throbber
U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`
`
`
`
`
`
`Case No. CBM2014-00168
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________________
`
`Salesforce.com, Inc.,
`Petitioner
`
`v.
`
`Applications In Internet Time LLC,
`Patent Owner
`____________________
`
`US Patent No. 7,356,482
`Issue Date: April 8, 2008
`Title: Integrated Change Management Unit
`____________________
`
`Covered Business Method Patent Review No. 2014-00168
`
`_________________________________________________________________
`
`PATENT OWNER’S PRELIMINARY RESPONSE TO THE PETITION
`
`
`

`

`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`
`
`
`
`
`Case No. CBM2014-00168
`
`Table of Contents
`Introduction .......................................................................................................... 1
`I.
`II. The petition should be denied because the ‘482 patent is not a covered
`business method patent. ................................................................................... 2
`A.
`The ‘482 patent is not directed to a “financial product or
`service.” ................................................................................................. 2
` The ‘482 patent is directed to a technical invention. ........................... 6
`B.
`III. The claims of the ‘482 patent are definite. ....................................................... 9
`IV. The petition fails to show that any claim is likely invalid in view of
`prior art because two references are not citable and the other
`references lack claim limitations. .................................................................. 17
`A.
`The grounds that rely upon Gordon and Haverstock must be
`rejected because each is a section 102(e) reference. ........................... 21
`1.
`Section 102(e) references do not qualify as prior art in
`covered business method review proceedings. ......................... 21
`2. Gordon and Haverstock are, at best, pre-AIA § 102(e)
`references and therefore do not qualify as prior art in a
`covered business method review proceeding. ........................... 22
`The petition admits that Peters does not invalidate any of the
`claims. .................................................................................................. 23
`The petition admits that Bederson I and Bederson II do not
`invalidate any of the claims. ................................................................ 25
`The petition does not show that Peters in combination with
`Bederson I and/or Bederson II likely invalidate any of the
`claims. .................................................................................................. 29
`V. Claim construction is irrelevant as the petition fails on procedural and
`substantive grounds. ...................................................................................... 30
`VI. Conclusion ...................................................................................................... 31
`
`B.
`
`C.
`
`D.
`
`
`
`i 
`
`  
`

`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`
`
`
`
`
`Case No. CBM2014-00168
`
`Exhibit List
`
`Exhibit 2001 Microsoft Developer Network, Deployment Patterns (available at
`http://msdn.microsoft.com/en-us/library/ff646997.aspx)
`Exhibit 2002 Techopedia definition of a “Program Layer” (available at
`http://www.techopedia.com/definition/24812/program-layer)
`Exhibit 2003 Techopedia definition of a “Layer” (available at
`http://www.techopedia.com/definition/2016/layer-object-oriented-
`design)
`
`
`

`
`ii 
`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`
`I.
`
`Introduction
`
`
`
`
`
`Case No. CBM2014-00168
`
`Patent owner respectfully requests that the Board deny the petition for lack
`
`of standing, and, in the alternative for failure to show that any claim is likely
`
`invalid.
`
`The petition for covered business method review of U.S. Patent No.
`
`7,356,482 (“the ‘482 patent”) fails because the ‘482 patent is not directed to a
`
`financial product or service, and the claims are directed to a technical invention.
`
`Because on either basis the ‘482 patent is not a covered business method patent,
`
`there is no standing.
`
`Regardless of standing, the petition fails to meet procedural requirements
`
`and fails to show that any of the claims is likely unpatentable. The petitioner
`
`challenges all of the claims for indefiniteness, anticipation and obviousness.
`
`Regarding indefiniteness, the petition alleges that the meaning of “layer” does not
`
`make sense in the claims. Yet petitioner relies upon an inapt definition. Using a
`
`sensible definition, the claims are definite. Regarding the petition’s numerous prior
`
`art challenges, two of petitioner’s references are not citable because they are prior
`
`art, at best, under pre-AIA § 102(e). The petition admits that the other references,
`
`alone and in combination, fail to disclose all limitations of the claims. As such, the
`
`petition must be denied for failure to show that at least one claim is likely invalid.
`

`
`1
`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`
`
`
`
`
`Case No. CBM2014-00168
`
`II.
`
`The petition should be denied because the ‘482 patent is not a
`covered business method patent.
`A. The ‘482 patent is not directed to a “financial product or
`service.”
`
`The ‘482 patent has over 18,000 words. Two of those 18,000+ words are
`
`“financial” and one is “finance.” Petitioner premises standing on those three words.
`
`Those three words, though, when viewed in context are not even about financial
`
`products or services, and they do not demonstrate that the subject matter of the
`
`‘482 patent is a financial product or service.
`
`The ‘482 patent is directed to a software tool for creating application
`
`software. The application software being created is business software, and the
`
`inventive software tool is itself business software. The ‘482 patent explains that the
`
`inventive software tool is especially useful for businesses that are regulated,
`
`because changes in regulations impact how their applications software must
`
`operate. While some of these regulated businesses might be in finance industries,
`
`the inventive software tools is not a financial product or service, even though it
`
`might be useful for a finance business in creating finance-related application
`
`software. Nothing in the petition contradicts this.
`
`Review of the three uses of the word “financial/finance” in context
`
`demonstrates that the ‘482 patent is directed to business software. As Senator
`
`Leahy explained, even “business software” does not fall within the coverage of the
`2
`

`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`covered business methods if the software is “common in business environments
`
`
`
`
`
`Case No. CBM2014-00168
`
`across sectors” and has “no particular relat[ionship] to the financial services
`
`sector.” 157 Cong. Rec. S 5402, 5441 (comments of Senator Leahy on the AIA).
`
`Within the ‘482 patent’s lengthy “Background of the Invention” section, two
`
`paragraphs spaced far apart use the term “financial”:
`
`Control of industrial and commercial activities by means of
`federal, state and
`local
`laws, statutes, ordinances and
`regulations ("regulations" herein) is endemic in the United
`States. Examples of activities that are regulated by such
`regulations include: environmental health and safety ("EH&S";
`Titles 7, 10, 29, 30, 40, 42 and 49 of the Code of Federal
`Regulations and related state and local codes); administrative
`procedures applicable to government personnel (Title 5);
`agricultural activities (Titles 7 and 9); creation, use, treatment
`and disposal of nuclear materials (Title 10); conversion and
`distribution of usable forms of energy, power and water (Titles
`10 and 18); banking, financial and securities activities and
`foreign trade Titles 12, 15, 16, 19 and 22); space and
`aeronautical activities (Title 14); commercial trade practices
`(Title 16); food, drugs, cosmetics, medical treatments and
`devices ("FDCMTD"; Title 21); transportation of persons and
`cargo (Titles 23 and 49); housing and urban development (Title
`24); firearms production and
`trade (Title 27); workers
`compensation (Title 29); mining and related activities (Title
`30); national defense activities (Titles 15 and 32); navigation
`and navigable waters (Title 33); education (Title 34); activities
`in and on parks, forests, public lands and other public property
`(Titles 36 and 43); intellectual property activities (Title 37);
`veterans' pensions and relief (Title 38); postal service activities
`(Title 39); public contracts and public property management
`(Titles 41 and 48); public health (Title 42); emergency
`management and assistance (Title (44); grant of public welfare
`and assistance (Title 45); telecommunications (Title 47); and
`

`
`3
`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`
`
`
`
`
`Case No. CBM2014-00168
`
`wildlife and fisheries activities (Title 50). Some of the most
`pervasive regulations concern EH&S and FDCMTD activities.
`(‘482 patent, col. 1, lines 13-44).
`…
`A hazardous waste generator must demonstrate that it has the
`financial ability to cover liability claims involving sudden or
`non-sudden discharges from the facility. An owner or operator
`must monitor and inspect all on-site tanks that treat or
`accumulate hazardous waste. A spill or other discharge must be
`reported to the National Response Center ("N.R.C.") within 24
`hours after the incident occurs, and a detailed report on such
`incident must be submitted to the E.P.A. within 30 days after
`the incident. RCRA is enforced concurrently with applicable
`state statutes. (‘482 patent, col. 5, lines 61- col. 6, line 3.)
`
`
`
`One must look carefully to find the word “financial” in either of these
`
`paragraphs. It is not prominent, and the minor placement demonstrates that the
`
`‘482 patent is not about financial products or services. Instead, these two
`
`paragraphs simply show the numerous regulated industries to which the invention
`
`could provide benefit. In the first of these two paragraphs, regulated financial
`
`activities are simply part of a long list of regulated businesses and organizations
`
`that use business software and could benefit from the invention. The second of
`
`these two paragraphs discusses hazardous waste generators, which are another
`
`example of regulated businesses that use business software and could benefit from
`
`the invention. Neither of these references suggests that the invention is directed to
`
`a financial product or service.
`

`
`4
`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`
`
`The third use of the word “financial” is to explain that the business content
`
`
`
`
`
`Case No. CBM2014-00168
`
`layer of the disclosed system may include specific details regarding the structure of
`
`an organization:
`
`The business content layer includes business knowledge,
`logical designs, physical designs, physical
`structures,
`relationships, and data associated with a selected area of
`business activity. A business area can be a functional field
`within an organization, such as finance or human resources, or a
`particular type of business, such as printing or a (specialty) food
`business, for which business-related data must be accumulated
`and managed. The business content layer is defined by and
`referenced in the metadata layer so that the necessary objects,
`tables, columns, relationships, functions, procedures and data
`can be read and updated by the Java data management layer.
`The business content layer may be characterized as a business
`content database. (‘482 patent, col. 12, lines 16-28.)
`Here again, while the term “finance” is used, it is not used to describe a
`
`financial product or service.
`
`In sum, none of these three minor uses of the term “financial” relates to the
`
`disclosure of an invention directed to financial products or services. Furthermore,
`
`the ‘482 patent nowhere else discloses a financial product or service. Rather, the
`
`‘482 patent is directed to the kind of business software which as Senator Leahy
`
`explained, is not specific to the financial services sector and is not “covered.”
`
`Petitioner also argues that the ‘482 patent is directed to a “financial product
`
`or service” because it was examined by Art Unit 705. As the petitioner admits,
`
`though, Art Unit 705 handles patent applications directed to business software.
`5
`

`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`Though Art Unit 705 might have issued some covered business method patents,
`
`
`
`
`
`Case No. CBM2014-00168
`
`petitioner’s suggestion that all patents from Art Unit 705 are covered is simply
`
`wrong. No presumption should be drawn from this fact.
`
`Therefore, the ‘482 patent is not a covered business method patent because
`
`the specification and the claims are not directed to a financial product or service,
`
`nor is it directed to the administration of a financial product or service.
`
`B. The ‘482 patent is directed to a technical invention.
`
`The ‘482 patent is directed to technical inventions and solves technical
`
`problems using technical inventions. The inventions of the ‘482 patent are directed
`
`to a software tool which provides a “relatively seamless system for creating robust
`
`solutions without the use of programmers and/or programming.” (‘482 patent, col.
`
`9, lines 26-32.) To achieve this, “The invention includes an integrated framework
`
`of technical functions for tracking and managing regulatory compliance, non-
`
`regulatory requirements and other change-intensive business activities.” (‘482
`
`patent, col. 9, lines 64-67.) Software tools inherently provide technical solutions to
`
`technical problems.
`
`Here, the inventive software tools allows for automatic and dynamically
`
`generated functions and interfaces designed to change as regulations in the industry
`
`change. Thus, “The most important aspect of the server-based, programming-free
`

`
`6
`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`model is the system’s ability to create, change and (re)configure the application
`
`
`
`
`
`Case No. CBM2014-00168
`
`system at one location and to promptly make the modified application system
`
`available elsewhere within the enterprise as well.” (‘482 patent, col. 10, lines 42-
`
`46.) Therefore, the ‘482 patent is not a covered business method patent because it
`
`is directed to a technological invention.
`
`Petitioner points to claim 1 as lacking a technological feature, but admits
`
`that all of the elements of claim 1 are technical. Four of these elements are clearly
`
`not general purpose computer components: “first layer,” “second layer,” “third
`
`layer,” “change management layer.” The petition fails to cite any prior art as
`
`showing any of these elements. 1 See Decision Denying Institution of Covered
`
`Business Method Patent Review in Experian Marketing Solutions, Inc. v. Rpost
`
`Communications Ltd., Case CBM2014-00010, Paper 20 at 9 (PTAB April 22,
`
`2014) (“Petitioner’s conclusory language in the petition that none of the steps of a
`
`                                                            
`1 If, despite 37 C.F.R. § 42.6(a)(3), the PTAB were to undertake an archeological
`exploration into the fifty page declaration cited in the petition for support, no
`support would be found. The declarant has no apparent expertise in business
`software, and is not shown to even satisfy the minimum requirements of one of
`ordinary skill in the art as proposed by the petition. The declarant has no apparent
`“work experience or research related to database management, data entry, and
`software for data processing and analysis functions,” which is petitioner’s
`definition of one of ordinary skill in the art. Thus, the opinion of the expert is not
`relevant. Perhaps as a reflection of this lack of expertise, on the technological
`invention issue, the declarant simply presents the same unsupported conclusion as
`the petition.
`

`
`7
`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`claim requires any novel and unobvious technological implementation, or solves a
`
`
`
`
`
`Case No. CBM2014-00168
`
`technical problem, without more, is not sufficient to demonstrate that the claimed
`
`subject matter is not a technical invention.”) For example, one of these elements is
`
`“a change management layer for automatically detecting changes that affect an
`
`application.” Certainly, automatic detection of changes that affect an application is
`
`inherently technical and it is new. The petition does not and cannot show
`
`otherwise. On this basis alone the petition is defective and should be denied for
`
`lack of standing.
`
`Furthermore, the processing of data in a particular manner at specified layers
`
`of a layered model also is technical. See Decision Denying Institution of Covered
`
`Business Method Patent Review in GSI Commerce Solutions, Inc., v. Lakshmi
`
`Arunachalam, Case CBM2014-00101, pp. 11-12. Thus, even where the claims
`
`have application to financial transactions and recite known elements, the petitioner
`
`must show that the claims do not recite solving a technical problem using a
`
`technical solution. Id. at 12-13. Because the ‘482 patent is not directed to a
`
`financial product or service, and the claims recite technical inventions, the ‘482
`
`patent is not a covered business patent.
`

`
`8
`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`III. The claims of the ‘482 patent are definite.
`
`
`
`
`
`Case No. CBM2014-00168
`
`Though the petition asserts that claims 1-59 are invalid 35 U.S.C. § 112,
`
`paragraph 2, due to indefiniteness, the petition only argues this with respect to the
`
`terms “layer” and “change management layer.” However, these terms are definite
`
`to a person skilled in the art2 when viewed in light of the specification and extrinsic
`
`evidence.
`
`Petitioner’s arguments have a fundamental flaw – petitioner uses an inapt
`
`definition for the term “layer.” For certain, this term is used in a lot of varied fields
`
`of endeavor, including physical fields (e.g., a cake layer or a layer of clothing) and
`
`logical fields (e.g., in business software and in computer networking.) The proper
`
`definition for “layer” is the one used in the field of business software, such as
`
`software tools for creating business software.
`
`Instead, petitioner cites definitions from the computer networking field. One
`
`of petitioner’s definitions states, “Each layer is responsible for providing specific
`
`services or
`
`functions
`
`for computers exchanging
`
`information over a
`
`communications network (such as the layers outlined in the ISO/OSI model), and
`
`information is passed from one layer to the next.” (Petition p. 29.) The other of
`
`                                                            
`2 For the purposes of this response, patent owner does not challenge this standard.
`However, patent owner reserves the right to modify its position should the covered
`business method get instituted.
`

`
`9
`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`petitioner’s definitions states, “In network architecture…” 3 Thus, both of
`
`
`
`
`
`Case No. CBM2014-00168
`
`petitioner’s definitions are clearly related to computer networking, and are
`
`therefore not appropriate in the context of business software. Using petitioner’s
`
`fundamentally incorrect definition leads to a similarly incorrect interpretation of
`
`the claims.
`
`Patent owner agrees with petitioner that extrinsic references are useful to
`
`demonstrate the meaning of “layer.” Using definitions which are relevant,
`
`however, one can readily recognize that the ‘482 patent uses “layer” consistently
`
`with the accepted definition. Here are three relevant definitions from extrinsic
`
`sources:
`
` “Although
`
`the concepts of
`
`layer and
`
`tier are often used
`
`interchangeably, the patterns in this chapter make a strong distinction
`
`between the two terms. A layer is a logical structuring mechanism for
`
`the elements that make up your software solution; a tier is a physical
`
`structuring mechanism for the system infrastructure.” (Exh. 2001).
`
` “A program layer is an independent operating component of a
`
`software program. It works with the rest of the information (and other
`
`                                                            
`3 Petitioner relies upon Exhibit 1022 for this quote, but Exhibit 1022 does not have
`any of what petitioner asserts here. It appears that petitioner omitted the relevant
`pages.
`

`
`10
`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`
`
`
`
`
`Case No. CBM2014-00168
`
`program layers) according to a certain sequence of data manipulation
`
`tasks. Each layer typically interacts with the layers above and below
`
`it.” (Exh. 2002).
`
` “A layer, in the context of object-oriented design, is a set of classes
`
`that share the same module dependencies with other modules,
`
`implying that layer components are reusable as long as conditions stay
`
`the same.” ( Exh. 2003).
`
`These three definitions reflect that a “layer” in the field of business software
`
`is “one or more functionally or logically related software components.”
`
`The 105 uses of the term “layer” the specification and claims agrees with
`
`this definition. It is beyond the scope of this response, though, to demonstrate how
`
`each use of the term “layer” is consistent with the definition, but some examples
`
`may be helpful. In this regard the specification states (emphasis added):
`
`Within the metadata layer, the relevant items (data entry
`forms, etc.) in the business content layer are defined, regulatory
`and non-regulatory changes in these items are implemented,
`and access thereto is provided. Within the business content
`layer,
`the relevant
`items are stored (and changed, as
`appropriate) for the specific business operations of concern to
`the end user. A business area or grouping in the business
`content layer is referenced and described by the metadata layer
`to enable management by the data management layer. The
`system’s four layers, plus the Configuration tools and the End
`User tools, are illustrated in FIG. 1. (‘482 patent, col. 9, lines
`52-63).
`

`
`11
`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`
`
`
`
`
`Case No. CBM2014-00168
`
`The metadata model has two main components, a
`business content data dictionary and an application component.
`The data dictionary describes or defines the data elements of the
`application system and the business content layer and how a
`data element is recorded and managed at the database
`management system (DBMS) level. The application component
`primarily
`records procedures
`for manipulating business
`information using data entry forms, worklists, processes,
`documents, reports and business logic. (‘482 patent, col. 12,
`lines 32-42).
`
` A
`
` business area can be a functional field within an
`organization, such as finance or human resources, or a
`particular type of business, such as printing or a (specialty) food
`business, for which business-related data must be accumulated
`and managed. The business content layer is defined by and
`referenced in the metadata layer so that the necessary objects,
`tables, columns, relationships, functions, procedures and data
`can be read and updated by the Java data management layer.
`The business content layer may be characterized as a business
`content database. (‘482 patent col. 12, lines 20-28).
`
`layer
`is
`the Java data management
`No part of
`programmed for specific business content. Each procedure used
`by an end user is, or can be, tailored for specific business
`content and for specific user roles. The end user’s system may
`be (re)configured without programming and may be maintained
`without programming. The user interface is generated by the
`interpretation of the metadata layer delivered to the Java data
`management layer. (‘482 patent col. 15, lines 11-18).
`
`All of these uses of “layer” conform to the definition that a “layer” is “one or
`
`more functionally or
`
`logically related software components.” They also
`
`demonstrate that the invention is directed to business software, not computer
`
`networking.
`

`
`12
`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`
`Likewise, the term “change management layer” would be readily understood
`
`
`
`
`
`Case No. CBM2014-00168
`
`to one of ordinary skill in the art as “one or more software components that
`
`monitors and/or recognizes changes or updates to application metadata in response
`
`to pre-defined rules or manual configuration.” This definition also is supported by
`
`the specification and the prosecution history. The ‘482 patent includes an extensive
`
`description of the change management layer, sometimes also referred to as a
`
`“change layer:”
`
`E. Change Management Layer
`The change layer primarily involves an intranet or the
`Internet and uses one or more intelligent agents (IA's) that
`continually search on the Web for relevant changes in a selected
`business area. The changes may be regulatory and/or non-
`regulatory, and each IA is defined by rules and constraints that
`focus on the selected business area. When an IA discovers a
`relevant change, the IA obtains all available information
`concerning this change and delivers this information to the Java
`data management layer. A user may configure the system to
`apply pre-defined rules to the change in order to determine
`whether the change information delivered by the IA will be
`accepted and acted upon by the Java data management layer.
`Alternatively, the user may decide manually (or manually
`override the pre-defined rules) whether the delivered change
`information will be accepted and acted upon, or ignored.
`Assume that a data entry form is to be created based on
`the Department Table of the invention. FIG. 6 is a flowchart
`showing the steps used to accomplish this. In step 101, the
`Form Builder function is launched from the Tools Menu. In
`step 103, the form is given a name, and the Department Table is
`selected as the base table. In step 105, one or more fields are
`chosen for incorporation in the data entry form, and the form is
`

`
`13
`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`
`
`
`
`
`Case No. CBM2014-00168
`
`uploaded to the network. A maximum of three steps is required
`to create a data entry form using the invention. The data entry
`form and its definition may be assumed to be bug-free, because
`the underlying Form Builder has been thoroughly tested and
`confirmed to generate the correct metadata definition of the
`desired form.(‘482 patent, col. 16, lines 17-60.)
`
`The prosecution provides some further support. During prosecution, the
`
`applicant distinguished one of the cited references by stating, “Nowhere does
`
`Eager disclose or suggest any feature for monitoring applications and detecting
`
`changes affecting the application, and in particular a change management layer for
`
`‘automatically detecting changes that affect an application”. (Exh. 1002, p. 50,
`
`which is the appeal brief filed 8-28-2007 at p. 10). Thus, the definitions for both
`
`“layer” and “change management layer” are consistent with the specification and
`
`prosecution history.
`
`Turning to the claims it can readily be seen that, with an apt definition of
`
`“layer,” the claims make sense. Of course, it is petitioner’s burden to show that the
`
`claims are likely indefinite. Nonetheless, with the apt definition of layer in mind --
`
`“one or more functionally or logically related software components” -- claim 1 and
`
`the other claims make perfect sense:
`
`1. A system for providing a dynamically generated application
`having one or more functions and one or more user interface
`elements; comprising:
`
`
`
`a server computer;
`

`
`14
`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`
`
`
`
`
`Case No. CBM2014-00168
`
`one or more client computers connected to the server
`
`computer over a computer network;
`
`the server computer
`layer associated with
`a first
`
`containing information about the unique aspects of a particular
`application;
`
`a second layer associated with the server computer
`
`containing information about the user interface and functions
`common to a variety of applications, a particular application
`being generated based on the data in both the first and second
`layers;
`
`a third layer associated with the server computer that
`
`retrieves the data in the first and second layers in order to
`generate the functionality and user interface elements of the
`application; and
`
`a change management layer for automatically detecting
`
`changes that affect an application,
`
`each client computer further comprising a browser
`
`application being executed by each client computer, wherein a
`user interface and functionality for the particular application is
`distributed
`to
`the browser application and dynamically
`generated when the client computer connects to the server
`computer.
`
`Here too, the definition of “change management layer” as “one or more
`
`software components that monitors and/or recognizes changes or updates to
`
`application metadata in response to pre-defined rules or manual configuration”
`
`makes sense.
`

`
`15
`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`
`Indeed, one need only compare the preamble of claim 1 to the patent
`
`
`
`
`
`Case No. CBM2014-00168
`
`owner’s proposed definition of “layer” to see that the proposed definition is
`
`correct:
`
`Claim 1 preamble
`A system for providing a dynamically
`generated application having one or
`more functions and one or more user
`interface elements
`
`Definition of “layer”
`a
`layer
`is one or more
`functionally
`or
`logically
`related software components
`
`That is, the system of claim 1 dynamically generates applications. The
`
`application which the claimed system dynamically generates has one or more
`
`functions and one or more user interface elements. Likewise, the system itself (i.e.,
`
`the thing that generates the application) comprises multiple layers, and the layers
`
`are one or more functionally or logically related software components.
`
`The petition argues that how the first, second and third layers are defined in
`
`the claims is contradictory. However, these arguments are premised upon a bad
`
`definition of “layer” and import limitations and qualities of the claimed elements
`
`that simply are not there. Petitioner’s unfounded arguments therefore should be
`
`rejected.
`
`The petition fails to show that claims 1-59 are likely indefinite. The terms
`
`“layer” and “change management layer” have reasonably certain meanings
`
`supported by the specification, the prosecution history and extrinsic evidence.
`

`
`16
`
`

`
`U.S. Patent No. 7,356,482
`Covered Business Method Review
`Patent Owner Preliminary Response

`IV. The petition fails to show that any claim is likely invalid in view of prior art
`because two references are not citable and the other references lack claim
`limitations.
`
`
`
`
`
`Case No. CBM2014-00168
`
`The petition also fails to show that any of the claims are likely invalid. In
`
`this regard, the petition asserts that five references anticipate or render obvious the
`
`claims. Two of petitioner’s references, Gordon and Haverstock, are at best pre-
`
`AIA § 102(e) references. Because claims in a covered business method review
`
`cannot be held invalid based upon pre-AIA § 102(e) references, petitioner’s
`
`reliance upon Gordon or Haverstock fails.4 The petition fails to show that any of
`
`the remaining references, Peters, Bederson I and Bederson II, or their combination,
`
`discloses all of the limitations of any of the claims.
`
`In addition to the substantive failure, the petition in many places is
`
`procedurally defective. In particular, the petition in many places falls short of the
`
`requirements of 37 C.F.R. § 42.304(b)(4). For example, the petition includes a
`
`table which lists nine grounds of challeng

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket