[00:00:00] Speaker 01: Our next case is Ward's Participations, B.V. [00:00:03] Speaker 01: vs. Samson, Electronics Company, LTD, docket number 23-2080. [00:00:32] Speaker 01: Mr. Lund. [00:00:44] Speaker 01: You reserve four minutes of your time for rebuttal, correct? [00:00:46] Speaker 04: Yes, your honor. [00:00:47] Speaker 01: Okay. [00:00:49] Speaker 01: I think we're ready. [00:00:50] Speaker 04: All right. [00:00:51] Speaker 04: May it please the court, Eric Lund for appellant award, participations, and I'm joined by Mr. Joseph Zito. [00:00:58] Speaker 04: It's important to start with the invention of the Ward patents, and I want to start with figure three of the 480 patent, which is at appendix 140. [00:01:09] Speaker 04: What Mr. Ward invented here is a software solution to doing secure transactions. [00:01:18] Speaker 04: The way that Mr. Ward did this was he identified that typically when a user is using a system, they're going through the operating system. [00:01:25] Speaker 04: That creates a vulnerability in the system because if that gets compromised, typically the operating system has direct access to what we call the secure area. [00:01:33] Speaker 01: Do we have, you're waving a document, is that in the record? [00:01:36] Speaker 04: This is Figure 3 in your system. [00:01:37] Speaker 01: Yeah, we can't see that anyways. [00:01:39] Speaker 04: Okay, well then I'll just keep it for my notes. [00:01:42] Speaker 04: So, looking at Figure 3, on the left side is what I'm talking about, where in a typical system a user is [00:01:50] Speaker 04: is making transactions and that operating system has access to the secure area. [00:01:56] Speaker 04: What Mr. Ward recognized was that there's a way to separate out so that the operating system does not have access to the secure area. [00:02:03] Speaker 04: And the solution that he came up with is whereby, as you see on the right side here, Figure 3, [00:02:09] Speaker 04: for the user or the operating system to get to the secure area. [00:02:12] Speaker 04: It has to go through the BIOS, which has the encryption key, and it has to go importantly through the console. [00:02:17] Speaker 04: The key here is that Mr. Ward recognized that although the console was typically used for error processing, in this it could be used to access and to run the secure processing environment. [00:02:30] Speaker 04: And that's key to remember because when the board has combined two references in particular, Muir and Ellison, these are two references that did not recognize that problem and they don't have that solution. [00:02:42] Speaker 04: In Muir, I'm looking at figure three, which is 1008 in the appendix. [00:02:48] Speaker 04: The board relies on the virtual smart card driver, a figure three of Mir, to teach the secure transaction in accessing a secure environment. [00:03:01] Speaker 04: Nothing in Mir talks about a secure environment. [00:03:05] Speaker 04: It all is being processed in an open general processing environment that's accessible to the operating system and to a user of the operating system. [00:03:11] Speaker 04: The board then takes Muir, which is unsecure, and puts it into Ellison. [00:03:17] Speaker 04: And if we look at figure 1A of Ellison, which is appendix 949, Ellison is divided into two different architectures, a normal execution and an isolated execution. [00:03:29] Speaker 04: If we look at the normal execution, which is unshaded, we see that the software driver 13 and the hardware driver 14 were outside on the normal execution mode. [00:03:40] Speaker 04: In that same mode is the primary OS, which Mr. Ward identified as a vulnerability. [00:03:46] Speaker 04: The board has stated that you would combine these two systems, but the only way to combine Muir with Ellison is to put that virtual cart smart driver, 155, where Ellison teaches the drivers reside, which is in the normal execution environment. [00:04:04] Speaker 04: That is not the invention of Mr. Ward. [00:04:07] Speaker 04: Because in this system, you're going to have all of the applications running, all of the operating system, and all of the drivers on the normal execution mode, which does not solve the problem. [00:04:16] Speaker 04: Coming back to Mr. Ward's, you're still on the left side where the operating system and the user has access to the secure environment. [00:04:23] Speaker 04: Nothing in Ellison teaches putting the mirror system on the shaded side in the isolated environment. [00:04:30] Speaker 04: Neither mirror nor [00:04:32] Speaker 04: Ellison Teach using the console as the access point for the secure environment. [00:04:39] Speaker 01: Kelser, I appreciate your arguments. [00:04:42] Speaker 01: Can you touch on the construction, the claim construction argument of stored and said secure memory, inaccessible to said operation system? [00:04:54] Speaker 04: Yes, Your Honor. [00:04:55] Speaker 04: On that point, our position was that when the [00:05:03] Speaker 04: When the processing is loaded into the processing environment, although it may go into a secure processing area, it is normally stored in an unsecure area. [00:05:15] Speaker 04: And the board made a distinction there that even a temporal storage or temporal moment in a processing environment is enough to satisfy the secure element. [00:05:28] Speaker 04: Even with that construction that the board has gone through, our position is still that combining these two systems, you have an unrecognized problem that these two don't recognize, even if we adopt the board's construction of whether something is secure, whether it's temporally stored or not. [00:05:47] Speaker 04: And the reason for that is because when you combine these two systems, you're going to be running these drivers [00:05:55] Speaker 04: through the normal execution mode. [00:05:57] Speaker 01: You're back at combination. [00:05:58] Speaker 01: I was hoping you could address the claim construction issue. [00:06:02] Speaker 01: It seems to me that you're arguing that the board erred in construing the particular claim that I recited. [00:06:10] Speaker 04: Yes, Your Honor, that is our position. [00:06:12] Speaker 01: Can you address that issue? [00:06:13] Speaker 04: Yes. [00:06:14] Speaker 04: On that point, our position is that if the [00:06:21] Speaker 04: driver or any component is stored in an unsecure area, then it is accessible to an intruder. [00:06:28] Speaker 04: It is accessible to someone who gets access to the operating system or to the general hardware of the system. [00:06:33] Speaker 04: The board's position is that even a temporal moment where it's loaded into a secure position would satisfy the claim limitation. [00:06:45] Speaker 04: And obviously, we disagree with that, but we do understand that when things are temporally stored, whether it's in a secure area or an unsecured area, that they come to that conclusion. [00:06:56] Speaker 01: Would you agree with me that your arguments with respect to claim construction are mainly factual assertions? [00:07:06] Speaker 01: They're basing facts? [00:07:08] Speaker 04: Yes, Your Honor, and their claim constructions that, from our position, we've put forth testimony from one of ordinary skill in the art that they would see it a different way. [00:07:21] Speaker 04: The board has chosen to interpret it a different way, and we understand that. [00:07:26] Speaker 04: But yes, Your Honor, I would agree. [00:07:28] Speaker 02: Did you brief this as a claim construction dispute to the board and or to us? [00:07:34] Speaker 04: We did brief the claim construction issue at the board. [00:07:43] Speaker 04: In our opening brief, I believe we mentioned it. [00:07:46] Speaker 04: How about here? [00:07:49] Speaker 02: Are you arguing? [00:07:50] Speaker 04: I'm not arguing claim construction today. [00:07:52] Speaker 04: No, Your Honor. [00:07:54] Speaker 03: You have a couple of sentences that's in the midst of a very, very large chunk mostly about the art. [00:08:02] Speaker 03: That sounded like a claim construction argument, but you're not really pressing that. [00:08:07] Speaker 04: No, I'm not pressing claim construction, Your Honor. [00:08:09] Speaker 04: And the reason I'm not pressing it today is because we believe that the most salient point, which you can decide everything notwithstanding claim construction, is this combination of the art, which we believe does not recognize the problem that the board solved and does not teach it, even when combined. [00:08:28] Speaker 02: But those are factual arguments that the board considered, and we review the board's findings for substantial evidence, correct? [00:08:35] Speaker 02: Yes. [00:08:37] Speaker 01: is the same true with the arguments with respect to obviousness and combination? [00:08:44] Speaker 01: Those are factual assertions that you're making. [00:08:49] Speaker 04: Well, Your Honor, obviousness, the interpretation of the board, we believe on those combinations is wrong. [00:08:58] Speaker 04: We think that's against the weight of the evidence because [00:09:01] Speaker 04: even assuming that these two references would have been combined by one of ordinary skill in the art, and that they would look to Muir to solve this problem with Ellison, we don't believe that the [00:09:14] Speaker 04: the references show the solution. [00:09:17] Speaker 04: And we've argued that. [00:09:19] Speaker 04: We made this point in 1606 in our opening brief in the appendix. [00:09:23] Speaker 04: And our position today is that the combination of these elements doesn't teach Mr. Ward's invention and that the board has erred by concluding that they're there. [00:09:34] Speaker 04: The board specifically, they looked at these arguments and they made a determination that we believe is contrary to the evidence and is not supported by [00:09:42] Speaker 04: by the disclosures themselves and what one ordinary skill in the art would have come up with in combining these. [00:09:49] Speaker 03: Can you say a word about the written description point which, if the board is right about, applies to all the claims in the 480? [00:09:59] Speaker 04: Yes, Your Honor, thank you. [00:10:00] Speaker 04: And we did brief that, page 53 of our opening brief, and we talk about that extensively. [00:10:05] Speaker 04: But I do want to make two points. [00:10:06] Speaker 04: The first is that the written description, as understood by one of ordinary skill in the art, points to the fact that substituting authentication data for private key was appropriate. [00:10:18] Speaker 04: We have testimony from our world-renowned expert, Dr. Purnell, on that point. [00:10:23] Speaker 04: But the one thing I do want to highlight is that when the board [00:10:27] Speaker 04: interpreted the 112 issue. [00:10:29] Speaker 04: They took issue with the fact that our disclosure talks about two different, what they believe are two different private keys. [00:10:36] Speaker 04: Well, in encryption there's both symmetric encryption and asymmetric encryption. [00:10:41] Speaker 04: The board only addressed asymmetric encryption where you have both a public key and a private key. [00:10:45] Speaker 04: Two keys, one for signage and one for encryption. [00:10:48] Speaker 04: Our system can be an asymmetric system, wherein the private key can be both for encryption and for signage. [00:10:56] Speaker 03: It can be a symmetric system. [00:11:00] Speaker 03: Symmetric system, yes. [00:11:02] Speaker 04: I misspoke, yes. [00:11:04] Speaker 04: My apologies. [00:11:05] Speaker 04: it can be a symmetric system whereby the same key can be used both for encryption and signage. [00:11:12] Speaker 04: And the reason we point that out is because the reasoning whereby the board looked at our disclosure and said, you have two distinct keys here and use that as a reason to not take one interpretation over the other. [00:11:23] Speaker 04: But that's because they were thinking about an asymmetric system, not a symmetric system where those keys could serve both functions. [00:11:32] Speaker 04: And if there's no further questions, I'll reserve my time. [00:11:34] Speaker 01: Okay. [00:11:35] Speaker 01: Thank you, sir. [00:11:42] Speaker 01: Councillor Bult. [00:11:45] Speaker 00: Good morning, Your Honors. [00:11:46] Speaker 00: May I please support Ashley Bult for Samsung. [00:11:49] Speaker 00: As Your Honors recognized in talking to wards council, this appeal is all about disagreements with the board's fact findings. [00:11:57] Speaker 00: And as you know well, reweighing evidence on appeal is not the role of this court. [00:12:02] Speaker 00: So in the three proceedings below, the board found the disputed claims would have been obvious based on the Ellison and Muir references. [00:12:08] Speaker 00: And the board's findings with respect to the teachings of those references. [00:12:12] Speaker 03: Not all, in the two IPRs. [00:12:14] Speaker 03: Correct, correct. [00:12:15] Speaker 03: All of the other 480 claims are at issue in the PGR. [00:12:19] Speaker 00: That's right, Your Honor. [00:12:20] Speaker 00: So the claims disputed with respect to the 103 grounds were all found unpatentable based on the combination of the Ellison and Muir references. [00:12:31] Speaker 00: And as Council for Ward brought up, the Board found that there would have, there was a motivation to combine those references. [00:12:40] Speaker 00: And whether a person of ordinary skill in the art would have been motivated to combine those references is a question of fact that this court reviews for substantial evidence. [00:12:49] Speaker 03: Well, one way of understanding Mr. Lund's argument might be that somebody might be motivated to combine, but the combination would not arrive at the claims. [00:13:02] Speaker 03: Because if you take the virtual something driver in Muir and put it in the relevant place in Ellison, it's actually going to be on the daytime side of this sphere and not the nighttime side. [00:13:19] Speaker 00: Certainly an apt description. [00:13:22] Speaker 00: But Your Honor, what we would say to that is that the board relied on expert testimony from Samsung's expert Dr. Black that a person of ordinary skill in the art could combine these references [00:13:35] Speaker 00: And that constitutes substantial evidence to support the board's findings. [00:13:40] Speaker 03: Just because they could. [00:13:41] Speaker 03: I mean, we said repeatedly the fact that something could be combined is not sufficient by itself. [00:13:49] Speaker 03: You need a reason why a skilled artisan would combine them. [00:13:53] Speaker 00: Sure, I misspoke in that. [00:13:55] Speaker 00: I think it might be helpful for us to look at the expert testimony that supports the board in this regard. [00:14:03] Speaker 00: So, for example, we could look at appendix page 1217. [00:14:24] Speaker 00: And at paragraph 71 on page 1217, we're looking at Dr. Black's declaration submitted to the board. [00:14:36] Speaker 00: I see your honors are still flipping. [00:14:38] Speaker 00: Are you there? [00:14:39] Speaker 00: OK. [00:14:40] Speaker 00: So this paragraph sort of concludes Dr. Black's reasoning with respect to the motivation to combine. [00:14:46] Speaker 00: And he says, for at least the foregoing reasons, a person of ordinary skill in the art would have combined the teachings of Ellison and Muir and would have had a reasonable expectation of success, that the combination would have simply involved combining prior art elements, Muir's computer system with restricted memory space, and secure cryptographic operations [00:15:06] Speaker 00: according to known methods using Ellison's isolated execution architecture to yield the predictable result of performing electronic transactions securely between two parties. [00:15:17] Speaker 03: So Mr. Vaughan said the two pieces of prior art do not show recognition of the problem. [00:15:24] Speaker 03: Is your view that so what, it doesn't matter, or that he's wrong about the absence of a recognition of the problem? [00:15:36] Speaker 00: I don't believe we have taken a position as to whether the references recognize the problem, but I think that our position is that, as you said, so what? [00:15:50] Speaker 00: It doesn't matter because we have substantial evidence supporting the board's findings that a person of ordinary skill in the art would have combined the references, would have had a reasonable expectation of success in doing so. [00:16:01] Speaker 00: and that that testimony, even standing alone, is enough to constitute substantial evidence to support the board's findings. [00:16:13] Speaker 00: If there are further questions on the obviousness issue, I'd be happy to address those. [00:16:19] Speaker 00: Okay. [00:16:20] Speaker 00: So I'd like to just briefly touch on the written description issue. [00:16:26] Speaker 00: So in the PGR covering the 480 patent, the board found all claims of the patent unpatentable because they lack written description support for certain limitations reciting a private key. [00:16:39] Speaker 00: This finding is also supported by substantial evidence. [00:16:42] Speaker 00: There's only one paragraph in the 480 patent specification that mentions a private key, but as the board recognized that paragraph in column 13, [00:16:52] Speaker 00: does not describe, for example, where that key is stored, when it's accessible to the user, or when it is encrypted. [00:17:00] Speaker 00: And those are all limitations of the claim that must be supported by a written description in the patent. [00:17:07] Speaker 03: So Mr. Lund said something to the effect, I may get this wrong, that the spec refers to two different private keys and the board assumed that those were different private keys so that although it may say something about the place of storage of one of them, it doesn't say anything about the place of storage of the other. [00:17:36] Speaker 03: And I think Mr. Lung said, well, one of the two standard ways of doing encryption is to use the same key. [00:17:43] Speaker 03: Can you just address that? [00:17:44] Speaker 00: Sure. [00:17:44] Speaker 00: So if we look at the 480 patent at, I believe it's column five, starting around line 39, there is a paragraph that talks about [00:17:59] Speaker 00: the authentication software that has its own unique serial number, software ID, and or private encryption key. [00:18:06] Speaker 00: That phrase private encryption key is, I believe, the other key to which Mr. Land was referring in his argument. [00:18:14] Speaker 00: And certainly the specification does describe the encryption key in that way. [00:18:20] Speaker 00: But when we turn then to column 13, which is the only place in which the specification uses the specific term private key, [00:18:29] Speaker 00: We see that, for example, we have at the beginning of that paragraph around line 31. [00:18:36] Speaker 03: I'm sorry, just to be clear, you say that's the only place that it uses the phrase private key, even though the passage at column five, line 40, uses the pretty similar phrase, private encryption key? [00:18:53] Speaker 00: Yes, Your Honor. [00:18:55] Speaker 00: Our position is that those are two different keys, two different terms. [00:19:00] Speaker 00: And that's supported by, in column 13, for example, around line 31, when we get to this paragraph talking about the private key, the paragraph starts with, in a further embodiment, the authentication software may be provided with, and then goes on to talk about the private key, suggesting that it's a different key. [00:19:21] Speaker 00: And, Your Honor, it's actually further supported by the related patent, the 766 patent here, if we look [00:19:30] Speaker 00: At claim 1 of the 766 patent also recites a private key, as does claim 1 of the 480 patent. [00:19:39] Speaker 00: But then the claim 24 of the 766 patent, which depends from claim 1, recites the method according to claim 1. [00:19:50] Speaker 00: wherein the authentication software has a private encryption key. [00:19:54] Speaker 00: So the difference in claiming in this related patent, the 766 patent, suggests that the private key and the private encryption key are two different things. [00:20:07] Speaker 03: And sorry, this was claim what of the 766? [00:20:09] Speaker 00: Claim 24. [00:20:10] Speaker 03: Thanks. [00:20:15] Speaker 00: Your honors, if there are further questions with respect to written description, I'd be happy to take those at this time. [00:20:21] Speaker 00: If not, I will cede the remainder of my time, and Samsung asks that this court affirm. [00:20:27] Speaker 01: We thank you very much, Counselor. [00:20:29] Speaker 01: Thank you. [00:20:32] Speaker 01: Mr. Flynn, you have about four minutes. [00:20:37] Speaker 04: Thank you, Your Honor. [00:20:38] Speaker 04: I'll start. [00:20:39] Speaker 04: If the board has any questions, I can address those based on what Council said. [00:20:43] Speaker 04: If not, the final point I just want to make is that we're not here disputing facts. [00:20:49] Speaker 04: The references themselves are facts. [00:20:51] Speaker 04: We're disputing the legal conclusions that the board came up based on those facts. [00:20:56] Speaker 04: And we're disputing the opinion of Samsung's expert, Mr. Black. [00:21:01] Speaker 04: And for that reason, Mr. Ward asked that the panel reverse. [00:21:08] Speaker 01: Okay, we have your...