[00:00:00] Speaker 01: The United States Court of Appeals for the Federal Circuit is now open and in session. [00:00:05] Speaker 01: God save the United States and this honorable court. [00:00:10] Speaker 00: Go ahead, counsel. [00:00:12] Speaker 01: Thank you, your honor. [00:00:13] Speaker 01: Good morning, your honors. [00:00:14] Speaker 01: May it please the court. [00:00:15] Speaker 01: My name is Philip Seaton-Royan, and I'm arguing on behalf of Appellant Google LLC. [00:00:19] Speaker 01: I plan to focus my argument on claims 86 and 112, the only claims the board did not cancel as unpatentable across Google's two IPR proceedings. [00:00:28] Speaker 01: Of course, is there any other issues? [00:00:30] Speaker 01: Yes, Your Honor. [00:00:30] Speaker 00: Mr. Citrin, this is Judge Wallach. [00:00:33] Speaker 00: In the red braids at 59, Blackberry argues that Google waived the PTAB's obviousness determination regarding claim 112 because they say it wasn't raised below. [00:00:43] Speaker 00: Assuming we affirm the PTAB's claim construction, do you agree that you waived the PTAB's obviousness determination? [00:00:52] Speaker 00: And if not, where did you raise it below? [00:00:59] Speaker 01: Thank you, Your Honor. [00:00:59] Speaker 01: We don't believe that we waived any arguments before the board regarding the obviousness determination. [00:01:06] Speaker 01: And I'm pulling the citation for you. [00:01:08] Speaker 01: So Your Honor, at appendix site 168 to 170, [00:01:29] Speaker 01: petitioner analyzes the combination of the two primary references with Gong. [00:01:36] Speaker 01: And in those combinations with Gong, which describes a security policy and permission framework that are configurable, those configurable policy permissions allow the user to configure the security system however they choose. [00:01:51] Speaker 01: So the issues were addressed in that particular portion of the brief. [00:01:55] Speaker 01: And that was, excuse me, that was the petition for 1619. [00:01:58] Speaker 01: Let me give you the appendix site for 1620 as well. [00:02:01] Speaker 01: That's appendix site 951 to 954. [00:02:09] Speaker 02: Hello, this is Judge Chen talking here. [00:02:12] Speaker 02: Before we go any further, we're talking about a waiver argument for claim 112. [00:02:21] Speaker 02: Just so I'm following, are we talking about the alleged waiver that [00:02:27] Speaker 02: You, in your petition, never alleged that Gong teaches access to non-sensitive APIs upon verification of the digital signature? [00:02:40] Speaker 01: That's my understanding of the question, Your Honor. [00:02:43] Speaker 01: Okay. [00:02:44] Speaker 01: And just to be clear, [00:02:46] Speaker 01: This is under the board's construction, which requires that the access to the non-sensitive API is only allowed if the digital signature is verified. [00:02:58] Speaker 01: Right. [00:02:58] Speaker 02: OK. [00:02:59] Speaker 02: I'm glad I'm on board with this. [00:03:01] Speaker 02: So assume for the moment that I read your petition and your reply as being focused solely on a particular [00:03:11] Speaker 02: an understanding of the word upon, and you did not rely on Gong for teaching, even under the board's construction, the notion of access to non-sensitive APIs upon verifying the digital signatures. [00:03:26] Speaker 02: So if you could point me to a sentence in your petition that proves that wrong, then that would be great. [00:03:36] Speaker 02: Sure, Your Honor. [00:03:58] Speaker 01: So, Your Honor, if you look at Appendix 169 over to 170, and in particular Appendix 170, the last paragraph, to the extent Patent Owner argues where the board finds that GARS does not disclose the features of Claims 112.139, it would have been obvious to a person with a skill in the art to modify the device process of the GARS GONG combination such that when the application is executed on verifying the digital signature, [00:04:25] Speaker 01: the device allows the application to access non-sensitive APIs for the device, similar to as described in Gong. [00:04:33] Speaker 02: Right. [00:04:33] Speaker 02: So my problem is when you go back to page A169, there's a sentence getting close to the bottom of that page that begins with for example. [00:04:45] Speaker 02: And it reads quote, for example, Gong describes implementing the Java security model such that any application [00:04:52] Speaker 02: regardless of whether the application has a verified digital signature, can access some resources, non-sensitive resources, while only applications having a verified digital signature can only access additional resources, sensitive resources." [00:05:07] Speaker 02: End quote. [00:05:10] Speaker 02: To me, that reads pretty clearly that your side took the position that Gong [00:05:18] Speaker 02: does not require digital signature verification when it comes to accessing non-sensitive APIs. [00:05:26] Speaker 02: And so that was your understanding of Gong. [00:05:29] Speaker 02: That's what you advanced. [00:05:30] Speaker 02: And now to suggest that this page said something the opposite of that, I just don't follow. [00:05:40] Speaker 01: Sure, Your Honor. [00:05:41] Speaker 01: And just to go back to that sentence at appendix 169, it is an example of what Gong described. [00:05:48] Speaker 01: And here, the example we're talking about is the fact that you can have a digital signature that is successfully verified, which upon occurrence of that verification, you can access the non-sensitive API. [00:06:00] Speaker 01: And also the scenario where if the digital signature is not successfully verified, you're also given access to that non-sensitive API. [00:06:08] Speaker 01: But that disclosure in Gong is only an example, again, amplified. [00:06:12] Speaker 02: I'm sorry, I got lost there. [00:06:15] Speaker 02: Just so I'm clear, I didn't quite follow what you said. [00:06:19] Speaker 02: Just to repeat, my understanding of this sentence is you can get access in Gong to non-sensitive APIs without any verification of a digital signature. [00:06:31] Speaker 02: Are you saying that this sentence reads as something else? [00:06:35] Speaker 01: No, Your Honor, that's absolutely true. [00:06:38] Speaker 01: Gong provides a disclosure that allows an application to access upon successful [00:06:46] Speaker 01: or a failed verification of a digital signature. [00:06:49] Speaker 01: That's the understanding of this sentence and what it's describing with respect to GALM. [00:06:58] Speaker 00: Council, this is Judge Wallach again. [00:07:00] Speaker 00: Do you concede that if we determine the PTAB properly construed, the signed software application term in claims one and 76, that GARS discloses that term? [00:07:16] Speaker 01: If the board can seize that signed software application, can you repeat the question, please, Your Honor? [00:07:25] Speaker 00: If we determine that the PTAB properly construed signed software application, do you concede that GARS discloses the term? [00:07:38] Speaker 01: Yes, your honor, if size software application was properly construed in the 1619 proceeding, which involves GARS, then yes, we can see that GARS discloses that limitation. [00:07:49] Speaker 01: Yes, your honor. [00:07:52] Speaker 00: Go ahead. [00:07:53] Speaker 01: And if I can go back to claim 112 for a moment, I'd like to address the construction of a PON that was applied by the board and adopted by the board. [00:08:06] Speaker 01: Just so I'm clear, [00:08:07] Speaker 02: If I don't agree with you that you preserved anything with respect to claim 12 that's premised on GARST teaching this claim limitation under the board's instruction, then for purposes of this appeal as to claim 112, your only argument left is arguing about the meaning of the claim term upon verifying, right? [00:08:36] Speaker 01: Yes, your honor, I believe that's correct. [00:08:38] Speaker 01: OK, go ahead. [00:08:40] Speaker 01: So the board's construction, if I may, they admit at appendix 36 and 86 that their construction lacks support in the specification. [00:08:48] Speaker 01: That's because the specification does not include an embodiment in which the verification of one signature allows access to both sensitive and non-sensitive APIs. [00:08:58] Speaker 02: Well, my understanding is they relied on a plain meaning understanding of upon verifying, right? [00:09:04] Speaker 02: That's correct, Your Honor. [00:09:05] Speaker 01: That does appear to be what the Board relied on. [00:09:08] Speaker 01: So what's wrong with that? [00:09:10] Speaker 01: It's inconsistent with the record. [00:09:12] Speaker 01: It's inconsistent with the 868 patent. [00:09:14] Speaker 01: There's no support for it. [00:09:16] Speaker 01: It's also inconsistent with the Board's own understanding of what the terms sensitive API and non-sensitive API mean. [00:09:23] Speaker 01: They construed those two terms. [00:09:25] Speaker 01: Sensitive API, the Board construed to mean an API to which access is restricted. [00:09:30] Speaker 01: And they construed non-sensitive API to mean [00:09:32] Speaker 01: an API to which access is not restricted, and neither party disputes those constructions on appeal. [00:09:39] Speaker 01: And those constructions make sense when you look at the claim language and also the specification. [00:09:44] Speaker 01: If you go to the specification as an example, appendix 104, and this is column 9, line 27 to 31, states that the software application without a proper digital signature may be denied access to the API library exposing the sensitive API, [00:09:59] Speaker 01: but executed to the extent possible without access to the APA library. [00:10:04] Speaker 01: As one more example, Claim 1-41 explicitly states that the application is given access to a non-sensitive API, but not a sensitive API if the digital signature is not successfully verified. [00:10:18] Speaker 01: So the 8-6-8 patent... Under your rebuttal time, Council. [00:10:23] Speaker 01: Thank you, Your Honor. [00:10:24] Speaker 01: I'm just going to conclude on this one point. [00:10:26] Speaker 01: So, consistent with the rest of the 868 patent, a pawn in claim 112 should not be read to mean that the application can access the non-sensitive API only if the digital signature is successfully verified. [00:10:38] Speaker 01: There's simply no support for such a narrow construction in the specification or the claims, especially under the BRI standard. [00:10:45] Speaker 00: Thank you. [00:10:53] Speaker 04: Yes, good morning, Your Honor. [00:10:54] Speaker 04: Ching Lee Fukuda for Appellate Blackberry. [00:10:57] Speaker 04: May it please the court. [00:10:59] Speaker 04: And Your Honor, just to address the point and the questions raised about Claim 112. [00:11:05] Speaker 04: Paul? [00:11:06] Speaker 00: Yes. [00:11:07] Speaker 00: Paul, remember what I said. [00:11:10] Speaker 00: Listen for the court. [00:11:13] Speaker 00: OK? [00:11:13] Speaker 00: You're reserving three minutes, right? [00:11:15] Speaker 04: That's correct. [00:11:17] Speaker 00: Clark, please start your time over again. [00:11:23] Speaker 04: You can go ahead. [00:11:27] Speaker 04: OK. [00:11:28] Speaker 04: Your Honor, with respect to claim 112 that was addressed in the opening argument by Google, you had asked a question whether the board had found the meaning of upon verifying based on its claim meeting. [00:11:43] Speaker 04: And the answer is, Your Honor, and to the extent that Google is arguing that there are some inconsistencies that the board had found with the application. [00:11:52] Speaker 04: That would be harmless error. [00:11:53] Speaker 04: The conclusion that the board had reached is still correct. [00:11:57] Speaker 04: In fact, the written description provides that there can be a global signature that, when verified, gives access to all signatures, all APIs. [00:12:06] Speaker 04: That includes sensitive and non-sensitive APIs. [00:12:10] Speaker 04: So to that extent, the board's construction is consistent not just with the plain meaning, but also with the specification. [00:12:19] Speaker 04: And Your Honor, if I may address the abridged version construction of the software application. [00:12:26] Speaker 02: Ms. [00:12:26] Speaker 02: Picuta, before you leave Claim 112, I can't recall. [00:12:30] Speaker 02: There's so much going on in this case as well as the other cases today. [00:12:33] Speaker 02: But is this the issue where the board suggested that Claim 112 is not directed to that global signature embodiment in the specification? [00:12:47] Speaker 04: This is the one partially, Your Honor. [00:12:51] Speaker 04: So the Board had said that properly construed for upon verifying, Claim 112 is directed to a multi-signature embodiment for which there would be two signatures. [00:13:07] Speaker 02: Isn't that the global signature embodiment? [00:13:10] Speaker 04: I think implicit in that is that Claim 112 actually requires [00:13:16] Speaker 04: I think what the board had said was that there is no disclosure in the written description of a one signature access to non-sensitive APIs. [00:13:27] Speaker 04: And that's the part that the written description does disclose, which is in appendix 101, column 4, lines 1 to 12, is the disclosure that says, quote, all APIs are restricted and locked [00:13:44] Speaker 04: until a global signature is verified for a software application." [00:13:49] Speaker 04: So the only issue here is that. [00:13:53] Speaker 02: I'm just asking for your help to understand what was the board's view of this claim vis-a-vis the specification. [00:14:01] Speaker 02: I thought the board had said something about how it did not believe in its view that the specification has support for [00:14:10] Speaker 02: Claim 112, at least how it understood Claim 112. [00:14:15] Speaker 02: Am I wrong about that? [00:14:17] Speaker 04: No, you're not wrong about that. [00:14:20] Speaker 04: But the specification does provide support. [00:14:23] Speaker 02: Okay, so this is an issue you're in part disagreeing with the board. [00:14:30] Speaker 04: Yes, yes. [00:14:30] Speaker 04: With the rationale, Your Honor, yes. [00:14:32] Speaker 04: But as we had stated in our brief, this was harmless error because the board's constructing [00:14:38] Speaker 04: based on that plain meaning of upon verifying is still correct. [00:14:42] Speaker 04: And on top of that, the written description does support the correct interpretation. [00:14:47] Speaker 01: OK. [00:14:55] Speaker 00: Hey, counsel, this is Judge Wallach. [00:14:57] Speaker 00: With respect, cross-appeal, it seems like both your obviousness and anticipation arguments [00:15:06] Speaker 00: on whether Lynn discloses a determination that the signature exists. [00:15:12] Speaker 00: Is that correct? [00:15:18] Speaker 04: With respect to Lynn, that is correct. [00:15:22] Speaker 04: It depends on the specific issue. [00:15:25] Speaker 04: Our view is that there is no disclosure in Lynn of whether a signature exists, because a signature always exists in Lynn. [00:15:34] Speaker 00: Council, the PTAP took the position that even if there wasn't an explicit determination that the signature exists, LIN implicitly requires such a determination be made since it first requires a signature in order for the verification process to occur. [00:15:51] Speaker 00: If there's no signature, there can't be any verification. [00:15:56] Speaker 00: And the PTAP relies on the intrinsic record and expert testimony to reach its conclusion. [00:16:02] Speaker 00: How is that determination not supported by substantial evidence? [00:16:07] Speaker 04: Your Honor, there is disclosure in LIN of verification process, but there is no express or inherent disclosure that the verification is of the developer's signature. [00:16:20] Speaker 04: So the PCAB cannot fill in that missing limitation, either through its assumptions or suggestions, nor through expert testimony. [00:16:30] Speaker 04: So for example, Your Honor, in Appendix 30. [00:16:34] Speaker 00: Is there any expert testimony in the record that supports your position? [00:16:41] Speaker 04: The expert testimony that supports your position is that there is no express or inherent disclosure by LYNN, which BlackBerry expert Dr. Ligler has put forward. [00:16:53] Speaker 00: Counsel, where is that in the record? [00:16:58] Speaker 04: Your Honor, if I may, can I give you that expect site during my rebuttal time? [00:17:20] Speaker 04: Sure. [00:17:20] Speaker 04: I just want to need a minute to dig up those pages. [00:17:24] Speaker 04: Okay. [00:17:24] Speaker 04: Thank you. [00:17:26] Speaker 04: The point here is that Lin discloses itself that the access to the sensitive APIs is based on three conditions. [00:17:36] Speaker 04: And there is verification going on. [00:17:38] Speaker 04: But none of them relates to verifying the digital signature itself. [00:17:42] Speaker 04: One condition is to verify the development certificate. [00:17:45] Speaker 04: Second condition is to authenticate the time stamp. [00:17:49] Speaker 04: And the third condition is confirming the hash of the received software application [00:17:54] Speaker 04: against File Hash 304 in the signed ADS. [00:17:58] Speaker 04: None of these conditions require verifying the developer's signature. [00:18:02] Speaker 04: And that particular passage is on Appendix 3486, Column 5, Line 6 to 30. [00:18:09] Speaker 04: So, in fact, the board's conclusion is that there is disclosure of verifying digital signature because it saw no other purpose for Lin's digital signature. [00:18:20] Speaker 04: Again, that is not the case of an express disclosure. [00:18:23] Speaker 04: In fact, it's an admission that there is no express disclosure. [00:18:26] Speaker 04: And it's also not inherent because it is not necessarily so. [00:18:30] Speaker 02: This is where the board basically credited Google's expert's explanation of how Linn operates. [00:18:38] Speaker 02: Is that right? [00:18:40] Speaker 04: That is correct, Your Honor. [00:18:42] Speaker 02: And just to follow up on Judge Wallach's question, or one of his questions, [00:18:48] Speaker 02: Did your side, did Blackberry's expert come back and try to explain why Google's expert's understanding of LYNN is incorrect? [00:19:00] Speaker 04: Yes, Your Honor. [00:19:01] Speaker 04: In fact, if you take a look at appendix 6512 through 6522, that is [00:19:16] Speaker 04: Blackberry's expert. [00:19:17] Speaker 02: Do you have a particular paragraph, and maybe even better, a particular sentence that joins the debate on countering Google's expert's position on how Linn operates? [00:19:34] Speaker 02: I mean, if you want to wait till the next round that you're up, that's fine. [00:19:41] Speaker 04: Yes. [00:19:42] Speaker 04: There are several paragraphs here. [00:19:45] Speaker 04: and I'm happy to highlight a sentence for you and more precisely pinpoint to that, but if you take a look at paragraphs 64 through 66, I know those are fairly lengthy paragraphs, but it does, what I had argued is summarized, basically summarizes the expert opinion here. [00:20:06] Speaker 02: I understand that, but it's critical for these purposes to know exactly what you're targeting. [00:20:12] Speaker 02: Right. [00:20:14] Speaker 02: Can I just, can I, well then, unless you have a particular sentence ready, I've got another question as to claims one and 76 as to, there's two proceedings here. [00:20:28] Speaker 02: If we agree with the board's construction of signed software application, then when it comes to the 1619 proceeding that relies on Garst and Gong, [00:20:44] Speaker 02: Your position is that we can affirm the board's unpatentability finding as to Garson Gong because the signed software application construction dispute was the only dispute you have on appeal. [00:21:02] Speaker 02: Is that right? [00:21:07] Speaker 02: I did not see an argument in your blue brief that disputed [00:21:13] Speaker 02: whether GARS teaches that claim limitation as construed by the board if we were to agree with the board's interpretation. [00:21:20] Speaker 02: Am I wrong about that? [00:21:21] Speaker 04: I believe we did put forward an argument, Your Honor, and I'll get to the site in a bit, that Google's proposed construction for signed software applications is a, I'm sorry. [00:21:38] Speaker 02: Right. [00:21:39] Speaker 02: You disagree with that construction that the board adopted. [00:21:42] Speaker 02: I'm saying, assume for the moment, we agree with that construction. [00:21:47] Speaker 02: And as to the 1619 proceeding, which found the claims 176 unpatentable in view of Garsten Gong, do you have an additional argument? [00:22:01] Speaker 03: Council, this is Judge Stoll. [00:22:02] Speaker 03: I'm just adding on here, actually. [00:22:05] Speaker 03: I thought that you agreed [00:22:07] Speaker 03: to Judge Chen's question at pages 46 through 47 of the yellow brief. [00:22:13] Speaker 03: Am I wrong about that? [00:22:26] Speaker 04: Yes, Your Honor. [00:22:27] Speaker 04: Thank you for pointing that out. [00:22:30] Speaker 04: Yes. [00:22:30] Speaker 04: Yes. [00:22:31] Speaker 04: Our contention on appeal is based on the correct interpretation [00:22:35] Speaker 04: or the erroneous interpretation of the signed software application term. [00:22:40] Speaker 02: So then let's just assume for the moment we agree with signed software application, the construction of that. [00:22:48] Speaker 02: Does it matter whether we need to confront the question of whether there's substantial evidence as to Lin disclosing the signed software application limitation [00:23:04] Speaker 02: anything else in claims 1 and 76, given that we're going to affirm the unpatentability decision in the 1619? [00:23:11] Speaker 02: Are there other claims that are somehow in the mix that I'm not aware of? [00:23:17] Speaker 02: Or is it a true complete overlap? [00:23:23] Speaker 04: As to those claims 1 and 76, it would be an overlap in terms of the rationale, yes, Your Honor. [00:23:33] Speaker 00: Again, just so you know, you're into your rebuttal time. [00:23:38] Speaker 04: All right. [00:23:38] Speaker 04: Unless there are other questions, I'd like to reserve my time for rebuttal. [00:23:42] Speaker 00: Go ahead. [00:23:44] Speaker 01: Proceed. [00:23:48] Speaker 01: Hello, Your Honors. [00:23:48] Speaker 01: This is Philip. [00:23:50] Speaker 01: I wanted to address one quick point in reply, and then turn to Blackberry's cross appeal. [00:23:56] Speaker 01: Ms. [00:23:56] Speaker 01: Sakuda raised the issue of the global signature with respect to 112. [00:24:01] Speaker 01: in Blackberry's argument that the global signature supports the board's construction. [00:24:06] Speaker 01: The board properly rejected that argument for two reasons. [00:24:10] Speaker 01: First, when claim 112 was added during prosecution, the applicant did not cite or refer to the global signature embodiment at all. [00:24:17] Speaker 01: It instead referred to the embodiments describing API-specific signatures, as can be seen at appendix site 2036. [00:24:27] Speaker 01: As the board explained at appendix 19 to 20 and 35 to 36, claim 76 allows access to an individual sensitive API out of a plurality of APIs. [00:24:38] Speaker 01: The global signature that's described in the specification doesn't allow access to an individual sensitive API in that way. [00:24:45] Speaker 01: It instead describes a multiple signature scenario. [00:24:51] Speaker 01: Yes. [00:24:51] Speaker 01: Sorry, I thought I heard a question. [00:24:53] Speaker 01: The multiple signature scenario for the global signature requires a burst [00:24:57] Speaker 01: global signature that's required to provide device level access, and then a second API specific signature is required to provide API level access. [00:25:07] Speaker 01: So we don't believe that the global signature supports the board's construction, which is the same conclusion that the board reached. [00:25:14] Speaker 01: So there's nothing in the specification or claims that supports the board's conclusion here. [00:25:19] Speaker 01: The only thing that supports [00:25:20] Speaker 01: or the only construction that's supported by the specification is Google's, which requires the non-sensitive API not be access restricted. [00:25:30] Speaker 02: So turning to... Mr. Citron, this is Judge Chen. [00:25:33] Speaker 02: I mean, the difficulty I'm having is my understanding of the word upon and the dictionary definition of the word upon. [00:25:43] Speaker 02: And to me, upon is communicating the thought that [00:25:51] Speaker 02: Only when a certain event occurs will another event occur. [00:25:59] Speaker 02: That's how I understand upon. [00:26:01] Speaker 02: I mean, if you can use the word upon in a sentence where that's not the case, it would help me understand why your, what I'll call, looser understanding of upon is plausible. [00:26:20] Speaker 01: Sure, Your Honor, and I certainly agree that the term upon and in some circumstances can have that meaning. [00:26:27] Speaker 02: Okay, I'm telling you, I think it's always, so I'm looking for a different circumstance where it's not. [00:26:37] Speaker 01: Sure, so if you, and to give an example, if you file a patent application upon there being a full move, that doesn't mean that you can't file a patent application at some other time. [00:26:48] Speaker 01: And that's really the dispute here. [00:26:50] Speaker 02: It's not... So if the sentence said, upon the occurrence of a full moon filing a patent application, you would say what? [00:27:07] Speaker 01: So that means that the patent application could be filed after the full moon or when there's a full moon. [00:27:14] Speaker 01: But the point is, [00:27:15] Speaker 01: even if there's not a full moon, you can still file a patent application. [00:27:18] Speaker 01: That word, upon, doesn't mean that that is the only scenario where you are able to file a patent application. [00:27:24] Speaker 00: How does it not mean that? [00:27:35] Speaker 01: If you look at the dictionary definition, and I'm not sure if there's actually one in the record, unfortunately, but upon can also just mean a sequence. [00:27:43] Speaker 01: It occurs after. [00:27:44] Speaker 01: And when you look at the context of the patent, that's certainly the case here. [00:27:48] Speaker 01: When you look at the claims, it uses based upon when describing access to the sensitive API, it says that the sensitive API is restricted. [00:27:57] Speaker 03: When you reach claim one... Excuse me, this is Judge Stoll. [00:28:01] Speaker 03: I think the problem with your argument is that maybe you're right that when upon is used in a different context. [00:28:07] Speaker 03: it could mean something different. [00:28:09] Speaker 03: But the problem is the setup of the sentence, which is upon verifying the digital signature, something happens. [00:28:17] Speaker 03: Upon a full moon occurring, something happens. [00:28:21] Speaker 03: It would suggest that the thing that follows upon has to happen before the action can take place. [00:28:29] Speaker 03: Why is that not? [00:28:32] Speaker 00: You can answer the question, counsel. [00:28:34] Speaker 01: Sure. [00:28:36] Speaker 01: Upon here does mean it takes place after, but I think it doesn't say only upon. [00:28:41] Speaker 01: That's the missing term that would require that narrow reconstruction. [00:28:45] Speaker 01: And just to bring it back to the patent, if we interpret upon to have that narrow construction, then it's inconsistent with everything that's in the specification. [00:28:54] Speaker 01: The non-sensitive API has now gone from being an unrestricted API that can be accessed regardless of whether you have a verified or unverified signature, [00:29:02] Speaker 01: to now access restricted API, which is a sensitive API. [00:29:07] Speaker 01: So now there's no difference between a sensitive and a non-sensitive API. [00:29:12] Speaker 01: And we, going back to the board's construction, there is a sensitive and non-sensitive API to have those specific meetings. [00:29:20] Speaker 00: Okay, your time's up, counsel, unless the other judges have questions. [00:29:26] Speaker 01: No. [00:29:27] Speaker 03: None for me. [00:29:28] Speaker 03: Thank you. [00:29:29] Speaker 01: Okay. [00:29:29] Speaker 01: Thank you, Your Honors. [00:29:30] Speaker 01: Well, thanks. [00:29:36] Speaker 00: Ms. [00:29:37] Speaker 00: McGoode? [00:29:39] Speaker 04: Yes, Your Honor. [00:29:40] Speaker 04: First, I wanted to get it back with a more pinpointed site to Google's, I'm sorry, Black Bear's expert Dr. Ligler's declaration. [00:29:50] Speaker 04: And this is with respect to the LEND teaching on the verification of a developer signature. [00:29:59] Speaker 04: So Your Honor, if I could direct your attention to Appendix 6515, at the bottom [00:30:06] Speaker 04: of that page. [00:30:10] Speaker 04: Second to last sentence says, while Lin teaches that developer signature 312 may be verified, Lin does not teach that loading the jar files code for execution is based upon such verification. [00:30:24] Speaker 04: So the entire limitation requires that the verification is what allows access to the sensitive APIs. [00:30:33] Speaker 04: And that element's teaching is missing from Lin. [00:30:36] Speaker 04: So that was Blackberry's expert's conclusion based on reviewing all the disclosure of it. [00:30:53] Speaker 04: Does that answer your question, Your Honor? [00:30:56] Speaker 00: Judge Chan? [00:30:57] Speaker 00: Okay, that answers it. [00:31:01] Speaker 04: Thank you. [00:31:05] Speaker 04: I had previously answered your question regarding the impact of you affirming fine software application construction for claims 1 and 76 for the 1619 proceeding and whether that has overlap with doing so for the same two claims in the 1620. [00:31:26] Speaker 04: And I believe I had stated on the record that it's true for those two claims. [00:31:31] Speaker 04: It would not be true for all of the claims on the TO. [00:31:33] Speaker 04: So there would still be additional claims that need to be resolved, even if you affirm that construction. [00:31:43] Speaker 04: It's dependent claims, and it's specifically claimed 77, 79, 80, 82, 86, and 112. [00:31:51] Speaker 04: So I would like to detangle that for you, but as you can tell, there are many overlapping issues here, but it's not a perfect overlap among the claims. [00:32:02] Speaker 04: And Your Honor, unless you have any additional questions for me, I'm happy to rely on the submissions for the remaining issues. [00:32:12] Speaker 00: Anyone? [00:32:15] Speaker 00: Okay, Ms. [00:32:15] Speaker 00: Decuda, thank you. [00:32:17] Speaker 04: Thank you, Your Honors.