throbber

`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD IN THE UNITED
`STATES PATENT AND TRADEMARK OFFICE
`
`
`
`Trial No.:
`
`IPR 2013-00596
`
`In re:
`
`U.S. Patent No. 7,802,310
`
`Patent Owners:
`
`PersonalWeb Technologies, LLC & Level 3 Communications
`
`Petitioner:
`Inventors:
`
`Apple, Inc.
`
`David A. Farber and Ronald D. Lachman
`
`For: CONTROLLING ACCESS TO DATA IN A DATA PROCESSING SYSTEM
`
`* * * * * * * * * * *
`
`July 12, 2017
`
`
`
`
`PATENT OWNER’S BRIEF FOLLOWING REMAND FROM THE
`UNITED STATES COURT OF APPEALS FOR THE FEDERAL CIRCUIT
`
`
`2020057
`
`

`

`Pursuant to the Board’s June 22, 2017 Order, PersonalWeb Technologies,
`
`LLC (“patent owner” or “PO”) submits this brief following the remand from the
`
`Federal Circuit, which vacated the Final Written Decision (FWD) dated March 25,
`
`2015. For at least the reasons explained herein and in PO’s Response dated June
`
`16, 2014 and Preliminary Response dated December 26, 2013, it is respectfully
`
`submitted that Apple did not make out a proper case of obviousness at least
`
`because Apple: (1) failed to meet its burden of establishing that the prior art
`
`discloses all elements of the challenged claims, and (2) failed to meet its burden of
`
`establishing that a skilled artisan would have been motivated to combine Woodhill
`
`and Stefik in the way the ‘310 patent claims and reasonably expect success.
`
`Because PO did not appeal claim 70, the Board need not address claim 70.
`
`The claim limitations discussed herein are not present in claim 70. This brief is
`
`limited to claims 24, 32, 81, 82 and 86 of the ‘310 patent.
`
`I. WOODHILL AND STEFIK FAIL TO DISCLOSE COMPARING AN
`ALLEGED DATA ITEM IDENTIFIER TO A PLURALITY OF VALUES
`TO DETERMINE WHETHER ACCESS IS UNAUTHORIZED.
`Claim 24 is representative, requiring “(i) causing the content-dependent
`
`name of the particular data item [that was in the request] to be compared to a
`
`plurality of values; (ii) . . . determining whether or not access to the particular
`
`data item is unauthorized based on whether the content dependent name of the
`
`particular data item corresponds to at least one of said plurality of values.” The
`
`claim expressly requires determining whether access to the data item is
`
`1
`
`2020057
`
`

`

`Patent Owner’s Brief Post-Remand (U.S. Pat. No. 7,802,310)
`
`
`
`
`
`IPR 2013-00596
`
`unauthorized based on the result of a comparison between the content-dependent
`
`name for that data item against a plurality of values. Independent claims 81 and 86
`
`contain similar language regarding comparing a content-based identifier/name to a
`
`“plurality of values.” Woodhill and Stefik fail to disclose this subject matter. The
`
`Petition focused on claim 70, which does not include these limitations. The
`
`Petition neither addresses these limitations nor provides any guidance as to where
`
`they are allegedly found in the prior art.
`
`(a) The Petition and institution decision are fatally flawed.
`
`The institution decision relies on Woodhill’s binary object identifiers 74 as
`
`the claimed content-dependent name. [Paper 9 at 15.] However, the institution
`
`decision does not contend that Woodhill discloses the feature at issue here --
`
`comparing a binary object identifier to a plurality of values for determining
`
`whether access is unauthorized -- and instead relies on Stefik for this claimed
`
`subject matter. (Paper 9 at 16.) In particular, the institution decision states “[a]s
`
`discussed by Apple, the process [in Stefik] of matching the identifier for the work
`
`would involve comparing it with a plurality of values, and providing for selective
`
`access. Pet. 42.” Id. The institution decision relies on no source other than Stefik
`
`as discussed at page 42 of the Petition for the “comparison against a plurality of
`
`values to provide selective access.”
`
`Neither Stefik nor page 42 of the Petition can support the institution
`
`decision. First, nothing in Stefik describes comparing an identifier against a
`
`2
`
`2020057
`
`

`

`Patent Owner’s Brief Post-Remand (U.S. Pat. No. 7,802,310)
`
`
`
`
`
`IPR 2013-00596
`
`plurality of values to determine unauthorization or selective access – a point Apple
`
`conceded on appeal. Second, nothing at page 42 of the Petition mentions
`
`comparing a content-dependent name against a plurality of values. Third, neither
`
`Stefik nor page 42 of the Petition discloses any process for determining whether
`
`access is unauthorized based on such a comparison to a plurality of values.
`
`The Petition argues the ground at issue on pages 41-43. However, nowhere
`
`does the Petition allege that Stefik (or Woodhill, or the alleged combination)
`
`discloses comparing the binary object identifier (alleged content-dependent name)
`
`to a plurality of values, and nowhere does the Petition allege that Stefik (or
`
`Woodhill, or the alleged combination) discloses determining that access is
`
`unauthorized based on such a comparison to a plurality of values. To the contrary,
`
`the Petition on page 41 merely refers to “another value” (not a “plurality of
`
`values” as claimed). Moreover, the Petition’s discussion of Woodhill with respect
`
`to claim 24, on page 38, also does not allege any prior art disclosure of comparing
`
`a binary object identifier to a plurality of values, or any disclosure of determining
`
`that access is unauthorized based on such a comparison to a plurality of values.
`
`Indeed, the Petition contains no claim chart or analysis of the prior art with respect
`
`to claim 24. Thus, even the alleged combination fails to meet claim 24.
`
`The Goldberg Declaration accompanying the Petition is similarly flawed.
`
`[Ex. 1007.] The Goldberg Declaration refers to the ground at issue on pages 40-
`
`41. Again, nowhere does Dr. Goldberg allege that Stefik, Woodhill, or the alleged
`
`3
`
`2020057
`
`

`

`Patent Owner’s Brief Post-Remand (U.S. Pat. No. 7,802,310)
`
`
`
`
`
`IPR 2013-00596
`
`combination disclose comparing a binary object identifier (the alleged content-
`
`dependent name) to a plurality of values, and nowhere does he allege that Stefik
`
`(or Woodhill, or the alleged combination) discloses determining unauthorization
`
`based on such a comparison to a plurality of values. The Petition and
`
`accompanying Goldberg Declaration are silent regarding this claimed subject
`
`matter. Dr. Goldberg, on page 40 of his Declaration, merely refers to “another
`
`value” (not a “plurality of values” as claimed).
`
`The Petition’s failure to allege such a disclosure in the prior art is not
`
`surprising, given that the prior art contains no such disclosure. Both Woodhill and
`
`Stefik disclose identifiers. However, neither Woodhill nor Stefik use an identifier
`
`to determine unauthorization, and neither discloses any comparison to a plurality
`
`of values for determining access unauthorization as claimed.
`
`Stefik describes unique identifiers 701 for respective digital works. (Ex.
`
`1013, col. 9:48-49, and Fig. 7.) However, it is undisputed that (a) Stefik does NOT
`
`use these unique identifiers 701 for determining whether access to anything is
`
`unauthorized, (b) Stefik does NOT compare these unique identifiers to a plurality
`
`of values, much less to determine unauthorization, and (c) Stefik’s unique
`
`identifiers 701 are NOT content-based. (Goldberg Dep. 147-151, 153-54 [Ex.
`
`2015]; Dewar Decl., ¶ 40 [Ex. 2020]; Dewar Dep. 74 [Ex. 1035].)
`
`During an authorization determination, instead of using unique identifiers
`
`701, Stefik utilizes so called “usage rights” that are not calculated based on file
`
`4
`
`2020057
`
`

`

`Patent Owner’s Brief Post-Remand (U.S. Pat. No. 7,802,310)
`
`
`
`
`
`IPR 2013-00596
`
`content and which are unrelated to unique identifiers 701. (Dewar Decl., ¶ 40 [Ex.
`
`2020]; Goldberg Dep. 127-29 [Ex. 2015].) It is undisputed that Stefik fails to
`
`disclose comparing unique identifier 701 (or any other identifier) or usage rights to
`
`a plurality of values for determining that access is unauthorized.
`
`Accordingly, the Petition is fatally flawed because it does not establish, or
`
`even allege, that the prior art discloses comparing a binary object identifier
`
`(alleged content-dependent name) of a binary object (alleged particular data item)
`
`to a plurality of values in the context of claim 24, and never establishes or alleges
`
`that the prior art discloses determining whether access to a binary object is
`
`unauthorized based on such a comparison of a binary object or any other alleged
`
`content-dependent name to a plurality of values.
`
`Contrary to the institution decision, Stefik fails to disclose this claimed
`
`subject matter. Apple does not rely on Stefik in this respect, and does not allege in
`
`the Petition that Stefik (or even Woodhill) discloses this claimed subject matter.
`
`Accordingly, the Federal Circuit correctly found that the FWD did not establish
`
`that the prior art disclosed this claimed subject matter.
`
`Obviousness is resolved on the basis of underlying factual determinations,
`
`including: (1) the scope and content of the prior art; (2) differences between the
`
`claimed subject matter and the prior art; (3) the level of skill in the art; and (4)
`
`secondary considerations. Graham v. John Deere Co. of Kansas City, 383 U.S. 1,
`
`17-18 (1966). As explained above, the Petition does not identify the differences
`
`5
`
`2020057
`
`

`

`Patent Owner’s Brief Post-Remand (U.S. Pat. No. 7,802,310)
`
`
`
`
`
`IPR 2013-00596
`
`between the claimed subject matter and the prior art, does not describe relevant
`
`content of the prior art, and does not explain where the above-discussed subject
`
`matter is allegedly present in the prior art. Apple’s Petition is fatally flawed.
`
`(b) Woodhill also fails to disclose comparing a binary object identifier to a
`
`plurality of values to determine whether access is unauthorized.
`
`Apple should not now be heard to argue that the deficiencies in the Petition
`
`and Stefik can somehow be cured by Woodhill. They cannot.
`
`First, as explained above, the Petition never alleged that Woodhill discloses
`
`“(i) causing the content-dependent name of the particular data item [that was in
`
`the request] to be compared to a plurality of values; (ii) . . . determining whether
`
`or not access to the particular data item is unauthorized based on whether the
`
`content dependent name of the particular data item corresponds to at least one of
`
`said plurality of values” as recited in claim 24. The Petition and accompanying
`
`Goldberg Declaration are silent regarding this claimed subject matter.
`
`Second, the institution decision did not rely on Woodhill for this claimed
`
`subject matter, and instead erroneously relied on Stefik as explained above. (Paper
`
`9 at 16.) It is undisputed that Stefik fails to disclose this claimed subject matter,
`
`and that Apple no longer relies on Stefik in this respect. It would be improper to
`
`significantly alter the basis of the trial at this late stage, especially given that no
`
`additional evidence may be submitted. Because the Board relied on Stefik for this
`
`claimed subject matter in the institution decision, it cannot now rely on Woodhill
`
`6
`
`2020057
`
`

`

`Patent Owner’s Brief Post-Remand (U.S. Pat. No. 7,802,310)
`
`
`
`
`
`IPR 2013-00596
`
`or any other art for this subject matter without violating PO’s rights under §
`
`544(b)(3) of the Administrative Procedures Act. See SAS Inst., Inc. v.
`
`ComplementSoft, LLC, 825 F.3d 1341, 1351-52 (Fed. Cir. 2016) (holding that the
`
`Board cannot “change theories midstream” in an FWD without giving the PO
`
`notice and an opportunity to be heard on the new theory).
`
`Third, Woodhill nevertheless fails to disclose the above-underlined subject
`
`matter of claim 24. [Ex. 2020 at ¶ 59.] The institution decision only contends that
`
`the claimed data item may be a binary object and that the claimed content-
`
`dependent name (or content-based identifier) may be a binary object identifier 74
`
`in Woodhill. (Paper 9.) However, Woodhill fails to disclose comparing a binary
`
`object identifier to a plurality of values for determining that access is unauthorized.
`
`Indeed, the vacated FWD implicitly concedes that “Woodhill fails to make a
`
`determination as to whether access to a given data item is not authorized.” (FWD
`
`28.) Woodhill’s granularization procedure which Apple cited on appeal never
`
`compares a binary object identifier 74 (the alleged content-dependent name) to a
`
`plurality of values as claimed. (Woodhill, col. 14:52 to col. 16:15.) And Woodhill
`
`never compares any binary object identifier 74 “to a plurality of values” in the
`
`granularization procedure (or any other procedure) for “determining whether
`
`access to the particular data item is unauthorized based on whether the content-
`
`dependent name of the particular data item corresponds to at least one of said
`
`plurality of values” as required by claim 24. (Woodhill, col. 14:52 to col. 16:15.)
`
`7
`
`2020057
`
`

`

`Patent Owner’s Brief Post-Remand (U.S. Pat. No. 7,802,310)
`
`
`
`
`
`IPR 2013-00596
`
`Woodhill simply does not use binary object identifiers for determining
`
`unauthorization. Dr. Goldberg admits that any alleged combination does not
`
`modify Woodhill’s binary object identifiers in any way. (Goldberg Dep. 131-32
`
`[Ex. 2015].) When asked during his deposition where Woodhill in view of Stefik
`
`contained a comparison of a binary object identifier to a “plurality of values,” Dr.
`
`Goldberg never referred to Stefik and admitted that Woodhill “doesn’t mention it
`
`explicitly.” [Ex. 2015 at 75-76.]
`
`Nor does the “restore” procedure in Woodhill from col. 17:18 to col. 18:9
`
`disclose comparing a binary object identifier to a “plurality of values” for any
`
`reason, and certainly not for determining whether access is “unauthorized.” The
`
`restore procedure contains no unauthorization determination. (Woodhill, col.
`
`17:18 to col. 18:9.) Indeed, the procedure does not even mention or use a binary
`
`object identifier. To the contrary, Woodhill’s alleged authorization data is “access
`
`control list data” in step 132 that occurs prior to binary object identifiers being
`
`calculated at step 138. (Woodhill at Fig. 5A, col. 7:40-67.) Thus, Woodhill’s
`
`binary object identifiers cannot possibly be used to determine unauthorization.
`
`Finally, no binary object identifier is used when accessing a binary object 74
`
`during a restore. (Woodhill at col. 11:65 to col. 12:7; col. 9:18-20; Dewar Decl., ¶
`
`55 [Ex. 2020].) Woodhill explains that fields 62 and 72 of Binary Object
`
`Identification Record 58 are used to identify and access binary objects (i.e., the
`
`field for binary object identifier 74 is NOT used). Id. The offset field 72 provides
`
`8
`
`2020057
`
`

`

`Patent Owner’s Brief Post-Remand (U.S. Pat. No. 7,802,310)
`
`
`
`
`
`IPR 2013-00596
`
`the precise location of the binary object within a file by counting bit offsets from
`
`the start of the file. Unlike the ‘310 patent, Woodhill merely uses a binary object
`
`identifier for the conventional purpose of, when backing up a file from a local
`
`computer to the backup server, determining whether a file has been backed-up
`
`previously – Woodhill describes no other uses for a binary object identifier. Thus,
`
`no reason exists to compare a binary object identifier 74 to anything (much less to
`
`a plurality of values for determination whether access is unauthorized) in
`
`Woodhill’s restore procedure.
`
`Aside from the fact that the binary object identifier is not used during the
`
`restore procedure, the procedure makes no unauthorization determination.
`
`(Woodhill at col. 17:18 to col. 18:9.) Nor is an unauthorization determination
`
`inherent in the restore procedure.
`
`Accordingly, Woodhill cannot cure the deficiencies in Stefik because
`
`Woodhill fails to disclose comparing a binary object identifier to a plurality of
`
`values for determining whether access to a binary object is unauthorized.
`
`(c) Woodhill’s “contents identifiers” also do not meet the claims.
`
`The Petition, on page 31, cites Woodhill at col. 17:50-55 and states that at
`
`the “granule level . . . the Distributed Storage Manager program compares the
`
`‘contents identifier’ of a granule against corresponding contents identifiers in order
`
`to determine whether to restore a granule.” (Pet. 31.) Dr. Goldberg also cites this
`
`9
`
`2020057
`
`

`

`Patent Owner’s Brief Post-Remand (U.S. Pat. No. 7,802,310)
`
`
`
`
`
`IPR 2013-00596
`
`portion of Woodhill in his deposition for a comparison. (Goldberg Dep. 75-76, 78
`
`[Ex. 2015].) The cited portion of Woodhill actually reads as follows:
`
`“the Distributed Storage Manager program 24, for each binary object,
`compares the ‘contents identifier’ of the next ‘granule’ in the work area
`of remote backup file server 12 against the corresponding ‘contents
`identifier’ of the next ‘granule’. . .” [emphasis added]
`Thus, this disclosure in Woodhill merely compares a contents identifier against a
`
`single contents identifier – not to a “plurality” of contents identifiers. Moreover,
`
`Apple admits that this comparison is “to determine whether to restore a granule”
`
`(Pet. 31), and thus has nothing to do with determining whether access is
`
`“unauthorized” as claimed.1 This one-to-one comparison is thus unrelated to
`
`challenged claims, and cannot be the claimed comparison against a plurality of
`
`values for determining unathorization. Moreover, this comparison does not
`
`
`1 Likewise, Woodhill’s statement at col. 2:14-17 “comparing the current value of
`
`the binary object identifier associated with a particular binary object to one or more
`
`previous values of the binary object identifier associated with that particular binary
`
`object” relates to a single binary object and is for purposes of copying during
`
`backup. This too refers to comparisons against prior values of the same binary
`
`object. It further does not relate to any unauthorization determination or access
`
`process, and is unrelated to Woodhill’s granularization restore procedure. The
`
`Petition does not cite or rely upon this portion of Woodhill.
`
`
`
`10
`
`2020057
`
`

`

`Patent Owner’s Brief Post-Remand (U.S. Pat. No. 7,802,310)
`
`
`
`
`
`IPR 2013-00596
`
`involve a binary object identifier, which is the only alleged content-dependent
`
`name or content-based identifier in the institution decision. For these reasons,
`
`Woodhill’s one-to-one comparison of contents identifiers cannot cure the
`
`deficiencies in the Petition and institution decision discussed above.
`
`
`
`Furthermore, Apple in this respect improperly mixes alternative theories and
`
`elements with respect to the claimed subject matter. Apple alleges that the
`
`“content-dependent name” is Woodhill’s binary object identifier 74 and that the
`
`“data item” is a binary object, but then improperly switches it to Woodhill’s
`
`“contents identifier” (and thus that the “data item” is a granule) for a comparing
`
`step. (Pet. 31-33.) This is legally improper. It is well established that in order to
`
`meet a claim a reference must not only disclose the elements of the claim, but must
`
`also disclose those elements “arranged or combined in the same way as in the
`
`claim.” Net MoneyIN, Inc. v. VeriSign, Inc., 545 F.3d 1359, 1369-71 (Fed. Cir.
`
`2008). One cannot do this by switching back and forth between different elements
`
`in a reference to meet a claim. Id. at 1371. Apple’s allegations in this respect also
`
`fail as a matter of law.
`
`
`
`Moreover, both parties agree that in the alleged Woodhill/Stefik
`
`combination granules corresponding to contents identifiers in the alleged request
`
`(“update request”) are NOT provided to the requesting computer in response to the
`
`update request. (Goldberg Dep. 65-67, 80-82 [Ex. 2015]; Woodhill at col. 17:18-
`
`67; and Dewar Decl., ¶¶ 48-50 [Ex. 2020].) Thus, even the alleged combination
`
`11
`
`2020057
`
`

`

`Patent Owner’s Brief Post-Remand (U.S. Pat. No. 7,802,310)
`
`
`
`
`
`IPR 2013-00596
`
`cannot meet the challenged claims if the claimed data items are considered
`
`granules and the identifiers are “contents identifiers.” (Dewar Decl., ¶¶ 48-50
`
`[Ex. 2020].) The vacated FWD did not contest this, and instead stressed that the
`
`ground in the institution decision relied upon a binary object identifier as the
`
`claimed content-dependent name (or content-based identifier) and a binary object
`
`as the claimed data item (or sequence of bits). (FWD 22; PO Response 30-32.)
`
`Woodhill’s “contents identifiers” for the granules reconstituted at col. 17:48-50 are
`
`only used for comparison in box 450 of Fig. 5i after the Fig. 5h reconstitution of
`
`those granules, and are never included in any “request” regarding a data item.
`
`(Dewar Decl., ¶ 51 [Ex. 2020].) The granules and contents identifiers cannot meet
`
`the challenged claims, and Apple does not contend that it would have been obvious
`
`to have modified Woodhill to provide contents identifiers in any “request.”
`
`For at least the foregoing reasons, Apple has failed to meet its burden of
`
`establishing that the prior art discloses all elements of claims 24, 32, 81, 82 and 86.
`
`II. APPLE HAS FAILED TO MEET ITS BURDEN OF ESTABLISHING
`THAT A SKILLED ARTISAN WOULD HAVE BEEN MOTIVATED TO
`COMBINE WOODHILL AND STEFIK AS CLAIMED AND
`REASONABLY EXPECT SUCCESS.
`Apple not only failed to prove that the elements of the claims are found in
`
`Woodhill and Stefik; Apple also failed to prove that one of skill in the art would
`
`have been motivated to combine Woodhill and Stefik to meet claims 24, 32, 81, 82
`
`and 86 and reasonably expect success. (E.g., PO Response 18-29, 36-41.) The
`
`Petition provides no logical reason for any alleged combination resulting in a
`
`12
`
`2020057
`
`

`

`Patent Owner’s Brief Post-Remand (U.S. Pat. No. 7,802,310)
`
`
`
`
`
`IPR 2013-00596
`
`comparison of a binary object identifier to a “plurality of values” for
`
`“unauthorization”, provides no detailed explanation of any such combination, and
`
`provides no technical explanation of how any such combination in this complicated
`
`technical field was supposed to work. Moreover, Apple never explained why one
`
`would have wanted to compare content-based names against a plurality of values
`
`for determining unauthorization – given that neither Stefik nor Woodhill does this.
`
`Conclusory allegations are insufficient. The Graham factors have not been met.
`
`Apple argued on appeal that “it would have been obvious to combine the
`
`backup and restore system disclosed in Woodhill with the repository of Stefik to
`
`add an authorization layer to prevent unauthorized users from accessing a different
`
`user’s back up files.” See also Ex. 1007, ¶ 84.
`
`However, Woodhill column 17 – which Apple cites – is fatal to Apple’s
`
`argument. As Woodhill explains, the column 17 procedure is used “when a current
`
`version of a file . . . must be restored to a previous version of that file.” (Woodhill
`
`at col. 17:18-21) (emphasis added). And the procedure “begins” when “program
`
`24 obtains from the user the identities of the current and previous versions of the
`
`file . . . which needs to be restored.” (Woodhill at col. 17:30-32.) The
`
`granularization restore procedure is thus expressly designed for one user, who
`
`necessarily already has access to the current and previous versions of that one file.
`
`There is no possibility that an unauthorized user could access a different user’s
`
`backup files during the granularization restore procedure. It is undisputed that a
`
`13
`
`2020057
`
`

`

`Patent Owner’s Brief Post-Remand (U.S. Pat. No. 7,802,310)
`
`
`
`
`
`IPR 2013-00596
`
`user never tries to access a different user’s file in the restore procedure. (Dewar
`
`Decl. ¶36-37[Ex. 2020]; PO’s Resp. 19-22.) Apple’s allegation is nonsensical.
`
`Moreover, even providing Stefik’s system in Woodhill would not meet the
`
`claims because, as explained above, it is undisputed that Stefik’s unique identifier
`
`701 is not used for determining unauthorization and Stefik never compares any
`
`identifier to a plurality of values for determining unauthorization. Stefik teaches
`
`an acceptable system for controlling distribution of files, which utilizes “usage
`
`rights” but does NOT utilize unique identifiers 701 or compare to a plurality of
`
`values. (Dewar Decl., ¶ 34 [Ex. 2020]; Goldberg Dep. 147-151 [Ex. 2015].)
`
`Indeed, Stefik teaches away from the claimed invention because Stefik does
`
`NOT use unique identifiers for determining authorization. (Ex. 1013, col. 9:48-49;
`
`and Fig. 7; and Dewar Decl., ¶ 40 [Ex. 2020].) Instead, Stefik utilizes “usage
`
`rights” for authorization, which are not calculated based on file content and are
`
`unrelated to unique identifiers 701. (Dewar Decl., ¶ 40 [Ex. 2020].) Stefik would
`
`have led a skilled artisan away from the path taken in the claims because Stefik
`
`does NOT utilize unique identifiers 701 for determining whether access to
`
`anything is unauthorized and does NOT use them as any part of Stefik’s “usage
`
`rights.” (Dewar Decl., ¶ 41 [Ex. 2020].) Instead, Stefik uses unique identifiers
`
`701 for other purposes. If a skilled artisan was forced to review Stefik and come
`
`up with a system to control distribution/access in Woodhill, she would have
`
`14
`
`2020057
`
`

`

`Patent Owner’s Brief Post-Remand (U.S. Pat. No. 7,802,310)
`
`
`
`
`
`IPR 2013-00596
`
`followed Stefik’s teachings and utilized Stefik’s usage rights (this would not meet
`
`the claims), but not unique content-based identifiers, just like Stefik did. Id.
`
`Still further, Woodhill’s binary object identifiers 74 and contents identifiers,
`
`and Stefik’s unique identifiers 701, would NOT be used for their intended purpose
`
`in any alleged combination. (Dewar Decl., ¶ 42 [Ex. 2020].) They would not
`
`perform the same functions that they are known to perform in Woodhill and Stefik.
`
`Id. This too is strong evidence of nonobviousness. Id. While both Woodhill and
`
`Stefik disclose and utilize alleged unique identifiers for various purposes, neither
`
`uses such identifiers to control distribution of files or determine whether access to
`
`data is unauthorized. (Dewar Decl., ¶ 42 [Ex. 2020].)
`
`III. CONCLUSION
`For the foregoing reasons, it is respectfully requested that the Board confirm
`
`patentability of claims 24, 32, 81, 82 and 86 of the ‘310 patent, just as the
`
`Examiner allowed these claims over this prior art during the original prosecution.
`
`
`
`Respectfully submitted,
`
`NIXON & VANDERHYE P.C.
`
`
`By: /Joseph A. Rhoa/
`Joseph A. Rhoa
`Reg. No. 37,515
`Updeep (Mickey) S. Gill
`Reg. No. 37,334
`Counsel for Patent Owner PersonalWeb
`
`15
`
`2020057
`
`

`

`Patent Owner’s Brief Post-Remand (U.S. Pat. No. 7,802,310)
`
`
`
`
`
`IPR 2013-00596
`
`
`CERTIFICATE OF SERVICE
`I hereby certify service of the foregoing Patent Owner’s Brief Following
`
`Remand from the United States Court of Appeals for the Federal Circuit to the
`
`following lead counsel for petitioner on July 12, 2017 via email (pursuant to
`
`agreement between the parties):
`
`David Cornwell
`Sterne, Kessler, Goldstein & Fox PLLC
`1100 New York Ave., NW
`Washington, D.C. 20005
`(davidc-PTAB@skgf.com & PTAB@skgf.com)
`
`
`
`
`By: /Joseph A. Rhoa/
`Joseph A. Rhoa
`Reg. No. 37,515
`
`
`
`16
`
`2020057
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket