Uniloc USA, Inc. et al v. NATIONAL INSTRUMENTS CORP. et al
Filing
247
NOTICE by Uniloc Singapore Private Limited, Uniloc USA, Inc. of Filing of Patent Rule 4-3 Joint Claim Construction and Pre-Hearing Statement (Attachments: # 1 Exhibit A, # 2 Exhibit B)(Nelson, Edward)
EXHIBIT B
1
4658559 v3
A. Defendants’ Proposed Constructions and Supporting Evidence for the Disputed Terms
Pursuant to P.R. 4-3(b), Defendants‟ proposed constructions and supporting evidence for the disputed terms of the ‟216 Patent are found in
the following tables. Because Defendants‟ have not reached unanimous agreement on certain claim terms, competing constructions are provided in
the various tables below. In addition, Pervasive Software, Inc. believes that the term “Licensee Unique ID” should be further modified by this Court
and is moving for leave to provide a modification to the construction provided by the District of Rhode Island during the upcoming claim
construction process:
Defendant Group A comprises all Defendants EXCEPT those found in Group B
1
DISPUTED
TERMS AND PHRASES
Permits use of said digital
data...only if...has matched . .
.
DEFENDANT GROUP A’S PROPOSED
CONSTRUCTION
When . . . has matched then the use of said
digital data is permitted
SUPPORTING EVIDENCE
“The algorithm in the code portion is duplicated at a
remote location on a platform under the control of the
licensor or its agents, and communication between
the intending licensee and the licensor or its agent is
required so that a matching registration number can
be generated at the remote location for subsequent
communication to the intending licensee as a permit
to licensed operation of the digital data in a use
mode.” ‟216 patent, Abstract.
“In broad terms, the system according to the
invention is designed and adapted to allow digital
data or software to run in a use mode on a platform if
and only if an appropriate licensing procedure has
2
4658559 v3
DISPUTED
TERMS AND PHRASES
DEFENDANT GROUP A’S PROPOSED
CONSTRUCTION
SUPPORTING EVIDENCE
been followed.” ‟216 patent, col. 2:52-55.
“Accordingly, in one broad form of the invention
there is provided a system for licensing use of digital
data in a use mode, the digital data executable on a
platform, the system including local licensee unique
ID generating means and remote licensee unique ID
generating means, the system further including mode
switching means operable on the platform which
permits use of the digital data in the use mode on the
platform only if a licensee unique ID generated by
the local licensee unique ID generating means has
matched a licensee unique ID generated by the
remote licensee unique ID generating means.” ‟216
patent, col. 3:22-32.
“In a further broad form of the invention, there is
provided a method of control of distribution of
software, the method comprising providing modeswitching means associated with the software
adapted to switch the software between a fully
enabled mode and a partly enabled or demonstration
mode; the method further comprising providing
registration key generating means adapted to generate
an enabling key which is a function of information
unique to an intending user of the software; the
mode-switching means switching the software into
fully enabled mode only if an enabling key provided
to the mode-switching means by the intending user at
the time of registration of the software has matched
identically with the registration key generated by the
3
4658559 v3
DISPUTED
TERMS AND PHRASES
DEFENDANT GROUP A’S PROPOSED
CONSTRUCTION
SUPPORTING EVIDENCE
registration key generating means.” ‟216 patent, col.
4:30-43.
“Preferably, the registration code when executed on
the platform provides local licensee unique ID
generating means whereby the digital data can be
switched from the demonstration mode to the use
mode by execution of the registration code only if a
licensee unique ID generated by the local licensee
unique ID generating means has matched a licensee
unique ID generated by remote licensee unique ID
generating means.” ‟216 patent, col. 4:55-62.
“FIGS. 2a, 2b and 2c are segments of a flow chart of
the procedure to be followed during registration of
software by a user according to a first embodiment of
the invention.” ‟216 patent, col. 5:5-7; see also Figs.
2a, 2b and 2c and accompanying text at col. 6:34 –
8:38.
“FIG. 8 is a block diagram of a generalized system
according to a fifth embodiment of the invention.”
‟216 patent, col. 5:20-21; see also Fig. 8 and
accompanying text at col. 11:39 – 12:37.
“It is to be understood that, in its various
embodiments, the present invention is for the
protection of digital code/software by control of
permission to use the digital code/software.” ‟216
patent, col. 5:33-36.
4
4658559 v3
DISPUTED
TERMS AND PHRASES
DEFENDANT GROUP A’S PROPOSED
CONSTRUCTION
SUPPORTING EVIDENCE
“With reference to FIGS. 1 and 8, the system
according to embodiments of the invention is
designed and adapted to allow digital data 39 or
software to run in a use mode on a platform 31 if and
only if an appropriate licensing procedure has been
followed.” ‟216 patent, col. 5:47-51.
“As a final stage in registration (refer to FIG. 2d [sic
– 2c]), the registration authority 16 provides the
registration number generated by the registration
authority PC 15 to the user 11. The user 11 enters the
registration number into the user PC 12 where the
registration routine checks to see whether the entered
registration number matches the calculated
registration number. If the two match, then a valid
registration has taken place and access is provided by
the registration routine to a full operating version of
the software protected by the registration routine. If
there is no match and a preference file (which stores
the user details) does not exist then a dialogue box D
(FIG. 2c) appears on the display 13 of user PC 12
providing the prospective new user 11 with the
opportunity to check his/her details or switch to the
demonstration version of the software protected by
the registration routine.” ‟216 patent, col. 7:36-50.
“When mode switcher 68 verifies the match, then the
mode switcher 68 allows execution on platform 31 of
the full user program 39.” ‟216 patent, col. 11:63-65.
“Second gate 92 permits execution of any kind of
5
4658559 v3
DISPUTED
TERMS AND PHRASES
DEFENDANT GROUP A’S PROPOSED
CONSTRUCTION
SUPPORTING EVIDENCE
code by closure of relay 93 provided only that the
output of comparator 90 is high (which is to say that
X equals Y or that the local licensee unique ID
matches with the licensee unique ID generated by the
remote licensee unique ID generating means
comprising summer 89).” ‟216 patent, col. 13:31-36.
“Because additional information is added at the
remote computer in Grundy, it follows automatically
that a simple comparison or match of the registration
code derived from the local computer and the
authorization code derived from the remote computer
is not possible. In order for the local computer to
deem the authorization code as valid, the local
computer is required to somehow take account of the
additional information which has been added by the
remote computer. Grundy does not describe precisely
how this is achieved, but it is clear that the validity of
the authorization code of Grundy cannot be
determined as a simple match of the registration code
with the authorization code. Accordingly, Claim 1 of
the present application which requires a match of the
local license unique ID with the remote licensee
unique ID is patentably distinguished over the
fundamentally more complex process outlined in
Grundy.” ‟216 file history, 12/21/94 Amendment in
Response to June 24, 1994 Office Action at 4-5.
“It is not at all clear from the disclosure of Grundy as
to whether the previously derived “Registration
Code" is ever utilized to help check the validity of the
6
4658559 v3
DISPUTED
TERMS AND PHRASES
DEFENDANT GROUP A’S PROPOSED
CONSTRUCTION
SUPPORTING EVIDENCE
Authorization Code: one is perfectly entitled to infer
from the total disclosure of Grundy that any element
of uniqueness to be associated with the software to be
protected is injected and derived at the second
platform (the remote location) and, furthermore, that
whether an Authorization Code is valid or not derives
directly from data first arising at the second platform
(the remote location). This is the complete reverse of
the system of the present invention where the
uniqueness derives entirely locally.” ‟216 file
history, 7/5/95 Amendment in Response to March 30,
1995 Office Action at 7.
“In addition, the Grundy system requires a
mechanism for encrypting the registration code for its
return trip from the second platform to the first
platform: Applicant respectfully submits that the
encryption key is the „User Code‟ generated at the
second platform. Without the communication of the
encryption key (the user code) to the first platform it
will not be possible to decrypt the authorization code
and hence, it will not be possible to make any use of
the authorization code for validation purposes.
Advantageously, the system of the claimed invention
does not require that an encryption key be passed
from the second platform to the first platform. The
Examiner states that „the Grundy local decodes the
authorization code which then must match the
original user data.‟ It is respectfully submitted that
Grundy does not disclose a mechanism for decoding
the authorization code, hence it follows that Grundy
7
4658559 v3
DISPUTED
TERMS AND PHRASES
DEFENDANT GROUP A’S PROPOSED
CONSTRUCTION
SUPPORTING EVIDENCE
does not disclose a mechanism by which there can be
a match with original user data. Therefore, by a
mechanism not specifically disclosed in Grundy, the
„Unique User Code‟ must, somehow, be
communicated to the first platform because it
amounts to a decryption key without which no useful
information can be derived from the authorization
code. By contrast, the invention of the present
application does not require any decryption key to
pass from the second platform (the remote location)
to the first platform (the local location) because the
same algorithm is used at both locations. This feature
is now clearly included in all proposed main claims,
and, it is submitted, patentably distinguishes the
present invention over Grundy.” ‟216 file history,
7/5/95 Amendment in Response to March 30, 1995
Office Action at 8-9; see also id. at 6-7.
“The local and remote licensee unique IDs are
compared and if they match identically, the system
will allow licensed operation (e.g., full, unrestricted
use) of the software.” ‟216 reexam history, 11/29/10
Reply to Office Action in Ex Parte Reexamination at
12.
“If the remote licensee unique ID identically matches
the local licensee unique ID then the system will
allow licensed operation of the software.” ‟216
reexam history, 11/29/10 Declaration of Ric B.
Richardson Under 37 C.F.R. § 1.132 at ¶ 6.
8
4658559 v3
DISPUTED
TERMS AND PHRASES
DEFENDANT GROUP A’S PROPOSED
CONSTRUCTION
SUPPORTING EVIDENCE
“Of the other art of record, the only one that suggests
that use of user-specific information in the
computation of fields is Grundy. The Patent Owner
has persuasively argued that the summation disclosed
by Grundy is used in the context of merely verifying
the correctness of information related to the user and
is not being used to generate an ID per se. Since the
information is not being used for the same purpose,
one skilled in the art therefore would not use the
algorithm of Grundy as part of the generation of the
claimed licensee unique ID.” ‟216 reexam history,
8/5/2011 Notice of Intent to Issue Ex Parte
Reexamination Certificate at 6.
2
Local (in the phrase “local
licensee unique ID generating
means”)
On the user‟s computer executing the digital
data
Local licensee unique ID shown at “Local Licensee
Location.” ‟216 patent, FIG. 8.
“an environment to be associated with a computing
device such as a microprocessor or other data
processing device which permits execution of the
digital data….” ‟216 patent, col. 2:25-27.
“The prospective new user 11 inserts disk 10 into the
user PC 12 so as to be read by PC 12.” ‟216 patent,
col. 6:39-41.
“This information, unique to the user, is passed
through a registration number algorithm 14… which
generates a registration number….” ‟216 patent, col.
7:14-17.
9
4658559 v3
DISPUTED
TERMS AND PHRASES
DEFENDANT GROUP A’S PROPOSED
CONSTRUCTION
SUPPORTING EVIDENCE
“The distinction as against the first embodiment is
that the „key file‟ is created at the time of registration
of the software and a duplicate key file is also created
at the same time.” ‟216 patent, col. 8:50-53.
“… form a microprocessor 30 adapted to operate
under an operating system or upon a platform 31 such
as, for example MicroSoft DOS or Macintosh System
7.” ‟216 patent, col. 10:18-20.
“The digital data 37 is arranged in such a way that
when microprocessor 30 seeks to first execute the
digital data 37 by way of operating system or
platform 31 the digital data comprising the
registration code portion 38 is caused to execute
first….” ‟216 patent, col. 10:30-34.
“[T]he algorithm, which generates the unique user
identification and which is resident both as a the
registration code portion 38 in digital data 37
integrally bound to use code portion 39 for execution
on local platform 31 and also as remote algorithm
61….” ‟216 patent, col. 11:46-50.
“[A] prospective user 80 of digital code 81 on media
82 by its execution on platform 83 firstly inserts the
media 82 into an appropriate digital code reading
device within the platform….” ‟216 patent, col.
12:46-49.
“[T]he Applicant submits herewith redrafted claims,
10
4658559 v3
DISPUTED
TERMS AND PHRASES
DEFENDANT GROUP A’S PROPOSED
CONSTRUCTION
SUPPORTING EVIDENCE
the main claims of which include, broadly, the
following two distinguishing limitations: (a) The
„Licensee Unique ID‟ on which the registration
system relies for matching for verification purposes is
generated locally….” ‟216 file history, 6/30/95
Response at 6.
“[T]he „Licensee Unique ID‟ is entirely the product
of data generated locally as distinct from data added
before delivery of the software to the local location
for use… or subsequently from a remote location….”
‟216 file history, 6/30/95 Response at 6-7.
“A direct comparison for matching purposes of the
licensee unique ID at the local location….” ‟216 file
history, 6/30/95 Response at 8.
Pic of “local system” which is a user‟s computer
containing local licensee unique ID. ‟216 reexam
history, Slide 5 of Presentation at1087.
“Local Licensee Unique ID Generation” is “A unique
identification generated locally….” ‟216 reexam
history, Slide 7 of Presentation at1089.
“[P]roduced locally and remotely.” ‟216 reexam
history, Slide 31 of Presentation at1113.
11
4658559 v3
3
DISPUTED
TERMS AND PHRASES
Comprises part of said digital
data when executed on said
platform
DEFENDANT GROUP A’S PROPOSED
CONSTRUCTION
Entirely contained in said digital data when
executed on said platform
SUPPORTING EVIDENCE
“A registration system allows digital data or software to
run in a use mode on a platform if and only if an
appropriate licensing procedure has been followed.
Preferably, the system detects when part of the platform
on which the digital data has been loaded has changed in
part or in entirety, as compared with the platform
parameters, when the software or digital data to be
protected was last booted or run. The system relies on a
portion of digital data or code which is integral to the
digital data to be protected by the system. This integral
portion is termed the code portion and may include an
algorithm that generates a registration number unique to
an intending licensee of the digital data based on
information supplied by the licensee which characterizes
the licensee.” ’216 patent, Abstract.
“The system relies on digital data or code which forms
part of the digital data to be protected by the system.
This portion of the digital data which preferably is integral
to the digital data to be protected has been termed the
‘code portion’ elsewhere in this specification. The code
portion includes an algorithm adapted to generate a
registration number which is unique to an intending
licensee of the digital data based on information supplied
by the licensee which characterizes the licensee.” ’216
patent, col. 2:61-3:2.
12
4658559 v3
DISPUTED
TERMS AND PHRASES
DEFENDANT GROUP A’S PROPOSED
CONSTRUCTION
SUPPORTING EVIDENCE
“Preferably, the code portion is integral with the
digital data and can be identical for all copies of the
digital data. It is the algorithm embedded within the
code portion (and which is duplicated at the remote
location) which provides a registration number which
can be „unique‟ if the information provided by the
intending licensee upon which the algorithm relies
when executed upon the platform is itself „unique.‟”
‟216 patent, col. 3:10-17.
“Accordingly, in one broad form of the invention
there is provided a system for licensing use of digital
data in a use mode, the digital data executable on a
platform, the system including local licensee unique
ID generating means and remote licensee unique ID
generating means, the system further including mode
switching means operable on the platform which
permits use of the digital data in the use mode on the
platform only if a licensee unique ID generated by
the local licensee unique ID generating means has
matched a licensee unique ID generated by the
remote licensee unique ID generating means.” ‟216
patent, col. 3:22-32.
“Preferably, the platform unique ID generating means
forms part of the digital data.” ‟216 patent, col. 3:5455.
13
4658559 v3
DISPUTED
TERMS AND PHRASES
DEFENDANT GROUP A’S PROPOSED
CONSTRUCTION
SUPPORTING EVIDENCE
“The system relies on digital data or code 38 which
forms part of the digital data to be protected by the
system. This portion of the digital data, which
preferably is integral to the digital data to be
protected, has been termed the code portion 38
elsewhere in this specification. The code portion 38
includes an algorithm adapted to generate a
registration number 66 or local licensee unique ID or
registration key which characterizes the licensee. In
this instance, the local licensee unique ID generator
which generates the registration number comprises
the execution of code 38 on platform 31.” ‟216
patent, col. 3:57-67.
“Preferably, the code portion 38 is integral with the
digital data and can be identical for all copies of the
digital data. It is the algorithm embedded within the
code portion (and which is duplicated at the remote
location) which provides a registration number which
can be „unique‟ if the information provided by the
intending licensee upon which the algorithm relies
when executed upon the platform is itself „unique‟.”
‟216 patent, col. 6:15-22.
“The digital data 37 includes registration code
portion 38 and use code portion 39.” ‟216 patent, col.
10:28-29, and Figure 5.
14
4658559 v3
DISPUTED
TERMS AND PHRASES
DEFENDANT GROUP A’S PROPOSED
CONSTRUCTION
SUPPORTING EVIDENCE
“It will be appreciated that the registration code
portion 38 effectively forms simply a part of the
software or digital data 37 to be protected/registered
and that the digital data 37 will be or can be identical
for all copies of the word processing program
produced. The registration code portion 38 allows a
unique link to be made between the digital data 37
and an individual authorized or licensed to use the
digital data 37 by way of initial execution of a copy
of the digital data comprising registration code
portion 38.” ‟216 patent, col. 10:53-61, and Figure 5.
“The system illustrated in FIG. 8 operates in the
manner generally described in respect of previous
embodiments and as generally outlined in the
diagram. In the context of the block C illustrated in
FIG. 4, and with reference to FIG. 9, the algorithm,
which generates the unique user identification and
which is resident both as the registration code portion
38 in digital data 37 integrally bound to use code
portion 39 for execution on local platform 31 and
also as remote algorithm 61, is attached to
registration database program 62 for execution on the
remote platform 63.” ‟216 patent, col. 11:43-52, and
Figure 8.
15
4658559 v3
DISPUTED
TERMS AND PHRASES
Prosecution History
Disclaimer Applicable To All
Claims
4
DEFENDANT GROUP A’S PROPOSED
CONSTRUCTION
The licensee unique ID/security key cannot
be generated by a checksum, summation
algorithm, summer, or equivalent thereof,
used to test data integrity.1
SUPPORTING EVIDENCE
See Attachment 1 To Exhibit B
Defendant Group B (comprising Defendants Aspyr Media, Inc., Borland Software Corp., Digital River, Inc., GEAR Software,
Inc. and GEAR Software Holdings, Inc.)
DISPUTED
DEFENDANT GROUP B’S PROPOSED
SUPPORTING EVIDENCE
TERMS AND PHRASES
CONSTRUCTION
Note: Defendant Group B incorporates herein the proposed constructions and supporting evidence for disputed terms and phrases 1 through
4 noted above, and adds the following prosecution history disclaimer.
5 Prosecution History
The licensee unique ID generated by the means
See Attachment 2 to Exhibit B
Disclaimer Applicable To All recited in each of the claims must be derived from
Claims
at least one piece of information that is specific to
the user, such as name, billing information, or
product information unique to the installation
entered by the user. The information cannot be
specific to the computer or independently
generated by the computer.2
1
By arguing that there has been a disclaimer based on the reexamination file history, the Defendants maintain, and do not waive, the additional argument that, independent of the
disclaimer, the claims as previously construed do not cover the disclaimed subject matter.
2
By arguing that there has been a disclaimer based on the reexamination file history, the Defendants maintain, and do not waive, the additional argument that, independent of the
disclaimer, the claims as previously construed do not cover the disclaimed subject matter.
16
4658559 v3
ATTACHMENT 1 TO EXHIBIT B
(Evidentiary Support For Prosecution History Disclaimer)
Intrinsic Evidence in support of the following disclaimer from the reexamination file history: the licensee unique ID/security key cannot be
generated by a checksum, summation algorithm, summer, or equivalent thereof, used to test data integrity.
Grundy does not cure this deficiency of Hellman. The Office alleges that the unique identifier associated with the licensee is disclosed by
Grundy‟s “checksum.” But Grundy’s checksum is solely used to verify the accuracy of user-entered information-it is not a unique
identifier associated with a licensee.
(Reply to Office Action, filed Nov. 29, 2010, p. 18 (emphasis added)).
Thus, Grundy’s “checksum” is not uniquely associated with an intended licensee. Rather, Grundy‟s checksum can only be used to indicate
whether the user (i.e., the intended licensee) correctly entered the requested data.
(Reply to Office Action, filed Nov. 29, 2010, pp. 18-19 (emphasis added)).
However, Grundy‟s checksum cannot meet these limitations as it cannot be equated to claim 1‟s “licensee unique ID.” As explained more
fully below, Grundy’s checksum is used for nothing more than verifying that the licensee correctly entered data. It is not uniquely
associated with any intended licensee and cannot be used to identify any intended licensee.
(Reply to Office Action, filed Nov. 29, 2010, p. 26 (emphasis added)).
17
4658559 v3
Thus, Grundy uses the checksum of the user data as an indicator that the user data has been correctly entered. Grundy does not teach or
suggest that the checksum, or the registration code that includes the checksum as one of the fields, represents a unique identifier associated
with intended registered user.
(Reply to Office Action, filed Nov. 29, 2010, p. 27 (emphasis added)).
A person of ordinary skill in the art would understand “checksum” to represent a small number of check digits that are typically appended
to data in order to ensure the data’s integrity when it is stored or transmitted. To calculate a checksum of some data, the data is added up
(e.g., broken up into C-byte chunks, where C is a small number such as 1, 2, 4, or 8, and summed); the sum is chopped to a fixed length (e.g.,
a byte or C bytes) and appended to the data before storage or transmission. Checksum algorithms used in practice are variations on this
scheme. When the data is received or retrieved later, the checksum is re-calculated to ensure that the result is the same as the original
checksum; if the result differs then the data must have been corrupted. (See, Rosenblatt Dec., ¶52.)
(Reply to Office Action, filed Nov. 29, 2010, p. 27 (emphasis added)).
A checksum is therefore much smaller in length than its input data. For example, a 16-bit (2-byte) or 64-bit (8-byte) checksum may be
calculated on thousands, millions, or billions of bytes of data. This fulfills the checksum’s intended purpose well, given that most errors in
data storage or transmission are small and localized, making it highly likely that the resulting checksum will differ from the one originally
calculated, and extremely unlikely that corrupted data will produce the same checksum as the original one. For example, if one or two bits
are altered, the checksum will differ. (See, Rosenblatt Dec., ¶56.)
(Reply to Office Action, filed Nov. 29, 2010, p. 27 (emphasis added)).
Therefore, a checksum cannot preserve the uniqueness of the input data. Grundy shows the input data to the checksum routine in Fig. 2,
212, “ENTER NEW USER DETAILS.” This is “new user data, such as the user‟s name, address and telephone number” (Grundy at 12:3738.) Such data might take up roughly a hundred bytes of data. A checksum of this data would not preserve its uniqueness; many different
sets of user data could produce the same checksum. Therefore the checksum is not a generator of unique identifiers. (See, Rosenblatt
Dec., ¶62.)
(Reply to Office Action, filed Nov. 29, 2010, p. 27 (emphasis added)).
As previously discussed, a checksum cannot preserve the uniqueness of the input data and thus the checksum is not a generator of unique
identifiers. (See, Rosenblatt. Dec., 62.)
18
4658559 v3
(Reply to Office Action, filed Nov. 29, 2010, p. 32 (emphasis added)).
But as fully discussed above with respect to independent claim 1, a checksum is not unique and therefore cannot be a unique identifier
associated with a licensee. Specifically, Grundy is not using the checksum to represent a security key, but rather uses the checksum of the
user data as an indicator that the user data has been correctly entered. Grundy does not teach or suggest that the checksum represents a
unique identifier of an intended registered user.
(Reply to Office Action, filed Nov. 29, 2010, p. 33 (emphasis added)).
“These fields, however, are checksums. Checksums are not unique fields, even if there [sic] are at least in part derived from unique data. It is
NOT agreed that a reasonable examiner would have found this reference important in determining the patentability of claims 1-20.” (Order
Granting/Denying Request for Ex Parte Reexamination, pg. 9, emphasis added)
Patent Owner Agrees
(Uniloc Powerpoint slides presented to Examiner during Nov. 17, 2010 Examiner Interview, slide 36).
Checksum is not unique and does not uniquely identify an intended registered user
(Uniloc Powerpoint slides presented to Examiner during Nov. 17, 2010 Examiner Interview, slide 37).
Uniloc submits that based on the Examiner‟s statement in the Order, Grundy’s data validation checksums do not produce a unique ID that
could be used by Hellman.
(Reply to Office Action, filed Mar. 18, 2011, p. 15).
Uniloc also argued that Grundy‟s checksum did not generate “a licensee unique ID” because Grundy‟s checksum algorithm, by its very
nature, destroys any uniqueness.
(Reply to Office Action, filed Mar. 18, 2011, p. 16).
19
4658559 v3
As Dr. Pooch explains that “Grundy ... describes several conventional uses for checksums.” (Pooch Dec. 8.) For example, “the checksums
described in Grundy are not cryptographic functions, but rather appear to be used to check, for example, for typographical data entry
errors or transmission errors.” (Pooch Dec., 32.)
(Reply to Office Action, filed Mar. 18, 2011, p. 31).
In the rejection of claim 1 on page 14, on the other hand, the Examiner proposes to replace Hellman‟s cryptographic function generator 38
with the checksum of Grundy to provide the summation algorithm limitation absent from the teachings of Hellman. (Second Action, p. 15;
bottom.) However, if these references are combined as the Examiner suggests, with Grundy’s error-checking checksum replacing
Hellman’s cryptographic function generator, the Examiner can no longer take credit for the “uniqueness” feature provided by Hellman
because the source of that uniqueness, the one-way compressive hash function having a 100:1 X/Y bit ratio, would also be replaced by
Grundy’s checksum. Uniloc therefore requests that the obviousness rejection of claims 2, 12 and 1 7 be reconsidered and withdrawn.
(Reply to Office Action, filed Mar. 18, 2011, p. 34).
The basis for this determination was that the Requester attempted to rely on Grundy‟s checksums; and, according to the Office, Grundy‟s
“[c]hecksums are not unique fields, even if there [sic] are at least in part derived from unique data.” (Order, p. 9.)
Yet despite this technically correct analysis of Grundy‟s checksums …
(Reply to Office Action, filed Mar. 18, 2011, p. 43).
Further, the checksums described in Grundy are not cryptographic functions, but rather appear to be used to check for typographical data
entry errors or transmission errors.
(Declaration of Dr. Udo W. Pooch Under 37 C.F.R. § 1.132, ¶ 32).
While the usual checksums are useful in detecting accidental modification such as corruption to stored data or errors in a communication
channel, they provide no security against a malicious agent as their simple mathematical structure makes them trivial to circumvent. To
provide this level of integrity, the use of a cryptographic hash function is necessary.
(Declaration of Dr. Udo W. Pooch Under 37 C.F.R. § 1.132, ¶ 33).
A checksum is a value that (a) is computed by a function that is dependent on the contents of a data object and (b) is stored or transmitted
together with the object, for the purpose of detecting changes in the data. A checksum algorithm is a signature algorithm that does not
20
4658559 v3
attempt to provide cryptographic protection against inversion. The term “checksum” originally referred to checking algorithms that summed
the bytes, but is now generally used to refer to any non-cryptographic checking algorithm.
(Declaration of Dr. Udo W. Pooch Under 37 C.F.R. § 1.132, ¶ 36).
This is consistent with a contemporaneous definition of “checksum” from the time the application leading to the „216 patent was filed, which
defines a “checksum” as:
a calculated value that is used to test data integrity. Errors can occur when data is transmitted or when it is written to disk. One means of
detecting such errors is use of a checksum, a value calculated for a given chunk of data by sequentially combining all the bytes of data with a
series of arithmetic or logical operations. After the data is transmitted or stored, a new checksum can be calculated (using the possibly faulty
transmitted or stored data) and compared with the original one. If the checksums don‟t match, an error occurred, and the data should be
transmitted or stored again; if they do match, the transmission or storage was probably error-free. Checksums are a simple validation
mechanism, and they cannot be used to correct erroneous data.
(Declaration of Dr. Udo W. Pooch Under 37 C.F.R. § 1.132, ¶ 36 (citing Computer Dictionary, The Comprehensive Standard for Business,
School, Library, and Home, Microsoft Press (1991) (emphasis added)); see also Pooch Declaration at ¶¶ 37-38.
Declaration of William R. Rosenblatt Under 37 C.F.R. § 1.132, filed Nov. 29, 2010, ¶¶ 48-65. (See, for example, ¶ 51: “I concur with that
characterization of checksums. A checksum is not usable as a generator of unique IDs.” See also, for example, ¶ 63: “For the above
reasons, a checksum cannot possibly preserve whatever uniqueness the input data may possess. In particular, a POSA would not ascribe
any reasonable definition of „unique‟ to the output of a checksum routine.”)
The PTO relied on Uniloc‟s repeated and express disclaimers by stating (inter alia): The Patent Owner has persuasively argued that the
summation disclosed in Grundy is used in the context of merely verifying the correctness of information related to the user and is not being
used to generate an ID per se. Since the information is not being used for the same purpose, one skilled in the art therefore would not use the
algorithm of Grundy as part of the generation of the claimed licensee unique ID.” (Notice of Intent to Issue Ex Parte Reexamination
Certificate, at p. 6.)
Defendants may rely on other statements made by Uniloc during the reexamination, as well other specific statements made by the declarants
in the declarations submitted by Uniloc during the reexamination. In addition, Defendants note that Uniloc has just produced, on August 29,
2011, the lengthy declaration of William Rosenblatt. While Defendants have cited to certain portions of that declaration, above, Defendants
reserve the right to rely on other portions of that declaration, which appears to include extensive support for the disclaimer.
21
4658559 v3
ATTACHMENT 2 TO EXHIBIT B
(Evidentiary Support For Prosecution History Disclaimer)
Intrinsic Evidence in support of the following disclaimer from the reexamination file history: The licensee unique ID generated by the means
recited in each of the claims must be derived from at least one piece of information that is specific to the user, such as name, billing information,
or product information unique to the installation entered by the user. The information cannot be specific to the computer or independently
generated by the computer.3
Ex Parte Reexamination Interview Summary, mailed on Nov. 19, 2010, slide 22:
Id. at slide 26:
3
By arguing that there has been a disclaimer based on the reexamination file history, the Defendants maintain, and do not waive, the additional argument that, independent of the
disclaimer, the claims as previously construed do not cover the disclaimed subject matter.
22
4658559 v3
Id. at slides 32-35:
23
4658559 v3
24
4658559 v3
25
4658559 v3
Office Action Response filed Nov. 29, 2010, at 17-18, 20-25, 29, 31, and 33-35.
See, e.g., id. at 17:
See e.g., id. at 18:
26
4658559 v3
See, e.g., id. at 20:
See, e.g., id. at 21:
27
4658559 v3
See, e.g., id. at 22-23:
28
4658559 v3
See, e.g., id. at 24:
29
4658559 v3
See, e.g., id. at 25:
See Office Action Response filed Mar. 18, 2011 at 11, 12, 14-15, 19-22, and 31-32.
See, e.g., id. at 11:
30
4658559 v3
See, e.g., id. at 12:
31
4658559 v3
See, e.g., id. at 14-15:
See, e.g., id. at 19-22:
32
4658559 v3
33
4658559 v3
34
4658559 v3
35
4658559 v3
See Declaration of William R. Rosenblatt Under 37 C.F.R. § 1.132, filed Nov. 29, 2010, ¶¶ 16-21, 23, 36-47, 66-68, 72-74, 80-83.
See, e.g., id. at ¶¶ 38-40:
36
4658559 v3
37
4658559 v3
See Notice of Intent to Issue Reexamination Certificate, mailed on Aug. 5, 2011 at 5:
Defendants may rely on other statements made by Uniloc during the reexamination, as well other specific statements made by the declarants in the
declarations submitted by Uniloc during the reexamination. In addition, Defendants note that Uniloc has just produced, on August 29, 2011, the
lengthy declaration of William Rosenblatt. While Defendants have cited to certain portions of that declaration, above, Defendants reserve the right to
rely on other portions of that declaration, which appears to include extensive support for the disclaimer.
38
4658559 v3
39
4658559 v3
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?