. 9,094,192.
`
`C. Rationale And Motivation To Combine Olkin With Kim
`
`As discussed below and herein there was a motivation to combine Olkin and
`
`Kim as well as a reasonable expectation of success in implementing the claimed
`
`invention with the combination of Olkin and Kim. For at least the following reasons,
`
`Olkin and Kim would have been a natural combination to a PHOSITA before June
`
`22, 2009. Ex. 1008, ¶¶ 49-53.
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 11
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`Each of Olkin and Kim is generally directed at improved security methods of
`
`electronic communications and messages between nodes on a network. Id., ¶ 50.
`
`More specifically, Olkin discusses existing systems for securing electronic
`
`communications, including a key server distinct from the senders and receivers, for
`
`communications such as e-mail, instant messaging, video-conferencing, secure real-
`
`time document editing, and other collaborative applications. Ex. 1003, 21:27-43.
`
`Olkin defines a key server to be “[a] network server that holds protection keys and
`
`releases them to authorized users.” Id., 21:57-58. Olkin describes the key server to
`
`be “used much more generally to build and deploy a variety of solutions that address
`
`the problem of secure communication” (id., 21:28-31) and that “[b]y using key
`
`servers, organizations can satisfy the most stringent security requirements while
`
`enabling their constituents to freely and easily collaborate via a rich set of techniques
`
`and media.” Id., 21:39-43.
`
`Olkin’s key server creates conversation keys or receives conversation keys
`
`from source participants, stores keys, and releases keys to collaboration participants
`
`after participants have been authenticated and authorized. Id., 22:37-49, 22:57-59,
`
`26:63-27:6; Ex. 1008, ¶ 50. The conversation keys are stored with a unique
`
`ID/resource ID so that the key server can retrieve specific conversation keys for use
`
`in decryption by the recipient which uses the unique ID to request a conversation
`
`key. Ex. 1003, 22:62-23:8, 26:63-27:6. Thus, collaboration participants who can
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 12
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`prove their authenticity at a sufficiently strong level can engage in the collaboration.
`
`Id., 26:12-15; Ex. 1008, ¶ 50.
`
`Olkin explains that its conversation key approach improves on other security
`
`technologies, such as session keys. Ex. 1003, 25:63-26:4, 26:27-37; Ex. 1008, ¶ 50.
`
`Olkin further explains that collaboration technology that uses public key
`
`infrastructure (PKI) can be inefficient and rigid, thus teaching that using PKI
`
`certificates is not required. Id., 26:6-13. Olkin does not explicitly disclose how its
`
`conversation keys are created, or what inputs are used to create them. Ex. 1008, ¶
`
`51. In order to understand the capabilities and strength of the Olkin system vis-à-vis
`
`systems using other security technologies, a PHOSITA, however, would want to
`
`know how these keys are created. Id. A PHOSITA would naturally look to Kim,
`
`which discloses a method of generating keys (e.g., public keys and private keys) in
`
`order to encrypt and decrypt communications. Ex. 1004, ¶ 0028, 0034; Ex. 1008, ¶¶
`
`51-52.
`
`Kim discloses sharing secret information between networked devices. Ex.
`
`1004, Abstract. The “devices generate keys based on personal information input by
`
`a user according to an identity based encryption (IBE) scheme.” ¶ 0023. Kim
`
`discloses that “seed information,” comprising of a device’s master key, IBE
`
`parameters, and identification parameters of the device, and along with a user’s
`
`credentials (i.e., a user’s personal information, and/or a user’s password), are used
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 13
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`to generate both public and secret (private) keys. Ex. 1004, Abstract, ¶¶ 0024, 0025,
`
`0028, 0031, 0033-0035, Figs. 2-3; Ex. 1008, ¶ 51. Thus, a PHOSITA would have
`
`looked to Kim for a key generation method and would have understood that Kim’s
`
`method could be used on any network nodes regardless of location. Ex. 1008, ¶ 51.
`
`Kim further discloses that a Private Key Generator is used to generate a secret
`
`(private) key for decrypting a message encrypted with the public key (Ex. 1004, ¶
`
`0025) and that the PKG can be embedded in a first device or located at a trusted third
`
`party. Ex. 1004, ¶¶ 0025, 0035; Ex. 1008, ¶ 52.
`
`A PHOSITA implementing Olkin would naturally look to Kim to understand
`
`a method of secure transmission, including the details of how the encryption keys
`
`are generated. Ex. 1008, ¶ 53. The technologies described by each of Olkin and Kim
`
`are predictable to a PHOSITA; thus, a PHOSITA would have a reasonable
`
`expectation of success to combine their teachings. Id.
`
`D.
`
`Independent Claims 1 And 6
`
`Independent claim 1 of the ’359 patent is a system claim, while independent
`
`claim 6 is a method claim. As can be seen below, the limitations of these claims have
`
`similar substantive features, each of which is compared to the Olkin + Kim prior art
`
`combination as follows.
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 14
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`[1.1] A system for securing an electronic communication, the system
`comprising:
`
`[6.1] A method of securing an electronic communication, the method
`comprising:
`
`Olkin satisfies the preambles of claims 1 and 6. Ex. 1008, ¶¶ 55-56. Indeed, it
`
`discloses a communication system that performs methods of securely transmitting
`
`electronic messages. For example, Olkin recites that “[t]he present invention relates
`
`generally to providing security for messages communicated in networks.” Ex. 1003,
`
`1:18-19. Additionally, as shown by FIG. 11, Olkin discloses a system having a
`
`similar structure for securing electronic communication as that disclosed in the ’359
`
`patent.
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 15
`
`
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`The components of Olkin serve the same roles as the components disclosed in
`
`the ’359 patent as set forth by the following table:
`
`Olkin Component
`
`Comparable ’359 Patent Component
`
`Originator 314
`
`Second computing device 103 (sending computer)
`
`Recipient 316
`
`First computing device 101 (receiving computer)
`
`Key Server 320
`
`Gateway server 107
`
`Database 332
`
`Database 109
`
`Ex. 1008, ¶ 56.
`
`[1.2] a gateway server configured to: receive and store a device identifier and a
`network address from a first computing device, wherein the device identifier is
`generated by the first computing device from a combination of user-
`configurable and non-user-configurable parameters of the first computing
`device and uniquely identifies the first computing device, and wherein the
`network address is associated with the first computing device;
`
`[6.2] receiving and storing at a gateway server store a device identifier and a
`network address from a first computing device, wherein the device identifier is
`generated by the first computing device from a combination of user-
`configurable and non-user-configurable parameters of the first computing
`device and uniquely identifies the first computing device, and wherein the
`network address is associated with the first computing device;
`
`Olkin in combination with Kim satisfies limitations [1.2] and [6.2]. Ex. 1008,
`
`¶¶ 57-62.
`
`First, Olkin discloses a key server (gateway server) that is configured to
`
`receive and store information pertaining to secure communications between its
`
`recipient device (first computing device) and originator device (second computing
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 16
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`device). Ex. 1008, ¶ 57. Olkin teaches that its originator device “has data for a
`
`communication 324 that it wants to sent [sic] to one or more recipients 316.” Ex.
`
`1003, 26:56-57. Olkin’s key server is configured to store an identifier (resource ID)
`
`in the database. Id., 27:3-6. The identifier (resource ID) is associated with a
`
`communication between the originator device and a recipient device. Id., 26:63-67.
`
`Second, Olkin discloses various types of information stored in the key server’s
`
`database by registered senders and receivers, including user ID, password, and email
`
`addresses (network addresses)3. Ex. 1003, Fig. 5, 13:40-53, 14:8-10; Ex. 1008, ¶ 57.
`
`
`3 The ’359 patent teaches that an email address is a network address. Ex. 1001, 3:27-
`28, 8:65-66.
`
`Petition for Inter Partes Review of USP 8,495,359
`
`Page 17
`
`

`

`IPR2020-00101
`Patent 8,495,359
`
`
`
`Although FIG. 5 is expressly discussed in the context of the embodiment
`
`disclosed in FIG. 1 (including the security server), a PHOSITA would understand
`
`that the database associated with the key server would contain the same type of data
`
`as stored in the database, including information received from the recipient (first
`
`computing device). Ex. 1008, ¶ 58.
`
`Third, Olkin does not explicitly disclose a device identifier gener

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket