throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`In re PATENT APPLICATION OF:
`
`Attorney Docket:
`
`2655-0185
`
`Nct2Phonc, Inc. (Patent No. 6,009,469)
`
`Group Art Unit:
`
`3992
`
`Control No.:
`
`90/010,422
`
`Examiner: KOSOWSKI, Alexander
`
`Issue Date: December 28, 1999
`
`Confirmation No.1
`
`6565
`
`Title: GRAPHIC USER INTERFACE FOR
`INTERNET TELEPHONY APPLICATION
`
`DECLARATION OF KETAN MAYER-PATEL UNDER 37 CFR. l .132
`
`Hon. Commissioner of Patents
`P.O. Box I450
`
`Alexandria, VA 22313-1450
`
`1. INTRODUCTION
`
`1.
`
`I have been retained as an independent expert witness by Net2Phone, Inc., the assignee of
`
`the patent presently undergoing re-examination (i.e., US. Patent No. 6,009,469 (hereinafter “the
`
`‘469 patent”)).
`
`2.
`
`I am an expert in the field of networking protocols including networking protocols
`
`supporting multimedia streams including digital audio data. See Curriculum Vitae attached as
`
`Exhibit 1.
`
`3.
`
`I received Bachelors of Arts degrees in Computer Science and Economics in 1992, a
`
`Masters of Science in 1997 from the Department of Electrical Engineering and Computer
`
`Science and a Ph.D. in 1999 from the Department of Electrical Engineering and Computer
`
`Science, all from the University of California, Berkeley.
`
`4.
`
`I received the National Science Foundation CAREER Award in 2003 while an Assistant
`
`Professor at the University of North Carolina, Chapel Hill.
`
`5.
`
`I have had extensive experience in both industry and academia as it relates to the
`
`technical fields relevant here. For example, I have been a programmer, a visiting researcher, and
`
`an Assistant and Associate professor.
`
`Petitioner Vonage Holdings Corp. et al. - Exhibit 1027 - Page 001
`
`

`
`Re-Examination of Patent No. 6,009,469
`Control No.: 90/010,422
`Filed:
`February 24, 2009
`Declaration of Ketan Mayer—Patel under 37 C.F.R. 1.132
`
`6.
`
`I am a co-author of numerous articles that have appeared in a number of refereed
`
`publications and proceedings.
`
`7.
`
`Governmental agencies, such as the National Science Foundation and the Office of Naval
`
`Research, have provided funding for my research.
`
`II. RETENTION AND COMPENSATION
`
`8.
`
`I have been retained to offer an expert opinion on the prior art relevant to the ‘469 patent
`
`(and other patents currently under re-examination) and the validity of the claims undergoing rc-
`
`examination.
`
`9.
`
`My work on this case is being billed at a rate of $400 per hour, with reimbursement for
`
`actual expenses. My compensation is not contingent upon the outcome of the case.
`
`III. BASIS OF MY OPINION AND MATERIALS CONSIDERED
`
`10.
`
`In preparation for this report, I have considered and relied on data or other documents
`
`identified in this report. For example, I have reviewed the Office Action dated August 25, 2009
`
`as well as the Request for Re—examination that was filed for the ‘469 patent including the
`
`Exhibits to the Request for Re-examination.
`
`I have also reviewed the file history of the ‘469
`
`patent.
`
`1 1.
`
`I have familiarized myself with the state of the art at the time the ‘469 patent was filed by
`
`reviewing both patent and non-patent references from prior to the filing date of the application
`
`that became the ‘469 patent.
`
`12.
`
`My opinions are also based upon my education, training, research, knowledge, and
`
`experience in this technical field.
`
`IV. SUMMARY OF MY OPINIONS
`
`13.
`
`Based on my prior experience in the field of computer systems and networking, including
`
`network communication protocols, and based on my review of the documents relating to the
`
`2
`
`Petitioner Vonage Holdings Corp. et al. - Exhibit 1027 - Page 002
`
`

`
`Re-Examination of Patent No. 6,009,469
`Control No.: 90/010,422
`
`February 24, 2009
`Filed:
`Declaration of Ketan Mayer—Patel under 37 C.F.R. 1.132
`
`pending re—examination proceeding, I have developed an understanding of the ‘469 patent and
`
`the claimed inventions.
`
`14.
`
`I have been asked to compare the claims of the ‘469 patent to the references applied in
`
`the outstanding Office Action. The results of my comparison are provided below.
`
`15.
`
`1n general, it is my opinion that all of the claims undergoing re-examination (i.e., claims
`
`1-3, 5, 6, 8, 9 and 14-18) are patentable over the applied references for at least the reasons set
`
`forth below.
`
`The rejection of claims 1-3, 5, 6, 8, 9, and 14-18 over NetBIOS, RFC 1531, Pinard and the
`
`VocalChat User’s Guide
`
`16.
`
`Claims 1-3, 5, 6, 8, 9, and 14-18 were rejected under 35 U.S.C. § 103(a) as being
`
`obvious in light of Protocols for X/Open PC Interworking SMB, Version 2, The Open Group
`
`(1992) (hereinafter “NetBIOS”), in View of RFC 1531, Pinard and the VocalChat User’s Guide.
`
`17.
`
`I understand that a rej ection under 35 U.S.C. § l03(a) means that an examiner believes
`
`that although no single reference includes all of the claimed limitations, nonetheless the
`
`combination of references made by the examiner would have been obvious to one of ordinary
`
`skill in the art at the time the invention was made.
`
`Claims 1-3
`
`18.
`
`Claim 1 recites “a. program code for generating a user-interface enabling control of a first
`
`process executing on the computer system.” With respect to the limitation of “program code for
`
`generating a user-interface enabling control of a first process executing on the computer system,”
`
`the Office Action alleges that “computers executing NetBIOS may contain DOS operating
`
`systems or may operate on other operating systems, which examiner notes inherently contain at
`
`least text-based user interfaces.” By stating that NetBIOS “may contain” DOS operating systems
`
`I believe the Examiner is indicating that NetBIOS need not actually contain or be running on a
`
`Petitioner Vonage Holdings Corp. et al. - Exhibit 1027 - Page 003
`
`

`
`Re—Examination of Patent No. 6,009,469
`Control No.: 90/010,422
`Filed:
`February 24, 2009
`Declaration of Ketan Mayer-Patel under 37 C.F.R. 1.132
`
`DOS operating system. Since that is true, NetBIOS (or the computer running NetBlOS) does not
`
`inherently include text-based user interfaces.
`
`19.
`
`Furthermore, the recitation of “other operating systems” also does not inherently mean
`
`that “text-based user interfaces” are provided. For example, embedded systems need not have a
`
`display or a text interface even though they may have operating systems. The Office Action also
`
`has not asserted that this limitation is taught by RFC 1531. Thus, I do not believe that limitation
`
`(a) has been shown to be taught by either applied reference.
`
`20.
`
`Claim 1 also recites “b. program code for determining the currently assigned network
`
`protocol address of the first process upon connection to the computer network.” The Office
`
`Action admits that NetBIOS does not teach this limitation. The Office Action alleges that such a
`
`limitation is taught by RFC 1531 because “RFC 1531 teaches dynamically assigning IP address
`
`on a TCP/IP network by an Internet access server.” By looking at limitations (a) and (b)
`
`together, however, it can be seen that the Office Action has not shown that the currently assigned
`
`network protocol address is that of the first process which the Office Action alleged was the
`
`“text—based user interface.” The Office Action also has not explained why the text—based
`
`interface would have to have its currently assigned network protocol address determined. Thus, I
`
`do not believe that limitation (b) is taught by either applied reference.
`
`21.
`
`Claim 1 recites “c. program code responsive
`
`for forwarding the assigned network
`
`protocol address of the first process and a unique identifier of the first process to the server
`
`process upon establishing a communication connection with the server process.” The Office
`
`Action has not shown that the assigned network protocol address of the first process is
`
`determined, so the Office Action also has not shown that the assigned network protocol address
`
`of the first process would be forwarded to the server upon establishing a communication
`
`connection with the server process. Similarly, the Office Action has not shown that the text-
`
`based user interfaces would have a unique identifier to be forwarded to the server. The Office
`
`Action further has not shown that such a limitation is taught by RFC 1531. Accordingly, I do not
`
`believe that limitation (c) is taught by either applied reference.
`
`4
`
`Petitioner Vonage Holdings Corp. et al. - Exhibit 1027 - Page 004
`
`

`
`Re—Examination of Patent No. 6,009,469
`Control l‘~lo.: 90 010,422
`Filed:
`February 24, 2009
`Declaration of Ketan Mayer-Patel under 37 C.F.R. 1.132
`
`22.
`
`Claim 1 also recites “d. program code, responsive to user input commands, for
`
`establishing a point—to—point communications with another process over the computer network.”
`
`The Office Action cites NetBIOS, pgs. 397-400, as teaching that “point-to-point communication
`
`is established upon initiation between nodes once target names and addresses have been found.”
`
`However, the Office Action has not shown that the code is “responsive to user input commands”
`
`as no user input commands have been identified. Even assuming that text—based user interfaces
`
`were taught by NetBIOS, the Office Action still would not have shown that point-to-point
`
`communications are inherently established “responsive to user input commands.” The text-based
`
`user interfaces could have been used for non-communicating functions or even functions that use
`
`non-point-to-point communications. The Office Action further has not shown that such a
`
`limitation is taught by RFC 1531. Accordingly, I do not believe that limitation (d) is taught by
`
`either applied reference.
`
`23.
`
`Since none of the limitations of claim 1 have been shown to be taught by the applied
`
`combination of references, I do not believe that claim 1 and dependent claims 2 and 3 are
`
`obvious in light of the proposed combination.
`
`24.
`
`The Office Action states that “it would have been obvious
`
`to determine the currently
`
`assigned network address of the first process upon connection to the computer network in the
`
`invention taught by NetBIOS above since this allows for automatic reuse of an address
`
`and
`
`since examiner notes the use of dynamic IP address assignment
`
`are old and well known
`
`and are useful to eliminate the burdensome task of manually assigning IP addresses for all
`
`networked computers.” However, the Office Action does not acknowledge the problems that
`
`could arise in doing so or how those problems would be resolved by those of ordinary skill at the
`
`time the patent was filed.
`
`25.
`
`In the context of point—to—point communication, widespread use of dynamically assigned
`
`addresses can create additional problems for a NetBIOS environment. For example, Section
`
`15.1.7 of the NetBlOS reference (entitled “Consistency of the NBNS Data Base”) recognizes
`
`that the association between a node, a registered name and an IP address is tenuous, even in an
`
`5
`
`Petitioner Vonage Holdings Corp. et al. - Exhibit 1027 - Page 005
`
`

`
`Re—Examination of Patent No. 6,009,469
`Control No.: 90/010,422
`Filed:
`February 24, 2009
`Declaration of Ketan Mayer—Patel under 37 C.F.R. 1.132
`
`environment that uses static IP addresses. “Even in a properly running NetBIOS scope the
`
`NBNS and its community of end—nodes may occasionally lose synchronization with respect to
`
`the true state of name registrations.” To minimize the impact of this problem, the reference
`
`states, “Various approaches have been incorporated into the NetBlOS—over-TCP protocols”
`
`which it then proceeds to describe.
`
`26.
`
`However, by incorporating DHCP and adopting of dynamic address allocation (e.g., as
`
`used by Internet access providers), the synchronization problem would become more disruptive,
`
`not less. Dynamic addressing introduced a new uncertainty to the relationships among the
`
`NBNS and its community of end—nodes and a new set of obstacles to NetBIOS synchronization
`
`that are not addressed by the NetBIOS reference. Consider the case of a node that is turned—off
`
`and then subsequently turned back on, or the case of a node that has simply lost its Internet
`
`connection for some technical reason or whose DHCP lease has expired which then re-
`
`establishes a connection. In such a dynamic addressing environment, such a node would most
`
`likely obtain a new IP address when it was turned back on that was different than the one it had
`
`when it registered its name. This change could lead to any number of node-name-IP address
`
`synchronization problems for the disclosed NetBIOS protocols.
`
`27.
`
`For example, because the NBNS does not know the node’s new address, the NBNS
`
`would be unable to send to the node a Name Release Request or a Name Conflict Demand or
`
`request that the node send it a Name Status Request. Because communication from the node
`
`would be originating at a new address that was not recognized by the NBNS, a node’s response
`
`to a Name Query Request (assuming it somehow knew that its name had been challenged,
`
`perhaps from before it lost network connectivity) would not be recognized. A node would also
`
`be unable to confirm its association with registered names by sending Name Refresh Request
`
`packets to the NBNS.
`
`If a session between two NetBIOS applications were cut—off, re-
`
`establishing the communication would be especially difficult where the ability of 21 called entity
`
`to obtain both its associated name and its associated IP address were in doubt. As a result, the
`
`Office Action has not demonstrated that a solution to the problems created by exposure of
`
`6
`
`Petitioner Vonage Holdings Corp. et al. - Exhibit 1027 - Page 006
`
`

`
`Re-Examination of Patent No. 6,009,469
`Control No.: 90/010,422
`Filed:
`February 24, 2009
`Declaration of Ketan Mayer-Patel under 37 C.F.R. 1.132
`
`NetBIOS to DHCP and dynamic addressing has been addressed by any of the applied
`
`references. I
`
`28.
`
`The Office Action also has not identified anything in the cited art that suggests how a
`
`person of ordinary skill is to go about the redesign of NetBIOS and the solving of obstacles to
`
`NetBIOS operation that are created by Internet access; problems that were recognized and left as
`
`warnings unresolved in the NetBIOS reference.2
`
`29.
`
`Thus, I believe claims 1-3 are patentable over the combination of NetBIOS and RFC
`
`1531.
`
`Claims 5 and 6
`
`30.
`
`Claim 5 recites “determining the currently assigned network protocol address of the first
`
`process upon connection to the computer network.” The Office Action acknowledges that this
`
`limitation is not taught by NetBIOS but alleges that “RFC 1531 teaches dynamically assigning IP
`
`addresses on a TCP/IP network by an Internet access server.” The Office Action further alleges
`
`that “it would have been obvious
`
`to determine the currently assigned network address of the
`
`first process upon connection to the computer network in the invention taught by NetBIOS above
`
`since this allows for automatic reuse of an address
`
`and since examiner notes the use of
`
`dynamic IP address assignment
`
`are old and well known
`
`and are useful to eliminate the
`
`burdensome task of manually assigning IP addresses for all networked computers.” However, as
`
`described above with respect to claims 1-3, I do not believe that the Office Action has shown that
`
`in light of the problems that worsen by combining NetBIOS and RFC 1531, that a person of
`
`1 Besides dynamic addressing, Internet access would pose other challenges to a NetBIOS system. For example,
`because NetBIOS was designed for use on local area networks with small numbers of computers, trust among the
`network participants is assumed. That assumption cannot be transferred to a global Internet made up of unknown,
`and sometimes malevolent, entities. An implementation of NetBIOS on the public lntemet would necessitate non-
`trivial adaptations to ensure that its services perform correctly and return accurate information. See Exhibit 2, from
`_l"1_lT_t_[1;_/"[_ljl_/_)'__V_W__.L/_::3_S_L_‘_h00lS.COIIl_[_S_l§_fl_§lL€;__§_t;§_l1;'lQ(,__a,§1Zg which instructs Microsoft Windows users whose computers access
`the Internet to disable NetBIOS over TCP/IP in order to solve their security problems.
`2 See Section 4.6 (“The proposed standard recognizes the need for N etBlOS operation across a set of networks
`interconnected by network (IP) level relays (gateways.) However, the standard assumes that this form of operation
`will be less frequent than on the local MAC bridged-LAN.”)
`7
`
`Petitioner Vonage Holdings Corp. et al. - Exhibit 1027 - Page 007
`
`

`
`Re—Examination of Patent No. 6,009,469
`Control No.: 90/010,422
`
`February 24, 2009
`Filed:
`Declaration of Ketan Mayer—Pate1 under 37 C.F.R. 1.132
`
`ordinary skill in the art would have combined the two references as proposed. Thus, I believe
`
`that claims 5 and 6 are patentable over the applied NetBIOS and RFC 1531 references.
`
`Claims 8 9 and 14-18
`
`31.
`
`Claim 8 recites “querying the server process to determine if the first callee process is
`
`accessible.” The Office Action asserts that this limitation is taught by NetBIOS and cites pages
`
`377, 388, 389 and 446 as supporting the proposition that “a query is sent to the NBNS to
`
`determine if another node is logged in and discover[s] the node[’]s IP address.” However, the
`
`Office Action has not shown how knowing that a name has been registered equates to
`
`“determin[ing] if the first callee process is accessible.” While NetBIOS uses name entries with
`
`“active” statuses as part of its name management process, an analysis of how that “active” status
`
`is used shows that “an active name” is not synonymous with determining if the first callee
`
`process is accessible. An active name simply refers to a name that has been registered and that
`
`has not yet been de-registered, independent of whether the associated computer is or is not
`
`accessible. As shown on page 447 (and reproduced below), the Node_Name entries stored with
`
`respect to a NetBIOS Name Server contain a series of fields including the “ACT” field.
`
`Petitioner Vonage Holdings Corp. et al. - Exhibit 1027 - Page 008
`
`

`
`Re-Examination of Patent No. 6,009,469
`Control No.2 90/010,422
`Filed:
`February 24, 2009
`Declaration of Ketan Mayer—Pate1 under 37 C.F.R. 1.132
`
`“she zsa:»:r§____s=:2at;.2t=: 7:
`
`‘E
`I
`1
`1
`3
`3.
`5

`E‘:
`3
`1
`iii
`‘.3
`ft‘
`$3
`-‘E
`"53
`2
`1
`{X
`§~-ewe‘--~~‘-s-~~"~:»“'-*~-'~i-~-ve~~~--3-'-*5---§~--t~«~-‘-+~'~~“~3~"~'-~"é»*--wfi--w~z--~~§~v~-4
`

`Essa;
`one
`«;-w~«é-~«~wz--~«~~+v»-~u+«~««+~»«~e-~«~a~--~+~»m_§.--w+~~—+—»—«x-~~«aw-~»s~-~+-~«~«er
`
`The §€}‘sI%Emi?§..sW£
`
`fiaivci ia da 5 iaafi as 2
`
`S.}3‘$lii5=k21
`
`E55. é at?
`
`‘:}z:v3{:1:':§,;:si.i£3s'z 1
`
`Eikfé
`
`5
`
`geese “:24: earn {G3 .
`fines future mam.»
`fiaservasi
`Eexwsazaefit Biaaee Eflags.
`if one {E}
`ihetil settiirgt
`is for cézse
`mate name. Mag 35: zeta
`«fie;
`fear 2:3} 93:11:;-:2: names.
`Mztive aéame ziflag.
`3&1}
`emt:.3c"s”ea have t:‘?:s.e flag
`seat ta mm (3.) .
`IKE one €23
`fianfliair '£9§.:§rgi
`zémeisz
`in czrzsflicis.
`then this name
`3.3.3
`{'.§€3.‘§t’.’
`Etercegiatterz’
`‘i-’=‘,":a»g..
`'
`‘
`the gxxeszams of being eieeleteti.
`
`the-:2 mime cm
`
`Reeerveé far €u§;.u‘re
`Earns:
`iii} than fihes 215.323
`
`tease
`
`fies a GENE? site-f.E~§€3£
`
`{G} ems;
`
`32%.: is 3. UNEQZEE taeearas
`
`fI*.5':iKl.’:.‘.
`
`if
`
`32.
`
`The ACT field is a single bit field (in hit 5) that signifies an “Active Name Flag. All
`
`entries have thisflag set to one (1).” (Emphasis added.) If all name entries have this flag set to
`
`one (1), then the NetBIOS name server cannot be using the Active Name Flag as a means of
`
`separately tracking whether the entity that owns the name is “active,” let alone what its “on—line”
`
`status might be.
`
`33.
`
`The NetBIOS reference also does not teach that the active status of a name in the
`
`NetBIOS server is an indication of the active status of the owner of that name. To the contrary,
`
`when information about whether the owner of a name is “active” may be relevant, for example
`
`when a new entity seeks to register a name that has already been registered in the NetBIOS name
`
`server, the NetBIOS reference describes an elaborate set of interactions used to test whether the
`9
`
`Petitioner Vonage Holdings Corp. et al. - Exhibit 1027 - Page 009
`
`

`
`Re-Examination of Patent No. 6,009,469
`Control No.: 90/01 0,422
`
`February 24, 2009
`Filed:
`Declaration of Ketan Mayer-Patel under 37 C.F.R. 1.132
`
`existing owner of the registered name is active or inactive. It does not rely on the fact that the
`
`name is active in the NetBIOS name server (See Section 15.2.2.2 and l5.2.2.3 entitled “Existing
`
`Name and Owner is Inactive”).
`
`34.
`
`The NetBIOS reference also does not teach that an acquired IP address can be reasonably
`
`relied upon by a requesting end-node to confirm that an end-node associated with a sought name
`
`is, in fact, “accessible.” The NetBIOS reference describes at least two different scenarios where
`
`a second end-node sends a rejection response to the first end-node notwithstanding the fact that
`
`an end-node is connected to the computer network and active with respect to the sought name.
`
`See Section 16.1.1 (“There exists a NetBIOS LISTEN compatible with the incoming call, but
`
`there are inadequate resources to permit establishment of a session. . .The called name does, in
`
`fact, exist on the called node, but there is no pending NetBIOS LISTEN compatible with the
`
`incoming call.”). No distinction is made in the reference between the rejection response in these
`
`cases and the rejection response in cases where the called name does not exist on the called end-
`
`node. Section 16.1.1 also states “In all but the first case, a rejection response is sent back over
`
`the TCP connection to the caller.”
`
`35.
`
`The Office Action also has not alleged that any of the remaining references teach this
`
`limitation missing from the NetBIOS reference. As such, claim 8 and its dependent claims
`
`(claims 9 and 14-18) are not rendered obvious by the cited combination of references.
`
`The rejection of claims 1-3, 5, 6, 8, 9, and 14-18 over the combination of the Ethegphone papers
`
`in view of Vin and further in view of RFC 1531,Pinard and the VocalChar User’s Guide
`
`36.
`
`Claims 1-3 were rejected under 35 U.S.C. § l03(a) as obvious over Etherphone:
`
`Collected Papers 1987-1988 (May 1989) (hereinafter “Etherphone”) in View of Harrick M. Vin,
`
`et al. Multimedia Conferencing in the Etherphone Environment, IEEE Computer Society
`
`(October 1991) (hereinafter “Vin”) and further in view of RFC 1531, Pinard and VocalChat
`
`Uscr’s Guide. The Etherphone Collected Papers include An Overview ofthe Etherphone System
`
`and its Applications (hereinafter “Zellweger”), Telephone ll/Ianagement in the Etherphone
`
`10
`
`Petitioner Vonage Holdings Corp. et al. - Exhibit 1027 - Page 010
`
`

`
`1n,1r\
`Re-Examination of Patent No. 6,009,469
`Control No.: 90/0lU,‘l-A2
`Filed:
`February 24, 2009
`Declaration of Ketan Mayer-Patel under 37 C.F.R. 1.132
`
`System (hereinafter “Swinehart”), and Managing Stored Voice in the Etherphone System
`
`(hereinafter “Terry”).
`
`37.
`
`Claim 1, as amended, recites “a. program code for generating a user-interface enabling
`
`control of a first process executing on the computer system” and “d. program code means,
`
`responsive to user input commands, for establishing a point-to-point communications with
`
`another process over the computer network.” When read together, it can be seen that the Office
`
`Action has not shown that these limitations are taught by the applied combination of references.
`
`38. With respect to the limitation “a. program code for generating a user-interface enabling
`
`control of a first process executing on the computer system,” the Office Action cites Swinehart
`
`and Zellweger as teaching that “workstations include GUI’s.” Later, with respect to the
`
`limitation “d. program code means, responsive to user input commands, for establishing a point-
`
`to—point communications with another process over the computer network,” the Office Action
`
`asserts that “after acquiringithe network address of a callee, voice datagrams are transmitted
`
`directly amont [sic; among] the participants, bypassing the control server.” However, by
`
`“participants” it appears that the Office Action is referring to Etherphones participating in a
`
`telephone call. As such, the Office Action has not shown that the datagrams are transmitted as
`
`part of a point—to—point communication from the workstation (which was alleged as having the
`
`first process) to one of the Etherphones. In fact, with respect to limitation (c), the Office Action
`
`confirms that its interpretation is that the “workstation address [is] transmitted to the Voice
`
`Control Server when connected” —— not the Etherphone’s network address.
`
`39.
`
`Similarly, looking at it from the opposite perspective, if the voice datagrams are actually
`
`going from one Etherphone to another, then the Office Action has not shown how the “currently
`
`assigned network protocol address of the first process” is the address of the Etherphone and how
`
`the Etherphone has a display or “a user-interface enabling control a first process” on that
`
`Etherphone. The Office Action also has not alleged that RFC 1531 teaches this limitation
`
`missing from the Etherphone references. Thus, claims 1-3 are not rendered obvious by the
`
`proposed combination.
`
`Petitioner Vonage Holdings Corp. et al. - Exhibit 1027 - Page 011
`
`

`
`Re—Examination of Patent No. 6,009,469
`Control No; 90/010,422
`Filed:
`February 24, 2009
`Declaration of Ketan Mayer-Patel under 37 C.F.R. 1.132
`
`Claims 5 and 6
`
`40.
`
`Claim 5 recites “A. determining the currently assigned network protocol address of the
`
`first process upon connection to the computer networ ” and “D. establishing a point—to—point
`
`communication with another process over the computer network.” As described above with
`
`respect to claim 1, when these two limitations are examined together, it can be seen that the
`
`Office Action has not shown that these limitations are met.
`
`41. With respect to the limitation “A. determining the currently assigned network protocol
`
`address of the first process upon connection to the computer network,” the Office Action again
`
`cites the GUI’s of the workstation as meeting this limitation. Then, with respect to the limitation
`
`“D. establishing a point-to-point communication with another process over the computer
`
`network,” the Office Action again states “voice datagrams are transmitted directly amont [sic;
`
`among] the participants, bypassing the control server.” Thus, as discussed above with respect to
`
`claim 1, the Office Action appears to have overlooked that the Etherphone, not the workstation
`
`with the GUI, is receiving the voice datagrams, so the Etherphone reference does not teach
`
`limitations (A) and (D). The Office Action also has not alleged that RFC 1531 teaches this
`
`limitation missing from the Etherphone references. Thus, claims 5 and 6 are not rendered
`
`obvious by the proposed combination.
`
`Claims 8 9 and 14-18
`
`42.
`
`Claim 8 recites “a method for establishing a point-to—point communication from a caller
`
`process to a callee process over a computer network, the caller process capable of generating a
`
`user interface and being operatively connected to the callee process and a server process over the
`
`computer network.” That method includes “querying the server process to determine if the first
`
`callee process is accessible” and “establishing a point-to-point communication link from the
`
`caller process to the first callee process.”
`
`Petitioner Vonage Holdings Corp. et al. - Exhibit 1027 - Page 012
`
`

`
`Re-Examination of Patent No. 6,009,469
`Control No.: 90/010,422
`Filed:
`February 24, 2009
`Declaration of Ketan Mayer—Patel under 37 C.F.R. 1.132
`
`43. With respect to the limitation of “establishing a point-to—point communication link from
`
`the caller process to the first callee process,” the Office Action asserts that Swinehart and
`
`Zellweger teach “voice datagrams are transmitted directly among participants.” However, it
`
`appears that the Office Action means that the Etherphone are the “participants.” If this is the
`
`case, there is no indication that the combination meets the limitation of “the caller process
`
`capable of generating a user interface” as the Office Action has not alleged that the Etherphone
`
`has such a capability. The Office Action has also not alleged that the other references overcome
`
`this deficiency of the Etherphone references. Thus, claim 8 and its dependent claims are
`
`patentable over the applied combination of references.
`
`The rejection of claims 1-3, 5, 6, 8, 9, and 14-18 over the combination of the VocalChat
`
`references in view of RFC 1531 and Pinard
`
`44.
`
`Claims 1-3, 5, 6, 8,
`
`14-18 were rejected under 35 U.S.C. § l03(a) as obvious over
`
`VocalChat User’s Guide in View of VocalChat Readme, VocalChat Networking, VocalChat Help
`
`File and VocalChat Troubleshooting Help file (collectively the “VocalChat References”) and
`
`further in View of RFC 1531 and Pinard.
`
`Claims 1-3
`
`45.
`
`Claim 1 recites “program code responsive to the currently assigned network protocol
`
`address of the first process, for establishing a communication connection with the server process
`
`and for forwarding the assigned network protocol address of the first process and a unique
`
`identifier of the first process to the server process upon establishing a communication connection
`
`with the server process.” The Office Action admits that this limitation is not disclosed by the
`
`VocalChat references. However, the Office Action attempts to overcome this deficiency by
`
`combining the VocalChat references with RFC 1531.
`
`46.
`
`However, the Office Action does not acknowledge the problems that could arise in doing
`
`so or how those problems would be resolved by those of ordinary skill at the time the patent was
`
`Petitioner Vonage Holdings Corp. et al. - Exhibit 1027 - Page 013
`
`

`
`Re-Examination of Patent No. 6,009,469
`Control No.: 90/010,422
`
`February 24, 2009
`Filed:
`Declaration of Ketan Mayer—Patel under 37 C.F.R. 1.132
`
`filed. Thus, I do not believe that the Office Action has proven that one of ordinary skill at the
`
`time the patent was filed would have made the proposed combination.
`
`47.
`
`Claim I also recites “forwarding the assigned network protocol address of the first
`
`process and a unique identifier of the first process to the server process upon establishing a
`
`communication connection with the server process.” The VocalChat Generic implementation
`
`does not disclose such a limitation. In the VocalChat Generic implementation, a local process
`
`reads a “USERS” file or a Connections file in its entirety and writes it back in its entirety rather
`
`than “forwarding the assigned network protocol address of the first process and a unique
`
`identifier of the first process to the server process upon establishing a communication connection
`
`with the server process.” This causes the VocalChat system to have to send an increasing
`
`amount of information as the number of users increases. Sending the whole file such that the
`
`new file replaces the old file also creates problems with consistency such that one user’s changes
`
`could overwrite the changes of another user —— especially as networks got larger which would
`
`have increased the problem of inconsistent files being written.
`
`48.
`
`The Office Action also has not shown that one of ordinary skill in the art would have
`
`made the proposed combination. The Office Action proposes a modification to the VocalChat
`
`References by incorporating the teachings of RFC 1531 because it allegedly “would have been
`
`obvious to utilize dynamically assigned IP addresses from Internet access servers in the
`
`invention taught by VocalChat
`
`since this allows for automatic reuse of an address that is no
`
`longer needed by the host to which it is assigned.” Such an allegation ignores the development
`
`history of the VocalChat products themselves.
`
`49.
`
`The Request cites a Generic version of the VocalChat client which, according to Mr.
`
`Cohen, was used on local area networks. See Cohen Declaration, paragraph 3. There apparently
`
`was a subsequent version of VocalChat that was also released by VocalTec to the public in 1994,
`
`at least in beta. This version, called VocalChat Gateway To Interent (or “VocalChat GTI”) was
`
`designed for use on the Internet, and I have been informed that Net2Phone believes that
`
`VocalChat GT1 used static local address files into which static callee addresses were manually
`
`l4
`
`Petitioner Vonage Holdings Corp. et al. - Exhibit 1027 - Page 014
`
`

`
`Re-Examination of Patent No. 6,009,469
`Control No.2 90/010,422
`
`February 24, 2009
`Filed:
`Declaration of Ketan Mayer—Patel under 37 C.F.R. 1.132
`
`input. I have also been informed that Net2Phone believes that VocalChat GTI did not utilize a
`
`server at all.
`
`50.
`
`Based on the above, I believe the use of manual inputting of static addresses and the
`
`absence of a server suggests that the VocalTec designers-—presumably software developers of at
`
`least ordinary skill in the art—did not consider the alleged com

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket