throbber
Ristenpart Decl.
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________________
`
`Zoom Video Communications, Inc.,
`Petitioner,
`
`v.
`
`Cyph, Inc.,
`Patent Owner.
`______________________________________________________________
`
`Case No. IPR2023-00140
`
`U.S. Patent No. 9,948,625
`Issue Date: April 17, 2018
`
`
`
`
`DECLARATION OF DR. RISTENPART IN SUPPORT OF PETITION FOR
`INTER PARTES REVIEW OF
`U.S. PATENT NO. 9,948,625
`
`
`
`
`
`
`
`
`
`
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 1
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`TABLE OF CONTENTS
`
`Page
`
`INTRODUCTION ........................................................................................... 4
`I.
`QUALIFICATIONS ....................................................................................... 4
`II.
`III. MATERIALS CONSIDERED ........................................................................ 6
`IV. PERSON OF ORDINARY SKILL IN THE ART .......................................... 9
`V.
`LEGAL STANDARDS ................................................................................. 10
`A.
`Relevant Time Period for Invalidity Analysis .................................... 11
`B.
`Claim Construction ............................................................................. 11
`C.
`Anticipation ......................................................................................... 13
`D. Obviousness ........................................................................................ 13
`VI. SUMMARY OF OPINIONS ........................................................................ 16
`VII. TECHNOLOGY BACKGROUND .............................................................. 16
`A.
`Cryptography and Encryption ............................................................. 16
`B.
`Key Distribution in Symmetric Encryption ........................................ 23
`VIII. THE ’625 PATENT ...................................................................................... 24
`A.
`Specification ....................................................................................... 25
`B.
`Prosecution History ............................................................................. 26
`C.
`Challenged Claims .............................................................................. 27
`IX. OVERVIEW OF THE PRIOR ART ............................................................. 28
`A. U.S. Patent No. 6,363,154 (“Peyravian”; Ex. 1005) ........................... 28
`B.
`UK Patent Application Publication No. GB 2 422 277 (“Yeun”; Ex.
`1006) ................................................................................................... 32
`X. GROUNDS ................................................................................................... 35
`A. Ground 1: Claims 1 and 2 Are Obvious Over Peyravian .................... 35
`1.
`Claim 1 ..................................................................................... 35
`a.
`[1.0] “A method, comprising:” ....................................... 35
`
`
`
`1
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 2
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`
`
`B.
`
`b.
`
`c.
`
`d.
`
`e.
`
`f.
`
`g.
`
`[1.1] “generating a shared symmetric key to begin a
`communication session among a group of users by a first
`user;” .............................................................................. 35
`[1.2] “distributing, by the first user, the generated shared
`symmetric key to each user in the group of users;” ....... 40
`[1.3] “communicating within the communication session
`among a group of users, wherein” .................................. 42
`[1.4] “each user encrypts a message to the group of users
`to be distributed through the communication session
`using the generated shared symmetric key, and” ........... 43
`[1.5] “each user decrypts a message received from the
`communication session using the generated shared
`symmetric key;” ............................................................. 46
`[1.6] “wherein additional users are added to the existing
`communication session when the first user distributes to
`the additional users the generated shared symmetric key.”
` ........................................................................................ 47
`Claim 2 ..................................................................................... 49
`a.
`[2.0] “The method of claim 1, further comprising
`changing users within the group of users to reform the
`communication session among a new group of users
`comprises:” ..................................................................... 49
`[2.1] “generating a new shared symmetric key by the first
`user;” .............................................................................. 51
`[2.2] “distributing, by the first user, the generated new
`shared symmetric key to each user in the new group of
`users;” ............................................................................. 51
`[2.3] “communicating to the communication session
`among a new group of users, wherein” .......................... 52
`[2.4] “each user encrypts a message to the new group of
`users to be distributed through the communication
`session using the generated new shared symmetric key,
`and” ................................................................................ 53
`[2.5] “each user decrypts a message received from the
`communication session using the generated new shared
`symmetric key.” ............................................................. 54
`Ground 2: Claims 1 and 2 Are Obvious Over Yeun ........................... 55
`1.
`Claim 1 ..................................................................................... 55
`a.
`[1.0] “A method, comprising:” ....................................... 58
`
`2.
`
`b.
`
`c.
`
`d.
`
`e.
`
`f.
`
`2
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 3
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`b.
`
`c.
`
`d.
`
`e.
`
`f.
`
`g.
`
`[1.1] “generating a shared symmetric key to begin a
`communication session among a group of users by a first
`user;” .............................................................................. 59
`[1.2] “distributing, by the first user, the generated shared
`symmetric key to each user in the group of users;” ....... 64
`[1.3] “communicating within the communication session
`among a group of users, wherein” .................................. 69
`[1.4] “each user encrypts a message to the group of users
`to be distributed through the communication session
`using the generated shared symmetric key, and” ........... 70
`[1.5] “each user decrypts a message received from the
`communication session using the generated shared
`symmetric key;” ............................................................. 74
`[1.6] “wherein additional users are added to the existing
`communication session when the first user distributes to
`the additional users the generated shared symmetric key.”
` ........................................................................................ 76
`Claim 2 ..................................................................................... 77
`a.
`[2.0] “The method of claim 1, further comprising
`changing users within the group of users to reform the
`communication session among a new group of users
`comprises:” ..................................................................... 77
`[2.1] “generating a new shared symmetric key by the first
`user;” .............................................................................. 78
`[2.2] “distributing, by the first user, the generated new
`shared symmetric key to each user in the new group of
`users;” ............................................................................. 79
`[2.3] “communicating to the communication session
`among a new group of users, wherein” .......................... 80
`[2.4] “each user encrypts a message to the new group of
`users to be distributed through the communication
`session using the generated new shared symmetric key,
`and” ................................................................................ 80
`[2.5] “each user decrypts a message received from the
`communication session using the generated new shared
`symmetric key.” ............................................................. 82
`XI. NO SECONDARY CONSIDERATIONS .................................................... 84
`
`
`
`2.
`
`b.
`
`c.
`
`d.
`
`e.
`
`f.
`
`
`
`3
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 4
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`I.
`
`I, Thomas Ristenpart, Ph.D., declare as follows:
`
`INTRODUCTION
`1.
`I have been retained by counsel for Zoom Video Communications,
`
`Inc. (“Petitioner”) to provide my opinion regarding the validity of claims 1 and 2
`
`of U.S. Patent No. 9,948,625 (the “challenged claims” of the “’625 patent”)
`
`(attached as Ex. 1001 to the accompanying Petition for Inter Partes Review).
`
`2.
`
`I am being compensated at my standard rate of $400 per hour (plus
`
`expenses) for this matter. My payment is not contingent in any way on the
`
`outcome of this mater. I have no financial or other personal interest in the outcome
`
`of this matter.
`
`II. QUALIFICATIONS
`3.
`I have summarized in this section my educational background, career
`
`history, publications, and other relevant qualifications. My Curriculum Vitae,
`
`which includes my qualifications as well as my publications, is included as Ex.
`
`1004.
`
`4.
`
`I am an expert in the field of computer security, including applied and
`
`theoretical cryptography and privacy.
`
`5.
`
`I received a Bachelor of Science degree in Computer Science and
`
`Engineering from University of California, Davis in 2003. In 2005, I earned my
`
`Master of Science degree in Computer Science from University of California,
`
`
`
`4
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 5
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`Davis. And, in 2010, I earned a Ph.D. degree in Computer Science from
`
`University of California, San Diego. My doctoral studies focused on computer
`
`security and cryptography. My dissertation topic was on “New Approaches for
`
`Building Cryptographic Hash Functions”, which introduced new design methods
`
`for hash functions, a widely used cryptographic primitive.
`
`6.
`
` My work as an academic researcher has grown to touch on many
`
`areas of applied cryptography, with over one hundred peer-reviewed publications
`
`at the top academic venues in cryptography, security, and beyond. I have published
`
`in the area of encrypted messaging, for example my work on “Traceback for End-
`
`to-End Encrypted Messaging”; “Asymmetric Message Franking: Content
`
`Moderation for Metadata-Private End-to-End Encryption”; and “Orca: Blocklisting
`
`in Sender-Anonymous Messaging”. I served as co-program chair of the Advances
`
`in Cryptology—CRYPTO conference, a flagship publication venue conference of
`
`the International Association of Cryptologic Research (IACR). Being selected to
`
`be co-chair reflects the academic community’s high regard for my breadth and
`
`depth of expertise in cryptography. In addition to my academic work, I have
`
`experience working in industry to build cryptographic systems. I worked part time
`
`at Cloudflare to design and implement advanced cryptographic protocols that are
`
`now deployed for use in helping improve security in practice. Previously I served
`
`on the cryptographic advisory board for Skyhigh Networks, which built
`
`
`
`5
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 6
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`cryptographic security products. My work has also led to many industry standards
`
`of wide use.
`
`III. MATERIALS CONSIDERED
`7.
`In forming the opinions set forth in this Declaration, I have considered
`
`and relied upon my education, research, experience, knowledge, and professional
`
`judgment, all documents cited in this Declaration, and the following documents,
`
`which I understand are being submitted as exhibits along with the Petition:
`
`Exhibit No.
`
`Description
`
`1001
`
`1002
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`U.S. Patent No. 9,948,625 (“’625 patent”)
`
`File History for the ’625 patent (“’625 patent FH”)
`
`U.S. Patent No. 6,363,154 (“Peyravian”)
`
`UK Patent Application Publication No. GB 2 422 277 (“Yeun”)
`
`Gustavus J. Simmons, Symmetric and Asymmetric Encryption,
`Vol. 11, No. 4 ACM Computing Surveys 305-330 (Dec. 1979),
`available at https://dl.acm.org/doi/10.1145/356789.356793
`
`Whitfield Diffie & Martin E. Hellman, New Directions in
`Cryptography, IEEE Trans. on Information Theory, vol. IT-22, no.
`6, pp. 644–654 (Nov. 1976), available at
`https://ieeexplore.ieee.org/document/1055638;
`https://ee.stanford.edu/~hellman/publications/24.pdf
`
`R.L. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining
`Digital Signatures and Public-Key Cryptosystems, Commc’n of
`the ACM, vol. 21, no. 2, pp. 120–126 (Feb. 1978), available at
`https://dl.acm.org/doi/10.1145/359340.359342
`
`1010
`
`U.S. Patent No. 4,405,829
`
`
`
`6
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 7
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`
`
`Exhibit No.
`
`Description
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`1017
`
`Neal Koblitz, Elliptic Curve Cryptosystems, Mathematics of
`Computation, vol. 48, no. 177, pp. 203–209 (Jan. 1987), available
`at https://www.jstor.org/stable/2007884;
`https://www.ams.org/journals/mcom/1987-48-177/S0025-5718-
`1987-0866109-5/
`
`Nat’l Inst. of Standards & Tech., U.S. Dep’t. of Com., FIPS PUB
`180-1 (Secure Hash Standard) (Apr. 17, 1995) (withdrawn on
`Aug. 1, 2002, and superseded by FIPS 180-2), available at
`https://csrc.nist.gov/publications/detail/fips/180/1/archive/1995-
`04-17
`
`Nat’l Inst. of Standards & Tech., U.S. Dep’t. of Com., FIPS PUB
`180-4 (Secure Hash Standard (SHS)) (Mar. 2012) (withdrawn on
`Aug. 5, 2015), available at
`https://csrc.nist.gov/publications/detail/fips/180/4/archive/2012-
`03-06
`
`Simon Singh, THE CODE BOOK: THE SCIENCE OF SECRECY FROM
`ANCIENT EGYPT TO QUANTUM CRYPTOGRAPHY (First Anchor
`Books Ed., Sept. 2000), available at https://books-
`library.net/files/books-library.net-04040109Rq2I5.pdf (“The Code
`Book”)
`
`Cyph, Inc. v. Zoom Video Communications, Inc., No. 4:22-cv-
`00561-JSW, Dkt. No. 58 (N.D. Cal. July 11, 2022)
`
`Raymond B. Jennings III et al., A Study of Internet Instant
`Messaging and Chat Protocols, Vol. 20, Issue 4 IEEE Network
`pp. 16–21 (July/August 2006), available at
`https://ieeexplore.ieee.org/document/1668399
`
`Bazara I.A. Barry & Fatma M. Tom, Instant Messaging:
`Standards, Protocols, Applications, and Research Directions, in
`INTERNET POLICIES AND ISSUES, VOL. 7 1-15 (Chapter 8) (B.G.
`Kutais ed., Nova Science Publishers, Inc. 2010), available at
`https://www.researchgate.net/publication/280307922_Instant_Mes
`
`7
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 8
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`
`
`Exhibit No.
`
`Description
`saging_Standards_Protocols_Applications_and_Research_Directio
`ns
`
`1018
`
`1019
`
`1020
`
`1021
`
`1022
`
`1023
`
`1024
`
`Adam Pash, Chat with AIM, MSN, Yahoo, and other contacts over
`Google Talk, LifeHacker (Aug. 14, 2007),
`https://lifehacker.com/chat-with-aim-msn-yahoo-and-other-
`contacts-over-goog-289097
`
`Cyph, Inc. v. Zoom Video Communications, Inc., No. 22-cv-
`00561-JSW, Dkt. No. 74 (N.D. Cal. Oct. 7, 2022), Dkt. No. 75
`(N.D. Cal. Oct. 11, 2022).
`
`Table N/A—U.S. District Courts–Combined Civil and Criminal
`Federal Court Management Statistics (June 30, 2022),
`https://www.uscourts.gov/statistics/table/na/federal-court-
`management-statistics/2022/06/30-2
`
`Cyph, Inc. v. Zoom Video Communications, Inc., No. 21-cv-
`03027-RM-MEH, Dkt. No. 32 (D. Co. Jan. 27, 2022)
`
`National Institute of Standards and Technology’s Cryptography
`website, https://www.nist.gov/cryptography
`
`Nat’l Inst. of Standards & Tech., U.S. Dep’t. of Com., NIST SP
`800-90A (Recommendation for Random Number Generation
`Using Deterministic Random Bit Generators) (January 23, 2012)
`(withdrawn June 2015, and superseded by SP 800-90A Revision
`1), available at
`https://www.nist.gov/publications/recommendation-random-
`number-generation-using-deterministic-random-bit-generators-
`3?pub_id=910345
`
`Nat’l Inst. of Standards & Tech., U.S. Dep’t. of Com., FIPS PUB
`197 (Advanced Encryption Standard (AES)) (Nov. 26, 2001),
`available at https://www.nist.gov/publications/advanced-
`encryption-standard-aes
`
`8
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 9
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`Exhibit No.
`
`Description
`
`1025
`
`Nat’l Inst. of Standards & Tech., U.S. Dep’t. of Com., FIPS PUB
`46 (Data Encryption Standard (DES)) (Jan. 15, 1977), available at
`https://csrc.nist.gov/publications/detail/fips/46/archive/1977-01-15
`
`IV. PERSON OF ORDINARY SKILL IN THE ART
`8.
`I understand that an assessment of the validity of the patent claims
`
`should be considered from the perspective of a person of ordinary skill in the art
`
`(“POSA”).
`
`9.
`
`I have been advised by counsel that a POSA is a person who
`
`possesses conventional wisdom in the art and is presumed to be aware of all
`
`relevant art at the time of the invention. To determine the appropriate level of a
`
`POSA, the following factors may be considered: (1) the type of problems
`
`encountered in the art; (2) prior art solutions to those problems; (3) the rapidity
`
`with which innovations are made; (4) the sophistication of the technology; and (5)
`
`the educational level of active workers in the field.
`
`10. As described in detail below, the ’625 patent purports to relate to
`
`cryptography and encrypted group communications, in particular, a
`
`communication session among a group of users who encrypt and decrypt data
`
`using the same key. Ex. 1001, Title; 1:58–60; Claims 1–2. The ’625 patent relies
`
`on obvious variations of elements that were well known for many years before
`
`2015, such as symmetric key encryption and distribution of symmetric keys.
`
`
`
`9
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 10
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`11.
`
`In view of the purported invention of the ’625 patent and my
`
`experience as a practicing engineer and researcher in this field since at least the
`
`early 2000s, it is my opinion that a POSA at the time of the alleged invention of
`
`the ’625 patent (approximately January of 2015) would have at least a bachelor’s
`
`degree (or equivalent) in applied mathematics, computer science, computer
`
`engineering, electrical engineering, or a related field, and at least one year of
`
`undergraduate (or higher level) coursework, industry experience, or equivalent
`
`research experience in the field of cryptography, and at least one year of
`
`undergraduate (or higher) coursework, industry experience, or equivalent research
`
`experience in the field of instant messaging or chat applications or video- or audio-
`
`conferencing applications. This description is approximate, and a higher level of
`
`education or skill might make up for less experience, and vice versa.
`
`12. My analysis and opinions stated in this Declaration would remain the
`
`same even if a POSA were determined to have somewhat more or less education
`
`and/or experience than I have described above.
`
`V. LEGAL STANDARDS
`13.
`I am not an attorney, but in expressing my opinions in this Declaration
`
`and considering the subject matter of the claims of the ’625 patent, I am relying on
`
`certain legal principles counsel has provided and explained to me.
`
`
`
`10
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 11
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`A. Relevant Time Period for Invalidity Analysis
`14.
`I have been asked to assume that the priority date for the claims of the
`
`’625 patent is January 7, 2015, the filing date of a provisional application No.
`
`62/100,684. Therefore, for the purposes of this Declaration, I have analyzed
`
`validity from the perspective of a POSA as of January 2015.
`
`B. Claim Construction
`15.
`I understand that when evaluating the validity of patent claims, claim
`
`terms are generally given their ordinary and customary meaning, which is the
`
`meaning that the term would have to a POSA as of the effective filing date of the
`
`patent. I also understand that a POSA is deemed to read the claim term not only in
`
`the context of the particular claim which a claim term appears, but in the context of
`
`the entire patent, including the specification.
`
`16. Counsel has informed me that, in the pending district court case,
`
`Patent Owner took the position that the phrase “wherein additional users are added
`
`to the existing communication session when the first user distributes to the
`
`additional users the generated shared symmetric key” (element [1.6]) “is a
`
`conditional statement that is not performed in all instances” and requires that “the
`
`referenced step [be] performed only when ‘additional users’ are desired to be
`
`added.” Ex. 1015, 7–8 (emphasis in original).
`
`
`
`11
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 12
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`17.
`
`I disagree that this phrase is a conditional statement and is therefore
`
`optional.
`
`18.
`
`I also understand that Applicant added this phrase to overcome prior
`
`art cited by the Examiner during prosecution of the application that issued as the
`
`’625 patent. Ex. 1002, 98–102 (explaining that the prior art “describes creating a
`
`new group of users either ‘by inviting users’ or ‘receiving requests to join from a
`
`user’ which is different from adding additional users to the existing
`
`communication session” (emphasis added by Applicant)); see also id., 30–32, 132–
`
`137; Section VIII.B, below. Thus, if this limitation was optional, the claim could
`
`not be distinguished from the prior art considered by the Examiner when the
`
`condition is not met. And Applicant did not argue during prosecution that the
`
`phrase is optional or that the step need not be performed to practice the claim.
`
`19. My analysis and opinions in this Declaration do not depend on any
`
`particular construction of terms in the challenged claims. I have applied what I
`
`believe a POSA would consider to be the plain and ordinary meaning of all claim
`
`terms. It is my opinion that the prior art discussed below discloses the subject
`
`matter of the challenged claims under any reasonable construction of the claim
`
`terms as discussed below.
`
`
`
`12
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 13
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`20. Even under Patent Owner’s claim construction position, however, I
`
`conclude that the prior art discussed below discloses the subject matter of the
`
`challenged claims as discussed below.
`
`C. Anticipation
`21.
`I understand that patent claims may be invalid as “anticipated” in
`
`view of a single prior art reference. Counsel has informed me that a patent claim is
`
`anticipated by the prior art if each and every element of the claim is express or
`
`inherently disclosed in a single prior art reference.
`
`D. Obviousness
`22.
`It is my understanding that a patent claim is invalid if the claimed
`
`invention, as a whole, would have been obvious to a POSA at the time of the
`
`critical date—the effective filing date in the case of the ’625 patent—in view of the
`
`prior art in the field and analogous fields.
`
`23.
`
`I understand that the following factors are considered as part of the
`
`obviousness inquiry: (1) the scope and content of the prior art; (2) the differences
`
`between the prior art and the claims at issue; (3) the level of ordinary skill in the
`
`pertinent art; and (4) secondary considerations such as commercial success, long
`
`felt but unsolved needs, failure of others, and simultaneous invention. I understand
`
`that a “nexus” must be established between the evidence of secondary
`
`
`
`13
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 14
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`considerations and what is both claimed and novel in the claim at issue for such
`
`evidence to be relevant to the obviousness analysis.
`
`24.
`
`I understand that a reference qualifies as prior art for obviousness
`
`purposes when it is analogous to the claimed invention. The reference is
`
`analogous art (thus prior art) to the claimed invention if: (1) the reference is from
`
`the same field of endeavor as the claimed invention (even if it addresses a different
`
`problem); or (2) the reference is reasonably pertinent to the problem faced by the
`
`inventor (even if it is not in the same field of endeavor as the claimed invention).
`
`25.
`
`I understand that obviousness may be shown by demonstrating that it
`
`would have been obvious to modify what is taught in a single piece of prior art, or
`
`to combine the teachings of more than one prior art reference, to create the claimed
`
`invention. In determining whether a piece of prior art could have been modified,
`
`or combined with other prior art references or with other information within the
`
`knowledge of a POSA, the following are examples of approaches and rationales
`
`that may be considered:
`
`a.
`
`b.
`
`c.
`
`Combining prior art elements according to known methods to
`yield predictable results;
`Simple substitution of one known element for another to obtain
`predictable results;
`Use of known technique to improve similar devices (methods,
`or products) in the same way;
`
`
`
`14
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 15
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`26.
`
`d.
`
`e.
`
`Applying a known technique to a known device (method, or
`product) ready for improvement to yield predictable results;
`Applying a technique or approach that would have been
`“obvious to try” (that is, choosing from a finite number of
`identified, predictable solutions, with a reasonable expectation
`of success);
`Known work in one field of endeavor may prompt variations of
`it for use in either the same field or a different one based on
`design incentives or other market forces if the variations are
`predictable to a POSA; or
`Some teaching, suggestion, or motivation in the prior art that
`would have led a POSA to modify the prior art reference or to
`combine prior art reference teachings to arrive at the claimed
`invention.
`I understand that the suggestion or motivation may come from such
`
`f.
`
`g.
`
`sources as explicit statements in the prior art or from the knowledge or common
`
`sense of a POSA. I also understand that a motivation to combine may be found
`
`explicitly or implicitly in market forces; design incentives; the interrelated
`
`teachings of multiple patents; any need or problem known in the field of endeavor
`
`at the time of invention and addressed by the patent; and the background
`
`knowledge, creativity, and common sense of a POSA.
`
`27.
`
`I understand that the approaches and rationales listed above are not
`
`exhaustive. Other approaches and rationales may also support a conclusion of
`
`obviousness.
`
`
`
`15
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 16
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`28.
`
`I understand that an invention that might be considered an obvious
`
`variation or modification of the prior art may be considered non-obvious if one or
`
`more prior art references discourage or teach away from the line of inquiry
`
`disclosed in the reference(s). However, for purposes of assessing obviousness, a
`
`reference does not “teach away” from an invention simply because the reference
`
`expresses a general preference for an alternative invention. It is my understanding
`
`that the doctrine of teaching away requires an indication that the combination
`
`should not be attempted, because, for example, the combination would fail and/or
`
`be inoperative for its intended purpose.
`
`VI. SUMMARY OF OPINIONS
`29.
`It is my opinion that claims 1 and 2 of the ’625 patent are obvious
`
`over U.S. Patent No. 6,363,154 (“Peyravian”; Ex. 1005).
`
`30.
`
`It is my opinion that claims 1 and 2 of the ’625 patent are obvious
`
`over UK Patent Application Publication No. GB 2 422 277 (“Yeun”; Ex. 1006) in
`
`view of National Institute of Standards and Technology (“NIST”) Special
`
`Publication (SP) 800-90A “Recommendation for Random Number Generation
`
`Using Deterministic Random Bit Generators” (“Barker”; Ex. 1024).
`
`VII. TECHNOLOGY BACKGROUND
`A. Cryptography and Encryption
`31. The title of the ’625 patent is “Encrypted Group Communication
`
`Method.” Ex. 1001, Title. It states that the “embodiments herein generally relate
`
`
`
`16
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 17
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`to cryptography, and, more particularly, to a method of encrypted group
`
`communications.” Id., 1:58–60.
`
`32. Cryptography is the science, and art, of secret writing. One of the
`
`goals of cryptography is to prevent an unauthorized and unintended receiver from
`
`determining the content of the message being communicated. Ex. 1007, 306.
`
`33. Encryption is an application of cryptography. It produces an
`
`unintelligible, scrambled message (called “ciphertext”) by applying a key to a
`
`plain, original message (called “plaintext”). Ex. 1014, 11; Ex. 1007, 307.
`
`Decryption reverses that process—it is the process of unscrambling (or recovering)
`
`the scrambled message. Ex. 1014, 11; Ex. 1007, 307. Figure 4 of The Code Book
`
`schematically illustrates the encryption and decryption process:
`
`
`
`Ex. 1014, 11.
`
`34. One of the benefits of cryptography is that only the key needs to be
`
`kept secret from unauthorized parties. See Ex. 1014, 11; Ex. 1007, 307. The
`
`encrypted message (i.e., ciphertext) may be eavesdropped or intercepted by
`
`unauthorized parties during the transmission, but its content is protected by
`
`
`
`17
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 18
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`safeguarding the key that should not be exposed. Thus, only the authorized
`
`receiver, who has the right key (or who is able to deduce the right key), should be
`
`able to recover (i.e., decrypt) the encrypted message. See Ex. 1014, 11. Any
`
`unauthorized receiver should not be able to deduce either the message or the
`
`unknown key.
`
`35. The use of keys for purposes of encryption is ancient. History records
`
`that Julius Caesar famously used a substitution shift (the “Caesar shift”) that
`
`replaces each letter in the message with the letter three places further on in the
`
`alphabet (i.e., key) to send a message to Cicero. Ex. 1014, 9–12; see Ex. 1007,
`
`307. For example, “veni, vidi, vici” is encrypted to “YHQL, YLGL, YLFL.”
`
`
`
`Ex. 1014, 10. According to the convention in cryptography, the plain alphabet is
`
`written in lower case letters and the cipher alphabets are written capitals. Id.
`
`36. The “key” to the Caesar shift is that each letter was replaced by the
`
`letter three places further on. The reader who knows this key can recover the
`
`original message by reversing the encryption process and replacing each letter by
`
`the letter three places ahead in the alphabet.
`
`
`
`18
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 19
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00140)
`
`

`

`
`
`37. The Caesar shift is an example of “symmetric” or “symmetric key”
`
`encryption. The same key (or keys that can be easily computed from each other) is
`
`used for both encryption and decryption. Ex. 1007, 305, 316–318; see Ex. 1008,
`
`644–646. Anyone who knows a particular symmetric key would be able to decrypt
`
`the message encrypted with that symmetric key. It is therefore important that the
`
`symmetric key remains a secret and is known only to the authorized parties to the
`
`communication if the content of the communication is to remain private among the
`
`authorized parties and inaccessible to unauthorized parties. Seeid., 644–645.
`
`Thus, symmetric encryption is also known as “secret key” cryptography. Because
`
`any insecure distribution of the symmetric key would risk unauthorized access to
`
`confidential communications encrypted using the symmetric key, it has long been
`
`known, and would be readily apparent to a POSA, that secure distribution of the
`
`symmetric key is critical to maintaining the privacy and security of
`
`communications encrypted using the symmetric key. See id., 644–646.
`
`38. A more complex application of symmetric key encryption are the
`
`Enigma machines used during World War II. “The strength of the cipher depends
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket