1994-08-16 - Complaints: Schlafly’s complaint against RSA & PKP

Header Data

From: Anonymous User <nobody@c2.org>
To: cypherpunks@toad.com
Message Hash: 919251f4dc593020a8289189909595f7128a79128967c4eb429517a37503bf7b
Message ID: <199408160305.UAA10417@zero.c2.org>
Reply To: N/A
UTC Datetime: 1994-08-16 03:07:57 UTC
Raw Date: Mon, 15 Aug 94 20:07:57 PDT

Raw message

From: Anonymous User <nobody@c2.org>
Date: Mon, 15 Aug 94 20:07:57 PDT
To: cypherpunks@toad.com
Subject: Complaints: Schlafly's complaint against RSA & PKP
Message-ID: <199408160305.UAA10417@zero.c2.org>
MIME-Version: 1.0
Content-Type: text/plain


-- Schlafly's complaint against PKP and RSA --------------------------------

Roger Schlafly, Pro Se 
PO Box 1680 
Soquel, CA 95073 
telephone: (408) 476-3550 
 
In the United States District Court for the Northern District of California 
 
Civil Action File No. C-94 20512 
	 
Assigned to Judge 
Category 410, Antitrust 
 
ROGER SCHLAFLY, an individual, Plaintiff 
v. 
PUBLIC KEY PARTNERS, 
and 
RSA DATA SECURITY INC., Defendants.  
 
 
Complaint Against Unfair Business Practices 
 
Plaintiff makes complaint against defendants for unfair business practices, 
including libel, interference with contractual relationships, patent 
misuse, fraud, monopolization, and racketeering, and demands remedies 
available under federal law, including jury trial, declaratory judgment, 
monetary damages, and injunctive relief. Jurisdiction. The Federal Court 
has jurisdiction because it is based on Federal law, including antitrust 
and patent law. Venue is proper because defendants and plaintiff reside in 
this Judicial District.  
 
For its complaint against defendants, plaintiff alleges as follows: 
 
1. This is an action for unfair business practices, libel, fraud, 
monopolization, and racketeering by Public Key Partners ("PKP"), which is 
managed by Mr. Robert Fougner, Director of Licensing, 310 North Mary 
Avenue, Sunnyvale, CA 94086 and by RSA Data Security Inc. ("RSADSI"), which 
does business at 100 Marine Parkway, Redwood City, CA 94065. 
 
2. Plaintiff Roger Schlafly is a resident of the County of Santa Cruz, 
State of California. 
 
3. Plaintiff is in the cryptography business, and develops computer 
software for customers. He is also a member of the IEEE Pl363 working 
group, a committee charged with adopting a public key standard. 
 
4. Defendant PKP is a partnership between Defendant RSA and Caro-Kann Corp. 
of Sunnyvale. Their partnership agreement is attached as Exhibit A. Mr. Jim 
Bidzos is the president of both RSADSI and PKP. Cylink Corp. of Sunnyvale 
was also a partner in the formation of PKP. 
 
5. Federal jurisdiction is based on antitrust law (title 15), patent law 
(title 35), and racketeering law (18 USC 1341, 1951, 1961-1965). Request 
for relief is also based on 28 USC 1331, 1337(a), 1338(a), 1338(b), 2201, 
and 2202. 
 
6. Defendant RSADSI is the dominant U.S. vendor of cryptography software, 
and has monopoly power in that market. It is engaged in a significant 
amount of interstate commerce, totaling at least 55 million per year. 
 
7. Defendants have engaged in tortious interference with business 
relationships between plaintiff and plaintiff's clients, including 
Information Security Corp. ("ISC") and AT&T. 
 
8. Defendants claim to control certain patents related to public key 
cryptography. These are the following U.S. patents and their foreign 
equivalents. 
 
	Diffie-Hellman	4,200,770 
	Hellman-Merkle	4,218,582 
	RSA		4,405,829 
	Hellman-Pohlig	4,424,414 
	Schnorr		4,995,082 
 
These PKP patents, as issued in the U.S., are attached as Exhibit B. (There 
may also be foreign patents for Hellman 
Merkle and Schnorr.) 
 
9. There is a substantial and continuing justiciable controversy between 
plaintiff and defendant PKP as to PKP's 
right to threaten or maintain suit for infringement of the PKP patents, and 
as to the validity, scope, and enforce 
ability thereof, and as to whether any of plaintiff's work infringes any 
valid claim thereof. 
 
10. Plaintiff has not infringed these patents. 
 
11. Plaintiff has signed a consent agreement with defendant RSADSI, 
attached as Exhibit C. He agreed not to sell a 
product infringing the RSA patent, except under license from RSADSI or the 
U.S. Government. (The U.S. Government 
funded the RSA invention, and retains certain rights.) The agreement also 
allows plaintiff to design and manufacture 
products using the RSA patent. 
 
12. Defendant PKP sent a letter dated Jan. 12, 1994 to plaintiff's client, 
AT&T, alleging that Digital Signature, of which plaintiff is a partner, has 
breached the above consent agreement. The letter is attached as Exhibit D. 
In fact, no such breach has taken place. This letter was written without 
any notification to plaintiff or Digital Signature. 
 
13. Defendant PKP's letter to AT&T stated: 
	... to the extent any of AT&T's products are tainted by ISC's 
violation of this injunction, we hereby demand that AT&T cease their 
further distribution and sale. 
The alleged violation is based on ISC's use of Digital Signature software. 
This is a tort for PKP to send such a letter, as no violation has taken 
place. PKP knew that there was no violation because AT&T has the 
appropriate patent licenses. Evidence that AT&T already had a license is in 
Exhibit E, a letter from Jim Bidzos to the editor of Scientific American.  
 
14. Defendants' allegations have damaged plaintiff's reputation, hindered 
his ability to sell his services, and interfered with his business 
relationships. 
 
15. Defendant PKP has mailed a letter dated April 4, 1994 to ISC referring 
to the "apparent breach of the November 15, 1988, Consent Judgment [sic]". 
The letter is attached as Exhibit F. Plaintiff denies any such breach. 
 
16. Plaintiff sent a letter to PKP protesting its libelous actions and 
demanding a retraction. The letter was sent on April 4, 1994 and attached 
as Exhibit G. 
 
17. In a letter from PKP dated April 18, 1994 and attached as Exhibit H, 
PKP refused to retract its earlier libel. The letter also states that: 
	The practice of the DSA is described in the Hellman-Diffie, Hellman-
Merkle and Schnorr patents ...  
This statement is obviously false, since the DSA patent application was 
filed after all of those other patents issued. Plaintiff's response is 
attached as Exhibit I. 
 
18. Defendants have negotiated in bad faith, claiming to offer licenses but 
giving the run-around on terms and details. Plaintiff relied on defendants' 
promises that patent licenses would be available, and then lost business 
when PKP reneged on those promises. Copies of some correspondence with PKP 
on licensing is attached as Exhibit J. Plaintiff has never able to 
determine even what the PKP licensing policy is. 
 
19. Defendants have fraudulently induced standards-making bodies, including 
American National Standards Institute ("ANSI") and Institute of Electrical 
and Electronics Engineers ("IEEE"), to draft standards based on the RSA and 
Diffie-Hellman patents by promising a reasonable and nondiscriminatory 
licensing policy, when in fact no such policy exists. ANSI and IEEE require 
such a policy, and would not have drafted RSA standards if PKP had not 
misrepresented its intentions. 
 
20. Defendant PKP sent a letter dated March 15, 1991 to the American 
Bankers Association (in affiliation with ANSI) stating that "PKP has not 
denied a license to any party." A copy is attached as Exhibit K. Plaintiff 
was denied a license in 1990. 
 
21. Plaintiff is informed and believes and on that basis alleges that ISC 
and other parties were also denied PKP licenses. Numerous users of Pretty 
Good Privacy ("PGP"), a widely used cryptography program, have complained 
about being denied PKP licenses. 
 
22. A letter from PKP to ISC denying it an RSA license is attached as 
Exhibit F. 
 
23. Plaintiff is informed and believes and on that basis alleges that 
defendant RSADSI attempted to rescind licenses granted for use of RSAREF, 
one of its products, even though the license agreement clearly states that 
the license is perpetual. 
 
24. By getting their technology to be declared a draft standard, RSADSI has 
unfairly monopolized the cryptography market. Plaintiff has been damaged 
because competing technologies are regarded as nonstandard by the public. 
 
25. Defendants' patent threats and fraudulent promises have prevented ANSI 
and IEEE from adopting public key standards, to the detriment of all others 
in the industry, including plaintiff. 
 
26. Plaintiff and others on standards committees have invested valuable 
time and effort to develop a public Key standard, but have been thwarted by 
defendant PKP's patent threats and fraudulent promises. 
 
27. Plaintiff is informed and believes and on that basis alleges that 
defendants have made hostile and unwarranted threats against potential 
customers and clients of plaintiff, including representatives of the U.S. 
Army. These threats have included false assertions that ISC software is 
illegal because of patent problems. (Even if the defendants' patent claims 
were valid, the U.S. Army has a license to use the patents anyway.) 
 
28. Plaintiff is informed and believes and on that basis alleges that 
defendants have vindictively harassed competitors, including trying to 
promote a federal criminal investigation of the author of PGP. 
 
29. The U.S. Dept. of Commerce has made a determination that practice of 
the Digital Signature Algorithm ("DSA") does not infringe PKP patents. 
Public notice to that effect has appeared in Federal Register vol. 56, no. 
169, August 30, 1991, pp. 42980-42982, and Federal Register vol. 59, no. 
96, May 19, 1994, pp. 26208-26211. Copies are attached as Exhibits L and M. 
A copy of the DSA patent is attached as Exhibit N. 
 
30. Defendant PKP wrote a letter to the National Institute of Standards of 
Technology ("NIST") claiming that the DSA infringes PKP patents. The letter 
was dated Nov. 20, 1991 and attached as Exhibit 0. No PKP argument 
regarding the nature of the infringement was ever made public. U.S. patent 
5,231,668 was issued and assigned to the United States on July 27, 1993. 
 
31. When the DSA was adopted by NIST as the federal Digital Signature 
Standard, defendants publicly threatened to sue anyone who uses it. These 
threats were conveyed to the news media for the purpose of intimidating 
competitors, and the threats were widely disseminated. A copy of a typical 
story in the trade press is attached as Exhibit P. 
 
32. Defendants have attempted to intimidate ANSI and IEEE not to adopt a 
DSA standard, based on patent claims they know to be invalid. A copy of a 
PKP letter is attached as Exhibit Q. They hoped to kill a DSA standard in 
order to monopolize the market with an RSA standard. 
 
33. Defendant PKP has pooled patents in an attempt to monopolize public key 
technologies. The Hellman patents were originally issued to Stanford 
University and exclusively licensed to Cylink. Cylink apparently controls 
Caro-Kann Corp., a partner in defendant PKP. The RSA patent was originally 
issued to Massachusetts Institute of Technology and exclusively licensed to 
RSADSI. The Schnorr patent was issued to Klaus Schnorr, a German citizen 
who had no connection with PKP. The patents are not blocking. All are now 
under the exclusive licensing control of PKP. 
 
34. Defendants have exaggerated the scope of their patents. In a publicly 
distributed letter dated April 20, 1990, PKP claimed: 
	These patents cover all known methods of practicing the art of Public 
Key, including the variations collectively known as E1 Gamal [sic]. The 
letter is attached as Exhibit R. PKP knows that this claim is false, but 
makes it anyway to intimidate competitors. 
 
35. Defendant PKP sent a threatening letter, attached as Exhibit S, to ISC 
claiming that any use of public key technology must necessarily infringe 
PKP patents. 
 
36. The idea of public key cryptography and digital signatures is disclosed 
in a paper titled "Multiuser cryptographic techniques" by Whitfield Diffie 
and Martin E Hellman, National Computer Conference, vol. 45, 1976. The 
paper was presented at a public conference in mid-June 1976, and published 
as part of the conference proceedings shortly thereafter. This was more 
than one year before any patents were filed, and therefore in the public 
domain according to 35 USC 102(b). A copy of the paper is attached as 
Exhibit T. 
 
37. Another paper by Diffie and Hellman, "New Directions in Cryptography", 
IEEE Transactions on Information Theory, vol. IT-22, no. 6, Nov. 1976, was 
submitted on June 3, 1976. It discloses the public key distribution system 
of the DiffieHellman patent. A copy of the paper is attached as Exhibit U. 
 
38. A survey paper, "The First Ten Years of Public-Key Cryptography", was 
published by Diffie in Proceedings of the IEEE, vol. 76, no. 5, May 1988. A 
copy of the paper is attached as Exhibit V. It states on p. 563 that 
Exhibit U was publicly distributed in June 1976 and publicly disclosed at 
the National Computer Conference, also in June 1976. The Diffie-Hellman 
patent was filed on Sept. 6, 1977. This was more than one year later, and 
hence the patent is invalid and unenforceable according to 35 USC 102(b). 
 
39. The Hellman-Merkle patent is invalid and unenforceable because it is 
inoperative as disclosed. Claims 1-6 and 1417 require a quantity 
computationally infeasible to generate from a public key. Claims 1-3 and 6-
17 require secure communication over an insecure channel. There are no 
other claims. While the inventors probably believed that their invention 
met these requirements at the time they filed their patent application, it 
was later proved that the invention does not meet the requirements. 
According to Exhibit V pp. 565-566, it turned out to be feasible to compute 
the secret key from the public key. It follows that the claimed 
computational infeasibility is not achieved, and the communication is not 
secure. In fact, according to Exhibit V, the inventor had to pay a $100 bet 
when the invention was proved to be useless. 
 
40. RSADSI has known the Hellman-Merkle invention to be worthless since at 
least 1985, and have not used it in its commercial products for that 
reason. 
 
41. The Hellman-Merkle invention is not useful because of the flaws cited 
in Exhibit V, and therefore fails to satisfy the 35 USC 101 requirements 
for patent protection. 
 
42. The Hellman-Pohlig patent is not even a public key patent. PKP 
deceptively cites it to bolster their claim to own all public key 
technology. 
 
43. Defendants have claimed that ElGamal encryption, as described in T. 
ElGamal, A Public Key Cryptosystem and a Signature Scheme 8ased on Discrete 
Logarithm, IEEE Transactions on Information Theory, IT-31 (no. 4, July 
1985) pp. 469-472, or as implemented in SecretAgent (a product of ISC which 
uses software licensed from plaintiff), or as currently being considered by 
the IEEE P1363 committee, infringes PKP patents. Plaintiff asserts that 
there is no infringement, even if the PKP patents are valid. 
 
44. ISC had kept SecretAgent out of the commercial (non-government) market 
for a couple of years because of PKP patent claims on ElGamal encryption. 
 
45. Plaintiff has suffered lost royalties as a result of defendants 
claiming that SecretAgent infringes PKP patents. 
 
46. The RSA patent claims preempt a mathematical formula, and hence fail to 
pass the Freeman-Walter-Abele two-step test for statutory subject matter 
under 35 USC 101. While such a rejection had been made by the examiner, it 
was traversed with the disingenuous argument that the apparent formula is 
not a mathematical formula because it uses an equivalence relation. The 
argument from the RSA patent file wrapper is attached as Exhibit W. 
Plaintiff alleges that this argument is mathematically incorrect. 
 
47. Defendants have demanded licenses for use of the "RSA algorithm" even 
though such a demand is prohibited by the doctrine of file wrapper 
estoppel. Exhibit W emphatically says, 
	However, there are no mathematical algorithms in the applicants' 
claims. 
An example of a statement that the RSA algorithm is patented can be found 
in Bidzos's letter of Sept. 16, 1986, included in Exhibit J. 
 
48. Cylink has filed court papers, attached as Exhibit X, stating that it 
believes the RSA patent to be invalid. If so, PKP has knowingly extracted 
license fees and sued competitors based on an invalid patent. 
 
49. According to item 13 of Exhibit X, it appears that RSADSI has denied an 
RSA license to Cylink. 
 
50. Plaintiff will seek leave of court to amend this complaint to assert 
such additional grounds for invalidity as may be ascertained and shall give 
notice prior to trial as may be required by 35 USC 282 of the matters 
specified herein. 
 
51. Defendant PKP acquired the Schnorr patent in a willful attempt to 
maintain its monopoly over public key technology. When use of the DSA 
appeared to be a non-infringing use of public key, RSADSI publicly attacked 
DSA technology as inferior, showed little interest in marketing DSA 
products, but acquired the Schnorr patent anyway in a predatory attempt to 
deter others from using the DSA. An example of Bidzos's public 
disparagement of the DSA (where it is referred to as the DSS) is attached 
as Exhibit Y. 
 
52. Plaintiff is informed and believes and on that basis alleges that PKP 
ties licensing of its patents to the purchase of software and services from 
RSADSI, in an attempt to broaden the scope of its patents and monopolize 
the market for certain related software and services. 
 
53. Defendants have organized an illegal secondary boycott of competitors. 
RSADSI has publicly distributed a "Sink Clipper" poster which urges people 
to boycott companies selling products based on a cryptographic technology 
other than that sold by RSADSI. It says: 
	What you can do ... Boycott Clipper devices and the companies which 
make them exclusively: Don't buy anything with a Clipper chip in it. 
A copy of the text on the poster is attached as Exhibit Z. 54. Plaintiff 
has been developing software for the Tessera card, a device with Clipper 
chip technology. Plaintiff stands to suffer injury from RSADSI's secondary 
boycott if it kills the market for Tessera cards. 
 
55. Defendants' conduct and tactics with regard to the PKP patents 
constitute patent misuse. 
 
56. Plaintiff is informed and believes and on that basis alleges that 
defendants charge different royalties to different licensees, and use price 
discrimination to bolster their monopoly. 
 
57. Defendants are in violation of antitrust laws with their monopolization 
tactics. 
 
58. Defendants have defamed plaintiff by making allegations of patent 
infringement to third parties, in violation of libel laws and laws against 
unfair business practices. 
 
59. Defendants concocted a joint scheme to fraudulently exaggerate the 
scope of their patents and deceive standards making bodies into drafting an 
RSA standard on or about April 6, 1990, the day the PKP partnership 
agreement in Exhibit A was consummated. Defendants formed an association -
in-fact that constituted an "enterprise" within the meaning of 18 USC 
1961(4). 
 
60. Defendants intended to use the exaggerated patents and phony license 
promises to monopolize the public key cryptography market, with full 
knowledge of the ANSI and IEEE patent policies-and of the invalidity of the 
Hellman-Merkle patent. 
 
61. Several of defendants' threats and fraudulent patent claims and threats 
were transmitted through the U.S. Mail, thus constituting mail fraud in 
violation of 18 USC 1341. One such letter, Exhibit R, was sent by 
registered mail on or about April 20, 1990. 
 
62. PKP also sent Exhibits K and Q through the U.S. mail system. 
 
63. Defendants have interfered with commerce, in violation of 18 USC 1951, 
with their predatory tactics, unwarranted threats, and other unfair 
business practices. 
 
64. Plaintiff is informed and believes and on that basis alleges that 
defendants have engaged in extortion by using the threat of lawsuit to 
extract patent licensing fees, when in fact they knew the patent to be 
invalid. 
 
65. Plaintiff has been damaged, as have others, by defendants' fraud, 
extortion, and interference with commerce. 
 
66. Defendant PKP has conspired with defendant RSADSI to engage in a 
pattern of racketeering, in violation of the Racketeer Influenced and 
Corrupt Organizations (RICO) Act. 
 
67. Plaintiff damages, in lost sales, contracts, and royalties, are 
estimated at $2 million. Much of this would have been interstate commerce, 
including royalties from ISC in Illinois. 
 
 
WHEREFORE, plaintiff prays for judgment as follows: 
 
1. That defendants, defendants' agents, partners, servants, employees, and 
all others acting in concert or participating with them, be enjoined during 
the pendency of this action and permanently from further interference with 
plaintiff's business. 
 
2. That defendants pay plaintiff $2 million in real and punitive damages, 
and that damages be trebled according to antitrust and RICO laws. 
 
3. That defendants be required to comply with the ANSI and IEEE patent 
policies. 
 
4. That defendants' patent claim on all public key technology be declared 
invalid. 
 
5. That practice of ElGamal encryption does not infringe any PKP patents, 
whether those patents are valid or not. 
 
6. That practice of the DSA does not infringe any PKP patents, whether 
those patents are valid or not. 
 
7. That the Diffie-Hellman patent be declared invalid and unenforceable.  
 
8. That the Hellman-Merkle patent be declared invalid and unenforceable. 
 
9. That defendants be estopped from enforcing the RSA patent. 
 
10. That defendants be enjoined from further libeling plaintiff. 
 
11. That defendants supply a complete list of persons and businesses that 
they have given false or libelous information, and that they send written 
retractions to each party. 
 
12. That defendant partnership PKP be dissolved, and its patent pool be 
divided and returned to each patent's rightful owner. 
 
13. That plaintiff be compensated for court costs and legal fees. 
 
14. That plaintiff have such other and further relief as is just and 
proper. 
 
Dated: July 26, 1994 
By: Plaintiff, Roger Schlafly, Pro Se 
 
Roger Schlafly 
P0 Box 1680 
Soquel, CA 95073 
telephone: (408) 476-3550

-- End ---------------------------------------------------------------------





Thread