`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`APPLE INC., HTC CORPORATION, HTC AMERICA, INC., SAMSUNG
`ELECTRONICS CO. LTD, SAMSUNG ELECTRONICS AMERICA, INC., AND
`AMAZON.COM, INC.,
`Petitioners,
`
`v.
`
`MEMORY INTEGRITY, LLC,
`Patent Owner.
`____________
`
`Case IPR2015-00159
`Patent 7,296,121
`____________
`
`
`
`
`
`PETITIONERS’ REPLY TO PATENT OWNER RESPONSE
`PURSUANT TO 37 C.F.R. § 42.23
`
`
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`TABLE OF CONTENTS
`
`I.
`
`INTRODUCTION .............................................................................................. 1
`
`II. CLAIM CONSTRUCTIONS ............................................................................. 1
`
`A. “States” ........................................................................................................ 1
`
`B. “Programmed” ............................................................................................. 5
`
`III. THE INSTITUTED GROUNDS ANTICIPATE OR RENDER OBVIOUS
`CLAIMS 1–3, 8, 11, AND 15–25 .............................................................................. 7
`
`A. Pong is Enabling Prior Art ........................................................................... 7
`
`B. Pong Discloses the Claimed “States” ........................................................ 15
`
`C. Pong Discloses the Claimed “Probes” ....................................................... 19
`
`D. Pong Discloses that Each of its Processing Nodes is Programmed in the
`Manner Recited in Claim 11 ............................................................................ 21
`
`E. Pong Discloses a Memory Controller that Accumulates Probe Responses
`as Recited in Claims 15 and 25 ........................................................................ 21
`
`F. Pong Discloses the Valid Copy Recited in Claim 25 ................................ 24
`
`IV. CONCLUSION ................................................................................................ 25
`
`
`
`
`i
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`EXHIBITS
`
`
`
`APPL-1025
`
`Reply Declaration of Dr. Robert Horst
`
`APPL-1026
`
`APPL-1027
`
`Deposition Transcript of Dr. Vojin G. Oklobdzija Vol. 1, November
`23, 2015
`Deposition Transcript of Dr. Vojin G. Oklobdzija Vol. 2, November
`24, 2015
`
`APPL-1028
`
`David E. Culler et al., Parallel Computer Architecture: A Hard-
`ware/software Approach (1st Ed.) (1998)
`
`APPL-1029
`
`APPL-1030
`
`“InfiniBand Architecture Specification Volume 1 Release 1.0.a”
`(June 19, 2001)
`James Laudon and Daniel Lenoski, Proceedings of the 24th Annual
`International Symposium on Computer Architecture, "The SGI
`Origin: A ccNUMA Highly Scalable Server" (1997)
`
`
`
`ii
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`I.
`
`Introduction
`Petitioners submit this Reply to Memory Integrity’s (“MI”) Response (Paper
`
`25) (“POR”). MI relies upon improper claim construction proposals that have al-
`
`ready been considered and rejected in the Board’s Institution Decision (Paper 12).
`
`MI’s proposals ignore the actual claim language and improperly seek to narrow the
`
`broadest reasonable construction of the terms without support. Moreover, MI’s va-
`
`lidity arguments are highly attenuated and reflect a flawed understanding of the
`
`Pong reference. As explained in greater detail herein, MI’s arguments should be
`
`dismissed.
`
`II. Claim Constructions
`In an effort to avoid Pong’s anticipating disclosure, MI “engages in a post
`
`hoc attempt to redefine the claimed invention by impermissibly incorporating lan-
`
`guage appearing in the specification into the claims.” In re Paulson, 30 F.3d 1475,
`
`1480 (Fed. Cir. 1994). MI’s proposals should be rejected as there is no clear defi-
`
`nition, in the ’121 Patent or elsewhere, that warrants narrowing the terms.
`
`A. “States”
`MI’s proposed construction improperly seeks to add the very limitation that
`
`MI is trying to add with its Motion to Amend. Motion to Amend, p. 1 (seeking to
`
`add “wherein said states comprise cache coherency states of a cache coherence
`
`protocol” to substitute claims). This attempt by MI belies its argument that
`
`“states” is already limited to “cache coherence protocol states.” MI should not be
`
`
`
`1
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`allowed to use claim construction to add claim limitations without amendment.
`
`Further, the Board has already considered intrinsic and extrinsic evidence
`
`and found that the term “states … is not limited to cache coherence protocol states
`
`and is broad enough to include the condition of presence—i.e., what is stored in
`
`cache memory.” Institution Decision, pp. 9-10. MI effectively repeats its earlier
`
`arguments, essentially citing to the same disclosure within the ’121 specification,
`
`and has presented no new evidence to diminish the Board’s preliminary findings.
`
`Additionally, MI’s proposal contains the word “state” that it seeks to define, ex-
`
`posing MI’s attempt to narrow the broadest reasonable interpretation of this term.
`
`“[T]he PTO should only limit the claim based on the specification or prose-
`
`cution history when those sources expressly disclaim the broader definition.” In re
`
`Bigio, 381 F.3d 1320, 1325 (Fed. Cir. 2004). Here, none of the passages cited by
`
`MI amount to an express disclaimer. To the contrary, as noted in the Institution
`
`Decision, all of the examples in the specification to which MI (again) points are
`
`couched in broad language stating that “particular implementations may use a dif-
`
`ferent set of states” and “[t]he techniques of the present invention can be used with
`
`a variety of different possible memory line states.” Institution Decision, p. 9.
`
`Moreover, the claims at issue recite “states associated with selected ones of
`
`the cache memories.” This recital is broader than the individual “memory line”
`
`states described in each of the ’121 Patent passages quoted by MI. POR, pp. 5-6
`
`
`
`2
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`(“the cache state for a specified line”; “memory line state information”; and “the
`
`memory line states are modified, owned, shared, and invalid”) (emphasis added).
`
`MI does not and cannot explain why the meaning of states for individual “line”
`
`content (these passages), which may be present in a variety of states, should be the
`
`same as the state of the whole cache memories (as claimed). Indeed, MI’s expert
`
`admitted that MI’s proposal (which he did not help in developing) “would not ap-
`
`ply” when referring to entire “cache memories.” See Ex. 1026, 113:15-114:13;
`
`112:13-16; 16:15-17:13.
`
`Additionally, the dependent claims reveal that the patentee used express lan-
`
`guage when seeking to limit a term to the context of cache coherency, and it clear-
`
`ly omitted such language with respect to the term “states.” In particular, claim 3,
`
`which depends indirectly from independent claim 1, recites that the probe filtering
`
`unit corresponds to an additional node that “comprises a cache coherence control-
`
`ler.” Claim 3 demonstrates that, where MI intended for a claim term to be limited
`
`to the context of cache coherency, MI explicitly used the term “cache coherence”
`
`in the claim language. The omission of “cache coherence” from claim 1 is telling,
`
`and, under the broadest reasonable interpretation standard should be read in con-
`
`trast with claim 3 to preserve the breadth of claim 1.
`
`MI also relies upon extrinsic evidence as supportive of its position, citing to
`
`two references by Daniel Sorin, one of which was published nearly nine years after
`
`
`
`3
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`the priority date sought by MI. POR, pp. 4-5. However, “the fact that [MI] can
`
`point to definitions or usages that conform to their interpretation does not make the
`
`PTO’s definition unreasonable when the PTO can point to other sources that sup-
`
`port its interpretation.” In re Morris, 127 F.3d 1048, 1056 (Fed. Cir. 1997). Here,
`
`the Board cited to the Microsoft Computer Dictionary for support of its construc-
`
`tion. Institution Decision, p. 10. MI’s criticism of this source is hardly credible as
`
`MI endorses the use of the same Microsoft Computer Dictionary, as well as a gen-
`
`eral purpose dictionary, for its “programmed” proposal. POR, p. 13.
`
`Finally, the Petition contends that, even within the specific field of cache
`
`coherence, the scope of the term “states” is “broad enough to include the condition
`
`of presence,” as found by the Board. See, e.g., Petition, p. 10 (identifying the
`
`Chaiken reference’s use of “status” to reference presence condition). The ’121 pa-
`
`tent accords by also using the term “state” to refer to presence. See ’121 patent at
`
`13:60-61 (“In the invalid state, a memory line is not currently available in cache
`
`associated with any remote cluster.”). Indeed, the Sorin and Culler references that
`
`MI cites also identify a “Not Present State.” Ex. 2010 at 89; Ex. 2002 at 4; see Ex.
`
`1026 at 38:3-39:11 (Sorin and Culler are reliable references).
`
`Accordingly, it is reasonable, for purposes of this proceeding in which the
`
`broadest reasonable construction standard applies, to consider the term “states” as
`
`being broad enough to encompass the condition of presence.
`
`
`
`4
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`B. “Programmed”
`MI advanced arguments regarding the term “programmed” in its preliminary
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`
`
`
`response, without explicitly construing the term. MI now improperly seeks to ef-
`
`fectively amend the claim to overcome the Board’s preliminary endorsement of the
`
`Pong reference by advancing a narrowing interpretation of this term. MI asserts
`
`that “the term ‘programmed’ should be construed to refer to a device that has been
`
`‘configured by a sequence of instructions’” (POR, p. 11) and argues that “‘pro-
`
`grammed’ is not broad enough to encompass hardwired logic” (POR, p. 15).
`
`However, these proposals are not supported by the evidence. See Ex. 1025, ¶¶ 2-6.
`
`The ’121 Patent does not use the words “instruction” or “execute.” The ’121
`
`Patent makes no distinction between hardwired logic and the relevant portion of
`
`the processors that dictate the completion of a memory transaction. MI has not cit-
`
`ed to any language in the ’121 Patent which provides a clear limitation to the na-
`
`ture of the programming. See POR, pp. 12-13. Indeed, the ’121 Patent is clear that
`
`these cited sections are “merely exemplary for the purpose of describing a specific
`
`embodiment of the present invention.” Ex. 1001, 28:2-5. Further, even the dic-
`
`tionaries that MI cites include reasonable definitions for programming that defy
`
`MI’s proposal, such as “to work out a sequence of operations to be performed by (a
`
`mechanism).” Ex. 2014, p. 931.
`
`Indeed, hardwired logic is designed to perform a sequence of operations.
`
`
`
`5
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`For example, a field programmable gate array (FPGA) is effectively an array of
`
`logic gates that can be interwired in different configurations according to a manu-
`
`facturer’s programming. Ex. 1025, ¶ 3. Contrary to MI’s contention that the term
`
`“programmed” is limited to devices that execute a series of instructions, a field
`
`programmable gate array does not execute any instructions. Id. Rather, a designer
`
`uses an interface to program the physical interconnections between the logic gates,
`
`and the logic gates within the FPGA each perform a logical operation correspond-
`
`ing to the gate’s type and its input signals. Id. Indeed, MI’s expert admitted that
`
`“everybody use[s]” the term “programmable” with respect to an FPGA. See Ex.
`
`1026, 123:12-124:11; see also Ex. 1025, ¶ 4.
`
`MI’s evidence states that “in hardwired logic systems the physical intercon-
`
`nections of the elements govern the routes by which data flows between the pro-
`
`cessing elements and thus the sequence of processing operations performed on the
`
`data.” Ex. 2015 at 15/3. Yet, this is entirely consistent with the operation of the
`
`aforementioned field programmable gate array. Ex. 1025, ¶ 5. By its very name a
`
`field programmable gate array is “programmed” by a designer. Indeed, MI’s own
`
`specification uses the term “programmable” when referring to devices that do not
`
`execute instructions, teaching that “the cache coherence controller 230 is a special-
`
`ly configured programmable chip such as a programmable logic device or a field
`
`programmable gate array.” Ex. 1001, 7:49-52 (emphasis added).
`
`
`
`6
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`Accordingly, MI’s attempt to narrow the term “programmed” to exclude
`
`hardwired systems is inconsistent with the use of the term “programmable” in the
`
`’121 Patent and with the extrinsic evidence cited by MI. Indeed, to read the lim-
`
`ited passages of the ‘121 Patent cited by MI any differently would be a clear viola-
`
`tion of In re Bigio, as the section of the ‘121 Patent in which these passages appear
`
`are clear that the examples given are not meant to be limiting. See Ex. 1001, 28:2-
`
`5. Instead, consistent with its usage in the context of FPGAs and the dictionary
`
`cited by MI, the term “programmed” should be construed at least broadly enough
`
`to encompass “designed to perform a sequence of operations,” regardless of
`
`whether this design is in hardware or software. See Ex. 1025, ¶ 6.
`
`III. The Instituted Grounds Anticipate or Render Obvious Claims 1–3, 8, 11,
`and 15–25
`In its Response, MI largely reiterates arguments raised in its Preliminary Re-
`
`sponse. The Board properly found such arguments deficient in its Institution Deci-
`
`sion and should do so again, as no further evidence of import is now proffered by
`
`MI to establish a valid legal basis for altering the Board’s initial findings.
`
`A. Pong is Enabling Prior Art
`MI argues that “neither the Pong reference, nor the Pong reference in com-
`
`bination with the Smith reference enables one of ordinary skill in the art to practice
`
`the inventions of the independent claims of the ’121 Patent.” POR, p. 18. Howev-
`
`er, MI has not overcome the presumption that prior art publications and patents
`
`
`
`7
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`(like Pong) are enabling. In re Antor Media Corp., 689 F.3d 1282, 1287-88 (Fed.
`
`Cir. 2012). To the contrary, the evidence of record proves that Pong would have
`
`enabled a POSITA to make or use the claimed inventions from the Pong disclosure
`
`together with information known in the art without undue experimentation.
`
`The test for determining enabling disclosure under 35 U.S.C. § 112 is
`
`whether a POSITA could make or use the claimed invention from the disclosed
`
`subject matter together with information known in the art without undue experi-
`
`mentation. United States v. Telectronics, Inc., 857 F.2d 778, 785 (Fed. Cir. 1988).
`
`A disclosure can be enabling even though some experimentation is necessary. Hy-
`
`britech Inc. v. Monoclonal Antibodies, Inc., 802 F.2d 1367, 1384 (Fed. Cir. 1986).
`
`The issue is whether the amount of required experimentation is undue, not whether
`
`any experimentation is necessary. In re Vaeck, 947 F.2d 488, 495 (Fed. Cir. 1991).
`
`The relevant factors include: (1) the quantity of experimentation necessary, (2) the
`
`amount of direction or guidance presented, (3) the presence or absence of working
`
`examples, (4) the nature of the invention, (5) the state of the prior art, (6) the rela-
`
`tive skill of those in the art, (7) the predictability or unpredictability of the art, and
`
`(8) the breadth of the claims. See In re Wands, 858 F.2d 731, 737 (Fed. Cir. 1988).
`
`The testimony of Dr. Oklobdzija does not explain “with sufficient specifici-
`
`ty, what and how much experimentation would have been required by one with or-
`
`dinary skill, nor why that amount of experimentation should be regarded as ‘un-
`
`
`
`8
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`due.’” Liberty Mutual Insurance Co. v. Progressive Casualty Insurance Co.,
`
`CBM2013-00009, Paper 68, p. 40 (P.T.A.B. Feb. 11, 2014). Dr. Oklobdzija barely
`
`touches upon the level of experimentation, surmising (importantly, without citation
`
`to any supporting evidence) that “it would take in excess of two years to design,
`
`verify, and implement a computer system with a point-to-point architecture and
`
`supporting cache coherency.” Ex. 2016, ¶ 83. Dr. Oklobdzija fails to identify any
`
`legal standard applied in forming his enablement opinion.
`
`Even if Dr. Oklobdzija’s naked statements were given full credit, they still
`
`fail to explain why this two year design period is undue under the circumstances,
`
`nor sufficiently address the various factors set forth in Wands. For example,
`
`though Dr. Oklobdzija raises issues with respect to the identity/type of messages
`
`used in the Pong system and how those messages are generated and handled by the
`
`system, Dr. Oklobdzija does not relate these apparently missing details of Pong to
`
`the breadth of the claims of the ‘121 patent (which do not recite these limitations),
`
`nor does he address whether such implementation details were well known to a
`
`POSITA (which, as will be demonstrated in the next section, they were). Indeed,
`
`MI’s expert admitted that his enablement opinions related to features that are not
`
`required by the challenged claims. Ex. 1026, 140:2-17; 140:24-141:8 (opining that
`
`Pong is not enabled for a system with “more than 16” processors that creates a
`
`point to point architecture by “emulating a shared bus-type protocol”). This ane-
`
`
`
`9
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`mic showing compares unfavorably to the extremely high bar established for undue
`
`experimentation. Even complex experimentation may not be undue, if the art typi-
`
`cally engages in such experimentation. In re Wands, 858 F.2d at 737. According-
`
`ly, MI has not met its burden to prove that Pong is not enabling.
`
`Contrary to Dr. Oklobdzija’s unsupported conclusions (which relies upon
`
`unsupported claim constructions (Ex. 1026, 131:25-132:18), the record demon-
`
`strates that Pong would have enabled one of ordinary skill in the art to make or use
`
`the claimed invention without undue experimentation, particularly when consider-
`
`ing the Pong disclosure together with information in the prior art. Indeed, the level
`
`of implementation detail provided by Pong, of which MI argues there is too little,
`
`is entirely consistent with the level of implementation detail provided in similar
`
`applied prior art disclosures of cache coherent systems, such as Koster (which, no-
`
`tably, MI did not argue is not enabling). Ex. 1025, ¶ 7.
`
`Further, Pong discloses various alternative embodiments of its invention,
`
`separating its disclosure into clearly identifiable sections. Ex. 1025, ¶ 8. MI’s at-
`
`tempt to contrast disclosures from these distinct embodiments and declare them
`
`“incompatible” is simply not evidence that the single embodiment upon which the
`
`Petition relies (i.e., the embodiment shown in FIG. 4) does not itself enable the
`
`claims. Rather, a POSITA would have found it straightforward to distinguish
`
`Pong’s embodiments and understand how the disclosure related to each could be
`
`
`
`10
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`used to implement each embodiment. Id.
`
`Turning to the disclosure of Pong, a first set of embodiments, illustrated in
`
`FIGS. 2-3, are described in ¶¶ 0029-0043. In these embodiments, the queues in the
`
`memory controller are “designed to broadcast the request to all other processors
`
`and the memory.” Ex. 1003, ¶ 0032. Thus, these particular embodiments “emu-
`
`lat[e] a shared bus type of protocol,” a protocol that similarly ensures that all re-
`
`quests are sent to all processors. Ex. 1003, ¶ 0029; see Ex. 1025, ¶ 9. Further,
`
`Pong provides details regarding the physical architecture of its system, including
`
`the use of point-to-point links to connect each processor to a central memory con-
`
`troller 206, that the memory controller 206 includes queues that buffer and forward
`
`requests, and that the data path internal to the memory controller 206 “may be im-
`
`plemented with data switches, point-to-point links, a shared bus, etc.” See Ex.
`
`1003, ¶¶ 0029-0043.
`
`Contrary to Dr. Oklobdzija’s expressed confusion (Decl., ¶ 76) about how
`
`such an architecture could be implemented, the comprehensive Culler prior art
`
`textbook (Ex. 2011) cited elsewhere by Dr. Oklobdzija describes Pong’s general
`
`architecture as “common” and identifies it as one of “four categories” into which
`
`all memory hierarchies generally fall, depending on the relative positioning of pro-
`
`cessors, cache(s), and main memory with respect to the interconnect. Ex. 1028, pp.
`
`270-271; see also Ex. 2016, ¶¶ 90, 93. Pong’s architecture, known as “dancehall,”
`
`
`
`11
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`is shown in FIG. 5.2(c) of the Culler textbook, and applies to systems in which
`
`each processor has its own private cache and is separated from main memory by a
`
`point-to-point interconnect. See Ex. 1028, pp. 271; see also Ex. 1025, ¶¶ 10-11.
`
`Indeed, contrary to Dr. Oklobdzija’s assertions (Decl., ¶ 75), use of cache coher-
`
`ence schemes in a scalable point-to-point architecture was well-known before
`
`2002, as evidenced by Culler’s devotion of an entire chapter to detailing various
`
`cache coherent “directory schemes [that] rely on point-to-point network transac-
`
`tions.” Ex. 1028, p. 555 (introducing the subject matter of Chapter 8).
`
`Pong (starting at ¶ 0044) provides further enabling disclosure regarding
`
`“[o]ptimizations” to the FIGS. 2 and 3 embodiments, which are specifically illus-
`
`trated with regard to FIGS. 4-6. Ex. 1025, ¶ 12. In these embodiments, a central
`
`directory located in the memory controller (FIG. 4), a separate memory component
`
`(FIG. 5), or folded into the data blocks in main memory (FIG. 6), is used to filter
`
`requests to reduce traffic. See Ex. 1003, ¶¶ 0056-0060; see also Ex. 1025, ¶ 12.
`
`Pong discloses various ways in which such a directory may be used to filter
`
`requests, and a POSITA would have been able to easily distinguish between them.
`
`Ex. 1025, 13¶. For example, Pong discloses an embodiment in which a requesting
`
`processor uses information contained in a directory to specifically address requests
`
`to a processor storing a valid copy. Ex. 1003, ¶ 0047. According to the Culler
`
`textbook, it was a common technique for a requesting processor to consult a direc-
`
`
`
`12
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`tory in this manner. See Ex. 1028, p. 585. Pong also discloses an alternative ap-
`
`proach, in which the directory itself “filters the request and addresses it to the ap-
`
`propriate processors.” Ex. 1003, ¶ 0056. Again, the Culler textbook verifies this
`
`as a well understood alternative to the embodiment of paragraph 47 that reduces
`
`transactions on the interconnect, referring to it as “intervention forwarding.” See
`
`Ex. 1028, p. 585. In other words, the Culler prior art textbook demonstrates that a
`
`POSITA would have understood Pong’s description in ¶¶ 47 and 56 as well-known
`
`alternative embodiments, and would not have viewed them as conflicting, as Dr.
`
`Oklobdzija suggests (in Decl., ¶ 78). Ex. 1025, ¶ 14.
`
`The other “incompatible embodiments” identified by Dr. Oklobdzija (Decl.,
`
`¶ 79) would have similarly been identified as distinctly operable alternative em-
`
`bodiments by a POSITA, and not contradictions regarding a single embodiment.
`
`Ex. 1025, ¶ 15. Importantly, though, the only embodiment relied upon in the Peti-
`
`tion is the embodiment shown in FIG. 4, which is described at least in part in para-
`
`graphs 0050-0057, where Pong specifies that, “[u]nless otherwise noted, the de-
`
`scription of the components is the same as provided” with regard to FIGS. 2 and 3.
`
`Pong, ¶ 0056. In other words, Pong is clear that any description of the embodi-
`
`ment shown in FIG. 4 takes precedence over any contradictory description of the
`
`previous embodiments. Ex. 1025, ¶ 15.
`
`With regard to FIG. 4, Pong discloses that the directory is implemented with
`
`
`
`13
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`a presence bit vector. Ex. 1003, ¶ 0051. The Culler textbook confirms that the use
`
`of such a presence bit vector was common at the time of the ’121 Patent and even
`
`provides specific description regarding how directories commonly used a presence
`
`bit vector to implement a cache coherence scheme. See Ex. 1028, pp. 560-64.
`
`Thus, contrary to Dr. Oklobdzija’s conclusions, the Culler textbook demonstrates
`
`that a POSITA would have readily known how to implement the Pong FIG. 4 em-
`
`bodiment, in which a centralized directory utilizes intervention forwarding and a
`
`presence bit vector to implement a cache coherence protocol. Ex. 1025, ¶ 16.
`
`While the over 120 pages devoted to directory-based cache coherence in the
`
`Culler textbook demonstrate that there were a number of low-level implementation
`
`choices a POSITA could have made in making the embodiment shown in FIG. 4,
`
`these pages provide evidence that these details were well within the ability and
`
`knowledge of a POSTIA. See Ex. 1025, ¶ 17; see generally Ex. 1028, Chap. 8.
`
`Indeed, the Culler textbook details various case studies of working directory-based
`
`systems and simulations that were commonly used to test them. See Ex. 1028, pp.
`
`576-77, 596-644.
`
`For at least these reasons, the record demonstrates that Pong would have en-
`
`abled a POSITA to make or use the claimed invention without undue experimenta-
`
`tion, particularly when considering the Pong disclosure together with information
`
`known in the prior art, such as the teachings of the Culler textbook cited by MI.
`
`
`
`14
`
`
`
`Patent No. 7,296,121
`
`Petitioner’s Reply to Patent Owner Response
`
`B. Pong Discloses the Claimed “States”
`MI’s argument rests entirely upon its claim construction of the term “state,”
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`which is improperly narrow for the reasons described above. The Board should
`
`uphold its preliminary determinations of the scope of the term “state,” and dismiss
`
`MI’s arguments with regard to this feature as moot. And, even if the Board were
`
`to reverse its preliminary determinations, the Board should dismiss this argument
`
`because Pong meets the claims even under MI’s narrow definition of “states.”
`
`The claims recite “probe filtering information representative of states associ-
`
`ated with selected ones of the cache memories.” As noted in the Petition, in either
`
`an update or a write invalidation type of cache coherence protocol, presence bits in
`
`a centralized directory, like the directory filter 400 of the memory controller, indi-
`
`cate the presence of valid copies of memory. See Ex. 1014 at ¶¶ A-10 to A-13.
`
`Validity is undoubtedly a state of memory, so the validity information stored in
`
`Pong’s directory filter 400 is probe filtering information representative of states as-
`
`sociated with selected ones of the cache memories. See Ex. 1025, ¶¶ 19, 26. To
`
`rebut this evidence, MI cites to the teachings of Pong and other extrinsic evidence.
`
`MI’s arguments are flawed in at least two respects, as noted below.
`
`First, MI argues that Pong ¶ 0013 demonstrates that Pong’s presence bit vec-
`
`tor does not maintain validity information. See POR, pp. 25-26. However, the
`
`portions of Pong cited by MI are not tied to the Fig. 4 Pong embodiment upon
`
`
`
`15
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`which Petitioner relies. Ex. 1025, ¶ 20. Instead, Pong discloses that Fig. 4 is an
`
`“alternative implementation[].” Ex. 1003, ¶ 0056. Additionally, MI’s quote of
`
`Pong ¶ 0013 is misleading as it includes ellipses omitting that the section is refer-
`
`ring to “broadcast[ing]” (i.e., sending requests to all processors) as an alternative
`
`to sending to targeted processors.
`
`Moreover, even if the cited portion of Pong was applicable to the Fig. 4 al-
`
`ternative implementation (which it is not), it was well known at the time of Pong’s
`
`disclosure that processors of the type disclosed by Pong may be designed to redun-
`
`dantly check validity. Ex. 1025, ¶ 21. As such Pong’s disclosure of processors’
`
`separate validity check does not mean that the directory filter 400 fails to also track
`
`validity. Id. For example, at the time of the ‘121 patent, processors were known
`
`by POSITAs to have the ability to flush memory lines from their caches without
`
`alerting the central directory. Id.
`
`Second, MI alleges that “how other references implement their cache coher-
`
`ence protocols is not instructive in how Pong implements its own protocol.” POR,
`
`p. 26. However, extrinsic evidence is useful in assessing the teachings of a refer-
`
`ence by evidencing technological facts known to those in the field of the invention.
`
`See, e.g., Continental Can Co. USA, Inc. v. Monsanto Co., 948 F. 2d 1264, 1269
`
`(Fed. Cir. 1991). Here, far from the overly broad “assumptions” that MI accuses
`
`Dr. Horst of making by citing to the extrinsic evidence, Dr. Horst properly uses the
`
`
`
`16
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`extrinsic evidence to show how a POSITA would understand Pong to work. Based
`
`on his own experience and the teachings of the prior art generally, Dr. Horst found
`
`that it would make no sense for Pong’s presence bit vector to indicate the presence
`
`of memory lines it knows to be invalid. See Ex. 1014, ¶¶ A-10 to A-13.
`
`Put simply, the fact that the memory controller uses the presence bit vector
`
`to forward requests to only a subset of the processor caches is indicative of a belief
`
`(based on the best information available at the memory controller) that this subset
`
`of processor caches is the only set of caches with valid copies of the requested
`
`memory lines. Ex. 1025, ¶ 22. After all, a POSITA would understand that it
`
`makes no sense for the memory controller to forward requests to processor caches
`
`that it believes have an invalid copy, as such processor caches are already known
`
`to be unable to respond to the requests and, thus, forwarding requests to these
`
`caches does nothing more than needlessly increase traffic in Pong’s control path.
`
`Id. Such a needless increase in traffic contradicts the very reason why the presence
`
`bit vector is used in Pong’s system – i.e., to optimize performance by “limiting
`
`traffic in the control path.” Id. (citing Ex. 1003, ¶ 0045).
`
`Rather than rebut this understanding, Dr. Horst’s views are proven by the
`
`extrinsic evidence cited by MI. For example, MI cites the Dragon protocol as evi-
`
`dence that “write-update protocols do not have a valid/invalid state.” POR, p. 27.
`
`Yet, this characterization of the Dragon protocol misleads. In the Dragon protocol,
`
`
`
`17
`
`
`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`all states are “valid.” In fact, because “the protocol always keeps the blocks in the
`
`cache up-to-date, so it is always okay to use the data present in the cache if the tag
`
`ma