`
`PATENT NO. 8,694,657
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`FACEBOOK, INC.
`Petitioner
`v.
`
`WINDY CITY INNOVATIONS LLC
`Patent Owner
`
`Patent No. 8,694,657
`Issue Date: April 8, 2014
`Title: REAL TIME COMMUNICATIONS SYSTEM
`
`
`
`WINDY CITY INNOVATIONS LLC’S PRELIMINARY RESPONSE TO
`PETITION FOR INTER PARTES REVIEW OF U.S. PATENT NO.
`8,694,657
`
`Case No. IPR2016-01159
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`I.
`II.
`
`III.
`
`INTRODUCTION ........................................................................................... 1
`THE PETITION SHOULD NOT BE INSTITUTED BECAUSE
`PETITIONER'S CLAIM CONSTRUCTIONS ARE INCORRECT IN
`LIGHT OF THE SPECIFICATION, THE CLAIMS, AND THE LAW ........ 4
`A.
`Petitioner’s Proposed Construction of “Token” Is Incorrect and
`Reads Out the Database Requirement ................................................... 4
`
`B.
`
`Petitioner Does Not Propose a Construction for the Term
`“Censor” and Ultimately Reads the Term Out of the Claims ............... 6
`PETITIONER HAS NOT DEMONSTRATED A REASONBLE
`LIKELIHOOD OF SUCCESS FOR THE GROUNDS ADVANCED
`IN THE PETITION AND THE PETITION SHOULD BE DENIED. ........... 8
`A.
`Requirements for Showing Obviousness Under 35 U.S.C. §
`103. ........................................................................................................ 8
`
`B.
`
`Claim 189 is Not Obvious Over Roseman, Rissanen, Vetter,
`Pike, and Lichty. .................................................................................. 10
`
`1.
`
`2.
`
`3.
`
`Database Which Serves as a Repository of Tokens for
`Other Programs to Access, Thereby Affording
`Information to Each of a Plurality of Participator
`Computers ................................................................................. 13
`
`Communicating Via an Internet Network ................................. 17
`
`Determining Whether the First User Identity is
`Individually Censored from Sending Data in the
`Communications, the Data Presenting at least One of a
`Pointer, Video, Audio, a Graphic, and Multimedia .................. 19
`
`C.
`
`Independent Claim 465 Is Not Unpatentable ...................................... 22
`
`D. Dependent Claims 334, 342, 348, 580, 584, and 592 Are Not
`Unpatentable ........................................................................................ 23
`IV. CONCLUSION .............................................................................................. 23
`
`
`
`
`i
`
`
`
`
`
`
`
`
`EXHIBIT LIST
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`Exhibit #
`
`Exhibit Name
`
`2001
`
`2002
`
`2003
`
`2004
`
`Declaration of Dr. Chandrajit Bajaj, Ph.D.
`
`Merriam-Webster’s Collegiate Dictionary, Tenth Edition
`
`(1994)
`
`Microsoft Press Computer Dictionary, Third Edition (1997)
`
`Macmillan Encyclopedia of Computers (Gary G. Bitter ed.,
`
`Macmillan Publ. Co. 1992)
`
`ii
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Federal Cases
`Apple, Inc. v. Contentguard Holdings, Inc.,
`IPR2015-00355 (PTAB June 26, 2015) ............................................................. 10
`
`C.B. Distributors, Inc. v. Fontem Holdings 1 B.V.
`IPR2013-00387 (PTAB, Dec. 24, 2014) ............................................................ 12
`
`Callaway Golf Co. v. Acushnet Co.,
`576 F.3d 1331 (Fed. Cir. 2009) .......................................................................... 27
`
`Cisco Sys., Inc., v. C-Cation Techs., LLC,
`IPR2014-00454 (PTAB. Aug. 29, 2014) ............................................................ 11
`
`Graham v. John Deere Co.,
`383 U.S. 1 (1966) ...................................................................................... 3, 10, 12
`
`In re Kahn,
`441 F.3d 977 (Fed. Cir. 2006) ............................................................................ 11
`
`KSR Int’l Co. v. Teleflex Inc.,
`550 U.S. 398 (2007) ...................................................................................... 11, 12
`
`Plant Science, Inc. v. The Andersons, Inc.,
`IPR2014-00939 (PTAB Dec. 17, 2014) ............................................................. 11
`
`Whole Space Indus. v. Zipshade Indus.,
`IPR2015-00488 (PTAB July 24, 2015) ........................................................ 11, 12
`
`Federal Statutes
`
`35 U.S.C. § 102 .......................................................................................................... 2
`
`35 U.S.C. § 103 ........................................................................................................ 10
`
`35 U.S.C. § 311(b) ..................................................................................................... 2
`
`35 U.S.C. § 314(a) ..................................................................................................... 3
`
`
`
`iii
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`Regulations
`
`37 C.F.R. 1.75(c) ...................................................................................................... 27
`
`37 C.F.R. § 42.6(a)(3) .......................................................................................... 3, 11
`
`37 C.F.R. § 42.104(b) ............................................................................................ 2, 3
`
`
`
`
`
`iv
`
`
`
`I.
`
`INTRODUCTION
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`On June 3, 2016, Facebook Inc. (“Petitioner”) submitted a Petition (the
`
`“Petition”) to institute inter partes review (“IPR”) of U.S. Patent No. 8,694,657
`
`(Ex. 1001, “the ’657 Patent”), challenging Claims 189, 334, 342, 348, 465, 580,
`
`584, and 592 (“the Challenged Claims”). Petitioner on the same day also filed
`
`three additional petitions alleging unpatentability of related patents over some of
`
`the same prior art (IPR2016-01156, -01157, and -01158).
`
`The Petition should be denied for myriad reasons. First, the Petition should
`
`be denied because there is not a reasonable likelihood that Petitioner will succeed
`
`on any of its allegations of unpatentability, all of which rely on U.S. Patent No.
`
`6,608,636 to Roseman (“Roseman”) as a primary reference for obviousness.
`
`Roseman discloses a different type of system from the Challenged Claims,
`
`specifically Roseman discloses a “virtual conferencing system” that did not operate
`
`over the Internet. Roseman relates to a type of prior art corporate remote linking
`
`software, the very limitations of which the inventor of the ’657 Patent sought to
`
`overcome. (Ex. 1001 at 1:33-37; 1:56-59). Additionally, Roseman only discloses
`
`terminal-based communication with a server, which cannot satisfy the limitations
`
`of the ’657 Patent as it uses a different paradigm. Today, we refer to these
`
`different paradigms as a “thick client” in the case of the ’657 claims versus the
`
`“dummy terminal” approach of Roseman. As a result, Roseman’s dummy terminal
`1
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`implementation is missing many of the limitations of the claims. Petitioner admits
`
`
`
`
`
`that Roseman has deficiencies and Petitioner looks to four additional references to
`
`allegedly disclose all of the limitations of the claims.
`
`Additionally, Petitioner does not satisfy the basic requirement of an inter
`
`partes review petition by pointing out “[t]he specific statutory grounds under 35
`
`U.S.C.§ § 102 or 103 on which the challenge to the claim is based and the patents
`
`or printed publications relied upon for each ground.” 37 C.F.R. § 42.104(b)(2).
`
`The Petitioner challenges all claims under a single ground containing 8 claims and
`
`a single five-reference combination. However, it is unclear whether Petitioner is
`
`actually challenging each of the claims based on the five-reference combination.
`
`Accordingly, the Petition should be denied in its entirety for failing to meet the
`
`basic statutory criteria for an inter partes review petition.
`
`In addition to these fundamental deficiencies, Petitioner’s request for inter
`
`partes review should be denied for at least the following reasons addressed more
`
`fully below in this Preliminary Response:
`
`(1) The Petition fails to properly construe several claim terms.
`
`(2) The Petition does not “specify where each element of the claim is found
`
`in the prior art patents or printed publications relied upon,” as required by
`
`37 C.F.R. § 42.104(b)(4), because the Petition has at least one of the following
`
`deficiencies: (i) failing to map each claim term to a specific teaching from an
`2
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`asserted reference; (ii) providing citations to the asserted references that do not
`
`
`
`
`
`teach the claim elements against which such citations are applied; and
`
`(iii) mischaracterizing the citations to the asserted references.
`
`(3) The Petition fails to identify the difference(s) between the claims and the
`
`asserted references as required by Graham v. John Deere Co., 383 U.S. 1, 17–18
`
`(1966).
`
`(4) The Petition improperly attempts to support its assertions of obviousness
`
`with mere conclusory statements and by impermissibly incorporating by reference
`
`arguments from the Lavian Declaration (Ex. 1002) in violation of 37 C.F.R. §
`
`42.6(a)(3).
`
`Due to at least these deficiencies, the Petition does not establish “a
`
`reasonable likelihood that the Petitioner would prevail with respect to at least one
`
`of the claims challenged in the Petition.” 35 U.S.C. § 314(a). Patent Owner
`
`explicitly reserves the right to provide further distinctions between the prior art and
`
`the Challenged Claims. The deficiencies of the Petition noted herein, however, are
`
`sufficient for the Board to find that Petitioner has not met its burden to
`
`demonstrate a reasonable likelihood that it would prevail in showing
`
`unpatentability of any of the Challenged Claims.
`
`
`
`3
`
`
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`II. THE PETITION SHOULD NOT BE INSTITUTED BECAUSE
`PETITIONER'S CLAIM CONSTRUCTIONS ARE INCORRECT IN
`LIGHT OF THE SPECIFICATION, THE CLAIMS, AND THE LAW
`A.
`
`Petitioner’s Proposed Construction of “Token” Is Incorrect and
`Reads Out the Database Requirement
`
`The construction of the term “token” advocated by Petitioner, “a piece of
`
`information associated with user identity,” is incorrect in light of the specification
`
`because it excludes the requirement that the tokens are stored in a database.
`
`As a preliminary matter, the passage Petitioner points to as allegedly
`
`defining the term “tokens” actually defines the term “identity tokens.” Petitioner
`
`cites to the specification as follows:
`
`With regard to the arbitrating of the controller computer 3 is directed
`by the controller computer program 2 to use “identity tokens”, which
`are pieces of information associated with user identity. The pieces of
`information are stored in memory 11 in a control computer database,
`along with personal information about the user, such as the user’s age.
`
`(Ex. 1001 at 7:49-54 (underlining added by Petitioner).) Petitioner appears to be
`
`arguing that this portion of the specification is defining the term “tokens,”
`
`however, if anything, this portion only relates to a different term, “identity tokens”
`
`and Petitioner’s arguments are misplaced. (Pet. at 4.)
`
`Tokens are central to the invention of the ’657 Patent. The specification
`
`describes these tokens only in the context of a “database” that affords relationships
`
`
`
`4
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`and some permanence to the data. For example, the controller computer is
`
`
`
`
`
`described as arbitrating access to programs based on tokens, and that tokens are
`
`pieces of information associated with a user identity. The specification then goes
`
`on to state: “The pieces of information are stored in memory 11 in a control
`
`computer database, along with personal information about the user, such as the
`
`user’s age.” (Ex. 1001 at 7:52-54).
`
`The specification further states as follows:
`
`The control computer database serves as a repository of tokens for
`other programs to access, thereby affording information to otherwise
`independent computer systems. In the database, the storage of tokens
`can be by user, group, and content, and distribution controls can also
`be placed on the user’s tokens as well as the database.
`
`(Ex. 1001 at 7:54-59). Divorcing tokens from the concept of a database makes no
`
`sense in light of the specification because there must be some permanence to
`
`establish the disclosed token hierarchies. See, Bajaj Decl., Ex. 2001 at 24.
`
`Accordingly, to the extent this term must be construed, it should include the
`
`requirement that the tokens are stored in a database.
`
`
`
`As described in further detail below, Petitioner’s arguments fail when the
`
`claims are construed to require the storage of tokens in a database. Thus, the
`
`Petition should be denied on all grounds.
`
`
`
`5
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`Petitioner Does Not Propose a Construction for the Term
`“Censor” and Ultimately Reads the Term Out of the Claims
`
`
`
`
`
`B.
`
`
`
`Petitioner does not proffer a construction for the term “censor” or
`
`“censored,” and Petitioner’s arguments regarding the term “censor[ed]” must fail
`
`for two reasons: (1) Petitioner appears to apply an incorrect definition of
`
`“censoring” as “screening out”, and (2) Petitioner ignores the relationship between
`
`censorship and tokens. (Pet. at 42.)
`
`The term “censor” was understood in both ordinary English and to one of
`
`ordinary skill in the art. Censorship requires suppression of unacceptable
`
`information such as a message. The ordinary English meaning is:
`
`“examine in order to suppress or delete anything considered objectionable.” (Ex.
`
`2001 at 29, citing Ex. 2002 at 3). The Microsoft Press Computer Dictionary
`
`defines censorship as “[t]he action of preventing material that a party considers
`
`objectionable from circulating within a system of communication over which that
`
`party has some power.” (Ex. 2003 at 4). Microsoft’s dictionary goes on to state
`
`this example: “[a] moderated newsgroup or mailing list may be considered to be
`
`‘censored’ because the moderator will usually delete highly controversial and
`
`obscene content or content that is on a different topic from that followed by a
`
`newsgroup.” (Id. at 4–5). In all of the relevant definitions, the common thread is
`
`that censored information is suppressed based on the data or content itself and not
`
`
`
`6
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`on the users. The specification does not expand the definition beyond the bounds
`
`
`
`
`
`of one of ordinary skill’s understanding.
`
`Censorship is not merely the decision as to whether to engage in a private
`
`communication as between two users as Petitioner contends. (Pet. at 41.) Rather,
`
`the specification describes censorship of a data message as an evaluation of the
`
`message itself to determine if the message should be passed on to recipients. In the
`
`specification, tokens are used in the context of censoring to establish relationships
`
`between users and the data that is censored. The specification states that
`
`“[c]ensorship, which broadly encompasses control of what is said in a group, is
`
`also arbitrated by means of the tokens.” (Ex. 1001 at 8:10-11). The specification
`
`further states that, “[c]ensorship also can use the tokens for real time control of
`
`data (ascii, text, video, audio) from and to users as well as control over multimedia
`
`URLs––quantity, type, and subject.” (Id. at 8:16-18).
`
`As described in further detail below, Petitioner’s arguments fail when
`
`considering the proper scope of the term “censored,” as none of Petitioner’s
`
`arguments draw a distinction between censorship and group access rights and
`
`because none of Petitioner’s arguments refer to any relationship between
`
`“censorship” and tokens. Thus, as set forth below, the Petition should be denied.
`
`
`
`7
`
`
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`III. PETITIONER HAS NOT DEMONSTRATED A REASONBLE
`LIKELIHOOD OF SUCCESS FOR THE GROUNDS ADVANCED IN
`THE PETITION AND THE PETITION SHOULD BE DENIED.
`A. Requirements for Showing Obviousness Under 35 U.S.C. § 103.
`The question of obviousness is resolved on the basis of underlying factual
`
`
`
`determinations, including: (1) the scope and content of the prior art, (2) any
`
`differences between the claimed subject matter and the prior art, (3) the level of
`
`skill in the art, and (4) where in evidence, so called secondary considerations.
`
`Graham, 383 U.S. 1, at 17–18. The Board has held that a failure to identify the
`
`differences between the claimed subject matter and the prior art is fatal to an
`
`obviousness challenge. See, Apple, Inc. v. Contentguard Holdings, Inc., IPR2015-
`
`00355, Decision Denying Institution of Inter Partes Review, Paper 9 at 9–10
`
`(PTAB June 26, 2015) (denying institution for failure to identify the differences
`
`between the claimed subject matter and the prior art).
`
`Furthermore, in proposing that a person of ordinary skill in the art at the time
`
`of the invention would have combined the references in a particular way to meet
`
`the claimed invention, an obviousness analysis must support the proposed
`
`combination with “some articulated reasoning with some rational underpinning.”
`
`KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 418 (2007) (quoting In re Kahn, 441
`
`F.3d 977, 988 (Fed. Cir. 2006)). A proposed combination cannot be supported
`
`based on “mere conclusory statements.” In re Kahn, 441 F.3d at 988.
`
`
`
`8
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`In a petition seeking institution of an inter partes review, “articulated
`
`
`
`
`
`reasons with rational underpinnings” must be found in the petition itself. Whole
`
`Space Indus. v. Zipshade Indus., IPR2015-00488, Decision Denying Institution of
`
`Inter Partes Review, Paper 14 at 17 (PTAB July 24, 2015) (“[C]onclusory labels
`
`do not substitute for a fact-based analysis in the Petition establishing what is being
`
`modified, and why it would have been obvious to a person of ordinary skill to
`
`make the modification”). The arguments needed to support a conclusion of
`
`obviousness may not be incorporated by reference to another document. 37 C.F.R.
`
`§42.6(a)(3) (“Arguments must not be incorporated by reference from one
`
`document into another document.”); Cisco Sys., Inc., v. C-Cation Techs., LLC,
`
`IPR2014-00454, Decision Denying Institution of Inter Partes Review, Paper 12 at
`
`10 (PTAB Aug. 29, 2014); see also, Plant Science, Inc. v. The Andersons, Inc.,
`
`IPR2014-00939, Decision Denying Institution of Inter Partes Review, Paper 8 at
`
`15 (PTAB Dec. 17, 2014).
`
`As set forth below, this Petition is deficient because it fails to meet the
`
`fundamental requirements for demonstrating invalidity. First, the Petition does not
`
`explain how the combinations of references teach each element of each claim. See,
`
`C.B. Distributors, Inc. v. Fontem Holdings 1 B.V., IPR2013-00387, Paper 43 at
`
`30–31 (PTAB, Dec. 24, 2014). Second, the Petition fails to satisfy the tests of KSR
`
`and Graham because it does not identify the differences between the claims and
`9
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`the asserted references; neglects to provide a fact-based rationale for combining the
`
`
`
`
`
`references; and does not explain the specific ways the references are to be
`
`combined. Whole Space Indus., IPR2015-00488, Paper 14 at 9 (“[R]egarding the
`
`grounds based on obviousness, the Petition does not articulate specific
`
`modifications of the references that support its asserted obviousness grounds, nor
`
`does it provide a persuasive rationale for the proposed combinations of
`
`references.”).
`
`B. Claim 189 is Not Obvious Over Roseman, Rissanen, Vetter, Pike,
`and Lichty.
`
`Petitioner relies primarily on the Roseman reference, which does not teach
`
`or disclose each limitation of the Challenged Claims even when combined with
`
`numerous secondary references.
`
`Roseman describes a virtual conferencing system whereby a host computer,
`
`via software running on the host computer itself, controls the events of the virtual
`
`chat. Roseman is not concerned with the operation of the participating computers.
`
`In fact, the Roseman system describes the host computer as the component that
`
`“generates a common video screen.” (Ex. 1003 at 1:44.) This structure is
`
`fundamentally different from the system and methods claimed by the ’657 Patent,
`
`which includes requirements for the control computer as well as the participator
`
`computers. Additionally, while Roseman discloses authentication, it does not
`
`
`
`10
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`disclose the claimed tokens stored in a database, which serve purposes in addition
`
`
`
`
`
`to authentication. While Roseman's “key” authenticates, the authentication is not
`
`personal and is transferable to anyone––like a key to a door lock. This “key” is not
`
`the claimed token. Tokens must be capable of serving purposes beyond
`
`authentication, such as controlling: a) access to other tokens (e.g. token hierarchy
`
`arbitration process); (b) priority and moderation privileges; (c) group membership;
`
`(d) member visibilities; and (e) member identities, among other purposes found in
`
`the specification and recited in the above claim construction. Ex. 1001 at 8:7:60-
`
`8:10 The Roseman Key is incapable of performing these tasks.
`
`These fundamental differences between Roseman and the claimed system
`
`and methods of the ’657 Patent leads to numerous other differences and
`
`discrepancies that Petitioner attempts to patch up with secondary references.
`
`However, several of these discrepancies, as discussed in more detail below, are
`
`simply not resolved by the combinations as set forth by Petitioner.
`
`Petitioner admits that the secondary references of Rissenan, Vetter, Pike, and
`
`Lichty do not instruct one of ordinary skill in the art to make the changes required
`
`to rewrite Roseman into the claims of the ’657 Patent. Petitioner states as follows:
`
`Rissanen is cited to show that the tokens in Roseman could be
`stored in a “database,” Vetter to show that Roseman could have
`been adapted to communicate over the “Internet,” Pike to show
`
`
`
`11
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`that Roseman could have used “URLs,” and Lichty to show basic
`and known features of America Online chat rooms.
`
`
`
`
`
`(Pet. at 8. (emphasis added).) It is apparent from Petitioner’s own statements that
`
`it is merely advancing a set of “obvious to try” arguments, none of which result in
`
`the Challenged Claims.
`
`
`
`Claim 189 is particularly worrisome. Petitioner submits only 4 rationales
`
`(Pet. at 19, 25, 37, 43) to make 8 distinct obviousness conclusions (Pet. at 18, 23,
`
`27, 30, 36, 42, 46, 47). The reason for this is glaringly obvious: Petitioner submits
`
`the same rationale for different limitations, ignoring the differences between
`
`limitations.
`
`
`
`Moreover, Petitioner’s rationales are specific to limitations. Petitioner
`
`presents the Board with scattered conclusions without explaining how, or even
`
`whether, the combinations are useable together. Petitioner never once argues that
`
`any one or more of the combinations results in the challenged claims as a whole.
`
`See, e.g., Nautilus Hyosung Inc. v. Diebold, Inc., IPR2016-00560, Decision
`
`Denying Institution of Inter Partes Review, Paper 10 at 25–26 (PTAB June 26,
`
`2015) (“The determination of obviousness is made with respect to the subject
`
`matter as a whole, not separate pieces of the claim. . . . Therefore, we are not
`
`persuaded by Petitioner’s position, which takes disparate parts of five different
`
`references and pieces them together in an attempt to show where individual claim
`
`
`
`12
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`limitations are found in the prior art. Petitioner’s consistent strategy of picking and
`
`
`
`
`
`choosing among isolated disclosures in the prior art to deprecate the claimed
`
`invention suggests Petitioner may have used the claimed subject matter as a
`
`roadmap to identify individual pieces of the claimed subject matter in the prior
`
`art.”) Here, as was the case in Nautilus., Petitioner picks and chooses limitations
`
`from vastly different prior art systems where there is no expectation that
`
`combining these different elements would result in a working system but for
`
`impermissible hindsight. The resulting hindsight-based argument fails the test set
`
`forth by KSR.
`
`
`
`For all of these reasons, and as set forth in more detail below, Petitioner has
`
`not demonstrated that there is a reasonable likelihood that it will prevail on its
`
`amorphous Petition, and the Petition should be denied.
`
`1.
`
`Database Which Serves as a Repository of Tokens for Other
`Programs to Access, Thereby Affording Information to
`Each of a Plurality of Participator Computers
`
`The claimed “database which serves as a repository of tokens for other
`
`programs to access, thereby affording information to each of a plurality of
`
`participator computers” explicitly requires that tokens are stored in a database, and
`
`that the database is accessible to other programs. Petitioner addresses this
`
`limitation in pieces spanning several different obviousness combinations, and
`
`ultimately Petitioner does not address the issue that the database affords
`13
`
`
`
`
`
`
`
`
`information to each of a plurality of computers.
`
`
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`Petitioner all but admits that the Roseman does not explicitly disclose a
`
`database. Pet. at 18. Instead, Petitioner relies on a single disclosure of Roseman
`
`that “the meeting room ‘knows’ about each key and its invitation level.” Pet. at 18.
`
`Petitioner states that a copy of each key is therefore “stored” on the host computer.
`
`Id. However, there is no disclosure in Roseman of storing the “key” in a database
`
`and there is no disclosure of storing the “key” in a repository that is accessible by
`
`other programs.
`
`In order to make an end-run around the database limitation, Petitioner
`
`explicitly construes the term “database” as “a stored collection of tokens.” Pet. at
`
`18. As described above, this construction is incorrect, and Petitioner’s arguments
`
`fail under the proper construction. First, storage in memory does not mean stored
`
`in a database, as memory storage may not be persistent, whereas a database is
`
`understood as a persistent storage scheme. See, Bajaj Decl., Ex. 2001 at ¶¶ 20–21.
`
`Second, even if Petitioner meant “stored in persistent memory” this does not imply
`
`a database because a database allows for additional functionality (such as sorting
`
`and searching) and associated efficiencies besides a simple lookup in persistent
`
`memory. Id. at ¶ 22. Third, Petitioner states that the database does not have to be
`
`“relational.” Pet. at 18. Even if a database is not “relational” or of “any particular
`
`type,” it must still satisfy the basic principles set forth above regarding persistence
`14
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`and accessibility. There is simply no teaching or suggestion that the keys of
`
`
`
`
`
`Roseman are persistent.
`
`Petitioner then looks outside Roseman to the Rissenan reference for a
`
`database. Rissenan does disclose a database, but in the context of a different type
`
`of system. Rissenan is simply concerned with recording, storing, and comparing
`
`“passwords assigned to users,” i.e., authentication. Ex. 1004 at 1:21-28. However,
`
`the claims require more than merely authenticating users via passwords.
`
`To the extent that Petitioner is arguing that it would have simply been
`
`“obvious” to store the tokens in a database because databases were well known in
`
`the art, Petitioner does not state why it would have been obvious to store the
`
`“keys” of Roseman in a database and not simply in a program memory. The
`
`distinction between mere storage and a database is evident from the specification
`
`of the ’657 Patent. While the database stores both “personal information about the
`
`user, such as the user's age” (Ex. 1001 at 7:52-54), it also stores information with
`
`respect to tokens which can be associated with a user, or, group, and content. (Id.
`
`at 7:54-59). Thus, a database, as disclosed in the patent, allows other programs to
`
`“lookup” by a user or group or content. However, simply storing a key in memory,
`
`without storing the additional relationship between a group and the token would
`
`not allow for such lookups.
`
`The distinction between storage in program memory and storage in a
`15
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`database is also critical because the claim requires that a database “serves as a
`
`
`
`
`
`repository of tokens for other programs to access, thereby affording information to
`
`each of a plurality of participator computers.” Petitioner does not point to any
`
`reasonable support for the proposition that user login credentials could be used by
`
`the system of Roseman “for other programs to access.” Petitioner points only to
`
`the statement that Roseman discloses that each conference room is actually “a
`
`combination of stored data and computer programs.” Pet. at 20-21 (emphasis in
`
`original). Other than the use of the plural form “programs,” Petitioner does not
`
`identify any programs that could access a database of tokens and receive
`
`information other than the singular conference calling software running on the host
`
`computer of Roseman. Petitioner does not attempt to point to any other references
`
`for obviousness with regard to this limitation and thus has failed to establish the
`
`link between the “other programs” and the “database” as required by the claims.
`
`Additionally, when information is stored in program memory, it is almost
`
`universally obscured from other programs. See, Bajaj Decl., Ex. 2001 at 23. The
`
`’657 Patent discloses that distribution controls can be placed on the database itself.
`
`(Id. at 7:54-59) If the database were merely program memory, these distribution
`
`controls would be rendered superfluous because the standard controls on program
`
`memory would not permit other programs to use the database.
`
`Accordingly, Petitioner has not identified where in the prior art the claimed
`16
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`“database which serves as a repository of tokens for other programs to access” is
`
`
`
`
`
`taught or disclosed. Petitioner has not demonstrated that there is a reasonable
`
`likelihood that it will prevail on Ground 1, and Ground 1 should be denied.
`
`Communicating Via an Internet Network
`
`2.
`Claim 1 requires that the plurality of computers communicate “via an
`
`Internet network.” Petitioner admits that Roseman does not expressly mention an
`
`Internet network. Pet. at 24. Petitioner points to yet another reference, Vetter, to
`
`allegedly teach the “Internet.” However, Petitioner’s arguments provide no
`
`evidence as to how Vetter could be used to transform Roseman into a method of
`
`“communicating via an Internet network …affording some of the information to a
`
`first of the participator computers via the Internet network, responsive to an
`
`authenticated first user identity…affording some of the information to a second of
`
`the participator computers via the Internet network, responsive to an authenticated
`
`second user identity,” as recited in Claim 189.
`
`Vetter is purportedly a videoconferencing and document sharing application
`
`that works over the Internet. Even though Vetter discloses the “Internet”
`
`generally, Petitioner takes for granted that the teachings of Vetter necessitate
`
`converting the Roseman reference into a system to communicate over the Internet.
`
`In the mid-1990’s, the Internet was not nearly as developed as it is now, twenty
`
`years later. Moreover and contrary to Petitioner’s implication, Vetter does not
`17
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`state that videoconferencing would have been ubiquitous over the Internet in the
`
`
`
`
`
`mid 1990’s. To the contrary, Vetter states that the Internet infrastructure “is
`
`generating much research interest.” (Ex. 1005 at p. 77.) Vetter also states that that
`
`the Internet infrastructure is beginning to support video conferencing. Id.
`
`Petitioner does not identify any of the differences between Vetter and the
`
`claims, of which there are many. Vetter does not discuss a syst