throbber
Ubisoft, Inc. et al.,
`
`v
`
`Uniloc Luxembourg S.A.,
`
`Case IPR2017-01291 (Patent 6,728,766)
`
`Hearing Before Sally C. Medley,
`Mariam L. Quinn (Presiding), and
`Jessica C. Kaiser
`
`August 7, 2018
`
`

`

`Claim 1: user ggersective of license availability
`
`1. A method for management of license use for a network
`comprising the steps of:
`
`maintaining license management policy information for a
`plurality of application programs at a license management
`server, the license management policy information
`
`including at least one of a user identity based policy, an
`administrator policy override definition or a user policy
`override definition;
`
`
`
`— for the selected one of the
`plurality of application programs_ based on the
`maintained license management policy information; and
`
`providing an unavailability indication to the Client responsive
`to the selection if the license availability indicates that a
`license is— or an availability
`indication if the licensed availability indicates that a license
`is—-
`
`

`

`. a request for license availability1 from a user at a client” and “determining .
`.
`“receiving .
`
`. .fort e user”
`
`Undisputed claim construction:
`
`\/ The claim language explicitly requires that the request for
`license availability must be (1) received from and (2)
`determined for (3)- at a client.
`
`\/ This claim language is distinguishable from a request for
`license availability received from or determined for the
`client device itself.
`
`\/ The intrinsic evidence indicates the claimed license
`
`management is related to usage availability for a user of
`
`an application program.
`
`

`

`give rise to estoppel here
`
`Petitioner’s arguments in litigation
`
`In litigation, Petitioner successfully argued that the intrinsic
`
`evidence indicates “determining the license availability
`
`for the
`
`user" is distinct from determining that the user is authorized
`
`for a selected application program.
`
`EXZOOZ at pp. 23-27; see also District Court’s Claim Construction Order in
`
`Uniloc USA Inc., et a]. V. AVG Tech. USA, Inc., et al., Case No. 2:16-CV-00393,
`
`Dkt. No. 210, at pp. 55—59 [E.D.T.X. Aug. 16, 2017)
`
`
`
`
`
`
`' “furl-'3 hit: {1;
`.‘z'szz‘i'mii' t. The intrinsic evidence draws
`
`
`a distinction between authorization and license management. Generally speaking, the intrinsic
`
`evidence indicates that authorization is related to controlling access to an application program,
`
`whereas license management is related to usage of an application program. See, e.g., ’466 Patent
`
`at 10:57—58 (“User authorization 212 provides control over which applications may be accessed
`
`by a particular user or group”); 11:35—38 (“The license management component 216 thereby
`
`provides a convenient tool for tracking the usage of specified applications.’).
`
`

`

`
`
`Petitioner’s arguments in litigation
`give rise to estoppel here
`
`For example. in describing Figures 6 and 7, the specification states that “[a]t block 264,
`
`the server system 22 checks the user’s credentials to see if the user is authorized to bring up the
`
`user desktop interface application" and that “[i]fthe user is authorized. server system 22 processes
`
`a license request to determine if a license is available for the desktop application (block 268)." Id.
`
`at 13:50—60. In other words, a user could be authorized to use an application, but the available
`
`District Court’s Claim
`
`Construction Order in Uniloc
`
`license may already be allocated. The patentees argued this distinction during the prosecution of USA Inc-i et 31- V- AVG TeCh-
`
`the ’466 Patent. Specifically, the patentee argued the following:
`
`W’ith respect to Claims 9-11, Applicants again can find no discussion ofthe ‘license
`availability” recitations of these Claims in the cited portions of Oh or in Bladow.
`While Bladow does discuss determining whether a user is authorized to access a
`resource, this is distinct from the recitations of these claims related to venfi'ing
`license availability. For example, a user could be authorized to use an application
`but five instances of the application may already be executing and the server may
`only have a five concurrent user license- Thus, an authorized user could be denied
`an instance of a requested application because no license is available.
`(See, e.g.,
`Specification, p. 18, lines 1-9; p. 21, line 31 to p. 22. line 9). Accordingly, these
`claims are also patentable for at least these additional reasons.
`
`USA, Inc., et al., Case No. 2:16-
`
`CV-00393, Dkt. No. 210, at pp.
`
`5 5-5 9 (E. D.T.X. Aug. 1 6, 2 0 1 7)
`
`IFJ'V'TVJLJMl}",llJLJi"1[Y‘“l‘
`
`~
`

`
`i, » _
`‘
`1-
`,, ~41.“
`
`a“: .. when.”
`
`-.
`
`

`

`Petitioner’s Reply highlights deficiencies of Olsen
`
`In its Reply, Petitioner again invokes estoppel by focusing
`on Olsen’s “"— embodiment:
`
`To the extent the Board is concerned with whether Olsen teaches that the
`
`license availability request is "associated with“ a user. Olsen expressly discloses
`
`Olsen discloses an embodiment
`
`
`
`
`. a».
`
`ml}j§}l€jj€'it;§L1
`
`
`
`
`
`.I
`
`..l
`
`
`
`this precise concept in at least
`
`Where the license availability request is user-specific. being based on the user’s
`
`name:
`
`"To request an application,
`
`the client assembles a request having the
`
`desired license criteria, such as the publisher, product, veision, and number
`
`of license units. This
`
`into:rmation is gravided with other
`
`relevant
`
`into:rmarionz such as the user's name. ”
`
`EXIOOZ. Olsen at 2:38-43 (reproduced in Petition at 14).
`
`"When a license is installed in LSP 110,
`
`the administrator may assign a
`
`license to an individual, machine, group, container, g other selected users.
`
`The license certificate is then only available to a user with Em
`
`”intmficorres ondin to the certi cate. "
`
`

`

`
`. a request for license availability1
`.
`“receiving .
`from a user at a client” and “determining .
`.
`. fort e user”
`
`The '7 66 patent specification provides instructive examples
`
`of usage-based, license-availability determinations for a
`
`user, including, for example, in the following disclosure:
`
`14
`
`of users to insure, for example, adequate response time, [or
`measuring and reacting to usage rates (such as by rebalanc-
`ing server capacity) and so on.
`In addition, a software
`designer may provide an application allowing administrators
`to change license use policies depending upon the requesting
`user. For example, users associated with the headquarters
`operations or network management department could be
`made exempt from license count limits while everyone else
`is subject to license count limits. Accordingly, license policy
`management may be provided by a centralized server system
`22 of the present invention in a manner analogous to that
`previously described for user preferences.
`
`5
`
`10
`
`for the user preference selection input. User
`itself, but
`preferences obtained through the application launcher pro-
`gram at any individual client station may then be made
`available by on-demand server 22 to that user regardless of
`the particular client station at which the particular user is
`working. Furthermore, while the descriptions above were
`
`(EX1001, 1413-8 and 23-28)
`
`

`

`
`. a request for license availability1
`.
`“receiving .
`from a user at a client” and “determining .
`.
`. fort e user”
`
`The '766 patent specification expressly disparages systems
`
`that tie license availability determinations to client devices,
`
`including in the following background statements:
`
`3
`
`typically
`it
`across applications for a user. Furthermore,
`associates personalized screen information with an Internet
`address which is client device rather than user associated,
`therefore limiting its ability to support roaming by users.
`
`Each of these “mobility” systems typically do not address
`the full range of complications which may arise in a het-
`erogeneous network utilizino diiferin devices and connec-
`
`
`
`
`
`Users would typically have
`to manually define session characteristics at each difl'ering
`workstation they used in the network or maintain local
`characteristic definitions which may be inappropriate for
`particular applications a user is executing and may substan-
`tially reduced the administrative convenience of a centrally
`
`controlled network.
`
`
`
`(EX1001, 3:1-19)
`
`10
`
`15
`
`

`

`.a requestfor license availabilit. from a user at a client” and‘‘determining.. .fort e user
`
`“receiving.
`
`During prosecution, Applicants successfully
`
`distinguished certain art as follows:
`
`A method for management of license use for a network
`19.
`comprising the steps of:
`maintaining license management policy iniormation for a plurality of
`application programs at a license management sewer. the license
`management policy information Including at least one of a user identity based
`policy. an administrator policy override definition or a user policy override
`definition;
`receiving at the license management server a request for a license
`
`EX1005, p. 135.
`
`management policy InformatIonnd
`providing an unavailability Indication to the client responsive to the
`selection if the license availaoility indicates that a licenseIs not available@
`
`
`
`

`

`. a request for license availabilit
`.
`“receiving .
`from a user at a client and ‘determining .
`.
`
`.
`
`.
`
`.
`
`,,
`
`. fort e user (Christiano, Col. 1. lines 24-38, emphasis added). Accordingly.
`
`;f
`
`
`
`a
`
`'i:-..—~-.-~.i
`
`‘
`
`l: i we}
`
`
`aim; » ' a ‘
`
`
`
`Duvvoori describes license management as follows:
`
`Another configu ration option for the 32-bit agent service and the 16-bit agents
`released by the assignee on Jun. 21, 1996 is the abiity to choose an
`automatic denial of unregistered applications. In this mode. any application
`' programs that the entel'prlse of whlch the network Is a part does not
`want executed on its computers are automatically denied each time a
`launch request is received or a launch thereof is detected.
`
`
`(Duwoori, Col. 13, lines 43-50, emphasis added). Accordingly. 1':
`
`
`
`r124 ;;-;‘-':4:~:
`
`r-r-t—z-ni‘aiiuni mil-tail :14:
`
`:1 ; gr:‘1‘fiygi'11-ai-1‘
`
`t we!) iu;'_‘ :1: ’,“':'3le'll_: _‘—."r
`
`
`-":.:;3
`
`EX1005, p. 136.
`
`
`
`(Wyman, Col. 6, lines 55-58. emphasis added).
`
`
`" ‘ ;:;"- l'f:j" (in! l}: 31:“,‘13'Pfi1‘: 7;,17’31'7‘i
`
`{5r 1;;
`
`lié“:i:fjb'"'rl:' pl' 2 I'"'Ii
`
`
`
`10
`
`

`

`Olsen is deficient and cumulative with the art successfully distinguished during prosecution
`
`selected application program.“ Id. 1i l9. Olsen states that the “secmity
`
`~ Paper 9 (Original
`equivalency check“ is performed to ‘ ::__ my" -'
`106 is among those assigned to the license certificate.“ Ex. 1002, 12:14—17.
`Institution Decrsron) at 15'
`
`Olsen’s description of the security equivalency check seems to concern the
`
` ..
`'
`‘ a“; This portion of Olsen.
`
`0 “receiving requests from clients 106" (Pet. at 12-14.. citing
`
`EXIOOZ. 3:54-61):
`
`0
`
`“client 106 may request licenses for access to applications“
`
`(id.. citing EXIOOZ, 3:54-61):
`
`0
`
`“LSP 110 receives the request for a number of license units
`
`Paper 13 at 8 (citing Pet).
`
`from client 106" (id, citing EXlOOZ. 3 254-61):
`
`0
`
`"To request an application. the client assembles a request
`
`having the desired license criteria. (step 810)“ (id. citing
`
`EXIOOZ. 223-47).
`
`11
`
`

`

`Olsen is deficient and cumulative with the art successfully distinguished during prosecution
`
`
`
`
`EX1002, 6:10—11.
`
`60 send the request to LSP 110 (step 808). The request is
`generated using the license acquisition API and suitably
`specifies particular information relating to the application.
`such as the publisher. product. and version for which license
`units are requested. In addition. the AP! suitably indicates
`65 the number of license units requested. so that the number of
`units consumed is specified by the API. Client 106 transmits
`the request to LSP 110 and waits for a response.
`
`EX1002, 10:60-67.
`
`The certificate database object dtecks each license record
`in the database until srrflieient records are accumuleted. If so
`compatible license records are found in the [resent damhese.
`LSP 110 constructs license catificete objects from the
`buffers matching the publisher. Irodrct. and version fields
`(step 826). he finesse certificate objects are queried to
`determine whether enough units have been accrumlnted to 55
`fulfill the request (step 818). If the request cannot be fulfilled
`
`EX1002, 11:49-56.
`
`CREATE CERTIHCAIE
`
`DATABASE OBJECT
`
`376
`
`$54RCH LOCAL LICENSE
`CERTIHCAIE DATABASE
`
`
`
`
`
`
`
`
`SELECT NEXT
`LSP J: SDIRCH
`
`12
`
`

`

`Olsen is deficient and cumulative with the art successfully distinguished during prosecution
`
`
`1':l_at?[by remwmg forexample thepolicy attributesofthe
`
`H's];
`
`license. the user information associated with the request. any
`existing license assignments. and the raw number of units 45
`originally installed. This is performed before actually
`obtaining the license to determine whether all of the required
`license units are available.
`EX1002,11:40-48_
`
`If an assignment exists on the license certificate it performs
`
`
`,
`4
`-
`:1
`-_1
`il_
`_,
`FINE”- 1; vf‘l‘f
`~37
`._:.'.l Leiflhi-i—V
`3‘”
`
`
`r.
`A
`-
`.
`
`(step 830').
`
`EX1002, 12:14 19.
`
`.:-‘-'..,J.J£t..-J - certificate object returns an error .
`
`35"
`
`836
`
`838
`
` l-MNDLE
`70 Cl
`
`65 application transmitsa release notification to LSP 110
`
`TRANSMN
`
`IE/W
`
`EX1002, 12:64.
`
`13
`
`

`

`Petition is facially deficient re. means+funotion limitations
`
`Board’s original Institution Decision (Paper 10 at 17):
`
`21. Claims 15. 16. ‘72. 23, 35. and 36
`
`For independent claims 15 and 16. we determined above that
`
`Petitioner had not identified sufficient corresponding structure for "means
`
`for installing a plurality of application programs at the server." In its
`
`asserted ground. Petitioner addresses the limitations of claims 1. 15. and 16
`
`together. Pet. 28—52. For this limitation. although Petitioner contends
`
`Kasso has application programs stored at a server’s storage device.
`
`Petitioner does not address whether this teaching meets the corresponding
`
`structure discussed above (i.e., steps 112—116 of Figure 8 and the associated
`
`description (Ex. 1001. 17:55—67) (and their equivalents». Pet. 30—31.
`
`14
`
`

`

`Petition is facially deficient re. means+function limitations
`
`Board Denied Petitioner’s Request for
`
`Rehearing focusing on claim construction:
`
`We are also not persuaded by Petitioner’s contention that the
`
`“database" is the only structure that is clearly linked such that the claims are
`
`(Paper 12 p. 3)
`
`not indefinite. Req. Reh’ g 12. Our reviewing court has made clear that we
`
`Now we turn to Petitioner’s argument against our construction of the
`
`term “means for maintaining.” This argument centers on the contention that
`
`the Specification of the ”766 patent does not disclose an “algorithm.” Req.
`
`Reh’g 3—11. This argument is not persuasive for two reasons. First, the
`
`Petition did not proffer any contentions, argument, or evidence regarding
`whether the ’766 patent disclosed a sufficient (or any) algorithm, and,
`
`(Paper 12 p- 4)
`
`therefore, we could not have misapprehended or overlooked the matter. It is
`
`Petitioner’s burden to show that the matter was presented previously, and
`
`that we overlooked or misapprehended the matter. Absent such a showing,
`
`the Rehearing Request presents new arguments akin to an unauthorized
`
`reply to the preliminary response, which is not the role of a Request for
`
`Rehearing under our rules.
`
`15
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket