throbber
Trials@uspto.gov
`571-272-7822
`
`
`
`
`
`
`
`
`
`
`
` Paper 8
`
`
`
` Entered: 9 May 2016
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`HOSPITALITY CORE SERVICES, LLC,
`Petitioners,
`
`v.
`
`NOMADIX, INC.,
`Patent Owner.
`_______________
`
`Case IPR2016-00077
`Patent 8,266,266 B2
`____________
`
`
`Before HOWARD B. BLANKENSHIP, GLENN J. PERRY, and TREVOR
`M. JEFFERSON, Administrative Patent Judges.
`
`
`JEFFERSON, Administrative Patent Judge.
`
`
`
`DECISION
`Institution of Inter Partes Review
`37 C.F.R. § 42.108
`
`
`
`
`
`EXHIBIT 1002
`Guest-Tek v. Nomadix, IPR2018-00376
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`I.
`
`INTRODUCTION
`
`Hospitality Core Services, LLC (“Petitioner”) filed a Petition (Paper
`
`2, “Pet.”) to institute an inter partes review of claims 1–28 of U.S. Patent
`
`No. 8,266,266 B2 (Ex. 1001, “the ’266 patent”) pursuant to 35 U.S.C.
`
`§§ 311–319. Nomadix Inc. (“Patent Owner”) filed a Preliminary Response
`
`to the Petition. (Paper 6, “Prelim. Resp.”). We have jurisdiction under 35
`
`U.S.C. § 314(a). Section 314(a) provides that an inter partes review may
`
`not be instituted “unless . . . there is a reasonable likelihood that the
`
`petitioner would prevail with respect to at least 1 of the claims challenged in
`
`the petition.” After considering the Petition, the Preliminary Response, and
`
`associated evidence, we conclude that Petitioner has demonstrated a
`
`reasonable likelihood that it would prevail in showing unpatentability of
`
`claims 1–28.
`
`A. Related Proceedings
`
`Petitioner states that Nomadix, Inc. v. Hospitality Core Services LLC,
`
`d/b/a Blueprint RF, No. 2:14-CV-08256-DDP (VBKx) (C.D. Cal.) is related
`
`to the ’266 patent. Pet. 9–10.
`
`B. The ʼ266 Patent
`
`The ’266 patent generally describes systems and methods “selectably
`
`controlling and customizing source access to a network, where the source is
`
`associated with a source computer, [which] has transparent access to the
`
`network via a gateway device” without the need for configuration software
`
`to be installed on the source computer to access the network. Ex. 1001, at
`
`[57]. In one embodiment, a gateway manages a user’s access to a network.
`
`
`
`
`2
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`For example, a hotel guest’s web page request may be redirected to a portal
`
`page, as shown in the figure below reproduced from page 5 of Patent
`
`Owner’s Preliminary Response.
`
`
`
`The above figure, reproduced from page 5 of the Preliminary
`
`Response, shows a login portal for purchasing Internet Access.
`
`Figure 1 of the ’266 patent provided below is a block diagram of an
`
`embodiment described in the Specification.
`
`
`
`
`3
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`Figure 1 shows computer system 10, which includes Access Controller 16,
`
`Gateway Device 12, DHCP Server 24, and AAA Server (authenticating,
`
`authorizing and accounting server) 30, for accessing networks and/or online
`
`
`
`services.
`
`
`
`C. Illustrative Claim
`
`Independent claim 1 is illustrative and reproduced below (Ex. 1001,
`
`38:4–36):
`
`1. A method of redirecting a session directed to an
`HTTP server to a redirected destination HTTP server, the
`method comprising the steps of:
`receiving, at a communications port of a network
`system, a request from a user device to open a TCP
`connection with a server located external to the network
`system;
`
`
`
`
`4
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`sending, from the network system, TCP connection
`handshake completion data to the user device in response
`to the request to open the TCP connection, the handshake
`completion data being configured to appear to be from the
`server located external to the network system, wherein the
`network system need not communicate with the server
`located external to the network system;
`receiving, at the communications port of the
`network system, an HTTP server request for access to the
`server located external to the network system, the HTTP
`server request originating from the user device; and
`generating response data customized for the HTTP
`server request, the response data including alternate
`content different from content requested by the HTTP
`server request, wherein the response data is customized for
`the HTTP server request at least in part by appearing to be
`from the server located external to the network system,
`wherein the response data appears to be from the server
`located external to the network system at least in part by
`including, in a header of the response data, a source
`address corresponding to the server located external to the
`network system; and
`sending, from the network system, a response to the
`HTTP server request, the response configured to cause the
`user device to receive the alternate content, the response
`comprising the generated response data customized for the
`HTTP server request.
`
`D. Asserted Grounds of Unpatentability
`
`The information presented in the Petition sets forth proposed grounds
`
`of unpatentability for the ’266 patent as follows (Pet. 11):
`
`
`
`
`5
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`Reference[s]
`
`Basis
`
`Claims Challenged
`
`Slemmer1
`
`Slemmer and Vu2
`Slemmer, IPORT,3 and
`Applegate4
`
`35 U.S.C. § 102(e)
`
`35 U.S.C. § 103(a)
`
`35 U.S.C. § 103(a)
`
`1–28
`
`1–28
`
`1–28
`
`II. ANALYSIS
`
`A. Claim Interpretation
`
`In an inter partes review, claim terms in an unexpired patent are given
`
`their broadest reasonable construction in light of the specification of the
`
`patent in which they appear. 37 C.F.R. § 42.100(b); In re Cuozzo Speed
`
`Techs., LLC, 793 F.3d 1268, 1278–79 (Fed. Cir. 2015), cert. granted sub
`
`nom. Cuozzo Speed Techs., LLC v. Lee, 136 S. Ct. 890 (mem.) (2016). There
`
`is a presumption that a claim term carries its ordinary and customary
`
`meaning. CCS Fitness, Inc. v. Brunswick Corp., 288 F.3d 1359, 1366 (Fed.
`
`Cir. 2002). The “ordinary and customary meaning” is that which the term
`
`would have to a person of ordinary skill in the art in question. In re
`
`Translogic Tech., Inc., 504 F.3d 1249, 1257 (Fed. Cir. 2007). Any special
`
`definition for a claim term must be set forth with reasonable clarity,
`
`
`1 US Patent 6,226,677 B2, issued May 1, 2001 (Ex. 1005, “Slemmer”).
`2 US Patent 5,623,601, issued April 22, 1997 (Ex. 1006, “Vu”).
`3 IPORTTM INTERNET ACCESS SYSTEM, CONNECTION METHODS AND
`CONCEPTS FOR IPORTTM V2.X WHITE PAPER (Nov. 1998) (“IPORT V2x”).
`(Ex. 1007) and IPORTTM INTERNET ACCESS SYSTEM, IPORT CENTRAL
`OFFICE SOLUTION WHITE PAPER (Nov. 1998) (“IPORT CO”) (Ex. 1008),
`collectively referenced as “IPORT.”
`4 US Patent 6,321,336 B1, issued November 20, 2001 (Ex. 1009,
`“Applegate”).
`
`6
`
`
`
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`deliberateness, and precision. In re Paulsen, 30 F.3d 1475, 1480 (Fed. Cir.
`
`1994). Only those terms which are in controversy need to be construed, and
`
`only to the extent necessary to resolve the controversy. Vivid Techs., Inc. v.
`
`Am. Sci. & Eng’g, Inc., 200 F.3d 795, 803 (Fed. Cir. 1999).
`
`1. “redirection data generation module” (claim 11)
`
`Petitioner asks that we construe “redirection data generation module,”
`
`appearing in independent claim 1, “to cover a software proxy running on a
`
`gateway.” Pet. 37; see Pet. 33 (discussing construction). Claims 1 and 24
`
`do not explicitly recite “redirection data generation module” and use
`
`different language to describe “generating response data” that correspond to
`
`the “redirection . . . module” term. Pet. 33. Petitioner argues that the
`
`independent claims merely describe “transparent redirection” to “alternate
`
`content,” and the dependent claims merely add “minor implementation
`
`details.” Pet. 37. Patent Owner suggests that we need not construe this term
`
`because Petitioner fails to address many of the terms actually used in the
`
`challenged claims. Prelim. Resp. 10–11.
`
`We find no explicit definition of “redirection data generation module”
`
`in the Specification. The Specification describes several ways that
`
`redirection can be carried out. One way described is “Proxy ARP Packet
`
`Interception and Host Reconfiguration.” Ex. 1001, 28:48−52.
`
`The claim drafter seizes upon the phrase “redirection data generation
`
`module” as a handle to describe a certain bundle of functions to be
`
`performed as set forth in the claims.
`
`We preliminarily construe “redirection data generation module” to be
`
`hardware and/or software for carrying out functions attributable to the
`
`
`
`
`7
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`“redirection data generation module” as set forth in the claims. We do not
`
`regard “redirection data generation module” as excluding a “software proxy
`
`running on a gateway” if it is established that a “software proxy running on a
`
`gateway” carries out the functions required by the claims. Nor do we equate
`
`“redirection data generation module” with “software proxy running on a
`
`gateway” in the absence of a clear statement of functions attributable to a
`
`“software proxy.” Thus, if the Petitioner demonstrates that a prior art
`
`“software proxy running on a gateway” carries out the functions required by
`
`a particular claim, such prior art would describe the recited “redirection data
`
`generation module.”
`
`B. Anticipation based on Slemmer (Ex. 1005)
`
`1. Slemmer (Ex. 1005)
`
`Slemmer describes “controlled communications over a global
`
`computer network.” Ex. 1005, Title. Slemmer Figure 1 is reproduced
`
`below.
`
`
`
`
`8
`
`
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`Figure 1 depicts system 100, which includes user machines 120 that are a
`
`part of intranet 110 isolated from Internet 140 by a firewall that may be
`
`implemented on a forced proxy server 130 that handles signal traffic to/from
`
`user machines 120. The output side of server 130 includes ports that
`
`communicate with the Internet 140. Ex. 1005, 3:65−4:2. The Specification
`
`describes controlling communication of a TCP (Transmission Control
`
`Protocol) packet from a user machine 120. During a browser request, a TCP
`
`packet from user machine 120 arrives at forced proxy server 130. The TCP
`
`packet includes a field holding a first destination IP address. If the packet is
`
`intended to be transmitted over the Internet, its port designation is “80.” Id.
`
`at 4:19−31. Forced proxy server 130 analyzes the TCP packet. Port 80
`
`packets that 1) have a first destination IP address, and 2) do not correspond
`
`to a “sandboxed” domain, are changed so as to be delivered to a different
`
`port, and the destination address is changed to a predetermined second
`
`destination IP address to reroute the TCP packet to another IP address on the
`
`Internet. The rerouted IP address provides content to the user machine in
`
`which at least a majority of the content is different from that expected to be
`
`obtained by the user machine. Id. at 4:31−50.
`
`A software control program running on the server 130 is in
`
`communication with that software port to which the packet is redirected. Id.
`
`at 4:4:40-42. This software port responds to the user machine request as if it
`
`were the web server on the Internet 140 to which the request was originally
`
`directed. Id. at 4:42-44. The proxy server program or control program
`
`assumes control of the web request by fulfilling the actual request from the
`
`user machine 120 or implementing other predetermined steps. Id. at
`
`
`
`
`9
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`4:40−51. Such other predetermined steps relate to providing information to
`
`the user machine 120 from one or more particular web pages of a web site
`
`different from the user machine 120’s requested site. The identification of
`
`the web pages to be directed to the particular user machine can be based on a
`
`number of factors including: the input to the user machine 120 by the user or
`
`operator of that machine and provided to the browser on the user machine
`
`120; the Internet or MAC address associated with the particular user
`
`machine 120; and other factors such as whether or not the Internet 140 is
`
`accessible to the capability of deactivating or essentially bypassing such
`
`controls in the sense of allowing a particular user machine 120 to freely
`
`access the Internet 140 as if the proxy server 130 were not interposed
`
`between the particular user machine 120 and the Internet 140. Id. at
`
`4:51−63.
`
`2. Analysis
`
`According to Petitioner, Slemmer describes a hotel gateway that
`
`differs from the ʼ266 patent claims only in that the proxy handshake is
`
`described implicitly rather than explicitly. Pet. 37. An anticipation
`
`argument can be based on an “implicit” teaching. See Standard Havens
`
`Prods., Inc. v. Gecor Indus., Inc., 953 F.2d 1360, 1369 (Fed. Cir. 1991)
`
`(“Anticipation can occur when a claimed limitation is ‘inherent’ or
`
`otherwise implicit in the relevant reference.”); In re Baxter Travenol Labs.,
`
`952 F.2d 388, 390 (Fed. Cir. 1991) (the dispositive question for anticipation
`
`is “whether one skilled in the art would reasonably understand or infer” the
`
`unstated element).
`
`
`
`
`10
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`Patent Owner frames Petitioner’s “implicit disclosure” argument as
`
`one of “inherency” and argues that Petitioner fails to make the case that the
`
`handshake limitations are inherent in Slemmer for three reasons. Prelim.
`
`Resp. 16−18.
`
`First, Patent Owner argues that Petitioner’s position conflicts with
`
`express disclosure in Slemmer. Prelim. Resp. 18. Slemmer explains that the
`
`program returns the HTTP redirect message because this request “is the first
`
`time it has seen this user machine.” Prelim. Resp. 18 (citing Ex. 1005, 6:63–
`
`65). Patent Owner reasons that if completing a handshake with the user
`
`machine while appearing to be an external device were a prerequisite to the
`
`Slemmer program receiving the URL request and responding with the HTTP
`
`redirect message (as Petitioner contends), then the URL request for
`
`home.browserid.com would not have been the first time the Slemmer
`
`program had seen the user machine, contrary to what Slemmer expressly
`
`states. Prelim. Resp. 18. Second, Patent Owner argues that Petitioner fails
`
`to justify its inherency contention technologically. Prelim. Resp. 19.
`
`Finally, Patent Owner argues that Petitioner admits that its inherency
`
`argument is incorrect. Prelim. Resp. 19–20. This argument relies on
`
`Petitioner’s argument that the ’266 patent is not entitled to priority to
`
`provisional application 60/111,497. Id. (citing Pet. 35−36).
`
`Although Petitioner presents argument that “numerous references
`
`explain that the proxy handshake was an inherent and a very well-known
`
`part of any transparent proxy” (Pet. 37), we have reviewed Slemmer and
`
`determine that there is insufficient disclosure in the reference to satisfy the
`
`necessarily-present inherency standard articulated in, for example,
`
`
`
`
`11
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`Transclean Corp. v. Bridgewood Services, Inc., 290 F.3d 1364, 1373 (Fed.
`
`Cir. 2002) (“[A]nticipation by inherent disclosure is appropriate only when
`
`the reference discloses prior art that must necessarily include the unstated
`
`limitation.”). It is Petitioner’s burden to persuade us that Slemmer describes
`
`all of the features that are claimed. Based on the present record, we are not
`
`persuaded that the required “handshake” is implicitly described in Slemmer.
`
`Therefore, Petitioner has not established a reasonable likelihood of success
`
`in showing that the independent claims 1, 11, and 24, and their respective
`
`dependent claims, are anticipated by Slemmer.
`
`C. Obviousness based on Slemmer (Ex. 1005) and Vu (Ex. 1006)
`
`1. Vu (Ex. 1006)
`
`Vu describes providing a secure gateway for communication and data
`
`exchanges between networks. Ex. 1006, Title. The Petition explains that
`
`Vu (Ex. 1006) describes a “transparent proxy” with an explicit description of
`
`a proxy handshake as part of a gateway authentication procedure. Pet. 21
`
`(citing Ex. 1011 ¶ 10). Vu describes that:
`
`When the gateway station 14 receives the client packet
`containing the Telnet command, a process is initiated on the
`gateway station 14 which responds to the client 16 to establish a
`communication session 17 as if it were the target machine. As
`will be explained below in detail, the process then authenticates
`the client's authorization to access the requested service.
`
`Ex. 1006, 8:50−56.
`
`If it is determined that a proxy process 15 is bound to a port
`which can serve the destination port number 38 in either of steps
`70 or 72, a session (TCP or UDP) is initiated with the packet
`source IP address 32 in step 76 and in step 78, the packet is
`
`
`
`
`12
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`delivered by the kernel to the proxy process designated in steps
`70, 72.
`
`Ex. 1006, 10:14−19.
`
`2. Analysis
`
`Patent Owner correctly notes that Petitioner relies on Vu (Pet. 45)
`
`only for the connection-handshake limitations. Prelim. Resp. 26–27.
`
`Petitioner relies on Slemmer for the remaining limitations of the challenged
`
`claims. Pet. 37–45. Petitioner provides claim charts (Pet. 50–58), a
`
`motivation to combine the references (Pet. 58–60), and citations to the
`
`Declaration by Mr. Keith Olsen (Ex. 1011) (Pet. 20–29), in support of its
`
`contentions that Slemmer and Vu teach the limitations of the challenged
`
`claims.
`
`Patent Owner argues that Vu’s disclosure is limited to systems using a
`
`“Telnet protocol.” Prelim. Resp. 27. We are not persuaded on the record as
`
`developed thus far that this difference (Slemmer uses HTTP) would
`
`discourage one of ordinary skill from utilizing a handshake, such as
`
`described in Vu, in a system such as described by Slemmer. We conclude
`
`for purposes of this decision that one of ordinary skill, based on Vu, would
`
`have utilized a handshake in Slemmer’s gateway. We encourage, during
`
`trial, further development of the record with respect to whether the claims
`
`are obvious in view of Slemmer in combination with Vu.
`
`With respect to Slemmer, Patent Owner argues that Slemmer does not
`
`disclose the “response data limitations” of challenged claims 1, 11, and 24.
`
`Prelim. Resp. 21–23. Based on the present record, we disagree, finding that
`
`Petitioner has provided sufficient claim charts (Pet. 50–58) and evidence
`
`
`
`
`13
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`(Pet. 20–28) to support the response data limitations as part of the software
`
`responding to requests as if they were the web server (see Pet. 53 (citing Ex.
`
`1005 4:37–47)).
`
`Patent Owner separately argues that Slemmer fails to disclose the
`
`limitations of dependent claims 10, 12, 18. Prelim. Resp. 24−26.
`
`Claim 10 recites a determination on “whether to send a second
`
`response configured to cause the user device to receive second alternate
`
`content, the determination being based at least in part upon a MAC address
`
`associated with the user device.” Ex. 1001, 39:10–14. Dependent claims 21
`
`and 26 recite similar MAC address limitations.
`
`For these limitations, Petitioner relies upon the following portion of
`
`the Slemmer Specification, which states:
`
`The identification of the web pages to be directed to the
`particular user machine can be based on a number of factors
`including: the input to the user machine 120 by the user or
`operator of that machine and provided to the browser on the user
`machine 120; the Internet or MAC address associated with the
`particular user machine 120; and other factors such as whether or
`not the Internet 140 is accessible to the particular user machine
`120.
`
`Ex. 1005, 4:51–58.5
`
`Patent Owner argues that although Slemmer mentions a MAC address
`
`in this passage, it does not describe using the MAC address to determine
`
`whether a computer should be redirected in response to a second request.
`
`According to Patent Owner, Slemmer describes how, if the control program
`
`
`5 Pet. 42 (incorrectly citing Ex. 1005, col 5, ll. 8–13).
`
`14
`
`
`
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`decides not to fulfill the user’s request, it can use the MAC address to decide
`
`which page to provide to the user:
`
`This proxy server program or control program assumes control
`of the web request by [1] fulfilling the actual request from the
`user machine 120 or [2] implementing other predetermined steps.
`Such other predetermined steps relate to providing information
`to the user machine 120 from one or more particular web pages
`of a web site different from the user machine’s 120 requested
`site. The identification of the web pages to be directed to the
`particular user machine can be based on a number of factors
`including: the input to the user machine 120 by the user or
`operator of that machine and provided to the browser on the user
`machine 120; the Internet or MAC address associated with the
`particular user machine . . . .
`
`Ex. 1005, 4:44–57 (bracketed numbering and emphasis added). Patent
`
`Owner argues that using a MAC address to decide which page to provide to
`
`a user after having already decided not to fulfill the user’s request is not the
`
`same as using a MAC address to determine in the first place whether to
`
`redirect a user’s computer. Prelim. Resp. 24−25. Moreover, according to
`
`Patent Owner, this passage from Slemmer does not address a determination
`
`made in connection with a second request or incoming data as recited in
`
`claims 10, 21, and 26. Id.
`
`Patent Owner is correct in that Slemmer does not address specifically
`
`a second incoming request (as recited in, e.g., claim 10). However the
`
`disclosure relied upon by Petitioner does not preclude using a MAC address
`
`as part of a determination to redirect second, third, or additional incoming
`
`requests.
`
`Based on the present record, we determine that the Petitioner has
`
`established a reasonable likelihood of prevailing on the asserted ground that
`15
`
`
`
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`claims 1−28 of the ’266 patent are unpatentable as obvious under 35 U.S.C.
`
`§ 103(a) over Slemmer and Vu.
`
`D. Slemmer, IPORT (Exs. 1007 and 1008), and Applegate (Ex. 1009)
`
`1. Printed Publication of IPORT
`
`As a threshold issue, Patent Owner’s Preliminary Response contests
`
`that the IPORT references are prior art “printed publications” in accordance
`
`with 35 U.S.C. §§ 102 and 311(b). Prelim. Resp. 28−29. We look to the
`
`underlying facts to make a legal determination as to whether a document is a
`
`printed publication. Suffolk Techs., LLC v. AOL Inc., 752 F.3d 1358, 1364
`
`(Fed. Cir. 2014). The determination of whether a document is a “printed
`
`publication” under 35 U.S.C. § 102(b) involves a case-by-case inquiry into
`
`the facts and circumstances surrounding its disclosure to members of the
`
`public. In re Klopfenstein, 380 F.3d 1345, 1350 (Fed. Cir. 2004). Public
`
`accessibility is a key question in determining whether a document is a
`
`printed publication and is determined on a case-by-case basis. Suffolk
`
`Techs., 752 F.3d at 1364. To qualify as a printed publication, a document
`
`“must have been sufficiently accessible to the public interested in the art.”
`
`In re Lister, 583 F.3d 1307, 1311 (Fed. Cir. 2009)(citations omitted).
`
`Petitioner relies on the Declaration by Mr. Keith Olsen (Ex. 1011) to
`
`“authenticate[] the publication and content” of the IPORT documents and a
`
`number of supporting documents (Ex. 1032–1037). Pet. 29–32. Mr. Olsen
`
`testifies that he served as the lead software programmer for ATCOM, Inc.
`
`from 1996 through the sale of the company in 2000. Ex. 1011 ¶ 1. ATCOM
`
`developed and released the IPORT system. Id. at ¶¶ 3, 4. According to Mr.
`
`Olsen, Exhibit 1007 is a true and accurate copy of a “white paper” entitled
`16
`
`
`
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`“Connection Methods and Concepts for IPORT V2x” dated November 1998.
`
`Id. ¶ 46. Exhibit 1008 is a “true and accurate copy” of a “white paper” titled
`
`“IPORT Central Office Solution” dated November 1998. Id. ¶ 47. Also
`
`according to Mr. Olsen, both IPORT documents were “created for marketing
`
`purposes, published and distributed to potential customers as part of an
`
`aggressive and successful marketing campaign for the IPORT ‘server only’
`
`systems.” Id. ¶ 48. Mr. Olsen testifies further that a World Wide Web
`
`Uniform Resource Locator (hyperlink) on the third page of IPORT indicates
`
`that both IPORT documents were published on the company’s web site. Id.
`
`¶ 49. Mr. Olsen testifies further:
`
`Due to the high level of customer interest and the fast pace of
`product development, the company published the white papers
`on its website as soon as they were available. The specific
`versions of the white papers dated November 1998 were
`therefore published on the IPORT website in November of 1998
`and distributed to a number of major hotel chains we were
`actively working with at the time including Hilton, Hyatt,
`Wingate Inns, and many other existing and prospective
`customers.
`
`Id. ¶ 50.
`
`IPORT contains the month and year “November 1998” on the face of
`
`the document, and at page 3, an apparent copyright notice without a
`
`specified year or date. Ex. 1008, 1, 3. The front page, at the lower right,
`
`contains the notation “CONFIDENTIAL” and underneath that notation
`
`“SEC00732.” Id. at 1. Each page, in fact, contains a similar
`
`“CONFIDENTIAL” notation, numbered sequentially to “SEC00753.” Id. at
`
`22. Neither the Petition nor Mr. Olsen indicates why a “true and accurate
`
`
`
`
`17
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`copy” (Ex. 1011 ¶ 47) would have been published on the company’s web
`
`site despite being “CONFIDENTIAL.”
`
`Regardless of the confidential markings, Mr. Olsen does not indicate
`
`why, in his service as the lead software programmer (Ex. 1011 ¶ 1) with the
`
`“role [of] software development,” which included “working on all aspects of
`
`IPORT system including the development, implementation, and
`
`documentation” relating to the IPORT system (id. ¶ 3), he was privy to
`
`when, or whether, particular documents were placed on the company’s
`
`website. Further, although Mr. Olsen submits that documents including
`
`IPORT were “distributed to a number of major hotel chains,” and “many
`
`other existing and prospective customers” (id. ¶ 50) — with no clear
`
`indication of when — the Declaration does not allege or explain that
`
`distribution to those entities means that the document “must have been
`
`sufficiently accessible to the public interested in the art.” Lister, 583 F.3d at
`
`1311. “A given reference is ‘publicly accessible’ upon a satisfactory
`
`showing that such document has been disseminated or otherwise made
`
`available to the extent that persons interested and ordinarily skilled in the
`
`subject matter or art exercising reasonable diligence, can locate it.” SRI
`
`Int’l, Inc. v. Internet Sec. Sys., Inc., 511 F.3d 1186, 1194 (Fed. Cir. 2008)
`
`(quoting Bruckelmyer v. Ground Heaters, Inc., 445 F.3d 1374, 1378 (Fed.
`
`Cir. 2006)). Further, although Mr. Olsen testifies (Ex. 1011 ¶ 49) that
`
`information “describing IPORT” was “published on [ATCOM’s] website”,
`
`the testimony does not indicate how one of ordinary skill in the art,
`
`exercising reasonable diligence, could locate the IPORT documents in
`
`question. See SRI Int’l, 511 F.3d at 1186.
`
`18
`
`
`
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`We conclude that, on this record, Petitioner has failed to meet its
`
`burden of at least a preliminary showing that IPORT are printed publications
`
`as contemplated by 35 U.S.C. §§ 102 and 311(b).
`
`2. Analysis
`
`Petitioner explicitly relies on IPORT to describe a system showing
`
`“the gateway (network management system) and the redirection server
`
`(portal page redirection unit) in the IPORT system are located in different
`
`premises” to disclose the “redirection data generation module” of claim 11
`
`“and its comparable components in claims 1 and 24” of the ’266 patent. Pet.
`
`45–46.
`
`In view of our conclusion with respect to the IPORT documents not
`
`being publications citable against the ’266 patent, this challenge reduces to
`
`Slemmer and Applegate. Petitioner has not demonstrated that Slemmer and
`
`Applegate, without IPORT, meet the limitations of the challenged claims.
`
`Therefore, Petitioner has not demonstrated that there is a reasonable
`
`likelihood that it would prevail in showing that claims 1–28 are unpatentable
`
`as obvious under 35 U.S.C § 103(a) over Slemmer, IPORT and Applegate.
`
`III. ORDER
`
`For the reasons given, it is
`
`
`
`ORDERED that the Petition is granted as to claims 1−28 of the
`
`’266 patent on the ground that claims 1−28 are unpatentable as obvious
`
`under 35 U.S.C. § 103 based on Slemmer and Vu.
`
`
`
`FURTHER ORDERED that pursuant to 35 U.S.C. § 314(a),
`
`inter partes review of the ʼ266 patent is hereby instituted commencing on
`
`
`
`
`19
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`the entry date of this Order, and pursuant to 35 U.S.C. § 314(c) and 37
`
`C.F.R. § 42.4, notice is hereby given of the institution of a trial.
`
`
`
`FURTHER ORDERED that the trial is limited to the grounds
`
`listed in this Order. No other grounds are authorized.
`
`
`
`
`
`
`20
`
`

`

`IPR2016-00077
`Patent 8,266,266 B2
`
`
`PETITIONER:
`
`Michael Mehrman
`mike@mehrmanlaw.com
`
`Stephanie Scruggs
`sscruggs@sgrlaw.com
`
`
`
`PATENT OWNER:
`
`Doug Muehlhauser
`2dgm@knobbe.com
`
`William Shreve
`William.shreve@knobbe.com
`
`
`
`
`
`21
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket