throbber
Filed on behalf of Microsoft Corporation
`
`By: John D. Vandenberg (Reg. No. 31,312)
`
`john.vandenberg@klarquist.com
`Stephen J. Joncus (Reg. No. 44,809)
`stephen.joncus@klarquist.com
`Klarquist Sparkman LLP
`One World Trade Center, Suite 1600
`121 S.W. Salmon Street
`Portland, Oregon 97204
`Telephone: (503) 595-5300
`Facsimile: (503) 595-5301
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________
`
`MICROSOFT CORPORATION
`Petitioner
`
`v.
`
`PROXYCONN, INC.
`Patent Owner
`
`____________
`
`
`Patent 6,757,717 B1
`
`____________
`
`Page 1 of 17
`
`

`

`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`FILED VIA THE PATENT REVIEW PROCESSING SYSTEM
`
`In re Inter Partes Review of:
`U.S. Patent No. 6,757,717
`
`Issued: June 29, 2004
`
`Applicant: Leonid Goldstein
`
`Application No. 09/398,007
`
`Filed: September 16, 1999
`
`Title: System And Method For Data
`
`Access
`
`Currently in Litigation Styled:
`Proxyconn Inc. v. Microsoft
`Corporation, et al., Central District
`of California, Case No. SA CV11-
`1681 DOC (JPRx) [Consolidated
`with Case Nos. SA CV11-1682
`DOC (JPRx), SA CV11-1683 DOC
`(JPRx), and SA CV11-1684 DOC
`(JPRx)]
`
`
`
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`
`Declaration of Professor Darrell D. E. Long
`Regarding U.S. Patent No. 6,757,717
`
`I.
`
`QUALIFICATIONS
`
`I am a Professor of Computer Science and have served as Associate
`
`Dean for Research and Graduate Studies in the Jack Baskin School of
`
`Engineering at the University of California at Santa Cruz. I hold the Kumar
`
`Malavalli Endowed Chair of Storage Systems Research and I am the Director
`
`2
`
`Page 2 of 17
`
`

`

`
`
`
`
`1
`
`of the Storage Systems Research Center, an internationally recognized center
`
`2
`
`of excellence in data storage. I am also the Director of the Working-group on
`
`3
`
`Applied Security and Privacy (WASP), the laboratory at the University of
`
`4
`
`California at Santa Cruz that studies computer security. I teach graduate and
`
`5
`
`undergraduate courses in computer security, operating systems, data storage
`
`6
`
`and have taught courses in networking and distributed systems. I received my
`
`7
`
`B.S. degree in Computer Science from San Diego State University, and my
`
`8
`
`M.S. and Ph.D. from the University of California, San Diego. I am a Fellow
`
`9
`
`of the Institute of Electrical and Electronics Engineers and of the American
`
`10
`
`Association for the Advancement of Science. My research interests include
`
`11
`
`data storage systems, operating systems, computer security, distributed
`
`12
`
`systems and networking. My qualifications are further described in my
`
`13
`
`appended Curriculum Vitae.
`
`14
`
`
`
`I have published numerous papers including in the ACM Transactions
`
`15
`
`on Storage, and various IEEE journals, and I am the co-author of two books.
`
`16
`
`These publications are listed in Exhibit A. I am the founder of the premier
`
`17
`
`conference in the data storage field known as the Symposium on File Storage
`
`18
`
`Technologies (“FAST”). I have participated in organizing numerous
`
`19
`
`academic conferences including:
`
`20
`
`3
`
`Page 3 of 17
`
`

`

`
`
`
`
`1
`
`2
`
`2012:
`
`Steering Committee: Petascale Data Storage Workshop (PDSW),
`
`3
`
`Symposium on Modeling, Analysis and Simulation of Computer and
`
`4
`
`Telecommunication Systems (MASCOTS), Symposium on File and Storage
`
`5
`
`Systems Technology (FAST).
`
`6
`
`Program Committee: Symposium on File and Storage Systems
`
`7
`
`Technology (FAST).
`
`8
`
`9
`
`2011:
`
`Steering Committee: Petascale Data Storage Workshop (PDSW),
`
`10
`
`Symposium on Modeling, Analysis and Simulation of Computer and
`
`11
`
`Telecommunication Systems (MASCOTS), Symposium on File and Storage
`
`12
`
`Systems Technology (FAST).
`
`13
`
`Program Committee: Symposium on Modeling, Analysis and
`
`14
`
`Simulation of Computer and Telecommunication Systems (MASCOTS).
`
`15
`
`16
`
`2010:
`
`Program Chair: Symposium on Modeling, Analysis and Simulation of
`
`17
`
`Computer and Telecommunication Systems (MASCOTS).
`
`18
`
`Steering Committee: Petascale Data Storage Workshop (PDSW),
`
`19
`
`Symposium on Modeling, Analysis and Simulation of Computer and
`
`20
`
`4
`
`Page 4 of 17
`
`

`

`
`
`
`
`1
`
`Telecommunication Systems (MASCOTS), Symposium on File and Storage
`
`2
`
`Systems Technology (FAST).
`
`3
`
`4
`
`2009:
`
`Program Committee: International Workshop on Software Support for
`
`5
`
`Portable Storage (IWSSPS), Inaugural International Conference on
`
`6
`
`Virtualization and Cloud Computing, Symposium on Modeling, Analysis and
`
`7
`
`Simulation of Computer and Telecommunication Systems (MASCOTS),
`
`8
`
`Petascale Data Storage Workshop (PDSW).
`
`9
`
`10
`
`11
`
`Program Chair: Web Information Systems Engineering (WISE).
`
`General Chair: Symposium on Applications and the Internet (SAINT).
`
`Steering Committee: Symposium on Modeling, Analysis and
`
`12
`
`Simulation of Computer and Telecommunication Systems (MASCOTS),
`
`13
`
`Symposium on File and Storage Systems Technology (FAST).
`
`14
`
`I have also consulted for industry in the area of storage systems
`
`15
`
`including for Hewlett-Packard Laboratories and IBM. I have also been a
`
`16
`
`consultant to numerous agencies of the Federal government.
`
`17
`
`II. COMPENSATION
`
`18
`
`I am being compensated by counsel for Microsoft at my compensation
`
`19
`
`rate of $500/hour for consulting and $600/hour for testimony in deposition or
`
`20
`
`5
`
`Page 5 of 17
`
`

`

`
`
`
`
`1
`
`trial, plus reimbursement for reasonably incurred expenses. I have no interest
`
`2
`
`in the outcome of the related litigation or this proceeding.
`
`3
`
`4
`
`III. SUMMARY OF MY STUDY AND CONCLUSIONS
`
`I have read U.S. Patent No. 6,757,717. The patent concerns
`
`5
`
`technology within my areas of expertise. I have considered the patent’s
`
`6
`
`disclosures from the perspective of a person of ordinary skill in the art in
`
`7
`
`1998–99.
`
`8
`
`9
`
`10
`
`I have studied the following references and considered them from the
`
`perspective of the person of ordinary skill in the art in 1998–99.
`
`HTTP DRP (Ex. 1003): Arthur van Hoff, John Giannandrea, Mark
`
`11
`
`Hapner, Steve Carter, and Milo Medin, “The HTTP Distribution and
`
`12
`
`Replication Protocol,” W3C Note, http://www.w3.org/TR/NOTE-drp-
`
`13
`
`19970825.html, Aug. 1997 (“HTTP DRP”).
`
`14
`
`Mattis (Ex. 1004): Peter Mattis et al., U.S. Patent No. 6,292,880,
`
`15
`
`“Alias-Free Content-Indexed Object Cache,” issued Sept. 18, 2001 on
`
`16
`
`application filed Apr. 15, 1998 (“’880” or “Mattis”).
`
`17
`
`I have compared these references to claims 6, 7, 9, 11, 12 and 14 of the
`
`18
`
`’717 patent.
`
`19
`
`I have considered the perspective of the person of ordinary skill in the
`
`20
`
`art in 1998–99 (defined below) who was designing a system in which data is
`
`6
`
`Page 6 of 17
`
`

`

`
`
`
`
`1
`
`sent over a network from some source and is stored by a receiver computer
`
`2
`
`for possible later reuse, and having a design goal of reducing the transmission
`
`3
`
`of redundant data over the network. I have considered such a person having
`
`4
`
`read Mattis with an eye toward using and possibly expanding on its
`
`5
`
`teachings. I have also considered such a person having read HTTP DRP and
`
`6
`
`looking to use and possibly expand on its teachings.
`
`7
`
`These six ’717 patent claims recite nothing innovative compared to
`
`8
`
`these references. HTTP DRP discloses to the person of ordinary skill in the
`
`9
`
`art in 1998–99 everything required by these six claims. Mattis discloses to
`
`10
`
`the person of ordinary skill in the art in 1998–99 everything required by
`
`11
`
`claims 6, 7 and 9. Also, the natural combination of Mattis and HTTP DRP
`
`12
`
`taught the person of skill in the art the combinations claimed in these claims.
`
`13
`
`In other words, the person of skill in the art would have already possessed the
`
`14
`
`claimed subject matter upon reading Mattis and HTTP DRP, combined with
`
`15
`
`their knowledge of the conventional technology in the field, as explained
`
`16
`
`below.
`
`17
`
`Also, the patent is internally inconsistent and unclear on the meaning
`
`18
`
`of “digital digest,” as explained in my earlier declaration. For purposes of
`
`19
`
`my comparison of the claims to the prior art references, however, I have
`
`20
`
`assumed that this term includes a fixed-size digital fingerprint (e.g., hash,
`
`7
`
`Page 7 of 17
`
`

`

`
`
`
`
`1
`
`message digest, signature or identifier), of 32 or more bits, calculated using
`
`2
`
`an MD5 and/or CRC algorithm and calculated on arbitrary-size data, such
`
`3
`
`that it represents and depends only on the content of that data.
`
`4
`
`5
`
`IV. FIELD OF THE INVENTION
`
`The ’717 patent defines its “field of the invention” as accessing data in
`
`6
`
`communication networks. (’717, 1:10–15). The field also includes the areas
`
`7
`
`of distributed data storage systems and networking, coding theory including
`
`8
`
`9
`
`error detection and correction codes, and cryptographic hash functions
`
`commonly called message digest functions. These were all mature fields for
`
`10
`
`many years prior to 1998–99.
`
`11
`
`12
`
`V. LEVEL OF SKILL IN THE ART IN 1998–99
`
`A person of ordinary skill in this art in 1998–99 would hold a B.S.
`
`13
`
`degree in computer science and would have as part of his study courses in
`
`14
`
`operating systems, networking, data compression and computer security.
`
`15
`
`These studies would include the storage subsystem of computer operating
`
`16
`
`systems which is covered briefly in most undergraduate operating systems
`
`17
`
`courses, but few require the student to examine actual source code. In
`
`18
`
`addition he would have several years of practical experience working in
`
`19
`
`operating systems, in particular the data storage subsystem.
`
`20
`
`8
`
`Page 8 of 17
`
`

`

`
`
`
`
`1
`
`As a result, actual experience in working with this operating system
`
`2
`
`subsystem would normally occur after several years of experience working
`
`3
`
`for a company with a focus on systems software.
`
`4
`
`Alternatively, a person would develop the level of ordinary skill in the
`
`5
`
`art in 1998–99 by obtaining an M.S. in computer science and by writing his
`
`6
`
`or her thesis in an area related to data storage and/or computer security.
`
`7
`
`8
`
`9
`
`A person of ordinary skill in the art would understand network
`
`protocols. This was normally part of undergraduate programs in computer
`
`science in 1998–99. A person of ordinary skill in the art would also
`
`10
`
`understand coding theory; in particular error detection and correction codes,
`
`11
`
`as well as cryptographic hash functions and message digest functions.
`
`12
`
`Introduction to basic hash functions is a normal part of most undergraduate
`
`13
`
`curricula, but coding theory is normally part of specialized courses (although
`
`14
`
`it is commonly part of electrical engineering programs), and cryptographic
`
`15
`
`hash functions would normally be taught only in courses in computer
`
`16
`
`security.
`
`17
`
`I have first-hand experience teaching and working with such persons of
`
`18
`
`ordinary skill in the art. For example, I have taught students having about that
`
`19
`
`level of skill in this art since at least as early as 1990.
`
`20
`
`9
`
`Page 9 of 17
`
`

`

`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`VI. MATTIS AND HTTP DRP TEACH
`
`THE CLAIMED SUBJECT MATTER
`
`A. Mattis And HTTP DRP Are A Natural Combination
`
`Each of Mattis and HTTP DRP alone teaches and discloses the entirety
`
`of the alleged invention recited in claims 6, 7 and 9 of the Goldstein ’717
`
`patent. And, at least HTTP DRP alone teaches and discloses the entirety of
`
`the alleged invention recited in claims 11, 12 and 14 of the ’717 patent.
`
`Nevertheless, I’ve been asked to assume, for argument sake, that Mattis’s
`
`disclosure of a server receiving an object’s MD5 digest within a request for
`
`that object, is somehow insufficient. And, I’ve been asked to assume, for
`
`argument sake, that HTTP DRP’s disclosure of the conventional elements of
`
`a web proxy server or other HTTP server is somehow insufficient to
`
`completely disclose the elements of these six patent claims. Given these
`
`assumptions, neither of which in my opinion is a reasonable assumption, the
`
`question posed is whether a person of ordinary skill in the art considering the
`
`problem addressed by these patent claims, and aware of these and other
`
`relevant prior art references (but not aware of the ’717 patent’s disclosure),
`
`would have had an apparent and natural reason to combine these two
`
`references (HTTP DRP and Mattis) in the manner claimed in these patent
`
`claims. In other words, would such a person starting with HTTP DRP or
`
`10
`
`Page 10 of 17
`
`

`

`
`
`
`
`1
`
`starting with Mattis, and applying ordinary skill and common sense, have
`
`2
`
`combined that reference with the other reference to reach the same
`
`3
`
`combination claimed in these claims. For example, would such a person have
`
`4
`
`seen a benefit of implementing the HTTP DRP protocol in the clients, web
`
`5
`
`proxy cache server, and other HTTP servers described in Mattis. The answer
`
`6
`
`is yes. For multiple reasons, a person having ordinary skill in the art looking
`
`7
`
`to expand upon Mattis would have looked to HTTP DRP and, conversely,
`
`8
`
`one looking to implement HTTP DRP would have looked to Mattis. As
`
`9
`
`explained below, some of these reasons are that these two references address
`
`10
`
`the same problem, present the same algorithmic solution to that problem, and
`
`11
`
`apply that shared solution to the same type of application. Further, nothing in
`
`12
`
`these two references teaches away from their combination.
`
`13
`
`Same Problem: First, each reference addresses the same problem as
`
`14
`
`the ’717 patent: the desire to reduce redundancy in network data
`
`15
`
`transmissions where certain data has been received over a network and is
`
`16
`
`stored by a proxy cache (or client cache) for possible later reuse. The ’717
`
`17
`
`patent identifies the following objects among others: “It is therefore a broad
`
`18
`
`object of the present invention to provide a method, system and apparatus for
`
`19
`
`increasing the speed of data access in a packet-switched network. Another
`
`20
`
`object of the present invention is to decrease data traffic throughout the
`
`11
`
`Page 11 of 17
`
`

`

`
`
`
`
`1
`
`network. Still another object of the present invention is to decrease the
`
`2
`
`required cache size.” (’717, 1:61-67). These were well-known goals in the
`
`3
`
`mid-1990s for designers of network caching systems. It was known that
`
`4
`
`redundant network transmissions and redundant cache storage could arise, for
`
`5
`
`instance, when downloaded data is subject to change at its original source
`
`6
`
`and/or the same downloaded data content exists on the network under two or
`
`7
`
`more different names. When the data is subject to change at the source, a
`
`8
`
`proxy cache might wastefully download that same data from the original
`
`9
`
`source each time it is requested by a client, for fear that the proxy cached
`
`10
`
`version is out of date. When the data exists and is requested by clients under
`
`11
`
`various names, the proxy cache might wastefully download the same data in
`
`12
`
`response to those requests, and cache duplicate copies of that data. Each of
`
`13
`
`these two references addresses how to avoid such redundant downloads and
`
`14
`
`storage of redundant copies. “[D]ifferent sites often refer to the same
`
`15
`
`standard libraries or images, and because their content identifiers match,
`
`16
`
`multiple redundant downloads can be avoided.” (Ex. 1003, 7:5–6). “The
`
`17
`
`technology described herein provides for a cache object store for a high-
`
`18
`
`performance, high-load application having the following general
`
`19
`
`characteristics: . . . Alias free, so that multiple objects or object variants, with
`
`20
`
`different names, but with the same content identical object content, will have
`
`12
`
`Page 12 of 17
`
`

`

`
`
`
`
`1
`
`the object content cached only once, shared among the different names.”
`
`2
`
`(Ex. 1004, 4:48-52, 64-68).
`
`3
`
`This shared problem would have motivated a person having ordinary
`
`4
`
`skill in the art to consider these references together.
`
`5
`
`Same Solution: Second, each reference proposes the same algorithmic
`
`6
`
`solution to this problem. Each uses MD5 digest fingerprints. Each calculates
`
`7
`
`an MD5 digest from the content in question to represent that content. Each
`
`8
`
`transmits MD5 digest fingerprints over the network. Each receiver of those
`
`9
`
`MD5 digests compares that network-transmitted MD5 digest to its own
`
`10
`
`cached MD5 digest fingerprint values. Each relies on a match between two
`
`11
`
`MD5 digital digest values to avoid an otherwise redundant transmission or
`
`12
`
`storage of duplicate copies of the same data content. This common
`
`13
`
`algorithmic solution would have motivated a person having ordinary skill in
`
`14
`
`the art to consider these references together.
`
`15
`
`Same Application: Third, each reference teaches that its techniques
`
`16
`
`can be used to distribute the same type of content over the same type of
`
`17
`
`distribution system, namely web server files and content over the existing
`
`18
`
`HTTP web architecture, including the Internet (with its routers, switches,
`
`19
`
`ISPs, proxies, etc.) and web proxy caches. HTTP DRP “provides a
`
`20
`
`specification of a protocol for the efficient replication of data over HTTP
`
`13
`
`Page 13 of 17
`
`

`

`
`
`
`
`1
`
`network routers” (Ex. 1003, 1:29) and describes “functionality that can be
`
`2
`
`deployed anywhere where HTTP is available today” (id., 2:22). With Mattis,
`
`3
`
`“a client may be able to access replicas from a topologically proximate cache
`
`4
`
`faster than possible from the original web server, while at the same time
`
`5
`
`reducing Internet server traffic.” (Ex. 1004, 1:62–65).
`
`6
`
`Mattis Contemplates HTTP-DRP Type Requests: Fourth, as noted,
`
`7
`
`Mattis expressly acknowledges that clients may request a particular object by
`
`8
`
`9
`
`identifying the object’s MD5 digest, but that clients typically instead request
`
`an object by its URL or other name. (Ex. 1004, 9:65–10:4). Therefore, as
`
`10
`
`shown in Fig. 9A, step 904, the Mattis system includes the capability of
`
`11
`
`converting an object name included in such a request to that object’s MD5
`
`12
`
`digest value (object key value). After that conversion step, the rest of Fig. 9A
`
`13
`
`uses the MD5 digest of the object. However Mattis obtains the MD5 digest
`
`14
`
`from the request, whether directly from the object request (e.g., an HTTP
`
`15
`
`DRP request) or indirectly by converting the object’s name to its MD5 digest,
`
`16
`
`the operation thereafter using that MD5 digest is the same. Therefore, Mattis
`
`17
`
`and HTTP DRP fully operate together without changing either.
`
`18
`
`No Teaching Away: Finally, nothing in either reference or outside
`
`19
`
`either reference teaches away from their combination. No essential feature in
`
`20
`
`Mattis conflicts with an essential feature of HTTP DRP. Nothing stated in
`
`14
`
`Page 14 of 17
`
`

`

`
`
`
`
`1
`
`Mattis would lead a person having ordinary skill in the art away from using it
`
`2
`
`to implement HTTP DRP and nothing stated in HTTP DRP would lead a
`
`3
`
`person having ordinary skill in the art away from implementing it using
`
`4
`
`Mattis.
`
`B.
`
`
`The Designer Naturally Would Have
`Combined Mattis and HTTP DRP In The Claimed Manner
`
`As seen in App. A (Ex. 1001), this combination of Mattis and HTTP
`
`DRP discloses each and every element of all six challenged claims. HTTP
`
`DRP discloses the only element in claims 6, 7 or 9 arguably not sufficiently
`
`described in Mattis (the object’s MD5 digest being received over the
`
`network). HTTP DRP discloses all elements of each of claims 6, 7, 9, 11, 12
`
`and 14 while Mattis discloses a particular set of instrumentalities for
`
`implementing the HTTP DRP protocol.
`
`The web proxy cache 30 and client 10 of Mattis each is suited for
`
`operating the HTTP DRP protocol. Modifying these elements of Mattis per
`
`HTTP DRP would of course provide and implement all of the functionality
`
`and benefits described in the HTTP DRP protocol. That is the very point of
`
`this protocol. It describes how to modify existing web servers and clients to
`
`achieve the benefits described in the protocol. The Mattis web proxy server
`
`already provides that functionality, and Mattis already describes that some
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`15
`
`Page 15 of 17
`
`

`

`
`
`
`
`1
`
`clients have the ability to request an object by its MD5 digest, but it is not
`
`2
`
`typical. Making that typical, by adopting the HTTP DRP protocol, would
`
`3
`
`provide all of the benefits of that protocol. And, it would not change how
`
`4
`
`any element in Mattis functions.
`
`5
`
`For the above reasons, this combination of Mattis and HTTP DRP in
`
`6
`
`this manner is no more than a predictable use of prior art elements according
`
`7
`
`to their established functions. A system designer of ordinary skill wishing to
`
`8
`
`improve the efficiency of network communications would have seen a benefit
`
`9
`
`of implementing HTTP DRP using the designs described in Mattis. Thus, the
`
`10
`
`challenged claims recite nothing innovative.
`
`11
`
`12
`
`
`
`I declare under penalty of perjury under the laws of the United States
`
`13
`
`of America that the foregoing is true and correct.
`
`
`
`14
`
`
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`16
`
`Page 16 of 17
`
`

`

`Executed on the 3-;“1 day of January, 2013, in Paris, France.
`
`Darre 1
`
`ong
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`17
`
`Page17of17
`
`Page 17 of 17
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket