throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`
`PLAID TECHNOLOGIES INC.
`Petitioner
`
`v.
`
`YODLEE, INC.
`Patent Owner
`
`
`
`
`
`
`
`
`
`
`
`
`Case IPR2016-00273
`Patent 6,317,783
`
`
`
`
`
`
`
`
`
`
`
`
`DECLARATION OF ZAYDOON JAWADI IN SUPPORT OF PATENT
`OWNER’S RESPONSE
`
`
`
`1
`
`YODLEE 2007
`PLAID TECHNOLOGIES V. YODLEE, INC.
`IPR2016-00273
`
`

`
`
`
`TABLE OF CONTENTS
`
`I.
`
`LEVEL OF ORDINARY SKILL IN THE ART ........................................ 3
`
`II. CLAIM CONSTRUCTION .......................................................................... 5
`
`A.
`
`“non-public personal information” (claims 1, 18, and 20) ................... 5
`
`1.
`
`“non-public personal information” should be given patentable
`weight .......................................................................................... 8
`
`“intermediary web site” (claims 14, 33) ............................................. 10
`
`“protocol for instructing the processor how to access the securely
`stored personal information via the network” (Claims 1, 18, and 20) 13
`
`B.
`
`C.
`
`III. THE INDEPENDENT CLAIMS OF THE ’783 PATENT ARE VALID16
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`Sugiarto and Brandt do not disclose the “protocol for instructing the
`processor how to access the securely stored personal information via
`the network” ........................................................................................ 18
`
`Sugiarto and Brandt do not disclose “storing the retrieved personal
`information in [a/the] personal information store” ............................. 22
`
`Sugiarto and Brandt do not disclose “non-public personal
`information” if that term is given patentable weight .......................... 26
`
`Sugiarto and Brandt do not disclose non-public personal information
`“also being accessible by the end user via the network independently
`of the system for delivering personal information” ............................ 29
`
`Petitioner’s proposed combination fails .............................................. 31
`
`The references teach away from Petitioner’s proposed combination . 34
`
`IV. PETITIONER HAS ALSO FAILED TO SHOW THAT MANY OF
`THE DEPENDENT CLAIMS ARE INVALID ........................................ 36
`
`A.
`
`B.
`
`Sugiarto and Brandt do not disclose an “intermediary web site”
`(claims 14-17, 33-36) .......................................................................... 36
`
`Sugiarto and Brandt do not disclose the “associated user interface
`format” / “format associated with the intermediary web site” / “format
`
`
`
`i
`
`
`
`2
`
`

`
`
`
`other than the format associated with the intermediary web site”
`(claims 14, 15, 17, 33, 34, 36) ............................................................. 39
`
`C.
`
`Sugiarto, Brandt, and Chow do not disclose “monitoring information
`providers for changes” (claims 2 and 21) ........................................... 40
`
`V. CONCLUSION ............................................................................................ 41
`
`
`
`
`
`ii
`
`
`
`3
`
`

`
`
`
`I, Zaydoon Jawadi, declare as follows:
`
`1.
`
`I am making this declaration at the request of the Patent Owner,
`
`Yodlee, Inc. (“Yodlee” or “Patent Owner”) in the matter of Inter Partes Review of
`
`U.S. Patent No. 6,317,783 (the ’783 Patent).
`
`2.
`
`I am being compensated for my work. My compensation does not
`
`depend in any way on the outcome of this proceeding or upon the opinions or
`
`testimony that I provide.
`
`3.
`
`In forming the opinions I express below, I considered all of the
`
`information I cite throughout my analysis, including:
`
`a.
`
`b.
`
`c.
`
`d.
`
`e.
`
`f.
`
`g.
`
`h.
`
`i.
`
`The ’783 Patent (Ex. 1001)
`
`The File History of the ’783 Patent (Ex. 1003)
`
`Petition by Plaid Technologies, Inc. (Paper 1)
`
`Declaration of Petitioner’s Expert, Todd Mowry (Ex. 1008)
`
`U.S. Patent No. 6,278,449 to Sugiarto, et al. (Ex. 1004)
`
`U.S. Patent No. 5,892,905 to Brandt, et al. (Ex. 1005)
`
`U.S. Patent No. 6,029,175 to Chow, et al. (Ex. 1006)
`
`Decision of Institution (Paper 10)
`
`Deposition of Petitioner’s Expert, Todd Mowry (Ex. 2005)
`
`4.
`
`I summarize my relevant knowledge and experience below. My
`
`Curriculum Vitae contains additional information and is Ex. 2008.
`
`
`
`1
`
`
`
`4
`
`

`
`
`
`5.
`
`I received a B.S. in Electrical Engineering from Mosul University in
`
`1977. I received an M.S. in Computer Science from Columbia University in 1981,
`
`with a Citation for Outstanding Achievement – Dean’s Honor Student.
`
`6.
`
`I hold a California community college computer science lifelong
`
`instructor credential. I have taught various computer technologies to thousands of
`
`engineers and academic students.
`
`7.
`
`8.
`
`Prior to 2007, I held a number of jobs in industry.
`
`For example, from 2001 to 2006, I was President and cofounder of
`
`CoAssure, Inc., a provider of automated web-based telecommunication test
`
`services serving Fortune-500 companies. The system included aggregating data
`
`from multiple data sources into an intermediary server and/or website, storing the
`
`aggregated data, and presenting the aggregated data to the end user’s browser
`
`through the internet.
`
`9.
`
`Also, in 1999 I co-founded a company called Can Do, Inc.
`
`CanDo.com was a startup Internet eCommerce company targeting people with
`
`disabilities. The CanDo.com website had over 10,000 items for sale, and extensive
`
`consumer features, such as news, chat, messages, and product information. The
`
`company was funded by leading venture capital firms. Technology included
`
`magnification software to make websites more usable by vision-impaired people
`
`
`
`2
`
`
`
`5
`
`

`
`
`
`and sound adaptation software to make websites more accessible by hearing-
`
`impaired individuals.
`
`10. The CanDo.com website technology included capabilities for
`
`aggregating news and other articles, aggregating pricing and product information,
`
`aggregating order processing and inventory information, and other aggregation.
`
`11. The CanDo.com hearing accessibility technology comprised
`
`adaptation, delivery, and real-time streaming of audio data files through the
`
`Internet to compensate for users’ hearing loss, based on users’ personal hearing
`
`profiles. Audio data is transmitted from audio sources to an intermediary server,
`
`which adapts the audio; the adapted audio is then transmitted to the client, which is
`
`typically the end user’s browser.
`
`12. Additionally, I have experience with data networking, including when
`
`I was General Manager, Data Networking Business Unit, Xyratex International
`
`LTD (NASDAQ: XRTX, now Seagate, NASDAQ: STX) from 1997 to 1998,
`
`where I was responsible for Gigabit Ethernet network protocol analyzer products
`
`used to monitor and analyze network traffic, including TCP/IP packets and other
`
`Internet traffic.
`
`I.
`
`LEVEL OF ORDINARY SKILL IN THE ART
`
`13.
`
`In my opinion, in the late 1990s, persons of ordinary skill in the art in
`
`the field pertinent to the ’783 Patent were people with at least a B.S. degree, or its
`
`
`
`3
`
`
`
`6
`
`

`
`
`
`equivalent, in computer science or a related field and approximately two years of
`
`practical experience working with design and implementation of computer
`
`software and networked systems, or an equivalent combination of academic study
`
`and work experience.
`
`14.
`
`I have also considered the level of ordinary skill set forth by
`
`Petitioner’s expert: “one having a Bachelor’s Degree in electrical engineering,
`
`computer science, or a related scientific field, and some work experience in the
`
`computer science field which could include programming experience”. Ex. 1008
`
`at ¶ 20.
`
`15.
`
`I believe myself to have been one of ordinary skill in the art through
`
`my education and work experience during the relevant timeframe, under either
`
`proposed level of skill. I am also familiar with the knowledge and capabilities of
`
`one of ordinary skill in art in 1998. Specifically, my experience at CoAssure, Inc.,
`
`and at Can Do, Inc., and my other roles in industry allowed me to become
`
`personally familiar with the level of skill of individuals and the general state of the
`
`art at that time.
`
`16. The opinions that I provide in this declaration are consistent with the
`
`knowledge and experience of one of ordinary skill in the art at the priority date for
`
`the ’783 patent, under either proposed level of skill. My opinions regarding
`
`
`
`4
`
`
`
`7
`
`

`
`
`
`validity do not change when I consider and apply Petitioner’s proposed level of
`
`ordinary skill in the art.
`
`II. CLAIM CONSTRUCTION
`
`17.
`
`I understand that in proceedings before the Board, patent claims are to
`
`be given their broadest reasonable interpretation, consistent with the teachings of
`
`the specification and file history.
`
`18.
`
`I have reviewed Patent Owner’s proposed constructions as explicitly
`
`identified in the Response and I agree that those constructions reflect the broadest
`
`reasonable interpretation of those claims. I have also reviewed Petitioner’s and the
`
`Board’s constructions (where applicable) and discuss those constructions below.
`
`A.
`
`“non-public personal information” (claims 1, 18, and 20)
`
`19. Petitioner proposes that only the term “non-pubic” be construed, but
`
`in every instance, the term “non-public” appears in the claims as part of the larger
`
`phrase “non-public personal information.” Thus, in my opinion, the larger phrase
`
`should be construed to give full meaning to this claim term.
`
`20. The specification of the ’783 patent explains the meaning of personal
`
`information:
`
`Personal Information’ is all of the data that companies,
`
`information providers, have that is specific or unique to
`
`each person such as monthly bills, bank account
`
`
`
`5
`
`
`
`8
`
`

`
`
`
`balances, investments information, health care benefits,
`
`email, voice and fax messages, 401(k) holdings or
`
`potentially any other information pertinent to a particular
`
`end user.
`
`Ex. 1001 at 4:15-21 (emphasis added).
`
`21. The file history further confirms my understanding of the claimed
`
`non-public personal information:
`
`the essence of personal information is that it is not
`
`accessible to the general public, i.e., other end users;
`
`rather, each information provider protects personal
`
`information relating to a specific end user against
`
`access by persons other than that end user or one acting
`
`under the authority of that end user.
`
`Ex. 1003 at 168 (emphasis added).
`
`22. The ’783 Patent also explains the difference between personal
`
`information like a local weather forecast (which it refers to as “Generic PI”), and
`
`the non-public personal information upon which the claims operate:
`
`Generic PI refers to PI of interest to the particular end
`
`user that does not require specific identity verification to
`
`obtain. For example, an end user might be interested in
`
`
`
`6
`
`
`
`9
`
`

`
`
`
`the weather forecast for his local area. This information
`
`could be integrated into a portal page without requiring
`
`identity verification of the particular end user receiving
`
`this PI. The individualized portal page provides a
`
`significant benefit to users seeking to aggregate generic
`
`PI. However, current portal pages do not generally
`
`provide PI requiring identity verification such as an end
`
`user's stock portfolio or bank balance.
`
`Ex. 1001 at 2:52-62 (emphasis added).
`
`23. Accordingly, one of ordinary skill in the art would conclude that
`
`“non-public personal information” within the ’783 Patent claims should be
`
`interpreted as “information relating to a specific end user that is not intended for
`
`access by persons other than that end user or those authorized by that end user.”
`
`24. Petitioner’s reliance solely on information protected by a login is
`
`misplaced. While information protected by a login may share similar security
`
`features as “non-public personal information,” the security features used to protect
`
`information cannot convert information into “non-public personal information.”
`
`Instead, Petitioner is effectively reading the word “personal” out of the claim
`
`language, which I understand is improper.
`
`
`
`7
`
`
`
`10
`
`

`
`
`
`25. Additionally, Patent Owner’s proposed construction is further
`
`supported by claim 1’s recitation of “securely storing” as a requirement separate
`
`and apart from “non-public personal information.” If, as Petitioner asserts, all
`
`information that is protected by a login and password were “non-public personal
`
`information,” there would be no need to separately recite “securely storing” in the
`
`claims. The recitation of “securely storing” would render the “non-public
`
`personal” recitation wholly redundant under Petitioner’s proposed construction.
`
`1.
`“non-public personal information” should be given
`patentable weight
`
`26. The Board construed the phrase “non-public personal information” as
`
`merely “information” in its institution decision based on the printed matter
`
`doctrine. Paper 10.
`
`27.
`
`I understand that under the printed matter doctrine, claim terms are
`
`given patentable weight (and therefore should be construed by the Board) when
`
`they have “a functional or structural relation” to the remaining aspects of the claim.
`
`28. The fact that the claimed information is “non-public personal”
`
`information has a functional and structural relationship to other claim terms,
`
`specifically the following elements that appear in each independent claim of the
`
`’783 Patent: (1) the “protocol for instructing the processor how to access the
`
`securely stored personal information via the network”; (2) the “end user data”; and
`
`(3) the “information providers securely storing the personal information.”
`
`
`
`8
`
`
`
`11
`
`

`
`
`
`29. The “protocol” limitation is functionally and structurally related to the
`
`fact that the information is “non-public personal information.” As I explain below,
`
`the protocol term should be construed as a “software script detailing the steps
`
`necessary for instructing the processor how to log in to a specific information
`
`provider as the end user, and return requested information via the network.” The
`
`nature of the information as “non-public” and “personal” is what necessitates that
`
`the protocol contain instructions for how to log in as an end user and return the
`
`requested information.
`
`30. Additionally, the claimed “end user data” is functionally and
`
`structurally related to the fact that the information is “non-public personal
`
`information.” The ’783 Patent explains that end user data is stored in a user store
`
`that contains “the verification and access data” necessary to authenticate to a
`
`website. Ex. 1001, ’783 Patent at 9:37-41.
`
`31. Finally, the “information providers securely storing the personal
`
`information” are functionally and structurally related to the fact that the claimed
`
`information is “non-public personal information.” The reason the claimed
`
`information is “securely stor[ed]” is because it is non-public personal information
`
`that should not be available to any user except the specific end user to whom the
`
`information relates.
`
`
`
`9
`
`
`
`12
`
`

`
`
`
`32. Petitioner’s expert Dr. Mowry appears to agree that the status of the
`
`information as “non-public personal” information is essential to the operation of
`
`the ’783 Patent claims. Specifically, Dr. Mowry stated that the fact that the
`
`information is non-public “affect[s] how the mechanism functions” – where the
`
`mechanism refers to the claim as a whole. Ex. 2005, Mowry Dep. at 47:13-48:24.
`
`Dr. Mowry also stated that the functionality of the claims is “motivated by” the
`
`fact that users have to log in to access the non-public personal information. Id. at
`
`48:25-49:8. Dr. Mowry also agreed that each of the specific limitations discussed
`
`above are motivated by the fact that the information is non-public personal
`
`information. Id. at 58:18-24 and 60:18-61:7 (“protocol” limitation); 59:4-14
`
`(“securely storing”); and 66:1-11 (“end user data”).
`
`33. Based on my own review of the ’783 Patent and Dr. Mowry’s
`
`apparent agreement, it is clear that one of ordinary skill in the art would find the
`
`term “non-public personal information” to have a functional and structural
`
`relationship to multiple elements of each independent claim of the ’783 Patent.
`
`B.
`
`“intermediary web site” (claims 14, 33)
`
`34. The ’783 Patent describes that an “intermediary web site” is a website
`
`interposed between the user’s computer and the PI engine. This is shown in Figure
`
`5, where the intermediary web site 510 is located separately from the user’s
`
`
`
`10
`
`
`
`13
`
`

`
`computer 220 and separately from the PI engine 240. The intermediary website is
`
`served by its own web servers, which communicate with the PI engine.
`
`
`
`
`
`This understanding is confirmed by the description of the intermediary web site in
`
`the specification. Ex. 1001 at 12:12-27
`
`35. The Board recognized this fundamental concept of the separation
`
`between the intermediary website and the user’s computer and the PI engine.
`
`Paper 10 at 10-11. However, the Board’s construction only requires separation
`
`from the “personal information store” of the claims, which is only one part of the
`
`PI engine. The PI engine of the ’783 patent includes multiple claimed elements,
`
`not just the “personal information store,” and thus the intermediary website should
`
`be separate from each of those claimed elements as well.
`
`
`
`11
`
`
`
`14
`
`

`
`
`
`36. The patent explains that the PI engine includes storage elements and
`
`processing components: “The PI engine 240 is composed of both storage and
`
`processing components.” Ex. 1001 at 4:53-54. The ’783 Patent identifies the
`
`storage elements: “The three primary storage components are the PI store 280, the
`
`PI Provider store 310 and the user store 360.” Id. at 4:54-56. And the ’783 Patent
`
`also identifies the processing components: “The four primary processing
`
`components access and manipulate the data in the three stores. . . . These four
`
`processing components are the Baseline configure component 320, the end user
`
`configure component 330, the PI access/transact component 340 and the PI
`
`delivery component 350 as seen in FIG. 3.” Id. at 6:13-21.
`
`37. Thus, the intermediary website should be served by a computer in a
`
`separate location from the entire PI engine, i.e., separate from the PI store, the PI
`
`provider store, and the user store (the storage elements) and separate from the
`
`Baseline configure component, the end user configure component, the PI
`
`access/transact component, and the PI delivery component (the processing
`
`components).
`
`38. These elements of the PI engine correspond to several claim elements.
`
`First, the PI store is the “personal information store” of each independent claim.
`
`Second, the “PI provider store” is claimed as a “provider store” in claim 20 and as
`
`“information provider data” in claims 1, 18, and 20. See Ex. 1001, ’783 Patent at
`
`
`
`12
`
`
`
`15
`
`

`
`
`
`3:22 (“a provider store including information provider data”). Third, the “user
`
`store” is claimed as a “user store” in claim 20 and as “end user data” in claims 1,
`
`18 and 20. See Ex. 1001, ’783 Patent at 3:21-22 (“a user store including end user
`
`data”). Finally, the access/transact component is performed by the “processor” in
`
`each of claims 1, 18, and 20, because the processor is “retrieving personal
`
`information for the selected end user.”
`
`39. The proper construction of the term “intermediary web site” would
`
`require it to be separate from all elements of the PI engine. Thus, one of ordinary
`
`skill in the art would conclude that Patent Owner’s proposed construction is
`
`proper: “a web site served from a location other than the end user’s computer and
`
`other than the ‘processor’ and all associated data/storage (including the ‘personal
`
`information store,’ ‘end user data,’ ‘user store,’ ‘information provider data,’ and
`
`‘provider store’).”
`
`40. Petitioner’s proposed construction, like the Board’s, includes only a
`
`part of the PI engine (the “processor”) and therefore also fails to provide an
`
`appropriate construction.
`
`C.
`“protocol for instructing the processor how to access the securely
`stored personal information via the network” (Claims 1, 18, and 20)
`
`41.
`
`I agree that Patent Owner’s proposed construction of this term as
`
`“software script detailing the steps necessary for instructing the processor how to
`
`
`
`13
`
`
`
`16
`
`

`
`
`
`log in to a specific information provider as the end user, and return requested
`
`information via the network” is proper.
`
`42. The ’783 Patent explains that the protocol instructs the processor on
`
`how to log in and access the securely stored PI from an information provider.
`
`Each information provider typically has a unique login protocol involving steps
`
`where a user navigates to the website, enters credentials such as username and
`
`password, and then submits them for verification by the website. Ex. 1001, ’783
`
`Patent at 2:12-18, 6:24-38.
`
`43. The protocol must do more than access the information provider,
`
`however. Access is only the first level, the second level is retrieving the specific
`
`information requested:
`
`These processes would be utilized at two levels: the first
`
`level being the set of data and steps required for general
`
`access to the particular PI provider and the second
`
`level being the set of additional data and steps
`
`required for accessing each particular piece of PI on
`
`the PI provider's site.
`
`Ex. 1001 at 6:24-38.
`
`44. The file history further confirms that the claimed protocol must do
`
`more than access the information provider: it must follow “whatever other protocol
`
`
`
`14
`
`
`
`17
`
`

`
`
`
`steps may be required to access and retrieve the personal information.” Ex. 1003
`
`at 168-169.
`
`45. The protocol is a software script detailing these steps to retrieve and
`
`access the non-public personal information. This is because a processor does not
`
`log in by visually studying a web browser or other application for input
`
`instructions, and because, in this invention, the processor, not a human, is logging
`
`in for access, so the processor must be specially equipped with a software script to
`
`interpret and communicate with a particular information provider website running
`
`forms, scripts, and applets. Ex. 1001 at 10:5-24.
`
`46. While Petitioner did not offer a construction of the protocol limitation,
`
`Petitioner’s expert did offer several relevant opinions at his deposition. First, Dr.
`
`Mowry agreed that the claimed protocol supplies a log in/password or
`
`authenticates as a user somehow. Ex. 2005, Mowry Dep. at 61:8-15. Dr. Mowry
`
`also agrees that the protocol is a software script. Id. at 70:24-71:1. Finally, Dr.
`
`Mowry agrees that the protocol must do more than authenticate, it must also know
`
`the steps necessary to actually access and retrieve the personal information. Id. at
`
`116:13-19. Each of these concepts is captured by Patent Owner’s proposed
`
`construction.
`
`47. Thus, one of ordinary skill in the art would conclude that the proper
`
`construction of the term “protocol for instructing the processor how to access the
`
`
`
`15
`
`
`
`18
`
`

`
`
`
`securely stored personal information via the network” is “software script detailing
`
`the steps necessary for instructing the processor how to log in to a specific
`
`information provider as the end user, and return requested information via the
`
`network.”
`
`III. THE INDEPENDENT CLAIMS OF THE ’783 PATENT ARE VALID
`
`48.
`
`I understand that to make a showing of obviousness, Petitioner must
`
`show that “the differences between the subject matter sought to be patented and the
`
`prior art are such that the subject matter as a whole would have been obvious at the
`
`time the invention was made to a person having ordinary skill in the art.” Global
`
`Tel*Link Corp. v. Securus Techs., Inc., IPR2014-00785, Paper 41 at 6 (PTAB Oct
`
`7, 2015) (citing KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 406 (2007)).
`
`Importantly, “all the claim limitations must be taught or suggested by the prior
`
`art.” Id. at 6-7 (emphasis added) (citing CFMT, Inc. v. Yieldup Int’l Corp., 349
`
`F.3d 1333, 1342 (Fed. Cir. 2003); In re Royka, 490 F.2d 981, 985 (CCPA 1974)).
`
`49. Petitioner has failed to show that all limitations of any of the ’783
`
`Patent claims are disclosed by Petitioner’s proposed combination of Sugiarto and
`
`Brandt. There are several limitations that are common to each of the independent
`
`claims that are not found in Sugiarto or Brandt. In particular, the following
`
`limitations are found in each independent claim of the ’783 Patent and are each
`
`missing from both Sugiarto and Brandt: “non-public personal information,”
`
`
`
`16
`
`
`
`19
`
`

`
`
`
`“protocol for instructing the processor how to access the securely stored personal
`
`information via the network,” “storing the retrieved personal information in [a/the]
`
`personal information store,” and the non-public personal information “also being
`
`accessible by the end user via the network independently of the system for
`
`delivering personal information.”
`
`50. Petitioner has also failed to show that all limitations of the ’783 Patent
`
`claims are disclosed by Petitioner’s proposed combination of Sugiarto and Brandt,
`
`regardless of whether “non-public personal information” is given patentable
`
`weight. Specifically, Sugiarto and Brandt fail to disclose the following limitations
`
`regardless of the construction of “non-public personal information:” “protocol for
`
`instructing the processor how to access the securely stored personal information
`
`via the network” and “storing the retrieved personal information in [a/the] personal
`
`information store.”
`
`51. Additionally, Petitioner’s proposed combination of Brandt and
`
`Sugiarto is deficient: Petitioner fails to provide any explanation of how to combine
`
`the two references, and the references themselves explicitly teach away from such
`
`a combination.
`
`
`
`17
`
`
`
`20
`
`

`
`
`
`A.
`Sugiarto and Brandt do not disclose the “protocol for instructing
`the processor how to access the securely stored personal information via
`the network”
`
`52. Neither Sugiarto nor Brandt discloses the “protocol for instructing the
`
`processor how to access the securely stored personal information via the network.”
`
`Sugiarto and Brandt fail to disclose this limitation regardless of whether “non-
`
`public personal information” is given patentable weight.
`
`53. As I explained above, this term should be construed as a “software
`
`script detailing the steps necessary for instructing the processor how to log in to a
`
`specific information provider as the end user, and return requested information via
`
`the network.” However, under any reasonable construction, it is clear that neither
`
`Sugiarto nor Brandt discloses the protocol claimed in the ’783 Patent.
`
`54. Sugiarto only discloses retrieving public information from public
`
`websites. See, e.g., Ex. 1004, Sugiarto at 4:12-53, Figs. 7-10. Sugiarto does not
`
`disclose any sort of authentication method for logging in as the end user, and thus
`
`does not disclose the claimed protocol.
`
`55. Petitioner’s expert agrees that Sugiarto does not disclose this
`
`limitation. Dr. Mowry agrees that Sugiarto does not disclose any non-public
`
`information. Ex. 2005, Mowry Dep. at 147:3-12. Dr. Mowry also admits that
`
`Sugiarto does not disclose any authentication method. Id. at 107:7-9 (“Q: You are
`
`
`
`18
`
`
`
`21
`
`

`
`
`
`not stating that Sugiarto discloses any sort of authentication mechanism? A:
`
`That’s correct”), 146:9-15.
`
`56. Brandt also fails to disclose the claimed “protocol.” There is no
`
`authentication script in Brandt – the user must manually input a password and log
`
`in to gain access to the software applications. The “protocol” limitation, however,
`
`requires a script detailing for the processor how to log in and return the requested
`
`information.1 Critically, this protocol (via the software script) enables the
`
`processor to automatically retrieve non-public personal information without
`
`requiring the user to manually request that information every time. This
`
`innovation precisely overcomes the problems of using a system like Brandt where
`
`a user is required to log in every single time they want to access an application.
`
`
`1 The requirement for a software script is also present in the district court
`
`construction of the “protocol” limitation. See Ex. 2006 at 23. Even Plaid’s
`
`proposed construction to the district court – while not using the term “software
`
`script” – requires the protocol to include “specific step-by-step” instructions
`
`directing “how to access the securely stored personal information via the network.”
`
`Ex. 2006 at 23. As Brandt is a completely manual system, even under the District
`
`Court’s construction or the Petitioners, Brandt cannot cure the deficiency of
`
`Sugiarto.
`
`
`
`19
`
`
`
`22
`
`

`
`
`
`57. Specifically, Brandt describes how it authenticates as a user in
`
`columns 11 and 12. In that section, Brandt explains that “a user at client
`
`workstation 210 performs an action that causes web browser 212 to request
`
`access to a software application via the WWW by inputting data to web server
`
`application 222. The input data may include an HTML form with input blanks
`
`used for entering appropriate authentication data.” Ex. 1005, Brandt at 11:52-57.
`
`Brandt goes on to explain that this authentication data includes “a userID, a
`
`password and a key.” Id. at 11:59-60.
`
`58. Brandt explains that it uses this user-provided authentication data to
`
`grant access to an application. The Brandt web server passes this user-input
`
`authentication data to the gateway to request access to a particular software
`
`application. Id. at 11:65-12:3. The gateway then compares the user-input
`
`authentication data to a user library to confirm that the user is authorized to access
`
`an application. Id. at 12:37-43. Only then does the Brandt system finally grant the
`
`user access to an application. Id. at 12:19-21.
`
`59. Petitioner’s expert confirmed that he shares the same understanding of
`
`Brandt at his deposition. Dr. Mowry agreed that Brandt discloses a manual login
`
`that requires the user to authenticate before the system grants access to an
`
`application:
`
`
`
`20
`
`
`
`23
`
`

`
`
`
`
`
`Ex. 2005, Mowry Dep. at 98:25-99:9. Dr. Mowry also could not identify any
`
`disclosure in Brandt of authenticating to an application without requiring some sort
`
`of user input. Id. at 111:23-112:12.
`
`60. Brandt also fails to disclose the claimed “protocol,” because Brandt
`
`does not disclose retrieving information of any kind, as I explain above. To the
`
`contrary, Brandt merely grants access to applications, and then the user can interact
`
`with the application through a standard GUI. See Ex. 1005, Brandt at 3:56-65.
`
`Petitioner’s expert also agrees that Brandt simply provides access to applications
`
`through a GUI that the user may choose to interact with in a number of different
`
`ways. Ex. 2005, Mowry Dep. at 131:5-16.
`
`61. One of ordinary skill in the art would therefore conclude that neither
`
`Sugiarto nor Brandt discloses a “protocol for instructing the processor how to
`
`access the securely stored personal information via the network.”
`
`
`
`21
`
`
`
`24
`
`

`
`
`
`B.
`Sugiarto and Brandt do not disclose “storing the retrieved
`personal information in [a/the] personal information store”
`
`62. Neither Sugiarto nor Brandt discloses “storing the retrieved personal
`
`information in [a/the] personal information store,” a term that appears in each
`
`independent claim of the ’783 Patent.
`
`63. Sugiarto does not disclose storing information. Sugiarto only
`
`discloses retrieving information from public websites and forwarding that
`
`information along to a user:
`
`Depending on the information contained in the user's
`
`configuration file, the uploaded module opens the
`
`appropriate HTTP connection, fetches the
`
`appropriate web pages from the internet, and selects
`
`the appropriate predefined portions therefrom, and
`
`formats them into a single page in a predefined user
`
`format in accordance with the configuration file that is
`
`viewable on display screen 10 of handset 6. Finally, this
`
`formatted page is transmitted to handset 6 for
`
`viewing by the user, and the uploaded module notifies
`
`the HTTP daemon that the request has been honored.
`
`Ex. 1004, Sugiarto at 8:61-9:4. Sugiarto never discloses any storage, simply that
`
`the information is retrieved, formatted, and then presented to the user.
`
`
`
`22
`
`
`
`25
`
`

`
`
`
`64. Sugiarto also never discusses retrieving the type of

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket