throbber
DOCKET NO: 0100157-00244
`
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
` ISSUED: JUL. 2, 2002
`
`
`PATENT: 6,415,280
`INVENTOR: DAVID A. FARBER
`AND RONALD D. LACHMAN
`FILED: APR. 1, 1999
`TITLE: IDENTIFYING AND
`REQUESTING DATA IN A
`NETWORK USING IDENTIFIERS
`WHICH ARE BASED ON THE
`CONTENT OF THE DATA
`
`Mail Stop PATENT BOARD
`Patent Trial and Appeal Board
`U.S. Patent & Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`
`PETITION FOR INTER PARTES REVIEW OF U.S. PATENT NO. 6,415,280
`UNDER 35 U.S.C. § 312 AND 37 C.F.R. § 42.104
`
`
`
`
`
`

`
`
`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`
`TABLE OF CONTENTS
`
`Page
`
`I. MANDATORY NOTICES ............................................................................. 1 
`A.
`Real Parties-in-Interest .......................................................................... 1 
`B.
`Related Matters ...................................................................................... 1 
`C.
`Counsel .................................................................................................. 2 
`D.
`Service Information ............................................................................... 2 
`E.
`CERTIFICATION OF GROUNDS FOR STANDING ........................ 2 
`II. OVERVIEW OF CHALLENGE AND RELIEF REQUESTED .................... 3 
`A.
`Prior Art Patents and Printed Publications ............................................ 3 
`B.
`There is a Reasonable Likelihood that at least One Claim of the
`‘280 Patent is Unpatentable Under 35 U.S.C. §§ 102, 103 .................. 5 
`Relief Requested .................................................................................... 6 
`C.
`III. Claim Construction .......................................................................................... 6 
`IV. OVERVIEW OF THE ‘280 PATENT ............................................................ 7 
`A.
`Brief Description ................................................................................... 8 
`B.
`The Prosecution History of the ‘280 Patent ........................................ 13 
`THE CHALLENGED CLAIMS ARE UNPATENTABLE .......................... 18 
`A.
`There is Nothing New About Using Content-Based Identifiers
`to Request and Obtain a Data File from a Network ............................ 18 
`B. Grounds of Invalidity for Challenged Claims 36 and 38 Based
`on Browne as a Primary Reference ..................................................... 28 
`C. Grounds of Invalidity for Challenged Claims 36 and 38 based
`on Woodhill as a Primary Reference .................................................. 39 
`D. Grounds of Invalidity for Challenged Claims 36 and 38 based
`on the ESM Manual as a Primary Reference ...................................... 48 
`Grounds of Invalidity for Challenged Claims 36 and 38 based
`on Satyanarayanan as a Primary Reference ........................................ 51 
`VI. CONCLUSION .............................................................................................. 59 
`
`
`
`V.
`
`E.
`
`i
`
`

`
`
`Table of Exhibits for U. S. Patent 6,415,280 Petition for Inter Partes Review ... i 
`
`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`
`
`
`
`
`ii
`
`

`
`
`
`
`CASES
`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`
`TABLE OF AUTHORITIES
`
`Page(s)
`
`PersonalWeb Technologies LLC v. EMC Corporation and VMware, Inc.
`(No. 6:11-cv-00660-LED) ..................................................................................................1
`
`STATUTES
`
`35 U.S.C. §§ 102, 103 ............................................................................................................5, 6
`
`35 U.S.C. § 102(a) ....................................................................................................................28
`
`35 U.S.C. § 102(b) ..............................................................................................................48, 52
`
`35 U.S.C. § 102(e) ....................................................................................................................40
`
`35 U.S.C. § 314(a) ......................................................................................................................5
`
`35 U.S.C. §112, ¶1 ..............................................................................................................14, 16
`
`37 C.F.R. 42.73(d)(ii) .................................................................................................................1
`
`37 C.F.R. § 42.100(b) ................................................................................................................6
`
`
`
`iii
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`
`I. MANDATORY NOTICES
`A. Real Parties-in-Interest
`EMC Corporation and VMware, Inc. (“Petitioner”) are the real parties-in-
`
`interest.
`
`B. Related Matters
`The ‘280 patent is one of an extensive patent family of continuation and
`
`divisional applications. Exhibit 1008 shows the patent family, with patents in red
`
`and blue including the ‘280 patent being asserted in the litigation PersonalWeb
`
`Technologies LLC v. EMC Corporation and VMware, Inc. (No. 6:11-cv-00660-
`
`LED) (E.D. Tex.), served on December 16, 2012.
`
`Petitioner is also seeking Inter Partes Review of related U.S. Patents Nos.
`
`5,978,791, 7,945,539, 7,945,544, 7,949,662, and 8,001,096, and requests that they
`
`be assigned to the same Board for administrative efficiency. Moreover, there are
`
`several continuing applications related to this family that remain pending (shown
`
`on Exhibit 1008 in green). Because they share a common disclosure with the ‘280
`
`patent, these applications may be used as a basis to present patentably indistinct
`
`claims that may issue prior to the determination of the PTAB in this or related Inter
`
`Partes Reviews. The issuance of indistinct claims is at least inconsistent with Rule
`
`37 C.F.R. 42.73(d)(ii) and would be an “end-around” the reasonable number of
`
`substitute claims that are permitted in an IPR proceeding. Petitioner respectfully
`
`requests that the PTAB suspend from further prosecution, sua sponte, the
`
`1
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`applications in this related family, including the applications shown on Ex. 1008 in
`
`green and any further applications that may be filed that depend from this family of
`
`patents. If the PTAB determines that that suspension should be requested by
`
`written motion, permission to file such a motion is requested at this time.
`
`C. Counsel
`Lead Counsel: Peter M. Dichiara (Registration No. 38,005)
`
`Backup Counsel: David L. Cavanaugh (Registration No. 36,476)
`
`Petitioners will request authorization to file a motion for Cynthia Vreeland
`
`to appear pro hac vice. Ms. Vreeland has more than 20 years litigation experience,
`
`and has worked with Petitioner EMC on IP litigation matters for more than 10
`
`years. As such, Ms. Vreeland has experience and established familiarity with the
`
`technology at issue in the case. Petitioners intend to file a motion seeking
`
`admission of Ms. Vreeland to appear pro hac vice when authorized to do so.
`
`Service Information
`
`D.
`Email: Peter Dichiara, Peter.Dichiara@wilmerhale.com
`
`Post and Hand Delivery: WilmerHale, 60 State St., Boston MA 02109
`
`Telephone: 617-526-6466
`
`
`
`Facsimile: 617-526-5000
`
`E. CERTIFICATION OF GROUNDS FOR STANDING
`Petitioner certifies pursuant to Rule 42.104(a) that the patent for which
`
`review is sought is available for inter partes review and that Petitioner is not
`
`2
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`barred or estopped from requesting an inter partes review challenging the patent
`
`claims on the grounds identified in this Petition.
`
`II. OVERVIEW OF CHALLENGE AND RELIEF REQUESTED
`A.
`Pursuant to Rules 42.22(a)(1) and 42.104 (b)(1)-(2), Petitioner challenges
`
`Prior Art Patents and Printed Publications
`
`claims 36 and 38 of U.S. Patent No. 6,415,280 (“the ‘280 patent”; Ex. 1001) as
`
`anticipated by or unpatentable in view of the following patents and printed
`
`publications:
`
`1. S. Browne et al., “Location-Independent Naming for Virtual
`
`Distributed Software Repositories,” University of Tennessee
`
`Technical Report CS-95-278 (Feb. 1995) (“Browne ”, Ex. 1002).1
`
`
`1The Browne February 1995 publication qualifies as prior art under 35 USC
`
`102(a), and is used in this petition because it includes illustrations facilitating
`
`explanation of the invalidity of the challenged claims. Petitioner also has attached
`
`as exhibits and included in its claim charts two earlier versions of this publication –
`
`S. Browne et al., “Location-Independent Naming for Virtual Distributed Software
`
`Repositories,” http://www.netlib.org/utk/papers/lifn/main.html (Nov. 11, 1994)
`
`(Exhibit 1006); and K. Moore et al., “An Architecture for Bulk File Distribution,”
`
`Network Working Group Internet Draft (July 27, 1994) (Exhibit 1007). As Dr.
`
`Clark confirms in his Decl., the references are substantially the same with respect
`
`to the disclosure relevant to the challenged claims of the ‘280 patent. If the Patent
`
`3
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`2. Woodhill et al., U.S. Patent No. 5,649,196, entitled “System and
`
`Method For Distributed Storage Management on Networked
`
`Computer Systems Using Binary Object Identifiers,” filed Nov. 9,
`
`1995 as a continuation of application 85,596, filed July 1, 1993
`
`(“Woodhill”, Ex. 1005).
`
`3. Legent Software, Inc., “ESM: Product Information,” Legent
`
`Corporation (April 1994) (“ESM Manual”, Ex. 1026).2
`
`4. Satyanarayanan, “Scalable, Secure, and Highly Available Distributed
`
`File Access,” IEEE Computer, vol. 23, no. 5 (May 1990), pp. 9–21
`
`(“Satyanarayanan,” Ex. 1029)
`
`5. Albert Langer, “Re: dl/describe (File descriptions),” ),” article
`
`
`Owner alleges an earlier priority date of the challenged claims, Petitioner may rely
`
`on the earlier publications for invalidity, alone or in combination with the other
`
`references cited in this petition.
`2 The ESM manual was published by Legent Corporation in April 1994. This
`manual was accessible to the public and made available by Legent sales personnel
`
`to anyone that expressed interest in the Enterprise Storage Manager product. The
`
`purpose of the manual was to promote the sales of Enterprise Storage Manager by
`
`describing its operation and usefulness, and no purchase was required to receive
`
`this manual. As such, the manual was freely accessible to anyone in the relevant
`
`community of distributed file system and network administrators.
`
`4
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`<1991Aug7.225159.786@newshost.anu.edu.au> in Usenet
`
`newsgroups “alt.sources.d” and “comp.archives.admin” (August 7,
`
`1991) (“Langer”, Ex. 1003)
`
`6. Kantor, “The Frederick W. Kantor Contents-Signature System
`
`Version 1.22,” FWKCS122.REF (August 10, 1993) (“Kantor”, Ex.
`
`1004).3
`
`B.
`
`There is a Reasonable Likelihood that at least One Claim of the
`‘280 Patent is Unpatentable Under 35 U.S.C. §§ 102, 103
`
`Section VI below explains how the above-cited patents and printed
`
`publications create a reasonable likelihood that Petitioner will prevail with at least
`
`one of the challenged claims. See 35 U.S.C. § 314(a). Indeed, that section
`
`supported by the attached claim charts of Exhibits 1032 through 1036 and the
`
`Declaration of Dr. Douglas Clark, a Professor of Computer Science at Princeton
`
`
`3 Kantor’s FWKCS user manual has been publicly and freely available
`continuously since August 1993. Kantor distributed the user manual with the
`
`FWKCS program as shareware and posted it online to electronic Bulletin Board
`
`Systems including “The Invention Factory” and “Channel 1” for an extended
`
`period of time, where it could be downloaded by anyone. As such the document
`
`was accessible to others in the relevant community of BBS users and system
`
`operators. (See Kantor at 3, 5; see also 158-59; Ex. 1004.)
`
`5
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`University (“Clark Decl.”; Ex. 1009), demonstrate that all of the challenged claims
`
`are anticipated by, or unpatentable in view of, each of these references.
`
`C. Relief Requested
`Petitioner requests cancellation of claims 36 and 38, the challenged claims,
`
`as unpatentable under 35 U.S.C. §§ 102 and 103.
`
`III. Claim Construction
`
`The claim terms should be given their “broadest reasonable construction in
`
`light of the specification.” 37 C.F.R. § 42.100(b).
`
`The claim terms can be understood by their ordinary and plain meanings
`
`except where construed in the specification. The specification includes the
`
`following constructions relevant to the challenged claims:
`
`Term
`“data” and “data item”
`
`Construction
`“as used herein refer to sequences of bits. Thus a data
`item may be the contents of a file, a portion of a file, a
`page in memory, an object in an object-oriented
`program, a digital message, a digital scanned image, a
`part of a video or audio signal, or any other entity
`which can be represented by a sequence of bits. (‘280
`patent, col. 1, ll. 53-59, see also col. 1, l. 64 – col. 2, l.
`2 (“data items (the data items being files, directories,
`records in the database, objects in an object-oriented
`programming, locations in memory or on a physical
`device or the like)”); Ex. 1001.)
`
`6
`
`

`
`Term
`“file system”
`
`“file”
`
`“location”
`
`“local”
`
`“True Name, data
`identity, and data
`identifier”
`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`
`Construction
`“a collection of directories. A directory is a collection
`of named files – both data files and other directory
`files” (‘280 patent, col. 5, ll. 45-47; Ex. 1001.)
`
`“a named data item which is either a data file (which
`may be simple or compound) or a directory file. A
`simple file consists of a data segment. A compound
`file consists of a sequence of data segments. A data
`segment is a fixed sequence of bytes” (‘280 patent,
`col. 5, ll. 47-55; Ex. 1001.)
`
`“with respect to a data processing system, refers to any
`of a particular processor in the system, a memory of a
`particular processor, a storage device, a removable
`storage medium (such as a floppy disk or compact
`disk), or any other physical location in the system”
`(‘280 patent, col. 5, l. 66- col. 6, l. 4; Ex. 1001.)
`
`“with respect to a particular processor refers to the
`memory and storage devices of that particular
`processor” (‘280 patent, col. 6, ll. 4-5; Ex. 1001.)
`
`“refer to the substantially unique data identifier for a
`particular item” (‘280 patent, col. 6, ll. 7-11, see also
`col. 14, l. 52-col. l. 24 (describing mechanism for
`calculating True Name using MD hash function); Ex.
`1001.)
`
`IV. OVERVIEW OF THE ‘280 PATENT
`
`7
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`
`A. Brief Description
`The ‘280 patent is directed to data storage systems that use “substantially
`
`unique data identifiers” – based on all the data in a data item and only the data in
`
`the data item – to identify and access data items. (See, e.g., ‘280 patent, Title,
`
`Abstract, and col. 1, ll. 12-17; Ex. 1001.) The patent uses these identifiers to
`
`perform basic file management functions, such as storing and retrieving replicated
`
`copies of computer files or other data items, and eliminating unwanted and
`
`unnecessary duplicate copies of these items—admittedly old problems. (See, e.g.,
`
`‘280 patent, Background of the Invention, col. 2, l. 45-56; Ex. 1001.)
`
`According to the patent, prior art systems identified data items based on their
`
`location or address within the data processing system. (‘280 patent, col. 1, ll. 22-
`
`27; Ex. 1001.) For example, files were often identified by their context or
`
`“pathname,” that is, information specifying a path through the computer directories
`
`to the particular file (e.g., C:\My Documents\Law School\1L\TortsOutline.txt).
`
`(‘280 patent, col. 1, ll. 34-41; Ex. 1001.) The patent contends that all prior art
`
`systems operated in this manner: “In all of the prior data processing systems the
`
`names or identifiers provided to identify data items. . . are always defined relative
`
`to a specific context,” and “there is no direct relationship between the data names
`
`and the data item.” (‘280 patent, col. 1, l. 64 – col. 2, l. 2, col. 2, ll. 11-12,
`
`emphasis added; Ex. 1001.)
`
`8
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`According to the patent, this prior art practice of identifying a data item by
`
`its context or pathname resulted in certain shortcomings. For example, with
`
`pathname identification, the same data name may refer to different data items, or
`
`conversely, two different data names may refer to the same data item. (‘280
`
`patent, col. 2, ll. 11-15; Ex. 1001.) Moreover, because there is no correlation
`
`between the contents of a data item and its pathname, there is no a priori way to
`
`confirm that the data item is in fact the one named by the pathname. (‘280 patent,
`
`col. 2, ll. 16-19; Ex. 1001.) Furthermore, context or pathname identification may
`
`more easily result in the creation of unwanted duplicate data items, e.g., multiple
`
`copies of a file on a file server.4 (‘280 patent, col. 2, ll. 46-57; Ex. 1001.)
`
`The ‘280 patent purports to address these shortcomings. (‘280 patent, col. 3,
`
`ll. 5-19; Ex. 1001.) It suggests that “it is therefore desirable to have a mechanism .
`
`. . to determine a common and substantially unique identifier for a data item, using
`
`only the data in the data item and not relying on any sort of context.” (‘280 patent,
`
`col. 3., ll. 5-10; Ex. 1001.) Moreover, “[i]t is further desirable to have a
`
`mechanism for reducing multiple copies of data items… and to have a mechanism
`
`
`4 For example, Alice and Bob both download the same copy of the James Bond
`movie Goldfinger. Alice saves her copy at “C:\Movies\Bond\Goldfinger.mov”,
`
`and Bob saves his copy at “C:\Videos\007\Bond-Goldfinger.mov”.
`
`9
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`which enables the identification of identical data items so as to reduce multiple
`
`copies.” (‘280 patent, col. 3, ll. 11-16; Ex. 1001.)
`
`To do so, the ‘280 patent provides data identifiers that “depend[] on all of
`
`the data in the data item and only on the data in the data item.” (‘280 patent, col. 1,
`
`ll. 11-16, col. 3, ll. 28-31; Ex. 1001.) Preferred embodiments use either of the
`
`well-known MD5 or SHA message digest functions5 to calculate a substantially
`
`unique identifier from the contents of the data item. (‘280 patent, col. 12, l. 38-
`
`col. 14, l. 24; Ex. 1001.) The system first computes the 16-byte (128-bit) message
`
`digest of the data item and then appends the size of the data item to produce a 160-
`
`bit identifier. (‘280 patent, Fig. 10A and col. 13, ll. 52-63; Ex. 1001.) The patent
`
`calls these context- or location-independent, content-based identifiers a “True
`
`Name” – a phrase admittedly “coined by the inventors.” (U.S. Patent No.
`
`6,415,280 Prosecution History, Response (Aug. 22, 2001), at 22; Ex. 1019.)
`
`
`5 A message digest function is a transformation of a piece of data into a much
`shorter form. (See, e.g., D. Banisar et al., The Third CSPR Cryptography and
`
`Privacy Conference at 509 (1993); Ex. 1010 (describing a message digest function
`
`as “a 128-bit cryptographically strong one-way hash function of the message” that
`
`is “somewhat analogous to a ‘checksum’ or CRC error checking code, in that it
`
`compactly ‘represents’ the message.”).) The ‘791 patent admits that message
`
`digest functions were known. (‘280 patent, col. 12, l. 66 - col. 13, l. 3; Ex. 1001.)
`
`10
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`With these identifiers, the patent asserts, “data items can be accessed by
`
`reference to their identities (True Names) independent of their present location.”
`
`(‘280 patent, col. 34, ll. 20-22; see also col. 34, ll. 41-43; Ex. 1001.) The actual
`
`data item corresponding to these location-independent identifiers may reside
`
`anywhere, e.g., locally, remotely, offline. (Id. at col. 34, ll. 22-30.) “Thus the
`
`identity of a data item is independent of its name, origin, location, address, or other
`
`information not derivable directly from the data, and depends only on the data
`
`itself.” (Id. at col. 3, ll. 31-33.)
`
`In the preferred embodiments, the substantially unique identifiers are used to
`
`“augment” standard file management functions of an existing operating system.
`
`(Id. at col. 6, ll. 12-19.) For example, a local directory extensions (LDE) table6 is
`
`indexed by a pathname or contextual name of a file and also includes True Names
`
`for most files. (Id. at col. 8, ll. 24-31.) A True File registry (TFR) lists True
`
`Names, and stores “location, dependency, and migration information about True
`
`Files.” (Id. at col. 8, ll. 32-34, 37-39.) True Files are identified in the True File
`
`registry by their True Names, and can be looked up in the registry by their True
`
`
`6 According to the patent, a LDE table is a data structure which provides
`information about files and directories in the system and includes information in
`
`addition to that provided by the native file system. (‘280 patent, col. 8, ll. 24-31;
`
`Ex. 1001.)
`
`11
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`Names. (Id. at col. 8, ll. 35-37; col. 23, ll. 50-51.) This look-up provides, for each
`
`True Name, a list of the locations, such as file servers, where the corresponding file
`
`is stored. (Id. at col. 34, ll. 28-30; see also col. 15, ll. 62-64.) When a data item is
`
`to be “assimilated” into the system, its True Name can be compared to the True
`
`File Registry to see if the data item already exists in the system. (Id. at col. 14, ll.
`
`25-32.) The True Name also can be used to identify a file by contents, to confirm
`
`that a file matches its original contents, or to compare two files.” (Id.at col. 15, ll.
`
`9-11.)
`
`The system also includes a “Mirror True File” background mechanism “to
`
`mirror (make copies) of the True File available elsewhere in the system.” (‘280
`
`patent, col. 35, ll. 15–18; Ex. 1001.) “In operation data items can be accessed by
`
`reference to their identities (True Names) independent of their present location.
`
`The actual data item or True File corresponding to a given data identifier or True
`
`Name may reside anywhere in the system (that is, locally, remotely, offline, etc).”
`
`(Id. at col. 34, ll. 21–24.) If a data item is not present locally, the True File registry
`
`may be used to determine the location(s) of copies of the True File corresponding
`
`to a given True Name. (Id. at col. 34, ll. 27-31.) Another mechanism, the “Realize
`
`True File from Location” primitive mechanism, “tries to make a local copy of a
`
`True File, given its True Name and the name of a source location (processor or
`
`media) that may contain the True File.” (Id. at col. 34, ll. 31-35; see also col. 16,
`
`12
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`ll. 17-19.) If the source location is a remote processor, the Realize True File from
`
`Location mechanism sends a message to that remote processor and waits for a
`
`response. (Id. at col. 15, l. 66 -col. 16, l. 3.) If it receives a positive response, it
`
`enters the returned True File into the True File Registry. (Id. at col. 16, ll. 5-7.)
`
`B.
`
` The Prosecution History of the ‘280 Patent
`
`The ‘280 patent is based on an application that was originally filed on April
`
`11, 1995, and is a division of the application that resulted in U.S. Pat. No.
`
`5,978,791. The claims were preliminarily amended to include new claims 54, 87
`
`and 89 (among others), which are reproduced below:
`
`
`
`****
`
`13
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`
`
`
`****
`
`
`
`(Prelim. Amend. Of Jan. 11, 2001, at 2 and 11, Ex. 1024.)
`
`All of the pending claims were rejected for failing to satisfy 35 U.S.C.
`
`§112, ¶1 and as unpatentable over Nelson (U.S. Pat. No. 5,452,447) in view of
`
`Hamilton (U.S. Pat. No. 5,640,564) (Office Action of June 5, 2001 at 4 and 6, Ex.
`
`1025). In connection with the latter, the office action primarily focused on claim
`
`14
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`54, and relied on Nelson for the basic components of the recited system and on
`
`Hamilton for the recited data identifier:
`
` (Id. at 7; Ex. 1025.) With regard to claims 87 and 89, the office action stated,
`
`without separate discussion, that the rejection was based on similar grounds:
`
`
`
`15
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`
`(Id. at 8 Ex. 1025.) In reply to the §112 rejections, the applicants argued:
`
`
`
`
`
`
`
`****
`
`
`
`
`
`(Response, Aug. 22, 2001 at 22-23; Ex. 1019.)
`
`In addition, the applicants submitted claims charts, purportedly identifying
`
`portions of the specification that they alleged taught and supported claims 87 and
`
`89, among others. (Id. at 24. Ex. 1019.) Those charts are reproduced below:
`
`16
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`
`****
`
`
`
`
`
`(Id. at 27 and 38-39; Ex. 1019.)
`
`In connection with the prior art rejections, the applicants amended the claims
`
`to specifically recite “data files” as opposed to “data items,” and to recite that the
`
`17
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`request included a hash of the “contents of” the data item, as opposed to merely a
`
`hash of the data item. (Id. at 47-58) The applicants’ arguments focused on the
`
`purported novelty of the content- based identifier:
`
`
`
`(Id. at 24; Ex. 1019.) Nowhere did the applicants dispute that Nelson taught the
`
`basic system of servers storing copies of files or causing the file to be provided in
`
`response to a request.
`
`The claims were subsequently allowed, and claims 87 and 89 were
`
`renumbered to challenged claims 36 and 38, respectively.
`
`V.
`
`THE CHALLENGED CLAIMS ARE UNPATENTABLE
`
`A. There is Nothing New About Using Content-Based Identifiers to
`Request and Obtain a Data File from a Network
`
`The ‘280 claims focus on the concept of using content-based identifiers to
`
`store, request and obtain copies of data files from a set of servers. Claim 36, for
`
`example, simply requires storing copies of a data file on multiple servers in a
`
`network, and causing a copy of the file to be provided to a client in response to a
`
`request including a hash of the contents of the file:
`
`36. A method of delivering a data file in a network comprising a
`plurality of processors, some of the processors being servers and some
`of the processors being clients, the method comprising:
`
`18
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
` storing the data file is [sic] on a first server in the network and
`storing copies of the data file on a set of servers in the network
`distinct from the first server; and
`
`responsive to a client request for the data file, the request
`including a hash of the contents of the data file, causing the data
`file to be provided to the client.
`
`(‘280 patent, col. 43, ll. 54-64; Ex. 1001.)7
`
`The applicants indicated in their patent application that they were entitled to
`
`these broad claims because “[i]n all of the prior data processing systems the names
`
`or identifiers provided to identify data items . . . are always defined relative to a
`
`specific context,” and “there is no direct relationship between the data names and
`
`the data item.” (‘280 patent, col. 1, l. 64–col. 2. l. 2, col. 2, ll. 11-12, emphasis
`
`added; Ex. 1001.)
`
`These representations were simply wrong. Prior data processing system did
`
`use identifiers based on the content of a data item itself, and not its context or
`
`pathname. In fact, these techniques were old and widely used. This is not
`
`surprising. The concept of using a mathematical function to create a “fingerprint”
`
`or “signature” for a data item based on the content of the data item predates the
`
`7 Claim 38 is similar but replaces the reference to a “hash” with the amorphous
`phrase “value determined as a given function.”
`
`
`
`19
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`‘791 patent by decades. For example, IBM developed one of the first hash tables
`
`in the 1950s (see, e.g., D. Knott, Hashing functions, The Computer Journal 18
`
`(1975), vol. 3, at 274 (discussing “history of hashing”); Ex. 1011), and Professor
`
`Ron Rivest of MIT introduced the MD5 algorithm referenced in the ‘791 patent in
`
`the early 1990s. (See, e.g., R. Rivest, “The MD5 Message-Digest Algorithm,”
`
`Internet RFC 1321 (Apr. 1992); Ex. 1012.) These hashing functions take as input
`
`the data contained in a file or other data item, and produce a much smaller-sized
`
`output value, commonly called a “hash,” “hash value,” “message digest” (“MD”),
`
`or “checksum.” (See, e.g., McGraw-Hill Dictionary of Scientific and Technical
`
`Terms, (4th ed., 1989), at 860; Ex. 1013; see also B. Kaliski, “A Survey of
`
`Encryption Standards,” IEEE Micro (Dec. 1993), pp. 74–81, at 77; Ex. 1014.) For
`
`example, a file that is a million bytes (or even much larger) in size can be used as
`
`input to produce a hash value that is a mere 16 bytes in length. Because of the
`
`mathematical properties of the function, the odds that two different files will
`
`produce the identical 16 byte hash are extremely small: for example, with a 16 byte
`
`hash output, the odds that two randomly picked inputs have the same hash are 2–64,
`
`or approximately one in sixteen billion billions. (B. Kaliski at 77; Ex. 1014.)
`
`Consequently, hashes are known as “signatures” or “fingerprints” because they
`
`identify data items with high reliability, just like signatures or fingerprints are used
`
`to identify people with a high degree of certainty. (See D.R. McGregor and J.A.
`
`20
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`Mariani, ‘Fingerprinting’ – A Technique for File Identification and Maintenance,
`
`Software Practice & Experience 1165 (1982), vol. 12, no. 12, at 1165
`
`(“fingerprinting” technique “produce[s] a quasi-unique identifier for a file, derived
`
`from that file's contents. . .[t]he idea is to provide an identifying deature for every
`
`file, which is intrinsically distinctive, and analogous (hopefully) to a human’s
`
`fingerprint.”); Ex. 1017.)
`
`Although applicants suggested in their application that they were the first to
`
`utilize these hashing functions to identify data items for file management
`
`applications, others working in the field used them for the same purposes more
`
`than a decade before the ‘280 patent. For example, file “fingerprinting” has long
`
`been known as a technique to see if two files are identical. (See Rabin,
`
`Fingerprinting by Random Polynomials, Center for Research in Computing
`
`Technology, Harvard University, Report TR-15-81 at 1 and 9, 1981; Ex. 1015; see
`
`also Manber, at 3 (commenting on work of Rabin); Ex. 1016). Likewise, the use of
`
`“fingerprints” both to identify files and to check for duplicates also has long been
`
`known. (See, e.g., D.R. McGregor and J.A. Mariani, at 1165; Ex. 1017.)8
`
`
`8 This reference was cited and central to the analysis and rejection of EP
`counterpart application EP0826181A1 with claims having a central feature of
`
`content-based identifiers. (Annex to the communication, May 8, 2009; Ex. 1020.)
`
`Applicant amended the claims to emphasize a “licensing” limitation not found in
`
`21
`
`

`
`U.S. Patent 6,415,280
`Petition for Inter Partes Review
`Many printed publications and patents disclose and use data identifiers
`
`exactly like those described and claimed in the ‘280 patent for exactly the same
`
`purposes. These publications disclose identifiers that are location- and context-
`
`independent, that are determined based on hash of the contents of a data file, and
`
`that are formed using the same algorithms mentioned in the ‘791 patent.
`
`Browne: For example, researchers at the University of Tennessee and Bell
`
`Laboratories disclosed a system that created “location-independent file names” (or
`
`“LIFNs”) to identify files on the Interne

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket