throbber
Trial@uspto.gov
`571-272-7822
`
`
`
`
`
`
`
`
`
`
`
`
`
` Paper 9
`
`
`
` Entered: April 15, 2014
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`RACKSPACE US, INC. and RACKSPACE HOSTING, INC.,
`Petitioners,
`
`v.
`
`PERSONALWEB TECHNOLOGIES, LLC and
`LEVEL 3 COMMUNICATIONS,
`Patent Owners.
`____________
`
`Case IPR2014-00062
`Patent 7,802,310 B2
`____________
`
`
`Before KEVIN F. TURNER, JONI Y. CHANG, and
`MICHAEL R. ZECHER, Administrative Patent Judges.
`
`TURNER, Administrative Patent Judge.
`
`
`
`DECISION
`Institution of Inter Partes Review
`37 C.F.R. § 42.108
`
`
`
`
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`I.
`
`INTRODUCTION
`
`Rackspace US, Inc. and Rackspace Hosting, Inc. (collectively,
`“Rackspace”) filed a Petition (Paper 1, “Pet.”) requesting inter partes review
`of claims 1, 2, 5-8, 10-12, 14, 16-19, 24, 29, 32, 70, 81, 82, and 86 of U.S.
`Patent No. 7,802,310 B2 (“the ’310 Patent”). Patent owners, PersonalWeb
`Technologies, LLC and Level 3 Communications, LLC (collectively,
`“PersonalWeb”), filed a Preliminary Response (Paper 8, “Prelim. Resp.”).
`We have jurisdiction under 35 U.S.C. § 314.
`The standard for instituting an inter partes review is set forth in
`35 U.S.C. § 314(a), which provides:
`THRESHOLD --The Director may not authorize an inter partes
`review to be instituted unless the Director determines that the
`information presented in the petition filed under section 311
`and any response filed under section 313 shows that there is a
`reasonable likelihood that the petitioner would prevail with
`respect to at least 1 of the claims challenged in the petition.
`
`Taking into account PersonalWeb’s Preliminary Response, we
`conclude that the information presented in the Petition demonstrates that
`there is a reasonable likelihood that Rackspace will prevail in challenging
`claims 1, 2, 5-8, 10-12, 14, 16-19, 24, 29, 32, 70, 81, 82, and 86 as
`unpatentable under 35 U.S.C. § 103. Pursuant to 35 U.S.C. § 314, we
`hereby authorize an inter partes review to be instituted as to claims 1, 2, 5-8,
`10-12, 14, 16-19, 24, 29, 32, 70, 81, 82, and 86 of the ’310 Patent.
`
`
`
`
`
`2
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`A.
`
`Related Matters
`
`Rackspace indicates that the ’310 Patent was asserted against it in
`
`PersonalWeb Technologies LLC v. Rackspace US, Inc., Case No. 6:12-cv-
`00659, pending in the United States District Court for the Eastern District of
`Texas. Pet. 1.
`Other petitions seeking inter partes review of PersonalWeb’s patents
`have been filed, with those patents and the ’310 Patent sharing a common
`disclosure. Id. at 1-3.
`PersonalWeb also notes that another petition, namely IPR2013-00596,
`was also pending regarding the ’310 Patent. Prelim. Resp. 1. We instituted
`a trial based on that petition on March 26, 2014. PersonalWeb argues that it
`would be duplicative and highly prejudiced if two inter partes reviews
`regarding the same patent were to proceed. Id. at 1-2. While PersonalWeb
`views the differing claims under consideration in each petition, as well as
`similar art, as placing a burden upon it, we are persuaded that both petitions
`should be considered on their own merits. The panel will be amenable to
`requests for consolidation under 35 U.S.C. § 315(d), post-institution.
`
`
`B. The Invention of the ’310 Patent (Ex. 1001)
`
`The ’310 Patent relates to a data processing system that identifies data
`items using substantially unique identifiers, otherwise referred to as True
`Names, which depend on all the data in the data item and only on the data in
`the data item. Ex. 1001, 1:44-48; 3:52-55; 6:20-24. According to the ’310
`
`3
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`Patent, the identity of a data item depends only on the data and is
`independent of the data item’s name, origin, location, address, or other
`information not derivable directly from the data associated therewith. Id. at
`3:55-58. The invention of the ’310 Patent also provides that the system can
`publish data items, allowing other, possibly anonymous, systems in a
`network to gain access to the data items. Id. at 4:32-34.
`
`
`C.
`
`Challenged Claims
`
`Independent claims 1, 24, 70, 81, and 86, as well as dependent claims
`
`2, 5-8, 10-12, 14, 16-19, 29, 32 and 82, are challenged by Rackspace in this
`inter partes review. Claims 1 and 70 are deemed representative and are
`reproduced below:
`
`1. A computer-implemented method in a system which
`includes a network of computers, the method implemented at
`least in part by hardware comprising at least one processor, the
`method comprising the steps:
`(a) at a first computer, obtaining a content-based name
`for a particular data item from a second computer distinct from
`the first computer, the content-based name being based at least
`in part on a function of at least some of the data which comprise
`the contents of the particular data item, wherein the function
`comprises a message digest function or a hash function, and
`wherein two identical data items will have the same content-
`based name; and
`(b) by hardware in combination with software, a
`processor at said first computer ascertaining whether or not the
`content-based name for the particular data item corresponds to
`an entry in a database comprising a plurality of identifiers; and
`4
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`(c) based at least in part on said ascertaining in (b),
`determining whether or not access to the particular data item is
`authorized.
`
`70. A computer-implemented method operable in a
`system which includes a network of computers, the system
`implemented at least in part by hardware including at least one
`processor, the method comprising the steps of:
`in response to a request at a first computer, from another
`computer, said request comprising at least a content-based
`identifier for a particular data item, the content-based identifier
`for the particular data item being based at least in part on a
`given function of at least some data which comprise the
`contents of the particular data item, wherein the given function
`comprises a message digest or a hash function, and wherein two
`identical data items will have the same content-based identifier:
`(A) hardware in combination with software, determining
`whether the content-based identifier for the particular data item
`corresponds to an entry in a database comprising a plurality of
`content-based identifiers; and
`(B) based at least in part on said determining in step (A),
`selectively permitting the particular data item to be accessed at
`or by one or more computers in the network of computers, said
`one or more computers being distinct from said first computer.
`
`
`D. Prior Art Relied Upon
`
`
`
`WO 96/32685
`
`Rackspace relies upon the following prior art references:
`Woodhill
`US 5,649,196
`Jul. 15, 1997
`(Ex. 1003)
`Francisco
`US 4,845,715
`Jul. 4, 1989
`(Ex. 1004)
`Brunk
`
`US 7,289,643
`Oct. 30, 2007
`(Ex. 1006)
`
`Kinetech
`
`Oct. 17, 1996
`5
`
`(Ex. 1005)
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`
`
`Albert Langer, “Re: dl/describe (File descriptions),” post to the
`“alt.sources.d” and “comp.archives.admin” Newsgroups on Aug. 7, 1991
`(Ex. 1007)(hereinafter “Langer”).
`
`
`E. Alleged Grounds of Unpatentability
`Rackspace asserts the following grounds of unpatentability:
`
`Basis
`
`References
`
`Claim(s)
`
`§ 103
`
`§ 103
`
`Kinetech and Brunk
`Kinetech, Brunk, and
`Francisco
`§ 103 Woodhill and Francisco
`§ 103 Woodhill, Francisco, and
`Langer
`
`1, 2, 5-8, 10, 12, 14, and 16-19
`
`16-19, 24, 29, 70, 81, 82, and 86
`1, 2, 5-8, 10, 11, 14, 16-19, 24, 29,
`32, 70, 81, 82, and 86
`12
`
`
`
`II. ANALYSIS
`
`A. Claim Construction
`
`As a first step in our analysis for determining whether to institute a
`trial, we determine the meaning of the claims. In an inter partes review,
`claim terms in an unexpired patent are given their broadest reasonable
`construction in light of the specification of the patent in which they appear.
`37 C.F.R. § 42.100(b). Under the broadest reasonable construction standard,
`claims are to be given their broadest reasonable interpretation consistent
`with the specification, and the claim language should be read in light of the
`specification as it would be interpreted by one of ordinary skill in the art.
`
`6
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`In re Am. Acad. of Sci. Tech. Ctr., 367 F.3d 1359, 1364 (Fed. Cir. 2004).
`This means that the words of the claim will be given their plain meaning
`unless the plain meaning is inconsistent with the specification. In re Zletz,
`893 F.2d 319, 321 (Fed. Cir. 1989). In this regard, an inventor is entitled to
`be his or her own lexicographer of patent claim terms by providing a
`definition of the term in the specification with reasonable clarity,
`deliberateness, and precision. In re Paulsen, 30 F.3d 1475, 1480 (Fed. Cir.
`1994).
`
`
`1. “data item” and “data” (Claims 1, 2, 6-8, 10, 11, 14, 16-19, 24, 29, 32,
`70, and 82)
`In EMC Corporation v. PersonalWeb Technologies LLC, IPR2013-
`
`00082, we construed the claim terms “data item” and “data” that appeared in
`the claims of U.S. Patent No. 5,978,791 (“the ’791 patent”), which issued
`from an application for which the ’310 Patent claims the benefit under 35
`U.S.C. § 120. See EMC Corp. v. PersonalWeb Tech., LLC, IPR2013-00082,
`slip op. at 14-15 (PTAB May 17, 2013) (Paper 21); Ex. 1008, 14-15.
`Rackspace has not construed these claim limitations, but PersonalWeb
`clarifies that the specification of the ’310 Patent sets forth a definition for the
`claim term “data item” with “reasonable clarity, deliberateness, and
`precision.” Prelim. Resp. 3-4.
`Indeed, we observe that the specification of the ’310 patent provides:
`In general, the terms “data” and “data item” as used herein refer
`to sequences of bits. Thus a data item may be the contents of a
`file, a portion of a file, a page in memory, an object in an
`7
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`object-oriented program, a digital message, a digital scanned
`image, a part of a video or audio signal, or any other entity
`which can be represented by a sequence of bits.
`Ex. 1001, 2:16-21 (emphasis added). That disclosure also appears in the
`’791 patent (IPR2013-00082, Ex. 1001, 1:54-60). Based on our review of
`the specifications of the ’310 Patent and the ’791 patent, we note that the
`claim terms “data item” and “data” are used similarly in both patent
`disclosures. We also discern no reason to deviate from our claim
`constructions for the claim terms “data item” and “data” in IPR2013-00082.
`See NTP, Inc. v. Research In Motion, Ltd., 418 F.3d 1282, 1293 (Fed. Cir.
`2005) (When construing claim terms in patents that derive from the same
`parent application and share common terms, “we must interpret the claims
`consistently across all asserted patents.”).
`Therefore, consistent with our claim constructions set forth in
`IPR2013-00082, we construe the claim term “data item” as a “sequence of
`bits,” which includes one of the following: (1) the contents of a file; (2) a
`portion of a file; (3) a page in memory; (4) an object in an object-oriented
`program; (5) a digital message; (6) a digital scanned image; (7) a part of a
`video or audio signal; (8) a directory; (9) a record in a database; (10) a
`location in memory or on a physical device or the like; and (11) any other
`entity which can be represented by a sequence of bits. We also construe the
`claim term “data” as a subset of a “data item.”
`
`
`8
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`2. “content-based name” (Claim 1 and 18)
`“digital identifier”(Claim 86)
`“content-dependent name” (Claims 24 and 32)
`“content-based identifier” (Claims 70 and 81)
`Claim 86 recites that the “digital identifier for a particular sequence of
`
`bits, the digital identifier being based, at least in part, on a given function of
`at least some of the bits in the particular sequence of bits,” with claims 1, 24,
`70, and 81reciting very similar recitations for “content-based name,”
`“content-dependent name,” and “content-based identifier.” Claim 32
`provides that “the data used by the function to determine the content-
`dependent name of the particular data item comprises of all of the contents
`of the particular data item,” according to that embodiment, with claim 11
`providing a similar recitation. PersonalWeb has not proposed a claim
`construction for the claimed name or identifier limitations, but takes issue
`with some of the meanings espoused by Rackspace. Prelim. Resp. 7-9.
`
`Rackspace urges the Board to construe the claim terms “content-based
`name,” “digital identifier,” “content-dependent name,” and “content-based
`identifier” as “a substantially unique identifier for a particular data item
`generated and being determined using and depending on some or all of the
`data of the data item.” Pet. 19 (emphasis added). In support of its proposed
`construction, Rackspace proffers a declaration of Dr. Melvin Ray Mercer.
`Ex. 1009 ¶¶ 38-46. According to Rackspace, the claim term “content-
`dependent digital identifier” is neither defined nor recited in the
`
`9
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`specification of the ’310 Patent outside the claims or in any prior-filed
`application for which the ’310 Patent claims the benefit under § 120. Id.
`Rackspace’s proposed construction for the claim terms “content-based
`name,” “digital identifier,” “content-dependent name,” and “content-based
`identifier” would import improperly a limitation from the specification into
`the claim. See, e.g., Superguide Corp. v. DirecTV Enterprises, Inc., 358
`F.3d 870, 875 (Fed. Cir. 2004) (“Though understanding the claim language
`may be aided by the explanations contained in the written description, it is
`important not to import into a claim limitations that are not a part of the
`claim.”).
`A substantially unique identifier is based on “all of the data in the
`data item, and only the data in the data item. ”1 There would be no occasion
`in which a substantially unique identifier would be determined using and
`depending on some of the data of the data item. Put simply, the claim terms
`“content-based name,” “digital identifier,” “content-dependent name,” and
`“content-based identifier” essentially would be defined as “a substantially
`unique identifier,” requiring that the identifier be based on “all of the data in
`the data item, and only the data in the data item.” Such a construction would
`be more restrictive than the claim language “each said content-dependent
`digital identifier being based at least in part on a given function of at least
`
`
`1 In IPR2013-00082, we previously construed the term “substantially unique
`identifier” as “an identity for a data item generated being determined using
`and depending on all of the data in the data item, and only the data in the
`data item.” IPR2013-00082, Paper 21, 13-14; Ex. 1008, 13-14.
`10
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`some of the bits in the particular sequence of bits of the particular data item,”
`recited in the subject claims. Therefore, we decline to adopt Rackspace’s
`proposed construction.
`Rather, the claims themselves provide a definition of the claim terms
`“content-based name,” “digital identifier,” “content-dependent name,” and
`“content-based identifier” —namely, an identifier for a data item “being
`based at least in part on a given function of at least some of the bits in the
`particular sequence of bits of the particular data item.” We discern no
`reason to deviate from that express definition.
`
`
`3. “a plurality of identifiers” (Claims 1, 5, 6)
`“a plurality of values” (Claims 24, 69, 81, and 86)
`Claim 1 recites “a database comprising a plurality of identifiers.”
`
`Claim 24 recites “causing the content-dependent name of the particular data
`item to be compared to a plurality of values,” (emphasis added) with claims
`81 and 86 providing a comparison between the plurality of values and a
`content-based identifier and a digital identifier, respectively. PersonalWeb
`has not proposed a claim construction for the claim terms “a plurality of
`identifiers” or “a plurality of values.” Prelim. Resp. 7-9.
`
`Rackspace urges the Board to construe the claim term a “plurality of
`identifiers” as “substantially unique identifier values, e.g., content-based
`names, content-dependent identifiers, content-based identifiers or digital
`identifiers, generated for at least one data item of a plurality of the data
`items.” Pet. 19-20, 23-24 (citing to Ex. 1009 ¶ 43; Ex. 1001, 37:57-59,
`11
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`38:14-18). Rackspace makes a similar plea with respect to “a plurality of
`values.” Pet. 20, 24. However, Rackspace’s proposed construction would
`import improperly a limitation—“all of the data in the data item, and only
`the data in the data item”—from the specification into the claim. See Deere
`& Co. v. Bush Hog, LLC, 703 F.3d 1349, 1354 (Fed. Cir. 2012) (“While
`claim terms are understood in light of the specification, a claim construction
`must not import limitations from the specification into the claims.”). Such a
`construction would be more restrictive than the claim language “the content-
`based name being based at least in part on a function of at least some of the
`data which comprise the contents of the particular data item,” recited in
`claim 1. Similarly, claim 24 provides “the content-dependent name being
`based, at least in part, on at least a function of the data in the particular data
`item.” Therefore, we decline to adopt Rackspace’s proposed construction.
`In that regard, we observe that claims 1, 24, 69, 81, and 86,
`themselves, provide definitions of the claim terms “a plurality of identifiers”
`and “a plurality of values” —namely, each of the identifiers is an identity for
`a data item “being based, at least in part, on at least some of the data in a
`corresponding data item.” And the values are used for comparisons with
`content-dependent names, content-based identifiers, and digital identifiers.
`We discern no reason to deviate from those express definitions.
`
`
`12
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`4.
`
` “selectively permitting” (Claim 70)
`“selectively allow” (Claims 81 and 86)
`Claim 70 recites “selectively permitting the particular data item to be
`
`accessed” (emphasis added) and claims 81 and 86 recite “selectively allow
`said particular sequence of bits to be provided to or accessed by other
`devices.” (emphasis added). Rackspace alleges that the terms do not appear
`in the specification of the ’310 Patent outside the claims, and the broadest
`reasonable definition is “permitting or not permitting [the recited act]
`depending on [the recited selection condition],” with a similar definition of
`“selectively allowing.” Pet. 20, 24-25.
`
`However, PersonalWeb disagrees with Rackspace’s proposed claim
`construction, because it would remove the “selectively” aspect and
`improperly introduce “or” into the construction. Prelim. Resp. 5-7. We
`agree with PersonalWeb. In the context of claims 70, 81, and 86, we
`construe the claim terms “selectively permitting” as “permitting based on
`whether the recited condition is met,” and “selectively allow” as “allowing
`based on whether the recited condition is met.”
`
`B. Principles of Law
`
`A patent claim is unpatentable under 35 U.S.C. § 103(a) if the
`differences between the claimed subject matter and the prior art are such that
`the subject matter, as a whole, would have been obvious at the time the
`invention was made to a person having ordinary skill in the art to which said
`subject matter pertains. KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 406
`
`13
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`(2007). The question of obviousness is resolved on the basis of underlying
`factual determinations including: (1) the scope and content of the prior art;
`(2) any differences between the claimed subject matter and the prior art;
`(3) the level of ordinary skill in the art; and (4) objective evidence of
`nonobviousness. Graham v. John Deere Co., 383 U.S. 1, 17-18 (1966).
`The level of ordinary skill in the art is reflected by the prior art of
`record. See Okajima v. Bourdeau, 261 F.3d 1350, 1355 (Fed. Cir. 2001);
`In re GPAC Inc., 57 F.3d 1573, 1579 (Fed. Cir. 1995); In re Oelrich,
`579 F.2d 86, 91 (CCPA 1978).
`
`
`C. Obviousness over Woodhill and Francisco
`Rackspace asserts that claims 1, 2, 5-8, 10, 11, 14, 16-19, 24, 29, 32,
`
`70, 81, 82, and 86 of the ’310 Patent are unpatentable under 35 U.S.C. § 103
`over the combination of Woodhill and Francisco. Pet. 36-57. Rackspace
`provides a rationale for modifying Woodhill in light of Francisco to arrive at
`the features of claims 1, 24, 70, 81, and 86 (id. at 42-43, 48, 52, 56), based in
`part, on the testimony of Dr. Mercer. Ex. 1009 ¶¶ 135-191.
`
`PersonalWeb opposes, and argues that Woodhill does not disclose or
`suggest the “causing the content-dependent name of the particular data item
`to be compared to a plurality of values” or the conditional allowance of
`providing or accessing the particular data item, as recited in the subject
`claims. Prelim. Resp. 13-21. PersonalWeb also advances several arguments
`under the premise that there is insufficient reason to combine the teachings
`of Woodhill and Francisco. Id. at 21-25. We are not persuaded by
`14
`
`

`
`
`
`Casee IPR2014--00062
`10 B2
`
`Patennt 7,802,3
`
`
`
`PersonalWeb’ss argumentts. Rather,, we determmine that RRackspace’’s
`
`Woodhill disclosess a system for distribbuted storagge manageement on aa
`
`
`
`
`
`
`
`expl
`
`
`
`
`anations annd supportting evidennce are perrsuasive.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`compputer netwwork systemm. Ex. 10003, 1:11-177. Figure 11 of Woodhhill,
`
`
`
`
`
`
`
`reprooduced bellow, depictts a compuuter networrk system tthat includdes a
`
`
`
`
`distrributed storrage managgement sysstem.
`
`
`
`
`
`
`
`As illusttrated in Fiigure 1 of WWoodhill,
`
`each locall area netwwork 16
`
`
`incluudes multipple user woorkstationss 18 and loocal compuuters 20. Idd. at 3:24-
`
`
`
`
`
`
`
`
`
`
`
`
`44. Woodhill’s system inncludes a DDistributedd Storage MManager (DDSM)
`
`
`proggram for buuilding andd maintainiing the Filee Databasee. Id. at 3:444-49.
`
`
`
`
`
`15
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`The DSM program views a file as a collection of data streams, and
`divides each data stream into one or more binary objects. Id. at 4:13-23;
`7:40-43; Fig. 5A, item 132. More specifically, the data streams represent
`regular data, extended attribute data, access control list data, etc. Id. at 7:44-
`47. For each binary object being backed up, a Binary Object Identification
`Record is created in a File Database and includes a Binary Object Identifier
`to identify a particular binary object uniquely. Id. at 7:60-8:1; 8:33-34.
`Binary Object Identifiers are calculated based on the contents of the
`data so that the Binary Object Identifier changes when the contents of the
`binary object changes. Id. at 8:57-62; 8:40-42. Notably, the Binary Object
`Identifier includes a Binary Object Hash field, which is calculated against
`the contents of the binary object that is taken one word (16 bits) at a time
`using a hash algorithm. Id. at 8:22-32. Duplicate binary objects can be
`recognized from their identical Binary Object Identifiers, even if the objects
`reside on different types of computers in a heterogeneous network. Id. at
`8:62-65.
`We agree with Rackspace that the Binary Object Identifiers of
`Woodhill are equivalent to the “content-based name,” “digital identifier,”
`“content-dependent name,” and “content-based identifier” recited in claims
`1, 24, 32, 70, 81, and 86. Pet. 38, 44-45, 48, 50, 53, 57. They are based on a
`cryptographic hash, with the chance of two different binary objects being
`assigned the same Binary Object Identifier being very small. Ex. 1003,
`8:33-36. Based on this, two identical data items will have the same Binary
`Object Identifier. Ex. 1009 ¶ 129.
`
`16
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`Francisco discloses a data processing system that generates electronic
`
`identification indicia for authorized software programs. Ex. 1004, 2:12-16.
`The system also maintains the electronic identification indicia in an
`authorized user profile library in correlative relation with electronic
`identifications of all authorized users. Id. at 2:51-64. The system selectively
`permits authorized users to access the selected software program, and
`prevents unauthorized access. Id. at 3:29-36. As explained in Francisco,
`one of the advantages of Francisco’s authorization check mechanism is to
`improve system security by preventing unauthorized access to proprietary
`software programs. Id. at 1:26-35, 54-59. As discussed by Rackspace, the
`process of matching the indicia would involve comparing them with a
`plurality of values, and providing for selective access. Pet. 42.
`Rackspace further contends that a person of ordinary skill in the art
`reading Woodhill and Francisco would have understood that the
`combination of Woodhill and Francisco would have allowed for the
`selective access features of Francisco to be used with Woodhill’s content-
`dependent identifiers feature. Pet. 42-43. We agree and we are persuaded
`that the combination likely would render claims 1, 2, 5-8, 10, 11, 14, 16-19,
`24, 29, 32, 70, 81, 82, and 86 of the ’310 Patent unpatentable under 35
`U.S.C. § 103.
`Turning to PersonalWeb’s arguments against this ground, in its
`preliminary response, PersonalWeb argues that Woodhill never makes a
`determination as to whether access to a given data item is not authorized,
`(Prelim. Resp. 14), that Woodhill never compares a binary object identifier
`
`17
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`to a plurality of values, (id. at 15-19), and that Woodhill’s processes never
`provide an alleged data item to a second computer, (id. at 19-20). However,
`all of these arguments address Woodhill alone and do not address the
`combination of Woodhill and Francisco. In each case, as discussed above,
`we agree with Rackspace that the aspects disputed by PersonalWeb are
`disclosed in Francisco. Nonobviousness cannot be established by attacking
`references individually where, as here, the ground of unpatentability is based
`upon the teachings of a combination of references. In re Keller, 642 F.2d
`413, 426 (CCPA 1981). Rather, the test for obviousness is whether the
`combination of references, taken as a whole, would have suggested the
`patentees’ invention to a person having ordinary skill in the art. In re Merck
`& Co., 800 F.2d 1091, 1097 (Fed. Cir. 1986).
`PersonalWeb also argues that Woodhill does not use binary object
`identifiers or contents identifiers as names, and alleges their use as names
`was not added to the Woodhill disclosure until after the effective filing date
`of the ’310 Patent. Id. at 20-21, n. 1. However, that does not address the
`obviousness of using the binary object identifiers as names in view of
`Woodhill, nor has PersonalWeb submitted credible or sufficient evidence
`that the contemplation of binary object identifiers as names actually
`occurred after the effective filing date. We do not find PersonalWeb’s
`arguments to be persuasive.
`PersonalWeb maintains that “it would not have been obvious to have
`modified Woodhill’s granularization procedure based on Francisco to have
`used Woodhill’s binary object identifiers 74 to determine whether alleged
`
`18
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`access to each binary object was authorized/unauthorized.” Id. at 21.
`According to PersonalWeb, “Woodhill’s granularization process upon which
`petitioner relies relates only to ‘large’ database files that each have many
`binary objects and many granules” (Ex. 1003, 14:52-67; 15:11-17; 17:18-22,
`31-35), whereas “Francisco discloses checking to see if a user is authorized
`to access an entire ‘program.’” Prelim. Resp. 21-22.
`We are not persuaded by PersonalWeb’s arguments. “It is well-
`established that a determination of obviousness based on teachings from
`multiple references does not require an actual, physical substitution of
`elements.” In re Mouttet, 686 F.3d 1322, 1332 (Fed. Cir. 2012); see also In
`re Etter, 756 F.2d 852, 859 (Fed. Cir. 1985) (en banc) (“[T]he criterion [is]
`not whether the references could be physically combined but whether the
`claimed inventions are rendered obvious by the teachings of the prior art as a
`whole.”).
`PersonalWeb fails to recognize that Woodhill’s granularization
`procedure merely applies to large database files, and is not applicable to all
`data files. Ex. 1003, 14:53–15:8. Further, Woodhill specifically states that a
`single binary object represents the data stream if the size of the data stream
`is equal to or less than previously defined convenient maximum binary object
`size (e.g., one megabyte). Id. at 4:23-26. Only when the data stream is
`larger than the maximum binary object size, then the DSM program divides
`the data stream into multiple binary objects. Id. at 4:26-30. PersonalWeb
`incorrectly assumes that Francisco’s programs are larger than the maximum
`binary object size. In fact, Francisco does not indicate the size of the
`
`19
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`program, but merely states that the program may be considered broadly “as
`arbitrarily ordered series of actions or instructions, in binary form, capable
`of being interpreted and executed by an information processing system for
`the purpose of manipulating information.” Ex. 1005, 2:16-22. Moreover,
`one with ordinary skill in the art would have recognized that Woodhill’s
`previously defined convenient maximum binary object size is adjustable to
`accommodate larger data streams if necessary. See KSR, 550 U.S. at 420-21
`(A person with ordinary skill in the art is “a person of ordinary creativity,
`not an automaton,” and “in many cases . . . will be able to fit the teachings of
`multiple patents together like pieces of a puzzle.”).
`PersonalWeb further alleges that Woodhill teaches away from
`Rackspace’s proposed combination, because the modification “would have
`resulted in dramatic increase in both human intervention and costs which
`Woodhill teaches would have been undesirable.” Prelim. Resp. 24. In
`particular, PersonalWeb argues that “Francisco’s system requires that each
`of many users has an authorized user profile and electronic identification,
`and that all of this must be stored in the system” and that would have been
`inefficient and very costly. Id.
`PersonalWeb’s arguments are unpersuasive. “A reference may be
`said to teach away when a person of ordinary skill, upon reading the
`reference, would be discouraged from following the path set out in the
`reference, or would be led in a direction divergent from the path that was
`taken by the [inventor].” In re Gurley, 27 F.3d 551, 553 (Fed. Cir. 1994). A
`reference does not teach away, however, if it merely expresses a general
`
`20
`
`

`
`Case IPR2014-00062
`Patent 7,802,310 B2
`
`preference for an alternative invention, but does not “criticize, discredit, or
`otherwise discourage” investigation into the invention claimed. In re
`Fulton, 391 F.3d 1195, 1201 (Fed. Cir. 2004).
`At the outset, Francisco’s authorization check mechanism is an
`automated computer method. Ex. 1004, 1:9-15 (“This invention relates to
`data processing system security . . . automatic authentication of both a
`selected program and permitted user thereof when system resources are to be
`utilized.”) (emphasis added). PersonalWeb does not explain adequately why
`incorporating an automated authorization check mechanism would increase
`human intervention significantly. Nor do we discern any evidence on this
`record supporting PersonalWeb’s allegation that such implementation would
`increase human intervention dramatically.
`Although implementing Francisco’s authorization check mechanism
`may increase cost, such disadvantages are not dispositive of non-
`obviousness, especially in view of the explicit teachings of Francisco as to
`the advantages of an authorization check mechanism to improve system
`security by preventing unauthorized access to proprietary software program
`materials. See Medichem, S.A. v. Rolabo, S.L., 437 F.3d 1157, 1165 (Fed.
`Cir. 2006) (“[G]iven course of action often has simultaneous advantages and
`disadvantages, and this does not necessarily obviate motivation to
`combine.”).

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket