throbber
IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`Paper No. 33
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`___________________
`
`
`MICROSOFT CORPORATION AND GOOGLE INC.
`Petitioner,
`
`v.
`
`B.E. TECHNOLOGY, LLC,
`Patent Owner
`_________________________
`
`Case IPR2014-00039
`Patent No. 6,628,314 B1
`________________________
`
`
`
`
`
`
`
`PETITIONER’S REPLY TO PATENT OWNER’S RESPONSE
`
`
`
`
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`TABLE OF CONTENTS
`
`
`
`I.
`
`Guyot Anticipates Claims 11-15 and 17-19 of the ’314 Patent .................. 1
`
`A. Guyot Discloses a Method of Providing Demographically-
`Targeted Advertising to a Computer User ....................................... 1
`
`1.
`
`2.
`
`3.
`
`Guyot Discloses Acquiring Demographic Information and
`Using that Information to Target Advertising to Users ........ 1
`
`Patent Owner’s Expert Admits that Guyot Collects
`Demographic Information ........................................................ 2
`
`Patent Owner Misunderstands the Test for Anticipation ..... 4
`
`B. Guyot Discloses Transferring a Copy of the Software In Response
`to a Download Request By the User .................................................. 5
`
`C. Guyot Teaches Providing a Unique Identifier to the Computer .. 10
`
`II. Claims 20-22 Are Obvious Based on Guyot in View of RFC 1635 ......... 13
`
`III. Guyot Anticipates and/or Renders Obvious Claims 12-22 ...................... 14
`
`IV. The PTO Acted Within Its Rule-Making Authority ................................ 15
`
`V. Conclusion .................................................................................................... 15
`
`
`
`
`
`
`
`
`
`-ii-
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`I.
`
`Guyot Anticipates Claims 11-15 and 17-19 of the ’314 Patent
`
`The Board correctly found claims 11-15 and 17-19 of the ’314 patent
`
`anticipated by Guyot. Decision at 10-13. In response, Patent Owner argues Guyot
`
`does not show (i) collection of “demographic information”; (ii) transfer of software
`
`in response to a download request by the user, or (iii) providing a unique identifier
`
`to the computer. Each argument relies on limitations not found in the claims, and
`
`conflicts with or disregards evidence in the record. The Board should maintain its
`
`determination that claims 11-15 and 17-19 are unpatentable.
`
`A. Guyot Discloses a Method of Providing Demographically-
`Targeted Advertising to a Computer User
`
`The Board correctly found that Guyot shows “a method of providing
`
`demographically-targeted advertising” and “acquiring demographic information
`
`about the user” per claim 11 of the ’314 patent. Decision at 10-11. In response,
`
`Patent Owner does not dispute that Guyot teaches processes that collect
`
`information and use that information to deliver targeted ads. Instead, Patent Owner
`
`contends “demographic information is neither explicitly nor inherently disclosed in
`
`Guyot.” Response at 10-15. The evidence refutes Patent Owner’s contentions.
`
`1. Guyot Discloses Acquiring Demographic Information and
`Using that Information to Target Advertising to Users
`
`The Board correctly found Guyot shows collection and use of demographic
`
`information. Decision at 11-12. Guyot shows a user profile being generated using
`
`-1-
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`answers to a questionnaire presented to the user. Ex. 1006 (Guyot) at 3:61-65;
`
`Petition at 28-29; Ex. 1003 at ¶¶ 76-81, 266, 273-274, 300-301; Ex. 1028 at ¶¶ 6-
`
`12. The ’314 patent acknowledges this web-based questionnaire technique was
`
`commonly used to collect demographic information. Ex. 1001 at 2:29-34 (“Perhaps
`
`the most common way to acquire demographic data regarding users via the Internet
`
`is to request the information using a form written in html (HyperText Markup
`
`Language) and provided to the user over the World-Wide Web (WWW) using http
`
`(HyperText Transfer Protocol).”). Dr. Houh explained a person of ordinary skill in
`
`the art would have read this description in Guyot as describing a process that
`
`collects “demographic information” within the meaning of the claims—i.e.,
`
`“collected characteristic information about a user.” Ex. 1027 at 189:10-192:5,
`
`208:3-12, 209:17-210:15; Ex. 1003 at ¶¶ 266, 273-274, 300-301; see also Ex. 1028
`
`at ¶¶ 6-16. This is because, for example, the information collected by the user
`
`profile questionnaire is used to establish and update the user’s personal profile,
`
`which the server uses to direct targeted advertising to the user. Id.; Ex. 1006
`
`(Guyot) at 3:61-65; Ex. 1003 at ¶¶ 273-275, 278; Ex. 1028 at ¶ 9; see also id. at ¶¶
`
`6-12.
`
`2.
`
`Patent Owner’s Expert Admits that Guyot Collects
`Demographic Information
`
`Patent Owner’s Expert, Mr. Goldstein, conceded at his deposition that Guyot
`
`describes collection of demographic information within the Board’s construction.
`
`
`
`2
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`For example, he agreed that information documenting certain types of web
`
`browsing activity – such as visiting a particular site on a repeated basis over a
`
`defined period – is demographic information. For example, when asked if a
`
`hypothetical web browsing history documenting that a user visited the CNN
`
`website every day over a 30-day period at 9 am each day could be “demographic
`
`information,” Mr. Goldstein stated:
`
`Q. And so in this browsing history, there’s no user
`identifying information that accompanies it, right, in my
`hypothetical?
`A. That’s correct.
`Q. So then under the board’s definition, it would be
`demographic information as they’ve defined it?
`A. Yes, it would be.
`Ex. 2015 at 54:5-54:23 (emphasis added). It is undisputed that Guyot shows
`
`collection of web-browsing information from the user’s computer, sending this
`
`information to the server as part of the Subscriber Statistics, and using it to update
`
`the user’s profile, which, in turn, is used to direct targeted advertisements. Ex.
`
`1006 (Guyot) at 2:36-4; Ex. 275, 278, 290-291. Indeed, Patent Owner admits this
`
`type of admittedly demographic information would be collected by the Guyot
`
`questionnaire. Response at 13 (“The questionnaire might ask the server to identify
`
`preferred websites. Indeed, Guyot teaches that ‘the server utilizes [information on
`
`Internet sites that the subscriber has accessed over a predetermined period of time]
`
`
`
`3
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`to further define the subscriber’s personal profile.’ Ex. 1006, Col. 4:19-23”). Guyot
`
`thus describes a process in which demographic information is collected from a
`
`user, and is used to define or update a user’s personal profile, which is used to
`
`direct targeted advertising. Ex. 1003 at ¶¶ 275, 278, 290-291; Ex. 1028 at ¶¶ 13-
`
`14.
`
`3.
`
`Patent Owner Misunderstands the Test for Anticipation
`
`Patent Owner’s theory that Guyot does not show collection of “demographic
`
`information” rests on a mistaken understanding of the law of anticipation.
`
`Response at 10-11. An anticipatory reference need not duplicate word-for-word
`
`what is in the claims. Instead, anticipation may be found “when a claimed
`
`limitation is . . . implicit in the relevant reference.” Standard Havens Products, Inc.
`
`v. Gencor Indus., Inc., 953 F.2d 1360, 1369 (Fed. Cir. 1991) (emphasis added).
`
`Moreover, what an anticipatory reference teaches must be analyzed from the
`
`perspective of a person of ordinary skill. To anticipate, “[t]here must be no
`
`difference between the claimed invention and the reference disclosure, as viewed
`
`by a person of ordinary skill in the field of the invention.” Smith & Nephew v.
`
`Convatec Tech., IPR2013-00102, Paper 87 at 14-15 (PTAB May 19, 2014). When
`
`considering what a reference discloses, “it is proper to take into account not only
`
`specific teachings of the reference but also the inferences which one skilled in the
`
`art would reasonably be expected to draw therefrom.” Denso Corp. and Clarion
`
`
`
`4
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`Co. v. Beacon Navigation, IPR2013-00026, Paper 34 at 19-20 (PTAB March 14,
`
`2014) (emphasis added)(internal citations omitted).
`
`Petitioner presented evidence from Dr. Houh establishing that a person of
`
`ordinary skill would have interpreted the disclosure in Guyot as describing a
`
`process that collects demographic information via a web-based questionnaire
`
`technique shown in Guyot. Ex. 1003 at ¶¶ 266, 273-274, 300-301. Dr. Houh
`
`explained this technique was a well-known and widely-used technique for
`
`capturing demographic information, Ex. 1003 at ¶¶ 76-81, and is consistent with
`
`how the ’314 patent illustrates collection of demographic information, Ex. 1001 at
`
`2:29-34. Mr. Goldstein agreed that user questionnaires presented via web pages
`
`were a well-known and commonly used technique for collecting demographic
`
`information. Ex. 2015 at 40:23-41:10. Thus, substantial evidence supports the
`
`Board’s determination that Guyot discloses collection of “demographic
`
`information” pursuant to the claims of the ’314 patent. Ex. 1003 at ¶¶ 76-81, 266,
`
`273-274, 300-301; Ex. 1028 at ¶¶ 6-16.
`
`B. Guyot Discloses Transferring a Copy of the Software In Response
`to a Download Request By the User
`
`The Board found that Guyot discloses operations that satisfy the requirement
`
`in claim 11 of “transferring a copy of said software to the computer in response to
`
`a download request by the user.” Decision at 11. As the Board observed, “Guyot
`
`discloses that a client application is provided to the subscriber’s computer.”
`
`
`
`5
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`Decision at 11. Patent owner does not dispute this finding. The Board also
`
`observed that Guyot shows that a user can manually connect to the server, and
`
`when it does, that action will prompt downloading of updated client software. Id.
`
`Thus, the Board correctly found that Guyot discloses two examples of transferring
`
`software to the user’s computer in response to a download request by the user. Id.
`
`Patent Owner does not dispute that Guyot states that software is downloaded
`
`in response to a user’s action, either to enable the initial installation of the software
`
`or during an updating process triggered by the user’s action to manually connect to
`
`the server. Response at 16-22. Instead, Patent Owner contends the second way of
`
`downloading software (i.e., for "updated" software) does not meet the claim
`
`language because Patent Owner believes the intention of the user when they take
`
`the actions that cause downloading of the software must be considered (i.e., what
`
`the user believes at the time the user takes the actions that cause downloading of
`
`the software). This putative distinction is illusory and legally irrelevant.
`
`Initially, Guyot shows that a client application is provided to a user’s
`
`computer over a distributed information network, such as the Internet. Ex. 1006
`
`(Guyot) at 1:58-60. As Dr. Houh explains, this means that a user will necessarily
`
`make a download request of the server to transfer (i.e., “download”) the software
`
`to the user’s computer– this is simply how Internet-based communications work.
`
`Ex. 1028 at ¶ 27. This process was (and remains) an extremely common and well-
`
`
`
`6
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`known technique for acquiring new software. Id.
`
`Dr. Houh also explains that Guyot shows a process where a user manually
`
`connects to the server, and in response to that action, the server downloads an
`
`updated version of the software to the user’s computer. Ex. 1003 at ¶¶ 285-292;
`
`Ex. 1006 (Guyot) at 6:44-56; Ex. 1028 at ¶¶ 17-26. Specifically, Guyot shows that
`
`a user can manually connect to the server by clicking a “connection” button. Ex.
`
`1006 (Guyot) at 6:43-46, 7:25-26 (“At step S400, the control system determines if
`
`the connection button 550 has been selected by the subscriber”); Fig. 5 (S400).
`
`When this is done, the client application uploads data to the server for further
`
`refinement of the user’s personal profile and triggers a process on the server
`
`(LOCSOFT) that causes downloading of the latest version of the client application
`
`software if the user’s software is not the most current version. Ex. 1028 at ¶¶ 21-
`
`22; Ex. 1006 (Guyot) at 1:66-2:1, 8:25-50, Figs. 6A and 7 (describing
`
`“LOCSOFT” routine); Ex. 1003 at ¶¶ 288, 291-292. And, importantly, Guyot
`
`shows providing “the URL address of the updated version of the client application
`
`software” to enable downloading of the updated software. Ex. 1006 (Guyot) at
`
`4:24-27; Ex. 1003 at ¶ 276; Ex. 1028 at ¶ 21. An URL is plainly a "download
`
`request" – clicking it sends a request to a server to download the file specified in
`
`the URL. Ex. 1028 at ¶ 21. Thus, a person of ordinary skill would have read Guyot
`
`as showing two different examples of transferring software in response to a
`
`
`
`7
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`download request by a user. Ex. 1028 at ¶¶ 17-27.
`
`Patent Owner and its expert simply ignore the first example. As to the
`
`second, Patent Owner asserts that “the subscriber understands only the subscriber
`
`statistics need to be uploaded and the advertisement queue needs to be updated, but
`
`the subscriber has no information that would cause him or her to perceive even the
`
`potential that a new version of the software will be downloaded.” Response 22.
`
`Patent Owner’s observations rest on a flawed understanding of the law of
`
`anticipation, and are factually incorrect.
`
`Initially, neither Patent Owner nor its expert dispute that a user’s request to
`
`manually connect to the server will cause the downloading of software to the user’s
`
`computer. Response at 19; see Ex. 2015 at 95:22-96:1 (Q. [U]nder the operation of
`
`Guyot, the connection to the server will cause downloading the software, correct?
`
`A. It could cause downloading of software, yes). Instead, Patent Owner contends
`
`the user needs to be “conscious of the request and purposefully make[] the
`
`request.” Patent Owner’s response should be disregarded for three reasons.
`
`First, the language of the ’314 patent claims forecloses Patent Owner’s
`
`theory. The claims state simply “transferring a copy of said software to the
`
`computer in response to a download request by the user.” A “download request”
`
`according to the claims is what causes downloading of the software to the user’s
`
`computer. Ex. 1028 at ¶¶ 19-20. A “download request,” however, necessarily
`
`
`
`8
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`involves sending data from a user’s computer based on a user’s “request,” which is
`
`received by and triggers actions by the server (e.g., downloading of the updated
`
`software). Id. Importantly, both experts agree this is described in Guyot (e.g.,
`
`clicking the “connection button” is an action taken by the user that causes the
`
`user’s computer to send a request to the server, which responds by providing an
`
`URL enabling downloading of updated software to the user’s computer). Compare
`
`Ex. 1027 (Dr. Houh) at 203:8-204:14 with Ex. 2015 (Mr. Goldstein) at 95:4-96:1;
`
`see also Ex. 1028 at ¶¶ 18-22; see also Ex. 1003 at ¶ 273.
`
`Second, Patent Owner’s putative distinction is an attempt to read an
`
`improper limitation into the claims. This should be rejected because the mental
`
`state of a user is not entitled to any patentable weight. 1 Indeed, the Federal Circuit
`
`has held that the subjective intentions of an individual purportedly practicing the
`
`invention are irrelevant. See, e.g., Amazon.com, Inc. v. Barnesandnoble.com, Inc.,
`
`239 F.3d 1343, 1352-53 (Fed. Cir. 2001)(rejecting construction of a claim term
`
`
`1 Q. [Mr. Kushan] You’re not addressing the scenario in this definition of the -- a
`
`request being in the form of a message sent by a user’s computer to the server;
`
`right? A. [Mr. Goldstein] No. I’m defining a “request” as an action by the user to
`
`request software. Q. So that turns, then, on somewhat of the intent of the user
`
`in making the request? A. Yes, that is correct. Ex. 1015 at 56:19-57:2.
`
`
`
`9
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`because it would “inject[] subjective notions into the infringement analysis” and
`
`observing “[w]e are not prepared to assign a meaning to a patent claim that
`
`depends on the state of mind of the accused infringer.”)(emphasis added).
`
`Finally, Patent Owner’s contentions about a user’s lack of awareness of the
`
`consequences of its actions are simply incorrect. Patent Owner presents a
`
`hypothetical that posits a user will be unaware of the consequences of clicking the
`
`connection button in the Guyot system. Response at 21-22. Even if this
`
`hypothetical is accepted, it would be true only until the user observed the updating
`
`of the client application software occur in response to clicking the manual
`
`“connection” button. Ex. 1028 at ¶¶ 23-26. Every subsequent time the user clicked
`
`that button, he or she would be aware that doing so will result in downloading of
`
`an updated version of the software if one is available. Id. Thus, even under Patent
`
`Owner’s hypothetical, a user will acquire the necessary awareness that establishing
`
`a manual connection to the server will cause downloading of the software over
`
`time. Patent Owner’s hypothetical, thus, is irrelevant and readily dismissed. Id.
`
`C. Guyot Teaches Providing a Unique Identifier to the Computer
`
`The Board correctly found that Guyot discloses “periodically acquiring said
`
`unique identifier and said computer usage information recorded by said software
`
`from the computer via said computer network” and “associating said computer
`
`usage information with said demographic information using said unique
`
`
`
`10
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`identifier.” Decision at 13. The Board’s determination is supported by undisputed
`
`evidence, and should be maintained.
`
`As Dr. Houh explained, Ex. 1003 at ¶¶ 275, 278, 291, Guyot shows that the
`
`client application on the user’s computer periodically collects “Subscriber
`
`Statistics” data comprising computer usage information, and sends that data to the
`
`server over a network connection. Ex. 1006 (Guyot) at 1:66-2:1, 4:15-23, 5:19-24.
`
`The Subscriber Statistics are used by the server to update the subscriber’s personal
`
`profile, which includes the subscriber’s demographic information. Ex. 1006
`
`(Guyot) at 3:57-65; 4:21-23; Ex. 1003 at ¶¶ 266, 273-275, 278. The server in
`
`Guyot thus associates computer usage information with demographic information
`
`associated with each individual subscriber. To be able to do this, the information
`
`collected from each user must be uniquely identified, which Guyot explains is done
`
`by including information that is unique to each subscriber. Ex. 1003 at ¶¶ 313; see
`
`also Ex. 1006 (Guyot) at 3:57-61 (“The Subscriber Data preferably includes, for
`
`reach subscriber, the subscriber’s identification information, a password assigned
`
`to the subscriber, and a personal profile of the subscriber that is used to target
`
`specific advertisements to the subscriber.”) Thus, Guyot clearly shows providing a
`
`unique identifier to the user’s computer in the form of Subscriber Data, and using
`
`this “unique identifier” to associate information sent by the user’s computer to the
`
`server. Ex. 1003 at ¶¶ 313; Ex. 1028 at ¶¶ 28-34. Additionally, Guyot expressly
`
`
`
`11
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`states that a “unique proprietary identifier” being provided to each user’s computer
`
`system. Ex. 1001 at 3:21-22 (“each of the subscriber system 300 having a unique
`
`proprietary identifier.”). Ex. 1003 at ¶¶ 312.
`
`Patent Owner first responds that Guyot does not show sending a “unique
`
`identifier” from the server to the subscriber computer. Response at 23-24. Once
`
`again, Patent Owner improperly reads a non-existent limitation into its claims –
`
`there is no requirement in the claims that the unique identifier be sent by the server
`
`to the user’s computer – it simply states “providing a unique identifier to the
`
`computer.” More importantly, Patent Owner only disputes that one of the two
`
`unique identifiers shown in Guyot meets this claim element – it does not dispute
`
`the other (the “Subscriber Data”) is sent and stored on the user’s computer. Id.
`
`Next, Patent Owner argues that, in one hypothetical configuration (i.e.,
`
`where one computer is used by multiple users), Guyot does not meet the “unique
`
`identifier” element of the claims. Initially, as its own expert confirmed, this
`
`hypothetical configuration is nowhere described in Guyot. Ex. 2015 at 92:17-20
`
`(Q. Now, Guyot doesn’t actually say that the computer the user is using has to
`
`support multiple user accounts; right? A. That’s correct.); see generally Ex. 2015 at
`
`90:10 to 93:19. Thus, under Patent Owner’s own reasoning, a “single user per
`
`computer” implementation (i.e., the one actually described in Guyot) does meet the
`
`“unique identifier” element of the claims. Ex. 1028 at ¶¶ 28-30.
`
`
`
`12
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`Finally, Patent Owner contends the “unique identifier” must be anonymous,
`
`Response at 25. This again seeks to improperly read a non-existent limitation into
`
`the claims, which must be rejected. Vibrant Media, Inc. v. G.E. Co., IPR2013-
`
`00170, Paper 56 at 5 (PTAB June 26, 2014).
`
`II. Claims 20-22 Are Obvious Based on Guyot in View of RFC 1635
`
`The Board found that Guyot in view of RFC 1635 (describing the
`
`anonymous FTP technique) would have rendered claims 20 to 22 of the ’314 patent
`
`obvious to a person of ordinary skill. Decision at 16-19. Patent Owner first
`
`responds that Petitioner did not provide a detailed explanation why the claims were
`
`obvious. This is simply incorrect – Petitioner and its expert explained that
`
`capturing demographic information as a condition of providing download access to
`
`a file was a well known technique in client/server systems, which was illustrated
`
`by the anonymous FTP technique described in RFC 1635. Petition at 37-42; Ex.
`
`1003 at ¶¶ 59-68, 368-385. This technique is the precise concept that Patent Owner
`
`contends was not known in the prior art and which differentiates its claimed
`
`process from that in Guyot. Patent Owner also contends there was no “motivation
`
`to combine” this anonymous FTP technique with Guyot, in part, because Patent
`
`Owner believed the combination of the anonymous FTP technique with the Guyot
`
`scheme would render it “inoperable.” Response at 3.
`
`The latter theory was refuted by Patent Owner’s own witness, who freely
`
`
`
`13
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`admitted it would have been trivial to alter the Guyot scheme to use the
`
`anonymous FTP technique to provide download access for the Guyot software. Ex.
`
`2015 at 80:9-18(“Q. All right. So if I wanted to provide access to a user to an
`
`installation program I had on my server via a Web page, I could serve up a Web
`
`page with a link that was an FTP link pointing to the installation program I’m
`
`asking them to download; right? A. Correct. Q. All right. And that wouldn’t
`
`require any special skill to create that kind of a link? A. No, it would not.”)
`
`(emphasis added). Patent Owner’s arguments also ignore the undisputed testimony
`
`of Dr. Houh, who explained “[p]rompting a user for certain information before
`
`providing a user download access to a server would have been an obvious design
`
`choice based on knowledge of this broadly-used technique before 1998.” Ex. 1003
`
`at ¶ 365, 368, 371. And, while not legally required under KSR Int’l Co. v. Teleflex,
`
`Inc., 550 U.S. 398 (2007), the person of ordinary skill would have found a specific
`
`motivation within RFC 1635 to implement this obvious design choice in other
`
`client/server systems, such as those used in Guyot. Id. The Board’s finding of
`
`obviousness thus is fully supported by the record.
`
`III. Guyot Anticipates and/or Renders Obvious Claims 12-22
`
`The Board found the evidence presented by the Petition sufficient to show:
`
`(i) claims 12-14 and 16-19 of the ’314 patent anticipated by Guyot (Decision at
`
`13); (ii) claim 15 of the ’314 patent obvious based on Guyot in view of Robinson.
`
`
`
`14
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`Decision at 15-16, and (iii) claims 20-22 obvious based on Guyot in view of RFC
`
`1635. Patent Owner does not advance any arguments regarding any of these claims
`
`distinct from its arguments regarding claim 11. Response at 26. Because the
`
`findings of unpatentability of claim 11 were proper and supported by substantial
`
`evidence, the Board’s finding that Guyot anticipates claims 12-14 and 16-19, that
`
`Guyot in view of Robinson renders obvious claim 15, and that Guyot in view of
`
`RFC 1635 renders obvious claims 20-22 were also proper.
`
`IV. The PTO Acted Within Its Rule-Making Authority
`
`Patent Owner contends use of the “‘broadest reasonable construction’ rule
`
`exceeded the PTO’s rule-making authority.” Response at 28-30. Patent Owner is
`
`incorrect – the Office was well within its statutory and rulemaking authority to
`
`promulgate Rule 42.100(b) and follow it in this proceeding. See SAP Am., Inc. v.
`
`Versata Dev. Grp., Inc., CBM2012-00001, Paper 70 at 6-19 (PTAB June 11,
`
`2013). Moreover, Patent Owner identifies no consequence of the Board using this
`
`different standard.
`
`V. Conclusion
`
`The Board should maintain its determination that claims 11-22 of the ’314
`
`Patent are unpatentable, and should cancel these claims.
`
`
`
`
`
`
`
`15
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`Dated: Sept 24, 2014
`
`
`
`
`
`
`
`Respectfully Submitted,
`
`/Jeffrey P. Kushan/
`Jeffrey P. Kushan
`Registration No. 43,401
`Sidley Austin LLP
`1501 K Street NW
`Washington, DC 20005
`jkushan@sidley.com
`
`
`
`16
`
`

`

`IPR2014-00039 (U.S. Patent No. 6,628,314)
`
`Petitioner Reply
`
`CERTIFICATE OF SERVICE
`
`I hereby certify that on this 24th day of September, 2014, a copy of the
`
`foregoing has been served in its entirety by e-mail on the following counsel of
`
`record for Patent Owner:
`
`Jason S. Angell
`Robert E. Freitas
`Freitas Tseng & Kaufman LLP
`jangell@ftklaw.com
`rfreitas@ftklaw.com
`
`
`Dated:
`
`September 24, 2014
`
`Respectfully submitted,
`
`/Jeffrey P. Kushan/
`Jeffrey P. Kushan
`Reg. No. 43,401
`Sidley Austin LLP
`1501 K Street NW
`Washington, DC 20005
`jkushan@sidley.com
`Attorney for Petitioner
`
`-1-
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket