`_________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_________________________
`
`
`
`
`
`
`
`PLAID TECHNOLOGIES, INC.
`Petitioner
`
`v.
`
`YODLEE, INC.
`Patent Owner
`_________________________
`
`Case No. IPR2015-______
`Patent 6,317,783
`_________________________
`
`PETITION FOR INTER PARTES REVIEW OF
`U.S. PATENT NO. 6,317,783
`
`Mail Stop Patent Board
`Patent Trial and Appeal Board
`U.S. Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`
`
`
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`
`TABLE OF CONTENTS
`
`TABLE OF AUTHORITIES .................................................................................. I
`EXHIBIT LIST ....................................................................................................... II
`I.
`INTRODUCTION AND RELIEF REQUESTED ...................................... 1
`II. GROUNDS FOR STANDING ...................................................................... 1
`III. MANDATORY NOTICES ........................................................................... 1
`IV. BACKGROUND ............................................................................................ 2
`A.
`DESCRIPTION OF THE ’783 PATENT ......................................................... 2
`B.
`PROSECUTION HISTORY .......................................................................... 4
`C.
`STATE OF THE ART ................................................................................. 7
`
`V.
`
`A.
`B.
`
`PROPOSED GROUNDS OF UNPATENTABILITY ................................ 8
`SUMMARY OF GROUNDS OF REJECTION .................................................. 9
`PRIOR ART OFFERED FOR THE PRESENT UNPATENTABILITY
`CHALLENGES .......................................................................................... 9
`
`VI. CLAIM CONSTRUCTION ........................................................................ 10
`A.
`PROPOSED CLAIM CONSTRUCTIONS ..................................................... 11
`“non-public” (Claims 1, 18, 20) ......................................................... 11
`“intermediary web site” (Claims 14, 33) ............................................ 12
`
`1.
`2.
`
`A.
`
`VII. THE PRIOR ART RENDERS OBVIOUS CLAIMS 1–36 OF THE ’783
`PATENT ....................................................................................................... 13
`GROUND 1: CLAIMS 1, 3–20, AND 22–36 ARE RENDERED OBVIOUS BY
`SUGIARTO IN VIEW OF BRANDT. ........................................................... 13
`Sugiarto ............................................................................................... 14
`Brandt .................................................................................................. 17
`The Proposed Combination of Sugiarto and Brandt .......................... 20
`
`1.
`2.
`3.
`
`
`
`
`
`
`
`4.
`5.
`6.
`7.
`8.
`9.
`10.
`
`B.
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`Sugiarto and Brandt render Independent Claim 1 Obvious. .............. 27
`Dependent Claim 3. ............................................................................. 41
`Dependent Claims 4 and 5. ................................................................. 42
`Dependent Claims 6–12 and 14–17 .................................................... 44
`Dependent Claim 13 ............................................................................ 49
`Independent Claim 18 and Dependent Claim 19. ............................... 50
`Independent claim 20 and Dependent Claims 22–36 ......................... 51
`GROUND 2: CLAIMS 2 AND 21 ARE RENDERED OBVIOUS BY SUGIARTO
`IN VIEW OF BRANDT IN FURTHER VIEW OF CHOW. ................................ 56
`
`VIII. CONCLUSION ............................................................................................ 60
`
`
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`
`TABLE OF AUTHORITIES
`
`Cases
`In re American Academy of Science Tech Center, 367 F.3d 1359, 1364, 1369 (Fed.
`Cir. 2004) ....................................................................................................... 10
`
`In re Cuozzo Speed Techs., LLC., 793 F.3d 1268, 1278–79 (Fed. Cir. 2015) ......... 10
`
`InTouch Techs., Inc. v. VGO Commc’n, Inc., 751 F.3d 1327, 1347 (Fed. Cir. 2014)
` ....................................................................................................................... 14
`
`Statutes
`
`35 U.S.C. § 102(e) .............................................................................................. 9, 10
`
`35 U.S.C. § 103 .......................................................................................................... 9
`
`Rules
`
`37 C.F.R. § 42.10(b) .................................................................................................. 2
`
`37 C.F.R. § 42.100(b) .............................................................................................. 10
`
`
`
`
`
`i
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`
`EXHIBIT LIST
`
`
`Exhibit Number
`1001
`1002
`
`1003
`1004
`1005
`1006
`1007
`
`1008
`1009
`1010
`1011
`1012
`1013
`
`Document
`U.S. Patent No. 6,317,783 (“the ’783 Patent”)
`Summons Returned as Executed, Yodlee, Inc. v. Plaid Techs.
`Inc., Case No. 14-cv-01445 (D. Del. filed Dec. 1, 2014)
`File History of the ’783 Patent
`U.S. Patent No. 6,278,449 to Sugiarto (“Sugiarto”)
`U.S. Patent No. 5,892,905 to Brandt et al. (“Brandt”)
`U.S. Patent No. 6,029,175 to Chow et al. (“Chow”)
`Claim Construction Briefing in Yodlee, Inc. v. Plaid Techs.
`Inc., Case No. 14-cv-01445 (D. Del. 2014)
`Declaration of Dr. Todd Mowry (“Mowry Decl.”)
`U.S. Patent No. 6,401,118 to Jason B. Thomas
`U.S. Patent No. 6,006,333 to Jakob Nielsen
`Screenshots regarding ESPN Insider
`U.S. Patent No. 6,041,362 to Mears et al.
`U.S. Patent No. 6,243,816 to Fang et al.
`
`ii
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`
`I.
`
`INTRODUCTION AND RELIEF REQUESTED
`
`Plaid Technologies, Inc. (“Petitioner”) hereby petitions for institution of
`
`inter partes review of U.S. Patent No. 6,317,783 (“the ’783 Patent”) (Ex. 1001).
`
`The ’783 Patent issued on November 13, 2001, and is presently assigned to
`
`Yodlee, Inc. (“Patent Owner”). Petitioner respectfully requests cancellation of
`
`claims 1–36 of the ’783 Patent based on the grounds of unpatentability detailed
`
`herein. The prior art and other evidence offered with this Petition establishes that
`
`all elements in the challenged claims of the ’783 Patent were well known as of the
`
`earliest alleged priority date, and that the claimed methods and systems recited in
`
`the ’783 Patent are obvious.
`
`II. GROUNDS FOR STANDING
`Petitioner certifies that the ’783 Patent is available for review under
`
`35 U.S.C. § 311(c) and that it is not estopped from requesting an inter partes
`
`review challenging claims 1–36 on the grounds identified in this Petition.
`
`III. MANDATORY NOTICES
`Real Party in Interest: Petitioner Plaid Technologies, Inc. is the real party-in-
`
`interest for this Petition.
`
`Related Matters: Petitioner has been charged with infringement of the ’783
`
`Patent in the parallel litigation styled Yodlee, Inc. v. Plaid Techs. Inc., Case No.
`
`14-cv-01445 (D. Del.), filed December 1, 2014 (“Co-Pending District Court
`
`Action”). Petitioner was served with the complaint in that litigation on December
`
`1
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`2, 2014. Ex. 1002. A petition for Inter Partes Review of another asserted patent,
`
`U.S. Patent No. 6,199,077, is to be filed contemporaneously with this petition.
`
`Designation of Counsel: Petitioner designates the following Lead and Back-
`
`up Counsel. Concurrently filed with this Petition is a Power of Attorney per 37
`
`C.F.R. § 42.10(b). Service via hand-delivery may be made at the postal mailing
`
`address below. Petitioner consents to electronic service by e-mail.
`
`Lead Counsel
`Brian Buroker (Reg. No. 39,125)
`Gibson, Dunn & Crutcher LLP
`1050 Connecticut Avenue, N.W.
`Washington, D.C. 20036-5306
`202.955.8541
`bburoker@gibsondunn.com
`
`IV. BACKGROUND
`
`A. Description of the ’783 Patent
`
`Back-Up Counsel
`Omar Amin (Reg. No. 60,885)
`Gibson, Dunn & Crutcher LLP
`1050 Connecticut Avenue, N.W.
`Washington, D.C. 20036-5306
`202.887.3710
`oamin@gibsondunn.com
`
`The ’783 Patent relates to “an apparatus and process for automated
`
`aggregation and delivery of electronic personal information or data (PI).” ’783
`
`Patent, Ex. 1001, 1:23–26. Fig. 2, reproduced below, provides a visual of the basic
`
`elements/components used to implement the alleged invention. The specification
`
`discloses a system for delivering personal information (PI) that may include “a
`
`user store including end user data, a provider store including information provider
`
`data, a personal information store including personal information and a processor
`
`that communicates with these data stores.” Id., 3:20–24. The processor
`
`2
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`“retrieve[s] personal information for the selected end user from the connected
`
`information providers.” Id., 3:28–31.
`
`
`
`Ex. 1001, Fig. 2. As seen in Fig. 2, according to the ’783 Patent, the end user 210
`
`accesses a client computer 220 that connects to the Internet 230 to access a PI
`
`engine 240 running on a PI host 290. Id., 4:29–34. The PI engine 240, shown in
`
`more detail in Fig. 3 above, examines stored PI 280 and refreshes it by directly
`
`reacquiring the PI from the particular information provider’s Web site 250 running
`
`on the provider’s computer system 260. Id., 4:34–38. The PI Engine includes a
`
`“PI access/transact component,” which “supports the update, acquisition and
`
`transaction functionality of the PI engine.” Id., 9:30–32. “For each piece of PI
`
`requiring access or update,” the PI access/transact component “looks up the access
`
`procedure and information needed for the particular PI in the Provider store” as
`
`3
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`
`well as “verification and access data,” which is found in the user store. Id., 9:38–
`
`41. “A simulated Web client could perform access or transaction processes
`
`automatically supplying access and verification data as necessary.” Id., 9:59–61.
`
`The PI engine 240 further stores the aggregated PI in its store 280 and delivers the
`
`PI to a selected destination, for example across the Internet 230 to the client
`
`computer 220 which displays the information to the end user 210 using the client
`
`software 270. Id., 4:39–46. At bottom, the ’783 Patent is directed toward
`
`retrieving and storing personal information from multiple sources.
`
`B. Prosecution History
`The ’783 Patent issued from U.S. Application No. 09/428,511 (“the ’511
`
`Application”), which was filed on October 27, 1999 with claims 1–28. ’783 Patent
`
`File History, Ex. 1003, 32. The ’511 Application claimed the benefit of
`
`Provisional Application Nos. 60/105,917 and 60/134,395, filed October 28, 1998
`
`and May 17, 1999, respectively. Id., 35. In October 2000, the PTO issued an
`
`Office Action in the ’511 Application, rejecting all of pending claims 1–28. Id.,
`
`184. Specifically, claims 1–28 were rejected under nonstatutory, obviousness-type
`
`double patenting over then-pending Application No. 09/427,602 (“the ’602
`
`Application”) and under 35 U.S.C. § 103(a) as being obvious over U.S. Patent No.
`
`5,995,965 to Experton (“Experton”), in view of U.S. Patent No. 5,862,325 to Reed
`
`et al., (“Reed”). Id., 149–53.
`
`4
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`The Applicant filed a Reply to the Office Action, which included a Terminal
`
`Disclaimer over the ’602 Application to overcome the double patenting rejection,
`
`and added claims 29–36. Id., 168. The Reply also included amendments to then-
`
`pending independent claims 1, 14, and 27 to overcome the obviousness rejection.
`
`For example, the Applicant amended independent claim 14 (which was
`
`renumbered as claim 1 in the ’783 Patent) as follows:
`
`14. (Once amended) A method for delivering non-public
`personal information relating to an end user via a computer network to
`[at least one] an end user from at least one of a plurality of
`information providers securely storing the personal information, the
`method comprising the steps of:
`
`(a) the processor connecting with at least one information
`provider;
`(b) for a selected end user, the processor retrieving
`
`personal information for the selected end user from the connected at
`least one information provider based on end user data associated with
`the selected end user and information provider data associated with
`the connected one or more information providers, the end user data
`including
`information
`identifying
`the plurality of
`information
`providers securely storing the personal information relating to the end
`user the provider data Including a protocol for instructing the
`processor how to access the securely stored personal information via
`the network. the information accessible to the processor using the
`protocol also being accessible by the end user via the network
`independently of the system for delivering personal information; and
`
`5
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`
`retrieved personal
`the
`the processor storing
`(c)
`
`information in a personal information store for access by the selected
`end user.
`
`Id., 165. The Applicant amended then-pending independent claims 1 and 27 in a
`
`similar manner. Id., 164–66. In its Remarks, the Applicant argued that, as
`
`amended, then-pending claims 1, 14, and 27 were patentable over Experton and
`
`Reed because, “[i]n Applicant’s invention, the information providers are those that
`
`an end user could alternatively choose to access in a conventional manner, i.e.,
`
`independently of using the inventive system. . . . Neither Experton nor Reed
`
`addresses the issue of making access to multiple ones of such personal information
`
`providers more convenient by obviating a user contacting each provider
`
`individually.” Id., 169 (italics removed). Thereafter, the Examiner allowed the
`
`’511 Application, concluding that prior art of record did not disclose or render
`
`obvious “an end user data including identifying the plurality of information
`
`providers securely storing the personal information relating to the end user, the
`
`provider data including a protocol for instructing the processor how to access
`
`the securely stored personal information.” Id., 175 (bolding in the original). But
`
`as described below, the concept that the Examiner found to be novel and non-
`
`obvious—automatic authentication and gathering—was well-known by the priority
`
`date of the ’783 Patent.
`
`6
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`
`C. State of the Art
`With the proliferation of content on the World Wide Web (“Web” or
`
`“WWW”) in the early-to-mid 1990s, software solutions that allowed for automatic
`
`aggregation of data on the Web had become well known to those of ordinary skill
`
`in the art by the priority date of the ’783 Patent. U.S. Patent No. 6,278,449 to
`
`Sugiarto (“Sugiarto”) (Ex. 1004) describes an apparatus which “collect[s]
`
`information from various web pages from the worldwide web internet, configure[s]
`
`this various information in accordance with a predefined user configuration file,
`
`defined by a particular user, and transmit[s] the configured various information to a
`
`highly portable internet access device.” Sugiarto, Ex. 1004, 2:10–17. Sugiarto
`
`teaches a system that provides a user with a customized Web page that includes
`
`data sourced from one or more Web sites of the user’s choosing, e.g., CNN, ESPN,
`
`and/or Nasdaq. Id., 4:36–53.
`
`Those of ordinary skill in the art further recognized that much of the
`
`personal information available on the WWW is only accessible after the user has
`
`been authenticated, e.g., by providing his or her credentials (username and
`
`password). To automate this process, skilled artisans developed software agents,
`
`also termed Internet gateways or simulated web clients, which simulated the user
`
`providing his or her credentials. For example, U.S. Patent No. 5,892,905 to Brandt
`
`et al. (“Brandt”) (Ex. 1005) describes “the capability to easily access many
`
`7
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`
`different application programs over the WWW via a standardized [graphical user
`
`interface].” Brandt, Ex 1005, 3:57–60. In Brandt, an Internet gateway accesses a
`
`user library to obtain authentication data needed to access software applications for
`
`the user. Id., 12:15–17. The Internet gateway then logs the user onto a requested
`
`service using normal security procedures. Id., 12:28–28.
`
`Skilled artisans also recognized that in the Web’s client-server model, end
`
`users often could not find out if server information changed. To address this
`
`problem within the existing client-server architecture, U.S. Patent No. 6,029,175 to
`
`Chow et al. (“Chow”) (Ex. 1006) describes a software agent, termed a “Revision
`
`Manager,” to monitors content at a server. Chow, Ex. 1006, 3:60–64. The
`
`Revision Manager accepts user input indicating the user’s interest in monitoring a
`
`document. Id., 5:32–34. In response, the Revision Manager “spontaneously
`
`monitors the server to notice if the document has been modified.” Id., 6:2–4.
`
`V.
`
`PROPOSED GROUNDS OF UNPATENTABILITY
`
`The present Petition relies on prior art references that have not been
`
`considered by the Patent Office in the file history of the ’783 Patent and details
`
`how the challenged claims are obvious in view of the prior art.1 These references
`
`1 None of these references were cited by the Examiner during prosecution of the
`
`’783 Patent. The Applicant cited Chow to the USPTO, but the Examiner did not
`
`rely on Chow in a rejection.
`
`8
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`evidence the well-known combination of known elements to teach all of the
`
`limitations recited by the claims of the ’783 Patent.
`
`A. Summary of Grounds of Rejection
`The following chart demonstrates the grounds of rejection and the prior art
`
`references applied against the challenged claims.
`
`Ground 1:
`
`Ground 2:
`
`§103 in view of Sugiarto
`combined with Brandt
`§ 103 in view of Sugiarto
`combined with Brandt in
`further view of Chow
`
`Renders Claims 1, 3–20, and 22–
`36 obvious under §103(a)
`Renders Claims 2 and 21 obvious
`under §103(a)
`
`
`With the present grounds of obviousness and the evidence submitted herein,
`
`Petitioner has established a reasonable likelihood that it will prevail in establishing
`
`unpatentability of claims 1–36 and requests institution of inter partes review and
`
`cancellation of these claims.
`
`B. Prior Art Offered for the Present Unpatentability Challenges
`The present Petition states obviousness grounds under 35 U.S.C. § 103 using
`
`the following patents:
`
`• U.S. Patent No. 6,287,449 to Sugiarto et al. (“Sugiarto”) (Ex. 1004) was filed
`
`on September 3, 1998; this reference is prior art at least under pre-AIA 35
`
`U.S.C. § 102(e) (the ’783 Patent’s earliest claimed priority date is October 28,
`
`1998).
`
`• U.S. Patent No. 5,892,905 to Brandt et al. (“Brandt”) (Ex. 1005) was filed on
`
`9
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`December 23, 1996; this reference is prior art at least under pre-AIA 35 U.S.C.
`
`§ 102(e).
`
`• U.S. Patent No. 6,029,175 to Chow et al. (“Chow”) (Ex. 1006) was filed on
`
`June 6, 1996; this reference is prior art at least under pre-AIA 35 U.S.C. §
`
`102(e).
`
`VI. CLAIM CONSTRUCTION
`Under 37 C.F.R. § 42.100(b), a claim in inter partes review is given the
`
`“broadest reasonable construction” in light of the specification. In re Cuozzo
`
`Speed Techs., LLC., 793 F.3d 1268, 1278–79 (Fed. Cir. 2015). Because the
`
`standard for claim construction at the Patent Office is different (i.e., broader) from
`
`that used in a U.S. district court litigation, see In re American Academy of Science
`
`Tech Center, 367 F.3d 1359, 1364, 1369 (Fed. Cir. 2004), Petitioner expressly
`
`reserves the right to argue a different claim construction in the district court
`
`proceeding for any term of the ’783 Patent, as appropriate.
`
`Petitioner requests that the Board give all claim terms not specifically
`
`construed herein their broadest reasonable construction. Nonetheless, Patent
`
`Owner and Petitioner have submitted claim construction briefing in the Co-
`
`Pending District Court Action.2 See Petitioner’s Opening Claim Construction Br.
`
`2 The Court has not yet entered an order construing the claims in the Co-Pending
`
`District Court Action.
`
`10
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`(“Claim Construction Br.”) (Ex. 1007) (providing a listing of constructions
`
`proposed by Petitioner and Patent Owner). Petitioner contends that many of these
`
`terms do not require specific construction in this proceeding; nevertheless, out of
`
`an abundance of caution, Petitioner explains below how the proposed grounds
`
`render the claims obvious under either Patent Owner’s or Petitioner’s proposed
`
`construction from the Co-Pending District Court Action.
`
`A. Proposed Claim Constructions
`1.
`“non-public” (Claims 1, 18, 20)
`
`The term “non-public” only appears in the claims of the ’783 Patent, not in
`
`the written description. During prosecution of the ’511 Application, however,
`
`when the Applicant added this term to the claims, the Applicant explained
`
`“personal information” (which the term “non-public” modifies) as follows:
`
`The essence of personal information is that it is not accessible to the
`general public, i.e., other end users; rather, each information provider
`protects personal information relating to a specific end user against
`access by persons other than that end user or one acting under the
`authority of that end user. The information providers have Web sites
`or other electronic means by which end users can access their personal
`information in the conventional manner, i.e., independently of the
`invention, such as by logging onto a Web site, entering a user name
`and password and following any further instructions for retrieving the
`information.
`
`11
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`
`’783 File History, Ex. 1002, 168 (emphases added). The Applicant thus made
`
`clear that under the broadest reasonable interpretation, the “non-public”
`
`information recited in the ’783 Patent claims covers information secured by Web
`
`sites that require user log on (e.g., with a user name and password).
`
`2.
`
`“intermediary web site” (Claims 14, 33)
`
`The ’783 Patent describes storing retrieved personal information in a
`
`personal information (PI) store 280. ’783 Patent, Ex. 1001, 4:57–60. PI delivery
`
`component is responsible for formatting and delivering the PI to the end user. ’783
`
`Patent, Ex 1001, 11:66–67; Ex. 1008. The PI may be delivered from PI store 280
`
`to one or more “destinations,” e.g., facsimile, telephone, pager, Web browser, or
`
`email (see claim 6–8). ’783 Patent, Ex. 1001, 12:2–3. For example, when the
`
`destination is a Web browser, the PI may be formatted as an HTML page. ’783
`
`Patent, Ex. 1001, 12:8–11. The delivered page may be dynamically formatted
`
`using, e.g., a dynamic HTML generation system. ’783 Patent, Ex. 1001, 12:19–31.
`
`The dynamic generation of the web page may be based on factors received from,
`
`e.g., information providers, distributors, the end user, the PI delivery component,
`
`or any combination thereof. ’783 Patent, Ex. 1001, 12:32–36.
`
`The PI may also be accessed via “an intermediary web site” (see claim 14).
`
`’783 Patent, Ex. 1001, 12:12–13. The ’783 Patent mainly describes intermediary
`
`websites as being themselves information providers. See ’783 Patent, Ex. 1001,
`
`12
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`12:17–21. Thus, these Web sites are “intermediaries” between the end user and the
`
`personal information engine, i.e., the Web sites are served by Web servers are not
`
`running on the end user’s computer or on the computer running the personal
`
`information engine. The ’783 Patent, however, expressly states that “the
`
`intermediary” is not required to be an information provider. ’783 Patent, Ex. 1001,
`
`12:25–28. Thus, Petitioner submits that the broadest reasonable construction of
`
`“intermediary web site,” in view of the ’783 Patent, is a Web site that is served by
`
`a Web server running on a computer that is not the end user’s computer and is not
`
`the “processor.” Ex. 1008, Mowry Decl., ¶ 59.
`
`VII. THE PRIOR ART RENDERS OBVIOUS CLAIMS 1–36 OF THE ’783
`PATENT
`
`The discussion and claim charts below identify each challenged claim and
`
`where the prior art teaches or suggests each portion of the claim, as well as where
`
`each portion of the claim is further analyzed in the Declaration of Dr. Todd
`
`Mowry, Ex. 1008, and why a person of ordinary skill would be motivated to
`
`modify the base reference as outlined in the obviousness combination.
`
`A. Ground 1: Claims 1, 3–20, and 22–36 are Rendered Obvious by
`Sugiarto in view of Brandt.
`
`As explained below, one of ordinary skill in the art would have been
`
`motivated to combine Sugiarto and Brandt in a manner that teaches all of the
`
`limitations of claims 1, 3–20, and 22–36 and would have had a reasonable
`
`13
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`
`expectation of doing so. Accordingly, Sugiarto and Brandt render claims 1, 3–20,
`
`and 22–36 obvious. InTouch Techs., Inc. v. VGO Commc’n, Inc., 751 F.3d 1327,
`
`1347 (Fed. Cir. 2014).
`
`1.
`
`Sugiarto
`
`Sugiarto describes an apparatus that “collect[s] information from various
`
`web pages from the worldwide web internet, configure[s] this various information
`
`in accordance with a predefined user configuration file, defined by a particular
`
`user, and transmit[s] the configured various information to a highly portable
`
`internet access device.” Sugiarto, Ex. 1004, 2:10–17. An annotated version of Fig.
`
`1 of Sugiarto is provided below. The annotations in blue illustrate Petitioner’s
`
`proposed modification of Sugiarto in view of Brandt, and the annotations in red
`
`illustrate Petitioner’s mapping of the ’783 claims onto the proposed combination.
`
`14
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`
`“End user”
`
`Application Gateway
`“Processor”
`
`“Wide-area
`computer network”
`
`Provider
`Store
`Personal Info.
`Store
`
`“User store”
`
`Secure
`Content
`Provider
`
`Secure
`Content
`Provider
`
`“Information
`providers”
`
`
`
`As shown in Fig. 1 of Sugiarto, the system includes a user access device 6, a
`
`system server 2, a database server 8, a network 4, and a desktop computer system
`
`9. Sugiarto, Ex 1004, 3:13–24. Network 4 may be the Internet or, in particular,
`
`the “world-wide-web aspect of the internet.” Sugiarto, Ex. 1004, 3:47–52. As
`
`shown above, desktop computer 9 is coupled to system server 2 through network 4.
`
`See also Sugiarto, Ex. 1004, 3:22–24.
`
`Software modules 14–20 run on system server 2. Sugiarto, Ex. 1004, 3:58–
`
`60. Software module 20 is an HTTP daemon, which “runs in the background” and
`
`facilitates “access to HTTP facilities.” Sugiarto, Ex. 1004, 3:62–65. Modules 14,
`
`16, and 18 are content gathering modules that service requests for information
`
`15
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`
`from an end user. Sugiarto, Ex. 1004, 3:65–66. For example, modules 14, 16, and
`
`18 may be implemented as a web browser that navigates to web pages. Sugiarto,
`
`Ex. 1004, 8:58–61. When system server 2 receives a request for content, HTTP
`
`daemon module 20 invokes one or more of modules 14, 16, and 18 to honor the
`
`request. Sugiarto, Ex. 1004, 3:65–4:2. For example, modules 14, 16, and 18 may
`
`retrieve data from respective websites over network 4, such as websites maintained
`
`by CNN, ESPN, or NASDAQ. Sugiarto, Ex. 1004, 4:18–24.
`
`Database server 8 stores configuration files of the end user. Sugiarto, Ex.
`
`1004, 3:41–44. Each of the configuration files “specifies what information the
`
`user would like to retrieve and how the retrieved information is to be formatted.”
`
`Sugiarto, Ex. 1004, 4:18–20.
`
`A user initiates a request for a personalized webpage by making a specific
`
`type of HTTP request (e.g., the request may be HTTP://access.domain/pir, with
`
`“pir” standing for “personal information request”). Sugiarto, Ex. 1004, 8:34–36,
`
`8:40–43. Sugiarto explicitly states that this request can come from user access
`
`device 6 or desktop computer 9. Sugiarto, Ex. 1004, 8:34–36. “Depending on the
`
`information contained in the user’s configuration file, the uploaded module opens
`
`the appropriate HTTP connection, fetches the appropriate web pages from the
`
`internet, and selects the appropriate predefined portions therefrom, and formats
`
`them into a single page in a predefined user format in accordance with the
`
`16
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`
`configuration file that is viewable on display screen 10 of handset 6.” Sugiarto,
`
`Ex. 1004, 8:61–9:1. Fig. 7 of Sugiarto, provided below, shows an example of such
`
`single page, i.e., a personalized web page. As shown below, the personalized web
`
`page displays information retrieved from the CNN (portion 742), ESPN (portion
`
`744), and NASDAQ (portion 746) websites. Sugiarto, Ex. 1004, 4:36–53.
`
`2.
`
`Brandt
`
`
`
`Brandt describes a system that “provides the capability to easily access many
`
`different application programs over the WWW via a standardized GUI.” Brandt,
`
`Ex. 1005, 3:56–60. Fig. 3 of Brandt, provided below, shows “a block diagram of a
`
`system . . . that allows access to a software application of the World-Wide Web
`
`from a standard web browser.” Brandt, Ex. 1005, 4:30–33. As shown below, the
`
`system includes a client workstation 210, a web server computer system 220, and
`
`17
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`computer systems 330 and 340. The connections between client workstation 210,
`
`server workstation 220, and computer systems 330 and 340 may be via the
`
`Internet. Brandt, Ex. 1005, 22:11–16. As seen in Fig. 3, below, an end user uses
`
`web browser 212, running on client workstation 210, to interact with web server
`
`application 222, running on web server computer system 220, by transmitting a
`
`Uniform Resource Locator (URL) or HTML page over connection 216 using the
`
`Hypertext Transfer Protocol (HTTP). Brandt, Ex. 1005, 6:35–39.
`
`
`
`Moreover, Internet/Application Gateway 332 (“Application Gateway 332”)
`
`provides for access to software applications 342. See Brandt, Ex. 1005, 9:22–26.
`
`As further shown in Fig. 6 of Brandt, provided below, Application Gateway 332
`
`facilitates user access by automatically authenticating the user for access to a
`
`specific software application 342. The automatic authentication process begins
`
`with an end user requesting access to a software application via Web browser 212
`
`(step 621). Brandt, Ex. 1005, 11:51–55. In doing so, the end user provides a
`
`18
`
`
`
`
`
`Petition for Inter Partes Review of US Patent No. 6,317,783
`
`userID, password, and key to Web server application 222, which controls access to
`
`application gateway 332. Brandt, Ex. 1005, 11:55–63. Web server application 222
`
`authenticates the user (step 623) and passes the user’s userID, password, key, and
`
`request content to application gateway 332 (step 625). Brandt, Ex. 1005, 11:65–
`
`12:3. Application Gateway 332 compares the received userID and key to userIDs
`
`and keys stored in user library 620, which “stores the user information for a
`
`plurality of software applications that are to be accessed through gateway 332”
`
`(step 627). Brandt, Ex. 1005, 12:5–7. Application Gateway 332 retrieves
`
`authentication data for the specific software application 324 from which the user
`
`requested information (step 629). Brandt, Ex. 1005, 12:15–19. Application
`
`Gateway 332 uses the retrieved authentication information to log into software
`
`application 342 on the user’s behalf just as the user would log in if he or she was
`
`attempting to log in to the software application