throbber
Case 1:13-cv-00919-LPS Document 307-7 Filed 03/10/21 Page 1 of 28 PageID #: 26824
`
`EXHIBIT 26 - Part 2
`
`

`

`Case 1:13-cv-00919-LPS Document 307-7 Filed 03/10/21 Page 2 of 28 PageID #: 26825
`
`'843 Patent Claims
`
`Claim 19
`A method according to claim 1,
`wherein performing the action
`includes causing insertion of at
`least part of the second information
`into the document by the first
`computer program.
`
`Exhibit C-7
`
`Disclosure
`an artifact of Apple Data Detectors' ability to find more than one
`structure in a selection and the need to offer more than one action for the
`same structure (such as 'open URL' and 'place URL in hot list'). But
`multiple structures and actions are of benefit to users in terms of their
`being able to choose the structure to be manipulated and to choose the
`action to be employed. Users therefore remain in control of their work
`with the computer at all times."
`
`See also Nardi at 102: "We also see evidence that end users with
`varying degrees of programming skill are extending actions much as we
`had expected. One user—a skilled programmer—used the basic
`detectors and actions that ship with the product as the basis for a new
`detector/action pair for a personally relevant task. He wanted to look
`up software bug reports in a database based on the ID numbers of the
`reports commonly found in other bug reports, email messages, and other
`program management documents. He distributed this detector/action
`throughout his work group, and a colleague—a marketing manager with
`much less programming experience than the original programmer—was
`able to adapt the action so the detector could run on his laptop computer
`(where his email and other documents reside) and display the bug reports
`on his desktop machine (where is program management tools reside).
`This extension required changes to only a few lines of code in the action,
`something well within his technical ability."
`
`If the Judge or Jury finds that IAD or the IAD System does not disclose
`this element, the element and the claim are still rendered obvious for the
`reasons stated in Exhibit F, Table 5.
`
`When IAD detects an email address and a user selects "Send mail with
`Claris Emailer," Claris Emailer will search its information source for a
`company name associated with the domain of the email address and will
`insert this into the Outgoing Message panel for a new email. For
`example:
`
`31
`
`

`

`Case 1:13-cv-00919-LPS Document 307-7 Filed 03/10/21 Page 3 of 28 PageID #: 26826
`
`Exhibit C-7
`
`'843 Patent Claims
`
`Disclosure
`
`1
`
`"^i
`
`ffi
`
`Out Bo
`
`ij • g
`Subject |f
`S jmillei
`0 1 Tgp»
`I
`0 To ®
`
`N ^
`
`*
`
`^.CD a^nr
`
`Outgoinq Message;
`
`•BfBiWTfW
`
`SWOYU |
`
`R»Ctp>»fit
`
`Ad-jrpc?
`
`jmilWr
`
`AppW Computer
`
`22!!
`
`dP
`
`-
`
`When a user selects text and right-clicks in Simple Text, IAD can detect
`occurrences of a city name followed by a state name or US Postal
`abbreviation and occurrences of the name of a state, territory, or
`protectorate of the United States and provide options. The user could
`then obtain a map of the selected US city, for which the system would
`search the Yahoo map website for a map of the city, or the user could
`obtain a zip code for the selected US city, for which the system would
`search the US Postal Serv ice website for a list of zip codes for the city.
`See US Geographic Detectors 1.0 Read Me file. For example;
`
`s'Vle Sound Help
`
`[t^Vsjo^Poio Alto. CA and se^hoT^herT
`
`Help
`
`Get Map for US City
`luukup Ziptode for lis City |
`
`This feature was available in a Claris Emailer email as well, and starting
`with Claris Emailer version 2.0v3, a user needed to only right-click (and
`not select text) to obtain a list of actions for geographic information.
`
`See also Nardi at 98: "Our first step was to find a user problem that
`needed solving in which intelligent agents would add value.
`In an
`investigation of how people file information on their computer desktops
`[1], we discovered that a common user complaint is that they cannot
`easily take action on the structured information found in everyday
`documents (structured information being data-recognizable by a
`grammar). Ordinary documents are full of such structured information:
`phone numbers, fax numbers, street addresses, email addresses, email
`signatures, abstracts, tables of contents, lists of references, tables,
`figures, captions, meeting announcements, Web addresses, and more.
`In addition, there are countless domain-specific structures .... These
`
`32
`
`

`

`Case 1:13-cv-00919-LPS Document 307-7 Filed 03/10/21 Page 4 of 28 PageID #: 26827
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`structures are not only relevant to users, but because of their structure,
`are also recognizable by parsing technologies. Once identified, the
`structure's type can be used to identify appropriate actions that might be
`carried out, like placing a meeting on a calendar, adding an address to an
`address book, dialing a phone number, opening a URL, finding the
`current price of a stock, filing an ISBN number, and compiling a list of
`abstracts.
`
`Apple Data Detectors supports a wide range of uses. Think of all the
`structured information in the documents you work with; in addition to
`those mentioned already, add bibliography items, forms (such as travel
`expensive reports and non-disclosure agreements), executive summaries,
`and most important, such domain-specific kinds of data as legal
`boilerplate, customer orders, and library search requests. Specific
`detectors can be created for each of these types of information."
`
`See also Nardi at fig. 4: "This script can be activated when the system
`detects a telephone number.
`It then generates word processor letterhead
`addressed to the person possessing that number, with appropriate date
`and salutation information. This script uses two applications: First, a
`'personal information manager' (Now Contact 3.5) is opened and used as
`a database. Then the script opens an empty word processor document
`(via Corel WordPerfect) and writes the date, name, address and
`salutation into it, leaving the user ready to write the letter."
`
`"While Apple and third-party developers will
`See also Nardi at 99:
`provide many detectors and actions, it is clear that enabling end users to
`write their own detectors and actions will make Apple Data Detectors
`much more powerful and useful by providing domain-specific
`programming capabilities appropriate for the specific needs of specific
`users [8]."
`
`See also Nardi at 101: "Unlike systems based on predefined
`recognizer/action pairs, such as the Selection Recognition Agent [10],
`the Apple Data Detectors' scripting ability allows any set of arbitrary
`actions to be executed when the user selects a particular action (see
`Figure 3). Scripting is not limited to the parameters of a command line
`interface to the application; it can do anything that can be expressed in
`the scripting language, including manipulation of data structures inside
`the application, if the application's scripting model makes that possible."
`
`See also Nardi at 101: "The ability to work within existing documents
`provides immediate user value and leverages the data that the user is
`already using."
`
`See also Nardi at 101: "Having to choose a particular action is actually
`
`33
`
`

`

`Case 1:13-cv-00919-LPS Document 307-7 Filed 03/10/21 Page 5 of 28 PageID #: 26828
`
`Exhibit C-7
`
`Disclosure
`an artifact of Apple Data Detectors' ability to find more than one
`structure in a selection and the need to offer more than one action for the
`same structure (such as 'open URL' and 'place URL in hot list'). But
`multiple structures and actions are of benefit to users in terms of their
`being able to choose the structure to be manipulated and to choose the
`action to be employed. Users therefore remain in control of their work
`with the computer at all times."
`
`See also Nardi at 102: "We also see evidence that end users with
`varying degrees of programming skill are extending actions much as we
`had expected. One user—a skilled programmer—used the basic
`detectors and actions that ship with the product as the basis for a new
`detector/action pair for a personally relevant task. He wanted to look
`up software bug reports in a database based on the ID numbers of the
`reports commonly found in other bug reports, email messages, and other
`program management documents. He distributed this detector/action
`throughout his work group, and a colleague—a marketing manager with
`much less programming experience than the original programmer—was
`able to adapt the action so the detector could run on his laptop computer
`(where his email and other documents reside) and display the bug reports
`on his desktop machine (where is program management tools reside).
`This extension required changes to only a few lines of code in the action,
`something well within his technical ability."
`
`If the Judge or Jury finds that IAD or the IAD System does not disclose
`this element, the element and the claim are still rendered obvious for the
`reasons stated in Exhibit F, Table 5.
`
`A computer running IAD would contain a storage medium containing the
`IAD program.
`
`The User Manual states at pp. 1-2:
`
`'843 Patent Claims
`
`Claim 23
`At least one non-transitory
`computer readable medium
`encoded with instructions which,
`when loaded on a computer,
`establish processes for finding data
`related to the contents of a
`document using a first computer
`program running on a computer, the
`processes comprising:
`
`3 4
`
`

`

`Case 1:13-cv-00919-LPS Document 307-7 Filed 03/10/21 Page 6 of 28 PageID #: 26829
`
`Exhibit C-7
`
`'843 Patent Claims
`
`Disclosure
`Apple Internet Address Detectors User's Manual
`
`Apple Internet Addrc» Detectors utilizes a new Apple technology called
`Data Detcclorsi Data Detectors enables your computer to recogni/e and then
`act on certain ty pes of information, or data in your documents. Apple Data
`Detectors can recognize several different types of data, and soon software
`developers will extend the capabilities of Apple Data Detectors even further.
`
`Apple Internet Address Detectors for Mac OS 8 can recognize and act on
`data that's in the form of Internet addresses, which includes the following:
`a e-mail addresses
`• Web sites
`• newsgroup names
`• filenames on FTP (file transfer protocol) sites
`• names of remote computers
`
`For example, if y ou have a word-processing document that contains sev eral
`e-mail addresses. Apple Data Detectors can quickly scan the document
`identify all the addresses, and then open a new e-mail message addressed to
`the one you select. Or. let's say that someone sends you a World Wide Web
`address in an e-mail message. Vou can use Apple Data Detectors to find the
`address within the message, then open the Web page in your favorite Web
`browser program.
`
`For each type of information that Apple Data Detectors identifies, you can
`select an action to perform with it. The actions available with Apple Internet
`Address Detectors include
`a addressing a new e-mail message to the selected address
`a opening a Web browser program and connecting to the selected Web site
`a bookmarking the selected Web site in a Web browser program
`a saving a Web document as a file on your hard disk
`a downloading the selected file from an FTP site
`a connecting to the selected remote computer
`a opening a newsgroup with your news reader program
`
`The User Manual states at p. 4:
`
`35
`
`

`

`Case 1:13-cv-00919-LPS Document 307-7 Filed 03/10/21 Page 7 of 28 PageID #: 26830
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`Getting started with Apple Data Detectors
`Apple Data Dilectors works «ith any Mac OS program in which you can
`select or highlight text. Apple Data Detectors quickly scans the selected te.vt
`for information in specific formats. It uses detectors that are programmed to
`recognize specific types of information. For example, this version of Apple
`Data Detectors includes several detectors that can recognize Internet
`addresses and uniform resource locators (URLs).
`
`Once a detector has identified a piece of information it recognizes. Apple
`Data Detectors creates a menu of actions for you to choose from. .Actions are
`things you can do w ith the detected information, such as sending it to another
`program or saving it for later use. The actions that are available depend on
`the ty pe of information detected.
`
`This table summarizes the actions supplied with Apple Internet
`Address Detectors;
`
`Type of data
`
`Example
`
`Actions
`
`t-mil 3dcr«s
`
`moof@9ppl<.com
`
`stud
`
`iiittii
`
`Web iddress
`
`knpitavw.ipplt.conyfilt.litril mw W<b site, boeknift Hi
`orsm as dectmttt
`
`ntnsgrctp
`
`Mirp.sys.mJe
`
`rod nms group
`
`(i« on in FTP sitt
`
`ftp-'.'jpplt.cor.lik si
`
`davmload the fi«
`
`host addttss
`
`rts<>rdi.ipp<«.oim
`
`otMeet to
`
`renole eorrpusr
`
`The User Manual states at pp. 5-6:
`
`36
`
`

`

`Case 1:13-cv-00919-LPS Document 307-7 Filed 03/10/21 Page 8 of 28 PageID #: 26831
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`Using Apple Data Detectors
`
`To use Apple Data Deteclors. follow these steps:
`
`1
`
`Select some text in any application that allows you to highlight text.
`
`Make sure the selected text contains at least one type of data that Apple Data
`Detectors recognizes. (In this example, the selected text contains one
`complete Internet address.)
`
`•
`
`Note Pail
`
`E B
`rs.
`For cddiUonol informalion, sea
`Apple's Vteb sil9 ol wvyw.oppie corn
`
`2
`
`Hold down the Control key. then press and hold down the mouse button.
`
`A "contextual menu" appears. It lists all the recognized data found in
`the selection.
`
`Note Pail
`
`•
`QB
`MMffllW- Help
`
`www^pplexom •
`
`Tip: If the contextual menu is empty, or the message "no structures
`found in selection" appears, the text you selected did not contain am
`recognizable data.
`
`After the contextual menu appears, you can release the Control key. Be sure
`to keep holding dow n the mouse button or the menu «ill disappear.
`
`3 Choose a recognized data item from the contextual menu, then choose an action from
`the submenu that appears.
`
`•
`
`Note Pad z
`
`For oddilionol infomnolion, se©
`Apple a WeD site at wrvw eppleconrj
`
`ETBI m Help
`
`wfc-w.<i|ip le.ro m •
`
`Connect with Cyberdog
`Connect with Internet Confuj
`Connect wtth NCSA Telnet
`View in America Online
`View in CVberdog
`View In Internet explorer
`View in Netscape Noviqotor
`Vii'W with Intrmi't (nnhij
`
`IAD could operate on text entered by a user in a Simple Text file, a
`Claris Emailer email, or text entered using any other application.
`
`See also Nardi at pp. 96-98 (including figs. 1,2): "As Apple Computer
`researchers, we started from a simple but focused approach to agents:
`That they should have the ability to infer appropriate high-level goals
`from user actions and requests and take action to achieve these goals.
`Further, based on a study of reference librarians as exemplary human
`agents [9], we wanted to build a system in which the user would not have
`to state goals explicitly and in detail. We learned from librarians that a
`
`37
`
`

`

`Case 1:13-cv-00919-LPS Document 307-7 Filed 03/10/21 Page 9 of 28 PageID #: 26832
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`large part of their value to clients is in working with imprecise requests.
`Beyond this concern, our general design strategy was to keep the most
`basic user question in front of us at all times: Will this software do
`something useful for users in an intelligent way that makes them more
`productive? The system we describe here—Apple Data
`Detectors—meets our criteria of being unobtrusive, being able to infer
`user needs, and doing useful work. Apple Data Detectors shipped as a
`product in 1997.
`
`Earlier work on intelligent agents was multifaceted, to the point where it
`is difficult to find a consensus among researchers on exactly what
`constitutes an 'agent' or even 'intelligence.' However, in nearly all
`cases, systems described as 'agent-based' rely on some explicitly
`represented knowledge about relevant aspects of the world—the objects
`or concepts being addressed by the software, the tasks relevant to the
`user, and the user's own knowledge about the world. Researchers have
`used machine learning techniques to track user actions and construct
`models of user preferences [7], create explicit models of user knowledge
`and skill levels in an attempt to anticipate user actions, misconceptions,
`and information needs [2], and implement planning systems to leap from
`a user's stated intention to the specific actions required to achieve that
`intention |3]. The locality of agents also varies across different
`agent-based systems; some act only within one's own machine, find
`others autonomously crawl the Web, searching for interesting content
`[4]. We tried to find a middle ground by using explicit representations
`of user-relevant information as a means of identifying actions users
`might wish to take but to leave the choice of these actions to users."
`
`See also Nardi at fig. 4: "This script uses two applications: First, a
`'personal information manager' (Now Contact 3.5) is opened and used as
`a database. Then the script opens an empty word processor document
`(via Corel WordPerfect) and writes the date, name, address, and
`salutation into it, leaving the user ready to write the letter."
`
`See also Nardi at 103-04: "Apple Data Detectors is a first step toward
`extracting semantics from everyday documents without asking users to
`create documents in new ways. Such an intelligent agent redefines
`'document' from a stream of characters to a data structure containing
`specific, known kinds of structures that can play specific, known roles in
`user interactions. Such an approach can provide a foundation for more
`powerful analyses beyond our current recognition and parsing
`technology. Future work could explore the use of more sophisticated
`kinds of recognition and parsing, including those that rely on finite state
`technology and linguistically informed context analysis [5], as well as
`integration with statistical techniques of data analysis, such as
`relevance-based techniques.
`
`3 8
`
`

`

`Case 1:13-cv-00919-LPS Document 307-7 Filed 03/10/21 Page 10 of 28 PageID #: 26833
`
`'843 Patent Claims
`
`Disclosure
`
`Exhibit C-7
`
`displaying the document
`electronically using the first
`computer program;
`
`One important future step for research will be to build knowledge into
`the system about the structures being recognizing and how these
`structures are related to user goals and tasks. Doing so will provide the
`basis for more flexible and powerful task support. For instance, if we
`can attribute some reasonable set of email address semantics to the
`textual presentation of an email address in a document, the system can
`use the address as a pointer to the person with that address. We can
`then carry out system actions intended for people (such as 'Place a phone
`call to this person') on an email address and let the system figure out the
`person implied by the address.
`(This can already be done through
`Apple Data Detectors but requires writing a script, rather than relying on
`inferencing as suggested here.) Such interaction might require a
`different user interface from the one used today. One can certainly
`imagine many different kinds of user interfaces to the basic
`structure-detection technology underlying the current system."
`IAD could operate on text entered by a user in a Simple Text file, a
`Claris Emailer email, or text entered using any other application.
`
`See also Nardi at fig. 1.
`
`See also Nardi at fig. 4: "This script uses two applications: First, a
`'personal information manager' (Now Contact 3.5) is opened and used as
`a database. Then the script opens an empty word processor document
`(via Corel WordPerfect) and writes the date, name, address, and
`salutation into it, leaving the user ready to write the letter."
`
`See also Nardi at 98: "Our first step was to find a user problem that
`needed solving in which intelligent agents would add value.
`In an
`investigation of how people file information on their computer desktops
`[1], we discovered that a common user complaint is that they cannot
`easily take action on the structured information found in everyday
`documents (structured information being data-recognizable by a
`grammar). Ordinary documents are full of such structured information:
`phone numbers, fax numbers, street addresses, email addresses, email
`signatures, abstracts, tables of contents, lists of references, tables,
`figures, captions, meeting announcements, Web addresses, and more.
`In addition, there are countless domain-specific structures .... These
`structures are not only relevant to users, but because of their structure,
`are also recognizable by parsing technologies. Once identified, the
`structure's type can be used to identify appropriate actions that might be
`carried out, like placing a meeting on a calendar, adding an address to an
`address book, dialing a phone number, opening a URL, finding the
`current price of a stock, filing an ISBN number, and compiling a list of
`abstracts.
`
`3 9
`
`

`

`Case 1:13-cv-00919-LPS Document 307-7 Filed 03/10/21 Page 11 of 28 PageID #: 26834
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`Apple Data Detectors supports a wide range of uses. Think of all the
`structured information in the documents you work with; in addition to
`those mentioned already, add bibliography items, forms (such as travel
`expensive reports and non-disclosure agreements), executive summaries,
`and most important, such domain-specific kinds of data as legal
`boilerplate, customer orders, and library search requests. Specific
`detectors can be created for each of these types of information."
`
`See also Nardi at 98: "User interface. To use Apple Data Detectors,
`users select a region of a document with some information of interest.
`Pressing a modifier key and the mouse button instructs the system to
`analyze the data within the selected region and to find all structures for
`which it has grammars.
`It then offers appropriate actions for each
`structure (see Figure 1)."
`
`See also Nardi at 101: "Apple Data Detectors therefore has the ability
`to infer appropriate high-level goals from user actions and requests and
`take appropriate action to achieve these gaols. When users invoke it on
`a region of text in a document, they are saying, in effect, 'Find the
`important stuff in here and help me do reasonable things to it.' Users
`can be imprecise, throwing the system a broad hint that there is
`something of interest, then let the system use its knowledge to do the
`right thing. Users work on their tasks in terms of high-level goals, such
`as 'put this address in my address book'—not by opening folders,
`clicking on icons, cutting, and pasting. Direct manipulation is a
`wasteful, frustrating way for users to interact with machines capable of
`showing more intelligence."
`
`See also Nardi at 101: "Apple Data Detectors assumes a world of
`heterogenous data (in the user's machine) that comes from different
`applications in different file formats. For example, it makes sense to
`put an address in an address book, whether the address is from a message
`sent in any of several mail programs, appears in a downloaded document,
`or is in another address book maintained by the user. Apple Data
`Detectors is a pervasive technology, giving users access to actions
`appropriate for data in an entire set of documents."
`
`See also Nardi at 102: "We also see evidence that end users with
`varying degrees of programming skill are extending actions much as we
`had expected. One user—a skilled programmer—used the basic
`detectors and actions that ship with the product as the basis for a new
`detector/action pair for a personally relevant task. He wanted to look
`up software bug reports in a database based on the ID numbers of the
`reports commonly found in other bug reports, email messages, and other
`program management documents. He distributed this detector/action
`throughout his work group, and a colleague—a marketing manager with
`
`40
`
`

`

`Case 1:13-cv-00919-LPS Document 307-7 Filed 03/10/21 Page 12 of 28 PageID #: 26835
`
`'843 Patent Claims
`
`while the document is being
`displayed, analyzing, in a computer
`process, first information from the
`document to determine if the first
`information is at least one of a
`plurality of types of information
`that can be searched for in order to
`find second information related to
`the first information;
`
`Exhibit C-7
`
`Disclosure
`much less programming experience than the original programmer—was
`able to adapt the action so the detector could run on his laptop computer
`(where his email and other documents reside) and display the bug reports
`on his desktop machine (where is program management tools reside).
`This extension required changes to only a few lines of code in the action,
`something well within his technical ability."
`
`See also Nardi at 103-04: "Apple Data Detectors is a first step toward
`extracting semantics from everyday documents without asking users to
`create documents in new ways. Such an intelligent agent redefines
`'document' from a stream of characters to a data structure containing
`specific, known kinds of structures that can play specific, known roles in
`user interactions. Such an approach can provide a foundation for more
`powerful analyses beyond our current recognition and parsing
`technology. Future work could explore the use of more sophisticated
`kinds of recognition and parsing, including those that rely on finite state
`technology and linguistically informed context analysis [5], as well as
`integration with statistical techniques of data analysis, such as
`relevance-based techniques.
`
`One important future step for research will be to build knowledge into
`the system about the structures being recognizing and how these
`structures are related to user goals and tasks. Doing so will provide the
`basis for more flexible and powerful task support. For instance, if we
`can attribute some reasonable set of email address semantics to the
`textual presentation of an email address in a document, the system can
`use the address as a pointer to the person with that address. We can
`then carry out system actions intended for people (such as 'Place a phone
`call to this person') on an email address and let the system figure out the
`person implied by the address.
`(This can already be done through
`Apple Data Detectors but requires writing a script, rather than relying on
`inferencing as suggested here.) Such interaction might require a
`different user interface from the one used today. One can certainly
`imagine many different kinds of user interfaces to the basic
`structure-detection technology underlying the current system."
`The User Manual states at pp. 5-6:
`
`41
`
`

`

`Case 1:13-cv-00919-LPS Document 307-7 Filed 03/10/21 Page 13 of 28 PageID #: 26836
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`Using Apple Data Detectors
`
`To use Apple Data Deteclors. follow these steps:
`
`1
`
`Select some text in any application that allows you to highlight text.
`
`Make sure the selected text contains at least one type of data that Apple Data
`Detectors recognizes. (In this example, the selected text contains one
`complete Internet address.)
`
`•
`
`Note Pail
`
`E B
`rs.
`For cddiUonol informalion, sea
`Apple's Vteb sil9 ol wvyw.oppie corn
`
`2
`
`Hold down the Control key. then press and hold down the mouse button.
`
`A "contextual menu" appears. It lists all the recognized data found in
`the selection.
`
`Note Pail
`
`•
`QB
`MMffllW- Help
`
`www^pplexom •
`
`Tip: If the contextual menu is empty, or the message "no structures
`found in selection" appears, the text you selected did not contain am
`recognizable data.
`
`After the contextual menu appears, you can release the Control key. Be sure
`to keep holding dow n the mouse button or the menu «ill disappear.
`
`3 Choose a recognized data item from the contextual menu, then choose an action from
`the submenu that appears.
`
`•
`
`Note Pad z
`
`For oddilionol infomnolion, se©
`Apple a WeD site at wrvw eppleconrj
`
`ETBI m Help
`
`wfc-w.<i|ip le.ro m •
`
`Connect with Cyberdog
`Connect with Internet Confuj
`Connect wtth NCSA Telnet
`View in America Online
`View in CVberdog
`View In Internet explorer
`View in Netscape Noviqotor
`Vii'W with Intrmi't (nnhij
`
`When a user selects text and right-clicks in Simple Text, IAD can detect
`URLs and provide options:
`
`42
`
`

`

`Case 1:13-cv-00919-LPS Document 307-7 Filed 03/10/21 Page 14 of 28 PageID #: 26837
`
`Exhibit C-7
`
`'843 Patent Claims
`
`mmmm
`
`Edit Font
`
`Disclosure
`I pi nip
`www.apple com
`
`Si?P Style Sound Help
`untitled
`
`iii r
`
`1 Connect with Cyberdog
`
`Connect with Internet Confiq
`Connect with NCSA Telnet
`View in America Online
`View in Cyberdog
`View in Internet Explorer
`View in Netscape Navigator
`Viewwith InternetConfig
`
`This feature was available in a Claris Emailer email as well, and starting
`with Claris Emailer version 2.0v3, a user needed to only right-click (and
`not select text) to obtain a list of actions for a URL.
`
`When a user selects text and right-clicks in Simple Text, IAD can detect
`email addresses and provide options:
`
`1
`£.
`m i n e r ^ a p a l e c o m
`
`untitled
`
`\ Jmlller^applejom •
`apple.com
`
`J
`
`Add p-mad address to Emailer addres% bo
`Send mail with America Online
`Send mail with Claris En
`liler
`Send mad with Cyberdoij
`Send mail with Fudora
`Send mail with Internet i
`Send mail with Internet 1
`Sfiui mail with NeUcape
`
`This feature was available in a Claris Emailer email as well, and starting
`with Claris Emailer version 2.0v3, a user needed to only right-click (and
`not select text) to obtain a list of actions for an email address.
`
`When a user selects text and right-clicks in Simple Text, IAD can detect
`occurrences of a city name followed by a state name or US Postal
`abbreviation and occurrences of the name of a state, territory, or
`
`43
`
`

`

`Case 1:13-cv-00919-LPS Document 307-7 Filed 03/10/21 Page 15 of 28 PageID #: 26838
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`protectorate of the United States and provide options. The user could
`then obtain a map of the selected US city, for which the system would
`search the Yahoo map website for a map of the city, or the user could
`obtain a zip code for the selected US city, for which the system would
`search the US Postal Service website for a list of zip codes for the city.
`See US Geographic Detectors 1.0 Read Me file. For example:
`
`lout Sl/e Slvlp Sound Help
`
`^ IMc Filit
`n
`[LgVSjo^o Palo AUo, CA and see whots there
`
`jymt
`
`llllllll.Ml
`
`Help
`[tatiS
`
`Get Map for US City
`[ uukup /ipt ode for City
`
`j
`
`This feature was available in a Claris Emailer email as well, and starting
`with Claris Emailer version 2.0v3, a user needed to only right-click (and
`not select text) to obtain a list of actions for geographic information.
`
`See also Nardi at 98: "Our first step was to find a user problem that
`needed solving in which intelligent agents would add value.
`In an
`investigation of how people file information on their computer desktops
`[1], we discovered that a common user complaint is that they cannot
`easily take action on the structured information found in everyday
`documents (structured information being data-recognizable by a
`grammar). Ordinary documents are full of such structured information:
`phone numbers, fax numbers, street addresses, email addresses, email
`signatures, abstracts, tables of contents, lists of references, tables,
`figures, captions, meeting announcements, Web addresses, and more.
`In addition, there are countless domain-specific structures .... These
`structures are not only relevant to users, but because of their structure,
`are also recognizable by parsing technologies. Once identified, the
`structure's type can be used to identify appropriate actions that might be
`carried out, like placing a meeting on a calendar, adding an address to an
`address book, dialing a phone number, opening a URL, finding the
`current price of a stock, filing an ISBN number, and compiling a list of
`abstracts.
`
`Apple Data Detectors supports a wide range of uses. Think of all the
`structured information in the documents you work with; in addition to
`those mentioned already, add bibliography items, forms (such as travel
`expensive reports and non-disclosure agreements), executive summaries,
`and most important, such domain-specific kinds of data as legal
`boilerplate, customer orders, and library search requests. Specific
`det

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket