throbber
Trials@uspto.gov
`Tel: 571-272-7822
`
`Paper 14
`Entered: July 1, 2014
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`FACEBOOK, INC.
`Petitioner
`
`v.
`
`EVOLUTIONARY INTELLIGENCE, LLC
`Patent Owner
`
`
`
`Case IPR2014-00093
`Patent 7,010,536 B1
`
`
`
`Before KALYAN K. DESHPANDE, TREVOR M. JEFFERSON,
`BRIAN J. McNAMARA, NEIL T. POWELL, and
`GREGG I. ANDERSON, Administrative Patent Judges.
`
`DESHPANDE, Administrative Patent Judge.
`
`DECISION
`Petitioner’s Request for Rehearing
`37 C.F.R. § 42.71
`
`
`
`
`
`
`
`
`
`

`
`Case IPR2014-00093
`Patent 7,010,536 B1
`
`
`I.
`
`INTRODUCTION
`
`Facebook, Inc. (“Petitioner”) filed a request for rehearing (Paper 13 “Req.
`
`Reh’g”) of the Board’s decision, dated April 28, 2014, which denied institution of
`
`inter partes review of claims 15 and 16 of U.S. Patent 7,010,536 B1. Paper 12.
`
`Petitioner contends that the Board should have instituted review of claim 15 as
`
`anticipated by Cooper and claim 16 as obvious over Cooper, Fortune, and Veditz.
`
`Req. Reh’g 2. For the reasons stated below, Petitioner’s request is denied.
`
`II.
`
`STANDARD OF REVIEW
`
`Under 37 C.F.R. § 42.71(c), “[w]hen rehearing a decision on petition, a
`
`panel will review the decision for an abuse of discretion.” An abuse of discretion
`
`occurs when a “decision was based on an erroneous conclusion of law or clearly
`
`erroneous factual findings, or . . . a clear error of judgment.” PPG Indus. Inc. v.
`
`Celanese Polymer Specialties Co. Inc., 840 F.2d 1565, 1567 (Fed. Cir. 1988)
`
`(citations omitted). The request must identify, specifically, all matters the party
`
`believes the Board misapprehended or overlooked. 37 C.F.R. § 42.71(d).
`
`III. DISCUSSION
`
`Petitioner contends that the Board misapprehended or overlooked the
`
`following: the Petition established that the real key is a “register,” the Petition
`
`established that the real key “forms part of” the file management program
`
`“container,” the Petition established that a software product file is a “container”
`
`that is “added” to the file management program “container,” and the Petition
`
`established that the real key “controls” whether a software product file container is
`
`added to the file management program container. Req. Reh’g 5-17.
`
` 2
`
`
`
`
`
`

`
`Case IPR2014-00093
`Patent 7,010,536 B1
`
`
`A. The Petition failed to establish that the real key is a “register” and the
`real key “forms part of” the file management program “container”
`
`Petitioner argues that the Board misapprehended or overlooked Petitioner’s
`
`argument that the real key is a “register” and the real key “forms part of” the file
`
`management program “container.” Req. Reh’g 5-8. Petitioner specifically argues
`
`that the real key is a “register,” under the broadest reasonable interpretation,
`
`because the real key is (1) a “value” and (2) “associated with a container.” Req.
`
`Reh’g 5 (citing Decision 17). Petitioner further argues that the real key is
`
`“associated with” the “file management program” in Cooper because the file
`
`management program container (1) generates the real key, (2) validates the real
`
`key, and (3) uses the real key. Req. Reh’g 6 (citing Ex. 1003, 16:5-8, 16:19-27,
`
`16:39-46, Fig. 23). Petitioner also argues that the real key “forms part of the
`
`container,” under the broadest reasonable interpretation, because the file
`
`management program in Cooper (1) generates the real key, (2) validates the real
`
`key, and (3) uses the real key. Req. Reh’g 7-8.
`
`Petitioner’s argument that the real key is “associated with a container” and
`
`“forms part of the container” because Cooper’s file management program
`
`generates, validates, and uses the real key, however, was not raised until this
`
`request for rehearing. Although Petitioner cites portions of Cooper that disclose
`
`the generation, validation, and use of the real key, Petitioner has not directed us to
`
`where this argument was presented in the Petition. Accordingly, we did not
`
`misapprehend or overlook this argument because it was not previously presented.
`
`Although 37 C.F.R. § 42.71(d) permits a party to file a request for rehearing, it is
`
`not an opportunity to submit new arguments.
`
`Furthermore, the Board determined that Petitioner had failed to establish that
`
`Cooper discloses that the “real key” is “associated with” and “forms part of” the
`
` 3
`
`
`
`
`
`

`
`Case IPR2014-00093
`Patent 7,010,536 B1
`
`
`file management program within the meaning of claim 15. Decision 17-18.
`
`Petitioner’s argument that Cooper’s real key “forms part of the container” because
`
`Cooper’s file management program generates, validates, and uses the real key still
`
`fails to illustrate how the steps generating, validating, and using the real key
`
`discloses that the real key “forms part of the” file management program container.
`
`Petitioner has not provided any evidence or rationale that explains how the steps of
`
`generating, validating, and using the real key means the real key “forms part of
`
`the” file management program container. Accordingly, although this argument is
`
`first raised on this request for rehearing and therefore we could not have
`
`misapprehended or overlooked it, this argument is also not persuasive.
`
`B. The Petition failed to establish that a software product file is a
`“container” that is “added” to the file management program
`“container”
`
`Petitioner contends that the Board misapprehended Petitioner’s argument
`
`when we stated that “we are not persuaded that once the ‘real key’ is used to
`
`decrypt software, the decrypted software, as a ‘register’ or ‘container,’ is added to
`
`the file management program.” Req. Reh’g 8-9 (citing Decision 18). Petitioner
`
`states that, instead of decrypted software, it identified encrypted software as the
`
`“container added to the file management program.” Req. Reh’g 9. In support of
`
`this contention, Petitioner points to the following argument in the Petition:
`
`When a user attempts to access an encrypted software product file, the
`file management program uses the ‘real key’ to determine whether
`access will be permitted. . . . The ‘real key’ accordingly qualifies as an
`‘acquire register’ because it is used to control whether the container
`(e.g., the file management program) will add a container (e.g., a
`software product file) from other containers (e.g., the group of
`software product files on disk) . . . .”
`
` 4
`
`
`
`
`
`

`
`Case IPR2014-00093
`Patent 7,010,536 B1
`
`
`Req. Reh’g 9 (citing Pet. 41). Petitioner further argues that the “encrypted
`
`software” is “applied as an input” to the decryption engine, where the decryption
`
`engine is part of the file management program (emphasis in original). Req. Reh’g
`
`10-11. Petitioner argues that “[b]ecause the encrypted software product file is
`
`input in to the file management program container, it is ‘added’ to that container.”
`
`Req. Reh’g 11-13.
`
`Petitioner’s argument that the “encrypted software,” and not the “decrypted
`
`software,” is the container being added, i.e., that the “encrypted software program
`
`file” is “applied as input” and therefore “added” to the file management program
`
`container, was not presented in the Petition. Notwithstanding the material
`
`Petitioner cites at pages 39 and 41 (quoted above) of the Petition concerning an
`
`acquire register, the Petition does not argue that applying the software program file
`
`as input is the same as adding that software program file to the file management
`
`program container. Citing only to Cooper, Petitioner first presents this argument in
`
`the Request for Rehearing. Req. Reh’g 10-11. Accordingly, we could not have
`
`overlooked or misapprehended this argument because it was not previously
`
`presented.
`
`Additionally, we are not persuaded that a software program file container
`
`“applied as input” to an engine of file management program container necessitates
`
`that the one container is added to the other container. Although Petitioner argues
`
`that there is no requirement of physically adding a container, in light of the Board’s
`
`broadest reasonable construction of “container,” Petitioner has not provided any
`
`evidence or rationale illustrating how the input of a software product file to a
`
`decryption engine constitutes “adding” the input software product file to the file
`
`management program “logically defined data enclosure” or container. See
`
`Decision 9 (emphasis added).
`
` 5
`
`
`
`
`
`

`
`Case IPR2014-00093
`Patent 7,010,536 B1
`
`
`In its Request for Rehearing, Petitioner presents the alternative argument
`
`that if the “decrypted software” is considered the container being added to the file
`
`management program container, Cooper discloses this limitation as well. Req.
`
`Reh’g 11-13. Petitioner’s alternative argument is inconsistent with its
`
`acknowledgement that the rationale in the Petition is that the “encrypted software”
`
`is considered to be the container being added to the file management program
`
`container. Req. Reh’g 9. Accordingly, Petitioner’s argument that the “decrypted
`
`software” can be considered the container added to the file management program
`
`container is a new argument and therefore we could not have misapprehended or
`
`overlooked this argument.
`
`Petitioner also argues “to the extent that the Board suggested that the
`
`encrypted software product file and/or the file management program are not
`
`‘container,’ any such suggestion would constitute clear error.” Req. Reh’g 14.
`
`The Board did not make a determination that the encrypted software product file or
`
`file management program are not “containers.” Accordingly, this argument is not
`
`persuasive.
`
`C. The Petition failed to establish that the real key “controls” whether a
`software product file container is added to the file management program
`container
`
`Petitioner contends that the Board misapprehended or overlooked
`
`Petitioner’s argument that Cooper discloses a real key that “controls” whether the
`
`software product file is added to the file management program container. Req.
`
`Reh’g 15-16. Petitioner specifically argues that Cooper discloses a “validation”
`
`step is performed on the real key and that after the real key has been validated, the
`
`encrypted software product file is input into the decryption engine. Id. Petitioner
`
`argues that because the real key must be validated before the encrypted software
`
` 6
`
`
`
`
`
`

`
`Case IPR2014-00093
`Patent 7,010,536 B1
`
`
`product file is input into the decryption engine, the real key “controls” whether the
`
`software product file is added to the file management program container. Id.
`
`As discussed above, Petitioner’s argument that the “encrypted software
`
`program file” is “applied as input” and therefore “added” to the file management
`
`program container was not presented in the Petition. Thus, Petitioner’s argument
`
`that the real key “controls” whether the software product file is input to the
`
`decryption engine and therefore “controls” whether the software product file is
`
`input to the decryption engine is also a new argument. We could not have
`
`misapprehended or overlooked this argument because it is first being raised in this
`
`request for rehearing. Additionally, this argument is not persuasive for the same
`
`reasons as those discussed above concerning whether the software product file is
`
`added to the file management program container.
`
`D. The Petition failed to establish that claim 16 is obvious over Cooper,
`Fortune, and Veditz
`
`Petitioner contends that the Board erred in denying institution of inter partes
`
`review of claim 16 as obvious over Cooper, Fortune, and Veditz for the same
`
`reasons discussed above with respect to claim 15. Petitioner’s arguments are not
`
`persuasive with respect to claim 15 and are not persuasive with respect to claim 16
`
`for the same reasons.
`
`IV. ORDER
`
`Accordingly, it is hereby
`
`ORDERED that Patent Owner’s request for rehearing is denied.
`
` 7
`
`
`
`
`
`
`
`
`
`

`
`Case IPR2014-00093
`Patent 7,010,536 B1
`
`
`For PETITIONER:
`
`Heidi Keefe
`hkeefe@cooley.com
`
`Mark Weinstein
`mweinstein@cooley.com
`
`
`
`For PATENT OWNER:
`
`Anthony J. Patek
`Anthony@gutridesafier.com
`
`Todd Kennedy
`todd@gutridesafier.com
`
`
`
` 8

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket