`U.S. Patent 8,095,990
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`
`SONY INTERACTIVE ENTERTAINMENT LLC
`Petitioner
`
`v.
`
`BOT M8 LLC
`Patent Owner
`____________
`
`
`Case No. IPR2020-01218
`U.S. Patent No. 8,095,990
`____________
`
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 8,095,990
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`TABLE OF CONTENTS
`
`INTRODUCTION ...................................................................................... 1
`I.
`SUMMARY OF THE ’990 PATENT ........................................................ 1
`II.
`A. DESCRIPTION OF THE ALLEGED INVENTION OF THE ’990 PATENT .................... 1
`B. SUMMARY OF THE PROSECUTION OF THE ’990 PATENT ................................... 2
`C. LEVEL OF SKILL OF A PERSON HAVING ORDINARY SKILL IN THE ART ............... 2
`III. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R.
`§42.104 ................................................................................................................... 3
`A. GROUNDS FOR STANDING UNDER 37 C.F.R. §42.104(A) ................................. 3
`B. IDENTIFICATION OF CHALLENGE UNDER 37 C.F.R. §42.104(B) AND RELIEF
`REQUESTED ......................................................................................................... 3
`C. CLAIM CONSTRUCTION UNDER 37 C.F.R. §42.104(B)(3) ................................ 4
`IS A REASONABLE LIKELIHOOD THAT THE
`IV. THERE
`CHALLENGED CLAIMS OF THE ’990 PATENT ARE UNPATENTABLE . 5
`A. GROUND 1: GAZDIC/RYAN ALONE OR IN VIEW OF DIAMANT RENDERS CLAIMS 1,
`5, AND 9 OBVIOUS. ............................................................................................... 5
`B. GROUND 2: GAZDIC/RYAN IN VIEW OF DIAMANT AND ALCORN RENDERS CLAIMS
`4, 8, 9 AND 10 OBVIOUS. .....................................................................................40
`C. GROUND 3: GAZDIC/RYAN IN VIEW OF DIAMANT, ALCORN, AND GATTO RENDERS
`CLAIMS 2-3 AND 6-7 OBVIOUS. ...........................................................................47
`D. GROUND 4: TAKEDA IN VIEW OF DIAMANT RENDERS CLAIMS 1, 5, AND 9
`OBVIOUS. ............................................................................................................49
`E. GROUND 5: TAKEDA IN VIEW OF DIAMANT AND ALCORN RENDERS CLAIMS 4, 8,
`9 AND 10 OBVIOUS. .............................................................................................75
`F. GROUND 6: TAKEDA IN VIEW OF DIAMANT, ALCORN, AND GATTO RENDERS
`CLAIMS 2-3 AND 6-7 OBVIOUS ............................................................................79
`V. CONCLUSION ......................................................................................... 80
`VI. MANDATORY NOTICES UNDER 37 C.F.R. §42.8(A)(1) .................... 81
`A. REAL PARTY-IN-INTEREST ...........................................................................81
`B. RELATED MATTERS .....................................................................................81
`C. LEAD AND BACK-UP COUNSEL ....................................................................82
`
`
`
`
`
`
`
`
`
`I.
`
`INTRODUCTION
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`Petitioner Sony Interactive Entertainment LLC requests Inter Partes Review
`
`(“IPR”) of Claims 1-10 of U.S. Patent No. 8,095,990 (the “’990 Patent”). ’990
`
`Patent (Ex. 1001).
`
`II. SUMMARY OF THE ’990 PATENT
`A. Description of the alleged invention of the ’990 Patent
`The ’990 Patent describes a “gaming machine” that can “authenticate and load
`
`gaming information stored in a portable storage medium.” ’990 Patent, 1:18-23. To
`
`do this, it proposes using various “authentication” programs to verify the integrity
`
`of the data, such as highlighted in Figure 1 below:
`
`
`
`Id., Fig. 1.
`
`
`
` 1
`
`
`
`Summary of the prosecution of the ’990 Patent
`
`B.
`The application that issued as the ’990 Patent was filed on April 19, 2006, and
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`claims priority to two Japanese Applications, both filed on April 25, 2005.1 Id.
`
`Following multiple rejections, Applicant amended the claims to add the
`
`following limitation: “a removable storage medium storing therein gaming
`
`information including a mutual authentication program.” Ex. 1002 (8/23/11 Claim
`
`Amendment) at 410. The patent then issued. Id. at 423.
`
`C. Level of skill of a person having ordinary skill in the art
`A person having ordinary skill in the art (“PHOSITA”) in April 2005 would
`
`have the equivalent of at least an undergraduate degree in computer science,
`
`computer engineering, electrical engineering, or a similar technical field, and with
`
`one or more years of work experience in the field of computer hardware and/or
`
`software authentication or verification. Additional education may substitute for less
`
`work experience and vice versa. See Ex. 1003, Declaration of Andrew Wolfe (“Wolfe
`
`Decl.”), ¶¶46-48.
`
`
`1 For purposes of this Petition only, Petitioner does not contest this priority claim.
`
`
`
` 2
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`III.
`
`REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37
`C.F.R. §42.104
`A. Grounds for standing under 37 C.F.R. §42.104(a)
`Petitioner certifies that the ’990 Patent is available for IPR and that the
`
`Petitioner is not barred or estopped from challenging the claims of the ’990 Patent.
`
`B.
`
`Identification of challenge under 37 C.F.R. §42.104(b) and relief
`requested
`
`IPR should be instituted, and Claims 1-10 of the ’990 Patent (“Challenged
`
`Claims”) should be found unpatentable and cancelled based on the following
`
`statutory rejections. 37 C.F.R. §42.104(b)(1)-(2).
`
`Proposed Grounds of Unpatentability
`Ground 1: Claims 1, 5, and 9 are obvious under §103(a) in view
`of Publ. No. US 2005/0009599 (“Ryan”) (and incorporated by
`reference Publ. No. US 2003/0195033 (“Gazdic”)) (collectively,
`“Gazdic/Ryan”) alone or in view of Diamant.
`Ground 2: Claims 4, 8, 9 and 10 are obvious under §103(a) over
`Gazdic/Ryan in view of Diamant and Alcorn.
`Ground 3: Claims 2-3 and 6-7 are obvious under §103(a) over
`Gazdic/Ryan
`in view of Diamant, Alcorn, and Publ. No.
`2004/00198496 (“Gatto”)
`Ground 4: Claims 1, 5, and 9 are obvious under §103(a) in view
`of U.S. Patent No. 6,394,905 (“Takeda”) and Publ. No. US
`2006/0101310 (“Diamant”)
`
`Exhibits
`1008, 1009,
`1006
`
`1008, 1009,
`1006, 1007
`
`1008, 1009,
`1006, 1007,
`1027
`
`1005, 1006
`
`
`
` 3
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`Proposed Grounds of Unpatentability
`Ground 5: Claims 4, 8, 9 and 10 are obvious under §103(a) over
`Takeda in view of Diamant and U.S. Patent No. 6,149,522
`(“Alcorn”).
`Ground 6: Claims 2-3 and 6-7 are obvious under §103(a) over
`Takeda in view of Diamant, Alcorn and U.S. Patent No. 7,908,486
`(“Gatto”)
`
`Exhibits
`1005, 1006,
`1007
`
`1005, 1006,
`1007, 1027
`
`
`
`Section IV identifies where each element of the Challenged Claims is found
`
`in the prior art, including the relevance of the evidence to the challenges raised. 37
`
`C.F.R. §42.104(b)(4)-(5). The exhibit numbers of the supporting evidence are
`
`attached hereto. Exhibits 1001–1027.
`
`C. Claim construction under 37 C.F.R. §42.104(b)(3)
`“In an inter partes review proceeding, a claim of a patent . . . shall be
`
`construed using the same claim construction standard that would be used to construe
`
`the claim in a civil action under 35 U.S.C. §282(b), including construing the claim
`
`in accordance with the ordinary and customary meaning of such claim as understood
`
`by one of ordinary skill in the art and the prosecution history pertaining to the
`
`patent.” 37 C.F.R. §42.100(b) (as amended, effective Nov. 13, 2018); see Phillips
`
`v. AWH Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005). Petitioner does not believe
`
`that any terms need to be construed to resolve this IPR proceeding.
`
`
`
` 4
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`IV. THERE IS A REASONABLE LIKELIHOOD THAT THE
`CHALLENGED CLAIMS OF THE ’990 PATENT ARE
`UNPATENTABLE
`A. Ground 1: Gazdic/Ryan alone or in view of Diamant renders
`Claims 1, 5, and 9 obvious.
`
`Ryan incorporates Gazdic by reference in its entirety and, therefore, Ryan
`
`expressly includes the teachings of Gazdic as if they were a single disclosure.2 Ryan,
`
`[0001]. Accordingly, Petitioner will refer to the collective teachings of Ryan and
`
`Gazdic as Gazdic/Ryan, but will specifically cite to each individually.3
`
`Gazdic and Ryan published on October 16, 2003 and January 13, 2005,
`
`respectively, qualifying as prior art under §102(a), (b) and/or (e) (pre-AIA). Gazdic
`
`(Ex. 1008); Ryan (Ex. 1009). Ryan identifies Gazdic as a “related application” and
`
`
`2 “Material not explicitly contained in the single, prior art document may still be
`
`considered … if that material is incorporated by reference into the document.”
`
`Advanced Display Sys., Inc. v. Kent State Univ., 212 F.3d 1272, 1282 (Fed. Cir.
`
`2000); see also Comcast Cable Comm’ns, LLC v. Rovi Guides, Inc., IPR2017-01065,
`
`Paper 35 at 19-20 (Oct. 15, 2018); Moderna Therapeutics, Inc. v. Protiva
`
`Biotherapeutics, Inc., IPR2018-00680, Paper 46 at 17-18 (Sept. 10, 2019).
`
`3 To the extent that Patent Owner argues that Gazdic/Ryan should not be treated as
`
`a single disclosure, it would have been obvious to combine the references as
`
`discussed herein. Wolfe Decl., ¶¶292, fn.4.
`
`
`
` 5
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`shares a common inventor. Ryan, [0001]. Neither Gazdic nor Ryan were cited or
`
`considered during prosecution of the ’990 Patent.
`
`Gazdic/Ryan discloses a gaming system that authenticates a gaming program
`
`on an external memory prior to execution. Gazdic, Abstract; [0005]. Gazdic/Ryan
`
`teaches that the game program is stored on a high capacity storage device, such as a
`
`removable CD-ROM or DVD-ROM. Id., [0004] (“High capacity storage devices
`
`may, for example, include CD-ROMs, hard disk drives, and flash devices.”); [0018];
`
`[0020]; Fig. 2 (component 22); Ryan, [0026]; Fig. 2 (component 48). Gazdic/Ryan
`
`teaches that the game program is authenticated by a gaming machine processor using
`
`an authentication program stored in boot memory. See Gazdic, [0018]; [0019];
`
`[0028]-[0030]; Fig. 2 (components 20, 44a); Ryan, [0043].
`
`Like the ’990 Patent, Gazdic/Ryan describes a game device whereby game
`
`information stored on external storage is authenticated. Compare ‘990 Patent, 1:18-
`
`23 with Gazdic, Abstract, [0029]-[0030], Fig. 5b; Ryan, [0006]; [0026], [0043].
`
`Thus, Gazdic/Ryan is from the same field of endeavor. Wolfe Decl., ¶¶293-299.
`
`Gazdic/Ryan is also reasonably pertinent to a certain problem to be solved in
`
`the ‘990 Patent, i.e., ensuring that authentication of gaming information is
`
`performed. Compare, e.g., ’990 Patent, 2:4-8 with Gazdic, [0001]-[0004]; Ryan at
`
`[0006]. Gazdic/Ryan is analogous art. Wolfe Decl., ¶¶293-299.
`
`
`
` 6
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`Diamant was filed on October 22, 2004 and published May 11, 2006, and
`
`therefore qualifies as prior art for the ’990 Patent under at least §§102(a), (e) (pre-
`
`AIA). Diamant (Ex. 1006). Diamant teaches using a first verification program to
`
`evaluate the authenticity of a second verification program that evaluates the
`
`authenticity of content software stored on, for example, an attachable memory
`
`device. Diamant at Abstract. The first verification program, second verification
`
`program, and content software can be stored in various places, including on the
`
`electronic device or the attachable memory device. Diamant, [0010]-[0015], [0022].
`
`Like the ’990 Patent, Diamant generally relates to an electronic device
`
`whereby software stored in a portable storage medium is authenticated and loaded
`
`onto an electronic device. Compare ‘990 Patent, 1:18-23 with Diamant at Abstract;
`
`see also Wolfe Decl., ¶¶131-139. Thus, Diamant is from the same field of endeavor.
`
`Diamant is also reasonably pertinent to a certain problem purportedly solved
`
`in the ‘990 Patent, i.e., ensuring that authentication of the software to be run on the
`
`electronic device is performed. Compare, e.g., ’990 Patent, 2:4-8 with Diamant,
`
`[0015], [0028]-[0029], [0033]; Wolfe Decl., ¶¶131-139. Thus, Diamant is analogous
`
`art.
`
`i.
`
`
`
`Claim 1
`
`1. A gaming machine comprising:
`
`
`
` 7
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`Gazdic/Ryan teaches “a gaming machine 10 [] operable to conduct a wagering
`
`game such as mechanical or video slots, poker, keno, bingo, or blackjack.” Gazdic,
`
`[0014]; Ryan, [0020].
`
`
`
`Gazdic, Fig. 1.
`
`[1(a)] a game action executing device configured to execute a game action;
`
`Gazdic/Ryan teaches a game action executing device (i.e., video and audio
`
`circuitry) configured to display images and provide sounds during gameplay (i.e.,
`
`
`
` 8
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`execute a game action). “[A] central processing unit (CPU) controls operation of
`
`the gaming machine 10.” Gazdic, [0017]; Ryan, [0023]. The “CPU includes a
`
`microprocessor and computer readable storage.” Gazdic, [0018]; Fig. 2 (element
`
`32); Ryan, [0024]; Fig. 2 (items 32, 36). The CPU controls operation of the game
`
`and causes associated circuitry to output images and sounds associated with
`
`gameplay.
`
`[T]he CPU 30 randomly selects a game outcome from a plurality of
`possible outcomes and causes the display 12, via the video circuitry 39
`and video out 40, to depict indicia representative of the selected game
`outcome. … In the case of slots, for example, mechanical or simulated
`slot reels are rotated and stopped to place symbols on the reels in visual
`association with one or more pay lines.
`
`Ryan, [0023] (emphasis added)4; see id., [0008]; Gazdic, [0017]. This is achieved
`
`through video and audio circuitry in the gaming machine.
`
`The video circuitry 39 supplies display information to a video display
`12 that may comprise a CRT, LCD, plasma, or other display device.
`Audio circuitry 42 generates sounds for game play on the gaming
`machine 10.
`
`Ryan, [0025].
`
`
`4 Unless otherwise noted, all emphases in quoted material and annotations to figures
`
`have been added by Petitioner.
`
`
`
` 9
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`
`
`Ryan, Fig. 2.
`
`
`
`A PHOSITA would have understood that the visual and audio circuitry in
`
`Gazdic/Ryan are a game action executing device configured to execute a game
`
`action. Wolfe Decl., ¶¶94-100, 304-309;’990 Patent, 9:2-7 (describing a “sound
`
`control circuit” and “image control circuit” that “operate as a game action executing
`
`device.”); 9:40-48.
`
`
`
` 10
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`[1(b)(i)] a loading device including a connection unit configured to be connected
`to a removable storage medium
`
`Gazdic/Ryan teaches a CD or DVD drive (i.e., loading device) and associated
`
`interfaces such as interface bus 34 (i.e., a connection unit) configured to be
`
`connected to a high capacity storage memory 22, such as a CD-ROM or DVD-ROM
`
`(i.e., removable storage medium).
`
`Gazdic/Ryan teaches a high capacity storage memory.
`
`The CPU includes a microprocessor and computer readable storage. …
`[T]he computer-readable storage includes a boot memory 20, a high
`capacity storage memory 22, and a serial read-write memory 24. … The
`high capacity storage memory 22 is preferably a compact flash card.
`
`Gazdic, [0018]; Fig. 2 (item 22). The high capacity storage memory can be
`
`removable, such as a CD-ROM or DVD-ROM. Ryan, [0026] (“The high capacity
`
`storage memory 48 … may also be a hard disk drive, CD drive, DVD drive….”); see
`
`id., [0024]; [0046]; Fig. 2; see also Gazdic, [0004]; [0018]; Fig. 2; Wolfe Decl., ¶¶94-
`
`100, 310-313.
`
`
`
`The various memory devices of Gazdic/Ryan, including removable high
`
`capacity storage memory, interface with the CPU via an interface bus.
`
`The CPU 30 includes a microprocessor 32 and various memory devices
`…. The microprocessor 32 interfaces with many other components of
`the gaming machine 10 via an interface bus 34.
`
`Ryan, [0024]; [0033].
`
`
`
` 11
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`
`
`Ryan, Fig. 2.
`
`Based on Gazdic/Ryan’s teachings, a PHOSITA would have understood that
`
`a CD drive, for example, and the associated interface bus of Gazdic/Ryan, would be
`
`a loading device and connection unit configured to be connected to a removable CD-
`
`ROM. Wolfe Decl., ¶¶94-100, 310-313; ’990 Patent, 7:8-10; 7:45-51.
`
`[1(b)(ii)] storing [in the removeable storage medium] gaming information
`including a mutual authentication program; and
`
`
`
` 12
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`Gazdic/Ryan teaches that the high capacity storage memory (i.e., removable
`
`
`
`storage medium) stores game and operating system executable program files
`
`(hereinafter “executable game/OS files”) (i.e., gaming information):
`
`The high capacity storage memory 22 stores game and operating system
`executable program files, sound operating system files, sound bank
`files, graphics files, a manifest file, and a digital signature 32. The
`above files, taken together, constitute a "game data set” as that term is
`used herein, and the various files constitute "data files" as that term is
`used herein.
`
`Gazdic, [0020]; see id., [0005]; Ryan, [0029].
`
`
`
` 13
`
`
`
`
`
`Gazdic, Fig. 2 (excerpt); Ryan, Fig. 2.
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`
`Gazdic/Ryan teaches that the executable game/OS files are loaded from the
`
`high capacity storage memory to system RAM after authentication. Id. at [0029].
`
`The program for authenticating the executable game/OS files is stored in boot
`
`memory of the gaming machine. Id., [0019]; see also id., [0029]-[0030]; Ryan,
`
`[0027]; [0035]; [0043].
`
`
`
`Gazdic, Fig. 2 (excerpt); Ryan, Fig. 2. The authentication program will be further
`
`described below in connection with Claim 1(d)(iii), (e), (f)(i), and (g).5
`
`
`
`Gazdic/Ryan teaches that the game/OS program files contains executable
`
`instructions that are used during the authentication procedure. Id., [0020].
`
`
`5 Unless stated otherwise, a reference to “Claim 1(a),” for example, refers to the
`
`mapping of that limitation in the same Ground.
`
`
`
` 14
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`Specifically, Gazdic/Ryan teaches that each individual file, including the executable
`
`game/OS files, are run through the authentication program in boot memory. Gazdic,
`
`[0030], Figs. 4, 5b. For example, a fresh digital signature 50 is generated from
`
`previously signed memory contents 40 to a message digest 48 using hash function
`
`42 ….” Id., [0025]; [0030]; Fig. 4. This digital signature is then processed to
`
`determine if the file is authentic. Id., [0030]; Fig. 4; Ryan, [0027]; [0035]; [0044]-
`
`[0045]; Fig. 3.
`
`
`
`Gazdic/Ryan further teaches that boot memory and executable game/OS files
`
`are continuously authenticated during run-time. Gazdic, [0031]-[0032], Fig. 6. “The
`
`purpose of continuous run-time authentication is to ensure that the information that
`
`was loaded to system RAM during the boot process has not been altered and that the
`
`memories have not been changed.” Id., [0032]. In particular, the second cycle of
`
`the run-time authentication process authenticates the boot memory 20 (including the
`
`authentication program) at step 108 and files that are executing from system RAM
`
`(including the executable game/OS files) at steps 110 and 112. Id., [0032], Fig. 6.
`
`In one embodiment, the run-time authentication process does not use the DSA verify
`
`operation of Fig. 4 that is stored in boot memory. Id., [0032]. A PHOSITA would
`
`understand that the run-time authentication program of Gazdic’s Fig. 6 uses a
`
`different program from the one stored in the boot memory, but Gazdic/Ryan does
`
`not disclose the location of this program. Wolfe Decl., ¶¶314-328. A PHOSITA,
`
`
`
` 15
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`however, would have found it obvious to include the run-time authentication
`
`program in the executable game/OS files on high capacity storage memory. Id. For
`
`example, as shown in Gazdic’s Figure 6, the run-time authentication program is
`
`executed in conjunction with executing the “MAIN APPLICATION” (which is
`
`loaded from HIGH CAPACITY STORAGE MEMORY into CPU COMPONENT /
`
`SYSTEM RAM after authentication, as shown in Figure 5b). Id. It would therefore
`
`have been obvious to include the run-time authentication program within the
`
`executable game/OS files stored in high capacity storage memory. Id. Indeed, a
`
`PHOSITA would understand that the run-time authentication process is a set of
`
`executable instructions and would naturally be included with the executable
`
`game/OS program files on the high capacity storage memory. Gazdic, [0020]; Wolfe
`
`Decl., ¶¶314-328. Further, a PHOSITA would understand that storing the run-time
`
`authentication program in a location different from the authentication program in
`
`boot memory increases security because tampering with one location would be
`
`insufficient to defeat authentication. Id. Thus, the run-time authentication program
`
`from the high capacity storage memory authenticates the authentication program on
`
`boot memory. Id. In turn, the authentication program in boot memory authenticates
`
`the executable game/OS files (including the run-time authentication program). Id.
`
`This is mutual authentication because each of the authentication programs
`
`
`
` 16
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`authenticates the other, rendering the run-time authentication program a “mutual
`
`authentication program.” Id.
`
`To the extent implementing such a functionality in the high capacity memory
`
`would not have been obvious in view of the teachings of Gazdic/Ryan alone, it would
`
`have been obvious in view of Diamant to store within the executable game/OS files
`
`on removeable memory a program (such as the run-time authentication program of
`
`Gazdic) that authenticates the “authentication program” that in turn authenticates the
`
`software on removeable memory. Wolfe Decl., ¶¶314-328.
`
`Diamant teaches a first verification program that can be stored on an external
`
`storage medium (e.g., high capacity memory of Gazdic) to evaluate the authenticity
`
`of a second verification program that, in turn, is used to evaluate the authenticity of
`
`the software stored on the external storage medium. See Diamant, Abstract; [0019;
`
`[0011]; [0015]; [0024]; Wolfe Decl., ¶¶314-328. Diamant provides a mutual
`
`authentication program via a first verification program (“integrity checker 24”) that
`
`can be stored on an external storage medium to evaluate the authenticity of an
`
`authentication program referred to as a second verification program (or “integrity
`
`checking algorithm 22”) that, in turn, is used to evaluate the authenticity of the
`
`content software stored on the external storage medium before it is executed on the
`
`electronic device. See Diamant, Abstract (“using a first verification algorithm or
`
`program to evaluate the integrity or authenticity of a second verification program. .
`
`
`
` 17
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`. . The second verification program may evaluate the authenticity or integrity of …
`
`software … that is included on the attachable device”); [0019] (“For example,
`
`integrity checker 24 may verify or confirm that a verification program such as for
`
`example integrity checking algorithm 22 is valid for use on device 10 and has not
`
`been corrupted or compromised.”); [0011]; [0015]; [0024].
`
`Diamant discloses an embodiment where integrity checker 24 is stored in
`
`device ROM 14 and integrity checking algorithm 22 is stored in attachable memory
`
`device 16. Id., Fig. 1. However, Diamant discloses multiple different embodiments
`
`that reflect flexibility in the placement of these two verification programs. Wolfe
`
`Decl., ¶¶74-82, 314-328. Diamant discloses that integrity checking algorithm 22
`
`(the second verification program) may be stored in memory of device 10 rather than
`
`attachable memory device 16. Diamant, [0015] (“integrity checking algorithm 22
`
`that may be stored for example in a downloaded program, in memory device 16 or
`
`elsewhere in device 10”). Diamant similarly discloses that integrity checker 24 (the
`
`first verification program) may be stored in attachable memory. Id., [0022]
`
`(“instructions that may include … integrity checker 24 may be stored … on … a disc
`
`… or other memory unit”). In this embodiment, “ROM 14 may include a loader
`
`such as for example a boot loader 28 that may read and load a program from …
`
`another data storage device such as memory device 16 into for example RAM 15
`
`and provide such program to processor 12 for execution[.]” Id., [0011]. Thus, in this
`
`
`
` 18
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`embodiment, a PHOSITA would understand that integrity checker 24 may be stored
`
`on removeable memory device 16 and read from that location to RAM for execution
`
`by processor 12. See Wolfe Decl., ¶¶314-328.
`
`Integrity checker 24 (mutual authentication program) “verifies that integrity
`
`checking algorithm 22 is valid.” Diamant, [0015]. Once completed, “processor 12
`
`may load and execute integrity checking algorithm 22 which may check and verify
`
`the integrity of … software … stored on … external memory device 16.” Id.; see
`
`also id., [0012]; [0028]. The authenticated software from the attachable memory
`
`device is then loaded and executed by the electronic device processor. Id., [0015];
`
`[0022]; [0028]; [0033]-[0034]; FIG. 3.
`
`It would have been obvious to a PHOSITA to supplement Gazdic/Ryan’s
`
`executable game/OS files on the high capacity storage memory with Diamant’s first
`
`verification program (integrity checker 24). Wolfe Decl., ¶¶314-328. Gazdic/Ryan
`
`teaches sending executable game/OS files from the high capacity storage memory
`
`to the gaming machine. Id. Similarly, Diamant describes an embodiment, detailed
`
`above, where integrity checker 24 is stored on removeable memory device 16 and is
`
`read into RAM 15 to verify integrity checking algorithm, which can be stored on
`
`device 10. Id.; Diamant at [0015], [0022]. As disclosed in Diamant, the purpose of
`
`integrity checker 24 is to authenticate the main authentication program (integrity
`
`checking algorithm 22).
`
`
`
` 19
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`A PHOSITA would be motivated to make this modification to beneficially
`
`increase the security of Gazdic/Ryan by providing a mutual integrity check on the
`
`“authentication program” using an authentication program stored in a different
`
`location. Id. Diamant expressly teaches authenticating the authentication program,
`
`and a PHOSITA would appreciate that this mutual authentication using programs
`
`stored in different locations provides greater security. Id. Implementation of
`
`Gazdic/Ryan in this way amounts to combining known techniques according to
`
`known methods to obtain a predictable result – a verified authentication program
`
`that in turn authenticates software on external memory. Id. Combining Gazdic/Ryan
`
`with Diamant, thus, would have resulted in a more secure environment in which to
`
`execute software from external storage. Id. Further, given the predictable nature of
`
`computer programming at the time of the ’990 Patent, a PHOSITA would have had
`
`a reasonable expectation of success in modifying Gazdic/Ryan’s executable
`
`game/OS files to include Diamant’s integrity checker 24. Id.
`
`[1(c)] a process device including a readable and rewritable storage unit,
`
`Gazdic/Ryan
`
`teaches a process device (i.e., microprocessor, system
`
`RAM/main memory, and boot memory) including a readable and rewritable storage
`
`unit (i.e., system RAM/main memory). Gazdic, [0018] (“CPU includes a
`
`microprocessor and computer
`
`readable
`
`storage.”); Ryan,
`
`[0024]-[0025].
`
`Gazdic/Ryan teaches that each executable game/OS file in high capacity storage
`
`
`
` 20
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`memory is sequentially authenticated and then loaded to system RAM. Gazdic,
`
`[0029] (“loads each authenticated file into the CPU component (e.g., system RAM)
`
`where the data file will reside and execute from during normal machine operation”);
`
`see id., [0030] (“the data file is loaded to an associated CPU component”).
`
`Additionally, “main memory 36 may be DRAM or SRAM or substantially any other
`
`volatile memory device or reprogrammable non-volatile memory device.” Ryan,
`
`[0025]. The “process device” is discussed further with respect to Claims 1(i)-(j). A
`
`PHOSITA would understand that the “associated CPU component (e.g., system
`
`RAM)” or “main memory” of Gazdic/Ryan is rewritable as it would continuously be
`
`written to with sequentially authenticated executable game/OS files. Wolfe Decl.,
`
`¶¶329-336.
`
`Gazdic/Ryan further teaches that after all executable game/OS files from the
`
`high capacity storage memory are authenticated, “the main software application is
`
`launched from system RAM[.]” Gazdic, [0030]; [0029] (“loads each authenticated
`
`data file into the CPU component (e.g., system RAM) where the data file will reside
`
`and execute from during normal operation”). A PHOSITA would understand that
`
`in order to execute the game data files from system RAM, Gazdic/Ryan’s
`
`microprocessor reads the files from system RAM. Wolfe Decl., ¶¶329-336. The
`
`system RAM or main memory, therefore, is readable and rewritable and included in
`
`a process device. Id.
`
`
`
` 21
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`[1(d)(i)] wherein each of a program storage unit … is included in at least one of
`the loading device and the process device:
`
`
`
`Gazdic/Ryan teaches boot memory (i.e., program storage unit) included in the
`
`process device (i.e., gaming machine CPU including microprocessor, system RAM,
`
`and boot memory). “FIG. 2 is a block diagram of computer-readable storage
`
`contained in the gaming machine” (Gazdic, [0008]):
`
`
`
`Gazdic, Fig. 2; Ryan, Fig. 2. “[B]oot memory stores … an authentication program.”
`
`Gazdic, [0020]; see id., [0005]; Ryan, [0027]; Claim 1(e). This parallels the
`
`description of the program storage unit in the ’990 Patent.’990 Patent, 7:37-38.
`
`[1(d)(ii)] wherein each of … a reading unit … is included in at least one of the
`loading device and the process device:
`
`Gazdic/Ryan teaches a reading unit (i.e., microprocessor) included in the
`
`process device (i.e., microprocessor, system RAM/main memory, and boot memory.
`
`
`
` 22
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`See Claim 1(c); see also Gazdic, [0018]; [0029]; Ryan, [0024]. Gazdic/Ryan teaches
`
`that CPU includes a microprocessor. Gazdic, [0018]; Ryan, [0024].
`
`The microprocessor reads data, such as the game program, from the high
`
`capacity storage medium to generate a hash message digest used during
`
`authentication. See Ryan, [0044]-[0045]; Gazdic, [0020]; [0023]-[0025]; [0044]-
`
`[0045]; Claim 1(f)(ii). The microprocessor also reads the authentication program
`
`out of boot memory. See Gazdic, [0005]; [0018]-[0020], [0025]; [0028]-[0030];
`
`Figs. 4, 5a-5b; see Claim 1(f)(i).
`
`A PHOSITA would understand that the microprocessor is a reading unit
`
`included in the process device. Wolfe Decl., ¶¶342-344; see Claim 1(f)(i)-(ii).
`
`[1(d)(iii)] wherein each of … an authentication unit … is included in at least one
`of the loading device and the process device:
`
`Gazdic/Ryan teaches that the process device (i.e., microprocessor, system
`
`RAM/main memory, and boot memory) includes a microprocessor that authenticates
`
`the game program (i.e., an authentication unit):
`
`FIG. 4 illustrates a method of authenticating the digital signatures 30,
`32, 34, and 36 already stored in the memories. … The method employs
`the boot memory's authentication program, which includes the hash
`function 42, the DSA verify operation 44a, and the public key 46a. …
`
`Gazdic, [0025]; see id., [0005]; [0017] (“A central processing unit (CPU) controls
`
`operation of the gaming machine 10.”); [0019]; [0029] (“File authentication and
`
`
`
` 23
`
`
`
`IPR2020-01218
`U.S. Patent No. 8,095,990
`
`loading sequentially authenticates the executable data files [] ….”); [0030] Fig. 4;
`
`Ryan, [0033]; [0035]; [0044]-[0045]; Fig. 3. A PHOSITA would underst