throbber
IPR2016-01156
`Petitioner’s Reply
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`FACEBOOK, INC.
`Petitioner
`
`v.
`
`WINDY CITY INNOVATIONS, LLC
`Patent Owner.
`
`
`Case IPR2016-01156
`Patent 8,458,245
`
`
`PETITIONER’S REPLY
`
`
`
`
`
`
`
`
`

`

`TABLE OF CONTENTS
`
`
`Page
`
`
`I.
`
`II.
`
`CLAIM CONSTRUCTION ........................................................................... 1
`A.
`“Censorship” ........................................................................................ 3
`B.
`“Database” ............................................................................................ 3
`1.
`Patent Owner’s Construction Lacks Intrinsic Support .............. 3
`2.
`Patent Owner’s Extrinsic Evidence Fails ................................... 6
`CLAIMS 1-15, 17, AND 18 ARE UNPATENTABLE ................................. 7
`A.
`“Internet” .............................................................................................. 7
`1.
`Dr. Metcalfe’s Inaccurate Prediction of Internet Collapse ........ 8
`2.
`The Existence of IDSN and ATM Would Not Have
`Discouraged Use of the Internet As Disclosed in Vetter ........... 9
`“Database” .......................................................................................... 10
`1.
`The Patent Owner’s Speculative “Hash Function”
`Argument ................................................................................. 10
`Roseman and Rissanen Are Properly Combinable .................. 12
`Roseman + Rissanen Disclose A “Database” Even Under
`The Patent Owner’s Erroneous Construction .......................... 14
`The Patent Owner’s “Tokens” Arguments Fail ................................. 14
`“Other Programs to Access” .............................................................. 17
`1.
`Conference Rooms in Roseman Are Separate Programs ........ 17
`2.
`Programs on Participator Computers ....................................... 19
`“Censorship” ...................................................................................... 19
`“Pointer-Triggered Private Message” ................................................ 21
`“Internally Determines Whether or Not the Second of the
`Participator Computers Can Present the Communication” ................ 22
`“Login Username and Password” (Independent Claim 7) ................. 23
`H.
`III. CONCLUSION ............................................................................................. 25
`
`
`
`2.
`3.
`
`B.
`
`C.
`D.
`
`E.
`F.
`G.
`
`
`
`
`
`-i-
`
`
`
`

`

`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`
`
`Allied Erecting and Dismantling Co., Inc. v. Genesis Attachments,
`LLC,
`825 F.3d 1373 (Fed. Cir. 2016) .......................................................................... 12
`Biogen, Inc. v. Berlex Labs., Inc.,
`318 F.3d 1132 (Fed. Cir. 2003) ............................................................................ 5
`Clare v. Chrysler Group LLC,
`819 F.3d 1323 (Fed. Cir. 2016) ............................................................................ 5
`Egyptian Goddess, Inc. v. Swisa, Inc.,
`543 F.3d 665 (Fed. Cir. 2008) (en banc) .............................................................. 5
`In re Etter,
`756 F.2d 852 (Fed. Cir. 1985) (en banc) ............................................................ 13
`In re Fulton,
`391 F.3d 1195 (Fed. Cir. 2004) ............................................................................ 9
`In re Google Litigation,
`2011 WL 8603085 (N.D. Cal. 2011) ................................................................ 5, 6
`In re Keller,
`642 F.2d 413 (C.C.P.A. 1981) ............................................................................ 13
`In re Merck & Co., Inc.,
`800 F.2d 1091 (Fed. Cir. 1986) .................................................................... 11, 20
`In re Mouttet,
`686 F.3d 1322 (Fed. Cir. 2012) .......................................................................... 13
`Moleculon Research Corp. v. CBS, Inc,
`793 F.2d 1261 (Fed. Cir. 1986) ............................................................................ 5
`PAR Pharm., Inc. v. TWI Pharm., Inc.,
`773 F.3d 1186 (Fed. Cir. 2014) ............................................................................ 9
`
`
`
`
`
`-ii-
`
`
`
`

`

`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ............................................................ 1
`Statutes
`35 U.S.C. § 103 ........................................................................................................ 25
`
`
`
`
`
`
`
`
`
`
`-iii-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`
`
`List of Exhibits
`
`Description of Document
`Ex. No.
`1001 U.S. Patent No. 8,458,245 to Daniel L. Marks
`1002 Declaration of Tal Lavian, Ph.D.
`1003 U.S. Patent No. 6,608,636 to Robert D. Roseman
`1004
`EP 0621532 A1 to Eugene Rissanen, published on April 13, 1994
`1005
`
`Ronald J. Vetter, Videoconferencing on the Internet, Computer, IEEE
`Computer Society, Vol. 28, No. 1, at pp.77-79 (Jan. 1995)
`
`1006
`Excerpts from Mary Ann Pike et al., Using Mosaic (1994)
`1007 U.S. Patent No. 5,226,176 to William D. Westaway et al.
`1008
`Excerpts from Tom Lichty, The Official America Online for Macintosh
`Membership Kit & Tour Guide (2d ed. 1994)
`
`1009
`
`Tim Berners-Lee et al., Request for Comments (RFC) 1738, Uniform
`Resource Locators (URL), Dec. 1994
`
`1010
`
`James Coates, A Mailbox in Cyberspace Brings World to Your PC,
`Chicago Tribune, Mar. 1995
`1011 Date-stamped Excerpts from Mary Ann Pike et al., Using Mosaic
`(1994)
`1012 Date-stamped Excerpts from Tom Lichty, The Official America Online
`for Macintosh Membership Kit & Tour Guide (2d ed. 1994)
`
`1013
`Biography of Mark. R. Weinstein
`1014 Declaration of Mark R. Weinstein ISO Motion for Pro Hac Vice
`Admission
`
`1015
`[Reserved]
`1016 Deposition Transcript of Jaime G. Carbonell (June 26, 2017)
`
`
`
`
`
`-iv-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`
`
`List of Exhibits
`
`1017
`1018
`
`1019
`
`1020
`1021
`
`Excerpts from Henry F. Korth et al., Database System Concepts (1991)
`
`Excerpts from IEEE Internet Computing, “Bob Metcalfe on What’s
`Wrong with the Internet: It’s the Economy, Stupid” (March 1997)
`
`Reuters article entitled “Sage who warned of Net’s collapse eats his
`words” (April 11, 1997)
`
`Excerpts from Mary Loomis, The Database Book (1988)
`
`Second Declaration of Tal Lavian, Ph.D.
`
`
`
`
`
`-v-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`Petitioner respectfully submits this Reply in support of Inter Partes Review
`
`of U.S. Patent No. 8,458,245 (Ex. 1001) (“’245 patent”) and addressing Patent
`
`Owner’s Response (Paper 22 (“Response”)). This Reply is supported by the
`
`Second Declaration of Tal Lavian, Ph.D. (Ex. 1021 (“Second Lavian Decl.”)).
`I.
`CLAIM CONSTRUCTION
`
`The patent owner’s response recycles the failed claim construction
`
`arguments made in its Preliminary Response with respect to the terms
`
`“censorship” and “database.” The patent owner’s arguments rely entirely on
`
`extrinsic evidence and ignore the patent specification, which the Federal Circuit
`
`has instructed is “the single best guide to the meaning of a disputed term.” Phillips
`
`v. AWH Corp., 415 F.3d 1303, 1321 (Fed. Cir. 2005) (en banc).
`
`The Institution Decision correctly rejected the patent owner’s narrow
`
`constructions of “censorship” and “database,” and the patent owner has done
`
`nothing to justify any deviation from that decision. To the contrary, the patent
`
`owner has doubled down on those positions by simply recycling verbatim, through
`
`a different expert witness (Dr. Carbonell), the failed opinions made by the patent
`
`owner’s previous expert (Dr. Bajaj) submitted with the Patent Owner Preliminary
`
`Response. (Compare Carbonell Decl., Ex. 2005, ¶67 (censorship), ¶¶32-37
`
`(database) with Bajaj Decl., Ex. 2001, ¶29 (identical language re censorship), ¶¶19-
`
`24 (identical language re database).) Because the patent owner simply recycled its
`
`
`
`
`
`-1-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`pre-institution arguments,1 the patent owner and its expert do not acknowledge, let
`
`alone address, the valid criticisms made by the Board. The Board should therefore
`
`adhere to its claim construction positions.
`
`
`1 The verbatim recycling of patent owner’s pre-institution argument raises a
`
`credibility issue with respect to patent owner’s current expert, Dr. Carbonell.
`
`Substantial portions of Dr. Carbonell’s declaration were copied directly, with little
`
`or no change, from the declaration of Dr. Bajaj (Ex. 2001) filed six months earlier
`
`with the patent owner’s Preliminary Response. (Compare Ex. 2001 (Bajaj), ¶¶ 19-
`
`24, 29 with Ex. 2005 (Carbonell), ¶¶ 32-37, 67.) Although one expert may in
`
`appropriate circumstances review and adopt the opinions of another expert, Dr.
`
`Carbonell’s declaration never acknowledges or references Dr. Bajaj’s declaration,
`
`and Dr. Carbonell claimed to have no knowledge of Dr. Bajaj’s declaration when
`
`asked about it during his deposition. (Ex. 1016 (“Carbonell Depo. Tr.”), 132:2-
`
`12.) The Petitioner respectfully submits that the wholesale copying (without
`
`attribution) of entire portions Dr. Bajaj’s declaration is a factor the Court should
`
`consider in determining the evidentiary weight, if any, to which Dr. Carbonell’s
`
`opinions should be afforded.
`
`
`
`
`
`-2-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`A.
`“Censorship”
`The Board correctly observed in the Institution Decision that the patent
`
`owner’s proposed construction of “censorship” ignores express statements in the
`
`patent specification and instead relies on extrinsic evidence. (IPR2016-01156
`
`Paper 7 (“Decision”) at 8; Second Lavian Decl. ¶¶8-9.) Because the patent owner
`
`has simply presented the identical argument it made pre-institution, the Board
`
`should again reject the patent owner’s narrow construction.
`
`B.
`“Database”
`The patent owner repeats its arguments from its Preliminary Response that
`
`“database” should be construed as “a collection of logically-related data which is
`
`stored with persistence and associated tools for interacting with the data such as a
`
`DBMS.” (Response at 12.) In related IPR2016-01158, the Board construed
`
`“database” to mean “a collection of logically related data.” (IPR2016-01158 Paper
`
`7 at 10.) That construction is generally consistent with the plain and ordinary
`
`meaning of “database” to a person of ordinary skill in the art in 1996. (Lavian
`
`Second Decl. ¶11.) The patent owner’s construction should again be rejected.
`
`1.
`Patent Owner’s Construction Lacks Intrinsic Support
`The written description contains only a few sentences that mention the
`
`database, and none of those sentences require that the database be implemented in
`
`any particular way. (’245, 8:6-15; ’356, 8:9-21; ’552, 7:61-8:5; ’657, 7:49-59.)
`
`
`
`
`
`-3-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`The specification says nothing about data in the database being “stored with
`
`persistence,” or the database having “associated tools for interacting with the data
`
`such as a DBMS,” as the patent owner proposes. The terms “DBMS” or “database
`
`management system” appear nowhere in the written description or claims. There is
`
`simply no support in the intrinsic record for the patent owner’s proposed
`
`construction of “database.”
`
`The only intrinsic evidence the patent owner can muster is its own self-
`
`serving arguments submitted to the PTO on an IDS filed on January 14, 2017 (Ex.
`
`2008) during prosecution of a related application (14/246,965). (Response at 9.)
`
`These statements carry no weight in these proceedings for at least two reasons.
`
`First, the Federal Circuit has made clear that self-serving statements during
`
`the pendency of another proceeding, such as those made in the IDS, are entitled to
`
`no weight. The IDS was not submitted in response to any action by the PTO, and
`
`was filed by the patent owner after IPR was instituted and after the PTAB
`
`expressly rejected the patent owner’s narrow construction of “database.” The
`
`statements in the IDS conveniently track the construction the patent owner seeks
`
`here. And although the IDS claims to have been submitted to furnish additional
`
`prior art to the PTO, its gratuitous statements about “database” do not mention or
`
`discuss any specific reference. (Ex. 2008, at 2.) In short, the IDS was obviously
`
`
`
`
`
`-4-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`submitted to place the patent owner’s “database” arguments into the file wrapper
`
`of a related application, in the hope of bolstering those arguments here.
`
`The Federal Circuit confronted a nearly identical situation in Moleculon
`
`Research Corp. v. CBS, Inc., in which a patent owner submitted self-serving
`
`statements to the PTO during the pendency of litigation involving the patent. 793
`
`F.2d 1261 (Fed. Cir. 1986), disapproved on another point, Egyptian Goddess, Inc.
`
`v. Swisa, Inc., 543 F.3d 665 (Fed. Cir. 2008) (en banc). In affording no weight to
`
`the patent owner’s statements, the Federal Circuit cautioned that statements made
`
`to the PTO during litigation “might very well contain merely self-serving
`
`statements which likely would be accorded no more weight than testimony of an
`
`interested witness or argument of counsel. Issues of evidentiary weight are
`
`resolved on the circumstances of each case.” Id. at 1270 (underlining added). In
`
`this case, the patent owner’s statements were an obvious attempt to bolster its
`
`narrow definition of “database” in this proceeding, and as such, are just as
`
`meritless there as they are in the patent owner’s response.
`
`Second, Federal Circuit law is clear that statements during the prosecution of
`
`a patent cannot expand the disclosures of its specification. See, e.g. Clare v.
`
`Chrysler Group LLC, 819 F.3d 1323, 1332 (Fed. Cir. 2016) (quoting Biogen, Inc.
`
`v. Berlex Labs., Inc., 318 F.3d 1132, 1140 (Fed. Cir. 2003) (“Representations
`
`during prosecution cannot enlarge the content of the specification…”)); see also In
`
`
`
`
`
`-5-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`re Google Litig., 2011 WL 8603085, at *4 (N.D. Cal. 2011) (noting that
`
`“prosecution is not a platform for a patentee to ‘enlarge, diminish, or vary the
`
`limitations in the claims.’”) (citation omitted). As noted above, the specification
`
`here does not say a word about the database storing the data with persistence or
`
`including a DBMS or other tools for interacting with the data. The patent owner’s
`
`self-serving arguments to the PTO cannot change the content of the specification
`
`and should be afforded no weight.
`
`2.
`Patent Owner’s Extrinsic Evidence Fails
`Having no legitimate intrinsic evidence to support its position, the patent
`
`owner relies primarily on extrinsic evidence in the form of testimony from its
`
`retained expert, Dr. Carbonell. The key to Dr. Carbonell’s opinion about the
`
`meaning of “database” is his assumption that “[t]wo hallmarks of a database are (1)
`
`persistence of the data, and (2) interactivity with the data via a database
`
`management system (DBMS).” (Carbonell Decl. ¶39.) Dr. Carbonell cites no
`
`technical treatises or other materials to support his “two hallmarks” point.
`
`But Dr. Carbonell’s opinions overlook the fact that a “database” and a
`
`“database management system” (DBMS) are two different things. The term
`
`“database” refers to the actual collection of data whereas the DMBS refers to
`
`software tools for managing the data. (Lavian Second Decl. ¶12 (citing Korth, Ex.
`
`1017).) A DBMS is thus not properly part of the definition of a “database.” (Id.)
`
`
`
`
`
`-6-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`The other flaw with Dr. Carbonell’s opinion is that a “database,” i.e., a
`
`collection of logically related data under the Board’s definition, does not require a
`
`DBMS. (Lavian Second Decl. ¶13.) It was well-known to persons of ordinary
`
`skill in the art that software programs could store and retrieve data using their own
`
`internal logic and programming, without relying on a DBMS. (Id. ¶¶13-14
`
`(discussing Mary Loomis, The Database Book (1987), Ex. 1020.) For example, it
`
`was well-known that software applications could create their own databases by
`
`accessing files using their own internal logic, without requiring separate software
`
`tools such as a DBMS. (Id. ¶13.) A person of ordinary skill in the art would have
`
`appreciated that, in fact, it might have been preferable not to use a DBMS in
`
`implementing the claimed “database” to avoid the complexity and overhead that a
`
`DBMS would have imposed. (Id. ¶16.) The Board should therefore reject the
`
`patent owner’s unsupported definition of “database.”2
`II. CLAIMS 1-15, 17, AND 18 ARE UNPATENTABLE
`A.
`“Internet”
`The patent owner presents various arguments for why, according to the
`
`patent owner, Roseman and Vetter cannot be combined to show the “Internet” as
`
`recited in the claims. These arguments are baseless.
`
`2 As explained in more detail in Part II.B, infra, even if the Board were to adopt
`
`the patent owner’s “database” construction, it would not distinguish the prior art.
`
`
`
`
`
`-7-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`1.
`Dr. Metcalfe’s Inaccurate Prediction of Internet Collapse
`In arguing that a person of ordinary skill in the art would not have been
`
`motivated to use the Internet to implement the system of Roseman, the patent
`
`owner and its expert point to a statement by Bob Metcalfe in late 1995 predicting
`
`that the Internet “will soon go spectacularly supernova and in 1996 catastrophically
`
`collapse.” (Carbonell Decl. ¶57; Response at 28.) But the incorrect prediction of a
`
`single individual would not have discouraged (and did not discourage) the industry
`
`from using the Internet. (Lavian Second Decl. ¶¶22, 25.) History quickly proved
`
`Dr. Metcalfe’s prediction to be wrong, and he retracted it. (Id. ¶22.) There is no
`
`evidence that people in the industry, including Dr. Metcalfe, took the prediction
`
`seriously or altered their behavior based on it.3
`
`
`3 Dr. Metcalfe retracted his prediction in dramatic fashion by literally eating his
`
`words. In 1997, he reportedly took a printed copy of his article that predicted the
`
`collapse of the Internet, placed it in a blender with some liquid, and then consumed
`
`the pulp. (Ex. 1019.) Dr. Metcalfe also reportedly predicted (again incorrectly)
`
`that wireless networking technologies would die out by the mid 1990s.
`
`<https://en.wikipedia.org/wiki/Robert_Metcalfe> (last visited July 12, 2017).
`
`
`
`
`
`-8-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`2.
`
`The Existence of IDSN and ATM Would Not Have
`Discouraged Use of the Internet As Disclosed in Vetter
`The patent owner also asserts that a person of ordinary skill in the art would
`
`not have used the Internet to implement the system of Roseman because other
`
`communication technologies, such as ISDN and ATM, were allegedly more
`
`suitable. But Federal Circuit law is clear that the existence of alternatives to the
`
`Internet, even if those alternatives might have been advantageous in some respects,
`
`does not teach away from use of the Internet or render the Internet non-obvious.
`
`See In re Fulton, 391 F.3d 1195, 1200 (Fed. Cir. 2004) (“[O]ur case law does not
`
`require that a particular combination must be the preferred, or the most desirable,
`
`combination described in the prior art in order to provide motivation for the current
`
`invention.”); PAR Pharm., Inc. v. TWI Pharm., Inc., 773 F.3d 1186, 1197–98 (Fed.
`
`Cir. 2014) (“Our precedent, however, does not require that the motivation be the
`
`best option, only that it be a suitable option from which the prior art did not teach
`
`away.”). The patent owner’s arguments are also undermined by statements in
`
`Vetter demonstrating that the Internet was entirely suitable for conferencing
`
`systems such as the one described in Roseman. (Lavian Second Decl. ¶21.)
`
`For example, the patent owner does not address Vetter’s unequivocal
`
`statement that “[v]ideoconferences are becoming increasingly frequent on the
`
`Internet and generating much research interest.” (Vetter, Ex. 1005, p.77.)
`
`Although Vetter describes various challenges encountered during the virtual
`
`-9-
`
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`classroom project he described, it provides clear motivation to use conferencing
`
`systems over the Internet and an expectation that doing so would be successful.
`
`(Lavian Second Decl. ¶21.) Dr. Lavian provided a full explanation in his opening
`
`declaration as to why the challenges reported in Vetter were nothing more than
`
`garden variety networking issues that would not have discouraged a person of
`
`ordinary skill in the art from combining with Roseman, particularly given the
`
`numerous express motivations to combine in Vetter. (Ex. 1002, Lavian 01156
`
`Decl. ¶¶51-57.) The patent owner did not address any of those arguments.
`
`B.
`“Database”
`The patent owner next presents a series of arguments asserting that Roseman
`
`and Rissanen do not disclose the claimed “database which serves as a repository of
`
`tokens for other programs to access.” These arguments fail.
`
`1.
`
`The Patent Owner’s Speculative “Hash Function”
`Argument
`As explained in the Petition, the “keys” in Roseman correspond to the
`
`claimed “tokens.” Roseman explains that “meeting room ‘knows’ about each key
`
`and its invitation level.” (Roseman, 9:49-50 (emphasis added).) The meeting
`
`room is, in turn, stored on the host. (Id., 9:61-63, 7:30-31, 12:16-18.)
`
`The patent owner speculates that the host computer in Roseman may not
`
`actually store the keys because, according to the patent owner, the meeting room in
`
`Roseman could have applied a “hash function” to determine if a key is valid. “In
`
`-10-
`
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`this manner,” according to the patent owner, “a room can ‘know’ about a key
`
`without storing any particular keys.” (Carbonell Decl. ¶40; see also Response at
`
`21.) This argument should be rejected for at least two reasons.
`
`First, the patent owner’s “hash function” argument is legally irrelevant to the
`
`legal question of obviousness. Federal Circuit law is clear that “[n]on-obviousness
`
`cannot be established by attacking references individually where the rejection is
`
`based upon the teachings of a combination of references.” In re Merck & Co., Inc.,
`
`800 F.2d 1091, 1097 (Fed. Cir. 1986). The patent owner’s hash function argument
`
`attacks Roseman individually but ignores the fact that the Petition cited Roseman
`
`in combination with Rissanen to show that it would have been obvious to store the
`
`“keys” in a database. (Petition at 28-29.) The patent owner concedes in its
`
`Response that “Rissenan [sic] does disclose a database” (Response at 22), so
`
`whether Roseman itself discloses storage of keys is beside the point. Even if the
`
`“hash function” argument had merit (which it does not), it would not diminish the
`
`fact that the claimed storage of tokens in a database is obvious in view of Rissanen.
`
`Second, the patent owner’s “hash function” argument is based on pure
`
`speculation and conjecture. Roseman does not suggest, let alone disclose, the use
`
`of any hash function for checking the validity of keys. (Second Lavian Decl. ¶29.)
`
`The use of such a “hash function” is also inconsistent with the teachings in
`
`Roseman. (Id., ¶¶29-30.) For example, the host computer in Roseman can
`
`
`
`
`
`-11-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`distribute invitations to other users, the invitations including the keys associated
`
`with the meeting room. (Roseman, 4:23-25, 9:42-43, 9:54-55.) Roseman could
`
`not distribute meeting room keys to other users if, as the patent owner asserts, the
`
`host simply used a hash function and did not store actual meeting room keys.
`
`(Second Lavian Decl. ¶29.) Nothing in Roseman suggests that the meeting room
`
`keys are somehow deleted by the host after they are distributed to other users. (Id.,
`
`¶30.) Nor would this make any sense considering Roseman’s express statement
`
`that the “meeting room ‘knows’ about each key and its invitation level” (9:49-50
`
`(emphasis added)).
`
`2.
`Roseman and Rissanen Are Properly Combinable
`The patent owner also argues that a person of ordinary skill in the art would
`
`not have been motivated to combine Rissanen and Roseman. The patent owner’s
`
`argument is based on an attempt to make the combination of Roseman and
`
`Rissanen appear more complex than it is. (Response at 22-23.) The patent owner
`
`and its expert have conjured various excuses for why the combination might be
`
`technically complicated or difficult to implement if one were to attempt to
`
`physically combine the two systems. (Id.)
`
`But this argument is contrary to established law. “The test for obviousness
`
`is not whether the features of a secondary reference may be bodily incorporated
`
`into the structure of the primary reference.” Allied Erecting and Dismantling Co.,
`
`
`
`
`
`-12-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`Inc. v. Genesis Attachments, LLC, 825 F.3d 1373, 1381 (Fed. Cir. 2016) (quoting
`
`In re Keller, 642 F.2d 413, 425 (C.C.P.A. 1981)); see also In re Mouttet, 686 F.3d
`
`1322, 1332 (Fed. Cir. 2012) (“It is well-established that a determination of
`
`obviousness based on teachings from multiple references does not require an
`
`actual, physical substitution of elements.”). The test for obviousness, in other
`
`words, is “not whether the references could be physically combined but whether
`
`the claimed inventions are rendered obvious by the teachings of the prior art as a
`
`whole.” Id. (quoting In re Etter, 756 F.2d 852, 859 (Fed. Cir. 1985) (en banc)).
`
`The Petition cites Rissanen for a narrow purpose of showing disclosure of
`
`storing user identity and authentication information in a database. (Lavian Second
`
`Decl. ¶38.) There is simply nothing complicated about storing the “keys”
`
`Roseman in a database, as suggested by Rissanen. (Id.) The patent owner’s
`
`attempt to obfuscate this straightforward combination through arguments about
`
`physical combinability should be rejected.
`
`Dr. Carbonell himself admitted at his deposition that databases as of early
`
`1996 could be used to store user identity and authentication information. (Ex.
`
`1016, Carbonell Depo. Tr., 43:17-44:7.) He further agreed that nothing in
`
`Roseman prevents storage the keys in a database. (Id., 53:16-55:3.) It would have
`
`been obvious to combine Roseman and Rissanen. (Second Lavian Decl. ¶40.)
`
`
`
`
`
`-13-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`3.
`
`Roseman + Rissanen Disclose A “Database” Even Under
`The Patent Owner’s Erroneous Construction
`As explained in Part I.B above, the patent owner proposed a narrow
`
`construction of “database” that has no support in the intrinsic record. That
`
`construction is incorrect for the reasons previously identified, but even if the Board
`
`were to adopt it, the claimed “database” would still be disclosed by the
`
`combination of Roseman and Rissanen.
`
`There appears to be no dispute on this point. The patent owner devotes most
`
`of its argument about the “database” limitation to Roseman and does not appear to
`
`dispute that Rissanen discloses the claimed database. The patent owner
`
`specifically concedes in its Response that “Rissenan [sic] does disclose a
`
`database” (Response at 22), as noted above. The combination of Roseman and
`
`Rissanen clearly disclose the claimed “database” even under the patent owner’s
`
`improperly narrow construction. (Lavian Second Decl. ¶¶36-38.)
`
`C. The Patent Owner’s “Tokens” Arguments Fail
`The Board construed “token” as a “piece of information associated with
`
`user identity,” and the patent owner does not dispute that construction. The patent
`
`owner instead argues that the keys in Roseman do not qualify as “tokens” because,
`
`according to the patent owner, they are associated with a conference room and not
`
`a user identity. (Response at 19.)
`
`
`
`
`
`-14-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`The patent owner’s arguments cannot be reconciled with the plain
`
`disclosures in Roseman. For example, Roseman discloses a “Level 1” key that is
`
`“for the invitee only” and “may not be passed to any other person and may not be
`
`copied.” (Roseman, 9:37, 9:43-44.) Roseman thus clearly discloses a piece of
`
`information associated with user identity, i.e., the identity of the Invitee.
`
`The patent owner’s attempt to distinguish the “Level 1” key teachings in
`
`Roseman is confusing and hard to follow. (Response at 19-20.) The patent owner
`
`ambiguously states that the “Level 1” invitation in Roseman “offers only the
`
`suggestion of association with a specific invitee.” (Id.) The patent owner
`
`continues by asserting that the key in Roseman is electronically sent with an
`
`invitation and that the invitation serves no purpose after its distribution. (Id. at 20.)
`
`“Thus, sending an invitation to a specific invitee,” the patent owner argues, “is a
`
`far stretch from disclosing a key being associated with a specific user.” (Id.) “In
`
`the case of a key being distributed as part of a Level 1 invitation,” the patent owner
`
`continues, “Roseman does not require recording any user information in the key to
`
`restrict transferability.” (Id.)
`
`But the patent owner’s argument ignores the plain language of the agreed-
`
`upon construction of “token,” which merely requires a piece of information
`
`associated with user identity. The claims do not require that the association with
`
`user identity be implemented in any particular way. Roseman expressly discloses
`
`
`
`
`
`-15-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`that the “Level 1” key is “for the invitee only” and “may not be passed to any other
`
`person and may not be copied.” (Roseman, 9:37, 9:43-44.) It is hard to imagine a
`
`clearer example of a “piece of information associated with user identity” than a
`
`key that can be used only by the particular invitee.
`
`The patent owner’s argument that “Roseman does not require recording of
`
`any information in the key to restrict transferability” (Response at 20), is irrelevant
`
`because Roseman clearly discloses that transferability is in fact restricted.
`
`Restrictions on a key are enforced when the person associated with the key
`
`attempts to use the key to access the conference room. (Roseman, 10:61-64 (“To
`
`open a door with a key, the user drops the key onto the door lock. If the key is
`
`valid and the user has authority to use the key, the door opens and the user is
`
`admitted to the room.”); Lavian Second Decl. ¶46.) The claim also does not
`
`require that the “association” with user identity be encoded into the key itself.
`
`Finally, the patent owner argues that “the tokens must be capable of serving
`
`purposes beyond authentication,” and lists five functions from the patent
`
`specification. (Response at 20.) But those functions are not recited in the claims
`
`or in the agreed-upon definition of “token.” There is no basis to argue that the
`
`claimed tokens must perform those unclaimed functions.
`
`
`
`
`
`-16-
`
`
`
`

`

`IPR2016-01156
`Petitioner’s Reply
`
`D.
`“Other Programs to Access”
`The challenged claims also recite a “database which serves as a repository of
`
`tokens for other programs to access.” The Petition provided two separate theories
`
`for why Roseman disclosed this limitation. First, the Petition explained that the
`
`“other programs” in Roseman took the form of the various meeting and
`
`conference rooms maintained on the host computer. (Petition at 30.) Roseman
`
`itself states that the conference room ‘itself is actually a combination of stored data
`
`and computer programs.’” (Id. (quoting Roseman, 12:16-18).) Second, the
`
`Petition provided an alternative mapping in which the “other programs” took the
`
`form of the programs on the participator computers of invitees who present their
`
`key to the host to gain access to a conference room. (Id. at 31.) The patent owner
`
`addresses only the first theory and ignores the second.
`
`1.
`Conference Rooms in Roseman Are Separate Programs
`With respect to the first theory identified in the Petition, the patent owner
`
`asserts that Roseman does not disclose “other programs,” plural. The gist of the
`
`patent owner’s argument is that the conference rooms in Roseman are actually just
`
`a single program. The fact that Roseman maintains

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket