throbber

`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`ORACLE CORPORATION
`Petitioner
`v.
`CLOUDING IP, LLC
`Patent Owner
`____________
`Case IPR2013-00073 (JL)
`Patent 6,738,799
`____________
`
`PATENT OWNER RESPONSE TO
`PETITION FOR INTER PARTES REVIEW OF
`U.S. PATENT NO. 6,738,799
`UNDER 35 USC § 316 AND 37 CFR § 42.120
`
`
`
`
`
`
`
`

`

`Table of Contents
`
`1. Introduction. ............................................................................................... 1
`
`2. Overview of U.S. Patent 6,738,799 .............................................................. 2
`
`3. Argument. .................................................................................................... 4
`
`
`A. Claims 1, 23 and 24 Are Not Anticipated by Williams Because Williams
`Fails to Teach Writing In An Update A Command To Copy, As Required
`By These Claims. .......................................................................................... 4
`
`B. Claims 5-10 Are Patentable In View of Williams When Considered In
`Combination with Miller. ........................................................................... 10
`
`C. Claim 37 Is Not Anticipated by Williams. ........................................... 11
`
`D. Claim 37 Is Not Anticipated by Balcha. .............................................. 13
`
`E. Claims 1, 5, 9, 10, 23 and 24 Are Patentable Over Balcha When
`Considered In Combination with Miller. ................................................... 17
`
`F. The Petition Fails to Establish a Reasonable Likelihood that at Least One
`Challenged Claim is Unpatentable Over Balcha When Considered in
`Combination with Miller and Freivald. ...................................................... 27
`
`
`
`
`
`
`
`
`
`
`
`
`5. Conclusion ................................................................................................. 29
`
`
`
`
`
`  
`
`ii  
`
`

`

`Table of Authorities
`
`  
`  
`  
`  
`  
`  
`  
`  
`
`CASES
`Bayer Schering Pharm. AG v. Barr Labs., Inc.,
`575 F.3d 1341 (Fed. Cir. 2009) (Newman, J., dissenting) ............................. 24
`
`Ex parte Levy,
`17 USPQ2d 1461(Bd. Pat. App. & Inter. 1990) .............................................. 8
`
`In re Fine,
`837 F.2d 1071 (Fed. Cir. 1988) ..................................................................... 11
`
`KSR Int’l Co. v. Teleflex Inc.,
`550 U.S. 398 (2007) ................................................................................ 22, 23
`
`Lindemann Maschinenfabrik GMBH v. Am. Hoist & Derrick Co.,
`730 F.2d 1452 (Fed. Cir. 1984) ....................................................................... 5
`
`Net MoneyIN, Inc. v. VeriSign, Inc.,
`545 F.3d 1359 (Fed. Cir. 2008) ........................................................... 5, 10, 16
`
`Richardson v. Suzuki Motor Co.,
`868 F.2d 1226 (Fed. Cir. 1989) ................................................................. 5, 16
`
`Verdegaal Bros. v. Union Oil Co. of California,
`814 F.2d 628 (Fed. Cir. 1987) ................................................................... 5, 12
`
`W.L. Gore & Associates, Inc. v. Garlock, Inc.,
`721 F.2d 1540 (Fed. Cir. 1983), cert. denied, 469 U.S. 851 (1984) ............... 26
`
`
`
`REGULATIONS
`37 C.F.R. § 42.107(c) ...................................................................................... 1
`
`
`OTHER AUTHORITIES
`MPEP § 2112 .................................................................................................. 8
`
`
`  
`
`iii  
`
`

`

`MPEP § 2142 ................................................................................................ 25
`MPEP § 2142 ................................................................................................ 25
`
`
`
`
`
`
`
`  
`
`iv  
`
`iv
`
`

`

`  
`
`2001
`
`2002
`
`2003
`
`2004
`
`
`
`
`
`
`
`
`
`
`
`
`  
`
`Exhibit List
`
`U.S. Patent 6,012,087 to Freivald et al.
`
`U.S. Patent 6,101,507 to Cane et al.
`
`Transcript of Deposition of Andrew Grimshaw, Ph.D.,
`May 29, 2013.
`
`Declaration of Wesley W. Chu, Ph.D.
`
`
`
`
`v  
`
`

`

`  
`
`Pursuant to 37 C.F.R. § 42.120 and the Board’s Scheduling Order of
`
`April 24, 2013, Patent Owner, Clouding IP, LLC, submits the following
`
`response to the Petition. Submitted concurrently herewith is Patent Owner’s
`
`Continent Motion to Amend Claims 1, 23 and 37 under 37 C.F.R. § 42.121.
`
`1. Introduction.
`
`
`
`Trial was instituted with respect to Claims 1, 5-10, 23, 24 and 37 of
`
`U.S. Patent 6,738,799 (the “’799 Patent”) (Oracle Ex. 1001). At the outset, it
`
`is noted that all the Board has determined to date is that there is a “reasonable
`
`likelihood” that Petitioner will prevail as to some grounds for which Petitioner
`
`sought review, and it should be remembered that this determination was made
`
`in the absence of any rebuttal testimony provided by the Patent Owner.1 The
`
`Board has not determined any claims of the ‘799 Patent to be unpatentable and
`
`Patent Owner’s expert testimony submitted in support of this response will
`
`show that while there may have been a reasonable likelihood to think so in the
`
`absence of same, that testimony now removes even that reasonable likelihood.
`
`                                                                                                                
`
`1 Patent Owners are prohibited from introducing rebuttal testimony prior to
`
`institution of inter partes review proceedings. 37 C.F.R. § 42.107(c).
`
`  
`
`1  
`
`

`

`  
`
`As demonstrated below, the Board should enter judgment in favor of the
`
`Patent Owner because
`
`a. Claims 1, 23, 24 and 37 are not anticipated under 35 U.S.C. §
`
`102(e) by Williams, U.S. Patent 5,990,810 (Oracle Ex. 1006);
`
`b. Claims 5-10 are not obvious under 35 U.S.C. § 103(a) in view of
`
`Williams and Miller, U.S. Patent 5,832,520 (Oracle Ex. 1004);
`
`c. Claim 37 is not anticipated under 35 U.S.C. § 102(e) by Balcha,
`
`U.S. Patent 6,233,589 (Oracle Ex. 1003);
`
`d. Claims 1, 5, 9, 10, 23 and 24 are not obvious under 35 U.S.C. §
`
`103(a) in view of Balch and Miller; and
`
`e. Claims 6-8 are not obvious under 35 U.S.C. § 103(a) in view of
`
`Balcha, Miller and Freivald, U.S. Patent 5,898,836 (Oracle Ex.
`
`1005).
`
`2. Overview of U.S. Patent 6,738,799
`
`
`
`The ’799 Patent describes systems and methods for generating update
`
`files that permit a computer to generate a current version of a file from an
`
`earlier version thereof. Ex. 1001 at Abstract; 3:45-49. To facilitate this process,
`
`files are segmented and each segment is represented by a signature. Id. at 8:7 et
`
`seq. Differences between a current version of a file and an earlier version thereof
`
`  
`
`2  
`
`

`

`  
`
`are determined using these signatures. See, e.g., id.
`
`at 10:5-14. Based on these differences, an update
`
`file is constructed. Id. at col. 10:66 – 11:50. The
`
`update file includes instructions (e.g., copy, insert)
`
`for a recipient computer to construct the current
`
`version of the subject file from its earlier version
`
`thereof and data included in the update file. Id. and see Fig. 11 (reproduced
`
`here).   Once created, the update file is provided to the recipient computer, for
`
`example via email. Id. at 11:51-52.
`
`
`
`Importantly, for purposes of the present proceedings, one of the
`
`instructions included in the update file is a “command . . . to copy an old
`
`segment of the [receiving] computer’s copy of the earlier version of the file into
`
`the [receiving] computer’s copy of the current version of the file”. Id. at Claim
`
`1, 14:53-57; Claim 23, 16:61-65. Examples of such commands are illustrated
`
`in Fig. 11, supra. The Board has construed the “command to copy” as “an
`
`instruction that causes the computer to duplicate information or data.” Oracle
`
`Corp. v. Clouding IP, LLC, IPR2013-00073, Paper 8, Decision re Institution of
`
`Inter Partes Review, slip op. at 11 (Apr. 24, 2013) (hereinafter “Decision”).
`
`  
`
`3  
`
`

`

`  
`
`Therefore, steps (b) in Claims 1 and 23 are properly understood as reciting the
`
`requirement of
`
`writing in the update, an instruction that causes the second
`computer to duplicate information or data from an old
`segment of the second computer’s copy of the earlier
`version of the file into the second computer’s copy of the
`current version of the file, wherein the old segment
`corresponds to the segment for which a match was detected
`in step (a).
`
`
`
`3. Argument.
`A. Claims 1, 23 and 24 Are Not Anticipated by Williams Because
`Williams Fails to Teach Writing In An Update A Command To
`Copy, As Required By These Claims.
`
`Williams describes a procedure for partitioning blocks of data into
`
`subblocks for ease of communicating and storing same. Ex 1006 at 1:7-10.
`
`Williams does not, however, teach writing in an update a command to copy, as
`
`recited in independent Claims 1 and 23 and construed by the Board. Ex. 2004
`
`at ¶ 45. Consequently, Williams cannot anticipate these claims.
`
`To anticipate a claim, “The identical invention must be shown in as
`
`complete detail as is contained in the … claim.” Richardson v. Suzuki Motor
`
`  
`
`4  
`
`

`

`  
`
`Co., 868 F.2d 1226, 1236 (Fed. Cir. 1989). Stated differently, “A claim is
`
`anticipated only if each and every element as set forth in the claim is found,
`
`either expressly or inherently described, in a single prior art reference.”
`
`Verdegaal Bros. v. Union Oil Co. of California, 814 F.2d 628, 631 (Fed. Cir.
`
`1987). Furthermore, “The requirement that the prior art elements themselves
`
`be ‘arranged as in the claim’ means that claims cannot be treated . . . as mere
`
`catalogs of separate parts, in disregard of the part-to-part relationships set forth
`
`in the claims and that give the claims their meaning.” Lindemann
`
`Maschinenfabrik GMBH v. Am. Hoist & Derrick Co., 730 F.2d 1452, 1459
`
`(Fed. Cir. 1984). “[U]nless a reference discloses within the four corners of the
`
`document not only all of the limitations claimed but also all of the limitations
`
`arranged or combined in the same way as recited in the claim, it cannot be said
`
`to prove prior invention of the thing claimed and, thus, cannot anticipate
`
`under 35 U.S.C. § 102.” Net MoneyIN, Inc. v. VeriSign, Inc., 545 F.3d 1359,
`
`1371 (Fed. Cir. 2008).
`
`In its Decision instituting the present proceedings, the Board held that
`
`Patent Owner’s argument was that Williams did not teach an instruction that
`
`included the literal word “copy”. See, e.g., Decision, slip op at 11. This is not
`
`so. Patent Owner’s argument is not concerned with the literal language of any
`
`  
`
`5  
`
`

`

`  
`
`instruction in Williams’ difference file, but rather the operations that result
`
`from the application of that file as taught by Williams. Rather than include in
`
`an update (or, as described by Williams, a difference file, D) instructions that
`
`cause a second computer to duplicate information or data from an old segment
`
`of the second computer’s copy of an earlier version of the file into the second
`
`computer’s copy of the current version of the file, as required by Claims 1 and
`
`23, in keeping with the Board’s construction, Williams only discusses the use of
`
`a difference file that includes references to subblocks in the second computer’s
`
`copy of the earlier version of the file. In fact, in describing the backup process,
`
`Williams states only that,
`
`E1 then transmits the file as a mixture of raw subblocks and
`references to subblocks whose hashes appear in S and which
`are therefore known to appear as subblocks in Y.
`
`Ex 1006 at 19:52-55.
`
`Petitioner argues that these “references” may be interpreted as
`
`“commands to copy” but this argument is pure supposition not support by the
`
`teachings of Williams. As explained by Dr. Chu, not only does Williams not
`
`teach such commands, there is no reason why such an instruction would be
`
`implied by the encoding of Williams’ D file either. Ex. 2004 at ¶ 46. Because
`
`Williams is concerned with an incremental backup system in which Y is
`
`  
`
`6  
`
`

`

`  
`
`updated to become a copy of X, Ex. 1006 at 19:31-33, any encoding in the D
`
`file would not be to “copy” segments from an old version of Y to a new version
`
`of Y, but rather to modify the old version of Y so it becomes a replica of X. Ex.
`
`2004 at ¶ 46. This would be consistent with the stated goal of Williams and
`
`would not entail copying of segments of Y as envisioned in the ‘799 Patent. As
`
`no copying is needed, there is no need for an instruction to effect same to be
`
`written in the D file.2 Id.
`
`Anticipation requires that a cited reference describe each and every
`
`recitation of a claim either explicitly or inherently. Neither Professor
`
`Grimshaw’s testimony3 nor the Petition itself establishes any explicit teachings
`
`                                                                                                                
`
`2 Indeed, it is equally plausible that mere pointers, such as those taught by
`
`Balcha, could be used to identify existing subblocks in the Y file. Doing so
`
`would avoid the need for copy commands entirely and be entirely consistent
`
`with the goal of others of Petitioners’ cited references: to reduce the size of a
`
`difference file that needs to be communicated between computers.
`
`3 In fact, during his deposition Dr. Grimshaw agreed that there is no explicit
`
`command to copy that is written into Williams’ backup file D. Ex. 2003 at
`
`15:16-20 (“So the question you asked was is there a copy instruction in
`
`  
`
`7  
`
`

`

`  
`
`in Williams to support the notion that a command to copy be written in the
`
`update. Nor can Petitioner rely on inherency. To establish inherency, one must
`
`provide “rationale or evidence tending to show inherency”. As indicated in
`
`MPEP § 2112:
`
`The fact that a certain result or characteristic may occur or
`be present in the prior art is not sufficient to establish the
`inherency of that result or characteristic. In re Rijckaert, 9
`F.3d 1531, 1534, 28 USPQ2d 1955, 1957 (Fed. Cir.
`1993) … ‘To establish inherency, the extrinsic evidence
`‘must make clear that the missing descriptive matter is
`necessarily present in the thing described in the
`reference, and that it would be so recognized by persons of
`ordinary skill. Inherency, however, may not be
`established by probabilities or possibilities. The
`mere fact that a certain thing may result from a given set of
`circumstances is not sufficient.’ In re Robertson, 169 F.3d
`743, 745, 49 USPQ2d 1949, 1950-51 (Fed. Cir. 1999)
`(emphasis added).
`Here, neither the Petition nor Professor Grimshaw’s testimony have
`
`demonstrated any basis in fact and/or technical reasoning to reasonably support
`
`                                                                                                                                                                                                                                                                                                                                          
`
`Williams. Per se it’s not written out in English copy, but because of the nature
`
`of the encoding in file D, when that shows up, it means to copy that block.”).
`
`  
`
`8  
`
`

`

`  
`
`a determination that the allegedly inherent characteristic necessarily flows from
`
`the teachings of Williams. Cf. Ex parte Levy, 17 USPQ2d 1461, 1464 (Bd. Pat.
`
`App. & Inter. 1990). Further, Dr. Chu has explained that there is no need for a
`
`“command to copy” or any other instruction to that effect to be written in the
`
`Williams’ D file. Ex. 2004 at ¶ 46. Accordingly, Petitioner cannot satisfy its
`
`burden to establish that Williams inherently teaches writing in an update a
`
`command to copy.
`
`Lest Petitioner attempt to demonstrate that Williams does describe some
`
`copying operations, it is important to recognize that these discussions are quite
`
`distinct from the requirements of the present claims. In particular, Williams
`
`makes reference to “copying” in the context of reproducing raw subblocks that
`
`are transmitted along with the update, and not copying of subblocks already
`
`included in the second computer’s version of file Y. Ex. 1006 at 20:2-5 (“[E2]
`
`then processes the incremental backup information, copying subblocks that
`
`were transmitted raw and looking up the references either in Y or in the part of
`
`X already reconstructed.”). Claims 1 and 23 require that the “command to
`
`copy” by an instruction written in the update and that it instruct the second
`
`computer to copy “an old segment of the second computer’s copy of the earlier
`
`  
`
`9  
`
`

`

`  
`
`version of the file”, not copy the raw data provided in an update into a file. See,
`
`e.g., Ex. 1001 at claim 1, 14:53-57.
`
`Thus, Williams cannot be relied upon for teaching writing in an update a
`
`command to copy and Petitioner’s allegations to the contrary lack and literal or
`
`inherent support. Because no such features are taught, Williams cannot be said
`
`to “clearly and unequivocally” disclose the claimed invention;4 hence, Claims 1,
`
`23 and 24 of the ‘799 Patent are not anticipated by Williams.
`
`
`
`B. Claims 5-10 Are Patentable In View of Williams When
`Considered In Combination with Miller.
`Above it was demonstrated that Williams fails to teach writing in an
`
`update a command to copy, as recited in Claim 1. The Petition cites Miller for
`
`teaching the transmission of an update as an executable email attachment,
`
`Petition at p. 55, and for the update being a software or document update,
`
`Petition at p. 58, but relies on the teachings of Williams for all other elements
`
`                                                                                                                
`
`4 Cf. NetMoneyIN, supra, 545 F.3d at 1371 (to anticipate a claim, a reference
`must “clearly and unequivocally disclose the claimed [invention] or direct those
`skilled in the art to the [invention] without any need for picking, choosing, and
`combining various disclosures not directly related to each other by the teachings
`of the cited reference.” (quoting In re Arkley, 455 F.2d 586, 587 (CCPA
`1972))).
`
`  
`
`10  
`
`

`

`  
`
`of the claims. Petition at pp. 56-59. Stated differently, Petitioner is not relying
`
`on Miller to cure any underlying deficiencies of Williams with respect to Claim
`
`1.
`
`Accordingly, even if one of ordinary skill in the art were to combine the
`
`teachings of Williams and Miller in the fashion contemplated by Petitioner, one
`
`still would not arrive at the present invention because the combination still
`
`would not include writing in an update a command to copy, as recited in
`
`Claim 1. Claims 5-10 depend, directly or indirectly, from Claim 1 and
`
`therefore are patentable over the combination of Williams and Miller proposed
`
`by Petitioner for at least these same reasons. In re Fine, 837 F.2d 1071 (Fed.
`
`Cir. 1988) (If an independent claim is nonobvious under 35 U.S.C. § 103,
`
`then any claim depending therefrom is nonobvious.).
`
`
`
`C. Claim 37 Is Not Anticipated by Williams.
`Claim 37 recites “determining whether the second computer has a latest
`
`version of a file . . . [and] generating an update[] if the second computer does
`
`not have a latest version of the file”. Ex 1001 at 18:32-37. Williams fails to
`
`teach such a process, therefore, Williams cannot anticipate Claim 37.
`
`  
`
`11  
`
`

`

`  
`
`Williams describes an incremental backup procedure in which a
`
`computer E1 backs up a file to computer E2 so that the version of a file Y
`
`stored on E2 is changed to match the version of file X stored on E1. Ex. 1006
`
`at 19:29-33. As explained by Professor Chu, prior to initiating a backup
`
`procedure, computer E1 cannot be certain whether or not computer E2 stores a
`
`latest version of the subject file. Ex. 2004 at ¶ 49. Nor does Williams mandate
`
`such a situation. Indeed, as part of the backup file itself, computer E1 includes
`
`an MD5 digest of the old and new versions of the file. Id.; Ex. 1006 at 20:53-
`
`54. This is to ensure, in part, that the backup is applied to the same version of
`
`the file for which the comparisons of hashes was made. Ex. 2004 at ¶ 49; Ex.
`
`1006. at 20:58-61. Thus, Williams is both anticipating and accommodating
`
`situations in which computer E2 may store a different, but not necessarily a
`
`latest, version of a file than computer E1. Ex. 2004 at ¶ 49. Further, according
`
`to Petitioner’s declarant, Dr. Grimshaw, Williams generates the update when
`
`the backup system determines that a backup should be made. Ex. 2003 at 32:7-
`
`18.
`
`“A claim is anticipated only if each and every element as set forth in the
`
`claim is found, either expressly or inherently described, in a single prior art
`
`reference.” Verdegaal Bros., supra, 814 F.2d at 631. In the present case, Williams
`
`  
`
`12  
`
`

`

`  
`
`does not teach determining whether the second computer has a latest version of
`
`a file and generating an update if the second computer does not have a latest
`
`version of the file. Instead, Williams generates the update when the backup
`
`system determines that a backup should be made. Such actions can be
`
`accommodated because Williams’ D file includes information sufficient for
`
`computer E2 to ensure the differences are applied to the correct prior version of
`
`the file. Ex. 2004 at ¶ 49. Accordingly, Williams does not anticipate Claim 37.
`
`
`
`D. Claim 37 Is Not Anticipated by Balcha.
`Claim 37 recites “determining whether the second computer has a latest
`
`version of a file . . . [and] generating an update[] if the second computer does
`
`not have a latest version of the file”. Ex 1001 at 18:32-37. Balcha fails to teach
`
`such a process, therefore, Balcha cannot anticipate Claim 37.
`
`Balcha discloses sharing changes between two base files wherein a change
`
`to a first version of the base file indicates that a second version of the same base
`
`file is now not the same as the first version of the base file. Ex. 1003 at 4:52-67.
`
`  
`
`13  
`
`

`

`  
`
`As explained by Balcha with reference to Figure 1, provided above:
`
`
`
`Each of servers 22 and 24 maintain a copy of a base
`file 21, 27, respectively and are interconnected via a
`network 26. Base files 21, 27 should be
`identical to one another and thus changes
`made to one copy should eventually be
`reflected in the other copy. A base signature
`file, as described in more detail herein, is generated
`on one of the servers 22, 24 and copied to the other
`server. The base signature file is maintained on server
`22 as file 20, and maintained on server 24 as file 28.
`Either base file 21 or 27 can be modified at either
`server.
`
`Upon detection of a modification to the file, the
`detecting server, for example server 22, uses the
`respective base signature file, for example, base
`signature file 20, to generate a new delta file, and
`communicates the delta file over network 26 to
`server 24. Server 24 then uses the delta file to update
`
`14  
`
`  
`
`

`

`  
`
`the base file 27, and recalculates the base signature
`file 28.
`
`Id. at 4:52-67, emphasis added.
`
`Thus, when a modification of base file 21 is detected by server 22, server
`
`22 generates a new delta file and communicates that delta file to server 24,
`
`which then proceeds to modify base file 27 using the delta file. However, the
`
`detection of the modification of base file 21 is in no way related to a
`
`determination that base file 21 is the latest version of the base file. Instead,
`
`Balcha only discloses detecting whether a base file has been modified, regardless
`
`of when that modification may have occurred relative to other copies of the
`
`same base file. Ex. 2004 at ¶ 37.
`
`Dr. Chu explains the significance of this difference by noting that there
`
`may be situations in which base file 27 has been modified more recently than
`
`base file 21 and, as a consequence, base file 27 is the latest version of the file. If
`
`a modification of base file 21 is detected, Balcha will perform the updating of
`
`base file 27 to be consistent with base file 21 even though base file 27 is the
`
`latest version of the file. In such a circumstance, the “updating” of Balcha will
`
`serve to inappropriately overwrite the modifications made to base file 27 and
`
`adversely modify the latest version of the base file (i.e., base file 27) to an older
`
`  
`
`15  
`
`

`

`  
`
`version of the base file (i.e., base file 21). Such a circumstance is all the more
`
`likely in Balcha because “[b]ase files 21, 27 should be identical to one another
`
`and thus changes made to one copy should eventually be reflected in the
`
`other copy.” Id. at ¶ 38 citing Ex. 1003 at 4:54-56 (emphasis added). Dr. Chu
`
`estimates that the probability of an inappropriate file update occurring when
`
`using Balcha’s file synchronization approach as the system scales Id. at ¶ 39.
`
`The method of claim 37 avoids problems such as those described by Dr. Chu
`
`by determining whether the second computer has a latest version of a file and,
`
`in this way, establishes that the latest version of the file will not be overwritten
`
`by changes to a file that occurred previously to the changes of the latest version
`
`of the base file. Id. at ¶ 40.
`
`To anticipate a claim, “The identical invention must be shown in as
`
`complete detail as is contained in the … claim.” Richardson, supra, 868 F.2d at
`
`1236. Here, Balcha fails to meet this requirement. Stated differently, Balcha
`
`fails to disclose “within the four corners of the document not only all of the
`
`limitations claimed but also all of the limitations arranged or combined in the
`
`same way as recited in the claim, [hence] it cannot be said to prove prior
`
`invention of the thing claimed and, thus, cannot anticipate under 35 U.S.C. §
`
`102.” Net MoneyIN, Inc., supra, 545 F.3d at 1371.
`
`  
`
`16  
`
`

`

`  
`
`
`
`E. Claims 1, 5, 9, 10, 23 and 24 Are Patentable Over Balcha
`When Considered In Combination with Miller.
`Balcha relates generally to the backup and synchronization of files, and in
`
`particular relates to a method and system for reflecting differences between two
`
`files (a base file and a revised file) using respective signature files. Ex. 1003 at
`
`1:5-7. The differences between the two files are reflected in a delta file. Id. at
`
`7:46 – 8:6. Balcha provides an example of a base file, a base signature file, a
`
`revised file, a revised signature file and a resulting delta file at col. 13, ll. 50 et
`
`seq. (reproduced below).
`
`
`
`According to Balcha, the delta file incudes certain “primitives,” which
`
`can be used to generate a copy of the revised file from the delta file. As
`
`explained by Dr. Grimshaw in his deposition, primitives are generally
`
`understood as the simplest elements available in a programming language. Ex.
`
`  
`
`17  
`
`

`

`  
`
`2003 at 38:14 – 39:15. Specifically, Balcha uses primitives for “insert”,
`
`“modify” and “delete”. Ex. 1004 at 3:55-56. The operation of these primitives
`
`is explained, with reference to the above example, at col. 14, ll. 5-19:5
`
`
`
`As shown in this example, the delta file requires that the base file
`
`(ABCDE.FGHIJ.KLMNO.PQRST.UVWXY.Z) be first modified by inserting,
`
`at a position 5 characters from the initial pointer position, a 3-character string,
`
`“XYZ”. Next, beginning at the then-current pointer position, a 5-character
`
`string is deleted. Thereafter, and beginning at a location 5 characters from the
`
`then-current pointer position, a 6-character string, “PAABST” is inserted.
`
`Finally, the pointer position is advanced 5 characters and a 5-charater string is
`
`deleted. In this way, a new version of the old file is created wherein new data is
`
`                                                                                                                
`5 In this exposition, the “⌃” character indicates the position of a pointer in the
`  
`18  
`
`base file at which the corresponding primitive is applied. Id. at 13:65 – 14:1.
`
`

`

`  
`
`added to the old version of the file via the “insert” primitive, undesired data is
`
`deleted from the old version of the file via the “delete” primitive, and data
`
`within the old version of the file is modified via the “modify” primitive. Ex.
`
`2004 at ¶ 24, citing Ex. 1003 at 14:5-19.
`
`Thus, in the Balcha process, data within the old version of the file that is
`
`not modified or deleted remains in the new version of the file with no need to
`
`copy that information from the old version of the file to the new version of the
`
`file. Id. at ¶ 25. Consequently, Balcha has no need for and does not write a
`
`copy “primitive” (or any other instruction) into the delta file to effect the
`
`copying of data from the old version of the file into the new version of the file.
`
`Id. Predictably then, Balcha neither teaches nor suggests writing such a
`
`command or other instruction for duplication into the delta file. Id.
`
`Dr. Grimshaw reads the above-described example from Balcha as calling
`
`for “commands embedded in the delta file [to] cause the unchanged bits to be
`
`effectively copied into the revised file.”6 This is wrong. Ex. 2004 at ¶ 26.
`
`Balcha does not “effectively copy” over any bits from an old version of a file to a
`
`revised version of the file. Id. Instead, the old file is converted to the revised file
`
`                                                                                                                
`  
`
`6 Ex. 1007 at ¶ 25 (emphasis added).
`
`
`19  
`
`

`

`  
`
`directly through execution of the insert and delete instructions included in the
`
`delta file. Id. No copying (or effective copying) or other duplication of this kind
`
`is performed or required because the revised version of the file is itself directly
`
`produced from the old version of the file and the difference file and anything
`
`not deleted from, or modified within, the old version of the file remains in the
`
`revised version of the file. Id. citing Ex. 1003 at 13:64 – 65 and Ex. 2003 at
`
`43:17-22.
`
`To the extent Petitioner may argue that “transitory copies” of files or
`
`portions thereof may be ephemerally created in one or more memories of a
`
`computer system during the operations described by Balcha, Dr. Chu explains
`
`that such “copies” do not meet the requirements of Claims 1 and 23. These
`
`claims require that in the event of a match between “an old segment signature”
`
`and “a new segment signature”, an instruction that causes the second computer
`
`to duplicate the second computer’s copy of the old segment of the file into the
`
`second computer’s copy of the current version of the file be written into the
`
`update. The creation of any “transitory copies” of files or portions thereof (e.g.,
`
`copies of files that may be temporarily resident in volatile memory), on a
`
`computer are not equivalent to or a result of writing a “command to copy” (or
`
`other instruction that causes the computer to duplicate information or data)
`
`  
`
`20  
`
`

`

`  
`
`that is written in the Balcha delta file. It is merely the mechanism by which a
`
`computer processor is required to operate on data. Ex. 2004 at ¶ 27.
`
`Thus, Balcha does not describe writing a command to copy or its
`
`equivalent into an update file nor is the writing of such a command to the
`
`update file inherent in Balcha.
`
`Miller relates to a system for creating, updating or revising large
`
`computer files. Ex. 1004 at 7:12-15. More
`
`specifically, Miller describes a procedure for
`
`revising large computer files using “difference
`
`files” or DIFF files – i.e., files containing
`
`indications of the differences between the
`
`large computer files and a preexisting
`
`computer file. Id. at 1:10-15. An overview of
`
`that process is illustrated in Miller’s Figure 1,
`
`shown here.
`
`Miller’s DIFF file includes primitives
`
`for “copy”, “insert” and “insert/copy” operations, whic

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket