throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`APPLE INC., HTC CORPORATION, HTC AMERICA, INC., SAMSUNG
`ELECTRONICS CO. LTD, SAMSUNG ELECTRONICS AMERICA, INC., AND
`AMAZON.COM, INC.,
`Petitioners,
`
`v.
`
`MEMORY INTEGRITY, LLC,
`Patent Owner.
`____________
`
`Case IPR2015-00159
`Patent 7,296,121
`____________
`
`
`
`
`
`PETITIONERS’ REPLY TO PATENT OWNER RESPONSE
`PURSUANT TO 37 C.F.R. § 42.23
`
`
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`TABLE OF CONTENTS
`
`I. 
`
`INTRODUCTION .............................................................................................. 1 
`
`II.  CLAIM CONSTRUCTIONS ............................................................................. 1 
`
`A.  “States” ........................................................................................................ 1 
`
`B.  “Programmed” ............................................................................................. 5 
`
`III.  THE INSTITUTED GROUNDS ANTICIPATE OR RENDER OBVIOUS
`CLAIMS 1–3, 8, 11, AND 15–25 .............................................................................. 7 
`
`A.  Pong is Enabling Prior Art ........................................................................... 7 
`
`B.  Pong Discloses the Claimed “States” ........................................................ 15 
`
`C.  Pong Discloses the Claimed “Probes” ....................................................... 19 
`
`D.  Pong Discloses that Each of its Processing Nodes is Programmed in the
`Manner Recited in Claim 11 ............................................................................ 21 
`
`E.  Pong Discloses a Memory Controller that Accumulates Probe Responses
`as Recited in Claims 15 and 25 ........................................................................ 21 
`
`F.  Pong Discloses the Valid Copy Recited in Claim 25 ................................ 24 
`
`IV.  CONCLUSION ................................................................................................ 25 
`
`
`
`
`i
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`EXHIBITS
`
`
`
`APPL-1025
`
`Reply Declaration of Dr. Robert Horst
`
`APPL-1026
`
`APPL-1027
`
`Deposition Transcript of Dr. Vojin G. Oklobdzija Vol. 1, November
`23, 2015
`Deposition Transcript of Dr. Vojin G. Oklobdzija Vol. 2, November
`24, 2015
`
`APPL-1028
`
`David E. Culler et al., Parallel Computer Architecture: A Hard-
`ware/software Approach (1st Ed.) (1998)
`
`APPL-1029
`
`APPL-1030
`
`“InfiniBand Architecture Specification Volume 1 Release 1.0.a”
`(June 19, 2001)
`James Laudon and Daniel Lenoski, Proceedings of the 24th Annual
`International Symposium on Computer Architecture, "The SGI
`Origin: A ccNUMA Highly Scalable Server" (1997)
`
`
`
`ii
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`I.
`
`Introduction
`Petitioners submit this Reply to Memory Integrity’s (“MI”) Response (Paper
`
`25) (“POR”). MI relies upon improper claim construction proposals that have al-
`
`ready been considered and rejected in the Board’s Institution Decision (Paper 12).
`
`MI’s proposals ignore the actual claim language and improperly seek to narrow the
`
`broadest reasonable construction of the terms without support. Moreover, MI’s va-
`
`lidity arguments are highly attenuated and reflect a flawed understanding of the
`
`Pong reference. As explained in greater detail herein, MI’s arguments should be
`
`dismissed.
`
`II. Claim Constructions
`In an effort to avoid Pong’s anticipating disclosure, MI “engages in a post
`
`hoc attempt to redefine the claimed invention by impermissibly incorporating lan-
`
`guage appearing in the specification into the claims.” In re Paulson, 30 F.3d 1475,
`
`1480 (Fed. Cir. 1994). MI’s proposals should be rejected as there is no clear defi-
`
`nition, in the ’121 Patent or elsewhere, that warrants narrowing the terms.
`
`A. “States”
`MI’s proposed construction improperly seeks to add the very limitation that
`
`MI is trying to add with its Motion to Amend. Motion to Amend, p. 1 (seeking to
`
`add “wherein said states comprise cache coherency states of a cache coherence
`
`protocol” to substitute claims). This attempt by MI belies its argument that
`
`“states” is already limited to “cache coherence protocol states.” MI should not be
`
`
`
`1
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`allowed to use claim construction to add claim limitations without amendment.
`
`Further, the Board has already considered intrinsic and extrinsic evidence
`
`and found that the term “states … is not limited to cache coherence protocol states
`
`and is broad enough to include the condition of presence—i.e., what is stored in
`
`cache memory.” Institution Decision, pp. 9-10. MI effectively repeats its earlier
`
`arguments, essentially citing to the same disclosure within the ’121 specification,
`
`and has presented no new evidence to diminish the Board’s preliminary findings.
`
`Additionally, MI’s proposal contains the word “state” that it seeks to define, ex-
`
`posing MI’s attempt to narrow the broadest reasonable interpretation of this term.
`
`“[T]he PTO should only limit the claim based on the specification or prose-
`
`cution history when those sources expressly disclaim the broader definition.” In re
`
`Bigio, 381 F.3d 1320, 1325 (Fed. Cir. 2004). Here, none of the passages cited by
`
`MI amount to an express disclaimer. To the contrary, as noted in the Institution
`
`Decision, all of the examples in the specification to which MI (again) points are
`
`couched in broad language stating that “particular implementations may use a dif-
`
`ferent set of states” and “[t]he techniques of the present invention can be used with
`
`a variety of different possible memory line states.” Institution Decision, p. 9.
`
`Moreover, the claims at issue recite “states associated with selected ones of
`
`the cache memories.” This recital is broader than the individual “memory line”
`
`states described in each of the ’121 Patent passages quoted by MI. POR, pp. 5-6
`
`
`
`2
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`(“the cache state for a specified line”; “memory line state information”; and “the
`
`memory line states are modified, owned, shared, and invalid”) (emphasis added).
`
`MI does not and cannot explain why the meaning of states for individual “line”
`
`content (these passages), which may be present in a variety of states, should be the
`
`same as the state of the whole cache memories (as claimed). Indeed, MI’s expert
`
`admitted that MI’s proposal (which he did not help in developing) “would not ap-
`
`ply” when referring to entire “cache memories.” See Ex. 1026, 113:15-114:13;
`
`112:13-16; 16:15-17:13.
`
`Additionally, the dependent claims reveal that the patentee used express lan-
`
`guage when seeking to limit a term to the context of cache coherency, and it clear-
`
`ly omitted such language with respect to the term “states.” In particular, claim 3,
`
`which depends indirectly from independent claim 1, recites that the probe filtering
`
`unit corresponds to an additional node that “comprises a cache coherence control-
`
`ler.” Claim 3 demonstrates that, where MI intended for a claim term to be limited
`
`to the context of cache coherency, MI explicitly used the term “cache coherence”
`
`in the claim language. The omission of “cache coherence” from claim 1 is telling,
`
`and, under the broadest reasonable interpretation standard should be read in con-
`
`trast with claim 3 to preserve the breadth of claim 1.
`
`MI also relies upon extrinsic evidence as supportive of its position, citing to
`
`two references by Daniel Sorin, one of which was published nearly nine years after
`
`
`
`3
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`the priority date sought by MI. POR, pp. 4-5. However, “the fact that [MI] can
`
`point to definitions or usages that conform to their interpretation does not make the
`
`PTO’s definition unreasonable when the PTO can point to other sources that sup-
`
`port its interpretation.” In re Morris, 127 F.3d 1048, 1056 (Fed. Cir. 1997). Here,
`
`the Board cited to the Microsoft Computer Dictionary for support of its construc-
`
`tion. Institution Decision, p. 10. MI’s criticism of this source is hardly credible as
`
`MI endorses the use of the same Microsoft Computer Dictionary, as well as a gen-
`
`eral purpose dictionary, for its “programmed” proposal. POR, p. 13.
`
`Finally, the Petition contends that, even within the specific field of cache
`
`coherence, the scope of the term “states” is “broad enough to include the condition
`
`of presence,” as found by the Board. See, e.g., Petition, p. 10 (identifying the
`
`Chaiken reference’s use of “status” to reference presence condition). The ’121 pa-
`
`tent accords by also using the term “state” to refer to presence. See ’121 patent at
`
`13:60-61 (“In the invalid state, a memory line is not currently available in cache
`
`associated with any remote cluster.”). Indeed, the Sorin and Culler references that
`
`MI cites also identify a “Not Present State.” Ex. 2010 at 89; Ex. 2002 at 4; see Ex.
`
`1026 at 38:3-39:11 (Sorin and Culler are reliable references).
`
`Accordingly, it is reasonable, for purposes of this proceeding in which the
`
`broadest reasonable construction standard applies, to consider the term “states” as
`
`being broad enough to encompass the condition of presence.
`
`
`
`4
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`B. “Programmed”
`MI advanced arguments regarding the term “programmed” in its preliminary
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`
`
`
`response, without explicitly construing the term. MI now improperly seeks to ef-
`
`fectively amend the claim to overcome the Board’s preliminary endorsement of the
`
`Pong reference by advancing a narrowing interpretation of this term. MI asserts
`
`that “the term ‘programmed’ should be construed to refer to a device that has been
`
`‘configured by a sequence of instructions’” (POR, p. 11) and argues that “‘pro-
`
`grammed’ is not broad enough to encompass hardwired logic” (POR, p. 15).
`
`However, these proposals are not supported by the evidence. See Ex. 1025, ¶¶ 2-6.
`
`The ’121 Patent does not use the words “instruction” or “execute.” The ’121
`
`Patent makes no distinction between hardwired logic and the relevant portion of
`
`the processors that dictate the completion of a memory transaction. MI has not cit-
`
`ed to any language in the ’121 Patent which provides a clear limitation to the na-
`
`ture of the programming. See POR, pp. 12-13. Indeed, the ’121 Patent is clear that
`
`these cited sections are “merely exemplary for the purpose of describing a specific
`
`embodiment of the present invention.” Ex. 1001, 28:2-5. Further, even the dic-
`
`tionaries that MI cites include reasonable definitions for programming that defy
`
`MI’s proposal, such as “to work out a sequence of operations to be performed by (a
`
`mechanism).” Ex. 2014, p. 931.
`
`Indeed, hardwired logic is designed to perform a sequence of operations.
`
`
`
`5
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`For example, a field programmable gate array (FPGA) is effectively an array of
`
`logic gates that can be interwired in different configurations according to a manu-
`
`facturer’s programming. Ex. 1025, ¶ 3. Contrary to MI’s contention that the term
`
`“programmed” is limited to devices that execute a series of instructions, a field
`
`programmable gate array does not execute any instructions. Id. Rather, a designer
`
`uses an interface to program the physical interconnections between the logic gates,
`
`and the logic gates within the FPGA each perform a logical operation correspond-
`
`ing to the gate’s type and its input signals. Id. Indeed, MI’s expert admitted that
`
`“everybody use[s]” the term “programmable” with respect to an FPGA. See Ex.
`
`1026, 123:12-124:11; see also Ex. 1025, ¶ 4.
`
`MI’s evidence states that “in hardwired logic systems the physical intercon-
`
`nections of the elements govern the routes by which data flows between the pro-
`
`cessing elements and thus the sequence of processing operations performed on the
`
`data.” Ex. 2015 at 15/3. Yet, this is entirely consistent with the operation of the
`
`aforementioned field programmable gate array. Ex. 1025, ¶ 5. By its very name a
`
`field programmable gate array is “programmed” by a designer. Indeed, MI’s own
`
`specification uses the term “programmable” when referring to devices that do not
`
`execute instructions, teaching that “the cache coherence controller 230 is a special-
`
`ly configured programmable chip such as a programmable logic device or a field
`
`programmable gate array.” Ex. 1001, 7:49-52 (emphasis added).
`
`
`
`6
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`Accordingly, MI’s attempt to narrow the term “programmed” to exclude
`
`hardwired systems is inconsistent with the use of the term “programmable” in the
`
`’121 Patent and with the extrinsic evidence cited by MI. Indeed, to read the lim-
`
`ited passages of the ‘121 Patent cited by MI any differently would be a clear viola-
`
`tion of In re Bigio, as the section of the ‘121 Patent in which these passages appear
`
`are clear that the examples given are not meant to be limiting. See Ex. 1001, 28:2-
`
`5. Instead, consistent with its usage in the context of FPGAs and the dictionary
`
`cited by MI, the term “programmed” should be construed at least broadly enough
`
`to encompass “designed to perform a sequence of operations,” regardless of
`
`whether this design is in hardware or software. See Ex. 1025, ¶ 6.
`
`III. The Instituted Grounds Anticipate or Render Obvious Claims 1–3, 8, 11,
`and 15–25
`In its Response, MI largely reiterates arguments raised in its Preliminary Re-
`
`sponse. The Board properly found such arguments deficient in its Institution Deci-
`
`sion and should do so again, as no further evidence of import is now proffered by
`
`MI to establish a valid legal basis for altering the Board’s initial findings.
`
`A. Pong is Enabling Prior Art
`MI argues that “neither the Pong reference, nor the Pong reference in com-
`
`bination with the Smith reference enables one of ordinary skill in the art to practice
`
`the inventions of the independent claims of the ’121 Patent.” POR, p. 18. Howev-
`
`er, MI has not overcome the presumption that prior art publications and patents
`
`
`
`7
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`(like Pong) are enabling. In re Antor Media Corp., 689 F.3d 1282, 1287-88 (Fed.
`
`Cir. 2012). To the contrary, the evidence of record proves that Pong would have
`
`enabled a POSITA to make or use the claimed inventions from the Pong disclosure
`
`together with information known in the art without undue experimentation.
`
`The test for determining enabling disclosure under 35 U.S.C. § 112 is
`
`whether a POSITA could make or use the claimed invention from the disclosed
`
`subject matter together with information known in the art without undue experi-
`
`mentation. United States v. Telectronics, Inc., 857 F.2d 778, 785 (Fed. Cir. 1988).
`
`A disclosure can be enabling even though some experimentation is necessary. Hy-
`
`britech Inc. v. Monoclonal Antibodies, Inc., 802 F.2d 1367, 1384 (Fed. Cir. 1986).
`
`The issue is whether the amount of required experimentation is undue, not whether
`
`any experimentation is necessary. In re Vaeck, 947 F.2d 488, 495 (Fed. Cir. 1991).
`
`The relevant factors include: (1) the quantity of experimentation necessary, (2) the
`
`amount of direction or guidance presented, (3) the presence or absence of working
`
`examples, (4) the nature of the invention, (5) the state of the prior art, (6) the rela-
`
`tive skill of those in the art, (7) the predictability or unpredictability of the art, and
`
`(8) the breadth of the claims. See In re Wands, 858 F.2d 731, 737 (Fed. Cir. 1988).
`
`The testimony of Dr. Oklobdzija does not explain “with sufficient specifici-
`
`ty, what and how much experimentation would have been required by one with or-
`
`dinary skill, nor why that amount of experimentation should be regarded as ‘un-
`
`
`
`8
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`due.’” Liberty Mutual Insurance Co. v. Progressive Casualty Insurance Co.,
`
`CBM2013-00009, Paper 68, p. 40 (P.T.A.B. Feb. 11, 2014). Dr. Oklobdzija barely
`
`touches upon the level of experimentation, surmising (importantly, without citation
`
`to any supporting evidence) that “it would take in excess of two years to design,
`
`verify, and implement a computer system with a point-to-point architecture and
`
`supporting cache coherency.” Ex. 2016, ¶ 83. Dr. Oklobdzija fails to identify any
`
`legal standard applied in forming his enablement opinion.
`
`Even if Dr. Oklobdzija’s naked statements were given full credit, they still
`
`fail to explain why this two year design period is undue under the circumstances,
`
`nor sufficiently address the various factors set forth in Wands. For example,
`
`though Dr. Oklobdzija raises issues with respect to the identity/type of messages
`
`used in the Pong system and how those messages are generated and handled by the
`
`system, Dr. Oklobdzija does not relate these apparently missing details of Pong to
`
`the breadth of the claims of the ‘121 patent (which do not recite these limitations),
`
`nor does he address whether such implementation details were well known to a
`
`POSITA (which, as will be demonstrated in the next section, they were). Indeed,
`
`MI’s expert admitted that his enablement opinions related to features that are not
`
`required by the challenged claims. Ex. 1026, 140:2-17; 140:24-141:8 (opining that
`
`Pong is not enabled for a system with “more than 16” processors that creates a
`
`point to point architecture by “emulating a shared bus-type protocol”). This ane-
`
`
`
`9
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`mic showing compares unfavorably to the extremely high bar established for undue
`
`experimentation. Even complex experimentation may not be undue, if the art typi-
`
`cally engages in such experimentation. In re Wands, 858 F.2d at 737. According-
`
`ly, MI has not met its burden to prove that Pong is not enabling.
`
`Contrary to Dr. Oklobdzija’s unsupported conclusions (which relies upon
`
`unsupported claim constructions (Ex. 1026, 131:25-132:18), the record demon-
`
`strates that Pong would have enabled one of ordinary skill in the art to make or use
`
`the claimed invention without undue experimentation, particularly when consider-
`
`ing the Pong disclosure together with information in the prior art. Indeed, the level
`
`of implementation detail provided by Pong, of which MI argues there is too little,
`
`is entirely consistent with the level of implementation detail provided in similar
`
`applied prior art disclosures of cache coherent systems, such as Koster (which, no-
`
`tably, MI did not argue is not enabling). Ex. 1025, ¶ 7.
`
`Further, Pong discloses various alternative embodiments of its invention,
`
`separating its disclosure into clearly identifiable sections. Ex. 1025, ¶ 8. MI’s at-
`
`tempt to contrast disclosures from these distinct embodiments and declare them
`
`“incompatible” is simply not evidence that the single embodiment upon which the
`
`Petition relies (i.e., the embodiment shown in FIG. 4) does not itself enable the
`
`claims. Rather, a POSITA would have found it straightforward to distinguish
`
`Pong’s embodiments and understand how the disclosure related to each could be
`
`
`
`10
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`used to implement each embodiment. Id.
`
`Turning to the disclosure of Pong, a first set of embodiments, illustrated in
`
`FIGS. 2-3, are described in ¶¶ 0029-0043. In these embodiments, the queues in the
`
`memory controller are “designed to broadcast the request to all other processors
`
`and the memory.” Ex. 1003, ¶ 0032. Thus, these particular embodiments “emu-
`
`lat[e] a shared bus type of protocol,” a protocol that similarly ensures that all re-
`
`quests are sent to all processors. Ex. 1003, ¶ 0029; see Ex. 1025, ¶ 9. Further,
`
`Pong provides details regarding the physical architecture of its system, including
`
`the use of point-to-point links to connect each processor to a central memory con-
`
`troller 206, that the memory controller 206 includes queues that buffer and forward
`
`requests, and that the data path internal to the memory controller 206 “may be im-
`
`plemented with data switches, point-to-point links, a shared bus, etc.” See Ex.
`
`1003, ¶¶ 0029-0043.
`
`Contrary to Dr. Oklobdzija’s expressed confusion (Decl., ¶ 76) about how
`
`such an architecture could be implemented, the comprehensive Culler prior art
`
`textbook (Ex. 2011) cited elsewhere by Dr. Oklobdzija describes Pong’s general
`
`architecture as “common” and identifies it as one of “four categories” into which
`
`all memory hierarchies generally fall, depending on the relative positioning of pro-
`
`cessors, cache(s), and main memory with respect to the interconnect. Ex. 1028, pp.
`
`270-271; see also Ex. 2016, ¶¶ 90, 93. Pong’s architecture, known as “dancehall,”
`
`
`
`11
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`is shown in FIG. 5.2(c) of the Culler textbook, and applies to systems in which
`
`each processor has its own private cache and is separated from main memory by a
`
`point-to-point interconnect. See Ex. 1028, pp. 271; see also Ex. 1025, ¶¶ 10-11.
`
`Indeed, contrary to Dr. Oklobdzija’s assertions (Decl., ¶ 75), use of cache coher-
`
`ence schemes in a scalable point-to-point architecture was well-known before
`
`2002, as evidenced by Culler’s devotion of an entire chapter to detailing various
`
`cache coherent “directory schemes [that] rely on point-to-point network transac-
`
`tions.” Ex. 1028, p. 555 (introducing the subject matter of Chapter 8).
`
`Pong (starting at ¶ 0044) provides further enabling disclosure regarding
`
`“[o]ptimizations” to the FIGS. 2 and 3 embodiments, which are specifically illus-
`
`trated with regard to FIGS. 4-6. Ex. 1025, ¶ 12. In these embodiments, a central
`
`directory located in the memory controller (FIG. 4), a separate memory component
`
`(FIG. 5), or folded into the data blocks in main memory (FIG. 6), is used to filter
`
`requests to reduce traffic. See Ex. 1003, ¶¶ 0056-0060; see also Ex. 1025, ¶ 12.
`
`Pong discloses various ways in which such a directory may be used to filter
`
`requests, and a POSITA would have been able to easily distinguish between them.
`
`Ex. 1025, 13¶. For example, Pong discloses an embodiment in which a requesting
`
`processor uses information contained in a directory to specifically address requests
`
`to a processor storing a valid copy. Ex. 1003, ¶ 0047. According to the Culler
`
`textbook, it was a common technique for a requesting processor to consult a direc-
`
`
`
`12
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`tory in this manner. See Ex. 1028, p. 585. Pong also discloses an alternative ap-
`
`proach, in which the directory itself “filters the request and addresses it to the ap-
`
`propriate processors.” Ex. 1003, ¶ 0056. Again, the Culler textbook verifies this
`
`as a well understood alternative to the embodiment of paragraph 47 that reduces
`
`transactions on the interconnect, referring to it as “intervention forwarding.” See
`
`Ex. 1028, p. 585. In other words, the Culler prior art textbook demonstrates that a
`
`POSITA would have understood Pong’s description in ¶¶ 47 and 56 as well-known
`
`alternative embodiments, and would not have viewed them as conflicting, as Dr.
`
`Oklobdzija suggests (in Decl., ¶ 78). Ex. 1025, ¶ 14.
`
`The other “incompatible embodiments” identified by Dr. Oklobdzija (Decl.,
`
`¶ 79) would have similarly been identified as distinctly operable alternative em-
`
`bodiments by a POSITA, and not contradictions regarding a single embodiment.
`
`Ex. 1025, ¶ 15. Importantly, though, the only embodiment relied upon in the Peti-
`
`tion is the embodiment shown in FIG. 4, which is described at least in part in para-
`
`graphs 0050-0057, where Pong specifies that, “[u]nless otherwise noted, the de-
`
`scription of the components is the same as provided” with regard to FIGS. 2 and 3.
`
`Pong, ¶ 0056. In other words, Pong is clear that any description of the embodi-
`
`ment shown in FIG. 4 takes precedence over any contradictory description of the
`
`previous embodiments. Ex. 1025, ¶ 15.
`
`With regard to FIG. 4, Pong discloses that the directory is implemented with
`
`
`
`13
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`a presence bit vector. Ex. 1003, ¶ 0051. The Culler textbook confirms that the use
`
`of such a presence bit vector was common at the time of the ’121 Patent and even
`
`provides specific description regarding how directories commonly used a presence
`
`bit vector to implement a cache coherence scheme. See Ex. 1028, pp. 560-64.
`
`Thus, contrary to Dr. Oklobdzija’s conclusions, the Culler textbook demonstrates
`
`that a POSITA would have readily known how to implement the Pong FIG. 4 em-
`
`bodiment, in which a centralized directory utilizes intervention forwarding and a
`
`presence bit vector to implement a cache coherence protocol. Ex. 1025, ¶ 16.
`
`While the over 120 pages devoted to directory-based cache coherence in the
`
`Culler textbook demonstrate that there were a number of low-level implementation
`
`choices a POSITA could have made in making the embodiment shown in FIG. 4,
`
`these pages provide evidence that these details were well within the ability and
`
`knowledge of a POSTIA. See Ex. 1025, ¶ 17; see generally Ex. 1028, Chap. 8.
`
`Indeed, the Culler textbook details various case studies of working directory-based
`
`systems and simulations that were commonly used to test them. See Ex. 1028, pp.
`
`576-77, 596-644.
`
`For at least these reasons, the record demonstrates that Pong would have en-
`
`abled a POSITA to make or use the claimed invention without undue experimenta-
`
`tion, particularly when considering the Pong disclosure together with information
`
`known in the prior art, such as the teachings of the Culler textbook cited by MI.
`
`
`
`14
`
`

`
`Patent No. 7,296,121
`
`Petitioner’s Reply to Patent Owner Response
`
`B. Pong Discloses the Claimed “States”
`MI’s argument rests entirely upon its claim construction of the term “state,”
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`which is improperly narrow for the reasons described above. The Board should
`
`uphold its preliminary determinations of the scope of the term “state,” and dismiss
`
`MI’s arguments with regard to this feature as moot. And, even if the Board were
`
`to reverse its preliminary determinations, the Board should dismiss this argument
`
`because Pong meets the claims even under MI’s narrow definition of “states.”
`
`The claims recite “probe filtering information representative of states associ-
`
`ated with selected ones of the cache memories.” As noted in the Petition, in either
`
`an update or a write invalidation type of cache coherence protocol, presence bits in
`
`a centralized directory, like the directory filter 400 of the memory controller, indi-
`
`cate the presence of valid copies of memory. See Ex. 1014 at ¶¶ A-10 to A-13.
`
`Validity is undoubtedly a state of memory, so the validity information stored in
`
`Pong’s directory filter 400 is probe filtering information representative of states as-
`
`sociated with selected ones of the cache memories. See Ex. 1025, ¶¶ 19, 26. To
`
`rebut this evidence, MI cites to the teachings of Pong and other extrinsic evidence.
`
`MI’s arguments are flawed in at least two respects, as noted below.
`
`First, MI argues that Pong ¶ 0013 demonstrates that Pong’s presence bit vec-
`
`tor does not maintain validity information. See POR, pp. 25-26. However, the
`
`portions of Pong cited by MI are not tied to the Fig. 4 Pong embodiment upon
`
`
`
`15
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`which Petitioner relies. Ex. 1025, ¶ 20. Instead, Pong discloses that Fig. 4 is an
`
`“alternative implementation[].” Ex. 1003, ¶ 0056. Additionally, MI’s quote of
`
`Pong ¶ 0013 is misleading as it includes ellipses omitting that the section is refer-
`
`ring to “broadcast[ing]” (i.e., sending requests to all processors) as an alternative
`
`to sending to targeted processors.
`
`Moreover, even if the cited portion of Pong was applicable to the Fig. 4 al-
`
`ternative implementation (which it is not), it was well known at the time of Pong’s
`
`disclosure that processors of the type disclosed by Pong may be designed to redun-
`
`dantly check validity. Ex. 1025, ¶ 21. As such Pong’s disclosure of processors’
`
`separate validity check does not mean that the directory filter 400 fails to also track
`
`validity. Id. For example, at the time of the ‘121 patent, processors were known
`
`by POSITAs to have the ability to flush memory lines from their caches without
`
`alerting the central directory. Id.
`
`Second, MI alleges that “how other references implement their cache coher-
`
`ence protocols is not instructive in how Pong implements its own protocol.” POR,
`
`p. 26. However, extrinsic evidence is useful in assessing the teachings of a refer-
`
`ence by evidencing technological facts known to those in the field of the invention.
`
`See, e.g., Continental Can Co. USA, Inc. v. Monsanto Co., 948 F. 2d 1264, 1269
`
`(Fed. Cir. 1991). Here, far from the overly broad “assumptions” that MI accuses
`
`Dr. Horst of making by citing to the extrinsic evidence, Dr. Horst properly uses the
`
`
`
`16
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`extrinsic evidence to show how a POSITA would understand Pong to work. Based
`
`on his own experience and the teachings of the prior art generally, Dr. Horst found
`
`that it would make no sense for Pong’s presence bit vector to indicate the presence
`
`of memory lines it knows to be invalid. See Ex. 1014, ¶¶ A-10 to A-13.
`
`Put simply, the fact that the memory controller uses the presence bit vector
`
`to forward requests to only a subset of the processor caches is indicative of a belief
`
`(based on the best information available at the memory controller) that this subset
`
`of processor caches is the only set of caches with valid copies of the requested
`
`memory lines. Ex. 1025, ¶ 22. After all, a POSITA would understand that it
`
`makes no sense for the memory controller to forward requests to processor caches
`
`that it believes have an invalid copy, as such processor caches are already known
`
`to be unable to respond to the requests and, thus, forwarding requests to these
`
`caches does nothing more than needlessly increase traffic in Pong’s control path.
`
`Id. Such a needless increase in traffic contradicts the very reason why the presence
`
`bit vector is used in Pong’s system – i.e., to optimize performance by “limiting
`
`traffic in the control path.” Id. (citing Ex. 1003, ¶ 0045).
`
`Rather than rebut this understanding, Dr. Horst’s views are proven by the
`
`extrinsic evidence cited by MI. For example, MI cites the Dragon protocol as evi-
`
`dence that “write-update protocols do not have a valid/invalid state.” POR, p. 27.
`
`Yet, this characterization of the Dragon protocol misleads. In the Dragon protocol,
`
`
`
`17
`
`

`
`Patent No. 7,296,121
`Petitioner’s Reply to Patent Owner Response
`
`
`
`
`Attorney Docket No. 39521-0007IP1
`IPR2015-00159
`
`all states are “valid.” In fact, because “the protocol always keeps the blocks in the
`
`cache up-to-date, so it is always okay to use the data present in the cache if the tag
`
`ma

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket