throbber

`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`FACEBOOK, INC.
`Petitioner
`
`v.
`
`WINDY CITY INNOVATIONS, LLC
`Patent Owner.
`
`
`Case IPR2016-011561
`Patent 8,458,245
`
`
`PETITIONER’S SUPPLEMENTAL REPLY
`
`
`
`
`
`
`
`1 Case No. IPR2017-00709 has been joined with this proceeding.
`
`

`

`IPR2016-01156
`Petitioner’s Supplemental Reply
`
`Patent Owner’s Supplemental Response (Paper 45 (“Supp. Resp.”)) is little
`
`more than a rehash of the arguments it previously made in IPR2016-01156, with
`
`which this proceeding was joined. In its Order Granting Petitioner’s Motion for
`
`Joinder in IPR2017-00709, the Board correctly observed that “the claim language of
`
`the present challenged claims is very similar to that of several of the claims on which
`
`we instituted review in the 1156 IPR.” (Paper 11 in IPR2017-00709, at 6.) The
`
`Board also correctly observed that “Facebook’s arguments and evidence supporting
`
`its contention that the present challenged claims are unpatentable are substantially
`
`similar to its arguments and evidence with respect to the corresponding claims in the
`
`1156 IPR.” (Id. at 7-8) Accordingly, it should come as no surprise that Patent
`
`Owner’s Supplemental Response adds little, if anything, to its previous arguments.
`
`Patent Owner did not submit a new expert declaration or any additional evidence to
`
`support its defense of claims 19 and 22-25.
`
`Nevertheless, in the interest of completeness, Petitioner will address each of
`
`Patent Owner’s arguments below. For convenience and ease of reference for the
`
`Board, and to avoid the need to consider identical issues multiple times, Petitioner
`
`will also identify when an argument addressed herein was already covered (in more
`
`detail) by the previous submissions by the parties. For the reasons stated below, the
`
`Board should find that claims 19 and 22-25 are unpatentable based on the instituted
`
`grounds.
`
`
`
`1
`
`

`

`IPR2016-01156
`Petitioner’s Supplemental Reply
`
`I.
`CLAIM CONSTRUCTION
`
`Patent Owner proposes the same constructions for “database” and “censor”
`
`(and “censorship”) that it proposed in its -1156 Response. As explained in detail in
`
`Petitioner’s Reply (Paper 31 (“Reply”)), Patent Owner’s proposed construction for
`
`“censor” ignores express statements in the specification and instead relies on
`
`extrinsic evidence and was already considered and rejected by the Board. (Paper 31
`
`(“Reply”) at 3.) Patent Owner’s proposed construction for “database” lacks intrinsic
`
`support, and its extrinsic support (the unsupported testimony of its expert) overlooks
`
`the facts that a “database” and a “database management system” (“DBMS”) are two
`
`different things and that a database does not require a DBMS. (Reply at 3-7; Lavian
`
`Second Decl., Ex. 1021, ¶¶ 10-17.) Patent Owner’s proposed constructions should
`
`be rejected.2
`II. CLAIMS 19 AND 22-25 ARE UNPATENTABLE
`A. Claim 19 – “Particular computers being associated with a
`respective login name and a password”
`As the Petition explained, claim 19 is similar in many respects to claim 7,
`
`except that claim 19 recites “particular computers being associated with a
`
`respective login name and a password,” whereas claim 7 recites “a respective login
`
`
`2 As explained below, even if the Board were to adopt Patent Owner’s “database”
`
`construction, it would not distinguish the prior art.
`
`
`
`2
`
`

`

`IPR2016-01156
`Petitioner’s Supplemental Reply
`
`name and a password corresponding to a respective user identity.” Patent Owner
`
`contends that this difference is somehow significant because, according to Patent
`
`Owner, the login name and password under the combination of Roseman and
`
`Rissanen are associated with the user, but not with the user’s computer.
`
`But for purposes of applying the prior art, Patent Owner’s distinction has no
`
`meaningful significance. Under the combination of Roseman and Rissanen, the
`
`login name and password are actually associated with both the user identity and
`
`with the user’s participator computer. This is because the user enters its login name
`
`and password into its participator computer to gain access to the system. (Rissanen,
`
`1:37-39 (“Typically, the computer system prompts the user to enter the user’s
`
`account code and then prompts the user to enter the assigned password . . .”), 1:33-
`
`34 (explaining that the “account code” stores the user’s “login identification”)
`
`(underlining added).) As the Petition explained, “if a participant computer is
`
`associated with a valid pass-code and key, a data connection is made with that
`
`participant computer and audio and video connections may also be made.” (Petition,
`
`at 29 (underlining added).) The login name and password are thus clearly associated
`
`with the participator computer employed by the user.
`
`Patent Owner’s suggestion that the claim requires some kind of special or
`
`direct connection between the user’s login name and password and the computer
`
`itself is unsupported by the claim language and the specification. The claim simply
`
`
`
`3
`
`

`

`IPR2016-01156
`Petitioner’s Supplemental Reply
`
`recites “particular computers being associated with a respective login name and a
`
`password,” and imposes no limits on how that association must be implemented or
`
`expressed, or when it must exist. The Board has previously construed the word
`
`“associated” as “connected or related,” and held that the term does not require a pre-
`
`existing relationship. See Apple Inc. v. Arrendi S.A.R.L., Case IPR2014-00207, Final
`
`Written Decision, Paper 32, at 7-8 (P.T.A.B. June 9, 2005).
`
`This broad definition is consistent with the specification of the ’245 patent.
`
`The specification itself describes the claimed login name and password as being
`
`associated with the user identity: “The login/password screen is shown, and the user
`
`enters his/her assigned login/password combination and clicks the ‘Login to Chat’
`
`button. If the password was entered correctly, a confirmation box appears on the
`
`screen.” (’245, 18-21 (emphasis added).) Just like Roseman and Rissanen, the login
`
`name and password in the ’245 specification are associated with the participator
`
`computer by virtue of the fact that the participator computer was used to input that
`
`information. Nothing in the specification suggests, let alone requires, a direct
`
`relationship between the login name/password and the computer itself.
`
`B.
`“Tokens”
`Patent Owner next repeats nearly verbatim its arguments that Roseman does
`
`not disclose “tokens.” (Compare Supp. Resp. at 7-9 with Resp. at 18-20.) Patent
`
`Owner’s arguments were fully addressed in the Reply. (Reply at 14-16.)
`
`
`
`4
`
`

`

`IPR2016-01156
`Petitioner’s Supplemental Reply
`
`Patent Owner’s arguments cannot be reconciled with the plain disclosures in
`
`Roseman. (Reply at 15.) Patent Owner ignores the plain language of the agreed-
`
`upon construction of “token,” which merely requires a piece of information
`
`associated with user identity. (Reply at 15-16.) The claims do not require that the
`
`association with user identity be implemented in any particular way. Roseman
`
`expressly discloses that the “Level 1” key is “for the invitee only” and “may not be
`
`passed to any other person and may not be copied.” (Roseman, 9:37, 9:43-44.)
`
`Moreover, the claim does not require that the “association” with user identity
`
`be encoded into the key itself, and restrictions on a key are enforced when the person
`
`associated with the key attempts to use the key to access the conference room.
`
`(Reply at 16; Ex. 1021, ¶ 46.) Nor is there any basis to argue that the tokens must
`
`perform the five unclaimed functions that Windy City lists. (Reply at 16.)
`
`C.
`“Database”
`Patent Owner repeats nearly verbatim its arguments related to the “database”
`
`limitation from its Response. (Compare Supp. Resp. at 9-13 with Resp. at 21-25.)
`
`As explained in the Reply, these arguments fail. (Reply at 10-19.)
`
`Patent Owner first speculates that the host computer in Roseman may not
`
`actually store the keys because, according to Patent Owner, the meeting room in
`
`Roseman could have applied a “hash function” to determine if a key is valid. (Supp.
`
`Resp. at 9.) As explained in the Reply, this argument should be rejected for at least
`
`
`
`5
`
`

`

`IPR2016-01156
`Petitioner’s Supplemental Reply
`
`two reasons. First, Patent Owner’s argument is legally irrelevant because it
`
`improperly attacks Roseman individually but ignores the fact that the Petition cited
`
`Roseman in combination with Rissanen to show that it would have been obvious to
`
`store the “keys” in a database. (Reply at 11; -709 Petition at 17-18, 40-42.) Patent
`
`Owner concedes that “Rissenan [sic] discloses a database” (Supp. Resp. at 10), so
`
`whether Roseman itself discloses storage of keys is beside the point. Second, Patent
`
`Owner’s “hash function” argument is based on pure speculation. (Reply at 11-12.)
`
`Roseman does not suggest, let alone disclose, the use of any hash function for
`
`checking the validity of keys. (Ex. 1021, ¶ 29.) Moreover, the use of such a “hash
`
`function” is inconsistent with the teachings in Roseman. (Id., ¶¶ 29-30; Roseman,
`
`4:23-25, 9:42-43, 9:49-50, 9:54-55.)
`
`Patent Owner also argues that a person of ordinary skill in the art would not
`
`have been motivated to combine Rissanen and Roseman. (Supp. Resp. at 10-11.)
`
`Patent Owner’s physical combinability argument is contrary to established law.
`
`(Reply at 12-13.) As explained in the Reply, the test for obviousness is “not whether
`
`the references could be physically combined but whether the claimed inventions are
`
`rendered obvious by the teachings of the prior art as a whole.” Allied Erecting and
`
`Dismantling Co., Inc. v. Genesis Attachments, LLC, 825 F.3d 1373, 1381 (Fed. Cir.
`
`2016) (quoting In re Etter, 756 F.2d 852, 859 (Fed. Cir. 1985) (en banc)). The
`
`Petition cites Rissanen for a narrow purpose of showing disclosure of storing user
`
`
`
`6
`
`

`

`IPR2016-01156
`Petitioner’s Supplemental Reply
`
`identity and authentication information in a database. (-709 Petition at 17-18, 41-
`
`43.) There is simply nothing complicated about storing the “keys” Roseman in a
`
`database, as suggested by Rissanen. (Ex. 1021, ¶ 38.) Dr. Carbonell himself
`
`admitted at his deposition that databases as of early 1996 could be used to store user
`
`identity and authentication information. (Ex. 1016, 43:17-44:7.) He further agreed
`
`that nothing in Roseman prevents storage the keys in a database. (Id., 53:16-55:3.)
`
`Even under Patent Owner’s incorrect proposed construction for “database,” one
`
`would be disclosed by Roseman and Rissanen. (Reply at 14.) There appears to be
`
`no dispute on this point. Patent Owner devotes most of its argument about the
`
`“database” limitation to Roseman and does not appear to dispute that Rissanen
`
`discloses the claimed database. Patent Owner specifically concedes in its Response
`
`that “Rissenan [sic] discloses a database” (Supp. Resp. at 10). Roseman and
`
`Rissanen disclose the claimed “database” even under Patent Owner’s improperly
`
`narrow construction. (Ex.1021, ¶¶ 36-38.)
`
`D.
`“Other Programs to Access”
`Patent Owner repeats its arguments regarding a “database which serves as a
`
`repository of tokens for other programs to access.” (Compare Supp. Resp. at 12-13
`
`with Resp. at 24-25.) As explained in the Reply, each conference room is a distinct
`
`and separate “combination of stored data and computer programs,” and thus, a
`
`separate computer program. (Ex. 1021, ¶¶ 51-52; Roseman, 3:42-50, 9:61-10:17,
`
`
`
`7
`
`

`

`IPR2016-01156
`Petitioner’s Supplemental Reply
`
`12:16-18.) Moreover, Patent Owner’s arguments ignore Petitioner’s alternative
`
`mapping in which the “other programs” take the form of the programs on the
`
`participator computers of invitees who present their key to the host to gain access to
`
`a conference room. (Reply at 17; -709 Petition at 43.)
`
`E.
`“Internet”
`Patent Owner repeats its arguments that Roseman and Vetter cannot be
`
`combined to show the “Internet” as in the claims. (Compare Supp. Resp. at 13-15
`
`with Resp. at 21-25.) The Reply addressed these arguments. (Reply at 7-10.)
`
`Bob Metcalfe’s statement
`
`in
`
`late 1995
`
`that
`
`the
`
`Internet would
`
`“catastrophically collapse in 1996” (Supp. Resp. at 14) was incorrect, and quickly
`
`retracted, and would not have discouraged (and did not discourage) the industry from
`
`using the Internet. (Ex.1021, ¶¶ 22, 25.) There is no evidence that people in the
`
`industry took the prediction seriously or altered their behavior based on it.
`
`Patent Owner also points to other communication technologies, such as ISDN
`
`and ATM, but Federal Circuit law is clear that the existence of alternatives to the
`
`Internet, even if those alternatives might have been advantageous in some respects,
`
`does not teach away from use of the Internet or render the Internet non-obvious.
`
`(Reply at 9 (quoting In re Fulton, 391 F.3d 1195, 1200 (Fed. Cir. 2004) and PAR
`
`Pharm., Inc. v. TWI Pharm., Inc., 773 F.3d 1186, 1197–98 (Fed. Cir. 2014).) Patent
`
`Owner’s arguments are also undermined by statements in Vetter demonstrating that
`
`
`
`8
`
`

`

`IPR2016-01156
`Petitioner’s Supplemental Reply
`
`he Internet was entirely suitable for conferencing systems such as the one described
`
`in Roseman. (Ex. 1021, ¶ 21; Ex. 1005, p.77.) Dr. Lavian provided a full
`
`explanation in his opening declaration as to why the challenges reported in Vetter
`
`were nothing more than garden variety networking issues that would not have
`
`discouraged a person of ordinary skill in the art from combining with Roseman,
`
`particularly with the many express motivations to combine in Vetter. (Ex. 1002 (-
`
`709), ¶¶ 54-57.) Patent Owner did not address any of those arguments.
`
`F.
`“Pointer”
`Patent Owner repeats nearly verbatim its arguments from its Response
`
`regarding a “pointer-triggered private message” to argue that the references do not
`
`disclose a “pointer.” (Compare Supp. Resp. at 15-17 with Resp. at 31-33.) These
`
`arguments were fully addressed in the Reply. (Reply at 21-22.)
`
`The Petition explained that the host in Roseman “sends a pointer in the form
`
`of a clickable icon to the table of each participant.” (Reply at 21-22; -709 Petition
`
`at 33-34; Roseman, 14:53-57.) Roseman therefore clearly discloses transmission of
`
`a message that contains the icon that, when activated, makes the file available. (-
`
`709 Petition at 33-34.) Moreover, the Petition provided an alternative mapping in
`
`view of Pike which the “pointer” could have been a message containing a URL that
`
`causes a computer to fetch and retrieve a document. (-709 Petition at 35.) Patent
`
`Owner’s only response to this argument is to assert – with no evidence – that it
`
`
`
`9
`
`

`

`IPR2016-01156
`Petitioner’s Supplemental Reply
`
`would not have been obvious to use the Internet with Roseman. (Supp. Resp. at 16-
`
`17.) This argument fails for the reasons explained in Part II.E above.
`
`G.
`
`“Internally Determines Whether or Not the Second of the
`Participator Computers Can Present the Communication”
`Patent Owner repeats its argument that Pike and Westaway do not disclose
`
`the step of “internally determin[ing] whether or not” the second participator
`
`computer can present the communication. (Compare Supp. Resp. at 17-20 with
`
`Resp. at 33-38.) The Reply fully addressed these arguments. (Reply at 22-23.)
`
`The Reply explained that the fact that the web browser in Pike can behave
`
`differently based on the type of data it encounters – directly presenting “text and
`
`inline graphics” but using a viewer for everything else – confirms that the software
`
`“internally determines” whether it can present the data. (Reply at 22-23; Pike, p.96;
`
`-709 Petition at 50-51.) Westaway also discloses the claimed determination by
`
`detecting when the software programs needed to process data are not present and
`
`specifically discloses an embodiment in which missing software is obtained from a
`
`remote computer over a network. (Reply at 23; -709 Petition at 51-53.)
`III. CONCLUSION
`
`For the foregoing reasons, the Board should reject Patent Owner’s arguments
`
`and enter a final decision also finding claims 19 and 22-25 invalid under 35 U.S.C.
`
`§ 103 based on the prior art cited in the Petition.
`
`
`
`10
`
`

`

`IPR2016-01156
`Petitioner’s Supplemental Reply
`
`
`Dated: September 25, 2017
`
`COOLEY LLP
`ATTN: Patent Group
`1299 Pennsylvania Ave., NW, Suite 700
`Washington, DC 20004
`Tel: (650) 843-5001
`Fax: (650) 849-7400
`
`
`
`
`
`
`By:
`
`
`
`
`Respectfully submitted,
`
`
`/Heidi L. Keefe/
`Heidi L. Keefe
`Reg. No. 40,673
`Counsel for Petitioner
`Facebook, Inc.
`
`
`
`
`
`11
`
`

`

`IPR2016-01156
`Petitioner’s Supplemental Reply
`
`CERTIFICATE OF COMPLIANCE WITH WORD COUNT
`
`
`
`
`
`/ Heidi L. Keefe /
`Heidi L. Keefe
`Reg. No. 40,673
`
`Pursuant to 37 C.F.R. § 42.24(d), I certify that this supplemental reply
`complies with the type-volume limits of 37 C.F.R. § 42.24(c)(1) because it contains
`2,368 words, according to the word-processing system used to prepare it, excluding
`the parts of this supplemental reply that are exempted by 37 C.F.R. § 42.24(c).
`
`
`
`DATED: SEPTEMBER 25, 2017
`
`COOLEY LLP
`ATTN: Heidi L. Keefe
`Patent Docketing
`1299 Pennsylvania Ave. NW,
`Suite 700
`Washington, D.C. 20004
`Tel: (650) 843-5001
`Fax: (650) 849-7400
`
`
`
`
`
`
`
`
`
`
`
`1
`
`

`

`IPR2016-01156
`Petitioner’s Supplemental Reply
`
`CERTIFICATE OF SERVICE
`
`
`
`/ Heidi L. Keefe /
`Heidi L. Keefe
`Reg. No. 40,673
`
`
`I hereby certify, pursuant to 37 C.F.R. § 42.6, that a complete copy of the
`
`attached PETITIONER’S SUPPLEMENTAL REPLY and related documents, are
`being served on the 25th day of September, 2017, by electronic mail on counsel of
`record for Patent Owner as follows:
`
`Vincent J. Rubino, III
`vrubino@brownrudnick.com
`Alfred R. Fabricant
`afabricant@brownrudnick.com
`Peter Lambrianakos
`plambrianakos@brownrudnick.com
`Shahar Harel
`sharel@brownrudnick.com
`Brown Rudnick LLP
`
`DATED: SEPTEMBER 25, 2017
`
`COOLEY LLP
`ATTN: Patent Docketing
`1299 Pennsylvania Avenue NW
`Suite 700
`Washington, D.C. 20004
`Tel: (650) 843-5001
`Fax: (650) 849-7400
`
`
`
`
`
`
`2
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket