Uniloc USA, Inc. et al v. NATIONAL INSTRUMENTS CORP. et al

Filing 265

Responsive CLAIM CONSTRUCTION BRIEF filed by FileMaker, Inc., Pervasive Software, Inc., Symantec Corp.. (Attachments: # 1 Exhibit 1 - '216 patent, # 2 Exhibit 2 - PTO Amendment, # 3 Exhibit 3 - Reply to PTO, # 4 Exhibit 4 - Response to PTO, # 5 Exhibit 5 - PTO Notice of Reexam, # 6 Exhibit 6 - PTO Dec of Pooch, # 7 Exhibit 7 - PTO Interview Summary, # 8 Exhibit 8 - PTO Dec of Rosenblatt)(Jones, Michael)

Download PDF
DEFENDANTS’ RESPONSIVE BRIEF ON CLAIM CONSTRUCTION EXHIBIT 7 Control No. 901010,831 Ex Parte Reexamination Interview Summary Patent Under Reexamination 5,490,216 r=Ex-a-m~i~ne-r------------~A~rt~U~n~it-----r----------~ 3992 MATIHEW HENEGHAN All participants (USPTO personnel, patent owner, patent owner's representative): (1) MATTHEW HENEGHAN (3) Minh Dinh Nguyen (2) Alex Kosowski (4) 8 others. see Exhibit. p. 3. Date of Interview: 17 November 2010 Type: a)O Telephonic b)O Video Conference c)~ Personal (copy given to: 1)0 patent owner Exhibit shown or demonstration conducted: d)~ Yes If Yes, brief description: Powerpoint Presentation 2)0 patent owner's representative) e)O· No. Agreement with respect to the claims f)0 was reached. g)~ was not reached. h)O N/A. Any other agreement(s) are set forth below under "Description of the general nature of what was agreed to ... " Claim(s) discussed: 1-20. Identification of prior art discussed: Hellman. Grundy. Description of the general nature of what was agreed to if an agreement was reached, or any other comments: The Patent Owner argued that some limitations of the claims were not met by the cited art and that obviousness could . be overcome in view of secondary considerations: No agreement was reached. See attachment. (A fuller description, if necessary, and a copy of the amendments which the examiner agreed would render the claims patentable, if available, must be attached. Also, where no copy of the amendments that would render the claims patentable is available, a summary thereof must be attached.) A FORMAL WRITTEN RESPONSE TO THE LAST OFFICE ACTION MUST INCLUDE PATENT OWNER'S STATEMENT OF THE SUBSTANCE OF THE INTERVIEW. (See MPEP § 2281). IF A RESPONSE TO THE LAST OFFICE ACTION HAS ALREADY BEEN FILED, THEN PATENT OWNER IS GIVEN ONE MONTH FROM THIS INTERVIEW DATE TO PROVIDE THE MANDATORY STATEMENT OF THE SUBSTANCE OF THE INTERVIEW (37 CFR 1.S60(b». THE REQUIREMENT FOR PATENT OWNER'S STATEMENT CAN NOT BE WAIVED. EXTENSIONS OF TIME ARE GOVERNED BY 37 CFR 1.550(c). !Matthew Heneghan! USPTO AU 3992 cc: Requester (if third party requester) u.s. Patent and Trademark Office PTOL-474 (Rev. 04-01) Ex Parte Reexamination Interview Summary PaperNo. 20101118 UNI075036 ~Sterne Kessler Goldstein Fox AHORNE YS AT LAW Reasons Why Claims Should be Confirmed . • Key claim elements not taught or suggested by the alleged SNQ: • Generating a Licensee Unique 10 based on information unique to the user • Grundy is improperly used for the purpose of generating a Unique ID in original prosecution and therefore cannot be used in a SNQ during reexamination c z o ...... 0'1 o 0'1 00 22 SKGF.COM (1J 2010 Sterne. Kessler. Goldslein. & Fox P.lLC. Aft Righls Reserved. (SJ,Sterne Kessler Goldstein fox I\TiORNEYS AT LAW Key Claim Terms - Intrinsic Evidence "Licensee Unique ID/Security Key/Registration Key/Enabling Key" . -"It is the algorithm embedded within the code portion (and which is duplicated at the remote location) which provides a registration number which can be 'unique' if the information provided by the intending licensee upon which the algorithm relies when executed upon the platform is itself 'unique.'" ('216 patent, 3:11-16 and 6:16-21) "'" -The code portion includes an algorithm adapted to generate a registration number which is unique to an intending licensee of the digital data based on information supplied by the licensee which characterizes the licensee. ('216 patent, 2:65 - 3:2). . -It is the algorithm embedded within the code portion (and which is duplicated at the remote location) which provides a registration number which can be "unique" if the information provided by the intending licensee upon which the algorithm relies when executed upon the platform is itself "unique ll • ('216 patent, 6:17-22 and 3:11-17). -This information, unique to the user, is passed through a registration number algorithm 14 (represented symbolically in FIG. 1) which generates a registration number or security key from the information unique to the user together with the serial number previously generated. ('216 patent, 7:14-19). . c z ..J o ...... 0'1 o en I\) 26 SKGF.COM @2010Stern&, Kessler, Goldstein, & Fox Puc All Rigbts Re5erVed. (SJ.Sferne Kessler Goldstein Fox ATTORM.Y~ Af lAW Hellman Does Not Disclose a Licensee Unique 10 (as testified at trial by Professor Hellman) / liThe Hellman patent, however, does not use a product key or any other "nonplatform-related" user information to create a licensee unique ID .... Hellman (the person) admitted - after repeatedly being impeached with his deposition testimony - that his patent failed to teach this requirement of the claims." (Yellow Brief - Uniloc USA v. Microsoft, Case No. 2010-1035-1055 (Fed. Cir.), p. 57) [Attorney] Question: If you wanted to indicate that information associated with the user, unique information was input into the cryptographic function, you certainly had the ability to disclose that in the figures, if you so chose. [Hellman] Answer: Correct. [Attorney] Question: And you didn't? [Hellman] Answer: Correct. [Attorney] Question: And you also had the ability to describe in the patent, if you so chose? [Hellman] Answer: In the specification? Yes. [Attorney] Question: And you didn't? [Hellman] Answer: Correct (March 31, 2009 Trial Transcript: p.61, II. 17 - p 62, II. 4, Uniloc USA, Inc. et al. v. Microsoft Corp., C.A. No. 03-440 (O.R.I.» c z o ...... 0'1 o en CD \.. 33 SKGF.COM ~ €I 2010 Sterne, Kessler. Goldstein. & Fox puc. All Righls Reserved. (SJ,Sferne Kessler Goldstein Fox AfTORNEYS Af LAW Hellman Does Not Disclose a Licensee Unique 10 -K is a base unit identifying key stored in permanent memory, inaccessible by the user -N is the number of software uses being requested -R is a random number -H is a value that identifies the name of the software package being requested c -None of the above are associated with the licensee· (as admitted by Hellman at trial) 38 CRYPTOGRAPHIC FUNCTION NtH 3t--J COMPARAlOR . a t::-;: TO 36 ~WARENAM£ FIG_7· z o ...... 0'1 o o ...... 34 SKGF.COM ~2010 Sterne. Kessler. GoIds1ein. & Fax P.LLC All Rights ReseJVed . CSlSterne Kessler Goldstein Fox ATTORNEYS AT LAW Hellman Does Not Disclose Local Licensee Unigue ID K, N, R, and Hare used to generate C. However C is not disclosed to be a unique 10 associated with a user. Therefore C is not a "licensee unique ID" as recited in claims 1, 19 and 20. Nor is C "a security key [generated] from information input to said software which uniquely identifies an intended registered user" as recited in· claim 12, nor is C "a registration key which is a function of information unique to an intending user of the software" as recited in claim 17. c 12 14- FIG_6 38 CRYPTOGRAPHIC FUNCTION c NtH 39 COMPARATOR a t-- TO 36 SOFTWARE NAME A FIG_7 z o ...... 0'1 o ...... ....Jo. 35 SKGFCOM ~ 2010 Sterne, Kessler, Goldstein, & Fox P.l.cc. All Rights Resel\'ed.

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?