throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`PATENT TRIAL & APPEAL BOARD
`
`
`
`
`
`In re Patent of: Smith et al.
`U.S. Patent No.: 6,128,649
`Issue Date:
` October 3, 2000
`Appl. No.:
`
`08/867,624
`Filing Date:
`
`June 2, 1997
`Title:
`Dynamic Selection of Media Streams for Display
`
`
`DECLARATION OF PROFESSOR BRUCE McNAIR
`
`
`I, Prof. Bruce McNair, declare as follows:
`
`I.
`
`
`Background and Qualifications
`
`(1.) My name is Bruce McNair. I am a Distinguished Service Professor of
`
`Electrical and Computer Engineering at Stevens Institute of Technology in
`
`Hoboken, NJ. I have studied and practiced in the fields of electrical engineering,
`
`computer engineering, and computer science for over 40 years, and have been a
`
`professor of electrical and computer engineering since 2002.
`
`(2.)
`
`I received my Masters of Engineering (M.E.) degree in the field of
`
`Electrical Engineering from Stevens Institute of Technology in 1974 and my
`
`Bachelor of Engineering (B.E.) degree in Electrical Engineering in 1971 from
`
`Stevens as well.
`
`(3.)
`
`I am the Founder and Chief Technology Officer of Novidesic
`
`Communications, LLC, a technology consulting company. Prior to starting
`
`Novidesic and joining the faculty at Stevens in 2002, I spent 24 years at AT&T
`1
`

`
`CISCO Exhibit 1008, pg. 1
`
`

`
`Bell Laboratories. My most recent work there included research into next
`
`generation (4G and beyond) wireless data communications systems, including
`
`high-speed, high mobility wide area networks as well as range and speed
`
`extensions to 802.11(a & b) wireless LANs. Before that, my activities included
`
`development of encryption hardware, secure voice architecture studies, high-speed
`
`voice-band modems, and public data network protocols.
`
`(4.) Before joining Bell Labs, I spent seven years developing military
`
`communications systems for the US Army Electronics Command and ITT Defense
`
`Communications Division. My responsibilities included cryptographic and ECCM
`
`techniques for portable radio systems, TEMPEST technology, and state-of-the-art
`
`speech compression techniques.
`
`(5.) Since becoming a faculty member in 2002 (and even before) I have
`
`published over 20 technical publications in scientific journals or conferences in the
`
`fields of digital communications and security. I have 25 U.S. patents in related
`
`fields, as well as 19 associated international patents. As part of my research as a
`
`professor and previously at Bell Labs, I have developed and implemented many
`
`different communications networks with network controls and user-specified
`
`policies, similar to the goal of U.S. Patent No. 6,128,649 (“the ‘649 patent”) and
`
`which I explain in more detail below. My graduate teaching at Stevens Institute of
`
`Technology has included courses in Wireless Systems Security and Information
`

`
`2
`
`CISCO Exhibit 1008, pg. 2
`
`

`
`Systems Security, which include treatment of network quality of service policies
`
`and mechanisms to allow network and user control of operation.
`
`(6.)
`
`I am a Senior Member of the IEEE and belong to the Communications
`
`and Signal Processing Societies. I have served as the Secretary of the IEEE
`
`Communications Society Communications Security Committee.
`
`(7.) A copy of my latest curriculum vitae (C.V.) is attached to this
`
`declaration as Appendix A.
`
`II. Description of the Relevant Field and the Relevant Timeframe
`
`(8.)
`
`I have carefully reviewed the ‘649 patent as well as the ‘649 patents
`
`prosecution history.
`
`(9.) For convenience, all of the information that I considered in arriving at
`
`my opinions is listed in Appendix B. Based on my review of these materials, I
`
`believe that the relevant field for purposes of the ‘649 patent is management of
`
`delivery over a multimedia network. I have been informed that the relevant
`
`timeframe is on or before June 2, 1997.
`
`(10.) As described in Section I above and as shown in my CV, I have
`
`extensive experience in electrical engineering and computer science. Based on my
`
`experience, I have a good understanding of the relevant field in the relevant
`
`timeframe.
`

`
`3
`
`CISCO Exhibit 1008, pg. 3
`
`

`
`III. The Person of Ordinary Skill in the Relevant Field in the Relevant
`Timeframe
`
`
`
`(11.) I have been informed that “a person of ordinary skill in the relevant
`
`field” is a hypothetical person to whom an expert in the relevant field could assign
`
`a routine task with reasonable confidence that the task would be successfully
`
`carried out. I have been informed that the level of skill in the art is evidenced by
`
`prior art references. The prior art discussed herein demonstrates that a person of
`
`ordinary skill in the field, at the time the ‘649 patent was effectively filed, was
`
`aware of standard multimedia network communication infrastructures,
`
`provisioning network services and resources (including network conditions that
`
`might influence network operation, such as congestion), and user policies that
`
`might allow a user to specify the format or type of content they wished to access.
`
`(12.) Based on my experience, I have an understanding of the capabilities
`
`of a person of ordinary skill in the relevant field. I have supervised and directed
`
`many such persons over the course of my career. Further, I had those capabilities
`
`myself at the time the patent was effectively filed.
`
`IV. Scientific Principles Underlying the ‘649 Patent
`
`(13.) The ‘649 patent represents a simple combination of several well-
`
`known networking principles: distributing multimedia content to a number of
`
`users, providing a mechanism for a user to express preferences about what they are
`
`shown or how it is displayed, and control of the system based on conditions of the
`4
`

`
`CISCO Exhibit 1008, pg. 4
`
`

`
`servers, clients or network resources including capacity, bandwidth, or other
`
`facilities. A brief description of these concepts is provided below, as well as
`
`general network architecture design considerations.
`
`A. Distribution of Multimedia Content
`
`(14.) Simple video distribution has been studied since television was first
`
`presented in 1939, but until the arrival of high-speed data networks and the interest
`
`in merging multiple media streams (multimedia) little advancement occurred. For
`
`this reason, I will direct this discussion to the distribution of multimedia
`
`information. A search of the IEEE database (Iexplore) shows over three thousand
`
`journal and conference papers on multimedia by 1995. Basically, in this time
`
`period, multimedia systems, such as multiparty conference systems as described
`
`and claimed in the ‘649 patent, were a “hot topic” for research with many
`
`conference papers and technical journal articles published.
`
`(15.) For example, by 1993, researchers at the University of California, San
`
`Diego, published on the Multimedia Multicast Channel, which provided a service
`
`analogous to cable television, but using multimedia information. Specifically, a
`
`source transmitted multiple video and audio streams on a given channel and the
`
`receivers tuned in to a channel using filters such that the appropriate video and
`
`audio streams, matching the requirements of the end-user’s terminal, were
`

`
`5
`
`CISCO Exhibit 1008, pg. 5
`
`

`
`satisfied.1 Similarly, U.S. Patent No. 5,928,330 to Goetz et al. describes a system,
`
`device, and method for streaming a multimedia file wherein multiple streams of
`
`“duplicate” content were transmitted, such that the receiver could choose the
`
`language of the presentation, for example, or choose an audio stream that is
`
`encoded for a transmission rate that matches the network’s characteristics.2
`
`B. User Choice or Selection of Media Streams
`
`(16.) The next concept is one of user choice or selection, referred to as a
`
`user policy in the ‘649 patent. Simply changing the channel of a TV set or radio is
`
`one form of implementation of a user policy, but what the ‘649 patent tries to
`
`address is a dynamic selection without real-time user intervention. Applying this
`
`concept to multimedia systems is also not new. In the mid-1970s, Ceefax was a
`
`multimedia information distribution system that used unviewable sections of a TV
`
`signal to distribute text information. By 1987, software on a user’s computer was
`
`able to perform keyword searches in the Ceefax data stream according to a user’s
`
`policy to display the desired information. By 1995, VCRs were able to read the
`
`channel guides transmitted using Ceefax and, according to a user’s prior
`
`instructions (policy), dynamically select programs for viewing and recording.
`
`(17.) Similarly, U.S. Patent No. 5,410,344 to Graves et al. discloses a
`
`method for developing a preferred viewing file for broadcast TV or video-on-
`                                                       
`1 Ex. 1009 at Abstract, pp. 9-11.
`2 Ex. 1010 at 4:34-54.
`

`
`6
`
`CISCO Exhibit 1008, pg. 6
`
`

`
`demand based upon user-specified instructions/preferences. The preferred viewing
`
`file is created “by comparing the viewer’s own preferences for various program
`
`attributes with a coded field having ratings for corresponding attributes.”3
`
`(18.) Further still, as disclosed by the references applied in the concurrently
`
`filed petition for inter partes review, and discussed in greater detail below, known
`
`viewing policies included language preference, user security or access rights,
`
`quality of service (“QoS”) preferences, cost preferences, and video stream or user-
`
`view preferences.
`
`C. Monitoring and Adapting to Network Conditions
`
`(19.) The third concept is that of basing the display of information on
`
`network or terminal conditions. This is one of the oldest concepts of operating a
`
`data network and is part of any communications protocol. In the late 1970s, IBM’s
`
`SDLC protocol as well as X.25’s HDLC protocol had incorporated the idea of link
`
`level flow control. Whenever a terminal is unable to process incoming data,
`
`perhaps because of a full receive buffer, it can express this terminal condition to
`
`the network by imposing a flow control condition,4 basically telling the network to
`
`stop sending. Networks, internally, use the same process to prevent overload, so
`
`one of ordinary skill in the art of network design and operation would be quite
`
`familiar with this concept. Further, this feature is part of any significant network
`                                                       
`3 Ex. 1011 at 9:35-54.
`4 Ex. 1012 at p. 8.
`

`
`7
`
`CISCO Exhibit 1008, pg. 7
`
`

`
`that was designed before the filing date of the ‘649 patent, such as X.25 networks,
`
`TCP/IP networks, etc., which would serve as the underlying connectivity for the
`
`network in the patent.
`
`(20.) X.25 and TCP/IP networks are packet switched networks where
`
`information is placed in information bundles, called packets, and each packet is
`
`sent from source to destination, independently of previous packets. Because each
`
`packet is routed and transmitted separately, if any path from source to destination
`
`exists, the network will discover the path and send the packets along the path.
`
`Unfortunately, the independent routing and transmission characteristics that give
`
`packet switched networks their robustness and survivability in the face of the
`
`possibility of multiple node failures have a cost associated with them –
`
`unpredictable and often significant end-to-end delay.
`
`(21.) The alternative is to use circuit switched networks, like Asynchronous
`
`Transfer Mode (ATM) networks. In circuit switched networks, a path from source
`
`to destination is found once at the start of a communication session (a call) and all
`
`bundles of information (for ATM, called cells, rather than packets) are sent along
`
`the same path to guarantee better control of delay. In addition, rather than the long
`
`and variable length packets of X.25 and TCP/IP, ATM uses fixed length and very
`
`short cells to further control delay variability.
`

`
`8
`
`CISCO Exhibit 1008, pg. 8
`
`

`
`(22.) ATM networks, because they are designed to minimize end-to-end
`
`delay and cannot delay transmission during overload, cannot use the low-level
`
`flow control mechanisms that packet switched networks do. Instead, ATM
`
`networks manage congestion through dropping cells and incorporate flow control
`
`mechanisms through higher-level processes. For instance, ATM may rely on long-
`
`term congestion control by call admission control, preventing an origination station
`
`from beginning a call to avoid the traffic that would be generated. Alternatively,
`
`an ATM network may make an application level request to a sending terminal to
`
`reduce the average rate at which information is being sent.
`
`(23.) As an example, it is well known that a high-quality image requires
`
`more information to represent the image than would be required with a lower
`
`quality image, where quality might refer to image resolution, speed of update,
`
`image size, etc., individually or in combination. If the bandwidth available
`
`between the network and the terminal is limited because of other users’
`
`transmissions, it may not be practical to send the higher quality image fast enough
`
`to keep up with a rapidly changing source. Thus, to endure timely delivery of the
`
`image, it might be necessary to send a lower quality image.
`
`(24.) Thus, it can be seen that the inevitable network congestion condition
`
`is routinely signaled to the communicating devices in whatever means is
`
`appropriate to the network type.
`

`
`9
`
`CISCO Exhibit 1008, pg. 9
`
`

`
`D. Network Architecture Design Considerations
`
`(25.) The system architecture that one may use to implement a multimedia
`
`display system, such as the multiparty presentation system described and claimed
`
`in the ‘649 patent, can take on many forms, which will generally be based on
`
`design decisions related to the specific problem being addressed. For instance,
`
`there can be design decisions about where the processing is done to implement
`
`enforcement of user policies and where processing is done to enforce controls
`
`based on network or terminal conditions. One of ordinary skill in the art would
`
`take several constraints into account, including:
`
` How much bandwidth is required and available to communicate the controls
`
`between the network and the terminal?
`
` What processing capacity is available in the network nodes to enforce
`
`policies and controls?
`
` What processing capacity is available in the terminal to enforce policies and
`
`controls?
`
`(26.) Generally, one would select the place to perform each operation in
`
`order to minimize overall system cost. As an example, consider the
`
`implementation of user policy controls. In a large network with many user
`
`terminals, it may be a significant burden on network nodes to store profiles for all
`
`the users and filter real-time media streams based on the user policy. In this case,
`

`
`10
`
`CISCO Exhibit 1008, pg. 10
`
`

`
`it might be preferable to place the user profile and the software to enforce the
`
`associated user policy at the user terminal. This choice has a downside, however:
`
`if the user policy is enforced by the terminal, this may mean that a significant
`
`amount of data will be sent from the network to the user terminal that will
`
`ultimately be rejected because of the user policy in force.
`
`(27.) Conversely, there may be instances where one of ordinary skill would
`
`realize that it makes the most sense to place user policy controls in the network,
`
`rather than at the user terminal. As an example, consider the case where a large
`
`number of information streams are available for transmission to the user terminal
`
`but, because of the user policy in force, most of the information will not be
`
`selected by the user policy for display. To pass the information to the user
`
`terminal, only to have it discarded, might put a significant burden on the
`
`distribution network. In this case, it might be more efficient to make the user
`
`policy-based selection in the network, avoiding the need to transmit information
`
`that would never be used.
`
`(28.) While user policies may specify the discretionary choices of a user,
`
`terminal and network conditions will generally reflect the mandatory decisions that
`
`must be made because of physical limitations of a terminal or network. In a
`
`similar manner to the discussion above, there are design choices about where
`
`controls based on network or terminal conditions should be applied. While it is
`

`
`11
`
`CISCO Exhibit 1008, pg. 11
`
`

`
`possible to enforce a control based on a network condition at the terminal, and it is
`
`possible to enforce a control based on a terminal condition at the network, in
`
`general one would expect that the network and terminal have the best information
`
`about their current condition, suggesting that network conditions should be acted
`
`on in the network and terminal conditions should be acted on at the terminal. A
`
`person of ordinary skill in the art would recognize that there are considerations
`
`such as:
`
` the amount of memory space available in a terminal to store incoming media
`
` the available bandwidth between the network and the terminal
`
` the processing power of the terminal
`
` the traffic load on the network node used to service other users.
`
`(29.) All of these conditions and others will influence the ability of the
`
`system to meet the desires of the user in displaying the media available to the user.
`
`For the most part, one of ordinary skill would want to minimize coordination
`
`messages needed to operate the system, and would tend to apply the network or
`
`terminal controls as close to where the underlying condition was detected.
`
`E. Multicasting
`
`(30.) Multicasting is a network communications technique where
`
`information is sent to a number of receiving devices simultaneously, rather then
`
`sending a number of individual communications to each of the receiving devices.
`

`
`12
`
`CISCO Exhibit 1008, pg. 12
`
`

`
`Instead of sending information with a specific receiving device’s address, the
`
`sending device transmits a broadcast to a group address which may be thought of
`
`as a channel. The receiving devices listen to the group address, effectively being
`
`capable of accessing all information sent to the group address. Within the address
`
`space used by the Internet there is a range of addresses reserved for multicast
`
`traffic. Network devices do not monitor these multicast addresses, but only
`
`process traffic that they have been told that a downstream device needs.5
`
`Multicast, while sending information to potentially a large number of devices,
`
`allows selectivity in which devices receive the information because they must be
`
`monitoring a specific multicast address. This is contrasted with a broadcast
`
`transmission, where messages are sent to all devices on the network.
`
`(31.) With conventional one-to-one communications associations, the
`
`transmitter and receiver are tightly coupled: the transmitter sends a group of
`
`packets and the receiver receives them, acknowledging each set before another is
`
`sent. While this is a perfectly usable communications model, it does not scale well
`
`for a one-to-many communications association, particularly when there are a large
`
`number of receivers, each having a different communications bandwidth or
`
`receiving a different subset of intact vs. damaged packets. Instead, the loose
`
`coupling of a multicast communications channel is preferable in this case – for
`
`                                                       
`5 See generally Ex. 1013.
`

`
`13
`
`CISCO Exhibit 1008, pg. 13
`
`

`
`instance for a multiuser video conferencing application.6 The approach to
`
`multicasting depends on the specifics of the application. As LeMair (Ex. 1004)
`
`describes, densely populated networks with a large number of participants would
`
`benefit from receiver initiated approaches.7
`
`E. Audio/video streaming
`
`(32.) Some information sources are discontinuous by their nature. Text
`
`messaging, for instance, is a series of short bursts of information from a first
`
`station to the second and vice versa. Streaming, on the other hand, is generally
`
`regarded as the continuous delivery of information without significant gaps or
`
`pauses, as discussed in greater detail below in section VI.A.
`
`V.
`
`The ‘649 Patent
`
`(33.) In view of the foregoing, the ‘649 patent describes the basic concept
`
`of dynamically selecting one of many real-time media streams for display on a user
`
`terminal in a videoconferencing environment based on policies established by that
`
`user. Additionally, the ‘649 patent describes the concept of controlling the user
`
`display of the videoconferencing environment based on conditions of the terminal
`
`or network.
`
`                                                       
`6 Ex. 1009 at p. 3.
`7 Ex. 1004 at pp. 4-5.
`

`
`14
`
`CISCO Exhibit 1008, pg. 14
`
`

`
`(34.) The user-based policies described by the ‘649 patent are straight
`
`forward—MUTE, LOCKED, and TRIGGERED.8 MUTE mode prevents a given
`
`video stream from being displayed.9 LOCKED mode indicates that the user wants
`
`to always view a given conferee, even if the network is congested.10 TRIGGERED
`
`policies take into account user preferences. The ‘649 patent generally discloses
`
`such preferences in terms of the number of speakers to be displayed; however, user
`
`policy-based preferences may also include language preferences and
`
`QoS/degradation preferences. For example, the user may want to see the video of
`
`the “j” most recent speakers, or a set of “k” speakers, and then additionally the “j”
`
`most recent speakers.11
`
`(35.) When in TRIGGERED mode, the system described by the ‘649 patent
`
`may also monitor system resources, including networking resources, computing
`
`resources, tariff limitations, and end-user terminal resources to determine the
`
`specific streams to display.12 The identification of resource congestion may then
`
`trigger a dropping of certain streams or a degradation of stream quality, for
`
`example.13
`
`                                                       
`8 Ex. 1001 at 18:29-39.
`9 Id.
`10 Id.
`11 Id. at 19:21 – 20:3.
`12 Id. at 18:42-49.
`13 See, e.g., id. at 25:53 – 26:59.
`

`
`15
`
`CISCO Exhibit 1008, pg. 15
`
`

`
`(36.) In short, the ‘649 patent describes nothing that was not already a well-
`
`known and widely used distributed computing concept at the time the patent was
`
`filed. The ‘649 patent simply takes common design elements of distributed
`
`multimedia systems (e.g., user selectivity and monitoring/adapting to network
`
`conditions) and applies them to a multiparty videoconferencing environment,
`
`which were well-known by the time the ‘649 patent was filed.
`
`VI. Claim Interpretation
`
`A.
`
`“real-time media stream”
`
`(37.) The ‘649 patent claims the transmission of “real-time media streams,”
`
`but does not define this term. However, the patent describes real-time media
`
`streams in the context of a live video conference. Further, the phrase real-time
`
`modifies media streams, which itself connote a “real-time” aspect and, therefore,
`
`one of ordinary skill in the art would have understood the phrase “real-time media
`
`stream” to be more narrow than media streaming (as discussed below) and defined
`
`as “live media stream.”
`
`(38.) In common usage to one of ordinary skill in the art, “media stream” or
`
`“streaming media” refers to a continuous delivery of information without
`
`significant gaps between output by the sender and receipt by the recipient.
`
`Television, broadcast radio, continuous CD or MP3 music playback, and video
`
`over IP are examples of streaming media or media streams. The only real delay in
`

`
`16
`
`CISCO Exhibit 1008, pg. 16
`
`

`
`a media stream system which, ideally, does not manifest itself to the user/recipient,
`
`is that associated with the system’s cache/buffer that processes stream segments
`
`before presenting the segments on the recipients output device. The cache/buffer is
`
`necessary so that, to the user, there is a continuous presentation of media without
`
`gaps or pauses. A video downloaded over the internet, where the entirety of the
`
`video is downloaded before being presented to the user, is not a streaming
`
`information source.
`
`(39.) In view of how streaming media works, there is an aspect of “real-
`
`time” that is built into the mechanism because there is a continuous delivery of
`
`information without gaps, where data segments are only temporarily buffered or
`
`cached before being presented for display. Thus, the term “real-time media
`
`stream” cannot simply refer to any streaming video, voice, or data distribution in
`
`which data segments are temporarily buffered or cached before being presented for
`
`display, as this concept is captured by the phrase “media stream” standing alone.
`
`(40.) Instead, to give the term “real-time” independent significance in view
`
`of foregoing, and in view of the specification of the ‘649 patent and its prosecution
`
`history,14 one of ordinary skill in the art would understand the Broadest Reasonable
`
`Interpretation of the claim term to be “live media stream.”
`
`                                                       
`14 During prosecution of the ‘649 patent, I understand that the Applicant
`distinguished its alleged invention on the basis that prior art describing general
`streaming media, such as broadband cable television, was less relevant to the
`17
`

`
`CISCO Exhibit 1008, pg. 17
`
`

`
`(41.) Video (as well as audio) conferences have one salient feature that
`
`relates to the concept of real-time, the communication is a live interaction between
`
`at least two human users and is expected to be timely. Users cannot tolerate long,
`
`unpredictable response times in their virtual face-to-face network conversations.
`
`Not only must the maximum delay be constrained but the variation in delay must
`
`also be controlled to prevent any disruption to the user experience. This is also
`
`explicitly recognized by the ‘649 patent, which notes that media stream
`
`synchronization is “the single most important element of any real-time multimedia
`
`communication system … to guarantee timely and sensory-appealing playback of
`
`multimedia streams to a user” and that “since we are dealing with live media
`
`streams, a minimum end-to-end delay is also desirable to enable conferees to
`
`converse in a natural fashion.”15 Thus, for this additional reason, one of ordinary
`
`skill in the art would understand the Broadest Reasonable Interpretation of the term
`
`“real-time media stream” to be “live media stream.”
`
`(42.) However, I understand that the Patent Owner has submitted
`
`infringement contentions16 in which it accuses switched-digital video services,
`
`video-on-demand services, and IP cable television services as accused systems.
`
`Therefore, it appears that the Patent Owner incorrectly reads the term “real-time”
`                                                                                                                                                                               
`claimed invention because it was not directed, nor did it mention, conferencing.
`See Ex. 1002 at p. 16.
`15 Ex. 1001 at 21:55 – 22:28.
`16 See Ex. 1016 at p. 3.
`

`
`18
`
`CISCO Exhibit 1008, pg. 18
`
`

`
`out of “real-time media stream” and simply construes the term as synonymous with
`
`streaming media—in other words, “any streaming video, voice, or data distribution
`
`in which data segments are temporarily buffered or cached before being called for
`
`present display.” As a matter of practical implementation, and as recognized by
`
`the ‘649 patent,17 the streaming transmission would require a maximum allowable
`
`delay that does not adversely impact the user experience, but this is not a
`
`requirement of the claim language.
`
`(43.) Thus, for purposes of this proceeding and for consistency between the
`
`two actions, I have applied the following definition for the term “real-time media
`
`stream” when analyzing the claims and the prior art: any streaming video, voice,
`
`or data distribution in which data segments are temporarily buffered or cached
`
`before being called for present display.
`
`B.
`
`“independently of selections made for passing to the other users”
`
`(44.) In view of the foregoing discussion of the term “real-time media
`
`streams” meaning a live media stream, and as discussed below, the Broadest
`
`Reasonable Interpretation of the phrase “independently of selections made for
`
`passing to the other users,” as used in claims 1, 13, 14, and 19, is an “independent
`
`display of media streams to viewers of the same live (real time) event.”
`
`                                                       
`17 Ex. 1001 at 21:55 – 22:39.
`

`
`19
`
`CISCO Exhibit 1008, pg. 19
`
`

`
`(45.) Both the specification of the ‘649 patent and its prosecution history
`
`make clear that the phrase “independently of selections made for passing to the
`
`other users” is tied to a conferees ability to display selected media streams of the
`
`same live (real time) event independently of selections made by other conferees.
`
`For example, the patent states that “[d]ynamic selection from multiple streams
`
`enables the user to concentrate on the content not the form of presentation.
`
`Individual control of what is displayed, independent of what other users see,
`
`enables tailoring to video conferences to be handled more easily.”18 The claimed
`
`invention was also distinguished during prosecution on the basis of an alleged
`
`failure in the applied prior art to independently display streams of the same
`
`conference to different users based upon a user’s policy.19 Thus, the proper
`
`construction of the term is “independent display of media streams to viewers of the
`
`same live (real time) event.”
`
`(46.) However, in view of the Patent Owner’s infringement contentions
`
`discussed above, and for the purposes of this proceeding, I have applied the
`
`following definition of the term when analyzing the claims and the prior art:
`
`“independent of other user selections.”
`
`                                                       
`18 Ex. 1001 at Abstract; see also Ex. 1001 at 3:35-41.
`19 See, e.g., Ex. 1002 at pp. 35-36 and 39-40.
`20
`

`
`CISCO Exhibit 1008, pg. 20
`
`

`
`VII. Discussion of Relevant Patents and Articles
`
`(47.) I have been asked to consider the teachings of the prior art cited in the
`
`concurrently filed petition for inter partes review in view of the knowledge held by
`
`one of ordinary skill, and whether the skilled practitioner would have combined the
`
`references as applied in the petition.
`
`A. Understanding of Legal Standards
`
`1.
`
`Anticipation
`
`(48.) A patent claim is “anticipated” if each and every limitation of the
`
`claim is disclosed in a single prior art reference. Section 102 of the Patent Statute
`
`was amended on March 16, 2013. The earlier version of Section 102 applies to the
`
`patent at issue given its filing date.
`
`(49.) Each element of a patent claim may be disclosed by a prior art
`
`reference either expressly or inherently. Further, my understanding is that even an
`
`“express” disclosure does not necessarily need to use the same words as the claim.
`
`An element of a patent claim is inherent in a prior art reference if the element must
`
`necessarily be present and such would be recognized by a person of ordinary skill
`
`in the art. However, I understand that inherency cannot be established by mere
`
`probabilities or possibilities.
`

`
`21
`
`CISCO Exhibit 1008, pg. 21
`
`

`
`2.
`
`Obviousness
`
`(50.) A patent claim is invalid if the differences between the patented
`
`subject matter and the prior art are such that the subject matter as a whole would
`
`have been obvious at the time the invention was made to a person of ordinary skill
`
`in the art. I am informed that this standard is set forth in 35 U.S.C. § 103(a).
`
`(51.) When considering the issues of obviousness, I am to do the following:
`
`(i) determine the scope and content of the prior art; (ii) ascertain the differences
`
`between the prior art and the claims at issue; (iii) resolve the level of ordinary skill
`
`in the pertinent art; and (iv) consider objective evidence of non-obviousness. I
`
`appreciate that secondary considerations must be assessed as part of the overall
`
`obviousness analysis (i.e. as opposed to analyzing the prior art, reaching a tentative
`
`conclusion, and then assessing whether objective indicia alter that conclusion).
`
`(52.) Put another way, my understanding is that not all innovations are
`
`patentable. Even if a claimed product or method is no

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket