throbber
Inter Partes Review of
`U.S. Patent No. 9,948,625
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________________
`
`Zoom Video Communications, Inc.,
`Petitioner,
`
`v.
`
`Cyph, Inc.,
`Patent Owner.
`______________________________________________________________
`
`Case No. IPR2023-00140
`
`U.S. Patent No. 9,948,625
`Issue Date: April 17, 2018
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW OF
`U.S. PATENT NO. 9,948,625
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Inter Partes Review of
`U.S. Patent No. 9,948,625
`TABLE OF CONTENTS
`
`Page
`
`V.
`
`C.
`
`I.
`INTRODUCTION ........................................................................................ 1
`GROUNDS FOR STANDING (37 C.F.R. § 42.104(A)) ............................... 2
`II.
`IDENTIFICATION OF CHALLENGES (37 C.F.R. § 42.104(B))................ 2
`III.
`IV. TECHNOLOGY BACKGROUND............................................................... 3
`A.
`Cryptography and Encryption ............................................................. 3
`B.
`Key Distribution in Symmetric Encryption ......................................... 5
`THE ’625 PATENT ...................................................................................... 6
`A.
`Specification ....................................................................................... 6
`B.
`Prosecution History............................................................................. 7
`VI. PERSON OF ORDINARY SKILL IN THE ART ....................................... 10
`VII. CLAIM CONSTRUCTION ........................................................................ 11
`VIII. OVERVIEW OF THE PRIOR ART ........................................................... 13
`A. U.S. Patent No. 6,363,154 (“Peyravian”; Ex. 1005) .......................... 13
`B.
`UK Patent Application Publication No. GB 2 422 277 (“Yeun”; Ex.
`1006) ................................................................................................ 15
`National Institute of Standards & Technology, Special Publication
`800-90A (“Barker”; Ex. 1023) .......................................................... 17
`IX. GROUNDS ................................................................................................. 18
`A. Ground 1: Claims 1 and 2 Are Obvious Over Peyravian ................... 18
`1.
`Claim 1 ................................................................................... 18
`a.
`[1.0] “A method, comprising:” ...................................... 18
`b.
`[1.1] “generating a shared symmetric key to begin a
`communication session among a group of users by a first
`user;” ............................................................................ 18
`[1.2] “distributing, by the first user, the generated shared
`symmetric key to each user in the group of users;” ....... 23
`
`c.
`
`
`
`
`
`i
`
`
`
`

`

`d.
`
`e.
`
`f.
`
`g.
`
`b.
`
`c.
`
`d.
`
`e.
`
`f.
`
`[1.3] “communicating within the communication session
`among a group of users, wherein” ................................. 24
`[1.4] “each user encrypts a message to the group of users
`to be distributed through the communication session
`using the generated shared symmetric key, and” ........... 26
`[1.5] “each user decrypts a message received from the
`communication session using the generated shared
`symmetric key;” ............................................................ 28
`[1.6] “wherein additional users are added to the existing
`communication session when the first user distributes to
`the additional users the generated shared symmetric key.”
`...................................................................................... 29
`Claim 2 ................................................................................... 30
`a.
`[2.0] “The method of claim 1, further comprising
`changing users within the group of users to reform the
`communication session among a new group of users
`comprises:” ................................................................... 30
`[2.1] “generating a new shared symmetric key by the first
`user;” ............................................................................ 31
`[2.2] “distributing, by the first user, the generated new
`shared symmetric key to each user in the new group of
`users;” ........................................................................... 32
`[2.3] “communicating to the communication session
`among a new group of users, wherein” ......................... 32
`[2.4] “each user encrypts a message to the new group of
`users to be distributed through the communication
`session using the generated new shared symmetric key,
`and” .............................................................................. 33
`[2.5] “each user decrypts a message received from the
`communication session using the generated new shared
`symmetric key.” ............................................................ 34
`Ground 2: Claims 1 and 2 Are Obvious Over Yeun in View of Barker
`.......................................................................................................... 36
`1.
`Obviousness to a POSA .......................................................... 36
`a. Motivation to Combine ................................................. 36
`b.
`Reasonable Expectation of Success ............................... 37
`Claim 1 ................................................................................... 38
`a.
`[1.0] “A method, comprising:” ...................................... 38
`
`2.
`
`2.
`
`B.
`
`
`
`
`
`ii
`
`
`
`

`

`b.
`
`c.
`
`d.
`
`e.
`
`f.
`
`g.
`
`[1.1] “generating a shared symmetric key to begin a
`communication session among a group of users by a first
`user;” ............................................................................ 39
`[1.2] “distributing, by the first user, the generated shared
`symmetric key to each user in the group of users;” ....... 43
`[1.3] “communicating within the communication session
`among a group of users, wherein” ................................. 44
`[1.4] “each user encrypts a message to the group of users
`to be distributed through the communication session
`using the generated shared symmetric key, and” ........... 45
`[1.5] “each user decrypts a message received from the
`communication session using the generated shared
`symmetric key;” ............................................................ 49
`[1.6] “wherein additional users are added to the existing
`communication session when the first user distributes to
`the additional users the generated shared symmetric key.”
`...................................................................................... 50
`Claim 2 ................................................................................... 51
`a.
`[2.0] “The method of claim 1, further comprising
`changing users within the group of users to reform the
`communication session among a new group of users
`comprises:” ................................................................... 51
`[2.1] “generating a new shared symmetric key by the first
`user;” ............................................................................ 52
`[2.2] “distributing, by the first user, the generated new
`shared symmetric key to each user in the new group of
`users;” ........................................................................... 54
`[2.3] “communicating to the communication session
`among a new group of users, wherein” ......................... 54
`[2.4] “each user encrypts a message to the new group of
`users to be distributed through the communication
`session using the generated new shared symmetric key,
`and” .............................................................................. 55
`[2.5] “each user decrypts a message received from the
`communication session using the generated new shared
`symmetric key.” ............................................................ 57
`X. NO SECONDARY CONSIDERATIONS................................................... 58
`XI. DISCRETIONARY DENIAL IS NOT APPROPRIATE ............................ 59
`
`3.
`
`b.
`
`c.
`
`d.
`
`e.
`
`f.
`
`
`
`
`
`iii
`
`
`
`

`

`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`A.
`
`B.
`
`Advanced Bionics and Becton, Dickinson Factors Do Not Support
`Discretionary Denial ......................................................................... 59
`Fintiv Factors Do Not Favor Discretionary Denial ............................ 60
`1.
`First Factor: whether a stay exists or is likely to be granted if a
`proceeding is instituted ........................................................... 60
`Second Factor: proximity of the court’s trial date to the Board’s
`projected statutory deadline for a final written decision .......... 61
`Third Factor: investment in the parallel proceeding by the court
`and the parties ......................................................................... 62
`Fourth Factor: overlap between issues raised in the petition and
`in the parallel proceeding ........................................................ 62
`Fifth Factor: whether the petitioner and the defendant in the
`parallel proceeding are the same party .................................... 63
`Sixth Factor: other circumstances that impact the Board’s
`exercise of discretion, including the merits ............................. 63
`General Plastic Does Not Apply....................................................... 63
`C.
`XII. MANDATORY NOTICES (37 C.F.R. § 42.8)............................................ 63
`A.
`Real Party-In-Interest ........................................................................ 63
`B.
`Related Matters ................................................................................. 63
`C.
`Lead and Back-Up Counsel and Service Information ........................ 64
`XIII. PAYMENT OF FEES (37 C.F.R. §§ 42.15(A) & 42.103) .......................... 65
`XIV. CONCLUSION .......................................................................................... 65
`
`
`
`
`
`
`
`iv
`
`
`
`

`

`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`Advanced Bionics, LLC v. Med-El Elektromedizinische Geräte GmbH,
`IPR2019-01469 (P.T.A.B. Feb. 13, 2020) ........................................................ 59
`Becton, Dickinson, & Co. v. B. Braun Melsungen AG,
`IPR2017-01586 (P.T.A.B. Dec. 15, 2017)........................................................ 59
`
`Brown v. 3M,
`265 F.3d 1349 (Fed. Cir. 2001) ........................................................................ 12
`Gen. Plastic Indus. Co., Ltd. v. Canon Kubushiki Kaisha,
`IPR2016-01357 (P.T.A.B. Sept. 6, 2017) ......................................................... 63
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) ........................................................................ 11
`Samsung Elecs. Co., Ltd v. Staton Techiya, LLC,
`IPR2022-00302 (P.T.A.B. July 11, 2022) .................................................. 61, 62
`Sand Revolution II, LLC v. Continental Intermodal Group-Trucking LLC,
`IPR2019-01393 (P.T.A.B. June 16, 2020) ........................................................ 61
`Statutes
`35 U.S.C. § 102(a) .................................................................................... 13, 15, 17
`35 U.S.C. § 103 ........................................................................................ 3, 8, 9, 10
`Other Authorities
`37 C.F.R. § 42.10(b) ............................................................................................. 64
`Interim Procedure for Discretionary Denials in AIA Post-Grant
`Proceedings with Parallel District Court Litigation
`(USPTO June 21, 2022) ............................................................................. 60, 62
`
`
`
`
`
`v
`
`
`
`

`

`TABLE OF EXHIBITS
`
`Exhibit No. Description
`1001
`U.S. Patent No. 9,948,625 (“’625 patent”)
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`File History for the ’625 patent (“’625 patent FH”)
`
`Declaration of Dr. Thomas Ristenpart (“Ristenpart Decl.”)
`
`Curriculum Vitae of Dr. Thomas Ristenpart
`
`U.S. Patent No. 6,363,154 (“Peyravian”)
`
`UK Patent Application Publication No. GB 2 422 277 (“Yeun”)
`
`Gustavus J. Simmons, Symmetric and Asymmetric Encryption,
`Vol. 11, No. 4 ACM Computing Surveys 305-330 (Dec. 1979),
`available at https://dl.acm.org/doi/10.1145/356789.356793
`
`Whitfield Diffie & Martin E. Hellman, New Directions in
`Cryptography, IEEE Trans. on Information Theory, vol. IT-22, no.
`6, pp. 644-654 (Nov. 1976), available at
`https://ieeexplore.ieee.org/document/1055638;
`https://ee.stanford.edu/~hellman/publications/24.pdf
`
`R.L. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining
`Digital Signatures and Public-Key Cryptosystems, Commc’n of
`the ACM, vol. 21, no. 2, pp. 120-126 (Feb. 1978), available at
`https://dl.acm.org/doi/10.1145/359340.359342
`
`1010
`
`U.S. Patent No. 4,405,829
`
`1011
`
`Neal Koblitz, Elliptic Curve Cryptosystems, Mathematics of
`Computation, vol. 48, no. 177, pp. 203-209 (Jan. 1987), available
`at https://www.jstor.org/stable/2007884;
`https://www.ams.org/journals/mcom/1987-48-177/S0025-5718-
`1987-0866109-5/
`
`
`
`
`
`vi
`
`
`
`

`

`Exhibit No. Description
`Nat’l Inst. of Standards & Tech., U.S. Dep’t. of Com., FIPS PUB
`180-1 (Secure Hash Standard) (Apr. 17, 1995) (withdrawn on
`Aug. 1, 2002, and superseded by FIPS 180-2), available at
`https://csrc.nist.gov/publications/detail/fips/180/1/archive/1995-
`04-17
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`1017
`
`1018
`
`Nat’l Inst. of Standards & Tech., U.S. Dep’t. of Com., FIPS PUB
`180-4 (Secure Hash Standard (SHS)) (Mar. 2012) (withdrawn on
`Aug. 5, 2015), available at
`https://csrc.nist.gov/publications/detail/fips/180/4/archive/2012-
`03-06
`
`Simon Singh, THE CODE BOOK: THE SCIENCE OF SECRECY FROM
`ANCIENT EGYPT TO QUANTUM CRYPTOGRAPHY (First Anchor
`Books Ed., Sept. 2000), available at https://books-
`library.net/files/books-library.net-04040109Rq2I5.pdf (“The Code
`Book”)
`
`Cyph, Inc. v. Zoom Video Communications, Inc., No. 4:22-cv-
`00561-JSW, Dkt. No. 58 (N.D. Cal. July 11, 2022)
`
`Raymond B. Jennings III et al., A Study of Internet Instant
`Messaging and Chat Protocols, Vol. 20, Issue 4 IEEE Network
`pp. 16-21 (July/August 2006), available at
`https://ieeexplore.ieee.org/document/1668399
`
`Bazara I.A. Barry & Fatma M. Tom, Instant Messaging:
`Standards, Protocols, Applications, and Research Directions, in
`INTERNET POLICIES AND ISSUES, VOL. 7 1-15 (Chapter 8) (B.G.
`Kutais ed., Nova Science Publishers, Inc. 2010), available at
`https://www.researchgate.net/publication/280307922_Instant_Mes
`saging_Standards_Protocols_Applications_and_Research_Directio
`ns
`
`Adam Pash, Chat with AIM, MSN, Yahoo, and other contacts over
`Google Talk, LifeHacker (Aug. 14, 2007),
`https://lifehacker.com/chat-with-aim-msn-yahoo-and-other-
`contacts-over-goog-289097
`
`
`
`
`
`vii
`
`
`
`

`

`Exhibit No. Description
`Cyph, Inc. v. Zoom Video Communications, Inc., No. 22-cv-
`00561-JSW, Dkt. No. 74 (N.D. Cal. Oct. 7, 2022), Dkt. No. 75
`(N.D. Cal. Oct. 11, 2022).
`
`1019
`
`Table N/A—U.S. District Courts-Combined Civil and Criminal
`Federal Court Management Statistics (June 30, 2022),
`https://www.uscourts.gov/statistics/table/na/federal-court-
`management-statistics/2022/06/30-2
`
`Cyph, Inc. v. Zoom Video Communications, Inc., No. 21-cv-
`03027-RM-MEH, Dkt. No. 32 (D. Co. Jan. 27, 2022)
`
`National Institute of Standards and Technology’s Cryptography
`website, https://www.nist.gov/cryptography
`
`Nat’l Inst. of Standards & Tech., U.S. Dep’t. of Com., NIST SP
`800-90A (Recommendation for Random Number Generation
`Using Deterministic Random Bit Generators) (January 23, 2012)
`(withdrawn June 2015, and superseded by SP 800-90A Revision
`1), available at
`https://www.nist.gov/publications/recommendation-random-
`number-generation-using-deterministic-random-bit-generators-
`3?pub_id=910345
`
`Nat’l Inst. of Standards & Tech., U.S. Dep’t. of Com., FIPS PUB
`197 (Advanced Encryption Standard (AES)) (Nov. 26, 2001),
`available at https://www.nist.gov/publications/advanced-
`encryption-standard-aes
`
`Nat’l Inst. of Standards & Tech., U.S. Dep’t. of Com., FIPS PUB
`46 (Data Encryption Standard (DES)) (Jan. 15, 1977), available at
`https://csrc.nist.gov/publications/detail/fips/46/archive/1977-01-15
`
`1020
`
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`
`
`
`
`
`
`viii
`
`
`
`

`

`
`
`I.
`
`INTRODUCTION
`U.S. Patent No. 9,948,625 (the “’625 patent”) relates to encrypted group
`
`communication methods, and in particular, a communication session among a
`
`group of users who encrypt and decrypt data using the same key. As shown below,
`
`the claimed methods are nothing new and amount to nothing more than the routine
`
`use of basic encryption concepts known long before the 2015 earliest possible
`
`priority date for the ’625 patent.
`
`Encryption is the process of turning plain, original messages into
`
`unintelligible, scrambled data; decryption is the process of turning the scrambled
`
`data back to the original messages. An encryption key specifies the exact details of
`
`particular encryption and decryption methods. When, as is claimed in the ’625
`
`patent, users encrypt and decrypt data using the same key, that is referred to as
`
`“symmetric” or “symmetric key” encryption—a technique that long predates the
`
`’625 patent. Because whoever knows the key used for encrypting a message can
`
`also decrypt that message in symmetric encryption, it has also long been known
`
`that it is vital to distribute the key only to the authorized parties to the
`
`communication and to safeguard the key among them.
`
`The ’625 patent adds nothing new to these old concepts. The purported
`
`invention reflected in claims 1 and 2 of the ’625 patent (“challenged claims”) is to
`
`use the same key that was previously used to form the communication session
`
`1
`
`

`

`
`
`when adding new users to the “existing communication session.” Ex. 1001, 10:32-
`
`35; Ex. 1002, 28-32, 98-102. But the idea of using the same key to add new users
`
`to the existing communication session was also not new, and was taught by the
`
`prior art. The Examiner, however, was not given the opportunity to consider the
`
`references discussed in this Petition, nor any analogous prior art. Indeed, not even
`
`a single Information Disclosure Statement (“IDS”) was filed by Applicant during
`
`prosecution—all of the references considered during prosecution were located by
`
`the Examiner, without help from Applicant. Those unassisted searches did not
`
`locate the art discussed below, which art demonstrates that the challenged claims
`
`are unpatentable obvious combinations of well-known elements. Because this
`
`Petition demonstrates a reasonable likelihood that at least one of the challenged
`
`claims is obvious, Petitioner respectfully requests that trial be instituted.
`
`II. GROUNDS FOR STANDING (37 C.F.R. § 42.104(a))
`Petitioner certifies that the patent for which review is sought is available for
`
`inter partes review and that the Petitioner is not barred or estopped from requesting
`
`an inter partes review challenging the patent claims on the grounds identified in
`
`this Petition.
`
`III.
`
`IDENTIFICATION OF CHALLENGES (37 C.F.R. § 42.104(b))
`Petitioner requests that the Board institute inter partes review of the
`
`challenged claims on the following grounds:
`
`2
`
`

`

`
`
`Ground 1: Claims 1 and 2 are unpatentable under 35 U.S.C. § 103 as
`
`obvious over Peyravian (Ex. 1005).
`
`Ground 2: Claims 1 and 2 are unpatentable under 35 U.S.C. § 103 as
`
`obvious over Yeun (Ex. 1006) in view of Barker (Ex. 1023).
`
`IV. TECHNOLOGY BACKGROUND
`A. Cryptography and Encryption
`Cryptography seeks to prevent an unauthorized and unintended receiver
`
`from determining the content of the message being communicated. Ex. 1007, 2.
`
`Encryption is an application of cryptography. It produces an unintelligible,
`
`scrambled message by applying a key to a plain, original message. Ex. 1014, 26;
`
`Ex. 1007, 3. One of the benefits of cryptography is that only the key needs to be
`
`kept secret from unauthorized parties. See Ex. 1014, 26; Ex. 1007, 3; Ex. 1003, ¶
`
`32. Thus, only the authorized receiver, who has the right key, should be able to
`
`recover (i.e., decrypt) the message; an unauthorized receiver should not be able to
`
`deduce either the message or the unknown key. Id.
`
`The use of keys for purposes of encryption is ancient. Julius Caesar
`
`famously used a substitution shift (the “Caesar shift”) that replaces each letter in
`
`the message with the letter three places further on in the alphabet (i.e., key) to send
`
`a message to Cicero. Ex. 1014, 24-27 (for example, “veni, vidi, vici” is encrypted
`
`to “YHQL, YLGL, YLFL”); see Ex. 1007, 3. The “key” to this encryption is that
`
`3
`
`

`

`
`
`each letter was replaced by the letter three places further on. The reader who
`
`knows this key can recover the original message by reversing the encryption
`
`process and replacing each letter by the letter three places ahead in the alphabet.
`
`The Caesar shift is an example of “symmetric” or “symmetric key”
`
`encryption. The same key, or keys that can be easily computed from each other, is
`
`used for both encryption and decryption. Ex. 1007, 1, 12-14; see Ex. 1008, 1-3;
`
`see also Ex. 1003, ¶ 37.
`
`For decades, one of the leaders in modern cryptography and in public
`
`collaborations for developing modern cryptography has been the National Institute
`
`of Standards and Technology (“NIST”). See Ex. 1022; Ex. 1003, ¶ 40. NIST has
`
`been a recognized leader in cryptography since at least 1977 when it published the
`
`Data Encryption Standard, and NIST continues to publish encryptions standards
`
`and recommendations to this day. See Ex. 1022; see also, e.g., Exs. 1012-1013,
`
`1023-1025; Ex. 1003, ¶ 40. Cryptographic solutions from NIST are regularly used
`
`today by the US Government and in commercial applications, such as tablets,
`
`cellphones, and ATMs. Ex. 1022; Ex. 1003, ¶ 41. For decades, NIST technical
`
`publications have been a publicly available source of detailed information on
`
`numerous aspects of cryptography, and well known to persons working in the field
`
`of cryptography. Id., ¶ 41.
`
`4
`
`

`

`
`
`B. Key Distribution in Symmetric Encryption
`Because anyone who knows the symmetric key can decrypt the message
`
`encrypted with it, the symmetric key must remain a secret known only to the
`
`authorized parties to the communication. Ex. 1003, ¶ 42; see Ex. 1008, 1-2. For
`
`this reason, symmetric encryption is also known as “secret key” cryptography. Ex.
`
`1003, ¶ 37. In other words, only the authorized parties to the communication can
`
`possess the symmetric key. Ex. 1008, 1-3; see also Ex. 1003, ¶¶ 37, 42. Thus,
`
`secure distribution of the symmetric key has also long been known to be critical.
`
`Ex. 1008, 1-3; see also Ex. 1003, ¶¶ 37, 42.
`
`When the key to be distributed is electronic as opposed to, e.g., a codebook,
`
`distribution can be securely accomplished using various key distribution protocols
`
`that were developed as early as the mid-1970s and that became publicly available
`
`and were widely used in electronic communications such as web browsers, emails,
`
`and chat applications decades before 2015. Ex. 1003, ¶¶ 43-45; see also generally
`
`Exs. 1007-1011. For example, a symmetric key can be encrypted with a second
`
`key before being distributed, and in a way that the encrypted symmetric key can be
`
`recovered by a third key, which is known only to the receiver.1 E.g., Ex. 1005,
`
`6:43-47; see also Ex. 1003, ¶¶ 44-45.
`
`
`1 This method is known as “public key” cryptography and uses a pair of separate
`
`
`
`5
`
`

`

`
`
`V. THE ’625 PATENT
`Specification
`A.
`The ’625 patent issued on April 17, 2018, from a U.S. application filed on
`
`August 31, 2015, which claims priority to a U.S. provisional application filed on
`
`January 7, 2015.2
`
`The ’625 patent is entitled “Encrypted Group Communication Method” and
`
`states that it “provide[s] a method of encrypted group communication.” Ex. 1001,
`
`3:21-22. The ’625 patent acknowledges that the encrypted group communication
`
`systems were well known in the art. Id., 2:4-25, 3:26-33. According to the ’625
`
`patent, however, such conventional systems “require significant resources to
`
`encrypt and maintain encrypted group communications.” Id., 3:26-29. The patent
`
`
`keys—one to encrypt and another to decrypt a message. Ex. 1007, 14-15; Ex.
`
`1008, 1, 4–5; see also Ex. 1003, ¶ 39. The key used to encrypt the message is
`
`available to others (so that anyone can encrypt with it), while the key used to
`
`decrypt the message remains secret and private to an authorized party (so that only
`
`the authorized party can decrypt). Ex. 1008, 1, 5; see also Ex. 1003, ¶ 39.
`
`2 For the purposes of this proceeding, Petitioner assumes January 7, 2015 as the
`
`’625 patent’s effective filing date. Petitioner reserves the right to contest this or
`
`any earlier priority date in this and in any related proceedings.
`
`6
`
`

`

`
`
`purports to provide systems that are “more efficient in computation use and
`
`network bandwidth use,” and that are “simple, and more convenient, to implement,
`
`compared to conventional” systems. Id., 3:26-44.
`
`According to the ’625 patent, when a first user (Alice) intends to engage a
`
`group of other users (Bob, Carl, and David) for communication, Alice specifies all
`
`users in the group, initiates a group communication session, and generates a shared
`
`symmetric key to be used by the group. Id., 3:21-26, 3:51-58. Alice then
`
`“distributes the shared symmetric key individually to” Bob, Carl, and David. Id.,
`
`3:58-4:4. All users to the group (Alice, Bob, Carl, and David) can communicate
`
`with each other securely by encrypting and decrypting their communications using
`
`the shared symmetric key that is now in each user’s possession. Id., 4:5-9.
`
`Additional users can be added “when the first user distributes to the additional
`
`users the generated shared symmetric key.” Id. 2:40-43. Additionally, when a new
`
`user joins the group or an existing user leaves the group, the most senior member
`
`(Alice in this example) may generate and redistribute a new shared symmetric key
`
`to be used by the new group. Id., 4:2-4.
`
`Prosecution History
`B.
`As filed, the application that issued as the ’625 patent included one
`
`independent and two dependent claims. Ex. 1002, 190-191.
`
`7
`
`

`

`
`
`The Examiner rejected all claims under 35 U.S.C. § 103 over Nordholt (U.S.
`
`Publication No. 2013/0101121) in view of Slater (U.S. Publication No.
`
`2011/0307695). Id., 143-147. Independent claim 1 did not, at this time, include
`
`any step in which additional users were added. Dependent claim 2 included a step
`
`that “wherein additional users are added to the communication session when the
`
`first user distributes to the additional users the generated shared symmetric key.”
`
`Id., 190-191. In rejecting claim 2, the Examiner relied on a disclosure in the prior
`
`art that “as new users are added to the group, [a] new shared key is generated.” Id.,
`
`145.
`
`In response, Applicant amended independent claim 1 to incorporate the
`
`requirements of claim 2 and cancelled claim 2. Applicant argued that the teaching
`
`of “as new users are added to the group, new shared key is generated” is
`
`“clearly different” from the claimed step of “generating a shared symmetric key
`
`to begin a communication session among a group of users by a first user” and
`
`specifically from “wherein additional users are added to the communication
`
`session when the first user distributes to the additional users the generated
`
`shared symmetric key.” Id., 135-136 (emphasis in original). Applicant argued
`
`that because claim 3 depended from the amended claim 1, it, too, was allowable.
`
`Id., 132-133.
`
`8
`
`

`

`
`
`In the following office action, the Examiner again rejected all pending
`
`claims under 35 U.S.C. § 103 over Nordholt in view of Slater. Id., 112-117. In
`
`response, Applicant narrowed claim 1 such that the claim read, “additional users
`
`are added to the existing communication session when the first user distributes to
`
`the additional users the generated shared symmetric key.” Id., 98; see also id., 67,
`
`79. Applicant argued that the prior art teachings were “clearly different” from the
`
`amended claim “since [the claim] does not involve generating a new key as
`
`additional users are added to the existing communication session.” Id., 101
`
`(emphasis in original); see also id., 70, 83.
`
`The Examiner again rejected all pending claims under 35 U.S.C. § 103 over
`
`Nordholt in view of Slater and in further view of Gehrmann (U.S. Publication No.
`
`2015/0195261).3 Id., 49-53. Applicant did not further amend the claims in
`
`response, but instead argued that “Re-keying” taught by Gehrmann “must involve
`
`
`3 Pending claims were also rejected on the ground of nonstatutory double patenting
`
`over then pending U.S. Patent Application No. 14/841,339, which issued as U.S.
`
`Patent No. 10,003,465. See Ex. 1002, 46–48. Applicant filed a terminal
`
`disclaimer. Id., 30, 41. Petitioner seeks an inter partes review of claims 1, 4, 5, 8,
`
`11, 12, and 15 of the ’465 patent in IPR2023-00141, which has or will soon be
`
`submitted to the Board.
`
`9
`
`

`

`
`
`generating a new unique key for the added group member” and therefore does not
`
`teach the “wherein additional users are added to the existing communication
`
`session when the first user distributes to the additional users the generated shared
`
`symmetric key” requirement of claim 1. Id., 28-32 (emphasis in original). The
`
`Examiner withdrew the § 103 rejections, and claims 1 and 3 were allowed in the
`
`current form as claims 1 and 2, respectively. Id., 11-14.
`
`VI. PERSON OF ORDINARY SKILL IN THE ART
`The subject matter of the ’625 patent relates to a group communication
`
`system and method based on symmetric encryption. A person of ordinary skill in
`
`the art (“POSA”) in this subject matter as of January 2015 would have at least a
`
`bachelor’s degree (or equivalent) in applied mathematics, computer science,
`
`computer engineering, electrical engineering, or a related field, and at least one
`
`year of undergraduate (or higher level) coursework, industry experience, or
`
`equivalent research experience in the field of cryptography, and at least one year of
`
`undergraduate (or higher) coursework, industry experience, or equivalent research
`
`experience in the field of instant messaging or chat applications, video- or audio-
`
`conferencing applications. Ex. 1003, ¶ 11. This description is approximate, and a
`
`higher level of education or skill might make up for less experience, and vice
`
`versa. Id. This Petition does not rely on this precise definition, and the challenged
`
`10
`
`

`

`
`
`claims would be unpatentable from the perspective of any reasonable level of
`
`ordinary skill.
`
`VII. CLAIM CONSTRUCTION
`The prior art relied upon in this Petition discloses the subject matter of the
`
`challenged claims under any reasonable claim interpretation, including their plain
`
`and ordinary meanings. See Phillips v. AWH Corp., 415 F.3d 1303 (Fed. Cir.
`
`2005). Petitioner does not believe any claim terms require a specific construction.
`
`Throughout this Petition, the plain and ordinary meaning of the claim terms is
`
`applied.4 See id. at 1312-13.
`
`In the pending district court case Patent Owner has argued that the limitation
`
`“wherein additional users are added to the existing communication session when
`
`the first user distributes to the additional users the generated shared symmetric
`
`key” (element [1.6]) “is a conditional statement that is not performed in all
`
`instances” and requires that “the referenced step [be] performed only when
`
`‘additional users’ are desired to be added.” Ex. 1015, 10-11 (emphasis in original).
`
`Patent Owner thus appears to contend that the limitation is optional, and that
`
`infringement can occur whether or not additional users are added. Because patent
`
`
`4 Petitioner reserves the right to argue alternative constructions in other
`proceedings including, where such a defense is available, that the claims are
`indefinite.
`
`11
`
`

`

`
`
`claims must be read the same for purposes of infringement and invalidity, see
`
`Brown v. 3M, 265 F.3d 1349, 1352 (Fed. Cir. 2001), Petitioner addresses here the
`
`contention that the limitation is optional.
`
`Based on the claim language and the prosecution history, element [1.6] is
`
`not optional. The claim step requires that “additional users are added to the
`
`existing communication session,” and requires that such addition happen at a
`
`particular time and in a particular way: “when the first user distributes to the
`
`additional users the generated shared s

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket