throbber
IPR2020-01218
`U.S. Patent 8,095,990
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`
`SONY INTERACTIVE ENTERTAINMENT LLC
`Petitioner
`
`v.
`
`BOT M8 LLC
`Patent Owner
`____________
`
`
`Case No. IPR2020-01218
`U.S. Patent No. 8,095,990
`____________
`
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 8,095,990
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`TABLE OF CONTENTS
`
`INTRODUCTION ...................................................................................... 1
`I.
`SUMMARY OF THE ’990 PATENT ........................................................ 1
`II.
`A. DESCRIPTION OF THE ALLEGED INVENTION OF THE ’990 PATENT .................... 1
`B. SUMMARY OF THE PROSECUTION OF THE ’990 PATENT ................................... 2
`C. LEVEL OF SKILL OF A PERSON HAVING ORDINARY SKILL IN THE ART ............... 2
`III. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R.
`§42.104 ................................................................................................................... 3
`A. GROUNDS FOR STANDING UNDER 37 C.F.R. §42.104(A) ................................. 3
`B. IDENTIFICATION OF CHALLENGE UNDER 37 C.F.R. §42.104(B) AND RELIEF
`REQUESTED ......................................................................................................... 3
`C. CLAIM CONSTRUCTION UNDER 37 C.F.R. §42.104(B)(3) ................................ 4
`IS A REASONABLE LIKELIHOOD THAT THE
`IV. THERE
`CHALLENGED CLAIMS OF THE ’990 PATENT ARE UNPATENTABLE . 5
`A. GROUND 1: GAZDIC/RYAN ALONE OR IN VIEW OF DIAMANT RENDERS CLAIMS 1,
`5, AND 9 OBVIOUS. ............................................................................................... 5
`B. GROUND 2: GAZDIC/RYAN IN VIEW OF DIAMANT AND ALCORN RENDERS CLAIMS
`4, 8, 9 AND 10 OBVIOUS. .....................................................................................40
`C. GROUND 3: GAZDIC/RYAN IN VIEW OF DIAMANT, ALCORN, AND GATTO RENDERS
`CLAIMS 2-3 AND 6-7 OBVIOUS. ...........................................................................47
`D. GROUND 4: TAKEDA IN VIEW OF DIAMANT RENDERS CLAIMS 1, 5, AND 9
`OBVIOUS. ............................................................................................................49
`E. GROUND 5: TAKEDA IN VIEW OF DIAMANT AND ALCORN RENDERS CLAIMS 4, 8,
`9 AND 10 OBVIOUS. .............................................................................................75
`F. GROUND 6: TAKEDA IN VIEW OF DIAMANT, ALCORN, AND GATTO RENDERS
`CLAIMS 2-3 AND 6-7 OBVIOUS ............................................................................79
`V. CONCLUSION ......................................................................................... 80
`VI. MANDATORY NOTICES UNDER 37 C.F.R. §42.8(A)(1) .................... 81
`A. REAL PARTY-IN-INTEREST ...........................................................................81
`B. RELATED MATTERS .....................................................................................81
`C. LEAD AND BACK-UP COUNSEL ....................................................................82
`
`
`
`
`
`
`
`

`

`I.
`
`INTRODUCTION
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`Petitioner Sony Interactive Entertainment LLC requests Inter Partes Review
`
`(“IPR”) of Claims 1-10 of U.S. Patent No. 8,095,990 (the “’990 Patent”). ’990
`
`Patent (Ex. 1001).
`
`II. SUMMARY OF THE ’990 PATENT
`A. Description of the alleged invention of the ’990 Patent
`The ’990 Patent describes a “gaming machine” that can “authenticate and load
`
`gaming information stored in a portable storage medium.” ’990 Patent, 1:18-23. To
`
`do this, it proposes using various “authentication” programs to verify the integrity
`
`of the data, such as highlighted in Figure 1 below:
`
`
`
`Id., Fig. 1.
`
`
`
` 1
`
`

`

`Summary of the prosecution of the ’990 Patent
`
`B.
`The application that issued as the ’990 Patent was filed on April 19, 2006, and
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`claims priority to two Japanese Applications, both filed on April 25, 2005.1 Id.
`
`Following multiple rejections, Applicant amended the claims to add the
`
`following limitation: “a removable storage medium storing therein gaming
`
`information including a mutual authentication program.” Ex. 1002 (8/23/11 Claim
`
`Amendment) at 410. The patent then issued. Id. at 423.
`
`C. Level of skill of a person having ordinary skill in the art
`A person having ordinary skill in the art (“PHOSITA”) in April 2005 would
`
`have the equivalent of at least an undergraduate degree in computer science,
`
`computer engineering, electrical engineering, or a similar technical field, and with
`
`one or more years of work experience in the field of computer hardware and/or
`
`software authentication or verification. Additional education may substitute for less
`
`work experience and vice versa. See Ex. 1003, Declaration of Andrew Wolfe (“Wolfe
`
`Decl.”), ¶¶46-48.
`
`
`1 For purposes of this Petition only, Petitioner does not contest this priority claim.
`
`
`
` 2
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`III.
`
`REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37
`C.F.R. §42.104
`A. Grounds for standing under 37 C.F.R. §42.104(a)
`Petitioner certifies that the ’990 Patent is available for IPR and that the
`
`Petitioner is not barred or estopped from challenging the claims of the ’990 Patent.
`
`B.
`
`Identification of challenge under 37 C.F.R. §42.104(b) and relief
`requested
`
`IPR should be instituted, and Claims 1-10 of the ’990 Patent (“Challenged
`
`Claims”) should be found unpatentable and cancelled based on the following
`
`statutory rejections. 37 C.F.R. §42.104(b)(1)-(2).
`
`Proposed Grounds of Unpatentability
`Ground 1: Claims 1, 5, and 9 are obvious under §103(a) in view
`of Publ. No. US 2005/0009599 (“Ryan”) (and incorporated by
`reference Publ. No. US 2003/0195033 (“Gazdic”)) (collectively,
`“Gazdic/Ryan”) alone or in view of Diamant.
`Ground 2: Claims 4, 8, 9 and 10 are obvious under §103(a) over
`Gazdic/Ryan in view of Diamant and Alcorn.
`Ground 3: Claims 2-3 and 6-7 are obvious under §103(a) over
`Gazdic/Ryan
`in view of Diamant, Alcorn, and Publ. No.
`2004/00198496 (“Gatto”)
`Ground 4: Claims 1, 5, and 9 are obvious under §103(a) in view
`of U.S. Patent No. 6,394,905 (“Takeda”) and Publ. No. US
`2006/0101310 (“Diamant”)
`
`Exhibits
`1008, 1009,
`1006
`
`1008, 1009,
`1006, 1007
`
`1008, 1009,
`1006, 1007,
`1027
`
`1005, 1006
`
`
`
` 3
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`Proposed Grounds of Unpatentability
`Ground 5: Claims 4, 8, 9 and 10 are obvious under §103(a) over
`Takeda in view of Diamant and U.S. Patent No. 6,149,522
`(“Alcorn”).
`Ground 6: Claims 2-3 and 6-7 are obvious under §103(a) over
`Takeda in view of Diamant, Alcorn and U.S. Patent No. 7,908,486
`(“Gatto”)
`
`Exhibits
`1005, 1006,
`1007
`
`1005, 1006,
`1007, 1027
`
`
`
`Section IV identifies where each element of the Challenged Claims is found
`
`in the prior art, including the relevance of the evidence to the challenges raised. 37
`
`C.F.R. §42.104(b)(4)-(5). The exhibit numbers of the supporting evidence are
`
`attached hereto. Exhibits 1001–1027.
`
`C. Claim construction under 37 C.F.R. §42.104(b)(3)
`“In an inter partes review proceeding, a claim of a patent . . . shall be
`
`construed using the same claim construction standard that would be used to construe
`
`the claim in a civil action under 35 U.S.C. §282(b), including construing the claim
`
`in accordance with the ordinary and customary meaning of such claim as understood
`
`by one of ordinary skill in the art and the prosecution history pertaining to the
`
`patent.” 37 C.F.R. §42.100(b) (as amended, effective Nov. 13, 2018); see Phillips
`
`v. AWH Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005). Petitioner does not believe
`
`that any terms need to be construed to resolve this IPR proceeding.
`
`
`
` 4
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`IV. THERE IS A REASONABLE LIKELIHOOD THAT THE
`CHALLENGED CLAIMS OF THE ’990 PATENT ARE
`UNPATENTABLE
`A. Ground 1: Gazdic/Ryan alone or in view of Diamant renders
`Claims 1, 5, and 9 obvious.
`
`Ryan incorporates Gazdic by reference in its entirety and, therefore, Ryan
`
`expressly includes the teachings of Gazdic as if they were a single disclosure.2 Ryan,
`
`[0001]. Accordingly, Petitioner will refer to the collective teachings of Ryan and
`
`Gazdic as Gazdic/Ryan, but will specifically cite to each individually.3
`
`Gazdic and Ryan published on October 16, 2003 and January 13, 2005,
`
`respectively, qualifying as prior art under §102(a), (b) and/or (e) (pre-AIA). Gazdic
`
`(Ex. 1008); Ryan (Ex. 1009). Ryan identifies Gazdic as a “related application” and
`
`
`2 “Material not explicitly contained in the single, prior art document may still be
`
`considered … if that material is incorporated by reference into the document.”
`
`Advanced Display Sys., Inc. v. Kent State Univ., 212 F.3d 1272, 1282 (Fed. Cir.
`
`2000); see also Comcast Cable Comm’ns, LLC v. Rovi Guides, Inc., IPR2017-01065,
`
`Paper 35 at 19-20 (Oct. 15, 2018); Moderna Therapeutics, Inc. v. Protiva
`
`Biotherapeutics, Inc., IPR2018-00680, Paper 46 at 17-18 (Sept. 10, 2019).
`
`3 To the extent that Patent Owner argues that Gazdic/Ryan should not be treated as
`
`a single disclosure, it would have been obvious to combine the references as
`
`discussed herein. Wolfe Decl., ¶¶292, fn.4.
`
`
`
` 5
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`shares a common inventor. Ryan, [0001]. Neither Gazdic nor Ryan were cited or
`
`considered during prosecution of the ’990 Patent.
`
`Gazdic/Ryan discloses a gaming system that authenticates a gaming program
`
`on an external memory prior to execution. Gazdic, Abstract; [0005]. Gazdic/Ryan
`
`teaches that the game program is stored on a high capacity storage device, such as a
`
`removable CD-ROM or DVD-ROM. Id., [0004] (“High capacity storage devices
`
`may, for example, include CD-ROMs, hard disk drives, and flash devices.”); [0018];
`
`[0020]; Fig. 2 (component 22); Ryan, [0026]; Fig. 2 (component 48). Gazdic/Ryan
`
`teaches that the game program is authenticated by a gaming machine processor using
`
`an authentication program stored in boot memory. See Gazdic, [0018]; [0019];
`
`[0028]-[0030]; Fig. 2 (components 20, 44a); Ryan, [0043].
`
`Like the ’990 Patent, Gazdic/Ryan describes a game device whereby game
`
`information stored on external storage is authenticated. Compare ‘990 Patent, 1:18-
`
`23 with Gazdic, Abstract, [0029]-[0030], Fig. 5b; Ryan, [0006]; [0026], [0043].
`
`Thus, Gazdic/Ryan is from the same field of endeavor. Wolfe Decl., ¶¶293-299.
`
`Gazdic/Ryan is also reasonably pertinent to a certain problem to be solved in
`
`the ‘990 Patent, i.e., ensuring that authentication of gaming information is
`
`performed. Compare, e.g., ’990 Patent, 2:4-8 with Gazdic, [0001]-[0004]; Ryan at
`
`[0006]. Gazdic/Ryan is analogous art. Wolfe Decl., ¶¶293-299.
`
`
`
` 6
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`Diamant was filed on October 22, 2004 and published May 11, 2006, and
`
`therefore qualifies as prior art for the ’990 Patent under at least §§102(a), (e) (pre-
`
`AIA). Diamant (Ex. 1006). Diamant teaches using a first verification program to
`
`evaluate the authenticity of a second verification program that evaluates the
`
`authenticity of content software stored on, for example, an attachable memory
`
`device. Diamant at Abstract. The first verification program, second verification
`
`program, and content software can be stored in various places, including on the
`
`electronic device or the attachable memory device. Diamant, [0010]-[0015], [0022].
`
`Like the ’990 Patent, Diamant generally relates to an electronic device
`
`whereby software stored in a portable storage medium is authenticated and loaded
`
`onto an electronic device. Compare ‘990 Patent, 1:18-23 with Diamant at Abstract;
`
`see also Wolfe Decl., ¶¶131-139. Thus, Diamant is from the same field of endeavor.
`
`Diamant is also reasonably pertinent to a certain problem purportedly solved
`
`in the ‘990 Patent, i.e., ensuring that authentication of the software to be run on the
`
`electronic device is performed. Compare, e.g., ’990 Patent, 2:4-8 with Diamant,
`
`[0015], [0028]-[0029], [0033]; Wolfe Decl., ¶¶131-139. Thus, Diamant is analogous
`
`art.
`
`i.
`
`
`
`Claim 1
`
`1. A gaming machine comprising:
`
`
`
` 7
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`Gazdic/Ryan teaches “a gaming machine 10 [] operable to conduct a wagering
`
`game such as mechanical or video slots, poker, keno, bingo, or blackjack.” Gazdic,
`
`[0014]; Ryan, [0020].
`
`
`
`Gazdic, Fig. 1.
`
`[1(a)] a game action executing device configured to execute a game action;
`
`Gazdic/Ryan teaches a game action executing device (i.e., video and audio
`
`circuitry) configured to display images and provide sounds during gameplay (i.e.,
`
`
`
` 8
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`execute a game action). “[A] central processing unit (CPU) controls operation of
`
`the gaming machine 10.” Gazdic, [0017]; Ryan, [0023]. The “CPU includes a
`
`microprocessor and computer readable storage.” Gazdic, [0018]; Fig. 2 (element
`
`32); Ryan, [0024]; Fig. 2 (items 32, 36). The CPU controls operation of the game
`
`and causes associated circuitry to output images and sounds associated with
`
`gameplay.
`
`[T]he CPU 30 randomly selects a game outcome from a plurality of
`possible outcomes and causes the display 12, via the video circuitry 39
`and video out 40, to depict indicia representative of the selected game
`outcome. … In the case of slots, for example, mechanical or simulated
`slot reels are rotated and stopped to place symbols on the reels in visual
`association with one or more pay lines.
`
`Ryan, [0023] (emphasis added)4; see id., [0008]; Gazdic, [0017]. This is achieved
`
`through video and audio circuitry in the gaming machine.
`
`The video circuitry 39 supplies display information to a video display
`12 that may comprise a CRT, LCD, plasma, or other display device.
`Audio circuitry 42 generates sounds for game play on the gaming
`machine 10.
`
`Ryan, [0025].
`
`
`4 Unless otherwise noted, all emphases in quoted material and annotations to figures
`
`have been added by Petitioner.
`
`
`
` 9
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`
`
`Ryan, Fig. 2.
`
`
`
`A PHOSITA would have understood that the visual and audio circuitry in
`
`Gazdic/Ryan are a game action executing device configured to execute a game
`
`action. Wolfe Decl., ¶¶94-100, 304-309;’990 Patent, 9:2-7 (describing a “sound
`
`control circuit” and “image control circuit” that “operate as a game action executing
`
`device.”); 9:40-48.
`
`
`
` 10
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`[1(b)(i)] a loading device including a connection unit configured to be connected
`to a removable storage medium
`
`Gazdic/Ryan teaches a CD or DVD drive (i.e., loading device) and associated
`
`interfaces such as interface bus 34 (i.e., a connection unit) configured to be
`
`connected to a high capacity storage memory 22, such as a CD-ROM or DVD-ROM
`
`(i.e., removable storage medium).
`
`Gazdic/Ryan teaches a high capacity storage memory.
`
`The CPU includes a microprocessor and computer readable storage. …
`[T]he computer-readable storage includes a boot memory 20, a high
`capacity storage memory 22, and a serial read-write memory 24. … The
`high capacity storage memory 22 is preferably a compact flash card.
`
`Gazdic, [0018]; Fig. 2 (item 22). The high capacity storage memory can be
`
`removable, such as a CD-ROM or DVD-ROM. Ryan, [0026] (“The high capacity
`
`storage memory 48 … may also be a hard disk drive, CD drive, DVD drive….”); see
`
`id., [0024]; [0046]; Fig. 2; see also Gazdic, [0004]; [0018]; Fig. 2; Wolfe Decl., ¶¶94-
`
`100, 310-313.
`
`
`
`The various memory devices of Gazdic/Ryan, including removable high
`
`capacity storage memory, interface with the CPU via an interface bus.
`
`The CPU 30 includes a microprocessor 32 and various memory devices
`…. The microprocessor 32 interfaces with many other components of
`the gaming machine 10 via an interface bus 34.
`
`Ryan, [0024]; [0033].
`
`
`
` 11
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`
`
`Ryan, Fig. 2.
`
`Based on Gazdic/Ryan’s teachings, a PHOSITA would have understood that
`
`a CD drive, for example, and the associated interface bus of Gazdic/Ryan, would be
`
`a loading device and connection unit configured to be connected to a removable CD-
`
`ROM. Wolfe Decl., ¶¶94-100, 310-313; ’990 Patent, 7:8-10; 7:45-51.
`
`[1(b)(ii)] storing [in the removeable storage medium] gaming information
`including a mutual authentication program; and
`
`
`
` 12
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`Gazdic/Ryan teaches that the high capacity storage memory (i.e., removable
`
`
`
`storage medium) stores game and operating system executable program files
`
`(hereinafter “executable game/OS files”) (i.e., gaming information):
`
`The high capacity storage memory 22 stores game and operating system
`executable program files, sound operating system files, sound bank
`files, graphics files, a manifest file, and a digital signature 32. The
`above files, taken together, constitute a "game data set” as that term is
`used herein, and the various files constitute "data files" as that term is
`used herein.
`
`Gazdic, [0020]; see id., [0005]; Ryan, [0029].
`
`
`
` 13
`
`
`
`

`

`Gazdic, Fig. 2 (excerpt); Ryan, Fig. 2.
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`Gazdic/Ryan teaches that the executable game/OS files are loaded from the
`
`high capacity storage memory to system RAM after authentication. Id. at [0029].
`
`The program for authenticating the executable game/OS files is stored in boot
`
`memory of the gaming machine. Id., [0019]; see also id., [0029]-[0030]; Ryan,
`
`[0027]; [0035]; [0043].
`
`
`
`Gazdic, Fig. 2 (excerpt); Ryan, Fig. 2. The authentication program will be further
`
`described below in connection with Claim 1(d)(iii), (e), (f)(i), and (g).5
`
`
`
`Gazdic/Ryan teaches that the game/OS program files contains executable
`
`instructions that are used during the authentication procedure. Id., [0020].
`
`
`5 Unless stated otherwise, a reference to “Claim 1(a),” for example, refers to the
`
`mapping of that limitation in the same Ground.
`
`
`
` 14
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`Specifically, Gazdic/Ryan teaches that each individual file, including the executable
`
`game/OS files, are run through the authentication program in boot memory. Gazdic,
`
`[0030], Figs. 4, 5b. For example, a fresh digital signature 50 is generated from
`
`previously signed memory contents 40 to a message digest 48 using hash function
`
`42 ….” Id., [0025]; [0030]; Fig. 4. This digital signature is then processed to
`
`determine if the file is authentic. Id., [0030]; Fig. 4; Ryan, [0027]; [0035]; [0044]-
`
`[0045]; Fig. 3.
`
`
`
`Gazdic/Ryan further teaches that boot memory and executable game/OS files
`
`are continuously authenticated during run-time. Gazdic, [0031]-[0032], Fig. 6. “The
`
`purpose of continuous run-time authentication is to ensure that the information that
`
`was loaded to system RAM during the boot process has not been altered and that the
`
`memories have not been changed.” Id., [0032]. In particular, the second cycle of
`
`the run-time authentication process authenticates the boot memory 20 (including the
`
`authentication program) at step 108 and files that are executing from system RAM
`
`(including the executable game/OS files) at steps 110 and 112. Id., [0032], Fig. 6.
`
`In one embodiment, the run-time authentication process does not use the DSA verify
`
`operation of Fig. 4 that is stored in boot memory. Id., [0032]. A PHOSITA would
`
`understand that the run-time authentication program of Gazdic’s Fig. 6 uses a
`
`different program from the one stored in the boot memory, but Gazdic/Ryan does
`
`not disclose the location of this program. Wolfe Decl., ¶¶314-328. A PHOSITA,
`
`
`
` 15
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`however, would have found it obvious to include the run-time authentication
`
`program in the executable game/OS files on high capacity storage memory. Id. For
`
`example, as shown in Gazdic’s Figure 6, the run-time authentication program is
`
`executed in conjunction with executing the “MAIN APPLICATION” (which is
`
`loaded from HIGH CAPACITY STORAGE MEMORY into CPU COMPONENT /
`
`SYSTEM RAM after authentication, as shown in Figure 5b). Id. It would therefore
`
`have been obvious to include the run-time authentication program within the
`
`executable game/OS files stored in high capacity storage memory. Id. Indeed, a
`
`PHOSITA would understand that the run-time authentication process is a set of
`
`executable instructions and would naturally be included with the executable
`
`game/OS program files on the high capacity storage memory. Gazdic, [0020]; Wolfe
`
`Decl., ¶¶314-328. Further, a PHOSITA would understand that storing the run-time
`
`authentication program in a location different from the authentication program in
`
`boot memory increases security because tampering with one location would be
`
`insufficient to defeat authentication. Id. Thus, the run-time authentication program
`
`from the high capacity storage memory authenticates the authentication program on
`
`boot memory. Id. In turn, the authentication program in boot memory authenticates
`
`the executable game/OS files (including the run-time authentication program). Id.
`
`This is mutual authentication because each of the authentication programs
`
`
`
` 16
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`authenticates the other, rendering the run-time authentication program a “mutual
`
`authentication program.” Id.
`
`To the extent implementing such a functionality in the high capacity memory
`
`would not have been obvious in view of the teachings of Gazdic/Ryan alone, it would
`
`have been obvious in view of Diamant to store within the executable game/OS files
`
`on removeable memory a program (such as the run-time authentication program of
`
`Gazdic) that authenticates the “authentication program” that in turn authenticates the
`
`software on removeable memory. Wolfe Decl., ¶¶314-328.
`
`Diamant teaches a first verification program that can be stored on an external
`
`storage medium (e.g., high capacity memory of Gazdic) to evaluate the authenticity
`
`of a second verification program that, in turn, is used to evaluate the authenticity of
`
`the software stored on the external storage medium. See Diamant, Abstract; [0019;
`
`[0011]; [0015]; [0024]; Wolfe Decl., ¶¶314-328. Diamant provides a mutual
`
`authentication program via a first verification program (“integrity checker 24”) that
`
`can be stored on an external storage medium to evaluate the authenticity of an
`
`authentication program referred to as a second verification program (or “integrity
`
`checking algorithm 22”) that, in turn, is used to evaluate the authenticity of the
`
`content software stored on the external storage medium before it is executed on the
`
`electronic device. See Diamant, Abstract (“using a first verification algorithm or
`
`program to evaluate the integrity or authenticity of a second verification program. .
`
`
`
` 17
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`. . The second verification program may evaluate the authenticity or integrity of …
`
`software … that is included on the attachable device”); [0019] (“For example,
`
`integrity checker 24 may verify or confirm that a verification program such as for
`
`example integrity checking algorithm 22 is valid for use on device 10 and has not
`
`been corrupted or compromised.”); [0011]; [0015]; [0024].
`
`Diamant discloses an embodiment where integrity checker 24 is stored in
`
`device ROM 14 and integrity checking algorithm 22 is stored in attachable memory
`
`device 16. Id., Fig. 1. However, Diamant discloses multiple different embodiments
`
`that reflect flexibility in the placement of these two verification programs. Wolfe
`
`Decl., ¶¶74-82, 314-328. Diamant discloses that integrity checking algorithm 22
`
`(the second verification program) may be stored in memory of device 10 rather than
`
`attachable memory device 16. Diamant, [0015] (“integrity checking algorithm 22
`
`that may be stored for example in a downloaded program, in memory device 16 or
`
`elsewhere in device 10”). Diamant similarly discloses that integrity checker 24 (the
`
`first verification program) may be stored in attachable memory. Id., [0022]
`
`(“instructions that may include … integrity checker 24 may be stored … on … a disc
`
`… or other memory unit”). In this embodiment, “ROM 14 may include a loader
`
`such as for example a boot loader 28 that may read and load a program from …
`
`another data storage device such as memory device 16 into for example RAM 15
`
`and provide such program to processor 12 for execution[.]” Id., [0011]. Thus, in this
`
`
`
` 18
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`embodiment, a PHOSITA would understand that integrity checker 24 may be stored
`
`on removeable memory device 16 and read from that location to RAM for execution
`
`by processor 12. See Wolfe Decl., ¶¶314-328.
`
`Integrity checker 24 (mutual authentication program) “verifies that integrity
`
`checking algorithm 22 is valid.” Diamant, [0015]. Once completed, “processor 12
`
`may load and execute integrity checking algorithm 22 which may check and verify
`
`the integrity of … software … stored on … external memory device 16.” Id.; see
`
`also id., [0012]; [0028]. The authenticated software from the attachable memory
`
`device is then loaded and executed by the electronic device processor. Id., [0015];
`
`[0022]; [0028]; [0033]-[0034]; FIG. 3.
`
`It would have been obvious to a PHOSITA to supplement Gazdic/Ryan’s
`
`executable game/OS files on the high capacity storage memory with Diamant’s first
`
`verification program (integrity checker 24). Wolfe Decl., ¶¶314-328. Gazdic/Ryan
`
`teaches sending executable game/OS files from the high capacity storage memory
`
`to the gaming machine. Id. Similarly, Diamant describes an embodiment, detailed
`
`above, where integrity checker 24 is stored on removeable memory device 16 and is
`
`read into RAM 15 to verify integrity checking algorithm, which can be stored on
`
`device 10. Id.; Diamant at [0015], [0022]. As disclosed in Diamant, the purpose of
`
`integrity checker 24 is to authenticate the main authentication program (integrity
`
`checking algorithm 22).
`
`
`
` 19
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`A PHOSITA would be motivated to make this modification to beneficially
`
`increase the security of Gazdic/Ryan by providing a mutual integrity check on the
`
`“authentication program” using an authentication program stored in a different
`
`location. Id. Diamant expressly teaches authenticating the authentication program,
`
`and a PHOSITA would appreciate that this mutual authentication using programs
`
`stored in different locations provides greater security. Id. Implementation of
`
`Gazdic/Ryan in this way amounts to combining known techniques according to
`
`known methods to obtain a predictable result – a verified authentication program
`
`that in turn authenticates software on external memory. Id. Combining Gazdic/Ryan
`
`with Diamant, thus, would have resulted in a more secure environment in which to
`
`execute software from external storage. Id. Further, given the predictable nature of
`
`computer programming at the time of the ’990 Patent, a PHOSITA would have had
`
`a reasonable expectation of success in modifying Gazdic/Ryan’s executable
`
`game/OS files to include Diamant’s integrity checker 24. Id.
`
`[1(c)] a process device including a readable and rewritable storage unit,
`
`Gazdic/Ryan
`
`teaches a process device (i.e., microprocessor, system
`
`RAM/main memory, and boot memory) including a readable and rewritable storage
`
`unit (i.e., system RAM/main memory). Gazdic, [0018] (“CPU includes a
`
`microprocessor and computer
`
`readable
`
`storage.”); Ryan,
`
`[0024]-[0025].
`
`Gazdic/Ryan teaches that each executable game/OS file in high capacity storage
`
`
`
` 20
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`memory is sequentially authenticated and then loaded to system RAM. Gazdic,
`
`[0029] (“loads each authenticated file into the CPU component (e.g., system RAM)
`
`where the data file will reside and execute from during normal machine operation”);
`
`see id., [0030] (“the data file is loaded to an associated CPU component”).
`
`Additionally, “main memory 36 may be DRAM or SRAM or substantially any other
`
`volatile memory device or reprogrammable non-volatile memory device.” Ryan,
`
`[0025]. The “process device” is discussed further with respect to Claims 1(i)-(j). A
`
`PHOSITA would understand that the “associated CPU component (e.g., system
`
`RAM)” or “main memory” of Gazdic/Ryan is rewritable as it would continuously be
`
`written to with sequentially authenticated executable game/OS files. Wolfe Decl.,
`
`¶¶329-336.
`
`Gazdic/Ryan further teaches that after all executable game/OS files from the
`
`high capacity storage memory are authenticated, “the main software application is
`
`launched from system RAM[.]” Gazdic, [0030]; [0029] (“loads each authenticated
`
`data file into the CPU component (e.g., system RAM) where the data file will reside
`
`and execute from during normal operation”). A PHOSITA would understand that
`
`in order to execute the game data files from system RAM, Gazdic/Ryan’s
`
`microprocessor reads the files from system RAM. Wolfe Decl., ¶¶329-336. The
`
`system RAM or main memory, therefore, is readable and rewritable and included in
`
`a process device. Id.
`
`
`
` 21
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`[1(d)(i)] wherein each of a program storage unit … is included in at least one of
`the loading device and the process device:
`
`
`
`Gazdic/Ryan teaches boot memory (i.e., program storage unit) included in the
`
`process device (i.e., gaming machine CPU including microprocessor, system RAM,
`
`and boot memory). “FIG. 2 is a block diagram of computer-readable storage
`
`contained in the gaming machine” (Gazdic, [0008]):
`
`
`
`Gazdic, Fig. 2; Ryan, Fig. 2. “[B]oot memory stores … an authentication program.”
`
`Gazdic, [0020]; see id., [0005]; Ryan, [0027]; Claim 1(e). This parallels the
`
`description of the program storage unit in the ’990 Patent.’990 Patent, 7:37-38.
`
`[1(d)(ii)] wherein each of … a reading unit … is included in at least one of the
`loading device and the process device:
`
`Gazdic/Ryan teaches a reading unit (i.e., microprocessor) included in the
`
`process device (i.e., microprocessor, system RAM/main memory, and boot memory.
`
`
`
` 22
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`See Claim 1(c); see also Gazdic, [0018]; [0029]; Ryan, [0024]. Gazdic/Ryan teaches
`
`that CPU includes a microprocessor. Gazdic, [0018]; Ryan, [0024].
`
`The microprocessor reads data, such as the game program, from the high
`
`capacity storage medium to generate a hash message digest used during
`
`authentication. See Ryan, [0044]-[0045]; Gazdic, [0020]; [0023]-[0025]; [0044]-
`
`[0045]; Claim 1(f)(ii). The microprocessor also reads the authentication program
`
`out of boot memory. See Gazdic, [0005]; [0018]-[0020], [0025]; [0028]-[0030];
`
`Figs. 4, 5a-5b; see Claim 1(f)(i).
`
`A PHOSITA would understand that the microprocessor is a reading unit
`
`included in the process device. Wolfe Decl., ¶¶342-344; see Claim 1(f)(i)-(ii).
`
`[1(d)(iii)] wherein each of … an authentication unit … is included in at least one
`of the loading device and the process device:
`
`Gazdic/Ryan teaches that the process device (i.e., microprocessor, system
`
`RAM/main memory, and boot memory) includes a microprocessor that authenticates
`
`the game program (i.e., an authentication unit):
`
`FIG. 4 illustrates a method of authenticating the digital signatures 30,
`32, 34, and 36 already stored in the memories. … The method employs
`the boot memory's authentication program, which includes the hash
`function 42, the DSA verify operation 44a, and the public key 46a. …
`
`Gazdic, [0025]; see id., [0005]; [0017] (“A central processing unit (CPU) controls
`
`operation of the gaming machine 10.”); [0019]; [0029] (“File authentication and
`
`
`
` 23
`
`

`

`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`loading sequentially authenticates the executable data files [] ….”); [0030] Fig. 4;
`
`Ryan, [0033]; [0035]; [0044]-[0045]; Fig. 3. A PHOSITA would underst

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket