`Petitioner’s Reply
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`FACEBOOK, INC.
`Petitioner
`
`v.
`
`WINDY CITY INNOVATIONS, LLC
`Patent Owner.
`
`
`Case IPR2016-01159
`Patent 8,694,657
`
`
`PETITIONER’S REPLY
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`
`Page
`
`2.
`3.
`
`
`
`
`I.
`
`II.
`
`B.
`
`C.
`D.
`
`CLAIM CONSTRUCTION ........................................................................... 1
`A.
`“Censorship” ........................................................................................ 3
`B.
`“Database” ............................................................................................ 3
`1.
`Patent Owner’s Construction Lacks Intrinsic Support .............. 3
`2.
`Patent Owner’s Extrinsic Evidence Fails ................................... 6
`CLAIMS 189, 334, 342, 348, 465, 580, 584, AND 592 ARE
`UNPATENTABLE ......................................................................................... 8
`A.
`“Internet” .............................................................................................. 8
`1.
`Dr. Metcalfe’s Inaccurate Prediction of Internet Collapse ........ 8
`2.
`The Existence of IDSN and ATM Would Not Have
`Discouraged Use of the Internet As Disclosed in Vetter ........... 9
`“Database” .......................................................................................... 10
`1.
`The Patent Owner’s Speculative “Hash Function”
`Argument ................................................................................. 10
`Roseman and Rissanen Are Properly Combinable .................. 12
`Roseman + Rissanen Disclose A “Database” Even Under
`The Patent Owner’s Erroneous Construction .......................... 14
`The Patent Owner’s “Tokens” Arguments Fail ................................. 15
`“Other Programs to Access” .............................................................. 17
`1.
`Conference Rooms in Roseman Are Separate Programs ........ 18
`2.
`Programs on Participator Computers ....................................... 19
`“Two Client Software Alternatives” .................................................. 20
`E.
`III. CONCLUSION ............................................................................................. 21
`
`
`
`
`
`
`
`-i-
`
`
`
`
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`
`
`Allied Erecting and Dismantling Co., Inc. v. Genesis Attachments,
`LLC,
`825 F.3d 1373 (Fed. Cir. 2016) .......................................................................... 12
`Biogen, Inc. v. Berlex Labs., Inc.,
`318 F.3d 1132 (Fed. Cir. 2003) ............................................................................ 5
`Clare v. Chrysler Group LLC,
`819 F.3d 1323 (Fed. Cir. 2016) ............................................................................ 5
`Egyptian Goddess, Inc. v. Swisa, Inc.,
`543 F.3d 665 (Fed. Cir. 2008) (en banc) .............................................................. 4
`In re Etter,
`756 F.2d 852 (Fed. Cir. 1985) (en banc) ............................................................ 13
`In re Fulton,
`391 F.3d 1195 (Fed. Cir. 2004) ............................................................................ 9
`In re Google Litigation,
`2011 WL 8603085 (N.D. Cal. 2011) .................................................................... 5
`In re Keller,
`642 F.2d 413 (C.C.P.A. 1981) ............................................................................ 12
`In re Merck & Co., Inc.,
`800 F.2d 1091 (Fed. Cir. 1986) .......................................................................... 11
`In re Mouttet,
`686 F.3d 1322 (Fed. Cir. 2012) .................................................................... 12, 13
`Moleculon Research Corp. v. CBS, Inc,
`793 F.2d 1261 (Fed. Cir. 1986) ............................................................................ 4
`PAR Pharm., Inc. v. TWI Pharm., Inc.,
`773 F.3d 1186 (Fed. Cir. 2014) ............................................................................ 9
`
`
`
`
`
`-ii-
`
`
`
`
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ............................................................ 1
`Statutes
`35 U.S.C. § 103 ........................................................................................................ 18
`
`
`
`
`
`
`
`
`
`-iii-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`
`List of Exhibits
`
`Description of Document
`Ex. No
`1001 U.S. Patent No. 8,694,657 to Daniel L. Marks
`1002 Declaration of Tal Lavian, Ph.D.
`1003 U.S. Patent No. 6,608,636 to Robert D. Roseman
`1004
`EP 0621532 A1 to Eugene Rissanen, published on April 13, 1994
`1005
`
`Ronald J. Vetter, Videoconferencing on the Internet, Computer, IEEE
`Computer Society, Vol. 28, No. 1, at pp.77-79 (Jan. 1995)
`
`1006
`1007
`
`1008
`
`Excerpts from Mary Ann Pike et al., Using Mosaic (1994)
`
`Excerpts from Tom Lichty, The Official America Online for Macintosh
`Membership Kit & Tour Guide (2d ed. 1994)
`
`Tim Berners-Lee et al., Request for Comments (RFC) 1738, Uniform
`Resource Locators (URL), Dec. 1994
`
`1009
`
`James Coates, A Mailbox in Cyberspace Brings World to Your PC,
`Chicago Tribune, Mar. 1995
`1010 Date-stamped excerpts from Mary Ann Pike et al., Using Mosaic
`(1994)
`1011 Date-stamped excerpts from Tom Lichty, The Official America Online
`for Macintosh Membership Kit & Tour Guide (2d ed. 1994)
`
`1012
`Biography of Mark. R. Weinstein
`1013 Declaration of Mark R. Weinstein ISO Motion for Pro Hac Vice
`Admission
`
`[Reserved]
`
`1014
`1015
`[Reserved]
`1016 Deposition Transcript of Jaime G. Carbonell (June 26, 2017)
`
`
`
`
`
`-iv-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`
`List of Exhibits
`
`1017
`1018
`
`1019
`
`1020
`1021
`
`Excerpts from Henry F. Korth et al., Database System Concepts (1991)
`
`Excerpts from IEEE Internet Computing, “Bob Metcalfe on What’s
`Wrong with the Internet: It’s the Economy, Stupid” (March 1997)
`
`Reuters article entitled “Sage who warned of Net’s collapse eats his
`words” (April 11, 1997)
`
`Excerpts from Mary Loomis, The Database Book (1988)
`
`Second Declaration of Tal Lavian, Ph.D.
`
`
`
`
`
`-v-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`
`Petitioner respectfully submits this Reply in support of Inter Partes Review
`
`of U.S. Patent No. 8,694,657 (Ex. 1001) (“’657 patent”) and addressing Patent
`
`Owner’s Response (Paper 22 (“Response”)). This Reply is supported by the
`
`Second Declaration of Tal Lavian, Ph.D. (Ex. 1021 (“Second Lavian Decl.”)).
`
`I.
`
`CLAIM CONSTRUCTION
`The patent owner’s response recycles the failed claim construction
`
`arguments made in its Preliminary Response with respect to the terms
`
`“censorship” and “database.” The patent owner’s arguments rely entirely on
`
`extrinsic evidence and ignore the patent specification, which the Federal Circuit
`
`has instructed is “the single best guide to the meaning of a disputed term.” Phillips
`
`v. AWH Corp., 415 F.3d 1303, 1321 (Fed. Cir. 2005) (en banc).
`
`The Institution Decision correctly rejected the patent owner’s narrow
`
`constructions of “censorship” and “database,” and the patent owner has done
`
`nothing to justify any deviation from that decision. To the contrary, the patent
`
`owner has doubled down on those positions by simply recycling verbatim, through
`
`a different expert witness (Dr. Carbonell), the failed opinions made by the patent
`
`owner’s previous expert (Dr. Bajaj) submitted with the Patent Owner Preliminary
`
`Response. (Compare Carbonell Decl., Ex. 2005, ¶64 (censorship), ¶¶32-37
`
`(database) with Bajaj Decl., Ex. 2001, ¶29 (identical language re censorship), ¶¶19-
`
`24 (identical language re database).) Because the patent owner simply recycled its
`
`-1-
`
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`pre-institution arguments,1 the patent owner and its expert do not acknowledge, let
`
`alone address, the valid criticisms made by the Board. The Board should therefore
`
`adhere to its claim construction positions.
`
`
`1 The verbatim recycling of patent owner’s pre-institution argument raises a
`
`credibility issue with respect to patent owner’s current expert, Dr. Carbonell.
`
`Substantial portions of Dr. Carbonell’s declaration were copied directly, with little
`
`or no change, from the declaration of Dr. Bajaj (Ex. 2001) filed six months earlier
`
`with the patent owner’s Preliminary Response. (Compare Ex. 2001 (Bajaj), ¶¶19-
`
`24, 29 with Ex. 2005 (Carbonell), ¶¶32-37, 64.) Although one expert may in
`
`appropriate circumstances review and adopt the opinions of another expert, Dr.
`
`Carbonell’s declaration never acknowledges or references Dr. Bajaj’s declaration,
`
`and Dr. Carbonell claimed to have no knowledge of Dr. Bajaj’s declaration when
`
`asked about it during his deposition. (Ex. 1016, 132:2-12.) The Petitioner
`
`respectfully submits that the wholesale copying (without attribution) of entire
`
`portions Dr. Bajaj’s declaration is a factor the Court should consider in
`
`determining the evidentiary weight, if any, to which Dr. Carbonell’s opinions
`
`should be afforded.
`
`
`
`
`
`-2-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`
`A.
`“Censorship”
`The Board correctly observed in the Institution Decision that the patent
`
`owner’s proposed construction of “censorship” ignores express statements in the
`
`patent specification and instead relies on extrinsic evidence. (IPR2016-01159
`
`Paper 7 (“Decision”) at 11-12; Second Lavian Decl. ¶¶8-9.) Because the patent
`
`owner has simply presented the identical argument it made pre-institution, the
`
`Board should again reject the patent owner’s narrow construction.
`
`B.
`“Database”
`The patent owner repeats its arguments from its Preliminary Response that
`
`“database” should be construed as “a collection of logically-related data which is
`
`stored with persistence and associated tools for interacting with the data such as a
`
`DBMS.” (Response at 12.) In related IPR2016-01158, the Board construed
`
`“database” to mean “a collection of logically related data.” (IPR2016-01158 Paper
`
`7 at 10.) That construction is generally consistent with the plain and ordinary
`
`meaning of “database” to a person of ordinary skill in the art in 1996. (Lavian
`
`Second Decl. ¶11.) The patent owner’s construction should again be rejected.
`
`1.
`Patent Owner’s Construction Lacks Intrinsic Support
`The written description contains only a few sentences that mention the
`
`database, and none of those sentences require that the database be implemented in
`
`any particular way. (’245, 8:6-15; ’356, 8:9-21; ’552, 7:61-8:5; ’657, 7:49-59.)
`
`
`
`
`-3-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`The specification says nothing about data in the database being “stored with
`
`persistence,” or the database having “associated tools for interacting with the data
`
`such as a DBMS,” as the patent owner proposes. The terms “DBMS” or “database
`
`management system” appear nowhere in the written description or claims. There is
`
`simply no support in the intrinsic record for the patent owner’s proposed
`
`construction of “database.”
`
`The only intrinsic evidence the patent owner can muster is its own self-
`
`serving arguments submitted to the PTO on an IDS filed on January 14, 2017 (Ex.
`
`2008) during prosecution of a related application (14/246,965). (Response at 9.)
`
`These statements carry no weight in these proceedings for at least two reasons.
`
`First, the Federal Circuit has made clear that self-serving statements during
`
`the pendency of another proceeding, such as those made in the IDS, are entitled to
`
`no weight. The IDS was not submitted in response to any action by the PTO, and
`
`was filed by the patent owner after IPR was instituted and after the PTAB
`
`expressly rejected the patent owner’s narrow construction of “database.” The
`
`statements in the IDS conveniently track the construction the patent owner seeks
`
`here. And although the IDS claims to have been submitted to furnish additional
`
`prior art to the PTO, its gratuitous statements about “database” do not mention or
`
`discuss any specific reference. (Ex. 2008, at 2.) In short, the IDS was obviously
`
`
`
`
`
`-4-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`submitted to place the patent owner’s “database” arguments into the file wrapper
`
`of a related application, in the hope of bolstering those arguments here.
`
`The Federal Circuit confronted a nearly identical situation in Moleculon
`
`Research Corp. v. CBS, Inc., in which a patent owner submitted self-serving
`
`statements to the PTO during the pendency of litigation involving the patent. 793
`
`F.2d 1261 (Fed. Cir. 1986), disapproved on another point, Egyptian Goddess, Inc.
`
`v. Swisa, Inc., 543 F.3d 665 (Fed. Cir. 2008) (en banc). In affording no weight to
`
`the patent owner’s statements, the Federal Circuit cautioned that statements made
`
`to the PTO during litigation “might very well contain merely self-serving
`
`statements which likely would be accorded no more weight than testimony of an
`
`interested witness or argument of counsel. Issues of evidentiary weight are
`
`resolved on the circumstances of each case.” Id. at 1270 (underlining added). In
`
`this case, the patent owner’s statements were an obvious attempt to bolster its
`
`narrow definition of “database” in this proceeding, and as such, are just as
`
`meritless there as they are in the patent owner’s response.
`
`Second, Federal Circuit law is clear that statements during the prosecution of
`
`a patent cannot expand the disclosures of its specification. See, e.g. Clare v.
`
`Chrysler Group LLC, 819 F.3d 1323, 1332 (Fed. Cir. 2016) (quoting Biogen, Inc.
`
`v. Berlex Labs., Inc., 318 F.3d 1132, 1140 (Fed. Cir. 2003) (“Representations
`
`
`
`
`
`-5-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`during prosecution cannot enlarge the content of the specification…”)); see also In
`
`re Google Litig., 2011 WL 8603085, at *4 (N.D. Cal. 2011) (noting that
`
`“prosecution is not a platform for a patentee to ‘enlarge, diminish, or vary the
`
`limitations in the claims.’”) (citation omitted). As noted above, the specification
`
`here does not say a word about the database storing the data with persistence or
`
`including a DBMS or other tools for interacting with the data. The patent owner’s
`
`self-serving arguments to the PTO cannot change the content of the specification
`
`and should be afforded no weight.
`
`2.
`Patent Owner’s Extrinsic Evidence Fails
`Having no legitimate intrinsic evidence to support its position, the patent
`
`owner relies primarily on extrinsic evidence in the form of testimony from its
`
`retained expert, Dr. Carbonell. The key to Dr. Carbonell’s opinion about the
`
`meaning of “database” is his assumption that “[t]wo hallmarks of a database are (1)
`
`persistence of the data, and (2) interactivity with the data via a database
`
`management system (DBMS).” (Carbonell Decl. ¶39.) Dr. Carbonell cites no
`
`technical treatises or other materials to support his “two hallmarks” point.
`
`But Dr. Carbonell’s opinions overlook the fact that a “database” and a
`
`“database management system” (DBMS) are two different things. The term
`
`“database” refers to the actual collection of data whereas the DMBS refers to
`
`
`
`
`
`-6-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`software tools for managing the data. (Lavian Second Decl. ¶12 (citing Korth, Ex.
`
`1017).) A DBMS is thus not properly part of the definition of a “database.” (Id.)
`
`The other flaw with Dr. Carbonell’s opinion is that a “database,” i.e., a
`
`collection of logically related data under the Board’s definition, does not require a
`
`DBMS. (Lavian Second Decl. ¶13.) It was well-known to persons of ordinary
`
`skill in the art that software programs could store and retrieve data using their own
`
`internal logic and programming, without relying on a DBMS. (Id. ¶¶13-14
`
`(discussing Mary Loomis, The Database Book (1987), Ex. 1020.) For example, it
`
`was well-known that software applications could create their own databases by
`
`accessing files using their own internal logic, without requiring separate software
`
`tools such as a DBMS. (Id. ¶13.) A person of ordinary skill in the art would have
`
`appreciated that, in fact, it might have been preferable not to use a DBMS in
`
`implementing the claimed “database” to avoid the complexity and overhead that a
`
`DBMS would have imposed. (Id. ¶16.) The Board should therefore reject the
`
`patent owner’s unsupported definition of “database.”2
`
`
`2 As explained in more detail in Part II.B, infra, even if the Board were to adopt
`
`the patent owner’s “database” construction, it would not distinguish the prior art.
`
`
`
`
`
`-7-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`II. CLAIMS 189, 334, 342, 348, 465, 580, 584, AND 592 ARE
`UNPATENTABLE
`A.
`“Internet”
`The patent owner presents various arguments for why, according to the
`
`patent owner, Roseman and Vetter cannot be combined to show the “Internet” as
`
`recited in the claims. These arguments are baseless.
`
`1.
`Dr. Metcalfe’s Inaccurate Prediction of Internet Collapse
`In arguing that a person of ordinary skill in the art would not have been
`
`motivated to use the Internet to implement the system of Roseman, the patent
`
`owner and its expert point to a statement by Bob Metcalfe in late 1995 predicting
`
`that the Internet “will soon go spectacularly supernova and in 1996 catastrophically
`
`collapse.” (Carbonell Decl. ¶57; Response at 28.) But the incorrect prediction of a
`
`single individual would not have discouraged (and did not discourage) the industry
`
`from using the Internet. (Lavian Second Decl. ¶¶22, 25.) History quickly proved
`
`Dr. Metcalfe’s prediction to be wrong, and he retracted it. (Id., ¶22.) There is no
`
`evidence that people in the industry, including Dr. Metcalfe, took the prediction
`
`seriously or altered their behavior based on it.3
`
`3 Dr. Metcalfe retracted his prediction in dramatic fashion by literally eating his
`
`words. In 1997, he reportedly took a printed copy of his article that predicted the
`
`collapse of the Internet, placed it in a blender with some liquid, and then consumed
`
`
`
`
`
`-8-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`
`2.
`
`The Existence of IDSN and ATM Would Not Have
`Discouraged Use of the Internet As Disclosed in Vetter
`The patent owner also asserts that a person of ordinary skill in the art would
`
`not have used the Internet to implement the system of Roseman because other
`
`communication technologies, such as ISDN and ATM, were allegedly more
`
`suitable. But Federal Circuit law is clear that the existence of alternatives to the
`
`Internet, even if those alternatives might have been advantageous in some respects,
`
`does not teach away from use of the Internet or render the Internet non-obvious.
`
`See In re Fulton, 391 F.3d 1195, 1200 (Fed. Cir. 2004) (“[O]ur case law does not
`
`require that a particular combination must be the preferred, or the most desirable,
`
`combination described in the prior art in order to provide motivation for the current
`
`invention.”); PAR Pharm., Inc. v. TWI Pharm., Inc., 773 F.3d 1186, 1197–98 (Fed.
`
`Cir. 2014) (“Our precedent, however, does not require that the motivation be the
`
`best option, only that it be a suitable option from which the prior art did not teach
`
`away.”). The patent owner’s arguments are also undermined by statements in
`
`Vetter demonstrating that the Internet was entirely suitable for conferencing
`
`systems such as the one described in Roseman. (Lavian Second Decl. ¶21.)
`
`the pulp. (Ex. 1019.) Dr. Metcalfe also reportedly predicted (again incorrectly)
`
`that wireless networking technologies would die out by the mid 1990s.
`
`<https://en.wikipedia.org/wiki/Robert_Metcalfe> (last visited July 12, 2017).
`
`
`
`
`
`-9-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`
`For example, the patent owner does not address Vetter’s unequivocal
`
`statement that “[v]ideoconferences are becoming increasingly frequent on the
`
`Internet and generating much research interest.” (Vetter, Ex. 1005, p.77.)
`
`Although Vetter describes various challenges encountered during the virtual
`
`classroom project he described, it provides clear motivation to use conferencing
`
`systems over the Internet and an expectation that doing so would be successful.
`
`(Lavian Second Decl. ¶21.) Dr. Lavian provided a full explanation in his opening
`
`declaration as to why the challenges reported in Vetter were nothing more than
`
`garden variety networking issues that would not have discouraged a person of
`
`ordinary skill in the art from combining with Roseman, particularly given the
`
`numerous express motivations to combine in Vetter. (Ex. 1002, Lavian Decl.
`
`¶¶61-66.) The patent owner did not address any of those arguments.
`
`B.
`“Database”
`The patent owner next presents a series of arguments asserting that Roseman
`
`and Rissanen do not disclose the claimed “database which serves as a repository of
`
`tokens for other programs to access.” These arguments fail.
`
`1.
`
`The Patent Owner’s Speculative “Hash Function”
`Argument
`As explained in the Petition, the “keys” in Roseman correspond to the
`
`claimed “tokens.” Roseman explains that “meeting room ‘knows’ about each key
`
`
`
`
`
`-10-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`and its invitation level.” (Roseman, 9:49-50 (emphasis added).) The meeting
`
`room is, in turn, stored on the host. (Id., 9:61-63, 7:30-31, 12:16-18.)
`
`The patent owner speculates that the host computer in Roseman may not
`
`actually store the keys because, according to the patent owner, the meeting room in
`
`Roseman could have applied a “hash function” to determine if a key is valid. “In
`
`this manner,” according to the patent owner, “a room can ‘know’ about a key
`
`without storing any particular keys.” (Carbonell Decl. ¶40; see also Response at
`
`21.) This argument should be rejected for at least two reasons.
`
`First, the patent owner’s “hash function” argument is legally irrelevant to the
`
`legal question of obviousness. Federal Circuit law is clear that “[n]on-obviousness
`
`cannot be established by attacking references individually where the rejection is
`
`based upon the teachings of a combination of references.” In re Merck & Co., Inc.,
`
`800 F.2d 1091, 1097 (Fed. Cir. 1986). The patent owner’s hash function argument
`
`attacks Roseman individually but ignores the fact that the Petition cited Roseman
`
`in combination with Rissanen to show that it would have been obvious to store the
`
`“keys” in a database. (Petition at 18-20.) The patent owner concedes in its
`
`Response that “Rissenan [sic] does disclose a database” (Response at 22), so
`
`whether Roseman itself discloses storage of keys is beside the point. Even if the
`
`
`
`
`
`-11-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`“hash function” argument had merit (which it does not), it would not diminish the
`
`fact that the claimed storage of tokens in a database is obvious in view of Rissanen.
`
`Second, the patent owner’s “hash function” argument is based on pure
`
`speculation and conjecture. Roseman does not suggest, let alone disclose, the use
`
`of any hash function for checking the validity of keys. (Second Lavian Decl. ¶29.)
`
`The use of such a “hash function” is also inconsistent with the teachings in
`
`Roseman. (Id., ¶¶29-30.) For example, the host computer in Roseman can
`
`distribute invitations to other users, the invitations including the keys associated
`
`with the meeting room. (Roseman, 4:23-25, 9:42-43, 9:54-55.) Roseman could
`
`not distribute meeting room keys to other users if, as the patent owner asserts, the
`
`host simply used a hash function and did not store any actual meeting room keys.
`
`(Second Lavian Decl. ¶29.) Nothing in Roseman suggests that the meeting room
`
`keys are somehow deleted by the host after they are distributed to other users. (Id.,
`
`¶30.) Nor would this make any sense considering Roseman’s express statement
`
`that the “meeting room ‘knows’ about each key and its invitation level” (9:49-50
`
`(emphasis added)).
`
`2.
`Roseman and Rissanen Are Properly Combinable
`The patent owner also argues that a person of ordinary skill in the art would
`
`not have been motivated to combine Rissanen and Roseman. The patent owner’s
`
`argument is based on an attempt to make the combination of Roseman and
`
`-12-
`
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`Rissanen appear more complex than it is. (Response at 22-23.) The patent owner
`
`and its expert have conjured various excuses for why the combination might be
`
`technically complicated or difficult to implement if one were to attempt to
`
`physically combine the two systems. (Id.)
`
`But this argument is contrary to established law. “The test for obviousness
`
`is not whether the features of a secondary reference may be bodily incorporated
`
`into the structure of the primary reference.” Allied Erecting and Dismantling Co.,
`
`Inc. v. Genesis Attachments, LLC, 825 F.3d 1373, 1381 (Fed. Cir. 2016) (quoting
`
`In re Keller, 642 F.2d 413, 425 (C.C.P.A. 1981)); see also In re Mouttet, 686 F.3d
`
`1322, 1332 (Fed. Cir. 2012) (“It is well-established that a determination of
`
`obviousness based on teachings from multiple references does not require an
`
`actual, physical substitution of elements.”). The test for obviousness, in other
`
`words, is “not whether the references could be physically combined but whether
`
`the claimed inventions are rendered obvious by the teachings of the prior art as a
`
`whole.” Id. (quoting In re Etter, 756 F.2d 852, 859 (Fed. Cir. 1985) (en banc)).
`
`The Petition cites Rissanen for a narrow purpose of showing disclosure of
`
`storing user identity and authentication information in a database. (Lavian Second
`
`Decl. ¶38.) There is simply nothing complicated about storing the “keys”
`
`Roseman in a database, as suggested by Rissanen. (Id.) The patent owner’s
`
`
`
`
`
`-13-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`attempt to obfuscate this straightforward combination through arguments about
`
`physical combinability should be rejected.
`
`Dr. Carbonell himself admitted at his deposition that databases as of early
`
`1996 could be used to store user identity and authentication information. (Ex.
`
`1014, Carbonell Depo. Tr., 43:17-44:7.) He further agreed that nothing in
`
`Roseman prevents storage the keys in a database. (Id., 53:16-55:3.) It would have
`
`been obvious to combine Roseman and Rissanen. (Second Lavian Decl. ¶40.)
`
`3.
`
`Roseman + Rissanen Disclose A “Database” Even Under
`The Patent Owner’s Erroneous Construction
`As explained in Part I.B above, the patent owner proposed a narrow
`
`construction of “database” that has no support in the intrinsic record. That
`
`construction is incorrect for the reasons previously identified, but even if the Board
`
`were to adopt it, the claimed “database” would still be disclosed by the
`
`combination of Roseman and Rissanen.
`
`There appears to be no dispute on this point. The patent owner devotes most
`
`of its argument about the “database” limitation to Roseman and does not appear to
`
`dispute that Rissanen discloses the claimed database. The patent owner
`
`specifically concedes in its Response that “Rissenan [sic] does disclose a
`
`database” (Response at 22), as noted above. The combination of Roseman and
`
`
`
`
`
`-14-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`Rissanen clearly disclose the claimed “database” even under the patent owner’s
`
`improperly narrow construction. (Lavian Second Decl. ¶¶36-38.)
`
`C. The Patent Owner’s “Tokens” Arguments Fail
`The Board construed “token” as a “piece of information associated with
`
`user identity,” and the patent owner does not dispute that construction. The patent
`
`owner instead argues that the keys in Roseman do not qualify as “tokens” because,
`
`according to the patent owner, they are associated with a conference room and not
`
`a user identity. (Response at 18.)
`
`The patent owner’s arguments cannot be reconciled with the plain
`
`disclosures in Roseman. For example, Roseman discloses a “Level 1” key that is
`
`“for the invitee only” and “may not be passed to any other person and may not be
`
`copied.” (Roseman, 9:37, 9:43-44.) Roseman thus clearly discloses a piece of
`
`information associated with user identity, i.e., the identity of the Invitee.
`
`The patent owner’s attempt to distinguish the “Level 1” key teachings in
`
`Roseman is confusing and hard to follow. (Response at 19-20.) The patent owner
`
`ambiguously states that the “Level 1” invitation in Roseman “offers only the
`
`suggestion of association with a specific invitee.” (Id. at 19) The patent owner
`
`continues by asserting that the key in Roseman is electronically sent with an
`
`invitation and that the invitation serves no purpose after its distribution. (Id.)
`
`“Thus, sending an invitation to a specific invitee,” the patent owner argues, “is a
`
`-15-
`
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`far stretch from disclosing a key being associated with a specific user.” (Id.) “In
`
`the case of a key being distributed as part of a Level 1 invitation,” the patent owner
`
`continues, “Roseman does not require recording any user information in the key to
`
`restrict transferability.” (Id.)
`
`But the patent owner’s argument ignores the plain language of the agreed-
`
`upon construction of “token,” which merely requires a piece of information
`
`associated with user identity. The claims do not require that the association with
`
`user identity be implemented in any particular way. Roseman expressly discloses
`
`that the “Level 1” key is “for the invitee only” and “may not be passed to any other
`
`person and may not be copied.” (Roseman, 9:37, 9:43-44.) It is hard to imagine a
`
`clearer example of a “piece of information associated with user identity” than a
`
`key that can be used only by the particular invitee.
`
`The patent owner’s argument that “Roseman does not require recording of
`
`any information in the key to restrict transferability” (Response at 19), is irrelevant
`
`because Roseman clearly discloses that transferability is in fact restricted.
`
`Restrictions on a key are enforced when the person associated with the key
`
`attempts to use the key to access the conference room. (Roseman, 10:61-64 (“To
`
`open a door with a key, the user drops the key onto the door lock. If the key is
`
`valid and the user has authority to use the key, the door opens and the user is
`
`
`
`
`
`-16-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`admitted to the room.”); Lavian Second Decl. ¶46.) The claim also does not
`
`require that the “association” with user identity be encoded into the key itself.
`
`Finally, the patent owner argues that “the tokens must be capable of serving
`
`purposes beyond authentication,” and lists five functions from the patent
`
`specification. (Response at 20.) But those functions are not recited in the claims
`
`or in the agreed-upon definition of “token.” There is no basis to argue that the
`
`claimed tokens must perform those unclaimed functions.
`
`D.
`“Other Programs to Access”
`The challenged claims also recite a “database which serves as a repository of
`
`tokens for other programs to access.” The Petition provided two separate theories
`
`for why Roseman disclosed this limitation. First, the Petition explained that the
`
`“other programs” in Roseman took the form of the various meeting and
`
`conference rooms maintained on the host computer. (Petition at 19-20.) Roseman
`
`itself states that the conference room ‘itself is actually a combination of stored data
`
`and computer programs.’” (Id. (quoting Roseman, 12:16-18).) Second, the
`
`Petition provided an alternative mapping in which the “other programs” took the
`
`form of the programs on the participator computers of invitees who present their
`
`key to the host to gain access to a conference room. (Id. at 21-22.) The patent
`
`owner addresses only the first theory and ignores the second.
`
`
`
`
`
`-17-
`
`
`
`
`
`IPR2016-01159
`Petitioner’s Reply
`
`
`
`1.
`Conference Rooms in Roseman Are Separate Programs
`With respect to the first theory identified in the Petition, the patent owner
`
`asserts that Roseman does not disclose “other programs,” plural. The gist of the
`
`patent owner’s argument is that the conference rooms in Roseman are actually just
`
`a single program. The fact that Roseman maintains multiple conference rooms,
`
`according