`
`EXHIBIT 26 - Part 1
`
`
`
`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 2 of 31 PageID #: 26794
`
`Exhibit C-7
`
`Claim Chart Applying Apple Internet Address Detectors System Against the '843 Patent
`
`The Apple Internet Address Detectors ("IAD") product, also referred to as "Data Detectors," was offered for
`sale, sold, publicly disseminated, and publicly used in the United States at least by September 8, 1997.
`It
`therefore constitutes prior art under pre-AIA 35 U.S.C. § 102(a), (b) and (g).
`
`An additional product named US Geographic Detectors 1.0 ("Geographic Detectors"), which utilized Data
`Detectors, was offered for sale, sold, publicly disseminated, and publicly used in the United States around
`December 23, 1997 and therefore constitutes prior art under pre-AIA 35 U.S.C. § 102(a) and (g).
`
`As shown below, an Apple computer system running IAD and Simple Text and/or Claris Emailer, and for some
`elements Geographic Detectors, ("IAD System") anticipates and/or renders obvious claims 1, 8, 13, 15, 17-19,
`23, and 30 of the '843 patent. The IAD System constitutes prior art under pre-AIA 35 U.S.C. § 102(a) and (g)
`with Geographic Detectors and 102(a), (b), and (g) without Geographic Detectors.
`If the Judge or Jury finds
`that the IAD System does not anticipate a particular claim, then the IAD System still renders the claim obvious
`for the reasons discussed in Exhibit F.
`
`Evidence of the availability of IAD, Geographic Detectors, and the IAD System include the following:
`
`"Apple Introduces Internet Address Detectors," September 8, 1997
`US Geographic Detectors Read Me file, containing metadata of December 23, 1997
`
`Evidence of the design and operation of IAD, Geographic Detectors, and the IAD System include the following:
`
`"Apple Introduces Internet Address Detectors," September 8, 1997
`US Geographic Detectors Read Me file, containing metadata of December 23, 1997
`Web page for "Apple Data Detectors," last updated December 30, 1996
`Apple Internet Address Detectors User Manual, August 28, 1997 ('User Manual")
`"Apple, StarNine updates in mail," February 23, 1998
`Nardi, B. A, Miller, J. R. & Wright, D. J. (1998).
`"Collaborative, Programmable Intelligent
`Agents." Communications of the ACM, Vol. 41 No. 3, March 1998 ("Nardi")
`"Claris Em@iler Getting Started"
`Source code for IAD, available for inspection at DLA Piper
`A system running IAD Version 1.0.1 (which is an example of an IAD System), available for
`inspection at DLA Piper
`A system running IAD Version 1.0.2 and US Geographic Detectors 1.0 (which is an example of
`an IAD System), available for inspection at DLA Piper
`Screenshots from the system running IAD Version 1.0.1 (which is an example of an IAD
`System), available for inspection at DLA Piper, as shown below
`Screenshots from the system running IAD Version 1.0.2 and US Geographic Detectors 1.0
`(which is an example of an IAD System), available for inspection at DLA Piper, as shown below
`
`1
`
`
`
`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 3 of 31 PageID #: 26795
`
`'843 Patent Claims
`Claim 1
`A computer-implemented method
`for finding data related to the
`contents of a document using a first
`computer program running on a
`computer, the method comprising:
`
`Exhibit C-7
`
`Disclosure
`
`The User Manual states at pp. 1-2:
`
`Apple Internet Address Detectors User's Manual
`
`Apple Internet Address Detectors utilizes a neu Apple technology called
`Data Detectors. Data Detectors enables your computer to recognize and then
`act on certain ty pes of information, or data, in your documents. Apple Data
`Detectors can recognize several diflerent types of data, and soon software
`developers will extend the capabilities of Apple Data Detectors even further.
`
`.Apple Internet Address Detectors for Mac OS 8 can recognize and act on
`data that's in the form of Internet addresses, which includes the following:
`a e-mail addresses
`• Websites
`• newsgroup names
`• filenames on FTP (file transfer protocol) sites
`a names of remote computers
`
`For example, if you have a word-processing document that contains sev eral
`e-mail addresses. Apple Data Detectors can quickly scan the document
`identify all the addresses, and then open a new e-mail message addressed to
`the one you select. Or. lets say that someone sends you a World Wide Web
`address in an e-mail message. You can use Apple Data Detectors to find the
`address within the message, then open the Web page in your favorite Web
`browser program.
`
`For each type of information that Apple Data Detectors identifies, you can
`select an action to perform with it. The actions available with Apple Internet
`Address Detectors include
`• addressing a new e-mail message to the selected address
`• opening a Web browser program and connecting to the selected Web site
`• bookmarking the selected Web site in a Web browser program
`• saving a Web document as a file on your hard disk
`• downloading the selected file from an FTP site
`a connecting to the selected remote computer
`• opening a newsgroup with your news reader program
`
`The User Manual states at p. 4:
`
`2
`
`
`
`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 4 of 31 PageID #: 26796
`
`'843 Patent Claims
`
`Disclosure
`Getting started with Apple Data Detectors
`
`Exhibit C-7
`
`Apple Data Dilectors works «ith any Mac OS program in which you can
`select or highlight text. Apple Data Detectors quickly scans the selected te.vt
`for information in specific formats. It uses detectors that are programmed to
`recognize specific types of information. For example, this version of Apple
`Data Detectors includes several detectors that can recognize Internet
`addresses and uniform resource locators (URLs).
`
`Once a detector has identified a piece of information it recognizes. Apple
`Data Detectors creates a menu of actions for you to choose from. .Actions are
`things you can do w ith the detected information, such as sending it to another
`program or saving it for later use. The actions that are available depend on
`the ty pe of information detected.
`
`This table summarizes the actions supplied with Apple Internet
`Address Detectors;
`
`Type of data
`
`Example
`
`Actions
`
`t-mil 3dcr«s
`
`moof@9ppl<.com
`
`stud
`
`iiittii
`
`Web iddress
`
`knpitavw.ipplt.conyfilt.litril mw W<b site, boeknift Hi
`orsm as dectmttt
`
`ntnsgrctp
`
`Mirp.sys.mJe
`
`rod nms group
`
`(i« on in FTP sitt
`
`ftp-'.'jpplt.cor.lik si
`
`davmload the fi«
`
`host addttss
`
`rts<>rdi.ipp<«.oim
`
`otMeet to
`
`renole eorrpusr
`
`The User Manual states at pp. 5-6:
`
`3
`
`
`
`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 5 of 31 PageID #: 26797
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`Using Apple Data Detectors
`
`To use Apple Data Deteclors. follow these steps:
`
`1
`
`Select some text in any application that allows you to highlight text.
`
`Make sure the selected text contains at least one type of data that Apple Data
`Detectors recognizes. (In this example, the selected text contains one
`complete Internet address.)
`
`•
`
`Note Pail
`
`E B
`rs.
`For cddiUonol informalion, sea
`Apple's Vteb sil9 ol wvyw.oppie corn
`
`2
`
`Hold down the Control key. then press and hold down the mouse button.
`
`A "contextual menu" appears. It lists all the recognized data found in
`the selection.
`
`Note Pail
`
`•
`QB
`MMffllW- Help
`
`www^pplexom •
`
`Tip: If the contextual menu is empty, or the message "no structures
`found in selection" appears, the text you selected did not contain am
`recognizable data.
`
`After the contextual menu appears, you can release the Control key. Be sure
`to keep holding dow n the mouse button or the menu «ill disappear.
`
`3 Choose a recognized data item from the contextual menu, then choose an action from
`the submenu that appears.
`
`•
`
`Note Pad z
`
`For oddilionol infomnolion, se©
`Apple a WeD site at wrvw eppleconrj
`
`ETBI m Help
`
`wfc-w.<i|ip le.ro m •
`
`Connect with Cyberdog
`Connect with Internet Confuj
`Connect wtth NCSA Telnet
`View in America Online
`View in CVberdog
`View In Internet explorer
`View in Netscape Noviqotor
`Vii'W with Intrmi't (nnhij
`
`IAD could operate on text entered by a user in a Simple Text file, a
`Claris Emailer email, or text entered using any other application.
`
`See also Nardi at pp. 96-98 (including figs. 1,2): "As Apple Computer
`researchers, we started from a simple but focused approach to agents:
`That they should have the ability to infer appropriate high-level goals
`from user actions and requests and take action to achieve these goals.
`Further, based on a study of reference librarians as exemplary human
`agents [9], we wanted to build a system in which the user would not have
`to state goals explicitly and in detail. We learned from librarians that a
`
`4
`
`
`
`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 6 of 31 PageID #: 26798
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`large part of their value to clients is in working with imprecise requests.
`Beyond this concern, our general design strategy was to keep the most
`basic user question in front of us at all times: Will this software do
`something useful for users in an intelligent way that makes them more
`productive? The system we describe here—Apple Data
`Detectors—meets our criteria of being unobtrusive, being able to infer
`user needs, and doing useful work. Apple Data Detectors shipped as a
`product in 1997.
`
`Earlier work on intelligent agents was multifaceted, to the point where it
`is difficult to find a consensus among researchers on exactly what
`constitutes an 'agent' or even 'intelligence.' However, in nearly all
`cases, systems described as 'agent-based' rely on some explicitly
`represented knowledge about relevant aspects of the world—the objects
`or concepts being addressed by the software, the tasks relevant to the
`user, and the user's own knowledge about the world. Researchers have
`used machine learning techniques to track user actions and construct
`models of user preferences [7], create explicit models of user knowledge
`and skill levels in an attempt to anticipate user actions, misconceptions,
`and information needs [2], and implement planning systems to leap from
`a user's stated intention to the specific actions required to achieve that
`intention |3]. The locality of agents also varies across different
`agent-based systems; some act only within one's own machine, find
`others autonomously crawl the Web, searching for interesting content
`[4]. We tried to find a middle ground by using explicit representations
`of user-relevant information as a means of identifying actions users
`might wish to take but to leave the choice of these actions to users."
`
`See also Nardi at fig. 4: "This script uses two applications: First, a
`'personal information manager' (Now Contact 3.5) is opened and used as
`a database. Then the script opens an empty word processor document
`(via Corel WordPerfect) and writes the date, name, address, and
`salutation into it, leaving the user ready to write the letter."
`
`See also Nardi at 103-04: "Apple Data Detectors is a first step toward
`extracting semantics from everyday documents without asking users to
`create documents in new ways. Such an intelligent agent redefines
`'document' from a stream of characters to a data structure containing
`specific, known kinds of structures that can play specific, known roles in
`user interactions. Such an approach can provide a foundation for more
`powerful analyses beyond our current recognition and parsing
`technology. Future work could explore the use of more sophisticated
`kinds of recognition and parsing, including those that rely on finite state
`technology and linguistically informed context analysis [5], as well as
`integration with statistical techniques of data analysis, such as
`relevance-based techniques.
`
`5
`
`
`
`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 7 of 31 PageID #: 26799
`
`'843 Patent Claims
`
`Disclosure
`
`Exhibit C-7
`
`displaying the document
`electronically using the first
`computer program;
`
`One important future step for research will be to build knowledge into
`the system about the structures being recognizing and how these
`structures are related to user goals and tasks. Doing so will provide the
`basis for more flexible and powerful task support. For instance, if we
`can attribute some reasonable set of email address semantics to the
`textual presentation of an email address in a document, the system can
`use the address as a pointer to the person with that address. We can
`then carry out system actions intended for people (such as 'Place a phone
`call to this person') on an email address and let the system figure out the
`person implied by the address.
`(This can already be done through
`Apple Data Detectors but requires writing a script, rather than relying on
`inferencing as suggested here.) Such interaction might require a
`different user interface from the one used today. One can certainly
`imagine many different kinds of user interfaces to the basic
`structure-detection technology underlying the current system."
`IAD could operate on text entered by a user in a Simple Text file, a
`Claris Emailer email, or text entered using any other application.
`
`See also Nardi at fig. 1.
`
`See also Nardi at fig. 4: "This script uses two applications: First, a
`'personal information manager' (Now Contact 3.5) is opened and used as
`a database. Then the script opens an empty word processor document
`(via Corel WordPerfect) and writes the date, name, address, and
`salutation into it, leaving the user ready to write the letter."
`
`See also Nardi at 98: "Our first step was to find a user problem that
`needed solving in which intelligent agents would add value.
`In an
`investigation of how people file information on their computer desktops
`[1], we discovered that a common user complaint is that they cannot
`easily take action on the structured information found in everyday
`documents (structured information being data-recognizable by a
`grammar). Ordinary documents are full of such structured information:
`phone numbers, fax numbers, street addresses, email addresses, email
`signatures, abstracts, tables of contents, lists of references, tables,
`figures, captions, meeting announcements, Web addresses, and more.
`In addition, there are countless domain-specific structures .... These
`structures are not only relevant to users, but because of their structure,
`are also recognizable by parsing technologies. Once identified, the
`structure's type can be used to identify appropriate actions that might be
`carried out, like placing a meeting on a calendar, adding an address to an
`address book, dialing a phone number, opening a URL, finding the
`current price of a stock, filing an ISBN number, and compiling a list of
`abstracts.
`
`6
`
`
`
`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 8 of 31 PageID #: 26800
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`Apple Data Detectors supports a wide range of uses. Think of all the
`structured information in the documents you work with; in addition to
`those mentioned already, add bibliography items, forms (such as travel
`expensive reports and non-disclosure agreements), executive summaries,
`and most important, such domain-specific kinds of data as legal
`boilerplate, customer orders, and library search requests. Specific
`detectors can be created for each of these types of information."
`
`See also Nardi at 98: "User interface. To use Apple Data Detectors,
`users select a region of a document with some information of interest.
`Pressing a modifier key and the mouse button instructs the system to
`analyze the data within the selected region and to find all structures for
`which it has grammars.
`It then offers appropriate actions for each
`structure (see Figure 1)."
`
`See also Nardi at 101: "Apple Data Detectors therefore has the ability
`to infer appropriate high-level goals from user actions and requests and
`take appropriate action to achieve these gaols. When users invoke it on
`a region of text in a document, they are saying, in effect, 'Find the
`important stuff in here and help me do reasonable things to it.' Users
`can be imprecise, throwing the system a broad hint that there is
`something of interest, then let the system use its knowledge to do the
`right thing. Users work on their tasks in terms of high-level goals, such
`as 'put this address in my address book'—not by opening folders,
`clicking on icons, cutting, and pasting. Direct manipulation is a
`wasteful, frustrating way for users to interact with machines capable of
`showing more intelligence."
`
`See also Nardi at 101: "Apple Data Detectors assumes a world of
`heterogenous data (in the user's machine) that comes from different
`applications in different file formats. For example, it makes sense to
`put an address in an address book, whether the address is from a message
`sent in any of several mail programs, appears in a downloaded document,
`or is in another address book maintained by the user. Apple Data
`Detectors is a pervasive technology, giving users access to actions
`appropriate for data in an entire set of documents."
`
`See also Nardi at 102: "We also see evidence that end users with
`varying degrees of programming skill are extending actions much as we
`had expected. One user—a skilled programmer—used the basic
`detectors and actions that ship with the product as the basis for a new
`detector/action pair for a personally relevant task. He wanted to look
`up software bug reports in a database based on the ID numbers of the
`reports commonly found in other bug reports, email messages, and other
`program management documents. He distributed this detector/action
`throughout his work group, and a colleague—a marketing manager with
`
`7
`
`
`
`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 9 of 31 PageID #: 26801
`
`'843 Patent Claims
`
`while the document is being
`displayed, analyzing, in a computer
`process, first information from the
`document to determine if the first
`information is at least one of a
`plurality of types of information
`that can be searched for in order to
`find second information related to
`the first information;
`
`Exhibit C-7
`
`Disclosure
`much less programming experience than the original programmer—was
`able to adapt the action so the detector could run on his laptop computer
`(where his email and other documents reside) and display the bug reports
`on his desktop machine (where is program management tools reside).
`This extension required changes to only a few lines of code in the action,
`something well within his technical ability."
`
`See also Nardi at 103-04: "Apple Data Detectors is a first step toward
`extracting semantics from everyday documents without asking users to
`create documents in new ways. Such an intelligent agent redefines
`'document' from a stream of characters to a data structure containing
`specific, known kinds of structures that can play specific, known roles in
`user interactions. Such an approach can provide a foundation for more
`powerful analyses beyond our current recognition and parsing
`technology. Future work could explore the use of more sophisticated
`kinds of recognition and parsing, including those that rely on finite state
`technology and linguistically informed context analysis [5], as well as
`integration with statistical techniques of data analysis, such as
`relevance-based techniques.
`
`One important future step for research will be to build knowledge into
`the system about the structures being recognizing and how these
`structures are related to user goals and tasks. Doing so will provide the
`basis for more flexible and powerful task support. For instance, if we
`can attribute some reasonable set of email address semantics to the
`textual presentation of an email address in a document, the system can
`use the address as a pointer to the person with that address. We can
`then carry out system actions intended for people (such as 'Place a phone
`call to this person') on an email address and let the system figure out the
`person implied by the address.
`(This can already be done through
`Apple Data Detectors but requires writing a script, rather than relying on
`inferencing as suggested here.) Such interaction might require a
`different user interface from the one used today. One can certainly
`imagine many different kinds of user interfaces to the basic
`structure-detection technology underlying the current system."
`The User Manual states at pp. 5-6:
`
`8
`
`
`
`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 10 of 31 PageID #: 26802
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`Using Apple Data Detectors
`
`To use Apple Data Deteclors. follow these steps:
`
`1
`
`Select some text in any application that allows you to highlight text.
`
`Make sure the selected text contains at least one type of data that Apple Data
`Detectors recognizes. (In this example, the selected text contains one
`complete Internet address.)
`
`•
`
`Note Pail
`
`E B
`rs.
`For cddiUonol informalion, sea
`Apple's Vteb sil9 ol wvyw.oppie corn
`
`2
`
`Hold down the Control key. then press and hold down the mouse button.
`
`A "contextual menu" appears. It lists all the recognized data found in
`the selection.
`
`Note Pail
`
`•
`QB
`MMffllW- Help
`
`www^pplexom •
`
`Tip: If the contextual menu is empty, or the message "no structures
`found in selection" appears, the text you selected did not contain am
`recognizable data.
`
`After the contextual menu appears, you can release the Control key. Be sure
`to keep holding dow n the mouse button or the menu «ill disappear.
`
`3 Choose a recognized data item from the contextual menu, then choose an action from
`the submenu that appears.
`
`•
`
`Note Pad z
`
`For oddilionol infomnolion, se©
`Apple a WeD site at wrvw eppleconrj
`
`ETBI m Help
`
`wfc-w.<i|ip le.ro m •
`
`Connect with Cyberdog
`Connect with Internet Confuj
`Connect wtth NCSA Telnet
`View in America Online
`View in CVberdog
`View In Internet explorer
`View in Netscape Noviqotor
`Vii'W with Intrmi't (nnhij
`
`When a user selects text and right-clicks in Simple Text, IAD can detect
`URLs and provide options:
`
`9
`
`
`
`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 11 of 31 PageID #: 26803
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`I pi nip
`
`mmmm
`
`Edit Font
`
`www.apple com
`
`Si?P Style Sound Help
`untitled
`
`iii r
`
`1
`
`Connect with Cyberdog
`Connect with Internet Confiq
`Connect with NCSA Telnet
`View in America Online
`View in Cyberdog
`View in Internet Explorer
`View in Netscape Navigator
`Viewwith InternetConfig
`
`This feature was available in a Claris Emailer email as well, and starting
`with Claris Emailer version 2.0v3, a user needed to only right-click (and
`not select text) to obtain a list of actions for a URL.
`
`When a user selects text and right-clicks in Simple Text, IAD can detect
`email addresses and provide options:
`
`1
`£.
`m i n e r ^ a p a l e c o m
`
`untitled
`
`J
`
`\ Jmlller^applejom •
`apple.com
`
`Add p-mad address to Emailer addres% bo
`Send mail with America Online
`Send mail with Claris En
`liler
`Send mad with Cyberdoij
`Send mail with Fudora
`Send mail with Internet i
`Send mail with Internet 1
`Sfiui mail with NeUcape
`
`This feature was available in a Claris Emailer email as well, and starting
`with Claris Emailer version 2.0v3, a user needed to only right-click (and
`not select text) to obtain a list of actions for an email address.
`
`When a user selects text and right-clicks in Simple Text, IAD can detect
`occurrences of a city name followed by a state name or US Postal
`abbreviation and occurrences of the name of a state, territory, or
`
`10
`
`
`
`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 12 of 31 PageID #: 26804
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`protectorate of the United States and provide options. The user could
`then obtain a map of the selected US city, for which the system would
`search the Yahoo map website for a map of the city, or the user could
`obtain a zip code for the selected US city, for which the system would
`search the US Postal Service website for a list of zip codes for the city.
`See US Geographic Detectors 1.0 Read Me file. For example:
`
`lout Sl/e Slvlp Sound Help
`
`^ IMc Filit
`n
`[LgVSjo^o Palo AUo, CA and see whots there
`
`jymt
`
`llllllll.Ml
`
`Help
`[tatiS
`
`Get Map for US City
`[ uukup /ipt ode for City
`
`j
`
`This feature was available in a Claris Emailer email as well, and starting
`with Claris Emailer version 2.0v3, a user needed to only right-click (and
`not select text) to obtain a list of actions for geographic information.
`
`See also Nardi at 98: "Our first step was to find a user problem that
`needed solving in which intelligent agents would add value.
`In an
`investigation of how people file information on their computer desktops
`[1], we discovered that a common user complaint is that they cannot
`easily take action on the structured information found in everyday
`documents (structured information being data-recognizable by a
`grammar). Ordinary documents are full of such structured information:
`phone numbers, fax numbers, street addresses, email addresses, email
`signatures, abstracts, tables of contents, lists of references, tables,
`figures, captions, meeting announcements, Web addresses, and more.
`In addition, there are countless domain-specific structures .... These
`structures are not only relevant to users, but because of their structure,
`are also recognizable by parsing technologies. Once identified, the
`structure's type can be used to identify appropriate actions that might be
`carried out, like placing a meeting on a calendar, adding an address to an
`address book, dialing a phone number, opening a URL, finding the
`current price of a stock, filing an ISBN number, and compiling a list of
`abstracts.
`
`Apple Data Detectors supports a wide range of uses. Think of all the
`structured information in the documents you work with; in addition to
`those mentioned already, add bibliography items, forms (such as travel
`expensive reports and non-disclosure agreements), executive summaries,
`and most important, such domain-specific kinds of data as legal
`boilerplate, customer orders, and library search requests. Specific
`detectors can be created for each of these types of information."
`
`See also Nardi at 99: "Apple Data Detectors is an open extensible
`
`11
`
`
`
`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 13 of 31 PageID #: 26805
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`Its
`system allowing the recognition and parsing of complex structures.
`recognition technology is a hybrid system that uses Barley's algorithm
`and deterministic finite automata. The algorithms permit recognition of
`not only simple structures, such as predefined strings and atomic patterns
`like URLs and email addresses, but complex composite structures, such
`as meeting announcements composed of small more atomic structures,
`like date, time, and place."
`
`See also Nardi at p. 99 ("Figure 4. An action script, demonstrating the
`generality of Apple Data Detectors' use of a scripting language and
`external applications as information repositories and as end-user tools.
`This script can be activated when the system detects a telephone number.
`It then generates word processor letterhead addressed to the person
`possessing that number, with appropriate date and salutation information.
`This script uses two applications: First, a "personal information
`manager" (Now Contact 3.5) is opened and used as a database. Then the
`script opens an empty word processor document (via Corel WordPerfect)
`and writes the date, name, address, and salutation into it, leaving the user
`ready to write the letter.").
`
`See also Nardi at 103-04: "Apple Data Detectors is a first step toward
`extracting semantics from everyday documents without asking users to
`create documents in new ways. Such an intelligent agent redefines
`'document' from a stream of characters to a data structure containing
`specific, known kinds of structures that can play specific, known roles in
`user interactions. Such an approach can provide a foundation for more
`powerful analyses beyond our current recognition and parsing
`technology. Future work could explore the use of more sophisticated
`kinds of recognition and parsing, including those that rely on finite state
`technology and linguistically informed context analysis [5], as well as
`integration with statistical techniques of data analysis, such as
`relevance-based techniques.
`
`One important future step for research will be to build knowledge into
`the system about the structures being recognizing and how these
`structures are related to user goals and tasks. Doing so will provide the
`basis for more flexible and powerful task support. For instance, if we
`can attribute some reasonable set of email address semantics to the
`textual presentation of an email address in a document, the system can
`use the address as a pointer to the person with that address. We can
`then carry out system actions intended for people (such as 'Place a phone
`call to this person') on an email address and let the system figure out the
`person implied by the address.
`(This can already be done through
`Apple Data Detectors but requires writing a script, rather than relying on
`inferencing as suggested here.) Such interaction might require a
`different user interface from the one used today. One can certainly
`
`12
`
`
`
`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 14 of 31 PageID #: 26806
`
`Exhibit C-7
`
`'843 Patent Claims
`
`retrieving the first information;
`
`Disclosure
`imagine many different kinds of user interfaces to the basic
`structure-detection technology underlying the current system."
`See previous element.
`
`See also Nardi at 99-101 (discussion of "Architecture and
`Implementation").
`When a user selects text and right-clicks in Simple Text, IAD can detect
`URLs and provide options:
`
`' I P fedit
`
`pi
`|www.apple com
`
`Font Si7e Style Sound Hplp
`untitled
`
`•
`
`www.apple.fom •
`
`1
`
`Connect with Cyberdoq
`Connect with Internet Contig
`Connect with NCSA Telnet
`View in America Online
`View in Cyberdog
`View in Internet Explorer
`View in Netscape Navigator
`View with Internet Config
`
`providing an input device,
`configured by the first computer
`program, that allows a user to enter
`a user command to initiate an
`operation, the operation comprising
`(i) performing a search using at
`least part of the first information as
`a search term in order to find the
`second information, of a specific
`type or types, associated with the
`search term in an information
`source external to the document,
`wherein the specific type or types
`of second information is dependent
`at least in part on the type or types
`of the first information, and (ii)
`performing an action using at least
`part of the second information;
`
`This feature was available in a Claris Emailer email as well, and starting
`with Claris Emailer version 2.0v3, a user needed to only right-click (and
`not select text) to obtain a list of actions for a URL.
`
`When a user selects text and right-clicks in Simple Text, IAD can detect
`email addresses and provide options:
`
`13
`
`
`
`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 15 of 31 PageID #: 26807
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`["
`j"''
`P
`jmlller^apjle.com
`
`Styi^Snniic^plii
`untltlpd
`
`kcnnnnrnHzmoi1
`
`| <ipple.com
`
`•
`
`Add e-mail Address to Emniler addr
`Send mdil with America Online
`Send mail with Clnris Ei<
`liler
`Send mail with Cyberdo.i
`Send mail with Fudora
`Send mail with Internet Config
`Send mail with Internet Explorer
`Send mall with Netscape s.tvuj.itnr
`
`This feature was available in a Claris Emailer email as well, and starting
`with Claris Emailer version 2.0v3, a user needed to only right-click (and
`not select text) to obtain a list of actions for an email address.
`
`When I AD detects an email address and a user selects "Send mail with
`Claris Emailer," Claris Emailer will search its information source for a
`company name associated with the domain of the email address and will
`insert this into the Outgoing Message panel for a new email. For
`example:
`
`L ®
`
`|ta
`
`I Out Bo
`
`Setup Window ^ Hplp
`jSIB
`Outcimtiq Message:
`
`foVllow*
`Sw>d YM |
`
`Subject |f
`
`SOHEZZ.
`Q TO a
`
`R»«ipw>t
`
`Mfross
`
`jmilVr
`
`D»sty»Atv
`
`AppW Computer
`
`t> <?
`f
`When a user selects text and right-clicks in Simple Text, IAD can detect
`occurrences of a city name follow