throbber
Ristenpart Decl.
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________________
`
`Zoom Video Communications, Inc.,
`Petitioner,
`
`v.
`
`Cyph, Inc.,
`Patent Owner.
`______________________________________________________________
`
`Case No. IPR2023-00142
`
`U.S. Patent No. 9,794,070
`Issue Date: October 17, 2017
`
`
`
`
`DECLARATION OF DR. RISTENPART IN SUPPORT OF PETITION FOR
`INTER PARTES REVIEW OF
`U.S. PATENT NO. 9,794,070
`
`
`
`
`
`
`
`
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 1
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`TABLE OF CONTENTS
`
`Page
`
`INTRODUCTION ........................................................................................... 5
`I.
`QUALIFICATIONS ....................................................................................... 5
`II.
`III. MATERIALS CONSIDERED ........................................................................ 7
`IV. PERSON OF ORDINARY SKILL IN THE ART ........................................ 12
`V.
`LEGAL STANDARDS ................................................................................. 13
`A.
`Relevant Time Period for Invalidity Analysis .................................... 13
`B.
`Claim Construction ............................................................................. 13
`C.
`Anticipation ......................................................................................... 14
`D. Obviousness ........................................................................................ 14
`VI. SUMMARY OF OPINIONS ........................................................................ 17
`VII. TECHNOLOGY BACKGROUND .............................................................. 18
`A.
`Cryptography and Encryption ............................................................. 18
`B.
`Ephemeral Communication ................................................................ 21
`C. Web-Based Communications and Devices Used for Web-Based
`Communications ................................................................................. 23
`VIII. THE ’070 PATENT ...................................................................................... 31
`A.
`Specification ....................................................................................... 31
`B.
`Prosecution History ............................................................................. 38
`C.
`Challenged Claims .............................................................................. 39
`IX. OVERVIEW OF THE PRIOR ART ............................................................. 40
`A. Wauters (Ex. 1005) ............................................................................. 40
`B.
`Kaushik (Ex. 1006) ............................................................................. 43
`C.
`Gudjonsson (Ex. 1007) ....................................................................... 46
`X. GROUNDS ................................................................................................... 48
`
`
`
`1
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 2
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`A. Ground 1: Claims 1 and 2 Are Obvious Over Wauters in View of
`Gudjonsson ......................................................................................... 48
`1.
`Obviousness to a POSA ............................................................ 48
`a. Motivation to Combine .................................................. 48
`b.
`Reasonable Expectation of Success ............................... 52
`Claim 1 ..................................................................................... 54
`a.
`[1.0] “A method comprising:” ........................................ 54
`b.
`[1.1a] “sending a request, by a first user on a first device,
`to a server,” .................................................................... 54
`[1.1b] “the request comprising requesting the server open
`an ephemeral communication session with a second user
`on a second device;” ....................................................... 59
`[1.2] “allocating resources, by the server, to begin the
`ephemeral communication session between the first user
`and the second user;” ...................................................... 62
`[1.3a] “generating a unique ephemeral communication
`session identifier by the server for each ephemeral
`communication session and” .......................................... 66
`[1.3b] “transmitting the unique ephemeral
`communication session identifier to the first user;” ....... 69
`[1.4] “transmitting, by the first user, the unique
`ephemeral communication session identifier to the
`second user using a second communication channel;” .. 70
`[1.5] “connecting, by the second user, to the first user
`through the ephemeral communication session using the
`unique ephemeral communication session identifier;
`and;” ............................................................................... 71
`[1.6] “connecting, by the first user, to the second user
`through the ephemeral communication session using the
`unique ephemeral communication session identifier.” ... 73
`Claim 2 ..................................................................................... 73
`a.
`[2.0] “The method of claim 1, wherein:” ....................... 73
`b.
`[2.1] “connecting, by the second user, to the first user
`through the ephemeral communication session includes
`connecting to the server; and;” ....................................... 74
`
`c.
`
`d.
`
`e.
`
`f.
`
`g.
`
`h.
`
`i.
`
`
`
`
`
`2.
`
`3.
`
`2
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 3
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`c.
`
`c.
`
`d.
`
`e.
`
`f.
`
`g.
`
`h.
`
`i.
`
`[2.2] “connecting, by the first user, to the second user
`through the ephemeral communication session includes
`connecting to the server.” ............................................... 78
`Ground 2: Claims 1 and 2 Are Obvious Over Kaushik in View of
`Gudjonsson ......................................................................................... 78
`1.
`Obviousness to a POSA ............................................................ 78
`a. Motivation to Combine .................................................. 78
`b.
`Reasonable Expectation of Success ............................... 81
`Claim 1 ..................................................................................... 83
`a.
`[1.0] “A method comprising:” ........................................ 83
`b.
`[1.1a] “sending a request, by a first user on a first device,
`to a server,” .................................................................... 83
`[1.1b] “the request comprising requesting the server open
`an ephemeral communication session with a second user
`on a second device;” ....................................................... 86
`[1.2] “allocating resources, by the server, to begin the
`ephemeral communication session between the first user
`and the second user;” ...................................................... 89
`[1.3a] “generating a unique ephemeral communication
`session identifier by the server for each ephemeral
`communication session and” .......................................... 92
`[1.3b] “transmitting the unique ephemeral
`communication session identifier to the first user;” ....... 94
`[1.4] “transmitting, by the first user, the unique
`ephemeral communication session identifier to the
`second user using a second communication channel;” .. 95
`[1.5] “connecting, by the second user, to the first user
`through the ephemeral communication session using the
`unique ephemeral communication session identifier;
`and;” ............................................................................... 96
`[1.6] “connecting, by the first user, to the second user
`through the ephemeral communication session using the
`unique ephemeral communication session identifier.” ... 98
`Claim 2 ..................................................................................... 98
`a.
`[2.0] “The method of claim 1, wherein:” ....................... 98
`
`B.
`
`
`
`
`
`2.
`
`3.
`
`3
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 4
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`b.
`
`[2.1] “connecting, by the second user, to the first user
`through the ephemeral communication session includes
`connecting to the server; and;” ....................................... 98
`[2.2] “connecting, by the first user, to the second user
`through the ephemeral communication session includes
`connecting to the server.” ............................................. 101
`XI. NO SECONDARY CONSIDERATIONS .................................................. 101
`
`
`
`c.
`
`
`
`4
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 5
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`I.
`
`I, Thomas Ristenpart, Ph.D., declare as follows:
`
`INTRODUCTION
`1.
`I have been retained by counsel for Zoom Video Communications,
`
`Inc. (“Petitioner”) to provide my opinion regarding the validity of claims 1 and 2
`
`of U.S. Patent No. 9,794,070 (the “challenged claims” of the “’070 patent”)
`
`(attached as Ex. 1001 to the accompanying Petition for Inter Partes Review).
`
`2.
`
`I am being compensated at my standard rate of $400 per hour (plus
`
`expenses) for this matter. My payment is not contingent in any way on the
`
`outcome of this mater. I have no financial or other personal interest in the outcome
`
`of this matter.
`
`II. QUALIFICATIONS
`3.
`I have summarized in this section my educational background, career
`
`history, publications, and other relevant qualifications. My Curriculum Vitae,
`
`which includes my qualifications as well as my publications, is included as Ex.
`
`1004.
`
`4.
`
`I am an expert in the field of computer security, including applied and
`
`theoretical cryptography and privacy.
`
`5.
`
`I received a Bachelor of Science degree in Computer Science and
`
`Engineering from University of California, Davis in 2003. In 2005, I earned my
`
`Master of Science degree in Computer Science from University of California,
`
`
`
`5
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 6
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`Davis. And, in 2010, I earned a Ph.D. degree in Computer Science from
`
`University of California, San Diego. My doctoral studies focused on computer
`
`security and cryptography. My dissertation topic was on “New Approaches for
`
`Building Cryptographic Hash Functions”, which introduced new design methods
`
`for hash functions, a widely used cryptographic primitive.
`
`6. My work as an academic researcher has grown to touch on many areas
`
`of applied cryptography, with over one hundred peer-reviewed publications at the
`
`top academic venues in cryptography, security, and beyond. I have published in
`
`the area of encrypted messaging, for example my work on “Traceback for End-to-
`
`End Encrypted Messaging”; “Asymmetric Message Franking: Content Moderation
`
`for Metadata-Private End-to-End Encryption”; and “Orca: Blocklisting in Sender-
`
`Anonymous Messaging”. I served as co-program chair of the Advances in
`
`Cryptology—CRYPTO conference, a flagship publication venue conference of the
`
`International Association of Cryptologic Research (“IACR”). Being selected to be
`
`co-chair reflects the academic community’s high regard for my breadth and depth
`
`of expertise in cryptography. In addition to my academic work, I have experience
`
`working in industry to build cryptographic systems. I worked part time at
`
`Cloudflare to design and implement advanced cryptographic protocols that are now
`
`deployed for use in helping improve security in practice. Previously, I served on
`
`
`
`6
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 7
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`the cryptographic advisory board for Skyhigh Networks, which built cryptographic
`
`security products. My work has also led to many industry standards of wide use.
`
`III. MATERIALS CONSIDERED
`7.
`In forming the opinions set forth in this Declaration, I have considered
`
`and relied upon my education, research, experience, knowledge, and professional
`
`judgment, all documents cited in this Declaration, and the following documents,
`
`which I understand are being submitted as exhibits along with the Petition:
`
`Exhibit No. Description
`
`1001
`
`1002
`
`1005
`
`1006
`
`U.S. Patent No. 9,794,070 (“’070 patent”)
`
`File History for the ’070 patent (“’070 patent FH”)
`
`February 19, 2009 Snapshot of Robin Wauters, TinyChat Makes
`Creating Disposable Chat Rooms A Breeze, TechCrunch (Feb. 18,
`2009), archived at the Internet Archive’s Wayback Machine at
`https://web.archive.org/web/20090219092443/http://www.techcru
`nch.com/2009/02/18/tinychat-makes-creating-disposable-chat-
`rooms-a-breeze/ (“Wauters”)
`
`June 24, 2009 Snapshot of Kaushik, Create temporary and
`disposable chat rooms with Stinto, InstantFundas (Nov. 24, 2008),
`archived at the Internet Archive’s Wayback Machine at
`https://web.archive.org/web/20090624021641/http:/www.instantfu
`ndas.com/2008/11/create-temporary-and-disposable-chat.html
`(“Kaushik”)
`
`1007
`
`U.S. Patent No. 6,564,261 (“Gudjonsson”)
`
`1008
`
`Gustavus J. Simmons, Symmetric and Asymmetric Encryption,
`Vol. 11, No. 4 ACM Computing Surveys 305-330 (Dec. 1979),
`available at https://dl.acm.org/doi/10.1145/356789.356793
`
`
`
`7
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 8
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`
`
`Exhibit No. Description
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`Jennifer Charteris, Sue Gregory, & Yvonne Masters, Snapchat
`‘selfies’: The case of disappearing data, Rhetoric and Reality:
`Critical perspectives on educational technology, Proceedings of
`ascilite Dunedin 2014, pp. 389-93, available at
`https://ascilite2014.otago.ac.nz/files/concisepapers/47-
`Charteris.pdf
`
`December 21, 2008 Snapshot of “Privacy Policy” webpage of the
`stinto.net website, archived at the Internet Archive’s Wayback
`Machine at
`https://web.archive.org/web/20081221154244/http://www.stinto.n
`et:80/datenschutz
`
`January 24, 2009 Snapshot of “About” webpage of the stinto.net
`website, archived at the Internet Archive’s Wayback Machine at
`http://web.archive.org/web/20090124112853/http://stinto.net:80/a
`bout
`
`Jason Fitzpatrick, Stinto Generates Disposable Chat Rooms,
`LifeHacker (Nov. 26, 2008), https://lifehacker.com/stinto-
`generates-disposable-chat-rooms-5099130
`
`Bright Hub, Review of Stinto – A Browser-Based Temporary Chat
`Room Application (Dec. 26, 2008),
`https://www.brighthub.com/environment/green-
`computing/articles/21594/
`
`Scott Gilbertson, TinyChat: Disposable, Web-Based Chat Anyone
`Can Use, Wired (Feb. 19, 2009), available at
`https://www.wired.com/2009/02/tinychat-dispos/
`
`June 27, 2013 Snapshot of azim, TinyChat: Online Chat Rooms
`Without Registering, MUO (Feb. 17, 2009), archived at the
`Internet Archive’s Wayback Machine at
`https://web.archive.org/web/20130627122802/https://www.makeu
`seof.com/tag/tinychat-create-free-chatroom/
`
`8
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 9
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`
`
`Exhibit No. Description
`
`1016
`
`1017
`
`1018
`
`1019
`
`1020
`
`1021
`
`1022
`
`February 21, 2009 Snapshot of Suganya, Chat With Your Friends
`Using TinyChat When Messengers Are Blocked At Your
`Office/School/University, Tech Dreams (February 20, 2009),
`archived at the Internet Archive’s Wayback Machine at
`https://web.archive.org/web/20090221191830/https://www.techdr
`eams.org/general/tinychat-%E2%80%93-an-unblocked-
`disposable-chat-even-at-your-office/1558-20090220
`
`December 18, 2014 Snapshot of “Help” webpage of the
`chattory.com website, archived at the Internet Archive’s Wayback
`Machine at
`http://web.archive.org/web/20141218122550/http://www.chattory.
`com/#
`
`Bazara I.A. Barry & Fatma M. Tom, Instant Messaging:
`Standards, Protocols, Applications, and Research Directions, in
`INTERNET POLICIES AND ISSUES, VOL. 7 1-15 (Chapter 8) (B.G.
`Kutais ed., Nova Science Publishers, Inc. 2010), available at
`https://www.researchgate.net/publication/280307922_Instant_Mes
`saging_Standards_Protocols_Applications_and_Research_Directio
`ns
`
`Tom Keating, Yahoo Messenger for the Web launches,
`TMCnet.com (May 2, 2007), https://blog.tmcnet.com/blog/tom-
`keating/news/yahoo-messenger-for-the-web-launches.asp
`
`Bogdan Popa, Yahoo Launches Web-Based Yahoo Messenger,
`Softpedia News (May 3, 2007),
`https://news.softpedia.com/news/Yahoo-Launches-Web-Based-
`Yahoo-Messenger-53796.shtml
`
`Adam Pash, Chat with AIM, MSN, Yahoo, and other contacts over
`Google Talk, LifeHacker (Aug. 14, 2007),
`https://lifehacker.com/chat-with-aim-msn-yahoo-and-other-
`contacts-over-goog-289097
`
`Peter Cohen, Flash-based ‘AIM Express’ debuts, Macworld (Aug.
`20, 2008),
`https://www.macworld.com/article/192065/aimexpress.html
`
`9
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 10
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`
`
`Exhibit No. Description
`
`Karl Gechlik, AIM Express lets you use IM without installing a
`client, MUO (June 21, 2008),
`https://www.makeuseof.com/tag/aim-express-lets-you-use-im-
`without-installing-a-client/
`
`AskVG.com, Windows Live Web Messenger: Web Based WLM,
`No Download or Installation Required (Oct. 15, 2009),
`https://www.askvg.com/windows-live-web-messenger-web-based-
`wlm-no-download-or-installation-required/
`
`April 3, 2013 Snapshot of tlk.io website, archived at the Internet
`Archive’s Wayback Machine at
`https://web.archive.org/web/20130403162621/http://tlk.io/
`
`August 1, 2014 Snapshot of tlk.io website, archived at the Internet
`Archive’s Wayback Machine at
`https://web.archive.org/web/20140801172659/http://tlk.io/
`
`November 23, 2014 Snapshot of Sagar Karira, Create Your Own
`Chat Room In Seconds With tlk.io, FossBytes (Nov. 11, 2014),
`archived at the Internet Archive’s Wayback Machine at
`https://web.archive.org/web/20141123102452/https://fossbytes.co
`m/chat-talk-discuss-online-without-hassle-tlk-io/
`
`Christian Dewes, Arne Wichmann, & Anja Feldmann, An analysis
`of Internet chat systems, IMC ’03, Proceedings of the 3rd ACM
`SIGCOMM Conference on Internet Measurement, pp. 51–64 (Oct.
`2003), available at https://dl.acm.org/doi/10.1145/948205.948214
`
`Michael Stephens, Tools from “Web 2.0 & Libraries: Best
`Practices for Social Software” Revisited, 5 Library Technology
`Reports 15-31 (Chapter 2) (Sept.-Oct. 2007), available at
`https://journals.ala.org/index.php/ltr/article/view/4822/5778
`
`U.S. Patent No. 7,562,116 (“Barsness”)
`
`U.S. Patent No. 7,912,903 (“Shah”)
`
`1023
`
`1024
`
`1025
`
`1026
`
`1027
`
`1028
`
`1029
`
`1030
`
`1031
`
`10
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 11
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`
`
`Exhibit No. Description
`
`1032
`
`1033
`
`1034
`
`1035
`
`1036
`
`1037
`
`1038
`
`1039
`
`1040
`
` J. Oikarinen & D. Reed, Network Working Group Request for
`Comments: 1459, Internet Relay Chat Protocol (May 1993),
`https://datatracker.ietf.org/doc/pdf/rfc1459
`
`Raymond B. Jennings III et al., A Study of Internet Instant
`Messaging and Chat Protocols, Vol. 20, Issue 4 IEEE Network
`pp. 16–21 (July/August 2006), available at
`https://ieeexplore.ieee.org/document/1668399
`
`U.S. Patent Application Publication No. 2002/0191797
`(“Perlman”)
`
`Cyph, Inc. v. Zoom Video Communications, Inc., No. 22-cv-
`00561-JSW, Dkt. No. 74 (N.D. Cal. Oct. 7, 2022), Dkt. No. 75
`(N.D. Cal. Oct. 11, 2022).
`
`Excerpts from Microsoft Computer Dictionary (Microsoft Press,
`5th ed. 2002)
`
`Table N/A—U.S. District Courts–Combined Civil and Criminal
`Federal Court Management Statistics (June 30, 2022),
`https://www.uscourts.gov/statistics/table/na/federal-court-
`management-statistics/2022/06/30-2
`
`Cyph, Inc. v. Zoom Video Communications, Inc., No. 21-cv-
`03027-RM-MEH, Dkt. No. 32 (D. Co. Jan. 27, 2022)
`
`Simon Singh, THE CODE BOOK: THE SCIENCE OF SECRECY FROM
`ANCIENT EGYPT TO QUANTUM CRYPTOGRAPHY (First Anchor
`Books Ed., Sept. 2000) (“The Code Book”)
`
`J. Fingas, Google+ Hangouts app hands-on, Engadget (May 15,
`2013)), https://www.engadget.com/2013-05-15-google-hangouts-
`app-hands-on.html
`
`11
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 12
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`IV. PERSON OF ORDINARY SKILL IN THE ART
`8.
`I understand that an assessment of the validity of the patent claims
`
`should be considered from the perspective of a person of ordinary skill in the art
`
`(“POSA”).
`
`9.
`
`I have been advised by counsel that a POSA is a person who
`
`possesses conventional wisdom in the art and is presumed to be aware of all
`
`relevant art at the time of the invention. To determine the appropriate level of a
`
`POSA, the following factors may be considered: (1) the type of problems
`
`encountered in the art; (2) prior art solutions to those problems; (3) the rapidity
`
`with which innovations are made; (4) the sophistication of the technology; and (5)
`
`the educational level of active workers in the field.
`
`10. As described in detail below, the ’070 patent purports to relate to
`
`encryption and it claims methods of conducting ephemeral communications over
`
`the network. Ex. 1001, Title; Claims 1–2. The ’070 patent relies on a combination
`
`of well-known elements such as ephemeral digital communications and the client-
`
`server architecture used for web-based applications, as I discuss in detail below.
`
`11.
`
`In view of the purported invention of the ’070 patent and my
`
`experience as a practicing engineer and researcher in this field since at least the
`
`early 2000s, it is my opinion that a POSA at the time of the alleged invention of
`
`the ’070 patent (approximately January of 2015) would have at least one year of
`
`
`
`12
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 13
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`undergraduate (or higher level) coursework, industry experience, or equivalent
`
`research experience in the field of cryptography, and at least one year of
`
`undergraduate (or higher) coursework, industry experience, or equivalent research
`
`experience in the field of instant messaging or chat applications or video- or audio-
`
`conferencing applications. This description is approximate, and a higher level of
`
`education or skill might make up for less experience, and vice versa.
`
`12. My analysis and opinions stated in this Declaration would remain the
`
`same even if a POSA were determined to have somewhat more or less education
`
`and/or experience than I have described above.
`
`V. LEGAL STANDARDS
`13.
`I am not an attorney, but in expressing my opinions in this Declaration
`
`and considering the subject matter of the claims of the ’070 patent, I am relying on
`
`certain legal principles counsel has provided and explained to me.
`
`A. Relevant Time Period for Invalidity Analysis
`14.
`I have been asked to assume that the priority date for the claims of the
`
`’070 patent is January 7, 2015, the filing date of a provisional application No.
`
`62/100,689. Therefore, for the purposes of this Declaration, I have analyzed
`
`validity from the perspective of a POSA as of January 2015.
`
`B. Claim Construction
`15.
`I understand that when evaluating the validity of patent claims, claim
`
`terms are generally given their ordinary and customary meaning, which is the
`
`
`
`13
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 14
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`meaning that the term would have to a POSA as of the effective filing date of the
`
`patent. I also understand that a POSA is deemed to read the claim term not only in
`
`the context of the particular claim, in which a claim term appears, but in the
`
`context of the entire patent, including the specification.
`
`16. My analysis and opinions in this Declaration do not depend on any
`
`particular construction of terms in the challenged claims. I have applied what I
`
`believe a POSA would consider to be the plain and ordinary meaning of all claim
`
`terms. For the reasons discussed in further detail below, it is my opinion that the
`
`prior art discussed below discloses the subject matter of the challenged claims
`
`under any reasonable construction of the claim terms.
`
`C. Anticipation
`17.
`I understand that patent claims may be invalid as “anticipated” in
`
`view of a single prior art reference. Counsel has informed me that a patent claim is
`
`anticipated by the prior art if each and every element of the claim is express or
`
`inherently disclosed in a single prior art reference.
`
`D. Obviousness
`18.
`It is my understanding that a patent claim is invalid if the claimed
`
`invention, as a whole, would have been obvious to a POSA at the time of the
`
`critical date—the effective filing date in the case of the ’070 patent—in view of the
`
`prior art in the field and analogous fields.
`
`
`
`14
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 15
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`19.
`
`I understand that the following factors are considered as part of the
`
`obviousness inquiry: (1) the scope and content of the prior art; (2) the differences
`
`between the prior art and the claims at issue; (3) the level of ordinary skill in the
`
`pertinent art; and (4) secondary considerations such as commercial success, long
`
`felt but unsolved needs, failure of others, and simultaneous invention. I understand
`
`that a “nexus” must be established between the evidence of secondary
`
`considerations and what is both claimed and novel in the claim at issue for such
`
`evidence to be relevant to the obviousness analysis.
`
`20.
`
`I understand that a reference qualifies as prior art for obviousness
`
`purposes when it is analogous to the claimed invention. The reference is
`
`analogous art (thus prior art) to the claimed invention if: (1) the reference is from
`
`the same field of endeavor as the claimed invention (even if it addresses a different
`
`problem); or (2) the reference is reasonably pertinent to the problem faced by the
`
`inventor (even if it is not in the same field of endeavor as the claimed invention).
`
`21.
`
`I understand that obviousness may be shown by demonstrating that it
`
`would have been obvious to modify what is taught in a single piece of prior art, or
`
`to combine the teachings of more than one prior art reference, to create the claimed
`
`invention. In determining whether a piece of prior art could have been modified,
`
`or combined with other prior art references or with other information within the
`
`
`
`15
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 16
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`knowledge of a POSA, the following are examples of approaches and rationales
`
`that may be considered:
`
`a.
`
`b.
`
`c.
`
`d.
`
`e.
`
`Combining prior art elements according to known methods to
`yield predictable results;
`Simple substitution of one known element for another to obtain
`predictable results;
`Use of known technique to improve similar devices (methods,
`or products) in the same way;
`Applying a known technique to a known device (method, or
`product) ready for improvement to yield predictable results;
`Applying a technique or approach that would have been
`“obvious to try” (that is, choosing from a finite number of
`identified, predictable solutions, with a reasonable expectation
`of success);
`Known work in one field of endeavor may prompt variations of
`it for use in either the same field or a different one based on
`design incentives or other market forces if the variations are
`predictable to a POSA; or
`Some teaching, suggestion, or motivation in the prior art that
`would have led a POSA to modify the prior art reference or to
`combine prior art reference teachings to arrive at the claimed
`invention.
`I understand that the suggestion or motivation may come from such
`
`f.
`
`g.
`
`22.
`
`sources as explicit statements in the prior art or from the knowledge or common
`
`sense of a POSA. I also understand that a motivation to combine may be found
`
`
`
`16
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 17
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`explicitly or implicitly in market forces; design incentives; the interrelated
`
`teachings of multiple patents; any need or problem known in the field of endeavor
`
`at the time of invention and addressed by the patent; and the background
`
`knowledge, creativity, and common sense of a POSA.
`
`23.
`
`I understand that the approaches and rationales listed above are not
`
`exhaustive. Other approaches and rationales may also support a conclusion of
`
`obviousness.
`
`24.
`
`I understand that an invention that might be considered an obvious
`
`variation or modification of the prior art may be considered non-obvious if one or
`
`more prior art references discourage or teach away from the line of inquiry
`
`disclosed in the reference(s). However, for purposes of assessing obviousness, a
`
`reference does not “teach away” from an invention simply because the reference
`
`expresses a general preference for an alternative invention. It is my understanding
`
`that the doctrine of teaching away requires an indication that the combination
`
`should not be attempted, because, for example, the combination would fail and/or
`
`be inoperative for its intended purpose.
`
`VI. SUMMARY OF OPINIONS
`25.
`It is my opinion that claims 1 and 2 of the ’070 patent are obvious
`
`based on the online article titled “TinyChat Makes Creating Disposable Chat
`
`
`
`17
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 18
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`Rooms A Breeze” (“Wauters”; Ex. 1005) in combination with U.S. Patent No.
`
`6,564,261 (“Gudjonsson”; Ex. 1007).
`
`26.
`
`It is also my opinion that claims 1 and 2 of the ’070 patent are obvious
`
`based on the online article titled “Create temporary and disposable chat rooms with
`
`Stinto” (“Kaushik”; Ex. 1006) in combination with Gudjonsson.
`
`VII. TECHNOLOGY BACKGROUND
`A. Cryptography and Encryption
`27. The title of the ’070 patent is “Method of Ephemeral Encrypted
`
`Communications.” Ex. 1001, Title. It states that the “embodiments herein
`
`generally relate to cryptography, and, more particularly, to a method of ephemeral
`
`encrypted communications.” Id., 1:60–62.
`
`28. Cryptography is the science, and art, of secret writing. One of the
`
`goals of cryptography is to prevent an unauthorized and unintended receiver from
`
`determining the content of the message being communicated. Ex. 1008, 306.
`
`29. Encryption is an example of an application of cryptography.
`
`Encrypting a message or data produces an unintelligible, scrambled message
`
`(called “ciphertext”) by applying a key to a plain, original message (called
`
`“plaintext”). Ex. 1039, 14; Ex. 1008, 307. Decryption reverses that process—it is
`
`the process of unscrambling (or recovering) the scrambled message. Ex. 1039, 46;
`
`
`
`18
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 19
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`Ex. 1008, 307. Figure 4 of The Code Book schematically illustrates the encryption
`
`and decryption process:
`
`
`
`Ex. 1039, 26.
`
`30. One of the benefits of cryptography is that only the key needs to be
`
`kept secret from unauthorized parties. Id.; Ex. 1008, 307. The encrypted message
`
`(i.e., ciphertext) may be eavesdropped or intercepted by unauthorized parties
`
`during the transmission, but its content is protected by safeguarding the key that
`
`should not be exposed. Thus, only the authorized receiver, who has the right key
`
`(or who is able to deduce the right key), should be able to recover (i.e., decrypt) the
`
`encrypted message. See Ex. 1039, 26–27. Any unauthorized receiver should not
`
`be able to deduce either the message or the unknown key.
`
`31.
`
`I note that notwithstanding the ’070 patent’s characterization of it
`
`being related to cryptography and encryption, it does not in fact describe or claim
`
`any cryptographic and encryption principles. In the ’070 patent, no message need
`
`be scrambled, or modified in any way; no encryption algorithm need be applied; no
`
`encryption key need be used; and no message needs to be recovered.
`
`
`
`19
`
`Zoom Video Commc’ns, Inc. - Ex. 1003, Page 20
`Zoom Video Commc’ns, Inc. v. Cyph, Inc. (IPR2023-00142)
`
`

`

`
`
`32. Rather, the ’070 patent criticizes the difficulties of, and risks
`
`associated with, using encryption keys in conventional encryption systems:
`
`“Conventional encryption systems are often difficult to use and thereby introduce
`
`weaknesses in the overall systems. For example, asymmetric encryption relies on
`
`complex mathematics applied to private a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket