`U.S. Patent No. 8,694,657
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`Facebook, Inc.
`Petitioner
`
`v.
`
`Windy City Innovations, LLC
`Patent Owner
`
`U.S. Patent No. 8,694,657
`
`TITLE: REAL TIME COMMUNICATIONS SYSTEM
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 8,694,657
`
`
`
`Table of Contents
`
`
`Page
`
`
`I.
`
`V.
`
`MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(A)(1) ....................... 1
`A.
`Real Party-In-Interest under 37 C.F.R. § 42.8(b)(1) ............................ 1
`B.
`Related Matters under 37 C.F.R. § 42.8(b)(2) ..................................... 1
`C.
`Lead and Back-Up Counsel under 37 C.F.R. § 42.8(b)(3) .................. 1
`D.
`Service Information .............................................................................. 2
`E.
`Power of Attorney ................................................................................ 2
`PAYMENT OF FEES - 37 C.F.R. § 42.103 .................................................. 2
`II.
`III. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37
`C.F.R. §§ 42.104 AND 42.108 ....................................................................... 3
`A. Grounds for Standing under 37 C.F.R. § 42.104(a) ............................. 3
`B.
`Identification of Challenge under 37 C.F.R. § 42.104(b) and
`Statement of Precise Relief Requested ................................................ 3
`Requirements for Inter Partes Review 37 C.F.R. § 42.108(c) ............ 3
`C.
`IV. CLAIM CONSTRUCTION UNDER 37 C.F.R. § 42.104(B)(3) ................... 4
`A.
`“token” .................................................................................................. 4
`B.
`“pointer” ............................................................................................... 5
`THE CHALLENGED CLAIMS ARE UNPATENTABLE ........................... 5
`A.
`Brief Summary and Date Qualification of the Prior Art ...................... 7
`1.
`Brief Overview of Roseman (Ex. 1003) .................................... 7
`2.
`Brief Overview of Rissanen (Ex. 1004) ................................... 10
`3.
`Brief Overview of Vetter (Ex. 1005) ....................................... 11
`4.
`Brief Overview of Pike (Ex. 1006) .......................................... 12
`5.
`Brief Overview of Lichty (Ex. 1007) ....................................... 13
`Ground 1: Claims 189, 334, 342, 348, 465, 580, 584, and 592
`Are Obvious Over Roseman, Rissanen, Vetter, Pike, and Lichty ..... 14
`1.
`Independent Claim 189 ............................................................ 14
`
`B.
`
`
`
`
`
`-i-
`
`
`
`
`
`a.
`
`b.
`
`c.
`
`d.
`
`e.
`
`Table of Contents
`(continued)
`
`Page
`
`“A method of communicating via an Internet
`network by using a computer system including a
`controller computer and a database which serves as
`a repository of tokens for other programs to access,
`thereby affording information to each of a plurality
`of participator computers which are otherwise
`independent of each other, the method including:”
`(Claim 189, Preamble) ................................................... 14
`“affording some of the information to a first of the
`participator computers via the Internet network,
`responsive to an authenticated first user identity”
`(Claim 189[a]) ............................................................... 26
`“affording some of the information to a second of
`the participator computers via the Internet
`network, responsive to an authenticated second
`user identity” (Claim 189[b]) ........................................ 31
`“determining whether the first user identity and the
`second user identity are able to form a group to
`send and to receive real-time communications”
`(claim 189[c]) ................................................................ 32
`“determining whether the first user identity is
`individually censored from sending data in the
`communications, the data presenting at least on of
`a pointer, video, audio, a graphic, and multimedia
`by determining whether a respective at least one
`parameter corresponding to the user identity has
`been determined by an other of the user identities”
`(claim 189[d]) ................................................................ 34
`
`-ii-
`
`
`
`
`
`
`
`
`
`
`
`Table of Contents
`(continued)
`
`Page
`
`f.
`
`g.
`
`
`
`2.
`3.
`
`“if the user identities are able to form the group,
`forming the group and facilitating sending the
`communications that are not censored form the
`first participator computer to the second
`participator computer, wherein the sending is in
`real time and via the Internet network, and wherein
`the communications which are received and which
`present an Internet URL, facilitating handling the
`Internet URL via the computer system so as to find
`content specified by the Internet URL and
`presenting the content at an output device of the
`second participator computer” (claim 189[e]) ............... 44
`“if the user identity is censored from sending of
`the data, not allowing sending the data that is
`censored from the first participator computer to the
`second participator computer.” (claim 189[f]) .............. 47
`Claim 334 (two client software alternatives) ........................... 47
`Claim 342 (data presenting a human communication of
`sound) ....................................................................................... 51
`Claim 348 (access to a member-associated image) ................. 52
`4.
`Claim 465 (Apparatus Corresponding to Claim 189) .............. 53
`5.
`Claims 580, 584, 592 (Corresponding Dependent Claims) ..... 56
`6.
`VI. CONCLUSION ............................................................................................. 57
`
`
`
`
`
`-iii-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`
`
`Ex. No
`
`List of Exhibits
`
`Description of Document
`
`1001 U.S. Patent No. 8,694,657 to Daniel L. Marks
`
`1002 Declaration of Tal Lavian, Ph.D.
`
`1003 U.S. Patent No. 6,608,636 to Robert D. Roseman
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`EP 0621532 A1 to Eugene Rissanen, published on April 13, 1994
`
`Ronald J. Vetter, Videoconferencing on the Internet, Computer, IEEE
`Computer Society, Vol. 28, No. 1, at pp.77-79 (Jan. 1995)
`
`Excerpts from Mary Ann Pike et al., Using Mosaic (1994)
`
`Excerpts from Tom Lichty, The Official America Online for Macintosh
`Membership Kit & Tour Guide (2d ed. 1994)
`
`Tim Berners-Lee et al., Request for Comments (RFC) 1738, Uniform
`Resource Locators (URL), Dec. 1994
`
`James Coates, A Mailbox in Cyberspace Brings World to Your PC,
`Chicago Tribune, Mar. 1995
`
`1010 Date-stamped excerpts from Mary Ann Pike et al., Using Mosaic
`(1994)
`
`1011 Date-stamped excerpts from Tom Lichty, The Official America Online
`for Macintosh Membership Kit & Tour Guide (2d ed. 1994)
`
`
`
`
`
`-iv-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`Facebook, Inc. respectfully submits the following Petition for Inter Partes
`
`Review of claims 189, 334, 342, 348, 465, 580, 584, and 592 of U.S. Patent No.
`
`8,694,657 (Ex. 1001) (“’657 patent”).
`
`I. MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(A)(1)
`A. Real Party-In-Interest under 37 C.F.R. § 42.8(b)(1)
`The Petitioner, Facebook, Inc. (“Petitioner”), is the real party-in-interest.
`
`B. Related Matters under 37 C.F.R. § 42.8(b)(2)
`The ’657 patent is the subject of one pending litigation involving the
`
`Petitioner: Windy City Innovations, LLC v. Facebook, Inc., Case No. 4:16-cv-
`
`1730-YGR (N.D. Cal.), in which the patent owner contends that the Petitioner
`
`infringes the ’657 patent.
`
`C. Lead and Back-Up Counsel under 37 C.F.R. § 42.8(b)(3)
`Petitioner provides the following designation of counsel.
`
`LEAD COUNSEL
`Heidi L. Keefe (Reg. No. 40,673)
`hkeefe@cooley.com
`zpatdcdocketing@cooley.com
`COOLEY LLP
`ATTN: Patent Group
`1299 Pennsylvania Ave., NW, Suite 700
`Washington, DC 20004
`Tel: (650) 843-5001
`Fax: (650) 849-7400
`
`
`BACK-UP COUNSEL
`Phillip E. Morton (Reg. No. 57,835)
`pmorton@cooley.com
`zpatdcdocketing@cooley.com
`COOLEY LLP
`ATTN: Patent Group
`1299 Pennsylvania Ave., NW, Suite 700
`Washington D.C. 20004
`T: (703) 456-8668
`F: (703) 456-8100
`Andrew C. Mace (Reg. No. 63,342)
`amace@cooley.com
`zpatdcdocketing@cooley.com
`
`
`
`
`
`-1-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`
`LEAD COUNSEL
`
`BACK-UP COUNSEL
`COOLEY LLP
`ATTN: Patent Group
`1299 Pennsylvania Ave., NW, Suite 700
`Washington, DC 20004
`Tel: (650) 843-5808
`Fax: (650) 849-7400
`
`
`
`Service Information
`
`D.
`This Petition is being served to the current correspondence address for the
`
`’657 patent, PETER K. TRZYNA, ESQ., P.O. Box 7131, Chicago, IL 60680. The
`
`Petitioner may be served at the addresses provided above for lead and back-up
`
`counsel, and consents to electronic service at those addresses.
`
`Power of Attorney
`
`E.
`Filed concurrently in accordance with 37 C.F.R. § 42.10(b).
`
`II.
`
`PAYMENT OF FEES - 37 C.F.R. § 42.103
`
`This Petition requests review of eight (8) claims of the ’657 patent.
`
`Accordingly, a payment of $23,000 is submitted herewith. This payment is
`
`calculated based on a $9,000 request fee (for up to 20 claims), and a post-
`
`institution fee of $14,000 (for up to 15 claims). See 37 C.F.R. § 42.15(a). This
`
`Petition meets the fee requirements of 35 U.S.C. § 312(a)(1).
`
`
`
`
`
`-2-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`III. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R. §§ 42.104
`AND 42.108
`
`A. Grounds for Standing under 37 C.F.R. § 42.104(a)
`The Petitioner certifies that the ’657 patent is available for inter partes
`
`review and that the Petitioner is not barred or otherwise estopped from requesting
`
`inter partes review on the ground identified in the present Petition.
`
`B.
`
`Identification of Challenge under 37 C.F.R. § 42.104(b) and
`Statement of Precise Relief Requested
`The Petitioner requests that the Board initiate inter partes review of claims
`
`189, 334, 342, 348, 465, 580, 584, and 592 on the following ground:
`
`Ground
`1
`
`Claims
`189, 334, 342,
`348, 465, 580,
`584, 592
`
`Basis for Challenge
`Unpatentable over Roseman in view of Rissanen and
`Vetter, in further view of Pike and Lichty, under 35
`U.S.C. § 103(a)
`
`Part V below provides a detailed explanation as to why the challenged
`
`claims are unpatentable based on the grounds identified above. The Petitioner has
`
`also submitted an accompanying Declaration of Tal Lavian, Ph.D. (“Lavian
`
`Decl.”) (Exhibit 1002), a technical expert with more than two decades of relevant
`
`experience, including extensive experience in computer programming and software
`
`development. (Lavian Decl., Ex. 1002, ¶¶ 2-9, Ex. A.)
`
`C. Requirements for Inter Partes Review 37 C.F.R. § 42.108(c)
`The Board should institute inter partes review of claims 189, 334, 342, 348,
`
`465, 580, 584, and 592 because this Petition establishes a reasonable likelihood of
`
`-3-
`
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`prevailing. Each limitation of each challenged claim is disclosed and/or suggested
`
`by the prior art, as explained in detail in Part V below.
`
`IV. CLAIM CONSTRUCTION UNDER 37 C.F.R. § 42.104(B)(3)
`“token”
`A.
`Each independent claim addressed in this Petition recites a database that
`
`provides a “repository of tokens” used to perform user authentication. Claim 1, for
`
`example, recites “authenticating a first user identity and a second user identity
`
`according to permissions retrieved from [a] repository of tokens of the database.”
`
`The patent describes a “token” as follows:
`
`With regard to the arbitrating of the controller computer 3 is directed
`by the controller computer program 2 to use “identity tokens”, which
`are pieces of information associated with user identity. The pieces of
`information are stored in memory 11 in a control computer database,
`along with personal information about the user, such as the user’s age.
`
`(’657, 7:49-54 (underlining added).) The specification goes on to describe several
`
`exemplary uses for tokens. (’657, e.g., 7:60-61, 8:2-4, 8:7-9.)
`
`Based on the definitional language in the written description, the term
`
`“token” should be interpreted as a “piece of information associated with user
`
`identity.” (Lavian Decl. ¶¶ 17, 18.)
`
`
`
`
`
`-4-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`“pointer”
`B.
`The term “pointer” appears in independent claims 189 and 465. “Pointers”
`
`are well‐known in computer science and exist at all levels of computer system
`
`design. (Lavian Decl. ¶ 19.) To persons of ordinary skill in the art, a “pointer” is a
`
`piece of information that “points to,” or references, other information. (Id.)
`
`The written description provides only the following mention of pointers,
`
`which identifies a Uniform Resource Locator (URL) as an example of a pointer:
`
`The present invention comprehends communicating all electrically
`communicable multimedia information as Message 8, by such means
`as pointers, for example, URLs. URLs can point to pre-stored audio
`and video communications, which the Controller Computer 3 can
`fetch and communicate to the Participator Computers 5.
`
`(’657, 5:11-16.) Based on this description, the term “pointer” should be construed
`
`as a “piece of information that points to or references other information.”
`
`(Lavian Decl. ¶¶ 19, 20.)
`
`V. THE CHALLENGED CLAIMS ARE UNPATENTABLE
`Claims 189, 334, 342, 348, 465, 580, 584, and 592 would have been obvious
`
`to a person of ordinary skill in the art based on the following grounds:
`
`Ground Claims
`1
`189, 334,
`342, 348,
`465, 580,
`584, 592
`
`Basis for Challenge
`Unpatentable over Roseman in view of Rissanen and
`Vetter, in further view of Pike and Lichty,
`under 35 U.S.C. § 103(a)
`
`
`
`
`
`-5-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`The Petitioner notes that although Ground 1 cites five prior art references,
`
`Roseman is the base reference that discloses the majority of the limitations. The
`
`other references relate to minor claim features that, as shown below, were within
`
`the general knowledge of persons of ordinary skill in the art as of April 1996.1 For
`
`example, Rissanen is cited to show that the tokens in Roseman could be stored in a
`
`“database,” Vetter to show that Roseman could have been adapted to communicate
`
`over the “Internet,” Pike to show that Roseman could have used “URLs,” and
`
`Lichty to show basic and known features of America Online chat rooms. These
`
`details were so commonplace and known that additional prior art references were
`
`arguably not required to show them. Nevertheless, the Petitioner is mindful of the
`
`Board’s desire for IPR petitioners to avoid presentation of potentially redundant
`
`grounds, and as such, the Petitioner has presented a single obviousness ground
`
`rather than present multiple alternative grounds with alternative combinations of
`
`these references.
`
`
`1 As explained by Dr. Lavian, a person of ordinary skill in the art as of April 1996
`
`would have had at least a bachelor’s degree in electrical engineering or computer
`
`science (or equivalent degree or experience) with practical experience or
`
`coursework in the design or development of systems for network-based
`
`communication between computer systems. (Lavian Decl., Ex. 1002, ¶ 13.)
`
`
`
`
`
`-6-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`The Petitioner also notes that the ’657 patent contains 671 separate claims –
`
`an enormous number, many of them reciting substantially the same or identical
`
`claim language. In order to best conserve the resources of the Board, the Petitioner
`
`has chosen to challenge only a handful of claims, which appear to be representative
`
`of other claims. The Petitioner’s choice to challenge only a handful of claims is
`
`not a concession that any of the other claims recite inventive subject matter.
`
`A. Brief Summary and Date Qualification of the Prior Art
`Brief Overview of Roseman (Ex. 1003)
`1.
`Roseman, entitled “Server Based Virtual Conferencing,” discloses a system
`
`for creating a virtual conference room that allows participants to collaborate in real
`
`time over a computer network. Roseman qualifies as prior art under at least 35
`
`U.S.C. § 102(e) (pre-AIA) because it is a patent issuing from an application filed
`
`on May 13, 1992, before the filing of the earliest application to which the patent
`
`could claim priority (April 1, 1996). This Petition cites Roseman for the majority
`
`of the limitations in the challenged claims.
`
`The conferencing system in Roseman “allows multiple persons, at different
`
`locations, to hold a conference, by providing many of the conveniences which the
`
`participants would have if present together in the same physical room.” (Roseman,
`
`1:19-23.) Roseman describes “a virtual conferencing system which allows
`
`multiple persons to view, and also manipulate, a common video display, which is
`
`
`
`
`
`-7-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`simultaneously displayed at their different locations.” (Roseman, 1:28-31.) Each
`
`participant has its own “local computer.” (Roseman, 1:34-35; see also id., 2:64-
`
`65.) “When a conference is established, the local computers become connected to
`
`a host computer, via commercially available Local Area Networks (LANs) and
`
`Wide Area Networks (WANs).” (Roseman, 1:36-41; see also id., 3:14-19.)
`
`A user in Roseman creates a virtual conference room by clicking an
`
`appropriate icon through a user interface, identifying the participants of the
`
`conference and providing other information such as the rules that govern the
`
`meeting. (Roseman, 3:22-56.) Once the parameters of the conference are
`
`established, the host computer “creates the conference room. The host does this by
`
`creating a common image, such as that shown in FIG. 9. The common image
`
`includes a picture of each invitee, a ‘table,’ and the room decor.” (Roseman, 7:30-
`
`34.) An example of the virtual conference room is shown in Figure 9 below:
`
`
`
`
`
`-8-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`
`
`
`(Roseman, Fig. 9.)
`
`Once inside the conference room, “[o]bjects (documents) can be shared in
`
`the conference room by placing them on the table. This might be done by dragging
`
`an icon . . . onto the table.” (Roseman, 11:18-22.) The user can also click on the
`
`picture of another participant to engage in a private voice conversation, or drag a
`
`textual note onto the picture of another participant to send a private text message.
`
`(Roseman, 9:16-31.) Other communication features are described below.
`
`Roseman also discloses a security mechanism in which users must be invited
`
`and have an appropriate “key” to enter the conference room. (Roseman, e.g., 9:34-
`
`55, 10:61-64 (“To open a door with a key, the user drops the key onto the door
`
`lock. If the key is valid and the user has the authority to use the key, the door
`
`
`
`
`
`-9-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`opens and the user is admitted to the room.”).) Roseman also discloses a database
`
`that stores the keys for the conference room. (Roseman, 9:49-50.) These
`
`conference room “keys,” as explained below, correspond to the “tokens” recited in
`
`the independent claims. More details about Roseman are set forth below.
`
`Brief Overview of Rissanen (Ex. 1004)
`2.
`Each independent claim recites “a database which serves as a repository
`
`of tokens for other programs to access.” As noted above, the “keys” in Roseman
`
`disclose the claimed “tokens,” and those keys are stored on the central host
`
`computer. But Roseman does not use the word “database” to describe the storage
`
`of keys by the host. In the event it is argued that Roseman fails to disclose a
`
`“database” that stores the keys, as recited by the claims, this requirement would
`
`have been trivially obvious over Rissanen.
`
`Rissanen, entitled “Password Verification System,” discloses a technique for
`
`user authentication using passwords stored in a database. Rissanen qualifies as
`
`prior art under at least 35 U.S.C. § 102(b) (pre-AIA).
`
`This Petition cites Rissanen as an alternative basis to teach “a database
`
`which serves as a repository of tokens for other programs to access,” in the
`
`event it is argued that Roseman alone does not disclose this limitation. Rissanen
`
`discloses storing user passwords in a database, and subsequently using those stored
`
`passwords to verify user identity when users subsequently attempt to log-on.
`
`
`
`
`
`-10-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`(Rissanen, Ex. 1004, 1:21-28.) Rissanen also discloses that user login and
`
`password information may be stored in a database. (Rissanen, 2:22-29.) Although
`
`Rissanen also describes using spoken voice passwords, this Petition cites it for its
`
`more pedestrian teachings relating to database storage of passwords of any form.
`
`As explained in detail below, the user and password information in the
`
`database in Rissanen is analogous to the conference room “keys” in Roseman. It
`
`would have been obvious to combine Roseman and Rissanen to produce the virtual
`
`conferencing system of Roseman in which the conference room keys are stored in
`
`a database serving as a repository of tokens (keys) for other programs to access, as
`
`taught in Rissanen. (Lavian Decl. ¶¶ 33, 51-53.)
`
`Brief Overview of Vetter (Ex. 1005)
`
`3.
`Each independent claim also recites the step of sending and/or receiving
`
`communications “via the Internet.” Roseman discloses using “commercially
`
`available” Wide Area Networks (WANs) to communicate with participator
`
`computers, but does not specifically the Internet. (Roseman, 1:37-41; see also id.,
`
`3:14-19.) Vetter, entitled “Videoconferencing on the Internet,” discloses software
`
`tools for enabling videoconferencing over the Internet. Vetter qualifies as prior art
`
`under at least 35 U.S.C. § 102(b). This Petition cites Vetter for the straightforward
`
`proposition that simply adding “the Internet” to an existing computer-based
`
`conferencing products does not render it non-obvious over the prior art. Vetter
`
`
`
`
`
`-11-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`confirms that the Internet was already being used with conferencing systems such
`
`as Roseman to enable real-time communication. (Vetter, Ex. 1005, at p. 77.)
`
`Brief Overview of Pike (Ex. 1006)
`4.
`Pike, entitled Using Mosaic, is a book describing NCSA Mosaic, one of the
`
`early browsers for accessing the World Wide Web. (Pike, Ex. 1006, at 1-2.) This
`
`Petition cites Pike in connection with claims that recite a “pointer” or “URL.”
`
`As explained below, Roseman discloses a pointer in the form of a clickable
`
`icon that, when clicked by a meeting participant, presents a document, message or
`
`other content to the user. (Roseman, Ex. 1003, e.g., 14:53-57 & 14:59-62 (icon
`
`representing document placed on table), 9:28-31 (icon representing private
`
`message).) Roseman does not expressly disclose a URL.
`
`URLs are used today to identify hundreds of millions of resources located on
`
`the Internet, and were clearly not an invention of the ’657 patent. Pike, which was
`
`published in 1994, provides an introductory section describing basic Internet
`
`concepts such as URLs. (Pike, Ex. 1006, at 38-39.) Pike explains that “[a] URL is
`
`a complete description of an item, including the location of the item that you want
`
`to retrieve.” (Id. at 38 (italics in original).) “The location of the item can range
`
`from a file on your local disk to a file on an Internet site halfway around the
`
`world.” (Id.) Pike further explains that a URL can identify any resource on the
`
`Internet, and “is not limited to describing the location of WWW [World Wide
`
`
`
`
`
`-12-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`Web] files.” (Id.) Pike goes onto describe the familiar URL syntax and how URLs
`
`identify documents that can be retrieved from other computers. (Id. at 38-39.) As
`
`demonstrated below, it would have been obvious to a person of ordinary skill in the
`
`art to adapt known URL techniques to Roseman. (Lavian Decl. ¶¶ 91-94.)
`
`Brief Overview of Lichty (Ex. 1007)
`5.
`Lichty, entitled The Official America Online for Macintosh Membership Kit
`
`& Tour Guide (2d ed. 1994), is a book describing aspects of the service known as
`
`“America Online.” Lichty describes “chat room” features, analogous to the virtual
`
`conference rooms of Roseman, that allowed users to send real-time messages to
`
`each other over a computer network. (Lichty, e.g., pp. 252-278.) Lichty qualifies
`
`as prior art under at least 35 U.S.C. § 102(b) (pre-AIA).
`
`This Petition cites Lichty in connection with features recited in each
`
`independent claim relating to censoring data. Lichty describes a “chat room”
`
`functionality that allows individual users to “censor” other users in the chat room.
`
`For example, a user in a chat room can decide to “ignore” other users and thus no
`
`longer receive communications from them. (Lichty, pp. 269, 510 (definition of
`
`“Ignore”).) It would have been obvious to a person of ordinary skill in the art to
`
`add these features to the system of Roseman. (Lavian Decl. ¶¶ 104-106.)
`
`
`
`
`
`-13-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`B. Ground 1: Claims 189, 334, 342, 348, 465, 580, 584, and 592 Are
`Obvious Over Roseman, Rissanen, Vetter, Pike, and Lichty
`1.
`
`Independent Claim 189
`a.
`
`“A method of communicating via an Internet network
`by using a computer system including a controller
`computer and a database which serves as a repository
`of tokens for other programs to access, thereby
`affording information to each of a plurality of
`participator
`computers which
`are
`otherwise
`independent of each other, the method including:”
`(Claim 189, Preamble)
`
`Roseman in view of Vetter discloses each aspect of the preamble of claim
`
`189. Because of the length of the preamble, this Petition will break up the claim
`
`language piece-by-piece to ensure all limitations are covered.
`
`First, Roseman discloses “[a] method of communicating . . . by using a
`
`computer system including a controller computer and a database which serves
`
`as a repository of tokens for other programs to access,” as recited in the first
`
`part of the preamble. Roseman discloses a virtual conferencing system in which
`
`users (e.g., conference participants) communicate over a network. For example:
`
`The parties send the information which they want displayed, such as
`drawings, to the host computer. The host computer generates a
`common video screen, which it distributes to the parties: they see the
`drawings at their own local computers. Each party can move a pointer
`on the display, and point to features on the drawings. The telephones
`and video cameras allow the parties to see and speak with each other.
`
`
`
`
`
`-14-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`(Roseman, 1:42-49.) In addition, “[t]he participants can privately whisper or pass
`
`notes to each other, without the knowledge of the others.” (Roseman, 2:49-50.)
`
`Further details on how Roseman discloses communication among users is set forth
`
`in the discussion of later claim limitations.
`
`The preamble of claim 189 continues by reciting that the computer system
`
`“include[es] a controller computer and a database which serves as a
`
`repository of tokens for other programs to access, . . .” The “controller
`
`computer” in Roseman takes the form of a networked server computer, which
`
`Roseman calls the “host computer” or “host”:
`
`These individual [participant] systems are located at different
`geographic locations, and, when a virtual conference is to be held,
`become connected to a central, host, computer (or multiplicity of host
`computers) via the proper combination of Local Area Networks
`(LANs) and Wide Area Networks (WANs).
`
`(Roseman, 3:14-19 (underlining added), 1:50-52 (“The host controls many of the
`
`events occurring during the conference, as well as those occurring both during
`
`initiation of the conference and after termination of the proceedings.”).)
`
`Roseman also discloses “a database which serves as a repository of
`
`tokens for other programs to access.” The tokens in Roseman take the form of
`
`“keys,” which are stored and distributed by the host computer to potential
`
`conference participants. More specifically, Roseman explains that in creating a
`
`
`
`
`
`-15-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`new virtual conference room, the creator can cause the host to send invitations to
`
`participants. Each invitation contains a “key” that relates to the identity of the
`
`invitee and provides the permissions allowing access to the conference room:
`
`Before an invitation list is compiled, the level of invitations must be
`specified by the invitor. Three levels of invitations are considered.
`1. an invitation is for the Invitee only.
`2. an invitation is for the Invitee, but can be passed to a
`delegate, who will attend in place of the Invitee.
`3. an invitation is an open invitation to anyone wishing to
`attend.
`Invitations contain “keys” which conform to the above invitation
`level. Level 1 keys may not be passed to any other person and may
`not be copied. Level 2 keys may be passed to exactly one other person
`and may not be copied. If the key is returned to the original invitee
`than it may be passed again. Level 3 keys may be freely distributed
`and copied. The meeting is considered to be public.
`The meeting room “knows” about each key and its invitation level.
`Persons with improper keys are not admitted to the room. A person
`without a key may be admitted to the room only by someone already
`in the room or by the person responsible for the room.
`Invitations and keys are distributed electronically. The key is an
`electronic object attached to the invitation.
`
`(Roseman, 9:34-55 (underlining added).)
`
`
`
`
`
`-16-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`The passages above show that the “keys” in Roseman qualify as “tokens”
`
`because they are pieces of information associated with a user identity, that control
`
`whether a user has permission to enter a conference room. Roseman confirms that
`
`a key is a “piece of information” by stating that “the key is, essentially, a block of
`
`data, or a code.” (Roseman, 6:60-61; see also id., 9:54-55 (“The key is an
`
`electronic object attached to the invitation.”).)
`
`Roseman also confirms that a “key” is associated with a user identity. For
`
`example, the “Level 1” key described in the passage above is associated with a
`
`single invitee, and cannot be passed to or used by any other person. (Roseman,
`
`9:37, 9:43-44.) The key is also used to determine whether or not a user will be
`
`allowed access to the conference room. (Roseman, 10:61-64 (“To open a door
`
`with a key, the user drops the key onto the door lock. If the key is valid and the
`
`user has the authority to use the key, the door opens and the user is admitted to the
`
`room.”) (underlining added).) The “keys” therefore qualify as “tokens.”
`
`Roseman also discloses that the host computer has a “database which
`
`serves as a repository” of keys (tokens), because the host computer stores the
`
`keys for a particular conference room. In particular, Roseman discloses that a
`
`“meeting room” is stored on the host computer. (Roseman, 9:61-63 (“Meeting
`
`Facilitator (or Requestor) creates [sic] meeting room on a host computer which is
`
`accessible to all Invitees.”), 7:30-31 (“[T]he host creates the conference room.”),
`
`
`
`
`
`-17-
`
`
`
`
`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`12:16-18 (“The conference room itself is actually a combination of stored data and
`
`computer programs.”).) As noted above, Roseman explains that “[t]he meeting
`
`room ‘knows’ about each key and its invitation level. Persons with improper keys
`
`are not admitted to the room.” (Roseman, 9:49-51 (underlining added).)
`
`A copy of each key is therefore stored on the host computer – otherwise the
`
`meeting room could not “know[] about each key and its invitation level” (id.), or
`
`verify whether the invitee’s user’s key was valid in response to a request for
`
`access. (Roseman, 10:61-64.) Thus, Roseman discloses a host c