Paone v. Microsoft Corp.

771 F. Supp. 2d 224, 2011 U.S. Dist. LEXIS 12611, 2011 WL 553577
CourtDistrict Court, E.D. New York
DecidedFebruary 9, 2011
Docket07-cv-2973 (ADS)(ARL)
StatusPublished
Cited by3 cases

This text of 771 F. Supp. 2d 224 (Paone v. Microsoft Corp.) is published on Counsel Stack Legal Research, covering District Court, E.D. New York primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Paone v. Microsoft Corp., 771 F. Supp. 2d 224, 2011 U.S. Dist. LEXIS 12611, 2011 WL 553577 (E.D.N.Y. 2011).

Opinion

MEMORANDUM OF DECISION AND ORDER

SPATT, District Judge.

In this patent infringement case, the plaintiff Luciano F. Paone alleges that the defendant Microsoft Corporation (“Microsoft”) has infringed United States Patent 6,259,789 (“the '789 Patent”), which Paone holds. Pursuant to the Supreme Court’s decision in Markman v. Westview Instruments, Inc., 517 U.S. 370, 116 S.Ct. 1384, 134 L.Ed.2d 577 (1996), the Court now construes the disputed claim terms of the '789 Patent.

I. BACKGROUND

A. Background of the Invention

The United States Patent and Trademark Office (“PTO”) issued the '789 Patent, entitled “Computer Implemented Secret Object Key Block Cipher Encryption and Digital Signature Device and Method”, to the plaintiff Luciano F. Paone on July 10, 2001. The '789 Patent describes a method of translating (or “encrypting”) ordinary data (called “plaintext”) into encoded data (called “ciphertext”), so that the plaintext may not be viewed by an unintended reader. In cryptography, which is the science of encryption, such a method is called a “cipher”. Generally, encrypted ciphertext is later decoded, or “decrypted”, into plaintext, so that the data is again usable. The cipher described in the '789 Patent is a computer based “symmetric key cipher.”

By way of background, a very simple cipher (that is, method) used to encrypt a message sent in English might be to replace each letter in the plaintext with the character that directly follows that letter in the alphabet. Using that method, each *226 “a” in the message would be replaced with a “b”, each “b” in the message would be replaced with a “c”, each “c” would be replaced with a “d”, and so forth. Each “z” would be replaced with an “a”. Using this cipher, the message “Hello there” becomes “Ifmmp uifsf.” A person who knows the method of encryption — -that is, who knows the cipher — can easily decode the message and read it.

A cipher that uses a “symmetric key” requires the person encrypting and the person decrypting to know an additional piece of information to use the cipher. For example, we might have a cipher that calls for the replacement of each letter of plaintext with a character that follows that letter some number of letters later in the alphabet. This type of cipher establishes a pattern, but it doesn’t provide all of the information needed to encrypt or decrypt data. Here, the pattern is that each letter of the plaintext will be replaced a letter that appears a given number of characters later on in the alphabet. The key is how many letters later in the alphabet will be found each letter’s replacement. The following is an example of the operation of this cipher:

[[Image here]]

Under this system, a person who knows just the cipher (that is, who knows that letters in the message will be replaced with characters appearing some number of letters later in the alphabet) cannot decrypt the ciphertext, because that person doesn’t know the key. But a person who knows both the cipher and the key can easily decode the message.

Of course, this example is a very simple symmetric key cypher, and a person without knowledge of either the cipher or the key could probably guess an encoded message if given time. Thus, to defend against this, cryptologists use far more complicated methods of encryption. Moreover, with the advent of the computer, the ability — and the need — to encrypt with great sophistication has increased dramatically. In keeping with this trend, the '789 Patent focuses on computer-based encryption of data.

Generally, when computers encrypt data, they do not directly encrypt English language text, as in the example above. Rather, text is first translated into a long stream of l’s and 0’s — each 1 or 0 being called a “bit”, and eight bits being called a “byte” — which can later be changed back into text. Other types of computer data, such as images or spreadsheets, are also translated into l’s and 0’s before encryption. Generally, the binary code (that is, the l’s and 0’s) that represents readable data is insecure before encryption, because any computer with the correct software could translate these bits back into the original text, image, or spreadsheet. Therefore, if a person wants to send or store sensitive data without fear of it being compromised, the stream of l’s and 0’s *227 must be altered to prevent the files from being viewed by unintended readers.

There are several ways to encrypt computer data, but the '789 Patent deals exclusively with “symmetric key” encryption of computer data, which as noted above, requires that the eneryptor and decryptor share knowledge of both a cipher and a key. Computer based symmetric key ciphers divide roughly into two types: block ciphers and stream ciphers. As the distinction between these two types of ciphers forms a major ground for dispute between the parties, the Court discusses this issue in much greater detail below. However, as a general matter, a stream cipher employs its key to encrypt data one bit at a time, while a block cipher employs its key to encrypt bits in groups. The '789 patent describes a block cipher.

Computer implemented block ciphers have been in wide use in the United States since at least 1976, when a block cipher called the “Data Encryption Standard” or “DES” was adopted by the United States government for general use. As of 1997, when Paone filed his patent application, dozens of additional block encryption algorithms had been published. However, most of those inventions used a single key to encrypt successive blocks of data. Paone’s innovation — in the most general terms — was to change the encryption key for each data block, based on additional, randomly generated data.

B. Procedural History

Paone filed his initial application for the present patent on December 12, 1997. Following that initial application, the PTO rejected Paone’s claims as unpatentable in three successive office actions, dated September 29,1999, March 16, 2000, and October 30, 2000. In response to each of these rejections, Paone modified his claims and provided additional argument. Then, on July 10, 2001, the PTO deemed the described invention patentable, and issued the '789 Patent.

On July 23, 2007, Paone commenced the present action against Microsoft, alleging that Microsoft was infringing the '789 patent. Specifically, Paone asserts that two components of Microsoft’s flagship computer operating system, Windows, infringe the '789 patent. The parties proceeded with discovery, during which time Microsoft on May 16, 2008 requested the PTO to reexamine the '789 patent. In early 2009, with the reexamination proceeding still pending, the parties briefed claim construction motions. However, before holding a Markmcm hearing, the Court on April 5, 2009 stayed the case pending the resolution of the reexamination proceeding. Then, before the stay was lifted, Microsoft also filed two more reexamination requests, dated June 29, 2009, and July 27, 2009.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Securities & Exchange Commission v. Callahan
103 F. Supp. 3d 296 (E.D. New York, 2015)
Paone v. Microsoft Corp.
881 F. Supp. 2d 386 (E.D. New York, 2012)

Cite This Page — Counsel Stack

Bluebook (online)
771 F. Supp. 2d 224, 2011 U.S. Dist. LEXIS 12611, 2011 WL 553577, Counsel Stack Legal Research, https://law.counselstack.com/opinion/paone-v-microsoft-corp-nyed-2011.