throbber
IPR2016-01159
`
`PATENT NO. 8,694,657
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`FACEBOOK, INC.
`Petitioner
`v.
`
`WINDY CITY INNOVATIONS LLC
`Patent Owner
`
`Patent No. 8,694,657
`Issue Date: April 8, 2014
`Title: REAL TIME COMMUNICATIONS SYSTEM
`
`
`
`WINDY CITY INNOVATIONS LLC’S PRELIMINARY RESPONSE TO
`PETITION FOR INTER PARTES REVIEW OF U.S. PATENT NO.
`8,694,657
`
`Case No. IPR2016-01159
`
`
`
`
`
`
`
`

`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`I.
`II.
`
`III.
`
`INTRODUCTION ........................................................................................... 1
`THE PETITION SHOULD NOT BE INSTITUTED BECAUSE
`PETITIONER'S CLAIM CONSTRUCTIONS ARE INCORRECT IN
`LIGHT OF THE SPECIFICATION, THE CLAIMS, AND THE LAW ........ 4
`A.
`Petitioner’s Proposed Construction of “Token” Is Incorrect and
`Reads Out the Database Requirement ................................................... 4
`
`B.
`
`Petitioner Does Not Propose a Construction for the Term
`“Censor” and Ultimately Reads the Term Out of the Claims ............... 6
`PETITIONER HAS NOT DEMONSTRATED A REASONBLE
`LIKELIHOOD OF SUCCESS FOR THE GROUNDS ADVANCED
`IN THE PETITION AND THE PETITION SHOULD BE DENIED. ........... 8
`A.
`Requirements for Showing Obviousness Under 35 U.S.C. §
`103. ........................................................................................................ 8
`
`B.
`
`Claim 189 is Not Obvious Over Roseman, Rissanen, Vetter,
`Pike, and Lichty. .................................................................................. 10
`
`1.
`
`2.
`
`3.
`
`Database Which Serves as a Repository of Tokens for
`Other Programs to Access, Thereby Affording
`Information to Each of a Plurality of Participator
`Computers ................................................................................. 13
`
`Communicating Via an Internet Network ................................. 17
`
`Determining Whether the First User Identity is
`Individually Censored from Sending Data in the
`Communications, the Data Presenting at least One of a
`Pointer, Video, Audio, a Graphic, and Multimedia .................. 19
`
`C.
`
`Independent Claim 465 Is Not Unpatentable ...................................... 22
`
`D. Dependent Claims 334, 342, 348, 580, 584, and 592 Are Not
`Unpatentable ........................................................................................ 23
`IV. CONCLUSION .............................................................................................. 23
`
`
`
`
`i
`
`

`
`
`
`
`
`
`EXHIBIT LIST
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`Exhibit #
`
`Exhibit Name
`
`2001
`
`2002
`
`2003
`
`2004
`
`Declaration of Dr. Chandrajit Bajaj, Ph.D.
`
`Merriam-Webster’s Collegiate Dictionary, Tenth Edition
`
`(1994)
`
`Microsoft Press Computer Dictionary, Third Edition (1997)
`
`Macmillan Encyclopedia of Computers (Gary G. Bitter ed.,
`
`Macmillan Publ. Co. 1992)
`
`ii
`
`
`
`
`
`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Federal Cases
`Apple, Inc. v. Contentguard Holdings, Inc.,
`IPR2015-00355 (PTAB June 26, 2015) ............................................................. 10
`
`C.B. Distributors, Inc. v. Fontem Holdings 1 B.V.
`IPR2013-00387 (PTAB, Dec. 24, 2014) ............................................................ 12
`
`Callaway Golf Co. v. Acushnet Co.,
`576 F.3d 1331 (Fed. Cir. 2009) .......................................................................... 27
`
`Cisco Sys., Inc., v. C-Cation Techs., LLC,
`IPR2014-00454 (PTAB. Aug. 29, 2014) ............................................................ 11
`
`Graham v. John Deere Co.,
`383 U.S. 1 (1966) ...................................................................................... 3, 10, 12
`
`In re Kahn,
`441 F.3d 977 (Fed. Cir. 2006) ............................................................................ 11
`
`KSR Int’l Co. v. Teleflex Inc.,
`550 U.S. 398 (2007) ...................................................................................... 11, 12
`
`Plant Science, Inc. v. The Andersons, Inc.,
`IPR2014-00939 (PTAB Dec. 17, 2014) ............................................................. 11
`
`Whole Space Indus. v. Zipshade Indus.,
`IPR2015-00488 (PTAB July 24, 2015) ........................................................ 11, 12
`
`Federal Statutes
`
`35 U.S.C. § 102 .......................................................................................................... 2
`
`35 U.S.C. § 103 ........................................................................................................ 10
`
`35 U.S.C. § 311(b) ..................................................................................................... 2
`
`35 U.S.C. § 314(a) ..................................................................................................... 3
`
`
`
`iii
`
`

`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`Regulations
`
`37 C.F.R. 1.75(c) ...................................................................................................... 27
`
`37 C.F.R. § 42.6(a)(3) .......................................................................................... 3, 11
`
`37 C.F.R. § 42.104(b) ............................................................................................ 2, 3
`
`
`
`
`
`iv
`
`

`
`I.
`
`INTRODUCTION
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`On June 3, 2016, Facebook Inc. (“Petitioner”) submitted a Petition (the
`
`“Petition”) to institute inter partes review (“IPR”) of U.S. Patent No. 8,694,657
`
`(Ex. 1001, “the ’657 Patent”), challenging Claims 189, 334, 342, 348, 465, 580,
`
`584, and 592 (“the Challenged Claims”). Petitioner on the same day also filed
`
`three additional petitions alleging unpatentability of related patents over some of
`
`the same prior art (IPR2016-01156, -01157, and -01158).
`
`The Petition should be denied for myriad reasons. First, the Petition should
`
`be denied because there is not a reasonable likelihood that Petitioner will succeed
`
`on any of its allegations of unpatentability, all of which rely on U.S. Patent No.
`
`6,608,636 to Roseman (“Roseman”) as a primary reference for obviousness.
`
`Roseman discloses a different type of system from the Challenged Claims,
`
`specifically Roseman discloses a “virtual conferencing system” that did not operate
`
`over the Internet. Roseman relates to a type of prior art corporate remote linking
`
`software, the very limitations of which the inventor of the ’657 Patent sought to
`
`overcome. (Ex. 1001 at 1:33-37; 1:56-59). Additionally, Roseman only discloses
`
`terminal-based communication with a server, which cannot satisfy the limitations
`
`of the ’657 Patent as it uses a different paradigm. Today, we refer to these
`
`different paradigms as a “thick client” in the case of the ’657 claims versus the
`
`“dummy terminal” approach of Roseman. As a result, Roseman’s dummy terminal
`1
`
`
`
`

`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`implementation is missing many of the limitations of the claims. Petitioner admits
`
`
`
`
`
`that Roseman has deficiencies and Petitioner looks to four additional references to
`
`allegedly disclose all of the limitations of the claims.
`
`Additionally, Petitioner does not satisfy the basic requirement of an inter
`
`partes review petition by pointing out “[t]he specific statutory grounds under 35
`
`U.S.C.§ § 102 or 103 on which the challenge to the claim is based and the patents
`
`or printed publications relied upon for each ground.” 37 C.F.R. § 42.104(b)(2).
`
`The Petitioner challenges all claims under a single ground containing 8 claims and
`
`a single five-reference combination. However, it is unclear whether Petitioner is
`
`actually challenging each of the claims based on the five-reference combination.
`
`Accordingly, the Petition should be denied in its entirety for failing to meet the
`
`basic statutory criteria for an inter partes review petition.
`
`In addition to these fundamental deficiencies, Petitioner’s request for inter
`
`partes review should be denied for at least the following reasons addressed more
`
`fully below in this Preliminary Response:
`
`(1) The Petition fails to properly construe several claim terms.
`
`(2) The Petition does not “specify where each element of the claim is found
`
`in the prior art patents or printed publications relied upon,” as required by
`
`37 C.F.R. § 42.104(b)(4), because the Petition has at least one of the following
`
`deficiencies: (i) failing to map each claim term to a specific teaching from an
`2
`
`
`
`

`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`asserted reference; (ii) providing citations to the asserted references that do not
`
`
`
`
`
`teach the claim elements against which such citations are applied; and
`
`(iii) mischaracterizing the citations to the asserted references.
`
`(3) The Petition fails to identify the difference(s) between the claims and the
`
`asserted references as required by Graham v. John Deere Co., 383 U.S. 1, 17–18
`
`(1966).
`
`(4) The Petition improperly attempts to support its assertions of obviousness
`
`with mere conclusory statements and by impermissibly incorporating by reference
`
`arguments from the Lavian Declaration (Ex. 1002) in violation of 37 C.F.R. §
`
`42.6(a)(3).
`
`Due to at least these deficiencies, the Petition does not establish “a
`
`reasonable likelihood that the Petitioner would prevail with respect to at least one
`
`of the claims challenged in the Petition.” 35 U.S.C. § 314(a). Patent Owner
`
`explicitly reserves the right to provide further distinctions between the prior art and
`
`the Challenged Claims. The deficiencies of the Petition noted herein, however, are
`
`sufficient for the Board to find that Petitioner has not met its burden to
`
`demonstrate a reasonable likelihood that it would prevail in showing
`
`unpatentability of any of the Challenged Claims.
`
`
`
`3
`
`

`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`II. THE PETITION SHOULD NOT BE INSTITUTED BECAUSE
`PETITIONER'S CLAIM CONSTRUCTIONS ARE INCORRECT IN
`LIGHT OF THE SPECIFICATION, THE CLAIMS, AND THE LAW
`A.
`
`Petitioner’s Proposed Construction of “Token” Is Incorrect and
`Reads Out the Database Requirement
`
`The construction of the term “token” advocated by Petitioner, “a piece of
`
`information associated with user identity,” is incorrect in light of the specification
`
`because it excludes the requirement that the tokens are stored in a database.
`
`As a preliminary matter, the passage Petitioner points to as allegedly
`
`defining the term “tokens” actually defines the term “identity tokens.” Petitioner
`
`cites to the specification as follows:
`
`With regard to the arbitrating of the controller computer 3 is directed
`by the controller computer program 2 to use “identity tokens”, which
`are pieces of information associated with user identity. The pieces of
`information are stored in memory 11 in a control computer database,
`along with personal information about the user, such as the user’s age.
`
`(Ex. 1001 at 7:49-54 (underlining added by Petitioner).) Petitioner appears to be
`
`arguing that this portion of the specification is defining the term “tokens,”
`
`however, if anything, this portion only relates to a different term, “identity tokens”
`
`and Petitioner’s arguments are misplaced. (Pet. at 4.)
`
`Tokens are central to the invention of the ’657 Patent. The specification
`
`describes these tokens only in the context of a “database” that affords relationships
`
`
`
`4
`
`

`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`and some permanence to the data. For example, the controller computer is
`
`
`
`
`
`described as arbitrating access to programs based on tokens, and that tokens are
`
`pieces of information associated with a user identity. The specification then goes
`
`on to state: “The pieces of information are stored in memory 11 in a control
`
`computer database, along with personal information about the user, such as the
`
`user’s age.” (Ex. 1001 at 7:52-54).
`
`The specification further states as follows:
`
`The control computer database serves as a repository of tokens for
`other programs to access, thereby affording information to otherwise
`independent computer systems. In the database, the storage of tokens
`can be by user, group, and content, and distribution controls can also
`be placed on the user’s tokens as well as the database.
`
`(Ex. 1001 at 7:54-59). Divorcing tokens from the concept of a database makes no
`
`sense in light of the specification because there must be some permanence to
`
`establish the disclosed token hierarchies. See, Bajaj Decl., Ex. 2001 at 24.
`
`Accordingly, to the extent this term must be construed, it should include the
`
`requirement that the tokens are stored in a database.
`
`
`
`As described in further detail below, Petitioner’s arguments fail when the
`
`claims are construed to require the storage of tokens in a database. Thus, the
`
`Petition should be denied on all grounds.
`
`
`
`5
`
`

`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`Petitioner Does Not Propose a Construction for the Term
`“Censor” and Ultimately Reads the Term Out of the Claims
`
`
`
`
`
`B.
`
`
`
`Petitioner does not proffer a construction for the term “censor” or
`
`“censored,” and Petitioner’s arguments regarding the term “censor[ed]” must fail
`
`for two reasons: (1) Petitioner appears to apply an incorrect definition of
`
`“censoring” as “screening out”, and (2) Petitioner ignores the relationship between
`
`censorship and tokens. (Pet. at 42.)
`
`The term “censor” was understood in both ordinary English and to one of
`
`ordinary skill in the art. Censorship requires suppression of unacceptable
`
`information such as a message. The ordinary English meaning is:
`
`“examine in order to suppress or delete anything considered objectionable.” (Ex.
`
`2001 at 29, citing Ex. 2002 at 3). The Microsoft Press Computer Dictionary
`
`defines censorship as “[t]he action of preventing material that a party considers
`
`objectionable from circulating within a system of communication over which that
`
`party has some power.” (Ex. 2003 at 4). Microsoft’s dictionary goes on to state
`
`this example: “[a] moderated newsgroup or mailing list may be considered to be
`
`‘censored’ because the moderator will usually delete highly controversial and
`
`obscene content or content that is on a different topic from that followed by a
`
`newsgroup.” (Id. at 4–5). In all of the relevant definitions, the common thread is
`
`that censored information is suppressed based on the data or content itself and not
`
`
`
`6
`
`

`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`on the users. The specification does not expand the definition beyond the bounds
`
`
`
`
`
`of one of ordinary skill’s understanding.
`
`Censorship is not merely the decision as to whether to engage in a private
`
`communication as between two users as Petitioner contends. (Pet. at 41.) Rather,
`
`the specification describes censorship of a data message as an evaluation of the
`
`message itself to determine if the message should be passed on to recipients. In the
`
`specification, tokens are used in the context of censoring to establish relationships
`
`between users and the data that is censored. The specification states that
`
`“[c]ensorship, which broadly encompasses control of what is said in a group, is
`
`also arbitrated by means of the tokens.” (Ex. 1001 at 8:10-11). The specification
`
`further states that, “[c]ensorship also can use the tokens for real time control of
`
`data (ascii, text, video, audio) from and to users as well as control over multimedia
`
`URLs––quantity, type, and subject.” (Id. at 8:16-18).
`
`As described in further detail below, Petitioner’s arguments fail when
`
`considering the proper scope of the term “censored,” as none of Petitioner’s
`
`arguments draw a distinction between censorship and group access rights and
`
`because none of Petitioner’s arguments refer to any relationship between
`
`“censorship” and tokens. Thus, as set forth below, the Petition should be denied.
`
`
`
`7
`
`

`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`III. PETITIONER HAS NOT DEMONSTRATED A REASONBLE
`LIKELIHOOD OF SUCCESS FOR THE GROUNDS ADVANCED IN
`THE PETITION AND THE PETITION SHOULD BE DENIED.
`A. Requirements for Showing Obviousness Under 35 U.S.C. § 103.
`The question of obviousness is resolved on the basis of underlying factual
`
`
`
`determinations, including: (1) the scope and content of the prior art, (2) any
`
`differences between the claimed subject matter and the prior art, (3) the level of
`
`skill in the art, and (4) where in evidence, so called secondary considerations.
`
`Graham, 383 U.S. 1, at 17–18. The Board has held that a failure to identify the
`
`differences between the claimed subject matter and the prior art is fatal to an
`
`obviousness challenge. See, Apple, Inc. v. Contentguard Holdings, Inc., IPR2015-
`
`00355, Decision Denying Institution of Inter Partes Review, Paper 9 at 9–10
`
`(PTAB June 26, 2015) (denying institution for failure to identify the differences
`
`between the claimed subject matter and the prior art).
`
`Furthermore, in proposing that a person of ordinary skill in the art at the time
`
`of the invention would have combined the references in a particular way to meet
`
`the claimed invention, an obviousness analysis must support the proposed
`
`combination with “some articulated reasoning with some rational underpinning.”
`
`KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 418 (2007) (quoting In re Kahn, 441
`
`F.3d 977, 988 (Fed. Cir. 2006)). A proposed combination cannot be supported
`
`based on “mere conclusory statements.” In re Kahn, 441 F.3d at 988.
`
`
`
`8
`
`

`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`In a petition seeking institution of an inter partes review, “articulated
`
`
`
`
`
`reasons with rational underpinnings” must be found in the petition itself. Whole
`
`Space Indus. v. Zipshade Indus., IPR2015-00488, Decision Denying Institution of
`
`Inter Partes Review, Paper 14 at 17 (PTAB July 24, 2015) (“[C]onclusory labels
`
`do not substitute for a fact-based analysis in the Petition establishing what is being
`
`modified, and why it would have been obvious to a person of ordinary skill to
`
`make the modification”). The arguments needed to support a conclusion of
`
`obviousness may not be incorporated by reference to another document. 37 C.F.R.
`
`§42.6(a)(3) (“Arguments must not be incorporated by reference from one
`
`document into another document.”); Cisco Sys., Inc., v. C-Cation Techs., LLC,
`
`IPR2014-00454, Decision Denying Institution of Inter Partes Review, Paper 12 at
`
`10 (PTAB Aug. 29, 2014); see also, Plant Science, Inc. v. The Andersons, Inc.,
`
`IPR2014-00939, Decision Denying Institution of Inter Partes Review, Paper 8 at
`
`15 (PTAB Dec. 17, 2014).
`
`As set forth below, this Petition is deficient because it fails to meet the
`
`fundamental requirements for demonstrating invalidity. First, the Petition does not
`
`explain how the combinations of references teach each element of each claim. See,
`
`C.B. Distributors, Inc. v. Fontem Holdings 1 B.V., IPR2013-00387, Paper 43 at
`
`30–31 (PTAB, Dec. 24, 2014). Second, the Petition fails to satisfy the tests of KSR
`
`and Graham because it does not identify the differences between the claims and
`9
`
`
`
`

`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`the asserted references; neglects to provide a fact-based rationale for combining the
`
`
`
`
`
`references; and does not explain the specific ways the references are to be
`
`combined. Whole Space Indus., IPR2015-00488, Paper 14 at 9 (“[R]egarding the
`
`grounds based on obviousness, the Petition does not articulate specific
`
`modifications of the references that support its asserted obviousness grounds, nor
`
`does it provide a persuasive rationale for the proposed combinations of
`
`references.”).
`
`B. Claim 189 is Not Obvious Over Roseman, Rissanen, Vetter, Pike,
`and Lichty.
`
`Petitioner relies primarily on the Roseman reference, which does not teach
`
`or disclose each limitation of the Challenged Claims even when combined with
`
`numerous secondary references.
`
`Roseman describes a virtual conferencing system whereby a host computer,
`
`via software running on the host computer itself, controls the events of the virtual
`
`chat. Roseman is not concerned with the operation of the participating computers.
`
`In fact, the Roseman system describes the host computer as the component that
`
`“generates a common video screen.” (Ex. 1003 at 1:44.) This structure is
`
`fundamentally different from the system and methods claimed by the ’657 Patent,
`
`which includes requirements for the control computer as well as the participator
`
`computers. Additionally, while Roseman discloses authentication, it does not
`
`
`
`10
`
`

`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`disclose the claimed tokens stored in a database, which serve purposes in addition
`
`
`
`
`
`to authentication. While Roseman's “key” authenticates, the authentication is not
`
`personal and is transferable to anyone––like a key to a door lock. This “key” is not
`
`the claimed token. Tokens must be capable of serving purposes beyond
`
`authentication, such as controlling: a) access to other tokens (e.g. token hierarchy
`
`arbitration process); (b) priority and moderation privileges; (c) group membership;
`
`(d) member visibilities; and (e) member identities, among other purposes found in
`
`the specification and recited in the above claim construction. Ex. 1001 at 8:7:60-
`
`8:10 The Roseman Key is incapable of performing these tasks.
`
`These fundamental differences between Roseman and the claimed system
`
`and methods of the ’657 Patent leads to numerous other differences and
`
`discrepancies that Petitioner attempts to patch up with secondary references.
`
`However, several of these discrepancies, as discussed in more detail below, are
`
`simply not resolved by the combinations as set forth by Petitioner.
`
`Petitioner admits that the secondary references of Rissenan, Vetter, Pike, and
`
`Lichty do not instruct one of ordinary skill in the art to make the changes required
`
`to rewrite Roseman into the claims of the ’657 Patent. Petitioner states as follows:
`
`Rissanen is cited to show that the tokens in Roseman could be
`stored in a “database,” Vetter to show that Roseman could have
`been adapted to communicate over the “Internet,” Pike to show
`
`
`
`11
`
`

`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`that Roseman could have used “URLs,” and Lichty to show basic
`and known features of America Online chat rooms.
`
`
`
`
`
`(Pet. at 8. (emphasis added).) It is apparent from Petitioner’s own statements that
`
`it is merely advancing a set of “obvious to try” arguments, none of which result in
`
`the Challenged Claims.
`
`
`
`Claim 189 is particularly worrisome. Petitioner submits only 4 rationales
`
`(Pet. at 19, 25, 37, 43) to make 8 distinct obviousness conclusions (Pet. at 18, 23,
`
`27, 30, 36, 42, 46, 47). The reason for this is glaringly obvious: Petitioner submits
`
`the same rationale for different limitations, ignoring the differences between
`
`limitations.
`
`
`
`Moreover, Petitioner’s rationales are specific to limitations. Petitioner
`
`presents the Board with scattered conclusions without explaining how, or even
`
`whether, the combinations are useable together. Petitioner never once argues that
`
`any one or more of the combinations results in the challenged claims as a whole.
`
`See, e.g., Nautilus Hyosung Inc. v. Diebold, Inc., IPR2016-00560, Decision
`
`Denying Institution of Inter Partes Review, Paper 10 at 25–26 (PTAB June 26,
`
`2015) (“The determination of obviousness is made with respect to the subject
`
`matter as a whole, not separate pieces of the claim. . . . Therefore, we are not
`
`persuaded by Petitioner’s position, which takes disparate parts of five different
`
`references and pieces them together in an attempt to show where individual claim
`
`
`
`12
`
`

`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`limitations are found in the prior art. Petitioner’s consistent strategy of picking and
`
`
`
`
`
`choosing among isolated disclosures in the prior art to deprecate the claimed
`
`invention suggests Petitioner may have used the claimed subject matter as a
`
`roadmap to identify individual pieces of the claimed subject matter in the prior
`
`art.”) Here, as was the case in Nautilus., Petitioner picks and chooses limitations
`
`from vastly different prior art systems where there is no expectation that
`
`combining these different elements would result in a working system but for
`
`impermissible hindsight. The resulting hindsight-based argument fails the test set
`
`forth by KSR.
`
`
`
`For all of these reasons, and as set forth in more detail below, Petitioner has
`
`not demonstrated that there is a reasonable likelihood that it will prevail on its
`
`amorphous Petition, and the Petition should be denied.
`
`1.
`
`Database Which Serves as a Repository of Tokens for Other
`Programs to Access, Thereby Affording Information to
`Each of a Plurality of Participator Computers
`
`The claimed “database which serves as a repository of tokens for other
`
`programs to access, thereby affording information to each of a plurality of
`
`participator computers” explicitly requires that tokens are stored in a database, and
`
`that the database is accessible to other programs. Petitioner addresses this
`
`limitation in pieces spanning several different obviousness combinations, and
`
`ultimately Petitioner does not address the issue that the database affords
`13
`
`
`
`

`
`
`
`
`information to each of a plurality of computers.
`
`
`
`
`
`
`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`Petitioner all but admits that the Roseman does not explicitly disclose a
`
`database. Pet. at 18. Instead, Petitioner relies on a single disclosure of Roseman
`
`that “the meeting room ‘knows’ about each key and its invitation level.” Pet. at 18.
`
`Petitioner states that a copy of each key is therefore “stored” on the host computer.
`
`Id. However, there is no disclosure in Roseman of storing the “key” in a database
`
`and there is no disclosure of storing the “key” in a repository that is accessible by
`
`other programs.
`
`In order to make an end-run around the database limitation, Petitioner
`
`explicitly construes the term “database” as “a stored collection of tokens.” Pet. at
`
`18. As described above, this construction is incorrect, and Petitioner’s arguments
`
`fail under the proper construction. First, storage in memory does not mean stored
`
`in a database, as memory storage may not be persistent, whereas a database is
`
`understood as a persistent storage scheme. See, Bajaj Decl., Ex. 2001 at ¶¶ 20–21.
`
`Second, even if Petitioner meant “stored in persistent memory” this does not imply
`
`a database because a database allows for additional functionality (such as sorting
`
`and searching) and associated efficiencies besides a simple lookup in persistent
`
`memory. Id. at ¶ 22. Third, Petitioner states that the database does not have to be
`
`“relational.” Pet. at 18. Even if a database is not “relational” or of “any particular
`
`type,” it must still satisfy the basic principles set forth above regarding persistence
`14
`
`
`
`

`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`and accessibility. There is simply no teaching or suggestion that the keys of
`
`
`
`
`
`Roseman are persistent.
`
`Petitioner then looks outside Roseman to the Rissenan reference for a
`
`database. Rissenan does disclose a database, but in the context of a different type
`
`of system. Rissenan is simply concerned with recording, storing, and comparing
`
`“passwords assigned to users,” i.e., authentication. Ex. 1004 at 1:21-28. However,
`
`the claims require more than merely authenticating users via passwords.
`
`To the extent that Petitioner is arguing that it would have simply been
`
`“obvious” to store the tokens in a database because databases were well known in
`
`the art, Petitioner does not state why it would have been obvious to store the
`
`“keys” of Roseman in a database and not simply in a program memory. The
`
`distinction between mere storage and a database is evident from the specification
`
`of the ’657 Patent. While the database stores both “personal information about the
`
`user, such as the user's age” (Ex. 1001 at 7:52-54), it also stores information with
`
`respect to tokens which can be associated with a user, or, group, and content. (Id.
`
`at 7:54-59). Thus, a database, as disclosed in the patent, allows other programs to
`
`“lookup” by a user or group or content. However, simply storing a key in memory,
`
`without storing the additional relationship between a group and the token would
`
`not allow for such lookups.
`
`The distinction between storage in program memory and storage in a
`15
`
`
`
`

`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`database is also critical because the claim requires that a database “serves as a
`
`
`
`
`
`repository of tokens for other programs to access, thereby affording information to
`
`each of a plurality of participator computers.” Petitioner does not point to any
`
`reasonable support for the proposition that user login credentials could be used by
`
`the system of Roseman “for other programs to access.” Petitioner points only to
`
`the statement that Roseman discloses that each conference room is actually “a
`
`combination of stored data and computer programs.” Pet. at 20-21 (emphasis in
`
`original). Other than the use of the plural form “programs,” Petitioner does not
`
`identify any programs that could access a database of tokens and receive
`
`information other than the singular conference calling software running on the host
`
`computer of Roseman. Petitioner does not attempt to point to any other references
`
`for obviousness with regard to this limitation and thus has failed to establish the
`
`link between the “other programs” and the “database” as required by the claims.
`
`Additionally, when information is stored in program memory, it is almost
`
`universally obscured from other programs. See, Bajaj Decl., Ex. 2001 at 23. The
`
`’657 Patent discloses that distribution controls can be placed on the database itself.
`
`(Id. at 7:54-59) If the database were merely program memory, these distribution
`
`controls would be rendered superfluous because the standard controls on program
`
`memory would not permit other programs to use the database.
`
`Accordingly, Petitioner has not identified where in the prior art the claimed
`16
`
`
`
`

`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`“database which serves as a repository of tokens for other programs to access” is
`
`
`
`
`
`taught or disclosed. Petitioner has not demonstrated that there is a reasonable
`
`likelihood that it will prevail on Ground 1, and Ground 1 should be denied.
`
`Communicating Via an Internet Network
`
`2.
`Claim 1 requires that the plurality of computers communicate “via an
`
`Internet network.” Petitioner admits that Roseman does not expressly mention an
`
`Internet network. Pet. at 24. Petitioner points to yet another reference, Vetter, to
`
`allegedly teach the “Internet.” However, Petitioner’s arguments provide no
`
`evidence as to how Vetter could be used to transform Roseman into a method of
`
`“communicating via an Internet network …affording some of the information to a
`
`first of the participator computers via the Internet network, responsive to an
`
`authenticated first user identity…affording some of the information to a second of
`
`the participator computers via the Internet network, responsive to an authenticated
`
`second user identity,” as recited in Claim 189.
`
`Vetter is purportedly a videoconferencing and document sharing application
`
`that works over the Internet. Even though Vetter discloses the “Internet”
`
`generally, Petitioner takes for granted that the teachings of Vetter necessitate
`
`converting the Roseman reference into a system to communicate over the Internet.
`
`In the mid-1990’s, the Internet was not nearly as developed as it is now, twenty
`
`years later. Moreover and contrary to Petitioner’s implication, Vetter does not
`17
`
`
`
`

`
`IPR2016-01159
`
`PATENT NO. 8,694,657
`
`
`
`
`state that videoconferencing would have been ubiquitous over the Internet in the
`
`
`
`
`
`mid 1990’s. To the contrary, Vetter states that the Internet infrastructure “is
`
`generating much research interest.” (Ex. 1005 at p. 77.) Vetter also states that that
`
`the Internet infrastructure is beginning to support video conferencing. Id.
`
`Petitioner does not identify any of the differences between Vetter and the
`
`claims, of which there are many. Vetter does not discuss a syst

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket