`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`_______________
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_______________
`
`
`APPLE INC.,
`Petitioner
`
`v.
`
`REALTIME DATA, LLC D/B/A/ IXO,
`Patent Owner
`
`_______________
`
`Case IPR2016-01738
`Patent 8,880,862
`
`_______________
`
`
`PATENT OWNER REALTIME DATA, LLC D/B/A IXO’S LIST OF
`PETITIONER’S IMPROPER REPLY ARGUMENTS
`
`
`
`
`
`Pursuant to the Board’s authorization on October 10, 2017, Patent Owner
`
`Realtime Data, LLC d/b/a IXO (“Realtime”) submits the following list of the
`
`locations and concise descriptions of the portions of Petitioner’s Reply (Paper 24)
`
`that exceed the proper reply scope. If the Board were to rely on these arguments
`
`and evidence in finding the challenged claims unpatentable, Realtime would not
`
`have had sufficient opportunity to respond.
`
`1)
`
`At pages 6-7 of the Reply, Petitioner argues that Sukegawa renders obvious
`
`the limitation “boot data list.” For example:
`
`•
`
`“As Dr. Neuhauser explained and the Institution Decision credited, a
`
`POSITA would have found it obvious that Sukegawa’s files of OS and AP
`
`control information are lists of boot data.” (Reply at 6.)
`
`•
`
` “As Dr. Neuhauser explained, a list is an obvious representation for a
`
`collection of information and, thus, Sukegawa’s files represent lists of
`
`control information.” (Id. at 7.)
`
`2)
`
`At pages 4-6 and 11-13 of the Reply, Petitioner argues that “non-accessed
`
`boot data” should be construed to mean “boot data that was not accessed” and that
`
`Sukegawa’s deletion of control information from table 3A renders obvious the
`
`“disassociating non-accessed boot data” limitations. For example:
`
`•
`
`“[U]nder BRI, a POSITA would have viewed the term ‘non-accessed
`
`boot data’ per its ordinary meaning as simply boot data that was not
`
`accessed.” (Id. at 4-5.)
`
`•
`
`“[A] POSITA would have found Sukegawa’s user deletion of control
`
`1
`
`
`
`information obviously (and most likely) to include control information that
`
`was not accessed (or not requested during system boot-up).” (Id. at 12.)
`
`•
`
`“[B]ecause a POSITA would have found user deletion of ‘non-
`
`accessed’ boot data to be an obvious part of Sukegawa’s user deletion,
`
`Sukegawa renders obvious disassociating non-accessed boot data from the
`
`boot data list.” (Id. at 13.)
`
`•
`
`“Thus, Sukegawa’s automated deletion of AP control information
`
`from cache area 10C involves disassociation of non-accessed boot data from
`
`the boot data list. And, Realtime’s argument ignores the presence of OS
`
`control information in Sukegawa and the obviousness of managing the OS
`
`control information similarly to the AP control information.” (Id. at 13.)
`
`•
`
`“…Realtime does not properly assess obviousness and ignores the
`
`other possibility – that the LRU algorithm could discard items not requested
`
`during system boot-up. Indeed, as Dr. Neuhauser explained, the entire point
`
`of an LRU algorithm is to remove data that has not been accessed and, thus,
`
`a POSITA would have found Sukegawa’s automatic deletion of control
`
`information obviously (and most likely) to include control information that
`
`was not accessed (or not requested during system boot-up).” (Id. at 15-16.)
`
`3)
`
`At page 15 of the Reply, Petitioner argues that Sukegawa discloses
`
`performing the claim 14 step “accessing boot data” prior to the step “loading the
`
`boot data into a memory.” For example:
`
`•
`
` “… Sukegawa accesses unloaded data from HDD2 prior to loading it
`
`into flash memory 1.” (Id. at 15.)
`
`•
`
` “‘[A]ccess[ing]’ data is the ‘act of reading data from or writing data
`
`to memory,’ which is accomplished by Sukegawa’s reading boot data from
`
`2
`
`
`
`HDD2 when loading boot data into flash memory 1. APPLE-1044.” (Id. at
`
`15.)
`
`•
`
`“Thus, a POSITA would have understood that the act of loading the
`
`data into memory is necessarily preceded by the act of accessing the data to
`
`be loaded, or written, into memory.” (Id. at 15.)
`
`•
`
`“Sukegawa then, separately, services request for loaded boot data.”
`
`(Id. at 15.)
`
`4)
`
`At pages 15-16 of the Reply, Petitioner argues that the limitations
`
`“accessing” or “loading” boot data “that is associated with a boot data list” do not
`
`require the “boot data” be associated with the “boot data list” prior to accessing or
`
`loading. For example:
`
`•
`
`“Indeed, claim 14 merely recites accessing boot data ‘associated with
`
`a boot data list’ and, under BRI, places no restriction on whether that boot
`
`data becomes associated with the boot data list prior to, or at the time of,
`
`accessing.” (Id. at 16.)
`
`5)
`
`At pages 15-16 of the Reply, Petitioner argues that Sukegawa’s files of
`
`control information disclose the limitations “accessing” or “loading” boot data
`
`“that is associated with a boot data list.” For example:
`
`•
`
`“Indeed, when Sukegawa loads/accesses a file of control information
`
`from HDD2 to flash memory 1, the control information in the file is
`
`associated with the file prior to its loading/accessing.” (Id. at 16.)
`
`6)
`
`At pages 15-17 of the Reply, Petitioner argues that Sukegawa’s table 3A
`
`renders obvious the limitation “loading” boot data “that is associated with a boot
`
`3
`
`
`
`data list.” For example:
`
`•
`
`“[E]ach of Sukegawa, Settsu, and Zwiegincew render obvious this
`
`feature, even under Realtime’s overly-narrow interpretation.” (Id. at 16.)
`
`•
`
`“In fact, both operations must occur at relatively the same time and, as
`
`such, a POSITA would have found it obvious to perform either operation
`
`(table update or data load) just prior to the other.” (Id. at 16-17.)
`
`•
`
`“As Dr. Neuhauser explained, a POSITA would have found it obvious
`
`that, to generate this list, Sukegawa’s system receives a user selection of
`
`data to preload, updates table 3A to indicate the selection, and then loads the
`
`user-selected data into area.” (Id. at 17.)
`
`•
`
`“In this way, a POSITA would have found it obvious that the user-
`
`selected data is associated with table 3A prior to its loading.” (Id. at 17.)
`
`7)
`
`At pages 17-18 of the Reply, Petitioner argues that Settsu and Zwiegincew
`
`render obvious the limitations “accessing” or “loading” boot data “that is
`
`associated with a boot data list.” For example:
`
`•
`
`“[E]ach of Sukegawa, Settsu, and Zwiegincew render obvious this
`
`feature, even under Realtime’s overly-narrow interpretation.” (Id. at 16.)
`
`•
`
`“In the Petition, Dr. Neuhauser explained how Settsu and Zwiegincew
`
`each describe loading boot data that is associated with a boot data list.” (Id.
`
`at 17.)
`
`8)
`
`At pages 21-22 of the Reply, Petitioner argues that Dye’s compression
`
`engines and components that perform encoding operations meet the “plurality of
`
`encoders” limitations. For example:
`
`4
`
`
`
`•
`
`“Indeed, a component that performs encoding operations is commonly
`
`understood to be an encoder. Because Realtime admits that Dye has a
`
`plurality of components that each perform encoding operations, Realtime
`
`itself acknowledges that Dye includes a plurality of encoders.” (Id. at 22
`
`(internal citations omitted).)
`
`•
`
`“Specifically, Dye contemplates multiple compression engines.
`
`Because Dye’s compression engine is an encoder (as Realtime admits),
`
`Dye’s multiple compression engines represent multiple encoders.” (Id. at 22
`
`(internal citations omitted).)
`
`9)
`
`At pages 25-26 of the Reply, Petitioner argues that Sukegawa renders
`
`obvious the “utilizing the stored additional portion of the operating system to at
`
`least further partially boot the computer system” limitation. For example:
`
`•
`
`“Realtime fails to address, however, specific disclosure from
`
`Sukegawa (cited in the Petition and by Dr. Neuhauser) of a swapping
`
`operation used to meet a request for data that is not present in HDD2 or flash
`
`memory unit 1, in which a ‘program (including data) stored in the main
`
`memory 23 is shifted from the main memory 23 as a swap file,’ and in
`
`which ‘the swap file is shifted to the HDD 2.’ Sukegawa, 7:66-8:8.” (Id. at
`
`25-26 (emphasis provided by Petitioner).)
`
`•
`
`“As noted by Dr. Neuhauser, ‘a swap file including control
`
`information can be stored at the HDD 2’ and Sukegawa’s controller 3 ‘can
`
`read out the swap file … on an as needed basis’ [sic] from the storage area
`
`of the HDD 2,’ for example, to further partially boot the computer system. In
`
`at least this way, Sukegawa renders obvious this feature of claim 9.” (Id. at
`
`26 (internal citations omitted).)
`
`5
`
`
`
`Respectfully Submitted,
`
`Date: October 13, 2017
`
`
`
`
`
`
`
`
`
` /Joseph F. Edell/
`Joseph F. Edell (Reg. No. 67,625)
`Richard Z. Zhang (Reg. No. 73,397)
`Fisch Sigler LLP
`5301 Wisconsin Avenue NW
`Fourth Floor
`Washington, DC 20015
`Phone: (202) 362-3527
`Fax: (202) 362-3501
`Email: Joe.Edell.IPR@fischllp.com
`Email: Richard.Zhang.IPR@fischllp.com
`
`Desmond S. Jui (pro hac vice)
`Fisch Sigler LLP
`96 North Third Street
`Suite 260
`San Jose, CA 95112
`Phone: (650) 362-8209
`Email: Desmond.Jui.IPR@fischllp.com
`
`William P. Rothwell (Reg. No. 75,522)
`Noroozi PC
`2245 Texas Drive, Suite 300
`Sugar Land, TX 77479
`Phone: (281) 566-2685
`Email: William@nooozipc.com
`
`Kayvan B. Noroozi (pro hac vice)
`Noroozi PC
`1299 Ocean Avenue, Suite 450
`Santa Monica, CA 90401
`Phone: (310) 975-7074
`Email: Kayvan@noroozipc.com
`
`6
`
`
`
`CERTIFICATE OF SERVICE
`
`I hereby certify that on October 13, 2017, a true and correct copy of the
`
`foregoing Patent Owner’s List of Petitioner’s Improper Reply Arguments is being
`
`served electronically to the Petitioner at the correspondence email addresses of
`
`record provided in the Petition as follows:
`
`W. Karl Renner (Lead Counsel) IPR39521-0025IP2@fr.com
`
`
`
`Respectfully Submitted,
`
`Date: October 13, 2017
`
`
`
`
`
` /Joseph F. Edell/
`Joseph F. Edell (Reg. No. 67,625)
`Fisch Sigler LLP
`5301 Wisconsin Avenue NW
`Fourth Floor
`Washington, DC 20015
`Phone: (202) 362-3527
`Fax: (202) 362-3501
`Email: Joe.Edell.IPR@fischllp.com
`
`
`
`