throbber
Trials@USPTO.GOV
`571-272-7822
`
`
`
`
`
`
`
`Paper No. 31
`Entered: February 5, 2015
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`APPLE, INC.,
`Petitioner,
`
`v.
`
`PERSONAL WEB TECHNOLOGIES, LLC,
`LEVEL 3 COMMUNICATIONS, LLC,
`Patent Owners.
`____________
`
`Cases IPR2013-00596
`Patent 7,802,310 B2
`____________
`
`Held: November 17, 2014
`____________
`
`
`Before KEVIN F. TURNER, JONI Y. CHANG, and MICHAEL R.
`ZECHER, Administrative Patent Judges.
`
`The above-entitled matter came on for hearing on Monday, November
`17, 2014, commencing at 1:01 p.m., at the U.S. Patent and Trademark
`Office, 600 Dulany Street, Alexandria, Virginia.
`
`
`
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`APPEARANCES:
`
`ON BEHALF OF THE PETITIONER:
`
`
`
`
`
`
`
`ON BEHALF OF PATENT OWNER:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`MICHAEL D. JAY, ESQUIRE
`Boies, Schiller & Flexner LLP
`401 Wilshire Boulevard
`Suite 850
`Santa Monica, California 90401
`
`JOSEPH A. RHOA, ESQUIRE
`Nixon & Vanderhye P.C.
`901 N. Glebe Road
`11th Floor
`Arlington, Virginia 22203
`
`
`
`
`
`
`
`
`
`
` P R O C E E D I N G S
`
`- - - - -
`
`JUDGE CHANG: Good afternoon. At this time I would
`
`like counsel to introduce yourselves and also your colleagues.
`
`MR. JAY: Good afternoon, Your Honors. My name is
`
`Michael Jay of Boies, Schiller & Flexner on behalf of Petitioner
`
`Apple. Along with me is Salvador Bezos of Sterne Kessler Goldstein
`
`& Fox and David Cornwell of the same firm, and behind me here is
`
`Cyndi Wheeler of Apple.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`
`
`
`
` 2
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`
`MR. RHOA: Good afternoon, Your Honors. Joe Rhoa on
`
`behalf of the Patent Owner and with me is Mickey Gill, also on behalf
`
`of Patent Owner.
`
`JUDGE CHANG: Welcome. Thank you.
`
`Judge Turner, are you okay there?
`
`JUDGE TURNER: I can hear everybody.
`
`JUDGE CHANG: Okay. Good. I think your voice is a
`
`little low. I just want to make sure that if you have any questions --
`
`JUDGE TURNER: I can always speak up.
`
`JUDGE CHANG: Okay. That sounds great. Thank you.
`
`JUDGE TURNER: Can you hear me better now?
`
`JUDGE CHANG: Yes. Thank you.
`
`JUDGE TURNER: I'll try to remember to speak up when
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`I'm asking my questions.
`
`15
`
`JUDGE CHANG: Okay. This is an oral hearing for the
`
`16
`
`case IPR2013-00596 involving Patent 7,802,310. The Board
`
`17
`
`instituted this Inter Partes Review on March 26, 2014 as to the Claims
`
`18
`
`24, 32, 70, 81, 82 and 86 of the patent.
`
`19
`
`Consistent with the Board's previous order in this case, each
`
`20
`
`party has one hour to present their arguments. The Petitioner will
`
`21
`
`proceed first to present its case as to the challenged claims and then
`
`22
`
`Petitioner may reserve rebuttal time.
`
`23
`
`Since the Patent Owner did not file any motion to amend, it
`
`24
`
`will respond to the Petitioner's case and you don't have any reserve
`
`25
`
`time, okay, of the rebuttal time.
`
`
`
`
`
` 3
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`So is there any demonstratives and please give a copy to the
`
`court reporter.
`
`MR. JAY: Yes, Your Honor. We provided slides last
`
`week. We have given a copy to the court reporter. We also have hard
`
`copies, if that would be helpful for Your Honors.
`
`JUDGE CHANG: Sure. That would be great. Thank you.
`
`MR. JAY: May I approach?
`
`JUDGE CHANG: Yes. Thank you.
`
`And just please note that demonstratives are not evidence
`
`10
`
`themselves. They are merely visual aids and if -- please identify the
`
`11
`
`specific slide number when doing the presentation so that the court
`
`12
`
`reporter can capture that and also for Judge Turner, who is sitting
`
`13
`
`remotely.
`
`14
`
`15
`
`So at this time -- oh, sure. Go ahead.
`
`MR. RHOA: Sorry, Your Honor. I just request permission
`
`16
`
`to ask counsel for a copy of the demonstratives.
`
`17
`
`18
`
`19
`
`JUDGE CHANG: Do you have a copy?
`
`MR. JAY: We have another copy that's under the projector.
`
`MR. RHOA: If you just want to confirm -- just confirm
`
`20
`
`orally that it's identical to what you served on us last week or so, that's
`
`21
`
`fine, too.
`
`22
`
`MR. JAY: Yeah, I believe that we had served slides on you
`
`23
`
`and then last week when we provided the slides, we switched around
`
`24
`
`the order of the last two slides, but they didn't change substantively.
`
`
`
`
`
` 4
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`
`MR. RHOA: If they're the same, if your representation is
`
`they are the same --
`
`MR. JAY: They are the same, absolutely.
`
`MR. RHOA: That's fine. Thank you. Sorry.
`
`JUDGE CHANG: No problem.
`
`Patent Owner, do you have any demonstratives?
`
`MR. RHOA: No, Your Honors.
`
`JUDGE CHANG: Okay. Thank you. You may proceed.
`
`MR. JAY: Good afternoon, Your Honors. I would like to
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`reserve 30 minutes for rebuttal, if I may. And as far as the slides that I
`
`11
`
`had handed you, I may not go through every slide that I've included,
`
`12
`
`but I think some of the slides may still be helpful for some
`
`13
`
`background information.
`
`14
`
`So starting from slide 2, we're here to talk about today is the
`
`15
`
`'310 patent, which is part of a large family of patents that Your
`
`16
`
`Honors have dealt with in other proceedings before. These patents we
`
`17
`
`can see in the summary of the invention describes that these patents
`
`18
`
`related to unique data identifiers that are based on the contents of data
`
`19
`
`in a data item. These identifiers are used throughout the '310 patent
`
`20
`
`and the other patents in the families for a number of basic file
`
`21
`
`management functions.
`
`22
`
`Moving on to slide 3, you see that the specification goes on
`
`23
`
`in the '310 patent, column 31, and just for ease of reference, the
`
`24
`
`portions that are up on the screen are also denoted in the bottom
`
`
`
`
`
` 5
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`left-hand corner of the slides, if Your Honors want to refer to the
`
`source material.
`
`So here we see that the specification for the '310 patent
`
`refers to the identifiers by a couple different names. One is
`
`substantially unique identifier. The other is true name and the
`
`specification makes clear a number of places that these terms are
`
`synonymous.
`
`Moving on to slide 6, I want to just briefly before we get
`
`into the substance of the references, just briefly discuss what appears
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`to be the only claim construction issue in dispute here.
`
`11
`
`Now, two of the six claims at issue here refer to the
`
`12
`
`identifier as a content-dependent name and, Your Honors, in the
`
`13
`
`decision instituting proceedings I construed that term to be an
`
`14
`
`identifier for a data item being based at least in part on a given
`
`15
`
`function of at least some bits in a particular sequence of bits of the
`
`16
`
`particular data item.
`
`17
`
`Now, Personal Web takes issue with this construction,
`
`18
`
`because the construction defines the content-dependent name as an
`
`19
`
`identifier. In Personal Web's view, something is not a name simply
`
`20
`
`because it is an identifier, so they contend that the term should be
`
`21
`
`construed differently. But, however, this disposition is directly
`
`22
`
`contradicted by Personal Web's own expert.
`
`23
`
`Turning to slide 8, what we have here is testimony from Dr.
`
`24
`
`Dewar. This is Personal Web's expert and this is Apple Exhibit 1035.
`
`
`
`
`
` 6
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`As we can see here, Dr. Dewar has testified that in the '310 patent
`
`name and identifier are used interchangeably.
`
`Looking at slide 9, we have an additional excerpt from Dr.
`
`Dewar in which he goes on to admit that the whole thrust of the
`
`patent, indeed, is that an identifier is a name.
`
`So moving on from claim construction to the particular
`
`references at issue here --
`
`JUDGE CHANG: Counsel, I have a question.
`
`MR. JAY: Yes.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`JUDGE CHANG: So could it be overlapping in certain
`
`11
`
`situations that an identifier could be a name or a name could be an
`
`12
`
`identifier?
`
`13
`
`MR. JAY: Absolutely. That's certainly our position that in
`
`14
`
`the '310 patent and the entire patent family, there is no distinction
`
`15
`
`whatsoever between a name and an identifier, that they're regularly
`
`16
`
`referred to as the same thing throughout.
`
`17
`
`18
`
`JUDGE CHANG: Okay.
`
`MR. JAY: So moving on to slide 10 or just moving on to
`
`19
`
`the references at issue here, first starting with Woodhill, I just wanted
`
`20
`
`to back up for a moment and talk briefly about the claims of the '310
`
`21
`
`patent that we're talking about here.
`
`22
`
`The challenged claims generally relate to, first, a request
`
`23
`
`from one computer to a second computer for a data item using a
`
`24
`
`content-based identifier for that data item. Second, a determination by
`
`25
`
`the second computer of whether the identifier corresponds to an entry
`
`
`
`
`
` 7
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`in a database. And then, third, the second computer then permitting
`
`access or not permitting access to the data item based on that
`
`determination. This is precisely what Woodhill describes.
`
`So moving on to slide 11, what we have here is the abstract
`
`of Woodhill and this explains that Woodhill discloses a distributed
`
`storage manager -- storage system that makes use of binary object
`
`identifiers to perform basic file management functions, such as
`
`identifying and accessing files and managing file backups.
`
`If we move on to the next slide, this is slide 12. What we
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`have up on the screen here is Woodhill Figure 1 and this is a
`
`11
`
`simplified representation of a network computer system on which the
`
`12
`
`described invention may be employed.
`
`13
`
`What we have here is a network and communication with a
`
`14
`
`plurality of local area networks with multiple user workstations and
`
`15
`
`local computers. You can see that over here and all of these local
`
`16
`
`computers and user workstations are connected by a network to a
`
`17
`
`remote backup file server 12.
`
`18
`
`Now, looking at slide 13, now this is where Woodhill
`
`19
`
`begins to describe the invention contained in the reference, and we see
`
`20
`
`here that on slide 13 that Woodhill describes the system of the
`
`21
`
`invention is operating through what's called a distributed storage
`
`22
`
`manager system. This is the program that embodies the various
`
`23
`
`inventions of Woodhill.
`
`24
`
`And we see in slide 14, which is a further description of the
`
`25
`
`system, that this distributed storage manager program views a file as a
`
`
`
`
`
` 8
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`collection of data streams. And from there, it then divides these data
`
`streams into one or more binary objects.
`
`Now, going on to slide 15, what we have here is Figure 3
`
`from the Woodhill reference and the Woodhill reference describes
`
`that the distributed storage manager program creates a file database on
`
`each of the local computers containing information on all of the files
`
`that are backed up, and what we see here is an example of what that
`
`database looks like and what information is contained in that database.
`
`So what we can see here is that for each binary object of
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`each file that's backed up, the distributed storage manager creates a
`
`11
`
`binary object identification record 58, and we can see that towards the
`
`12
`
`bottom of the slide here, this information here.
`
`13
`
`Now, a portion of this record, as Woodhill describes, is a
`
`14
`
`binary object identifier 74. We can see that here, these aspects right
`
`15
`
`there. So this binary object identifier 74 is made up of four fields,
`
`16
`
`three of which are a CRC value, an LRC value and a hash value, and
`
`17
`
`these are each strings of numbers generated by applying functions to
`
`18
`
`the contents of the binary object. Woodhill describes that in column
`
`19
`
`7, line 64, to column 8, line 33.
`
`20
`
`Now, moving on to slide 16 we see a description of the
`
`21
`
`binary object identifier in the specification of Woodhill and we see
`
`22
`
`here that Woodhill emphasizes that the binary object identifier 74 is
`
`23
`
`based on the contents of the binary object, such that the binary object
`
`24
`
`identifier changes when the contents of the binary object changes.
`
`
`
`
`
` 9
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`So as we see here, duplicate binary objects have identical
`
`binary object identifiers, even when on heterogeneous networks, and
`
`the chance of two binary objects being assigned the same identifier is
`
`indeed very small. You see that description here.
`
`So this is precisely the same concept we see with respect to
`
`the identifiers in the '310 patent claims. As the Board recognized,
`
`these binary object identifiers of Woodhill are content-based
`
`identifiers, content-based names and digital identifiers as described in
`
`the '310 patent.
`
`10
`
`Now, moving on to slide 17, Woodhill goes on after
`
`11
`
`discussing the binary objects and the binary object identifiers to
`
`12
`
`explain that it also functions at a granule level. We see here Woodhill
`
`13
`
`mentions that binary objects can be divided into smaller portions
`
`14
`
`referred to as granules.
`
`15
`
`Now, looking at slide 18, this is a further discussion of a
`
`16
`
`granularized file and talks about when the distributed storage manager
`
`17
`
`program processes a binary object that has been broken into granules,
`
`18
`
`the program calculates a contents identifier for each granule. This is
`
`19
`
`based on a CRC value and a hash value of the contents of the granule.
`
`20
`
`And the reason I had mentioned the granules is that the
`
`21
`
`granule procedure is the mechanism by which the file transfer takes
`
`22
`
`place in the backup restore procedure that we rely on for the
`
`23
`
`disclosure of the claims of the '310 patent.
`
`24
`
`Now, I'd like to walk through the claims of the '310 patent
`
`25
`
`and discussing Woodhill and for ease of reference I'm going to discuss
`
`
`
`
`
` 10
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`Claim 70 of the '310 patent, as the remainder are essentially just
`
`permutations of that one claim, but I'm certainly happy to answer
`
`questions about any of the other claims, if Your Honors have them.
`
`So I'm turning now to slide 19, and what we have here in
`
`the left-hand column is the preamble to the '310 patent Claim 70,
`
`which describes a system and method for the distributed management
`
`of data on a network computer system of at least two computers.
`
`And in the right-hand column we have the abstract of
`
`Woodhill and as we saw in both Figure 1 that I had put up earlier of
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`Woodhill as well as in the abstract here, we can see that Woodhill,
`
`11
`
`indeed, discloses this system for distributed management of data on a
`
`12
`
`network computer system.
`
`13
`
`Now, moving on to slide 20, what we have here is the first
`
`14
`
`limitation in the left-hand column of Claim 70, and essentially what
`
`15
`
`this is talking about is the claim requires a request from a first
`
`16
`
`computer to a second computer, that request comprising a
`
`17
`
`content-based identifier.
`
`18
`
`And this is clearly disclosed, as we can see, in these
`
`19
`
`portions of Woodhill on the right-hand column, both from column 17
`
`20
`
`as well as from column 7 of Woodhill. We can see that the Woodhill
`
`21
`
`system clearly discloses this request in its restoring -- in its process for
`
`22
`
`restoring previous versions of a binary object.
`
`23
`
`Now, under this process described in Woodhill, the
`
`24
`
`distributed storage manager program initiates an update request from
`
`25
`
`the local computer to the remote backup file server, as we see here,
`
`
`
`
`
` 11
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`and this update request includes the binary object identification record
`
`58 for the version of the binary object that the local computer wants
`
`restored.
`
`Now, just going back for a moment to slide 15, as I show
`
`here, the binary object identification record 58 includes the binary
`
`object identifier 74, which is the unique identifier for the binary
`
`object. It's down here.
`
`Just going forward to slide 21, we see this is testimony
`
`again from Dr. Dewar, Personal Web's expert, Apple Exhibit 1035, in
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`which Dr. Dewar has confirmed that the binary object identification
`
`11
`
`record always includes the binary object identifier.
`
`12
`
`Moving on to slide 22, what we see here is the next
`
`13
`
`limitation of Claim 70 of the '310 patent, and this requires that the
`
`14
`
`computer receiving the request make a determination whether the
`
`15
`
`content-based identifier for the particular data item corresponds to an
`
`16
`
`entry and a database made up of a plurality of content-based
`
`17
`
`identifiers.
`
`18
`
`And in the right-hand column here, what we have is a
`
`19
`
`portion of Dr. Goldberg's declaration, pages 34 and 35, in which Dr.
`
`20
`
`Goldberg states that to determine what needs to be restored by the
`
`21
`
`update request received from the local computer, the remote backup
`
`22
`
`file server must be able to reference the local files using the binary
`
`23
`
`object identifiers.
`
`24
`
`And we see further explanation of that in Dr. Goldberg's
`
`25
`
`deposition, which is Personal Web Exhibit 2015, and I don't have it up
`
`
`
`
`
` 12
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`on the screen, but that deposition Mr. Rhoa asked, in Woodhill's
`
`granularization process, is there ever any comparison involving a
`
`binary object identifier that is described? Answer: Oh, absolutely.
`
`Question: Where, where does Woodhill describe ever making a
`
`comparison with a binary object identifier in the granularization
`
`procedure?
`
`And this is -- sorry, I should have mentioned this. This is
`
`on pages 42, starting at line 22, again, in Personal Web Exhibit 2015.
`
`And Dr. Goldberg responds, the backup server has a database of
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`binary object identifiers and that's described -- and I'll find that if you
`
`11
`
`want. If I provide you a binary object identifier for an object that I
`
`12
`
`want, for you to find that in your database you need to perform a
`
`13
`
`comparison of the identifier with the identifiers in your database.
`
`14
`
`And Dr. Goldberg went on or Mr. Rhoa asked another
`
`15
`
`question. So your testimony is that in Woodhill, if you have record
`
`16
`
`58, your testimony is that there's no way the other fields in the binary
`
`17
`
`object identification record 58 would be used to locate that binary
`
`18
`
`object. Now I'm reading from page 44 of Dr. Goldberg's deposition.
`
`19
`
`And Dr. Goldberg says, that's my testimony and the reason
`
`20
`
`is that the other fields cannot tell you what object it is that you want.
`
`21
`
`What identifies the object is the binary object identifier 74. Nothing
`
`22
`
`about the rest of that information is specific to that object. And that
`
`23
`
`last portion was pages 44, lines 13, to page 45, line 3.
`
`24
`
`We also see in Woodhill itself, if we look to column 9 of
`
`25
`
`Woodhill, starting at line 14, there's a discussion of how the binary
`
`
`
`
`
` 13
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`object identifier 74 calculated in step 138 are compared against their
`
`counterparts in file database 25. So we also see some disclosure in
`
`Woodhill talking about a comparison of a binary object identifier to a
`
`database, which is certainly what we're talking about here with this
`
`limitation Claim 70.
`
`So Personal Web in its papers says that Woodhill expressly
`
`explains that in the backup restore process of column 17 that we rely
`
`on the determination of whether the backup file server has the binary
`
`object that is the subject of the request is done using other means, not
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`the binary object identifier. That's just wrong.
`
`11
`
`What Personal Web points to are portions of Woodhill that
`
`12
`
`discuss different processes, not the backup restore process of
`
`13
`
`Woodhill that discloses the claim of the '310 patent. They point to an
`
`14
`
`entirely different process and it makes sense that these other processes
`
`15
`
`operate differently.
`
`16
`
`For example, Personal Web cites to a portion of Woodhill
`
`17
`
`discussing the use of a binary object identification record 58 in the
`
`18
`
`context of a compression routine. This compression routine makes
`
`19
`
`use of other aspects of the binary object identification record 58, such
`
`20
`
`as the binary object's location, but that makes perfect sense in the
`
`21
`
`context of file compression.
`
`22
`
`To compress a binary object on a local computer, you must
`
`23
`
`know things, such as where that file was located in memory, because
`
`24
`
`you need to locate the data to compress it. There's no need in that
`
`25
`
`process for a unique identifier for the binary object, but that's clearly
`
`
`
`
`
` 14
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`different than what we're talking about here for the backup restore
`
`procedure when you're requesting a binary object from another
`
`computer.
`
`Of course, in that circumstance you would necessarily use
`
`the unique content-based identifier for the data item you're requesting.
`
`Indeed, this is the whole point of the unique content-based identifier
`
`as described in both Woodhill and the '310 patent.
`
`Now, moving on to slide 23, here we see the last limitation
`
`of Claim 70 talking about based at least in part on the determination in
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`the previous step in selectively permitting the data item to be accessed
`
`11
`
`by one or more computers other than the computer that had received
`
`12
`
`the request.
`
`13
`
`So, here, we see on the right-hand side an explanation. If
`
`14
`
`the binary object of the request, the subject of the request matched a
`
`15
`
`binary object identifier in the database, the binary object is in access.
`
`16
`
`So what would happen is the backup file server would
`
`17
`
`permit the local computer to back up -- to access the binary object
`
`18
`
`using the restore process, and the way that happens, and we can see
`
`19
`
`here, discussion of granules, essentially the remote backup file server
`
`20
`
`would send granules back to the local computer so that the local
`
`21
`
`computer can assemble the binary object.
`
`22
`
`If the backup file server determines that the binary object
`
`23
`
`identifier in the request does not match the binary object identifier in
`
`24
`
`his database, access would not be provided to the local computer.
`
`
`
`
`
` 15
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`Now, Personal Web argues that Woodhill does not disclose
`
`its limitation, because granules that are sent back to the local
`
`computer in response to this update request are not data items
`
`identified by the identifier in the request, but I believe that Personal
`
`Web misunderstands Apple's invalidity argument.
`
`What they ignore is that our challenge is based primarily on
`
`Woodhill at the binary object level. Binary object identifier or the
`
`binary object identifier included in the update request is the unique
`
`identifier for the binary object that is restored at the local computer.
`
`10
`
`So Personal Web's argument about the granules is really irrelevant at
`
`11
`
`the binary object level.
`
`12
`
`Personal Web also argues that this limitation is not met,
`
`13
`
`because the restore procedure does not send a whole binary object
`
`14
`
`back to the local computer, but this is not a valid argument for a few
`
`15
`
`reasons.
`
`16
`
`First, the claims in the '310 patent that we're talking about
`
`17
`
`here do not require the second computer to send an entire binary
`
`18
`
`object back to the requesting computer. The claims require only that
`
`19
`
`the second computer permit or allow access to the data item. So
`
`20
`
`essentially what Personal Web is trying to do here is add a limitation
`
`21
`
`that the subject data item be sent back in its entirety to the requesting
`
`22
`
`computer.
`
`23
`
`Second, if every granule is changed, the backup file server
`
`24
`
`will in that instance actually provide the entire binary object to the
`
`25
`
`requesting computer, albeit in a piecemeal fashion, but that certainly
`
`
`
`
`
` 16
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`would take place and, you know, as I mentioned before the claims do
`
`not specify how the binary object should be provided or how access
`
`needs to be provided.
`
`And then, third, and the last thing is that Woodhill does not
`
`require that a binary object even be divided into multiple granules
`
`where you have a smaller file. So in that case where a binary object is
`
`changed, the entire binary object consisting of I guess a single granule
`
`would be provided to the requesting computer.
`
`So moving on to slide 24, as we put in our petition our
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`position is certainly that Woodhill either anticipates or renders
`
`11
`
`obvious the claims of the '310 patent, but as the Board recognized in
`
`12
`
`its decision Stefik provides an even stronger disclosure of this last
`
`13
`
`element of the claims of the '310 patent, the selectively allowing or
`
`14
`
`authorizing access to a data item.
`
`15
`
`Just going to slide 27, what we see here in the specification
`
`16
`
`of Stefik is that Stefik addresses the problem of preventing
`
`17
`
`unauthorized access to digital works. Actually, I'm sorry, I think I'm
`
`18
`
`looking at the wrong slide. Actually looking at slide 26 now, I
`
`19
`
`apologize.
`
`20
`
`So the solution that Stefik makes for -- the solution that
`
`21
`
`Stefik proposes for this problem is a system that allows only licensed
`
`22
`
`or authorized access by parties who have paid for or, otherwise,
`
`23
`
`entitled to access digital work. So this discloses receiving a request
`
`24
`
`for access to particular digital work using what it calls digital tickets,
`
`
`
`
`
` 17
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`and a ticket is merely the indicator that the ticket holder has the rights
`
`to access digital works.
`
`So looking at slide 27, this describes the process that we see
`
`in Stefik where basically a server repository receives a request for
`
`digital work and the server repository then decides whether or not to
`
`allow access to the particular digital work, if it's based on a
`
`determination of whether access to that work or whether that
`
`particular requester has authorization to access that work.
`
`So here in Stefik we have a clear disclosure of selective
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`access to digital works, which, of course, are data items and nowhere
`
`11
`
`in Personal Web's paper does it dispute that.
`
`12
`
`Now, instead, what Personal Web argues is that a person of
`
`13
`
`ordinary skill in the art would not have combined Woodhill and
`
`14
`
`Stefik, but as the Board found, a person of ordinary skill in the art
`
`15
`
`reading Stefik and Woodhill would most certainly have allowed for
`
`16
`
`the selective access features of Stefik to be used with Woodhill's
`
`17
`
`content-dependent identifiers' features and, indeed, this combination
`
`18
`
`makes perfect sense.
`
`19
`
`We have two references that are in the same field, file
`
`20
`
`management on a network system, two references that are addressing
`
`21
`
`the same problem, secure access to data, and then each of these two
`
`22
`
`references, Stefik and Woodhill, certainly take different approaches or
`
`23
`
`they approach this problem in different ways, but they do so in a way
`
`24
`
`that lends itself to a combination with the other in the way that the
`
`25
`
`Board described in the decision, again, using the unique
`
`
`
`
`
` 18
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`content-dependent identifiers of Woodhill with the selective access
`
`concept of Stefik.
`
`Now, Personal Web argues that Woodhill and Stefik should
`
`not be combined because of alleged incompatibilities between details
`
`of the two references and what this argument really amounts to is
`
`them saying that the combination does not work where you take every
`
`piece of Woodhill and combine it with every detail of Stefik, but that's
`
`really not what we're doing here, and in combining two references the
`
`law does not require that you take every aspect of one reference and
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`combine it with every aspect of another reference.
`
`11
`
`So what we're doing here is using Stefik only for disclosure
`
`12
`
`at a very high level of this selective access concept. The claims of the
`
`13
`
`'310 patent, indeed, are very high-level claims. They don't get into the
`
`14
`
`details of how the selective access piece takes place.
`
`15
`
`Stefik itself, though, is very detailed. Now, to render
`
`16
`
`obvious the claims of the '310 patent, we need not import all these
`
`17
`
`details into Woodhill. And even if we did import these details from
`
`18
`
`Stefik into Woodhill, they're certainly not actually incompatible with
`
`19
`
`Woodhill nor do they, as Personal Web suggests, teach away from this
`
`20
`
`combination.
`
`21
`
`Personal Web is essentially trying to argue that really
`
`22
`
`there's more to these '310 patent claims than there really are. But if
`
`23
`
`we look at the actual claim language, we see that Woodhill in
`
`24
`
`combination with Stefik discloses the claims and a person of ordinary
`
`25
`
`skill in the art would certainly have made this combination.
`
`
`
`
`
` 19
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`So I have nothing further at this moment, but I'm certainly
`
`happy to answer questions if any of Your Honors have questions.
`
`JUDGE ZECHER: Mr. Jay, I have a question for you.
`
`How would you respond to Personal Web's argument that taking the
`
`teaching of Woodhill of the binary object identifier and combining
`
`that with this selective permitting access or authorization of Stefik,
`
`how would -- their argument is basically that these elements would
`
`not be used for their intended purpose, do not serve their intended
`
`function?
`
`10
`
`So the way I read that is basically I think what they're
`
`11
`
`saying is that the Woodhill binary object identifier wouldn't serve its
`
`12
`
`intended purpose if combined with the aspects that your combination
`
`13
`
`puts together with Stefik. Can you address that in a little more detail
`
`14
`
`for us and why you think that argument may be incorrect?
`
`15
`
`MR. JAY: Sure. I mean, I think Personal Web is
`
`16
`
`completely wrong there. I don't think they actually explain why or
`
`17
`
`how the binary object identifiers, for instance if you make this
`
`18
`
`combination, wouldn't be used for their intended purpose.
`
`19
`
`I mean, Woodhill clearly explains that these binary object
`
`20
`
`identifiers are used to identify a binary object. We have a request.
`
`21
`
`That request includes the binary object identifier that the local
`
`22
`
`computer wants access to, and then the next limitation of the '310
`
`23
`
`claim talks about its determination using this binary object identifier.
`
`24
`
`That certainly takes place.
`
`
`
`
`
` 20
`
`

`

`Case IPR2013-00596
`Patent 7,802,310
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`And then we're going on from there and we're saying that
`
`taking this selective access concept from Stefik and all we're doing is
`
`taking that procedure, which is a separate procedure from sort of the
`
`first two parts, the request and the determination, and putting that with
`
`this portion of Woodhill that is already in place. I don't see any
`
`reason that you would need to change what takes place in Woodhill or
`
`why that would in any way be incompatible with what we have in
`
`Stefik.
`
`I mean, I think they point to in Stefik we have a situation
`
`10
`
`where there's a mention of unique identifiers, but those unique
`
`11
`
`identifiers are not used for this same purpose, but I think what they're
`
`12
`
`confusing is that the unique identifiers in Stefik, for instance, are not
`
`13
`
`conten

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket