throbber
Apple, Inc. et al.,
`
`v
`
`Uniloc 201 7 LLC,
`
`Case IPR2018-00361
`
`US. Patent No. 6,216,158
`
`Hearing Before Jennifer S. Bisk,
`Miriam L. Quinn,
`
`Charles J. Boudreau
`
`April 11, 2019
`
`

`

`Claim 1 of the ’158 patent
`
`1. A method of controlling a service on a network
`
`using a palm sized computer, the palm sized computer
`
`being coupled in communications with the network,
`
`the method comprising:
`
`accessing a description of the service from a directory
`
`of services, the description of the service including
`
`
`
`at least a reference to program code for controlling
`the service;
`
`downloading the program code to the palm sized
`
`computer;
`
`the palm sized computer executing at least a portion
`
`of the program code; and
`
`sending control commands to the service from the
`
`palm sized computer in response to the executing,
`
`wherein the service controls an application that
`
`cannot be executed on the palm sized computer.
`
`

`

`Claim 8 of the ’158 patent
`
`8. A method of controlling a program on a network
`
`device from a palm sized computer, the computer is
`
`not capable of executing the program by itself, the
`
`network device and computer being coupled in
`
`communications via a network, the method
`
`comprising:
`
`
`
`issuing control commands to the network device using
`
`accessing a directory of services, a service in the
`
`directory of services corresponding to the program,
`
`the description of the service including at least a
`
`reference to program code for controlling the
`
`service;
`
`loading the program code;
`
`the program code, the control commands causing
`
`the network device to control the program.
`
`

`

`Claim 20 of the ’158 patent
`
`20. A system comprising:
`
`description of the service including at least a
`
`reference to program code for controlling a
`
`service;
`
`means for accessing a description of a service, the
`
`
`
`means for downloading the program code;
`
`means for executing at least a portion of the
`
`program code; and
`
`means for sending control commands to the
`
`service in response to the means for executing,
`
`wherein the service controls an application that
`
`cannot be executed on the means for executing.
`
`

`

`Declaration of Named Inventor of ’158 patent
`
`
`
`COMBINED DECLARATION AND POWER OF ATTORNEY
`
`Attorney Docket No. 15886-318
`
`PATENT
`
`FOR UTILITY PATENT APPLICATION
`
`As a below-named inventor, I hereby declare that:
`
`My residence, post office address and citizenship are as stated below next to my
`
`name;
`
`I believe I am the original, first and sole inventor (if only one name is listed below) or
`an original, first andjoint inventor (if plural names are listed below) of the subject matter
`which is claimed and for which a patent is sought on the invention entitled:
`
`EX 1002 at
`
`I hereby declare that all statements made herein ofmy own knowledge are true and that pp' 49' 5 1
`all statements made on information and belief are believed to be true; and further that these
`statements were made with the knowledge that willful false statements and the like so made
`are punishable by fine or imprisonment, or both, under Title 18, United States Code, §1001
`and that such willful false statements may jeopardize the validity of the application or any
`patent issued thereon.
`
`Full name of sole or
`
`first inventor:
`
`We '
`
`

`

`Alleged “Jini” References Do not Qualify as Prior Art
`
`As has been repeatedly held, and also specifically argued by
`PetitionerApple,-—.u-Ifl
`”—‘-flhhuthpdh
`hfl— See, e.g.,
`
`J Apple Inc. v. International Trade Com'n, 725 F.3d 1356
`(Fed. Cir. 2013) [agreeing with Apple that alleged prior
`art patent did not have an enabling disclosure of a fully
`transparent surface as claimed, but only suggested that
`such a surface should be considered for ‘h-t")
`
`J In re Antor Media Corp., 689 F.3d 1282, 1290-91, (Fed.
`Cir. 2012) (“Enablement of prior art requires that the
`reference teach a skilled artisan to make or carry out what
`it discloses in relation to the claimed invention"); and
`
`J Bard Peripheral Vascular, Inc. V. WL. Gore &Associates,
`Inc., 670 F.3d 1171, 1185 (Fed. Cir. 2012) (“. .
`. the
`reference must enable one of ordinary skill in the art to
`make the invention without undue experimentation”).
`
`

`

`Alleged “Jini” References Do not Qualify as Prior Art
`
`The primary lini reference (Ex. 1005) is a marketing
`
`piece that is not enabling as to features of the ’158
`
`patent. Furthermore, it merely describes to a layperson
`
`something Sun Microsystems was still developing.
`
`Iini
`
`D E Fl N lTlO N:
`
`lini is networking software created by Sun Microsystems Inc. as an extension of
`
`Java, the company’s cross-platform programming language.—
`
`-]ini's goal is to enable the creation of simpler, more flexible networks. -devices
`
`to immediately start working after being plugged in directly to a network (see diagram, below). Once
`the devices are connected, jini_a way for machines, applications or devices to automatic
`
`cally “discover" and share resources called “services" (see Jini Speak glossary). The ability to down-
`
`load and move java code or objects over a network is central to lini's architecture. It requires very lit-
`tle memory — about 40K bytes of Java code — which-let it run in devices with very low memory,
`
`

`

`Alleged “Jini” References Do not Qualify as Prior Art
`
`Dr. Easttom’s testimony concerning Petitioner’s
`
`Ex. 1005 included the following (Ex. 2001 1135):
`
`35.
`
`The ComputerWorld article cannot be prior art. It was allegedly
`
`published in December of 1998. and the article itself says this teclmology may
`
`be available in the “second half of next year", which would be at least June of
`
`1999. The application for the ‘ 158 patent was filed 011 January 25. 1999. Even
`
`if one ignores the fact that this article does not describe how to accomplish its
`
`goals in sufficient detail. and then ignores the fact that technology often fails
`
`to meet expectations. then further assumes that every item in the article is
`
`exactly what the petitioner claims it is. and it was all fully functional when the
`
`article said it would be. that would still be at least six months after the ‘158
`
`

`

`Alleged “Jini” References Do not Qualify as Prior Art
`
`Dr. Easttom’s testimony concerning Petitioner’s Ex. 1005 further
`
`included the following (Ex. 2004 1111 24-25):
`
`Jini
`
`24.
`
`Jini. as used in the ’ 158 Patent is merely a layer used in the invention- The " 158
`
`Patent does not merely describe and claim J1111 as Apple appears to argue.
`
`25-
`
`The Jini Quick Study article published December 7, 1998 which is Exhibit V to
`
`Apple’s motion describes the Jini product as it existed one (1) month before the filing of the ’ 158
`
`patent. The article specifically states the product is not ready, does not fully function and won ’t
`
`be ready until late 1999- Regardless of how one views Im1 it clearly was not developed prior to
`
`the earliest priority date of the ’158 patent- Rather it was merely a concept that was not fully
`
`developed This document includes some Jini jargon, but the skilled person would not have
`
`understood this document as teaching how to implement the steps of claims 8 and 9 of the ’ 158
`
`

`

`Alleged “Jini” References Do not Qualify as Prior Art
`
`Petitioner's declarant, Dr. Hough, conceded
`
`that lini-QS (Ex. 1005) does not describe the
`
`operation of lini in a manner one of ordinary
`
`skill in the art could actually implement:
`
`Arnold. and McCandless. In particular, the Jini-QS article in ComputerWorld
`
`describes the general features and functionality of the Jim' platfonn. Jini-QS.
`
` 1
`h. d
`_
`.
`r
`,
`51;:.f.-:,.'.—:......‘,J'33¢};
`:,..;,:-‘r;z;'.';..:.' ".3-:-.-;‘r_,,~.=.%3'-.:’.-:i:.';.,.’:‘.’f'7‘.’.‘.,’..J;;'.‘;-‘"“:_‘;f.‘-f“'53..:"’7" l-r-ggnr :_:-‘-j_;{ .2: g:; l
`to“ exer. latweie a ea Y
`
`-Dr. Hough, Ex. 1003 1] 78.
`
`

`

`Alleged “Jini” References Do not Qualify as Prior Art
`
`EX. 1018 p. 8 of 10
`
`
`
`Microsoft
`
`isn’t about to endorse it, can in fact be
`“[Exhibit 1018], an lnfoworld article
`counted on to embrace it about the same
`from October 1, 1998, just two months
`prior to the filing of the ’158 patent, way they embraced Java. And other
`also simply describes Sun’s vision for
`companies are being asked at minimum
`what lini in It does not describe
`to make an investment—
`an actual product." — and at max, to rethink their
`entire business and software develop-
`ment models.
`Against that imposin challen e there
`is this small thou ht:
`
`—Dr. Easttom, Ex. 2004 1126.
`
`Why not now?
`And why not from the guy who has been
`thinking about it for all his adult life, Mr.
`“The network is the com uter” himself? It's
`Bill Joy’s dreamlh
`
`

`

`Example deficiencies in Ground 1 (Jini)
`
`Among other deficiencies, the Petition fails to prove that the
`
`primary lini reference (Ex. 1005) discloses that the “icons"
`or “lookup” feature provide "Own“
`_IW’ that includes “a“.
`p—uww' (claim 1)
`
`Thus. Jini-QS’s teaching of a PalmPilot accessing descfiptionsficons of
`
`available services contained in 3 Lookup Service on the Jini platform. Where the
`
`Lookup Service includes service descn'ptions and pointers (references) to
`
`—or controlling a sen-ice. discloses the claimed:
`
`“accessing a description of the service from a directory of services, the description
`
`of the seivice including at least a reference to program code for controlling the
`
`sen-*ice.“ APPL-1003. pp. 55-57.
`
`

`

`Example deficiencies in Ground 1 (Jini)
`
`The Petition fails to prove that lini-QS (Ex. 1005) discloses that
`the “icons” or “lookup” feature provide ‘Iw‘.
`“haul-fir that includes 1*—
`.-‘hm-fl' (claim 1)
`
`Dr. Easttom testified that the ‘—' code
`mentioned in lini-QS is distinguishable on its face
`
`from “a reference to program code for controlling
`
`the service.” See, e.g., Ex. 2001 at 111145-46, 51-53.
`
`lini-QS (Ex 1005) at p. 5 of 5.
`‘2 This is the piece of lava code that
`Lookup: A key component in the lini
`moves around from device to device acting system, Lookup is the equivalent of a
`as the front end for all the lini-enabled or
`network bulletin board for all available
`
`legacy systems. The proxy essentially tells
`the client how to use the device. For
`
`services. Lookup stores pointers to various
`services on the network as well as code for
`
`they can provide to the others.
`
`example, it may include a graphical user
`interface that shows the user how to work
`
`other services. As Java code that resides on
`the lini server, Lookup keeps track of
`
`

`

`Example deficiencies in Ground 1 (Jini)
`
`“downloading the program code to the palm sized computer"
`
`(claim 1), “loading the program code" (claim 8), “loading the
`
`program code onto the palm sized computer" (claim 9), &
`
`“means for downloading the program code” (Claim 20)
`
`X For Ground 1, Petitioner points exclusively to the alleged
`teaching of downloading proxy code from the Lookup server:
`
`Thus- Jini-QS’S teaching that the—from
`
`the Lookup sewer. discloses the claimed: “downloading the program code to the
`
`Pet. 29
`
`palm sized computer." APPL-1003. pp. 57-58.
`
`X Petitioner's reliance on the meager description of proxy code in
`Iini-QS (Ex. 1005) is deficient at least because, as Dr. Easttom
`testified, a POSA would understand that proxy code is what one
`
`

`

`Example deficiencies in Ground 1 (Jini)
`
`“downloading the program code to the palm sized computer"
`
`(claim 1), “loading the program code" (claim 8), “loading the
`
`program code onto the palm sized computer” (claim 9), &
`
`“means for downloading the program code" (Claim 20)
`
`For example, Dr. Easttom distinguished
`
`proxy code as follows (Ex. 2001 1] 51):
`
`51.
`
`The petitioner equates the proxy code of Jini-QS with program
`
`code. In the early 2000’s I published a book about Enterprise Java Beans. a
`
`common way of accessing remote progralmning code in Java. Ihave a detailed
`
`understanding of remote programming code used in Java. As any POSA
`
`would tuldel'stand. proxy code is What one uses instead of program code.
`
`

`

`Example deficiencies in Ground 1 (Jini)
`
`A-or other device is plugged into the net-
`
`work, and the Jini code in the Java virtual machine 0
`
`on the device broadcasts its presence. The user requests
`services that are available. and icons appear on his screen.
`
`Ex. 1005
`
`at p. 5
`
`
`
`
`0 The lini Server and its Lookup Service discover the
`new -and register it on the network.
`
`Say the user wants to print a presentation.
`He selects the print option, which launches
`a query to the Lookup Service on the Jini Server.
`The sewer instantly sends proxy code back to the
`device. The legacy printer, which has no Java or Jini
`code at ail, receives the printing instruction via that
`proxy code and prints the document.
`
`Next, the user decides to store his presenta-
`tion on the network and selects “save" on
`the file menu. His -queries the Lookup Service,
`which identifies—
`. The presentation is saved to disk.
`
`
`
`

`

`MoCandless Does Not Qualify as Prior Art
`
`Using this network,—
`-subsume the functionality of the
`remote controls in your home. You.
`control and configure your home appli—
`ances through your PDA. You-set your
`alarm clock; read your personalized TV
`
`guide and program your VCR; turn down
`
`the stereo or select a different song or radio
`
`station; and program, from your car or the
`subway, your home’s heater to turn on
`
`shortly before you arrive there. This net-
`work won’t need to be,—
`- very high performance to provide
`most of these new services. Rather, it.
`serve as a stepping stone, motivating and
`then financing better infrastructure.
`
`Wireless networking. PDAs-
`Come With built—in access to a ubiquitous
`Wireless network. This will render HotSynC
`a thing of the past; your PDA will transpar-
`
`The network relaxes where and how
`
`computation occurs. For example, applica-
`
`tions that are too compute- or space-
`intensive to run directly on your PDA-
`run, instead, on a remote hi gh-performance
`computer, but then return the output of the
`computation. When new versions of appli-
`cations are released, your FDA-auto-
`matically update. The boundary between
`your PDA and the rest of the world-
`become blurred.
`
`

`

`Example deficiencies in Ground 2 (Riggins)
`
`Among other deficiencies, the Petition fails to prove that
`
`For Ground 2, the Petition (at p. 63) summarizes
`
`its exclusive reliance on Riggins as follows:
`
`58, 6:25-36, 6:55-60, 8:4—18. Accordingly, the listing of services presented to the
`
`user (description of services) includes references to corresponding applets because
`
`selecting a particular service from the list causes the corresponding applet to be
`
`downloaded and executed. APPL-IOOS. p. 126.
`
`

`

`Example deficiencies in Ground 2 (Riggins)
`
`
`
`Riggins (Ex. 1008) at 6:25-31:
`
`“FIG. 5 illustrates an example
`graphical user interface 500 of a URL-
`
`addressable HyperText Markup
`
`Language (HTML)-based web page, as
`
`maintained by the web page engine
`133 of the master server 130. The
`
`graphical user interface 500 includes
`a title 510 "Roam Pager.”
`.flu.‘ and a
`pointer 570 for selecting one of the
`
`provided services 396.”
`
`Roam Page
`
`
`
`51 O
`
`520
`
`Calendaring
`
`2.
`
`
`Internet Access
`
`
`Paging
`550
`
`530
`
`540
`
`3.
`
`.
`
`
`
`
`5.
`
`Sending Faxes
`
`560
`
`

`

`Example deficiencies in Ground 2 (Riggins)
`
`Petitioner’s citation to Devarakonda does not cure the
`
`conceded deficiency of Riggins for “wherein the service
`
`controls an application that cannot be executed on the
`
`palm sized computer” (Claim 1):
`
`Existing approaches used to provide these basic system
`services to applications include the existence of a full-
`feature Operating environment on the Network Computer
`antifor the requirmcnt that each application provide its own
`set of needed so rviccs. The former approach is not feasible
`for network clients because these computers are not neces-
`sarily equipped with adequate physical resources such as
`physical memory and attached peripheral devices (e.g., disk
`drives) to support a full-feature operating environment (e.g.,
`in the case of a Network Computer). The latter approach has
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket