throbber
Petition for Inter Partes Review of U.S. Patent No. 8,694,657
`
`Paper No. 1
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`Microsoft Corporation
`Petitioner
`
`v.
`
`Windy City Innovations, LLC
`Patent Owner
`
`U.S. Patent No. 8,694,657
`
`TITLE: REAL TIME COMMUNICATIONS SYSTEM
`____________________
`
`Inter Partes Review No. IPR2017-00656
`____________________
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 8,694,657
`
`
`
`
`
`

`
`Table of Contents
`
`
`Page
`
`
`I.
`
`V.
`
`MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(A)(1) ....................... 1
`A.
`Real Party-In-Interest under 37 C.F.R. § 42.8(b)(1) ............................ 1
`B.
`Related Matters under 37 C.F.R. § 42.8(b)(2) ..................................... 1
`C.
`Lead and Back-Up Counsel under 37 C.F.R. § 42.8(b)(3) .................. 2
`D.
`Service Information .............................................................................. 3
`E.
`Power of Attorney ................................................................................ 3
`PAYMENT OF FEES - 37 C.F.R. § 42.103 .................................................. 3
`II.
`III. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37
`C.F.R. §§ 42.104 AND 42.108 ....................................................................... 3
`A. Grounds for Standing under 37 C.F.R. § 42.104(a) ............................. 3
`B.
`Identification of Challenge under 37 C.F.R. § 42.104(b) and
`Statement of Precise Relief Requested ................................................ 4
`Requirements for Inter Partes Review 37 C.F.R. § 42.108(c) ............ 4
`C.
`IV. CLAIM CONSTRUCTION UNDER 37 C.F.R. § 42.104(B)(3) ................... 5
`A.
`“token” .................................................................................................. 5
`B.
`“pointer” ............................................................................................... 6
`THE CHALLENGED CLAIMS ARE UNPATENTABLE ........................... 6
`A.
`Brief Summary and Date Qualification of the Prior Art ...................... 8
`1.
`Brief Overview of Roseman (Ex. 1003) .................................... 8
`2.
`Brief Overview of Rissanen (Ex. 1004) ................................... 11
`3.
`Brief Overview of Vetter (Ex. 1005) ....................................... 12
`4.
`Brief Overview of Pike (Ex. 1006) .......................................... 13
`5.
`Brief Overview of Lichty (Ex. 1007) ....................................... 14
`Ground 1: Claims 189, 334, 342, 348, 465, 580, 584, and 592
`Are Obvious Over Roseman, Rissanen, Vetter, Pike, and Lichty ..... 15
`1.
`Independent Claim 189 ............................................................ 15
`
`B.
`
`
`
`
`
`-i-
`
`
`
`

`
`a.
`
`b.
`
`c.
`
`d.
`
`e.
`
`Table of Contents
`(continued)
`
`Page
`
`“A method of communicating via an Internet
`network by using a computer system including a
`controller computer and a database which serves as
`a repository of tokens for other programs to access,
`thereby affording information to each of a plurality
`of participator computers which are otherwise
`independent of each other, the method including:”
`(Claim 189, Preamble) ................................................... 15
`“affording some of the information to a first of the
`participator computers via the Internet network,
`responsive to an authenticated first user identity”
`(Claim 189[a]) ............................................................... 27
`“affording some of the information to a second of
`the participator computers via the Internet
`network, responsive to an authenticated second
`user identity” (Claim 189[b]) ........................................ 32
`“determining whether the first user identity and the
`second user identity are able to form a group to
`send and to receive real-time communications”
`(claim 189[c]) ................................................................ 33
`“determining whether the first user identity is
`individually censored from sending data in the
`communications, the data presenting at least on of
`a pointer, video, audio, a graphic, and multimedia
`by determining whether a respective at least one
`parameter corresponding to the user identity has
`been determined by an other of the user identities”
`(claim 189[d]) ................................................................ 35
`
`-ii-
`
`
`
`
`
`
`
`
`
`

`
`Table of Contents
`(continued)
`
`Page
`
`f.
`
`g.
`
`
`
`2.
`3.
`
`“if the user identities are able to form the group,
`forming the group and facilitating sending the
`communications that are not censored form the
`first participator computer to the second
`participator computer, wherein the sending is in
`real time and via the Internet network, and wherein
`the communications which are received and which
`present an Internet URL, facilitating handling the
`Internet URL via the computer system so as to find
`content specified by the Internet URL and
`presenting the content at an output device of the
`second participator computer” (claim 189[e]) ............... 45
`“if the user identity is censored from sending of
`the data, not allowing sending the data that is
`censored from the first participator computer to the
`second participator computer.” (claim 189[f]) .............. 48
`Claim 334 (two client software alternatives) ........................... 48
`Claim 342 (data presenting a human communication of
`sound) ....................................................................................... 52
`Claim 348 (access to a member-associated image) ................. 53
`4.
`Claim 465 (Apparatus Corresponding to Claim 189) .............. 54
`5.
`Claims 580, 584, 592 (Corresponding Dependent Claims) ..... 57
`6.
`VI. CONCLUSION ............................................................................................. 58
`
`
`
`
`
`-iii-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`List of Exhibits
`
`
`
`
`
`
`
`Description of Document
`Ex. No
`1001 U.S. Patent No. 8,694,657 to Daniel L. Marks
`1002 Declaration of Tal Lavian, Ph.D.
`1003 U.S. Patent No. 6,608,636 to Robert D. Roseman
`1004
`EP 0621532 A1 to Eugene Rissanen, published on April 13, 1994
`1005
`
`Ronald J. Vetter, Videoconferencing on the Internet, Computer, IEEE
`Computer Society, Vol. 28, No. 1, at pp.77-79 (Jan. 1995)
`
`1006
`1007
`
`1008
`
`1009
`
`Excerpts from Mary Ann Pike et al., Using Mosaic (1994)
`
`Excerpts from Tom Lichty, The Official America Online for Macintosh
`Membership Kit & Tour Guide (2d ed. 1994)
`
`Tim Berners-Lee et al., Request for Comments (RFC) 1738, Uniform
`Resource Locators (URL), Dec. 1994
`
`James Coates, A Mailbox in Cyberspace Brings World to Your PC,
`Chicago Tribune, Mar. 1995
`
`1010 Date-stamped excerpts from Mary Ann Pike et al., Using Mosaic
`(1994)
`
`1011 Date-stamped excerpts from Tom Lichty, The Official America Online
`for Macintosh Membership Kit & Tour Guide (2d ed. 1994)
`
`-iv-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`Microsoft Corporation respectfully submits the following Petition for Inter
`
`Partes Review of claims 189, 334, 342, 348, 465, 580, 584, and 592 of U.S. Patent
`
`No. 8,694,657 (Ex. 1001) (“’657 patent”). This petition is substantively identical
`
`to pending IPR2016-01159 filed by Facebook, Inc. (“the Facebook IPR”), and
`
`relies on the same evidence and expert testimony. Petitioner requests institution on
`
`the same grounds as any grounds instituted in the Facebook IPR, and concurrently
`
`moves to join the Facebook IPR. See Paper 2.
`I. MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(A)(1)
`A. Real Party-In-Interest under 37 C.F.R. § 42.8(b)(1)
`The Petitioner, Microsoft Corporation (“Petitioner”), is the real party-in-
`
`interest.
`
`B. Related Matters under 37 C.F.R. § 42.8(b)(2)
`The ’657 patent is the subject of one pending litigation involving the
`
`Petitioner: Windy City Innovations, LLC v. Microsoft Corp., Case No. 4:16-cv-
`
`1729-YGR (N.D. Cal.), in which the patent owner contends that the Petitioner
`
`infringes the ’657 patent. The ’657 patent has also been asserted against Facebook,
`
`Inc. in the Northern District of California (No. 3:16-cv-01730-RS).
`
`The ’657 patent is the subject of instituted IPRs No. 2016-01155 filed by
`
`Petitioner and the Facebook IPR. (No. IPR2016-01159). Both Petitioner and
`
`Facebook have filed petitions with motions for joinder to Petitioner’s IPR2016-
`
`
`
`
`
`-1-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`01155 proceeding. Petitioner has filed IPR202017-00606, and Facebook has filed
`
`IPR202017-00606.
`
`The present petition is substantively identical to the Facebook IPR and is
`
`filed concurrently with a motion for joinder to the Facebook IPR.
`
`C. Lead and Back-Up Counsel under 37 C.F.R. § 42.8(b)(3)
`Petitioner provides the following designation of counsel.
`
`LEAD COUNSEL
`Joseph A. Micallef
`USPTO Reg. No. 39,772
`SIDLEY AUSTIN LLP
`1501 K Street, N.W.
`Washington, D.C. 20005
`Telephone: 202-736-8492
`Facsimile: 202-736-8711
`iprnotices@sidley.com
`
`BACK-UP COUNSEL
`John W. McBride
`jwmcbride@sidley.com
`pro hac to be requested
`SIDLEY AUSTIN LLP
`1 South Dearborn St.
`Chicago, IL 60603
`Telephone: 312-853-7014
`Facsimile: 312-853-7036
`
`Herman F. Webley
`pro hac to be requested
`hwebley@sidley.com
`SIDLEY AUSTIN LLP
`1501 K Street, N.W.
`Washington, D.C. 20005
`Telephone: 202-736-8609
`Facsimile: 202-736-8711
`
`Todd M. Siegel
`USPTO Reg. No. 73,232
`KLARQUIST SPARKMAN, LLP
`121 S.W. Salmon Street, Ste. 1600
`Portland, Oregon 97204
`Telephone: (503) 595-5300
`Facsimile: (503) 595-5301
`todd.siegel@klarquist.com
`
`
`
`
`
`-2-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`
`
`Service Information
`D.
`This Petition is being served to the current correspondence address for the
`
`’657 patent, PETER K. TRZYNA, ESQ., P.O. Box 7131, Chicago, IL 60680. The
`
`Petitioner may be served at the addresses provided above for lead and back-up
`
`counsel, and consents to electronic service at those addresses.
`
`Power of Attorney
`E.
`Filed concurrently in accordance with 37 C.F.R. § 42.10(b).
`
`II.
`
`PAYMENT OF FEES - 37 C.F.R. § 42.103
`
`The Director is authorized to charge the fee specified by 37 CFR § 42.15(a)
`
`to Deposit Account No. 50-1597.
`III. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R. §§ 42.104
`AND 42.108
`
`A. Grounds for Standing under 37 C.F.R. § 42.104(a)
`The Petitioner certifies that the ’657 patent is available for inter partes
`
`review and that the Petitioner is not barred or otherwise estopped from requesting
`
`inter partes review on the ground identified in the present Petition. On June 2,
`
`2015, the Patent Owner filed a complaint alleging infringement of the ’657 patent
`
`by the Petitioner. Windy City Innovations, LLC v. Microsoft Corporation, 1:15-cv-
`
`103 (W.D.N.C.). This case was transferred to the Northern District of California
`
`(No. 3:16-cv-01729-RS). On June 3, 2016, the Petitioner filed a petition for inter
`
`partes review of the ’657 patent. See IPR2016-01155. While the Petitioner was
`
`
`
`
`
`-3-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`served with a complaint alleging infringement of the ’657 patent more than one
`
`year before the date this Petition is filed, the time limitation of 35 U.S.C. § 315(b)
`
`“shall not apply to a request for joinder under” 35 U.S.C. § 315(c). Because this
`
`Petition is accompanied by such a request (Paper 2), it complies with 35 U.S.C. §
`
`315(b).
`
`B.
`
`Identification of Challenge under 37 C.F.R. § 42.104(b) and
`Statement of Precise Relief Requested
`The Petitioner requests that the Board initiate inter partes review of claims
`
`189, 334, 342, 348, 465, 580, 584, and 592 on the following ground:
`
`Ground
`1
`
`Claims
`189, 334, 342,
`348, 465, 580,
`584, 592
`
`Basis for Challenge
`Unpatentable over Roseman in view of Rissanen and
`Vetter, in further view of Pike and Lichty, under 35
`U.S.C. § 103(a)
`
`Part V below provides a detailed explanation as to why the challenged
`
`claims are unpatentable based on the grounds identified above. The Petitioner has
`
`also submitted an accompanying Declaration of Tal Lavian, Ph.D. (“Lavian
`
`Decl.”) (Exhibit 1002), a technical expert with more than two decades of relevant
`
`experience, including extensive experience in computer programming and software
`
`development. (Lavian Decl., Ex. 1002, ¶¶ 2-9, Ex. A.)
`
`C. Requirements for Inter Partes Review 37 C.F.R. § 42.108(c)
`The Board should institute inter partes review of claims 189, 334, 342, 348,
`
`465, 580, 584, and 592 because this Petition establishes a reasonable likelihood of
`
`-4-
`
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`prevailing. Each limitation of each challenged claim is disclosed and/or suggested
`
`by the prior art, as explained in detail in Part V below.
`IV. CLAIM CONSTRUCTION UNDER 37 C.F.R. § 42.104(B)(3)
`“token”
`A.
`Each independent claim addressed in this Petition recites a database that
`
`provides a “repository of tokens” used to perform user authentication. Claim 1, for
`
`example, recites “authenticating a first user identity and a second user identity
`
`according to permissions retrieved from [a] repository of tokens of the database.”
`
`The patent describes a “token” as follows:
`
`With regard to the arbitrating of the controller computer 3 is directed
`by the controller computer program 2 to use “identity tokens”, which
`are pieces of information associated with user identity. The pieces of
`information are stored in memory 11 in a control computer database,
`along with personal information about the user, such as the user’s age.
`
`(’657, 7:49-54 (underlining added).) The specification goes on to describe several
`
`exemplary uses for tokens. (’657, e.g., 7:60-61, 8:2-4, 8:7-9.)
`
`Based on the definitional language in the written description, the term
`
`“token” should be interpreted as a “piece of information associated with user
`
`identity.” (Lavian Decl. ¶¶ 17, 18.)
`
`
`
`
`
`-5-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`“pointer”
`B.
`The term “pointer” appears in independent claims 189 and 465. “Pointers”
`
`are well‐known in computer science and exist at all levels of computer system
`
`design. (Lavian Decl. ¶ 19.) To persons of ordinary skill in the art, a “pointer” is a
`
`piece of information that “points to,” or references, other information. (Id.)
`
`The written description provides only the following mention of pointers,
`
`which identifies a Uniform Resource Locator (URL) as an example of a pointer:
`
`The present invention comprehends communicating all electrically
`communicable multimedia information as Message 8, by such means
`as pointers, for example, URLs. URLs can point to pre-stored audio
`and video communications, which the Controller Computer 3 can
`fetch and communicate to the Participator Computers 5.
`
`(’657, 5:11-16.) Based on this description, the term “pointer” should be construed
`
`as a “piece of information that points to or references other information.”
`
`(Lavian Decl. ¶¶ 19, 20.)
`V. THE CHALLENGED CLAIMS ARE UNPATENTABLE
`Claims 189, 334, 342, 348, 465, 580, 584, and 592 would have been obvious
`
`to a person of ordinary skill in the art based on the following grounds:
`
`Ground Claims
`1
`189, 334,
`342, 348,
`465, 580,
`584, 592
`
`Basis for Challenge
`Unpatentable over Roseman in view of Rissanen and
`Vetter, in further view of Pike and Lichty,
`under 35 U.S.C. § 103(a)
`
`
`
`
`
`-6-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`The Petitioner notes that although Ground 1 cites five prior art references,
`
`Roseman is the base reference that discloses the majority of the limitations. The
`
`other references relate to minor claim features that, as shown below, were within
`
`the general knowledge of persons of ordinary skill in the art as of April 1996.1 For
`
`example, Rissanen is cited to show that the tokens in Roseman could be stored in a
`
`“database,” Vetter to show that Roseman could have been adapted to communicate
`
`over the “Internet,” Pike to show that Roseman could have used “URLs,” and
`
`Lichty to show basic and known features of America Online chat rooms. These
`
`details were so commonplace and known that additional prior art references were
`
`arguably not required to show them. Nevertheless, the Petitioner is mindful of the
`
`Board’s desire for IPR petitioners to avoid presentation of potentially redundant
`
`grounds, and as such, the Petitioner has presented a single obviousness ground
`
`rather than present multiple alternative grounds with alternative combinations of
`
`these references.
`
`
`1 As explained by Dr. Lavian, a person of ordinary skill in the art as of April 1996
`
`would have had at least a bachelor’s degree in electrical engineering or computer
`
`science (or equivalent degree or experience) with practical experience or
`
`coursework in the design or development of systems for network-based
`
`communication between computer systems. (Lavian Decl., Ex. 1002, ¶ 13.)
`
`
`
`
`
`-7-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`The Petitioner also notes that the ’657 patent contains 671 separate claims –
`
`an enormous number, many of them reciting substantially the same or identical
`
`claim language. In order to best conserve the resources of the Board, the Petitioner
`
`has chosen to challenge only a handful of claims, which appear to be representative
`
`of other claims. The Petitioner’s choice to challenge only a handful of claims is
`
`not a concession that any of the other claims recite inventive subject matter.
`
`A. Brief Summary and Date Qualification of the Prior Art
`Brief Overview of Roseman (Ex. 1003)
`1.
`Roseman, entitled “Server Based Virtual Conferencing,” discloses a system
`
`for creating a virtual conference room that allows participants to collaborate in real
`
`time over a computer network. Roseman qualifies as prior art under at least 35
`
`U.S.C. § 102(e) (pre-AIA) because it is a patent issuing from an application filed
`
`on May 13, 1992, before the filing of the earliest application to which the patent
`
`could claim priority (April 1, 1996). This Petition cites Roseman for the majority
`
`of the limitations in the challenged claims.
`
`The conferencing system in Roseman “allows multiple persons, at different
`
`locations, to hold a conference, by providing many of the conveniences which the
`
`participants would have if present together in the same physical room.” (Roseman,
`
`1:19-23.) Roseman describes “a virtual conferencing system which allows
`
`multiple persons to view, and also manipulate, a common video display, which is
`
`
`
`
`
`-8-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`simultaneously displayed at their different locations.” (Roseman, 1:28-31.) Each
`
`participant has its own “local computer.” (Roseman, 1:34-35; see also id., 2:64-
`
`65.) “When a conference is established, the local computers become connected to
`
`a host computer, via commercially available Local Area Networks (LANs) and
`
`Wide Area Networks (WANs).” (Roseman, 1:36-41; see also id., 3:14-19.)
`
`A user in Roseman creates a virtual conference room by clicking an
`
`appropriate icon through a user interface, identifying the participants of the
`
`conference and providing other information such as the rules that govern the
`
`meeting. (Roseman, 3:22-56.) Once the parameters of the conference are
`
`established, the host computer “creates the conference room. The host does this by
`
`creating a common image, such as that shown in FIG. 9. The common image
`
`includes a picture of each invitee, a ‘table,’ and the room decor.” (Roseman, 7:30-
`
`34.) An example of the virtual conference room is shown in Figure 9 below:
`
`
`
`
`
`-9-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`
`
`
`(Roseman, Fig. 9.)
`
`Once inside the conference room, “[o]bjects (documents) can be shared in
`
`the conference room by placing them on the table. This might be done by dragging
`
`an icon . . . onto the table.” (Roseman, 11:18-22.) The user can also click on the
`
`picture of another participant to engage in a private voice conversation, or drag a
`
`textual note onto the picture of another participant to send a private text message.
`
`(Roseman, 9:16-31.) Other communication features are described below.
`
`Roseman also discloses a security mechanism in which users must be invited
`
`and have an appropriate “key” to enter the conference room. (Roseman, e.g., 9:34-
`
`55, 10:61-64 (“To open a door with a key, the user drops the key onto the door
`
`lock. If the key is valid and the user has the authority to use the key, the door
`
`
`
`
`
`-10-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`opens and the user is admitted to the room.”).) Roseman also discloses a database
`
`that stores the keys for the conference room. (Roseman, 9:49-50.) These
`
`conference room “keys,” as explained below, correspond to the “tokens” recited in
`
`the independent claims. More details about Roseman are set forth below.
`
`Brief Overview of Rissanen (Ex. 1004)
`2.
`Each independent claim recites “a database which serves as a repository
`
`of tokens for other programs to access.” As noted above, the “keys” in Roseman
`
`disclose the claimed “tokens,” and those keys are stored on the central host
`
`computer. But Roseman does not use the word “database” to describe the storage
`
`of keys by the host. In the event it is argued that Roseman fails to disclose a
`
`“database” that stores the keys, as recited by the claims, this requirement would
`
`have been trivially obvious over Rissanen.
`
`Rissanen, entitled “Password Verification System,” discloses a technique for
`
`user authentication using passwords stored in a database. Rissanen qualifies as
`
`prior art under at least 35 U.S.C. § 102(b) (pre-AIA).
`
`This Petition cites Rissanen as an alternative basis to teach “a database
`
`which serves as a repository of tokens for other programs to access,” in the
`
`event it is argued that Roseman alone does not disclose this limitation. Rissanen
`
`discloses storing user passwords in a database, and subsequently using those stored
`
`passwords to verify user identity when users subsequently attempt to log-on.
`
`
`
`
`
`-11-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`(Rissanen, Ex. 1004, 1:21-28.) Rissanen also discloses that user login and
`
`password information may be stored in a database. (Rissanen, 2:22-29.) Although
`
`Rissanen also describes using spoken voice passwords, this Petition cites it for its
`
`more pedestrian teachings relating to database storage of passwords of any form.
`
`As explained in detail below, the user and password information in the
`
`database in Rissanen is analogous to the conference room “keys” in Roseman. It
`
`would have been obvious to combine Roseman and Rissanen to produce the virtual
`
`conferencing system of Roseman in which the conference room keys are stored in
`
`a database serving as a repository of tokens (keys) for other programs to access, as
`
`taught in Rissanen. (Lavian Decl. ¶¶ 33, 51-53.)
`
`Brief Overview of Vetter (Ex. 1005)
`3.
`Each independent claim also recites the step of sending and/or receiving
`
`communications “via the Internet.” Roseman discloses using “commercially
`
`available” Wide Area Networks (WANs) to communicate with participator
`
`computers, but does not specifically the Internet. (Roseman, 1:37-41; see also id.,
`
`3:14-19.) Vetter, entitled “Videoconferencing on the Internet,” discloses software
`
`tools for enabling videoconferencing over the Internet. Vetter qualifies as prior art
`
`under at least 35 U.S.C. § 102(b). This Petition cites Vetter for the straightforward
`
`proposition that simply adding “the Internet” to an existing computer-based
`
`conferencing products does not render it non-obvious over the prior art. Vetter
`
`
`
`
`
`-12-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`confirms that the Internet was already being used with conferencing systems such
`
`as Roseman to enable real-time communication. (Vetter, Ex. 1005, at p. 77.)
`
`Brief Overview of Pike (Ex. 1006)
`4.
`Pike, entitled Using Mosaic, is a book describing NCSA Mosaic, one of the
`
`early browsers for accessing the World Wide Web. (Pike, Ex. 1006, at 1-2.) This
`
`Petition cites Pike in connection with claims that recite a “pointer” or “URL.”
`
`As explained below, Roseman discloses a pointer in the form of a clickable
`
`icon that, when clicked by a meeting participant, presents a document, message or
`
`other content to the user. (Roseman, Ex. 1003, e.g., 14:53-57 & 14:59-62 (icon
`
`representing document placed on table), 9:28-31 (icon representing private
`
`message).) Roseman does not expressly disclose a URL.
`
`URLs are used today to identify hundreds of millions of resources located on
`
`the Internet, and were clearly not an invention of the ’657 patent. Pike, which was
`
`published in 1994, provides an introductory section describing basic Internet
`
`concepts such as URLs. (Pike, Ex. 1006, at 38-39.) Pike explains that “[a] URL is
`
`a complete description of an item, including the location of the item that you want
`
`to retrieve.” (Id. at 38 (italics in original).) “The location of the item can range
`
`from a file on your local disk to a file on an Internet site halfway around the
`
`world.” (Id.) Pike further explains that a URL can identify any resource on the
`
`Internet, and “is not limited to describing the location of WWW [World Wide
`
`
`
`
`
`-13-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`Web] files.” (Id.) Pike goes onto describe the familiar URL syntax and how URLs
`
`identify documents that can be retrieved from other computers. (Id. at 38-39.) As
`
`demonstrated below, it would have been obvious to a person of ordinary skill in the
`
`art to adapt known URL techniques to Roseman. (Lavian Decl. ¶¶ 91-94.)
`
`Brief Overview of Lichty (Ex. 1007)
`5.
`Lichty, entitled The Official America Online for Macintosh Membership Kit
`
`& Tour Guide (2d ed. 1994), is a book describing aspects of the service known as
`
`“America Online.” Lichty describes “chat room” features, analogous to the virtual
`
`conference rooms of Roseman, that allowed users to send real-time messages to
`
`each other over a computer network. (Lichty, e.g., pp. 252-278.) Lichty qualifies
`
`as prior art under at least 35 U.S.C. § 102(b) (pre-AIA).
`
`This Petition cites Lichty in connection with features recited in each
`
`independent claim relating to censoring data. Lichty describes a “chat room”
`
`functionality that allows individual users to “censor” other users in the chat room.
`
`For example, a user in a chat room can decide to “ignore” other users and thus no
`
`longer receive communications from them. (Lichty, pp. 269, 510 (definition of
`
`“Ignore”).) It would have been obvious to a person of ordinary skill in the art to
`
`add these features to the system of Roseman. (Lavian Decl. ¶¶ 104-106.)
`
`
`
`
`
`-14-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`B. Ground 1: Claims 189, 334, 342, 348, 465, 580, 584, and 592 Are
`Obvious Over Roseman, Rissanen, Vetter, Pike, and Lichty
`Independent Claim 189
`1.
`“A method of communicating via an Internet network
`a.
`by using a computer system including a controller
`computer and a database which serves as a repository
`of tokens for other programs to access, thereby
`affording information to each of a plurality of
`participator
`computers which
`are
`otherwise
`independent of each other, the method including:”
`(Claim 189, Preamble)
`Roseman in view of Vetter discloses each aspect of the preamble of claim
`
`189. Because of the length of the preamble, this Petition will break up the claim
`
`language piece-by-piece to ensure all limitations are covered.
`
`First, Roseman discloses “[a] method of communicating . . . by using a
`
`computer system including a controller computer and a database which serves
`
`as a repository of tokens for other programs to access,” as recited in the first
`
`part of the preamble. Roseman discloses a virtual conferencing system in which
`
`users (e.g., conference participants) communicate over a network. For example:
`
`The parties send the information which they want displayed, such as
`drawings, to the host computer. The host computer generates a
`common video screen, which it distributes to the parties: they see the
`drawings at their own local computers. Each party can move a pointer
`on the display, and point to features on the drawings. The telephones
`and video cameras allow the parties to see and speak with each other.
`
`
`
`
`
`-15-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`(Roseman, 1:42-49.) In addition, “[t]he participants can privately whisper or pass
`
`notes to each other, without the knowledge of the others.” (Roseman, 2:49-50.)
`
`Further details on how Roseman discloses communication among users is set forth
`
`in the discussion of later claim limitations.
`
`The preamble of claim 189 continues by reciting that the computer system
`
`“include[es] a controller computer and a database which serves as a
`
`repository of tokens for other programs to access, . . .” The “controller
`
`computer” in Roseman takes the form of a networked server computer, which
`
`Roseman calls the “host computer” or “host”:
`
`These individual [participant] systems are located at different
`geographic locations, and, when a virtual conference is to be held,
`become connected to a central, host, computer (or multiplicity of host
`computers) via the proper combination of Local Area Networks
`(LANs) and Wide Area Networks (WANs).
`
`(Roseman, 3:14-19 (underlining added), 1:50-52 (“The host controls many of the
`
`events occurring during the conference, as well as those occurring both during
`
`initiation of the conference and after termination of the proceedings.”).)
`
`Roseman also discloses “a database which serves as a repository of
`
`tokens for other programs to access.” The tokens in Roseman take the form of
`
`“keys,” which are stored and distributed by the host computer to potential
`
`conference participants. More specifically, Roseman explains that in creating a
`
`
`
`
`
`-16-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`new virtual conference room, the creator can cause the host to send invitations to
`
`participants. Each invitation contains a “key” that relates to the identity of the
`
`invitee and provides the permissions allowing access to the conference room:
`
`Before an invitation list is compiled, the level of invitations must be
`specified by the invitor. Three levels of invitations are considered.
`1. an invitation is for the Invitee only.
`2. an invitation is for the Invitee, but can be passed to a
`delegate, who will attend in place of the Invitee.
`3. an invitation is an open invitation to anyone wishing to
`attend.
`Invitations contain “keys” which conform to the above invitation
`level. Level 1 keys may not be passed to any other person and may
`not be copied. Level 2 keys may be passed to exactly one other person
`and may not be copied. If the key is returned to the original invitee
`than it may be passed again. Level 3 keys may be freely distributed
`and copied. The meeting is considered to be public.
`The meeting room “knows” about each key and its invitation level.
`Persons with improper keys are not admitted to the room. A person
`without a key may be admitted to the room only by someone already
`in the room or by the person responsible for the room.
`Invitations and keys are distributed electronically. The key is an
`electronic object attached to the invitation.
`
`(Roseman, 9:34-55 (underlining added).)
`
`
`
`
`
`-17-
`
`
`
`

`
`Petition for Inter Partes Review of
`U.S. Patent No. 8,694,657
`
`The passages above show that the “keys” in Roseman qualify as “tokens”
`
`because they are pieces of information associated with a user identity, that control
`
`whether a user has permission to enter a conference room. Roseman confirms that
`
`a key is a “piece of information” by stating that “the key is, essentially, a block of
`
`data, or a code.” (Roseman, 6:60-61; see also id., 9:54-55 (“The key is an
`
`electronic object attached to the invitation.”).)
`
`Roseman also confirms that a “key” is associated with a user identity. For
`
`example, the “Level 1” key described in the passage above is a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket