throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`APPLE, INC.,
`Petitioners,
`
`v.
`
`UNILOC LUXEMBOURG S.A.,
`Patent Owner.
`
`
`IPR2158-00361
`U.S. PATENT NO. 6,216,158
`
`
`
`
`
`
`
`DECLARATION OF WILLIAM C EASTTOM II
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`TABLE OF CONTENTS
`
`I.
`
`INTRODUCTION ....................................................................................... 1
`
`II.
`
`BACKGROUND AND QUALIFICATIONS .............................................. 2
`
`III. LEGAL STANARDS USED IN MY ANALYSIS ....................................... 2
`
`A. Obviousness ............................................................................................ 2
`
`B. Priority Date ........................................................................................... 4
`
`C. Person of Ordinary Skill in the Art.......................................................... 4
`
`D. Broadest Reasonable Interpretation ......................................................... 5
`
`IV. OVERVIEW OF THE ‘158 PATENT ......................................................... 5
`
`V.
`
`CLAIM CONSTRUCTION ......................................................................... 6
`
`A. palm sized computer ............................................................................... 6
`
`B. means for accessing a description of a service” ....................................... 7
`
`C. means for downloading the program code ............................................... 7
`
`D. means for executing at least a portion of the program code ..................... 7
`
`E. means for sending control commands to the service in response to the
`means for executing ................................................................................ 7
`
`VI. GENERAL ISSUES .................................................................................... 8
`
`A. Jini: Quick Study, COMPUTERWORLD (“Jini-QS”) ............................ 8
`
`B. McCandless ............................................................................................ 9
`
`C. Motivation to Combine ..........................................................................11
`
`VII. GROUND 1 SPECIFIC CLAIMS ...............................................................12
`
`

`

`A. Claim 1 “accessing a description of the service from a directory of
`services, the description of the service including at least a reference to
`program code for controlling the service” ..............................................12
`
`B. Claim 1 “downloading the program code to the palm sized computer” ..14
`
`C. Claim 1 “sending control commands to the service from the palm sized
`computer in response to the executing” ..................................................15
`
`D. Claim 8 “A method of controlling a program on a network device from a
`palm sized computer, the computer is not capable of executing the
`program by itself, the network device and computer being coupled in
`communications via a network, the method comprising” .......................16
`
`E. Claim 8 “loading the program code” ......................................................18
`
`F. Claim 9 “The method of claim 8, wherein loading the program code
`includes loading the program code onto the palm sized computer and the
`issuing the control commands includes the palm sized computer issuing
`the control commands” ..........................................................................18
`
`G. Claim 12 “The method of claim 8 wherein loading the program code
`includes loading the program code onto the palm sized computer from
`the directory of services” .......................................................................19
`
`H. Claim 20 “means for downloading the program code” ...........................20
`
`VIII. GROUND 2 ................................................................................................20
`
`A. A method of controlling a service on a network using a palm sized
`computer, the palm sized computer being coupled in communications
`with the network, the method comprising ..............................................23
`
`B. accessing a description of the service from a directory of services, the
`description of the service including ........................................................26
`
`IX. CONCLUSIONS ........................................................................................27
`
`EASTTOM CV .....................................................................................................29
`
`A. Education ...............................................................................................29
`
`

`

`1. University Degrees ........................................................................... 29
`2. Industry Certifications ...................................................................... 30
`3. Hardware and Networking Related Certifications ............................. 30
`4. Operating System Related Certifications........................................... 30
`5. Programming and Web Development Related Certifications ............ 31
`6. Database Related Certifications ........................................................ 31
`7. Security and Forensics Related Certifications ................................... 31
`8. Software Certifications ..................................................................... 32
`9. Licenses ............................................................................................ 32
`
`B. Publications ...........................................................................................32
`1. Books 32
`2. Papers, presentations, & articles........................................................ 34
`3. Patents .............................................................................................. 37
`
`C. Standards and Certification Creation ......................................................38
`
`D. Professional Awards and Memberships .................................................39
`
`E. Speaking Engagements ..........................................................................40
`
`F. Litigation Support Experience ...............................................................44
`1. Testifying Experience ....................................................................... 51
`
`G. Professional Experience .........................................................................54
`
`H. Continuing Professional Education ........................................................58
`
`I. References to my work ..........................................................................59
`1. Media References ............................................................................. 60
`2. References to publications ................................................................ 61
`3. Universities using my books ............................................................. 68
`
`J. Training .................................................................................................70
`
`K. Technical Skills .....................................................................................72
`
`
`
`
`
`

`

`I, Chuck Easttom, hereby declare as follows:
`
`I.
`
`INTRODUCTION
`1. My name is William Charles Easttom II (Chuck Easttom) and I
`
`have been retained by Uniloc Luxembourg S.A. (“Uniloc” or the “Patent
`
`Owner”) to provide my expert opinions regarding U.S. Patent No. 6,216,158
`
`(the ‘158 Patent). In particular, I have been asked to opine on whether a person
`
`of ordinary skill in the art (POSITA) at the time the inventions described in
`
`the ‘158 patent were conceived would have found all claims, claims 1-2, 6-9,
`
`12, 14-15, and 20 (“Challenged Claims”) as unpatentable in light of the cited
`
`references and arguments in IPR2158-00361.
`
`2.
`
`Based on my review of the Petition and its exhibits, and my
`
`understanding of the relevant requirements of patent law, and my decades of
`
`experience in the field of computer science including communications
`
`systems, it is my opinion that the Challenged Claims would not have been
`
`obvious in light of the proposed combinations.
`
`3.
`
`I am being compensated for my time at my standard consulting
`
`rate of $300 per hour. I am also being reimbursed for expenses that I incur
`
`during the course of this work. Apart from that, I have no financial interest in
`
`Uniloc. My compensation is not contingent upon the results of my study or
`
`the substance of my opinions.
`
`

`

`II. BACKGROUND AND QUALIFICATIONS
`
`4.
`
`In my over 25 years of computer industry experience I have had
`
`extensive experience in communications systems, including data networks in
`
`general that have messaging capabilities. I hold 42 industry certifications,
`
`which include (among others) networking certifications. I have authored 26
`
`computer science books, several of which deal with networking topics. I am
`
`also the sole named inventor on thirteen patents.
`
`5.
`
`I also have extensive experience with Java and remote
`
`programming with Java. Of my 26 published books, 2 are Java books and one
`
`of those is about Enterprise Java Beans, a means for accessing remote
`
`programming code via Java.
`
`6.
`
`A more detailed description of my professional qualifications,
`
`including a list of publications, teaching, and professional activities, is
`
`contained in my curriculum vitae, a copy of which is attached hereto as
`
`Exhibit A.
`
`III. LEGAL STANARDS USED IN MY ANALYSIS
`
`7.
`
`Although I am not an attorney and I do not offer any legal
`
`opinions in this proceeding, I have been informed of and relied on certain legal
`
`principles in reaching the opinions set forth in this Declaration.
`
`A.
`
`8.
`
`Obviousness
`
`I understand that a patent claim is invalid if the differences
`
`between the subject matter and the prior art are such that the subject matter as
`
`

`

`a whole would have been obvious to a POSITA at the time of the alleged
`
`invention. I further understand that an obviousness analysis involves a review
`
`of the scope and content of the asserted prior art, the differences between the
`
`prior art and the claims at issue, the level of ordinary skill in the pertinent art,
`
`and objective indicia of non-obviousness such as long-felt need, industry
`
`praise for the invention, and skepticism of others in the field.
`
`9.
`
`I have been informed that if a single limitation of a claim is
`
`absent from the cited prior art, the claim cannot be considered obvious.
`
`10.
`
`I have further been informed that it is improper to combine
`
`references where the references teach away from a proposed combination; and
`
`that the following factors are among those relevant in considering whether
`
`prior art teaches away:
`
`• whether a POSITA, upon reading the reference would be led in a
`
`direction divergent from the path that was taken by the applicant;
`
`• whether the prior art criticizes, discredits, or otherwise discourages
`
`investigation into the claimed invention;
`
`• whether a proposed combination would produce an inoperative
`
`result; and
`
`• whether a proposed combination or modification would render the
`
`teachings of a reference unsatisfactory for its intended purpose.
`
`11.
`
`In addition, I have been informed that a proposed combination
`
`that changes the basic principles under which the prior art was designed to
`
`operate may fail to support a conclusion of obviousness.
`
`

`

`B.
`
`Priority Date
`
`12. The 6,622,158 patent issued on Apr. 10, 2001 and the application
`
`was filed on Jan.25, 1999. For purposes of this declaration, I have assumed
`
`the priority date for the ‘158 patent is Jan.25, 1999.
`
`C.
`
`Person of Ordinary Skill in the Art
`
`13.
`
`I understand that a POSITA is a hypothetical person who is
`
`presumed to have ordinary skill in the art as of the priority date. I understand
`
`that factors that may be considered in determining the level of ordinary skill
`
`in the art may include: (a) the type of problems encountered in the art; (b)
`
`prior art solutions to those problems; (c) the rapidity with which innovations
`
`are made; (d) the sophistication of the technology; and (e) the educational
`
`level of active workers in the field.
`14.
`I have been asked to provide my opinion as to the qualifications
`
`of the person of ordinary skill in the art to which the ‘158 patent pertains as
`
`of April 24, 2000. I understand that Dr. Houh opines that a person of ordinary
`
`skill in the art “B.S. degree in Electrical Engineering, Computer Engineering,
`
`or Computer Science, or equivalent training, as well as at least three years of
`
`technical experience in the field of computer networking.” I agree with Dr.
`
`Houh’s opinion of a POSA, except that I would add that more experience
`
`could compensate for less education and vice versa. For example, one with a
`
`

`

`master’s degree might only need 1 to 2 years’ experience, or a person with no
`
`degree but over 5 years’ experience in networking would qualify as a POSA.
`
`15. Although my qualifications and experience exceed those of the
`
`hypothetical person having ordinary skill in the art defined above, my analysis
`
`and opinions regarding the ‘158 Patent have been based on the perspective of
`
`a person of ordinary skill in the art as of April 10, 2001.
`
`D. Broadest Reasonable Interpretation
`
`16.
`
`I have been informed that, for purposes of this Inter Partes
`
`Review (IPR), the terms in the claims of the ‘158 patent are to be given their
`
`Broadest Reasonable Interpretation (BRI) in light of the specification and
`
`prosecution history of ‘158 Patent as understood by a POSITA on the priority
`
`date. I have used this standard throughout my analysis.
`
`IV. OVERVIEW OF THE ‘158 PATENT
`
`17. The ’158 patent is titled “System and method using a palm sized
`
`computer to control network devices.” The ʼ158 patent issued April 10, 2001,
`
`from U.S. Patent Application No. 09/237,609 filed January 25, 1999 and
`
`originally assigned to 3Com Corporation (3Com).
`
`18. The inventors of the ’158 patent observed that at the time,
`
`relative to desktop and laptop computers, palm sized computers had limited
`
`processing, display and input capabilities. These limitations prevented palm
`
`sized computers from running the same applications as desktop or laptop
`
`

`

`computers. The portability of palm sized computers made the ability to run
`
`desktop applications advantageous.
`
`19. According to the invention of the ’158 Patent, a program on the
`
`palm sized computer is used to access a registry of network services. This
`
`registry includes descriptions for various services. Each description includes
`
`at least a reference to program code that can be downloaded to the palm sized
`
`computer. Executing this program causes the palm sized computer to issue
`
`commands directly to the specific network services needed. In some cases,
`
`these network services include application services for running desktop
`
`applications that the palm sized computer could not execute.
`
`V. CLAIM CONSTRUCTION
`
`20.
`
`I have been asked to provide my opinions regarding the
`
`construction of certain terms used in the claims of the ‘158 Patent as would
`
`be understood by a POSITA using the BRI.
`
`A.
`
`palm sized computer
`
`21. The petitioner has suggested the following definition: “For the
`
`purposes of this proceeding, it is sufficient to specify that a personal digital
`
`assistant (PDA) and a 3Com Palm Platform™ computer are examples of a
`
`“palm sized computer” in the context of the ’158 Patent.’” It appears the
`
`petitioner has offered examples of what a palm sized computer is but has not
`
`offered a definition. It is my opinion that this term does not require definition.
`
`

`

`B. means for accessing a description of a service”
`
`22. The petitioner has suggested the following definition: “a palm-
`
`sized computer executing the Jini middleware from Sun Microsystems, and
`
`equivalents thereof.”
`
`23.
`
`I disagree. I see nothing in the patent that would limit this claim
`
`element to the specific Jini middleware.
`
`C. means for downloading the program code
`
`24. The petitioner has suggested the following definition: “a palm-
`
`sized computer executing the Jini middleware from Sun Microsystems, and
`
`equivalents thereof”
`
`25.
`
`I disagree. I see nothing in the patent that would limit this claim
`
`element to the Jini middleware. Furthermore, the petitioners definition does
`
`not actually address the ‘downloading’ portion of the claim limitation.
`
`D. means for executing at least a portion of the program code
`
`26. The petitioner has suggested the following definition: “a palm-
`
`sized computer executing a Java Virtual Machine, and equivalents thereof.”
`
`27.
`
`I disagree, I see nothing in the patent that would limit this claim
`
`element to the Java Virtual Machine.
`
`E. means for sending control commands to the service in
`response to the means for executing
`
`
`
`

`

`28. The petitioner has suggested the following definition “a palm-
`
`sized computer executing a control protocol capable of issuing control
`
`commands or Java’s Remote Method Invocation (RMI) protocol, and
`
`equivalents thereof.”
`
`29.
`
`I disagree, I see nothing in the patent that would limit this claim
`
`element to the Java RMI protocol.
`
`VI. GENERAL ISSUES
`
`30.
`
`In reviewing the petition for inter partes review, and the attached
`
`exhibits and declarations, several issues stood out as pervasive to the petition
`
`and need to be addressed separate from the specific claims. Those issues are
`
`addressed here.
`A.
`Jini: Quick Study, COMPUTERWORLD (“Jini-QS”)
`
`31.
`
`In Ground 1, in every single instance, the petitioner relies on
`
`some combination of the “Jini-QS”. This is inappropriate for several reasons.
`
`32. The first being that my understanding while non-enabling prior
`
`art may qualify under Section 103, that non-enabling reference only qualifies
`
`as prior art for what is disclosed in it. However, “Jini-QS” is a marketing
`
`article in a general-purpose magazine. It does not provide any detail on how
`
`the elements in the article would actually be done.
`33. Furthermore, the article itself admits that the product it describes
`
`is not yet complete “It will be available in the second half of next year. Jini's
`
`

`

`goal is to enable the creation of simpler, more flexible networks.” A POSA
`
`would readily understand that it is quite common for technology to not unfold
`
`according to plan. Frequently promised technology either is not completed in
`
`time, or does not have all the expected functionality.
`
`34. The ComputerWorld article does not constitute prior art. Instead
`
`it is a marketing piece describing technology that the author hopes will be
`
`available “in the second half of next year.”
`
`35. The ComputerWorld article cannot be prior art. It was allegedly
`
`published in December of 1998, and the article itself says this technology may
`
`be available in the “second half of next year”, which would be at least June of
`
`1999. The application for the ‘158 patent was filed on January 25, 1999. Even
`
`if one ignores the fact that this article does not describe how to accomplish its
`
`goals in sufficient detail, and then ignores the fact that technology often fails
`
`to meet expectations, then further assumes that every item in the article is
`
`exactly what the petitioner claims it is, and it was all fully functional when the
`
`article said it would be, that would still be at least six months after the ‘158
`
`patent was filed. This article cannot be considered prior art.
`
`B. McCandless
`
`36. The
`
`petitioner
`
`appears
`
`to
`
`completely misunderstand
`
`McCandless. The section the petitioner cites is from a section "In the pipeline"
`
`

`

`which discusses various improvements to PDA's that the author believes will
`
`come at some point in the future. The author is not describing what PDA’s
`
`can do at the time of the writing, or even what is in the immediate future, but
`
`rather a wish list for what may eventually happen.
`
`37. Citations throughout this section of McCandless demonstrate this
`
`(emphasis added) “PDA's will soon come with built-in access to a ubiquitous
`
`wireless network". In the paragraph just preceding the one the petitioner cites
`
`(emphasis added) "Using this network your PDA will eventually subsume
`
`functionality of the remote controls in your home". Then in the paragraph
`
`immediately after the one that the petitioner cites (emphasis added) "In due
`
`time, your PDA will absorb the other things you now feel compelled to carry
`
`in your pockets". Taken in context, a POSA would immediately see that
`
`McCandless is not discussing what was available at the time of the writing,
`
`but rather things the author hoped would eventually be added to PDA’s.
`
`38. Reading all of McCandless it would be a clear to a POSA that
`
`the article is not describing any technology that existed at the time of the
`
`writing of the article. Rather, the article is the authors speculation about future
`
`improvements to PDA’s that he believes may happen someday. It is therefore
`
`impossible for a POSA to combine McCandless with any other prior art.
`
`

`

`C. Motivation to Combine
`
`39. The preceding section leads naturally to a dissection of the
`
`alleged the motivation to combine. On paragraph 37 of Dr. Houh’s declaration
`
`he states “ (f) some teaching, suggestion, or motivation in the prior art that
`
`would have led one of ordinary skill to modify the prior art reference or to
`
`combine prior art reference.” On this issue I am in complete agreement with
`
`Dr. Houh.
`
`40. However, throughout Dr. Houh’s declaration, not once does he
`
`explain any motivation to combine. He continually recites “it is my opinion
`
`that one of ordinary skill in the art would have been motivated to combine..”
`
`but never provides any reason at all why a POSA would be motivated to
`
`combine.
`
`41. Beyond that issue, since the Jini-QS article a) did not fully
`
`describe how to implement its technology and b) described technology it
`
`admitted did not yet exist, it would have been impossible to combine Jini-QS
`
`with anything. Jini-QS did not yet exist. There was simply an article that
`
`hoped it would be ready “in the second half of next year”, at least six months
`
`after the application for the ‘158 patent was filed.
`
`

`

`VII. GROUND 1 SPECIFIC CLAIMS
`
`42.
`
`I have reviewed the claims in light of the proposed combinations
`
`and believe they do not disclose the claimed features.
`A. Claim 1 “accessing a description of the service from a
`directory of services, the description of the service including at
`least a reference to program code for controlling the service”
`
`43. The petitioner states:
`
`“Jini-QS discloses this limitation because it teaches that the Jini
`platform includes a Lookup Service that keeps track of which
`services are available on the network – i.e., “Lookup is the
`equivalent of a network bulletin board for all available services.”
`APPL-1005, p. 29 (left column). Jini-QS illustrates the Lookup
`Service:”
`and
`“Jini-QS further teaches that the user requests (accesses)
`descriptions of the available services via the Lookup Service and
`in response is shown descriptive icons corresponding to the
`services: “[t]he user requests services that are available, and
`icons appear on his screen.” APPL-1005, p. 29 (main figure).
`“Lookup stores pointers to various sources on the network as
`well as code for other services,” and when a user selects a service
`from the list of services, the Lookup “server instantly sends
`proxy code back to the device.” Id. at p. 29(left column; main
`figure).”
`44. Aside from the previously discussed fact that Jini-QS is not prior
`
`art, and in fact did not actually exist, but rather there was an article discussing
`
`what it might do “in the second half of next year”, nothing in Jini-QS teaches
`
`or even suggests “at least a reference to program code for controlling the
`
`service”
`
`

`

`45. The petitioner appears to claim that the proxy code referenced by
`
`Jini-QS is a “reference to program code”. However, what Jini-QS actually
`
`states is:
`
`Proxy: This is the piece of Java code that moves around from device to
`device acting as the front end for all the Jini-enabled or legacy systems.
`The proxy essentially tells the client how to use the device. For
`example, it may include a graphical user interface that shows the user
`how to work the network projector. In the PC world, the equivalent
`would be the device driver.
`
`
`46. This proxy is first shared code for all the Jini-enabled or legacy
`
`systems. It has information about how the client could use the device, but does
`
`not include “a reference to program code for controlling the service”
`
`47. The petitioner further claims:
`
`Thus, Jini-QS’s teaching registering a new device in the Lookup
`Service and advertising its services by storing a descriptive name or
`icon associated with the service and a pointer to the service’s associated
`proxy code, in view of Arnold’s teaching of registering services with
`the lookup service, which stores in the lookup service an object
`corresponding to the service that facilitates access to the service, render
`obvious the claimed: “registering the service in the directory of services
`by storing the description of the service in the directory of services.”
`
`
`48. Aside from the fact that Jini-QS was merely a description of
`
`technology that might exist “in the second half of next year” and therefore
`
`could not anticipate anything, nor be combined with anything, there are other
`
`errors in the petitioners claim.
`
`

`

`49. The petitioner even states that Jini-QS stored “a descripted name
`
`or icon associated with the service’ and the petitioner does not claim that this
`
`in and of itself is a “a reference to program code for controlling the service”.
`
`Arnold describes in claim 1 “initiating a communications link between a
`
`browser stored on a client and a server; receiving selection of a service
`
`identifier from a set of service identifiers; receiving Downloadable code
`
`corresponding to the selected service identifier from the server;”
`
`50. Arnold was not about finding services on a network one could
`
`control, but rather going through a web page, using the client browser, to find
`
`out what services a web server offered. Nothing in Arnold teaches, or even
`
`suggests controlling a network device.
`
`B. Claim 1 “downloading the program code to the palm sized
`computer”
`
`51. The petitioner equates the proxy code of Jini-QS with program
`
`code. In the early 2000’s I published a book about Enterprise Java Beans, a
`
`common way of accessing remote programming code in Java. I have a detailed
`
`understanding of remote programming code used in Java. As any POSA
`
`would understand, proxy code is what one uses instead of program code.
`
`Rather than download the actual program code, one downloads a proxy that
`
`

`

`allows one to route commands to the actual program code that is remote1. The
`
`following excerpt demonstrates this:
`
`
`
`MSDN https://msdn.microsoft.com/en-us/library/ee809525.aspx
`
`52. As the preceding excerpt describes, when using proxy code, the
`
`programmer is making calls to code that is running on a remote server. This
`
`requires some technical steps to be taken such as serializing and de-serializing
`
`information. More importantly, the code being executed is remote. That code
`
`is not on the client.
`
`53. Proxy code is a completely different approach than downloading
`
`the program code. Proxy code is used when, for whatever reason,
`
`downloading the program code is infeasible or undesirable.
`
`C. Claim 1 “sending control commands to the service from the
`palm sized computer in response to the executing”
`
`54. The petitioner states “Jini-QS in view of Arnold render obvious
`
`this limitation. First, Jini-QS teaches that in response to and during execution
`
`of the proxy code, a user’s input to the graphical user interface results in
`
`
`1 https://docs.oracle.com/javase/7/docs/technotes/guides/net/proxies.html
`
`

`

`sending control commands/instructions to the service in order to control the
`
`service: “The proxy essentially tells the client how to use the device. For
`
`example, it may include a graphical user interface[.]” APPL-1005, p. 29 (left
`
`column). Jini-QS further teaches that a service will receive a command or
`
`“instruction via that proxy code[.]” Id. at p. 29 (main figure). In the example
`
`described in association with item 3 in the main figure, the client controls a
`
`print service by issuing a “printing instruction.” APPL-1005, p. 29 (main
`
`figure).”
`
`55. Aside from the fact that Jini-QS was merely a description of
`
`technology that might exist “in the second half of next year” and therefore
`
`could not anticipate anything, nor be combined with anything, there are other
`
`errors in the petitioners claim.
`
`56. The petitioner misunderstands both Jini-QS and the ‘158 patent.
`
`As the petitioner sites, Jini-QS “The proxy essentially tells the client how to
`
`use the device”, however using a device is not the same thing as controlling
`
`the device. The Jini-QS system merely sends information. And as has been
`
`previously discussed, there is no executing program code. This claim
`
`limitation is ‘in response to the executing’.
`
`D. Claim 8 “A method of controlling a program on a network
`device from a palm sized computer, the computer is not capable of
`executing the program by itself, the network device and computer
`
`

`

`being coupled in communications via a network, the method
`comprising”
`
`57. Aside from the fact that Jini-QS was merely a description of
`
`technology that might exist “in the second half of next year” and therefore
`
`could not anticipate anything, nor be combined with anything, there are other
`
`errors in the petitioners claim.
`
`58. The petitioner claims “Jini-QS in view of Arnold and
`
`McCandless render obvious this limitation.” It is immediately obvious that
`
`neither Jini-QS nor Anderson ever discuss (emphasis added) “controlling a
`
`program on a network device from a palm sized computer, the computer is
`
`not capable of executing the program by itself”
`
`59. The petitioner points to McCandless:
`
`The network relaxes where and how computation occurs. For
`example, applications that are too compute- or space intensive to
`run directly on your PDA will run, instead, on a remote high
`performance computer, but then return the output of the
`computation. When new versions of applications are released,
`your PDA will automatically update.
`
`
`60. The
`
`petitioner
`
`appears
`
`to
`
`completely misunderstand
`
`McCandless. The section the petitioner cites is from a section "In the pipeline"
`
`which discusses various improvements to PDA's that the author believes will
`
`come at some point in the future. The author is not describing what PDA’s
`
`

`

`can do at the time of the writing, or even what is in the immediate future, but
`
`rather a wish list for what may eventually happen.
`
`61. Citations throughout this section of McCandless demonstrate this
`
`(emphasis added) “PDA's will soon come with built-in access to a ubiquitous
`
`wireless network". In the paragraph just preceding the one the petitioner cites
`
`(emphasis added) "Using this network your PDA will eventually subsume
`
`functionality of the remote controls in your home". Then in the paragraph
`
`immediately after the one that the petitioner cites (emphasis added) "In due
`
`time, your PDA will absorb the other things you now feel compelled to carry
`
`in your pockets". Taken in context, a POSA would immediately see that
`
`McCandless is not discussing what was available at the time of the writing,
`
`but rather things the author hoped would eventually be added to PDA’s.
`
`E. Claim 8 “loading the program code”
`
`62. The petitioner again conflates proxy code with program code. As
`
`described previously in this declaration in reference to claim 1, proxy code is
`
`used specifically because, for some reason, program code is either impractical
`
`or undesirable.
`
`F. Claim 9 “The method of claim 8, wherein loading the
`program code includes loading the program code onto the palm
`
`

`

`sized computer and the issuing the control commands includes the
`palm sized computer issuing the control commands”
`
`63. The petitioner states “As discussed in association with [8.2] and
`
`[8.3], Jini-QS and Arnold teach a Jini client, such as a PalmPilot, downloading
`
`and executing the proxy code and issuing commands to services.”
`
`64. The first issue with the petitioners claim is, as has already been
`
`pointed out, Jini-QS is merely at article that briefly discusses technology that
`
`might exist at some future date

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket