throbber
Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 1 of 141
`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 1 of 141
`
`D-3
`
`D-3
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 2 of 141
`
`The ‘062 Patent
`
`a link selection step that is one of a
`direct link to a server and an indirect
`link to said server through at least one
`of the remainder of said plurality of
`clients,
`
`Network 3000, Communications Users Guide (Feb. 5, 1993) (Network 3000)
`
`To the extent not inherent, it would have been obvious to use data buffers in the manner
`claimed in such a system. See Section V.C supra.
`
`“Buffering failures occur when a node does not have sufficient space to accept a data
`message.” Network 3000 at § 2.6.
`
`“The UP-ACK message is used by the master to inform the slave that it successfully received
`and buffered the message.” Network 3000 at § 3.1.
`
`“Therefore, alarms from the local master and/or one or more slaves may be placed in a single
`communication buffer for transmission to the next level of the network hierarchy.”
`Network 3000 at § 4.1.
`
`“In addition to receiving the TS/NRT message from the Master node, a Slave node will
`request a TS/NRT message following an initial download, or after a power-fail recovery”
`Network 3000 at § 4.5.
`
`“Each slave then uses the procedure described below to construct its NRT which it then
`passes to each of its slaves. Both the NRT global address field and UP/DOWN mask starts off
`as zero (i.e. the network master's global address and UP/DOWN mask are by definition zero).
`As the NRT is distributed each node determines its global address and UP/DOWN mask and
`fills in the appropriate field in the NRT. Therefore the global .address of a node is the
`concatenation of the local addresses of all previous local masters that the NRT has travelled to
`from the network master to that node.” Network 3000 at § 4.5.1.
`
`“Global data messages are those which must pass through at least one master before reaching
`their destination.” Network 3000 at § 3.2.
`
`“Local messages are those which do not have to pass through any nodes to reach their
`destination.” Network 3000 at § 3.2.
`
`
`
`
`-1005-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 3 of 141
`
`The ‘062 Patent
`
`wherein said server process further
`comprising the step of maintaining a
`client link tree having client link
`entries.
`
`
`15. A method as recited in claim 14,
`wherein said server process further
`comprises the steps of:
`
`comparing a selected link from said
`client to said server to a currect client
`link entry in said client link tree; and
`
`updating said client link tree when
`said comparison meets predetermined
`conditions.
`
`
`
`Network 3000, Communications Users Guide (Feb. 5, 1993) (Network 3000)
`
`“Peer to Peer is a mechanism for data transfer between nodes on the Network-3000. Peer to
`Peer uses the Master and Slave modules which should not be confused with the BSAP
`Master/Slave communication scheme. Peer to Peer allows any node to be a Peer to Peer
`Master and/or Slave. The determining factor is the presence or absence of the Peer to Peer
`Master and Slave ACCOL module(s}. A Master module is executed periodically at the
`request of the ACCOL task in which it is present.” Network 3000 at § 4.2.
`
`“The Time Synchronization/Node Routing Table (TS/NRT) combined message enables each
`node in a Network 3000 configuration to know what the topology of the network is, the node's
`unique global address and the current date and time. The TS/NRT emanates from the Network
`Master Device and "trickles" down from level to level until each node on the network has
`received it. There is NO application level acknowledgement to the TS/NRT message.”
`Network 3000 at § 4.5.
`
`“The NRT is created at the Network Master Device using the NETTOP utility program. The
`NRT may be modified at any time when a network configuration change has occurred. Once
`the NRT has been altered the new NRT is distributed to all nodes in the running system.”
`Network 3000 at § 4.5.
`
`
`
`
`It would have been obvious to compares links in a client link tree to links made available
`during operation and update the client link tree accordingly. See Section V.F supra.
`
`
`It would have been obvious to compares links in a client link tree to links made available
`during operation and update the client link tree accordingly. See Section V.F supra.
`
`
`-1006-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 4 of 141
`
`The ‘062 Patent
`
`
`
`16. A method as recited in claim 15,
`wherein said server process further
`comprises steps of:
`
`determining if said client is authentic;
`
`determining if said client is already in
`said client link tree if client is
`determined to be authentic;
`
`deleting said client from said client
`link tree if said client is already in
`said client link tree; and
`
`inserting said client into said client
`link tree if said client is authentic.
`
`
`
`
`
`
`
`
`Network 3000, Communications Users Guide (Feb. 5, 1993) (Network 3000)
`
`
`
`
`
`It would have been obvious to implement authentication of clients and maintence of a client
`link tree. See Section V.G supra.
`It would have been obvious to implement authentication of clients and maintence of a client
`link tree. See Section V.G supra.
`
`
`It would have been obvious to implement authentication of clients and maintence of a client
`link tree. See Section V.G supra.
`
`It would have been obvious to implement authentication of clients and maintence of a client
`link tree. See Section V.G supra.
`
`
`
`-1007-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 5 of 141
`
`The ‘062 Patent
`
`2. A wireless network system
`comprising:
`
`a server including a server controller
`and a server radio modem,
`
`said server controller implementing a
`server process that includes the
`control of said server radio modem,
`said server process including the
`receipt and transmission of data
`packets via said server radio modem;
`and
`a plurality of clients each including a
`client controller and a client radio
`modem, said client controller
`implementing a client process that
`includes the control of said client
`radio modem, said client process
`including the receipt and transmission
`of data packets via said client radio
`modem,
`wherein said client process of each of
`said clients initiates and selects a
`
`
`
`Exhibit AQ- Admitted Prior Art/Estoppel
`
`Admitted Prior Art/Estoppel
`
`Claim 1 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 1 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 1 of the ’062
`patent of December 8, 2010.
`
`Claim 1 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 1 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 1 of the ’062
`patent of December 8, 2010.
`
`
`Claim 1 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 1 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 1 of the ’062
`patent of December 8, 2010.
`
`
`Claim 1 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 1 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 1 of the ’062
`patent of December 8, 2010.
`
`
`Claim 1 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 1 based on prior art on November 10, 2010.
`
`-1008-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 6 of 141
`
`The ‘062 Patent
`
`radio transmission path to said server
`that is one of a direct link to said
`server and an indirect link to said
`server through at least one the
`remainder of said plurality of clients,
`wherein said server process further
`includes logic that maintains a client
`link tree having client link entries.
`
`3. A wireless network system as
`recited in claim 2, wherein said server
`process further comprises:
`
`
`
`logic that compares a selected link
`from said client to said server to a
`current client link entry in said client
`link tree; and
`
`logic that updates said client link tree
`when said comparison meets
`predetermined conditions.
`
`4. A wireless network system as
`recited in claim 3, wherein said server
`process further comprises:
`
`logic that determines if said client is
`authentic;
`
`
`
`
`Admitted Prior Art/Estoppel
`
`Brownrigg admitted that the prior art include this element by cancelling claim 1 of the ’062
`patent of December 8, 2010.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The ‘062 patent admits that “[t]he addition and removal of nodes from trees are well known to
`those skilled in the art. For example, in the book, incorporated herein by reference, SNOBOL
`4: Techniques and Applications, by Ralph E. Griswald, Department of Computer Science,
`
`-1009-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 7 of 141
`
`The ‘062 Patent
`
`logic that determines if said client is
`already in said client link tree if client
`is determined to be authentic;
`
`
`logic that deletes said client from said
`client link tree if said client is already
`in said client link tree; and
`
`
`Admitted Prior Art/Estoppel
`
`University of Arizona, Prentiss-Hall, Inc., .COPYRGT. 1975, ISBN 0-13-853010-6,
`algorithms for placing and removing clients from trees are discussed.” ‘062 patent at 14:65-
`15:4.
`
`The ‘062 patent admits that “[a]uthentication techniques are well known to those skilled
`in the art. For example, the book, incorporated herein by reference, Algorithms in SNOBOL
`4, by James F. Gimpel, Bell Telephone Laboratories, John Wiley & Sons, a Wiley
`Interscience Publication, © 1976 by Bell Telephone Labs, Inc., ISBN 0-471-30213-9,
`describes authentication techniques using one-way seeds.” ‘062 patent at 15:18-25.
`
`The ‘062 patent admits that “[t]he addition and removal of nodes from trees are well known to
`those skilled in the art. For example, in the book, incorporated herein by reference, SNOBOL
`4: Techniques and Applications, by Ralph E. Griswald, Department of Computer Science,
`University of Arizona, Prentiss-Hall, Inc., .COPYRGT. 1975, ISBN 0-13-853010-6,
`algorithms for placing and removing clients from trees are discussed.” ‘062 patent at 14:65-
`15:4.
`
`The ‘062 patent admits that “[a]uthentication techniques are well known to those skilled
`in the art. For example, the book, incorporated herein by reference, Algorithms in SNOBOL
`4, by James F. Gimpel, Bell Telephone Laboratories, John Wiley & Sons, a Wiley
`Interscience Publication, © 1976 by Bell Telephone Labs, Inc., ISBN 0-471-30213-9,
`describes authentication techniques using one-way seeds.” ‘062 patent at 15:18-25.
`
`The ‘062 patent admits that “[t]he addition and removal of nodes from trees are well known to
`those skilled in the art. For example, in the book, incorporated herein by reference, SNOBOL
`4: Techniques and Applications, by Ralph E. Griswald, Department of Computer Science,
`University of Arizona, Prentiss-Hall, Inc., .COPYRGT. 1975, ISBN 0-13-853010-6,
`algorithms for placing and removing clients from trees are discussed.” ‘062 patent at 14:65-
`15:4.
`
`The ‘062 patent admits that “[a]uthentication techniques are well known to those skilled
`
`
`
`-1010-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 8 of 141
`
`The ‘062 Patent
`
`logic that inserts said client in said
`client link tree if said client is
`authentic.
`
`
`6. A wireless network system
`comprising:
`
`
`
`
`server means providing a server
`process including receiving data
`packets via a server wireless
`communication means, sending data
`packets via said wireless
`communication means,
`
`
`
`Admitted Prior Art/Estoppel
`
`in the art. For example, the book, incorporated herein by reference, Algorithms in SNOBOL
`4, by James F. Gimpel, Bell Telephone Laboratories, John Wiley & Sons, a Wiley
`Interscience Publication, © 1976 by Bell Telephone Labs, Inc., ISBN 0-471-30213-9,
`describes authentication techniques using one-way seeds.” ‘062 patent at 15:18-25.
`
`The ‘062 patent admits that “[t]he addition and removal of nodes from trees are well known to
`those skilled in the art. For example, in the book, incorporated herein by reference, SNOBOL
`4: Techniques and Applications, by Ralph E. Griswald, Department of Computer Science,
`University of Arizona, Prentiss-Hall, Inc., .COPYRGT. 1975, ISBN 0-13-853010-6,
`algorithms for placing and removing clients from trees are discussed.” ‘062 patent at 14:65-
`15:4.
`
`The ‘062 patent admits that “[a]uthentication techniques are well known to those skilled
`in the art. For example, the book, incorporated herein by reference, Algorithms in SNOBOL
`4, by James F. Gimpel, Bell Telephone Laboratories, John Wiley & Sons, a Wiley
`Interscience Publication, © 1976 by Bell Telephone Labs, Inc., ISBN 0-471-30213-9,
`describes authentication techniques using one-way seeds.” ‘062 patent at 15:18-25.
`
`
`Claim 5 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claims 1 and 5 based on prior art on November 10,
`2010. Brownrigg admitted that the prior art include this element by cancelling claim 5 of the
`’062 patent of December 8, 2010.
`
`
`Claim 5 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 5 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 5 of the ’062
`patent of December 8, 2010.
`
`
`
`-1011-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 9 of 141
`
`Admitted Prior Art/Estoppel
`
`
`Claim 5 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 5 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 5 of the ’062
`patent of December 8, 2010.
`
`
`Claim 5 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 5 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 5 of the ’062
`patent of December 8, 2010.
`
`
`
`
`
`
`
`
`
`The ‘062 Patent
`
`communicating with a network, and
`performing housekeeping functions;
`and
`
` a
`
` plurality of client means, each client
`means providing a client process
`including sending and receiving data
`packet via a client wireless
`communication means, maintaining a
`send/receive data buffer in digital
`memory, and
`selecting a link to said server means
`that is one of a direct link to said
`server and an indirect link to said
`server through at least one of the
`remainder of said plurality of client
`means,
`
`wherein said server process further
`comprises a means for maintaining a
`client link tree having client link
`entries.
`
`7. A wireless network system as
`recited in claim 6, wherein said server
`process further comprises:
`
`a means for comparing a selected link
`from said client to said server to a
`current client link entry in said client
`link tree; and
`
`
`
`-1012-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 10 of 141
`
`Admitted Prior Art/Estoppel
`
`
`
`
`
`
`
`The ‘062 patent admits that “[t]he addition and removal of nodes from trees are well known to
`those skilled in the art. For example, in the book, incorporated herein by reference, SNOBOL
`4: Techniques and Applications, by Ralph E. Griswald, Department of Computer Science,
`University of Arizona, Prentiss-Hall, Inc., .COPYRGT. 1975, ISBN 0-13-853010-6,
`algorithms for placing and removing clients from trees are discussed.” ‘062 patent at 14:65-
`15:4.
`
`The ‘062 patent admits that “[a]uthentication techniques are well known to those skilled
`in the art. For example, the book, incorporated herein by reference, Algorithms in SNOBOL
`4, by James F. Gimpel, Bell Telephone Laboratories, John Wiley & Sons, a Wiley
`Interscience Publication, © 1976 by Bell Telephone Labs, Inc., ISBN 0-471-30213-9,
`describes authentication techniques using one-way seeds.” ‘062 patent at 15:18-25.
`
`The ‘062 patent admits that “[t]he addition and removal of nodes from trees are well known to
`those skilled in the art. For example, in the book, incorporated herein by reference, SNOBOL
`4: Techniques and Applications, by Ralph E. Griswald, Department of Computer Science,
`University of Arizona, Prentiss-Hall, Inc., .COPYRGT. 1975, ISBN 0-13-853010-6,
`algorithms for placing and removing clients from trees are discussed.” ‘062 patent at 14:65-
`
`The ‘062 Patent
`
` a
`
` means for updating said client link
`tree when said comparison meets
`predetermined conditions.
`
`8. A wireless network system as
`recited in claim 7, wherein said server
`process further includes:
`
`
`
`
`
`a means for determining if said client
`is authentic;
`
`
`a means for determining if said client
`is already in said client link tree if
`client is determined to be authentic;
`
`
`
`
`-1013-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 11 of 141
`
`The ‘062 Patent
`
`a means for deleting said client from
`said client link tree if said client is
`already in said client link tree; and
`
`
`a means for inserting said client in
`said client link tree if said client is
`authentic.
`
`Admitted Prior Art/Estoppel
`
`15:4.
`
`The ‘062 patent admits that “[a]uthentication techniques are well known to those skilled
`in the art. For example, the book, incorporated herein by reference, Algorithms in SNOBOL
`4, by James F. Gimpel, Bell Telephone Laboratories, John Wiley & Sons, a Wiley
`Interscience Publication, © 1976 by Bell Telephone Labs, Inc., ISBN 0-471-30213-9,
`describes authentication techniques using one-way seeds.” ‘062 patent at 15:18-25.
`
`The ‘062 patent admits that “[t]he addition and removal of nodes from trees are well known to
`those skilled in the art. For example, in the book, incorporated herein by reference, SNOBOL
`4: Techniques and Applications, by Ralph E. Griswald, Department of Computer Science,
`University of Arizona, Prentiss-Hall, Inc., .COPYRGT. 1975, ISBN 0-13-853010-6,
`algorithms for placing and removing clients from trees are discussed.” ‘062 patent at 14:65-
`15:4.
`
`The ‘062 patent admits that “[a]uthentication techniques are well known to those skilled
`in the art. For example, the book, incorporated herein by reference, Algorithms in SNOBOL
`4, by James F. Gimpel, Bell Telephone Laboratories, John Wiley & Sons, a Wiley
`Interscience Publication, © 1976 by Bell Telephone Labs, Inc., ISBN 0-471-30213-9,
`describes authentication techniques using one-way seeds.” ‘062 patent at 15:18-25.
`
`The ‘062 patent admits that “[t]he addition and removal of nodes from trees are well known to
`those skilled in the art. For example, in the book, incorporated herein by reference, SNOBOL
`4: Techniques and Applications, by Ralph E. Griswald, Department of Computer Science,
`University of Arizona, Prentiss-Hall, Inc., .COPYRGT. 1975, ISBN 0-13-853010-6,
`algorithms for placing and removing clients from trees are discussed.” ‘062 patent at 14:65-
`15:4.
`
`The ‘062 patent admits that “[a]uthentication techniques are well known to those skilled
`in the art. For example, the book, incorporated herein by reference, Algorithms in SNOBOL
`4, by James F. Gimpel, Bell Telephone Laboratories, John Wiley & Sons, a Wiley
`
`
`
`-1014-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 12 of 141
`
`The ‘062 Patent
`
`
`10. A method for providing wireless
`network communication comprising:
`
`
`providing a server implementing a
`server process including receiving
`data packets via r.f. transmission,
`sending data packets via r.f.
`transmission, communicating with a
`network, and performing
`housekeeping functions; and
`
`providing a plurality of clients, each
`client providing a client process
`including sending and receiving data
`packet via r.f transmission,
`maintaining a send/receive data
`buffer in digital memory, and
`
`selecting a transmission path to said
`server via that is one of a direct link
`to said server and an indirect link to
`said server through at least one of the
`remainder of said plurality of clients,
`wherein said server process further
`includes maintaining a client link tree
`
`
`
`Admitted Prior Art/Estoppel
`
`Interscience Publication, © 1976 by Bell Telephone Labs, Inc., ISBN 0-471-30213-9,
`describes authentication techniques using one-way seeds.” ‘062 patent at 15:18-25.
`
`
`Claim 9 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 9 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 9 of the ’062
`patent of December 8, 2010.
`
`Claim 9 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 9 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 9 of the ’062
`patent of December 8, 2010.
`
`
`Claim 9 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 9 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 9 of the ’062
`patent of December 8, 2010.
`
`
`Claim 9 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 9 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 9 of the ’062
`patent of December 8, 2010.
`
`
`
`-1015-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 13 of 141
`
`The ‘062 Patent
`
`having client link entries.
`
`11. A method as recited in claim 10,
`wherein said server process further
`includes
`comparing a selected link from said
`client to said server to a current client
`link entry in said client link tree; and
`
`updating said client link tree when
`said comparison meets predetermined
`conditions.
`
`
`12. A method as recited in claim 11,
`wherein said server process further
`includes:
`
`determining is said client is authentic;
`
`
`Admitted Prior Art/Estoppel
`
`
`
`
`
`
`
`
`
`
`
`
`The ‘062 patent admits that “[t]he addition and removal of nodes from trees are well known to
`those skilled in the art. For example, in the book, incorporated herein by reference, SNOBOL
`4: Techniques and Applications, by Ralph E. Griswald, Department of Computer Science,
`University of Arizona, Prentiss-Hall, Inc., .COPYRGT. 1975, ISBN 0-13-853010-6,
`algorithms for placing and removing clients from trees are discussed.” ‘062 patent at 14:65-
`15:4.
`
`The ‘062 patent admits that “[a]uthentication techniques are well known to those skilled
`in the art. For example, the book, incorporated herein by reference, Algorithms in SNOBOL
`4, by James F. Gimpel, Bell Telephone Laboratories, John Wiley & Sons, a Wiley
`Interscience Publication, © 1976 by Bell Telephone Labs, Inc., ISBN 0-471-30213-9,
`describes authentication techniques using one-way seeds.” ‘062 patent at 15:18-25.
`
`
`
`
`-1016-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 14 of 141
`
`The ‘062 Patent
`
`determining if said client is already in
`said client link tree if client is
`determined to be authentic;
`
`
`deleting said client from said client
`link tree if said client is already in
`said client link tree; and
`
`
`inserting said client in said client link
`tree if said client is authentic.
`
`Admitted Prior Art/Estoppel
`
`The ‘062 patent admits that “[t]he addition and removal of nodes from trees are well known to
`those skilled in the art. For example, in the book, incorporated herein by reference, SNOBOL
`4: Techniques and Applications, by Ralph E. Griswald, Department of Computer Science,
`University of Arizona, Prentiss-Hall, Inc., .COPYRGT. 1975, ISBN 0-13-853010-6,
`algorithms for placing and removing clients from trees are discussed.” ‘062 patent at 14:65-
`15:4.
`
`The ‘062 patent admits that “[a]uthentication techniques are well known to those skilled
`in the art. For example, the book, incorporated herein by reference, Algorithms in SNOBOL
`4, by James F. Gimpel, Bell Telephone Laboratories, John Wiley & Sons, a Wiley
`Interscience Publication, © 1976 by Bell Telephone Labs, Inc., ISBN 0-471-30213-9,
`describes authentication techniques using one-way seeds.” ‘062 patent at 15:18-25.
`
`The ‘062 patent admits that “[t]he addition and removal of nodes from trees are well known to
`those skilled in the art. For example, in the book, incorporated herein by reference, SNOBOL
`4: Techniques and Applications, by Ralph E. Griswald, Department of Computer Science,
`University of Arizona, Prentiss-Hall, Inc., .COPYRGT. 1975, ISBN 0-13-853010-6,
`algorithms for placing and removing clients from trees are discussed.” ‘062 patent at 14:65-
`15:4.
`
`The ‘062 patent admits that “[a]uthentication techniques are well known to those skilled
`in the art. For example, the book, incorporated herein by reference, Algorithms in SNOBOL
`4, by James F. Gimpel, Bell Telephone Laboratories, John Wiley & Sons, a Wiley
`Interscience Publication, © 1976 by Bell Telephone Labs, Inc., ISBN 0-471-30213-9,
`describes authentication techniques using one-way seeds.” ‘062 patent at 15:18-25.
`
`The ‘062 patent admits that “[t]he addition and removal of nodes from trees are well known to
`those skilled in the art. For example, in the book, incorporated herein by reference, SNOBOL
`4: Techniques and Applications, by Ralph E. Griswald, Department of Computer Science,
`University of Arizona, Prentiss-Hall, Inc., .COPYRGT. 1975, ISBN 0-13-853010-6,
`algorithms for placing and removing clients from trees are discussed.” ‘062 patent at 14:65-
`
`
`
`-1017-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 15 of 141
`
`The ‘062 Patent
`
`
`14. A method for providing wireless
`network communication comprising
`the steps of:
`
`
`
`
`a server process including a data
`packet reception step, a data packet
`transmission step, a network
`communication step, and a
`housekeeping step; and
`
`
`a plurality of clients each providing a
`client process including a data
`sending and receiving step, a send
`and receive data buffer maintenance
`step, and
`
`
`
`Admitted Prior Art/Estoppel
`
`15:4.
`
`The ‘062 patent admits that “[a]uthentication techniques are well known to those skilled
`in the art. For example, the book, incorporated herein by reference, Algorithms in SNOBOL
`4, by James F. Gimpel, Bell Telephone Laboratories, John Wiley & Sons, a Wiley
`Interscience Publication, © 1976 by Bell Telephone Labs, Inc., ISBN 0-471-30213-9,
`describes authentication techniques using one-way seeds.” ‘062 patent at 15:18-25.
`
`
`Claim 13 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 13 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 13 of the ’062
`patent of December 8, 2010.
`
`
`Claim 13 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 13 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 13 of the ’062
`patent of December 8, 2010.
`
`Claim 13 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 13 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 13 of the ’062
`patent of December 8, 2010.
`
`Claim 13 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 13 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 13 of the ’062
`patent of December 8, 2010.
`
`
`-1018-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 16 of 141
`
`Admitted Prior Art/Estoppel
`
`
`Claim 13 of the ‘062 patent included this element. The Board of Patent Appeals and
`Interferences affirmed the rejection of claim 13 based on prior art on November 10, 2010.
`Brownrigg admitted that the prior art include this element by cancelling claim 13 of the ’062
`patent of December 8, 2010.
`
`
`
`
`
`
`
`
`
`
`
`
`
`The ‘062 patent admits that “[t]he addition and removal of nodes from trees are well known to
`those skilled in the art. For example, in the book, incorporated herein by reference, SNOBOL
`4: Techniques and Applications, by Ralph E. Griswald, Department of Computer Science,
`
`The ‘062 Patent
`
` a
`
` link selection step that is one of a
`direct link to a server and an indirect
`link to said server through at least one
`of the remainder of said plurality of
`clients,
`wherein said server process further
`comprising the step of maintaining a
`client link tree having client link
`entries.
`
`15. A method as recited in claim 14,
`wherein said server process further
`comprises the steps of:
`
`comparing a selected link from said
`client to said server to a currect client
`link entry in said client link tree; and
`
`updating said client link tree when
`said comparison meets predetermined
`conditions.
`
`
`16. A method as recited in claim 15,
`wherein said server process further
`comprises steps of:
`
`determining if said client is authentic;
`
`
`
`
`-1019-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 17 of 141
`
`The ‘062 Patent
`
`determining if said client is already in
`said client link tree if client is
`determined to be authentic;
`
`
`deleting said client from said client
`link tree if said client is already in
`said client link tree; and
`
`
`Admitted Prior Art/Estoppel
`
`University of Arizona, Prentiss-Hall, Inc., .COPYRGT. 1975, ISBN 0-13-853010-6,
`algorithms for placing and removing clients from trees are discussed.” ‘062 patent at 14:65-
`15:4.
`
`The ‘062 patent admits that “[a]uthentication techniques are well known to those skilled
`in the art. For example, the book, incorporated herein by reference, Algorithms in SNOBOL
`4, by James F. Gimpel, Bell Telephone Laboratories, John Wiley & Sons, a Wiley
`Interscience Publication, © 1976 by Bell Telephone Labs, Inc., ISBN 0-471-30213-9,
`describes authentication techniques using one-way seeds.” ‘062 patent at 15:18-25.
`
`The ‘062 patent admits that “[t]he addition and removal of nodes from trees are well known to
`those skilled in the art. For example, in the book, incorporated herein by reference, SNOBOL
`4: Techniques and Applications, by Ralph E. Griswald, Department of Computer Science,
`University of Arizona, Prentiss-Hall, Inc., .COPYRGT. 1975, ISBN 0-13-853010-6,
`algorithms for placing and removing clients from trees are discussed.” ‘062 patent at 14:65-
`15:4.
`
`The ‘062 patent admits that “[a]uthentication techniques are well known to those skilled
`in the art. For example, the book, incorporated herein by reference, Algorithms in SNOBOL
`4, by James F. Gimpel, Bell Telephone Laboratories, John Wiley & Sons, a Wiley
`Interscience Publication, © 1976 by Bell Telephone Labs, Inc., ISBN 0-471-30213-9,
`describes authentication techniques using one-way seeds.” ‘062 patent at 15:18-25.
`
`The ‘062 patent admits that “[t]he addition and removal of nodes from trees are well known to
`those skilled in the art. For example, in the book, incorporated herein by reference, SNOBOL
`4: Techniques and Applications, by Ralph E. Griswald, Department of Computer Science,
`University of Arizona, Prentiss-Hall, Inc., .COPYRGT. 1975, ISBN 0-13-853010-6,
`algorithms for placing and removing clients from trees are discussed.” ‘062 patent at 14:65-
`15:4.
`
`The ‘062 patent admits that “[a]uthentication techniques are well known to those skilled
`
`
`
`-1020-
`
`

`

`Case 1:16-cv-02690-AT Document 121-8 Filed 08/05/16 Page 18 of 141
`
`The ‘062 Patent
`
`inserting said client into said client
`link tree if said client is authentic.
`
`
`
`
`
`
`Admitted Prior Art/Estoppel
`
`in the a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket