`571-272-7822
`
`
`
`
`
`
`
`Paper No. 31
`Entered: February 5, 2015
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`APPLE, INC.,
`Petitioner,
`
`v.
`
`PERSONAL WEB TECHNOLOGIES, LLC,
`LEVEL 3 COMMUNICATIONS, LLC,
`Patent Owners.
`____________
`
`Cases IPR2013-00596
`Patent 7,802,310 B2
`____________
`
`Held: November 17, 2014
`____________
`
`
`Before KEVIN F. TURNER, JONI Y. CHANG, and MICHAEL R.
`ZECHER, Administrative Patent Judges.
`
`The above-entitled matter came on for hearing on Monday, November
`17, 2014, commencing at 1:01 p.m., at the U.S. Patent and Trademark
`Office, 600 Dulany Street, Alexandria, Virginia.
`
`
`
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`APPEARANCES:
`
`ON BEHALF OF THE PETITIONER:
`
`
`
`
`
`
`
`ON BEHALF OF PATENT OWNER:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`MICHAEL D. JAY, ESQUIRE
`Boies, Schiller & Flexner LLP
`401 Wilshire Boulevard
`Suite 850
`Santa Monica, California 90401
`
`JOSEPH A. RHOA, ESQUIRE
`Nixon & Vanderhye P.C.
`901 N. Glebe Road
`11th Floor
`Arlington, Virginia 22203
`
`
`
`
`
`
`
`
`
`
` P R O C E E D I N G S
`
`- - - - -
`
`JUDGE CHANG: Good afternoon. At this time I would
`
`like counsel to introduce yourselves and also your colleagues.
`
`MR. JAY: Good afternoon, Your Honors. My name is
`
`Michael Jay of Boies, Schiller & Flexner on behalf of Petitioner
`
`Apple. Along with me is Salvador Bezos of Sterne Kessler Goldstein
`
`& Fox and David Cornwell of the same firm, and behind me here is
`
`Cyndi Wheeler of Apple.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`
`
`
`
` 2
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`
`MR. RHOA: Good afternoon, Your Honors. Joe Rhoa on
`
`behalf of the Patent Owner and with me is Mickey Gill, also on behalf
`
`of Patent Owner.
`
`JUDGE CHANG: Welcome. Thank you.
`
`Judge Turner, are you okay there?
`
`JUDGE TURNER: I can hear everybody.
`
`JUDGE CHANG: Okay. Good. I think your voice is a
`
`little low. I just want to make sure that if you have any questions --
`
`JUDGE TURNER: I can always speak up.
`
`JUDGE CHANG: Okay. That sounds great. Thank you.
`
`JUDGE TURNER: Can you hear me better now?
`
`JUDGE CHANG: Yes. Thank you.
`
`JUDGE TURNER: I'll try to remember to speak up when
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`I'm asking my questions.
`
`15
`
`JUDGE CHANG: Okay. This is an oral hearing for the
`
`16
`
`case IPR2013-00596 involving Patent 7,802,310. The Board
`
`17
`
`instituted this Inter Partes Review on March 26, 2014 as to the Claims
`
`18
`
`24, 32, 70, 81, 82 and 86 of the patent.
`
`19
`
`Consistent with the Board's previous order in this case, each
`
`20
`
`party has one hour to present their arguments. The Petitioner will
`
`21
`
`proceed first to present its case as to the challenged claims and then
`
`22
`
`Petitioner may reserve rebuttal time.
`
`23
`
`Since the Patent Owner did not file any motion to amend, it
`
`24
`
`will respond to the Petitioner's case and you don't have any reserve
`
`25
`
`time, okay, of the rebuttal time.
`
`
`
`
`
` 3
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`So is there any demonstratives and please give a copy to the
`
`court reporter.
`
`MR. JAY: Yes, Your Honor. We provided slides last
`
`week. We have given a copy to the court reporter. We also have hard
`
`copies, if that would be helpful for Your Honors.
`
`JUDGE CHANG: Sure. That would be great. Thank you.
`
`MR. JAY: May I approach?
`
`JUDGE CHANG: Yes. Thank you.
`
`And just please note that demonstratives are not evidence
`
`10
`
`themselves. They are merely visual aids and if -- please identify the
`
`11
`
`specific slide number when doing the presentation so that the court
`
`12
`
`reporter can capture that and also for Judge Turner, who is sitting
`
`13
`
`remotely.
`
`14
`
`15
`
`So at this time -- oh, sure. Go ahead.
`
`MR. RHOA: Sorry, Your Honor. I just request permission
`
`16
`
`to ask counsel for a copy of the demonstratives.
`
`17
`
`18
`
`19
`
`JUDGE CHANG: Do you have a copy?
`
`MR. JAY: We have another copy that's under the projector.
`
`MR. RHOA: If you just want to confirm -- just confirm
`
`20
`
`orally that it's identical to what you served on us last week or so, that's
`
`21
`
`fine, too.
`
`22
`
`MR. JAY: Yeah, I believe that we had served slides on you
`
`23
`
`and then last week when we provided the slides, we switched around
`
`24
`
`the order of the last two slides, but they didn't change substantively.
`
`
`
`
`
` 4
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`
`MR. RHOA: If they're the same, if your representation is
`
`they are the same --
`
`MR. JAY: They are the same, absolutely.
`
`MR. RHOA: That's fine. Thank you. Sorry.
`
`JUDGE CHANG: No problem.
`
`Patent Owner, do you have any demonstratives?
`
`MR. RHOA: No, Your Honors.
`
`JUDGE CHANG: Okay. Thank you. You may proceed.
`
`MR. JAY: Good afternoon, Your Honors. I would like to
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`reserve 30 minutes for rebuttal, if I may. And as far as the slides that I
`
`11
`
`had handed you, I may not go through every slide that I've included,
`
`12
`
`but I think some of the slides may still be helpful for some
`
`13
`
`background information.
`
`14
`
`So starting from slide 2, we're here to talk about today is the
`
`15
`
`'310 patent, which is part of a large family of patents that Your
`
`16
`
`Honors have dealt with in other proceedings before. These patents we
`
`17
`
`can see in the summary of the invention describes that these patents
`
`18
`
`related to unique data identifiers that are based on the contents of data
`
`19
`
`in a data item. These identifiers are used throughout the '310 patent
`
`20
`
`and the other patents in the families for a number of basic file
`
`21
`
`management functions.
`
`22
`
`Moving on to slide 3, you see that the specification goes on
`
`23
`
`in the '310 patent, column 31, and just for ease of reference, the
`
`24
`
`portions that are up on the screen are also denoted in the bottom
`
`
`
`
`
` 5
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`left-hand corner of the slides, if Your Honors want to refer to the
`
`source material.
`
`So here we see that the specification for the '310 patent
`
`refers to the identifiers by a couple different names. One is
`
`substantially unique identifier. The other is true name and the
`
`specification makes clear a number of places that these terms are
`
`synonymous.
`
`Moving on to slide 6, I want to just briefly before we get
`
`into the substance of the references, just briefly discuss what appears
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`to be the only claim construction issue in dispute here.
`
`11
`
`Now, two of the six claims at issue here refer to the
`
`12
`
`identifier as a content-dependent name and, Your Honors, in the
`
`13
`
`decision instituting proceedings I construed that term to be an
`
`14
`
`identifier for a data item being based at least in part on a given
`
`15
`
`function of at least some bits in a particular sequence of bits of the
`
`16
`
`particular data item.
`
`17
`
`Now, Personal Web takes issue with this construction,
`
`18
`
`because the construction defines the content-dependent name as an
`
`19
`
`identifier. In Personal Web's view, something is not a name simply
`
`20
`
`because it is an identifier, so they contend that the term should be
`
`21
`
`construed differently. But, however, this disposition is directly
`
`22
`
`contradicted by Personal Web's own expert.
`
`23
`
`Turning to slide 8, what we have here is testimony from Dr.
`
`24
`
`Dewar. This is Personal Web's expert and this is Apple Exhibit 1035.
`
`
`
`
`
` 6
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`As we can see here, Dr. Dewar has testified that in the '310 patent
`
`name and identifier are used interchangeably.
`
`Looking at slide 9, we have an additional excerpt from Dr.
`
`Dewar in which he goes on to admit that the whole thrust of the
`
`patent, indeed, is that an identifier is a name.
`
`So moving on from claim construction to the particular
`
`references at issue here --
`
`JUDGE CHANG: Counsel, I have a question.
`
`MR. JAY: Yes.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`JUDGE CHANG: So could it be overlapping in certain
`
`11
`
`situations that an identifier could be a name or a name could be an
`
`12
`
`identifier?
`
`13
`
`MR. JAY: Absolutely. That's certainly our position that in
`
`14
`
`the '310 patent and the entire patent family, there is no distinction
`
`15
`
`whatsoever between a name and an identifier, that they're regularly
`
`16
`
`referred to as the same thing throughout.
`
`17
`
`18
`
`JUDGE CHANG: Okay.
`
`MR. JAY: So moving on to slide 10 or just moving on to
`
`19
`
`the references at issue here, first starting with Woodhill, I just wanted
`
`20
`
`to back up for a moment and talk briefly about the claims of the '310
`
`21
`
`patent that we're talking about here.
`
`22
`
`The challenged claims generally relate to, first, a request
`
`23
`
`from one computer to a second computer for a data item using a
`
`24
`
`content-based identifier for that data item. Second, a determination by
`
`25
`
`the second computer of whether the identifier corresponds to an entry
`
`
`
`
`
` 7
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`in a database. And then, third, the second computer then permitting
`
`access or not permitting access to the data item based on that
`
`determination. This is precisely what Woodhill describes.
`
`So moving on to slide 11, what we have here is the abstract
`
`of Woodhill and this explains that Woodhill discloses a distributed
`
`storage manager -- storage system that makes use of binary object
`
`identifiers to perform basic file management functions, such as
`
`identifying and accessing files and managing file backups.
`
`If we move on to the next slide, this is slide 12. What we
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`have up on the screen here is Woodhill Figure 1 and this is a
`
`11
`
`simplified representation of a network computer system on which the
`
`12
`
`described invention may be employed.
`
`13
`
`What we have here is a network and communication with a
`
`14
`
`plurality of local area networks with multiple user workstations and
`
`15
`
`local computers. You can see that over here and all of these local
`
`16
`
`computers and user workstations are connected by a network to a
`
`17
`
`remote backup file server 12.
`
`18
`
`Now, looking at slide 13, now this is where Woodhill
`
`19
`
`begins to describe the invention contained in the reference, and we see
`
`20
`
`here that on slide 13 that Woodhill describes the system of the
`
`21
`
`invention is operating through what's called a distributed storage
`
`22
`
`manager system. This is the program that embodies the various
`
`23
`
`inventions of Woodhill.
`
`24
`
`And we see in slide 14, which is a further description of the
`
`25
`
`system, that this distributed storage manager program views a file as a
`
`
`
`
`
` 8
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`collection of data streams. And from there, it then divides these data
`
`streams into one or more binary objects.
`
`Now, going on to slide 15, what we have here is Figure 3
`
`from the Woodhill reference and the Woodhill reference describes
`
`that the distributed storage manager program creates a file database on
`
`each of the local computers containing information on all of the files
`
`that are backed up, and what we see here is an example of what that
`
`database looks like and what information is contained in that database.
`
`So what we can see here is that for each binary object of
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`each file that's backed up, the distributed storage manager creates a
`
`11
`
`binary object identification record 58, and we can see that towards the
`
`12
`
`bottom of the slide here, this information here.
`
`13
`
`Now, a portion of this record, as Woodhill describes, is a
`
`14
`
`binary object identifier 74. We can see that here, these aspects right
`
`15
`
`there. So this binary object identifier 74 is made up of four fields,
`
`16
`
`three of which are a CRC value, an LRC value and a hash value, and
`
`17
`
`these are each strings of numbers generated by applying functions to
`
`18
`
`the contents of the binary object. Woodhill describes that in column
`
`19
`
`7, line 64, to column 8, line 33.
`
`20
`
`Now, moving on to slide 16 we see a description of the
`
`21
`
`binary object identifier in the specification of Woodhill and we see
`
`22
`
`here that Woodhill emphasizes that the binary object identifier 74 is
`
`23
`
`based on the contents of the binary object, such that the binary object
`
`24
`
`identifier changes when the contents of the binary object changes.
`
`
`
`
`
` 9
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`So as we see here, duplicate binary objects have identical
`
`binary object identifiers, even when on heterogeneous networks, and
`
`the chance of two binary objects being assigned the same identifier is
`
`indeed very small. You see that description here.
`
`So this is precisely the same concept we see with respect to
`
`the identifiers in the '310 patent claims. As the Board recognized,
`
`these binary object identifiers of Woodhill are content-based
`
`identifiers, content-based names and digital identifiers as described in
`
`the '310 patent.
`
`10
`
`Now, moving on to slide 17, Woodhill goes on after
`
`11
`
`discussing the binary objects and the binary object identifiers to
`
`12
`
`explain that it also functions at a granule level. We see here Woodhill
`
`13
`
`mentions that binary objects can be divided into smaller portions
`
`14
`
`referred to as granules.
`
`15
`
`Now, looking at slide 18, this is a further discussion of a
`
`16
`
`granularized file and talks about when the distributed storage manager
`
`17
`
`program processes a binary object that has been broken into granules,
`
`18
`
`the program calculates a contents identifier for each granule. This is
`
`19
`
`based on a CRC value and a hash value of the contents of the granule.
`
`20
`
`And the reason I had mentioned the granules is that the
`
`21
`
`granule procedure is the mechanism by which the file transfer takes
`
`22
`
`place in the backup restore procedure that we rely on for the
`
`23
`
`disclosure of the claims of the '310 patent.
`
`24
`
`Now, I'd like to walk through the claims of the '310 patent
`
`25
`
`and discussing Woodhill and for ease of reference I'm going to discuss
`
`
`
`
`
` 10
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`Claim 70 of the '310 patent, as the remainder are essentially just
`
`permutations of that one claim, but I'm certainly happy to answer
`
`questions about any of the other claims, if Your Honors have them.
`
`So I'm turning now to slide 19, and what we have here in
`
`the left-hand column is the preamble to the '310 patent Claim 70,
`
`which describes a system and method for the distributed management
`
`of data on a network computer system of at least two computers.
`
`And in the right-hand column we have the abstract of
`
`Woodhill and as we saw in both Figure 1 that I had put up earlier of
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`Woodhill as well as in the abstract here, we can see that Woodhill,
`
`11
`
`indeed, discloses this system for distributed management of data on a
`
`12
`
`network computer system.
`
`13
`
`Now, moving on to slide 20, what we have here is the first
`
`14
`
`limitation in the left-hand column of Claim 70, and essentially what
`
`15
`
`this is talking about is the claim requires a request from a first
`
`16
`
`computer to a second computer, that request comprising a
`
`17
`
`content-based identifier.
`
`18
`
`And this is clearly disclosed, as we can see, in these
`
`19
`
`portions of Woodhill on the right-hand column, both from column 17
`
`20
`
`as well as from column 7 of Woodhill. We can see that the Woodhill
`
`21
`
`system clearly discloses this request in its restoring -- in its process for
`
`22
`
`restoring previous versions of a binary object.
`
`23
`
`Now, under this process described in Woodhill, the
`
`24
`
`distributed storage manager program initiates an update request from
`
`25
`
`the local computer to the remote backup file server, as we see here,
`
`
`
`
`
` 11
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`and this update request includes the binary object identification record
`
`58 for the version of the binary object that the local computer wants
`
`restored.
`
`Now, just going back for a moment to slide 15, as I show
`
`here, the binary object identification record 58 includes the binary
`
`object identifier 74, which is the unique identifier for the binary
`
`object. It's down here.
`
`Just going forward to slide 21, we see this is testimony
`
`again from Dr. Dewar, Personal Web's expert, Apple Exhibit 1035, in
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`which Dr. Dewar has confirmed that the binary object identification
`
`11
`
`record always includes the binary object identifier.
`
`12
`
`Moving on to slide 22, what we see here is the next
`
`13
`
`limitation of Claim 70 of the '310 patent, and this requires that the
`
`14
`
`computer receiving the request make a determination whether the
`
`15
`
`content-based identifier for the particular data item corresponds to an
`
`16
`
`entry and a database made up of a plurality of content-based
`
`17
`
`identifiers.
`
`18
`
`And in the right-hand column here, what we have is a
`
`19
`
`portion of Dr. Goldberg's declaration, pages 34 and 35, in which Dr.
`
`20
`
`Goldberg states that to determine what needs to be restored by the
`
`21
`
`update request received from the local computer, the remote backup
`
`22
`
`file server must be able to reference the local files using the binary
`
`23
`
`object identifiers.
`
`24
`
`And we see further explanation of that in Dr. Goldberg's
`
`25
`
`deposition, which is Personal Web Exhibit 2015, and I don't have it up
`
`
`
`
`
` 12
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`on the screen, but that deposition Mr. Rhoa asked, in Woodhill's
`
`granularization process, is there ever any comparison involving a
`
`binary object identifier that is described? Answer: Oh, absolutely.
`
`Question: Where, where does Woodhill describe ever making a
`
`comparison with a binary object identifier in the granularization
`
`procedure?
`
`And this is -- sorry, I should have mentioned this. This is
`
`on pages 42, starting at line 22, again, in Personal Web Exhibit 2015.
`
`And Dr. Goldberg responds, the backup server has a database of
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`binary object identifiers and that's described -- and I'll find that if you
`
`11
`
`want. If I provide you a binary object identifier for an object that I
`
`12
`
`want, for you to find that in your database you need to perform a
`
`13
`
`comparison of the identifier with the identifiers in your database.
`
`14
`
`And Dr. Goldberg went on or Mr. Rhoa asked another
`
`15
`
`question. So your testimony is that in Woodhill, if you have record
`
`16
`
`58, your testimony is that there's no way the other fields in the binary
`
`17
`
`object identification record 58 would be used to locate that binary
`
`18
`
`object. Now I'm reading from page 44 of Dr. Goldberg's deposition.
`
`19
`
`And Dr. Goldberg says, that's my testimony and the reason
`
`20
`
`is that the other fields cannot tell you what object it is that you want.
`
`21
`
`What identifies the object is the binary object identifier 74. Nothing
`
`22
`
`about the rest of that information is specific to that object. And that
`
`23
`
`last portion was pages 44, lines 13, to page 45, line 3.
`
`24
`
`We also see in Woodhill itself, if we look to column 9 of
`
`25
`
`Woodhill, starting at line 14, there's a discussion of how the binary
`
`
`
`
`
` 13
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`object identifier 74 calculated in step 138 are compared against their
`
`counterparts in file database 25. So we also see some disclosure in
`
`Woodhill talking about a comparison of a binary object identifier to a
`
`database, which is certainly what we're talking about here with this
`
`limitation Claim 70.
`
`So Personal Web in its papers says that Woodhill expressly
`
`explains that in the backup restore process of column 17 that we rely
`
`on the determination of whether the backup file server has the binary
`
`object that is the subject of the request is done using other means, not
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`the binary object identifier. That's just wrong.
`
`11
`
`What Personal Web points to are portions of Woodhill that
`
`12
`
`discuss different processes, not the backup restore process of
`
`13
`
`Woodhill that discloses the claim of the '310 patent. They point to an
`
`14
`
`entirely different process and it makes sense that these other processes
`
`15
`
`operate differently.
`
`16
`
`For example, Personal Web cites to a portion of Woodhill
`
`17
`
`discussing the use of a binary object identification record 58 in the
`
`18
`
`context of a compression routine. This compression routine makes
`
`19
`
`use of other aspects of the binary object identification record 58, such
`
`20
`
`as the binary object's location, but that makes perfect sense in the
`
`21
`
`context of file compression.
`
`22
`
`To compress a binary object on a local computer, you must
`
`23
`
`know things, such as where that file was located in memory, because
`
`24
`
`you need to locate the data to compress it. There's no need in that
`
`25
`
`process for a unique identifier for the binary object, but that's clearly
`
`
`
`
`
` 14
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`different than what we're talking about here for the backup restore
`
`procedure when you're requesting a binary object from another
`
`computer.
`
`Of course, in that circumstance you would necessarily use
`
`the unique content-based identifier for the data item you're requesting.
`
`Indeed, this is the whole point of the unique content-based identifier
`
`as described in both Woodhill and the '310 patent.
`
`Now, moving on to slide 23, here we see the last limitation
`
`of Claim 70 talking about based at least in part on the determination in
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`the previous step in selectively permitting the data item to be accessed
`
`11
`
`by one or more computers other than the computer that had received
`
`12
`
`the request.
`
`13
`
`So, here, we see on the right-hand side an explanation. If
`
`14
`
`the binary object of the request, the subject of the request matched a
`
`15
`
`binary object identifier in the database, the binary object is in access.
`
`16
`
`So what would happen is the backup file server would
`
`17
`
`permit the local computer to back up -- to access the binary object
`
`18
`
`using the restore process, and the way that happens, and we can see
`
`19
`
`here, discussion of granules, essentially the remote backup file server
`
`20
`
`would send granules back to the local computer so that the local
`
`21
`
`computer can assemble the binary object.
`
`22
`
`If the backup file server determines that the binary object
`
`23
`
`identifier in the request does not match the binary object identifier in
`
`24
`
`his database, access would not be provided to the local computer.
`
`
`
`
`
` 15
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`Now, Personal Web argues that Woodhill does not disclose
`
`its limitation, because granules that are sent back to the local
`
`computer in response to this update request are not data items
`
`identified by the identifier in the request, but I believe that Personal
`
`Web misunderstands Apple's invalidity argument.
`
`What they ignore is that our challenge is based primarily on
`
`Woodhill at the binary object level. Binary object identifier or the
`
`binary object identifier included in the update request is the unique
`
`identifier for the binary object that is restored at the local computer.
`
`10
`
`So Personal Web's argument about the granules is really irrelevant at
`
`11
`
`the binary object level.
`
`12
`
`Personal Web also argues that this limitation is not met,
`
`13
`
`because the restore procedure does not send a whole binary object
`
`14
`
`back to the local computer, but this is not a valid argument for a few
`
`15
`
`reasons.
`
`16
`
`First, the claims in the '310 patent that we're talking about
`
`17
`
`here do not require the second computer to send an entire binary
`
`18
`
`object back to the requesting computer. The claims require only that
`
`19
`
`the second computer permit or allow access to the data item. So
`
`20
`
`essentially what Personal Web is trying to do here is add a limitation
`
`21
`
`that the subject data item be sent back in its entirety to the requesting
`
`22
`
`computer.
`
`23
`
`Second, if every granule is changed, the backup file server
`
`24
`
`will in that instance actually provide the entire binary object to the
`
`25
`
`requesting computer, albeit in a piecemeal fashion, but that certainly
`
`
`
`
`
` 16
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`would take place and, you know, as I mentioned before the claims do
`
`not specify how the binary object should be provided or how access
`
`needs to be provided.
`
`And then, third, and the last thing is that Woodhill does not
`
`require that a binary object even be divided into multiple granules
`
`where you have a smaller file. So in that case where a binary object is
`
`changed, the entire binary object consisting of I guess a single granule
`
`would be provided to the requesting computer.
`
`So moving on to slide 24, as we put in our petition our
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`position is certainly that Woodhill either anticipates or renders
`
`11
`
`obvious the claims of the '310 patent, but as the Board recognized in
`
`12
`
`its decision Stefik provides an even stronger disclosure of this last
`
`13
`
`element of the claims of the '310 patent, the selectively allowing or
`
`14
`
`authorizing access to a data item.
`
`15
`
`Just going to slide 27, what we see here in the specification
`
`16
`
`of Stefik is that Stefik addresses the problem of preventing
`
`17
`
`unauthorized access to digital works. Actually, I'm sorry, I think I'm
`
`18
`
`looking at the wrong slide. Actually looking at slide 26 now, I
`
`19
`
`apologize.
`
`20
`
`So the solution that Stefik makes for -- the solution that
`
`21
`
`Stefik proposes for this problem is a system that allows only licensed
`
`22
`
`or authorized access by parties who have paid for or, otherwise,
`
`23
`
`entitled to access digital work. So this discloses receiving a request
`
`24
`
`for access to particular digital work using what it calls digital tickets,
`
`
`
`
`
` 17
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`and a ticket is merely the indicator that the ticket holder has the rights
`
`to access digital works.
`
`So looking at slide 27, this describes the process that we see
`
`in Stefik where basically a server repository receives a request for
`
`digital work and the server repository then decides whether or not to
`
`allow access to the particular digital work, if it's based on a
`
`determination of whether access to that work or whether that
`
`particular requester has authorization to access that work.
`
`So here in Stefik we have a clear disclosure of selective
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`access to digital works, which, of course, are data items and nowhere
`
`11
`
`in Personal Web's paper does it dispute that.
`
`12
`
`Now, instead, what Personal Web argues is that a person of
`
`13
`
`ordinary skill in the art would not have combined Woodhill and
`
`14
`
`Stefik, but as the Board found, a person of ordinary skill in the art
`
`15
`
`reading Stefik and Woodhill would most certainly have allowed for
`
`16
`
`the selective access features of Stefik to be used with Woodhill's
`
`17
`
`content-dependent identifiers' features and, indeed, this combination
`
`18
`
`makes perfect sense.
`
`19
`
`We have two references that are in the same field, file
`
`20
`
`management on a network system, two references that are addressing
`
`21
`
`the same problem, secure access to data, and then each of these two
`
`22
`
`references, Stefik and Woodhill, certainly take different approaches or
`
`23
`
`they approach this problem in different ways, but they do so in a way
`
`24
`
`that lends itself to a combination with the other in the way that the
`
`25
`
`Board described in the decision, again, using the unique
`
`
`
`
`
` 18
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`content-dependent identifiers of Woodhill with the selective access
`
`concept of Stefik.
`
`Now, Personal Web argues that Woodhill and Stefik should
`
`not be combined because of alleged incompatibilities between details
`
`of the two references and what this argument really amounts to is
`
`them saying that the combination does not work where you take every
`
`piece of Woodhill and combine it with every detail of Stefik, but that's
`
`really not what we're doing here, and in combining two references the
`
`law does not require that you take every aspect of one reference and
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`combine it with every aspect of another reference.
`
`11
`
`So what we're doing here is using Stefik only for disclosure
`
`12
`
`at a very high level of this selective access concept. The claims of the
`
`13
`
`'310 patent, indeed, are very high-level claims. They don't get into the
`
`14
`
`details of how the selective access piece takes place.
`
`15
`
`Stefik itself, though, is very detailed. Now, to render
`
`16
`
`obvious the claims of the '310 patent, we need not import all these
`
`17
`
`details into Woodhill. And even if we did import these details from
`
`18
`
`Stefik into Woodhill, they're certainly not actually incompatible with
`
`19
`
`Woodhill nor do they, as Personal Web suggests, teach away from this
`
`20
`
`combination.
`
`21
`
`Personal Web is essentially trying to argue that really
`
`22
`
`there's more to these '310 patent claims than there really are. But if
`
`23
`
`we look at the actual claim language, we see that Woodhill in
`
`24
`
`combination with Stefik discloses the claims and a person of ordinary
`
`25
`
`skill in the art would certainly have made this combination.
`
`
`
`
`
` 19
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`So I have nothing further at this moment, but I'm certainly
`
`happy to answer questions if any of Your Honors have questions.
`
`JUDGE ZECHER: Mr. Jay, I have a question for you.
`
`How would you respond to Personal Web's argument that taking the
`
`teaching of Woodhill of the binary object identifier and combining
`
`that with this selective permitting access or authorization of Stefik,
`
`how would -- their argument is basically that these elements would
`
`not be used for their intended purpose, do not serve their intended
`
`function?
`
`10
`
`So the way I read that is basically I think what they're
`
`11
`
`saying is that the Woodhill binary object identifier wouldn't serve its
`
`12
`
`intended purpose if combined with the aspects that your combination
`
`13
`
`puts together with Stefik. Can you address that in a little more detail
`
`14
`
`for us and why you think that argument may be incorrect?
`
`15
`
`MR. JAY: Sure. I mean, I think Personal Web is
`
`16
`
`completely wrong there. I don't think they actually explain why or
`
`17
`
`how the binary object identifiers, for instance if you make this
`
`18
`
`combination, wouldn't be used for their intended purpose.
`
`19
`
`I mean, Woodhill clearly explains that these binary object
`
`20
`
`identifiers are used to identify a binary object. We have a request.
`
`21
`
`That request includes the binary object identifier that the local
`
`22
`
`computer wants access to, and then the next limitation of the '310
`
`23
`
`claim talks about its determination using this binary object identifier.
`
`24
`
`That certainly takes place.
`
`
`
`
`
` 20
`
`
`
`Case IPR2013-00596
`Patent 7,802,310
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`And then we're going on from there and we're saying that
`
`taking this selective access concept from Stefik and all we're doing is
`
`taking that procedure, which is a separate procedure from sort of the
`
`first two parts, the request and the determination, and putting that with
`
`this portion of Woodhill that is already in place. I don't see any
`
`reason that you would need to change what takes place in Woodhill or
`
`why that would in any way be incompatible with what we have in
`
`Stefik.
`
`I mean, I think they point to in Stefik we have a situation
`
`10
`
`where there's a mention of unique identifiers, but those unique
`
`11
`
`identifiers are not used for this same purpose, but I think what they're
`
`12
`
`confusing is that the unique identifiers in Stefik, for instance, are not
`
`13
`
`conten