`
`
`
`______________
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`______________
`
`
`
`LG ELECTRONICS, INC.
`
`Petitioner
`
`v.
`
`UNILOC LUXEMBOURG, S.A. 1
`
`Patent Owner
`
`______________
`
`
`
`IPR2018-01503
`
`PATENT 6,216,158
`
`______________
`
`
`
`
`
`
`
`
`
`DECLARATION OF WILLIAM C EASTTOM II
`
`
`
`
`
`
`1 The owner of this patent is Uniloc 2017 LLC.
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`APPLE, INC.,
`Petitioners,
`
`v.
`
`UNILOC LUXEMBOURG S.A.,
`Patent Owner.
`
`
`IPR2158-00361
`U.S. PATENT NO. 6,216,158
`
`
`
`
`
`
`
`DECLARATION OF WILLIAM C EASTTOM II
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`I.
`
`INTRODUCTION ....................................................................................... 1
`
`II.
`
`BACKGROUND AND QUALIFICATIONS .............................................. 2
`
`III. LEGAL STANARDS USED IN MY ANALYSIS ....................................... 2
`
`A. Obviousness ............................................................................................ 2
`
`B. Priority Date ........................................................................................... 4
`
`C. Person of Ordinary Skill in the Art.......................................................... 4
`
`D. Broadest Reasonable Interpretation ......................................................... 5
`
`IV. OVERVIEW OF THE ‘158 PATENT ......................................................... 5
`
`V.
`
`CLAIM CONSTRUCTION ......................................................................... 6
`
`A. palm sized computer ............................................................................... 6
`
`B. means for accessing a description of a service” ....................................... 7
`
`C. means for downloading the program code ............................................... 7
`
`D. means for executing at least a portion of the program code ..................... 7
`
`E. means for sending control commands to the service in response to the
`means for executing ................................................................................ 7
`
`VI. GENERAL ISSUES .................................................................................... 8
`
`A. Jini: Quick Study, COMPUTERWORLD (“Jini-QS”) ............................ 8
`
`B. McCandless ............................................................................................ 9
`
`C. Motivation to Combine ..........................................................................11
`
`VII. GROUND 1 SPECIFIC CLAIMS ...............................................................12
`
`
`
`A. Claim 1 “accessing a description of the service from a directory of
`services, the description of the service including at least a reference to
`program code for controlling the service” ..............................................12
`
`B. Claim 1 “downloading the program code to the palm sized computer” ..14
`
`C. Claim 1 “sending control commands to the service from the palm sized
`computer in response to the executing” ..................................................15
`
`D. Claim 8 “A method of controlling a program on a network device from a
`palm sized computer, the computer is not capable of executing the
`program by itself, the network device and computer being coupled in
`communications via a network, the method comprising” .......................16
`
`E. Claim 8 “loading the program code” ......................................................18
`
`F. Claim 9 “The method of claim 8, wherein loading the program code
`includes loading the program code onto the palm sized computer and the
`issuing the control commands includes the palm sized computer issuing
`the control commands” ..........................................................................18
`
`G. Claim 12 “The method of claim 8 wherein loading the program code
`includes loading the program code onto the palm sized computer from
`the directory of services” .......................................................................19
`
`H. Claim 20 “means for downloading the program code” ...........................20
`
`VIII. GROUND 2 ................................................................................................20
`
`A. A method of controlling a service on a network using a palm sized
`computer, the palm sized computer being coupled in communications
`with the network, the method comprising ..............................................23
`
`B. accessing a description of the service from a directory of services, the
`description of the service including ........................................................26
`
`IX. CONCLUSIONS ........................................................................................27
`
`EASTTOM CV .....................................................................................................29
`
`A. Education ...............................................................................................29
`
`
`
`1. University Degrees ........................................................................... 29
`2. Industry Certifications ...................................................................... 30
`3. Hardware and Networking Related Certifications ............................. 30
`4. Operating System Related Certifications........................................... 30
`5. Programming and Web Development Related Certifications ............ 31
`6. Database Related Certifications ........................................................ 31
`7. Security and Forensics Related Certifications ................................... 31
`8. Software Certifications ..................................................................... 32
`9. Licenses ............................................................................................ 32
`
`B. Publications ...........................................................................................32
`1. Books 32
`2. Papers, presentations, & articles........................................................ 34
`3. Patents .............................................................................................. 37
`
`C. Standards and Certification Creation ......................................................38
`
`D. Professional Awards and Memberships .................................................39
`
`E. Speaking Engagements ..........................................................................40
`
`F. Litigation Support Experience ...............................................................44
`1. Testifying Experience ....................................................................... 51
`
`G. Professional Experience .........................................................................54
`
`H. Continuing Professional Education ........................................................58
`
`I. References to my work ..........................................................................59
`1. Media References ............................................................................. 60
`2. References to publications ................................................................ 61
`3. Universities using my books ............................................................. 68
`
`J. Training .................................................................................................70
`
`K. Technical Skills .....................................................................................72
`
`
`
`
`
`
`
`I, Chuck Easttom, hereby declare as follows:
`
`I.
`
`INTRODUCTION
`1. My name is William Charles Easttom II (Chuck Easttom) and I
`
`have been retained by Uniloc Luxembourg S.A. (“Uniloc” or the “Patent
`
`Owner”) to provide my expert opinions regarding U.S. Patent No. 6,216,158
`
`(the ‘158 Patent). In particular, I have been asked to opine on whether a person
`
`of ordinary skill in the art (POSITA) at the time the inventions described in
`
`the ‘158 patent were conceived would have found all claims, claims 1-2, 6-9,
`
`12, 14-15, and 20 (“Challenged Claims”) as unpatentable in light of the cited
`
`references and arguments in IPR2158-00361.
`
`2.
`
`Based on my review of the Petition and its exhibits, and my
`
`understanding of the relevant requirements of patent law, and my decades of
`
`experience in the field of computer science including communications
`
`systems, it is my opinion that the Challenged Claims would not have been
`
`obvious in light of the proposed combinations.
`
`3.
`
`I am being compensated for my time at my standard consulting
`
`rate of $300 per hour. I am also being reimbursed for expenses that I incur
`
`during the course of this work. Apart from that, I have no financial interest in
`
`Uniloc. My compensation is not contingent upon the results of my study or
`
`the substance of my opinions.
`
`
`
`II. BACKGROUND AND QUALIFICATIONS
`
`4.
`
`In my over 25 years of computer industry experience I have had
`
`extensive experience in communications systems, including data networks in
`
`general that have messaging capabilities. I hold 42 industry certifications,
`
`which include (among others) networking certifications. I have authored 26
`
`computer science books, several of which deal with networking topics. I am
`
`also the sole named inventor on thirteen patents.
`
`5.
`
`I also have extensive experience with Java and remote
`
`programming with Java. Of my 26 published books, 2 are Java books and one
`
`of those is about Enterprise Java Beans, a means for accessing remote
`
`programming code via Java.
`
`6.
`
`A more detailed description of my professional qualifications,
`
`including a list of publications, teaching, and professional activities, is
`
`contained in my curriculum vitae, a copy of which is attached hereto as
`
`Exhibit A.
`
`III. LEGAL STANARDS USED IN MY ANALYSIS
`
`7.
`
`Although I am not an attorney and I do not offer any legal
`
`opinions in this proceeding, I have been informed of and relied on certain legal
`
`principles in reaching the opinions set forth in this Declaration.
`
`A.
`
`8.
`
`Obviousness
`
`I understand that a patent claim is invalid if the differences
`
`between the subject matter and the prior art are such that the subject matter as
`
`
`
`a whole would have been obvious to a POSITA at the time of the alleged
`
`invention. I further understand that an obviousness analysis involves a review
`
`of the scope and content of the asserted prior art, the differences between the
`
`prior art and the claims at issue, the level of ordinary skill in the pertinent art,
`
`and objective indicia of non-obviousness such as long-felt need, industry
`
`praise for the invention, and skepticism of others in the field.
`
`9.
`
`I have been informed that if a single limitation of a claim is
`
`absent from the cited prior art, the claim cannot be considered obvious.
`
`10.
`
`I have further been informed that it is improper to combine
`
`references where the references teach away from a proposed combination; and
`
`that the following factors are among those relevant in considering whether
`
`prior art teaches away:
`
`• whether a POSITA, upon reading the reference would be led in a
`
`direction divergent from the path that was taken by the applicant;
`
`• whether the prior art criticizes, discredits, or otherwise discourages
`
`investigation into the claimed invention;
`
`• whether a proposed combination would produce an inoperative
`
`result; and
`
`• whether a proposed combination or modification would render the
`
`teachings of a reference unsatisfactory for its intended purpose.
`
`11.
`
`In addition, I have been informed that a proposed combination
`
`that changes the basic principles under which the prior art was designed to
`
`operate may fail to support a conclusion of obviousness.
`
`
`
`B.
`
`Priority Date
`
`12. The 6,622,158 patent issued on Apr. 10, 2001 and the application
`
`was filed on Jan.25, 1999. For purposes of this declaration, I have assumed
`
`the priority date for the ‘158 patent is Jan.25, 1999.
`
`C.
`
`Person of Ordinary Skill in the Art
`
`13.
`
`I understand that a POSITA is a hypothetical person who is
`
`presumed to have ordinary skill in the art as of the priority date. I understand
`
`that factors that may be considered in determining the level of ordinary skill
`
`in the art may include: (a) the type of problems encountered in the art; (b)
`
`prior art solutions to those problems; (c) the rapidity with which innovations
`
`are made; (d) the sophistication of the technology; and (e) the educational
`
`level of active workers in the field.
`14.
`I have been asked to provide my opinion as to the qualifications
`
`of the person of ordinary skill in the art to which the ‘158 patent pertains as
`
`of April 24, 2000. I understand that Dr. Houh opines that a person of ordinary
`
`skill in the art “B.S. degree in Electrical Engineering, Computer Engineering,
`
`or Computer Science, or equivalent training, as well as at least three years of
`
`technical experience in the field of computer networking.” I agree with Dr.
`
`Houh’s opinion of a POSA, except that I would add that more experience
`
`could compensate for less education and vice versa. For example, one with a
`
`
`
`master’s degree might only need 1 to 2 years’ experience, or a person with no
`
`degree but over 5 years’ experience in networking would qualify as a POSA.
`
`15. Although my qualifications and experience exceed those of the
`
`hypothetical person having ordinary skill in the art defined above, my analysis
`
`and opinions regarding the ‘158 Patent have been based on the perspective of
`
`a person of ordinary skill in the art as of April 10, 2001.
`
`D. Broadest Reasonable Interpretation
`
`16.
`
`I have been informed that, for purposes of this Inter Partes
`
`Review (IPR), the terms in the claims of the ‘158 patent are to be given their
`
`Broadest Reasonable Interpretation (BRI) in light of the specification and
`
`prosecution history of ‘158 Patent as understood by a POSITA on the priority
`
`date. I have used this standard throughout my analysis.
`
`IV. OVERVIEW OF THE ‘158 PATENT
`
`17. The ’158 patent is titled “System and method using a palm sized
`
`computer to control network devices.” The ʼ158 patent issued April 10, 2001,
`
`from U.S. Patent Application No. 09/237,609 filed January 25, 1999 and
`
`originally assigned to 3Com Corporation (3Com).
`
`18. The inventors of the ’158 patent observed that at the time,
`
`relative to desktop and laptop computers, palm sized computers had limited
`
`processing, display and input capabilities. These limitations prevented palm
`
`sized computers from running the same applications as desktop or laptop
`
`
`
`computers. The portability of palm sized computers made the ability to run
`
`desktop applications advantageous.
`
`19. According to the invention of the ’158 Patent, a program on the
`
`palm sized computer is used to access a registry of network services. This
`
`registry includes descriptions for various services. Each description includes
`
`at least a reference to program code that can be downloaded to the palm sized
`
`computer. Executing this program causes the palm sized computer to issue
`
`commands directly to the specific network services needed. In some cases,
`
`these network services include application services for running desktop
`
`applications that the palm sized computer could not execute.
`
`V. CLAIM CONSTRUCTION
`
`20.
`
`I have been asked to provide my opinions regarding the
`
`construction of certain terms used in the claims of the ‘158 Patent as would
`
`be understood by a POSITA using the BRI.
`
`A.
`
`palm sized computer
`
`21. The petitioner has suggested the following definition: “For the
`
`purposes of this proceeding, it is sufficient to specify that a personal digital
`
`assistant (PDA) and a 3Com Palm Platform™ computer are examples of a
`
`“palm sized computer” in the context of the ’158 Patent.’” It appears the
`
`petitioner has offered examples of what a palm sized computer is but has not
`
`offered a definition. It is my opinion that this term does not require definition.
`
`
`
`B. means for accessing a description of a service”
`
`22. The petitioner has suggested the following definition: “a palm-
`
`sized computer executing the Jini middleware from Sun Microsystems, and
`
`equivalents thereof.”
`
`23.
`
`I disagree. I see nothing in the patent that would limit this claim
`
`element to the specific Jini middleware.
`
`C. means for downloading the program code
`
`24. The petitioner has suggested the following definition: “a palm-
`
`sized computer executing the Jini middleware from Sun Microsystems, and
`
`equivalents thereof”
`
`25.
`
`I disagree. I see nothing in the patent that would limit this claim
`
`element to the Jini middleware. Furthermore, the petitioners definition does
`
`not actually address the ‘downloading’ portion of the claim limitation.
`
`D. means for executing at least a portion of the program code
`
`26. The petitioner has suggested the following definition: “a palm-
`
`sized computer executing a Java Virtual Machine, and equivalents thereof.”
`
`27.
`
`I disagree, I see nothing in the patent that would limit this claim
`
`element to the Java Virtual Machine.
`
`E. means for sending control commands to the service in
`response to the means for executing
`
`
`
`
`
`28. The petitioner has suggested the following definition “a palm-
`
`sized computer executing a control protocol capable of issuing control
`
`commands or Java’s Remote Method Invocation (RMI) protocol, and
`
`equivalents thereof.”
`
`29.
`
`I disagree, I see nothing in the patent that would limit this claim
`
`element to the Java RMI protocol.
`
`VI. GENERAL ISSUES
`
`30.
`
`In reviewing the petition for inter partes review, and the attached
`
`exhibits and declarations, several issues stood out as pervasive to the petition
`
`and need to be addressed separate from the specific claims. Those issues are
`
`addressed here.
`A.
`Jini: Quick Study, COMPUTERWORLD (“Jini-QS”)
`
`31.
`
`In Ground 1, in every single instance, the petitioner relies on
`
`some combination of the “Jini-QS”. This is inappropriate for several reasons.
`
`32. The first being that my understanding while non-enabling prior
`
`art may qualify under Section 103, that non-enabling reference only qualifies
`
`as prior art for what is disclosed in it. However, “Jini-QS” is a marketing
`
`article in a general-purpose magazine. It does not provide any detail on how
`
`the elements in the article would actually be done.
`33. Furthermore, the article itself admits that the product it describes
`
`is not yet complete “It will be available in the second half of next year. Jini's
`
`
`
`goal is to enable the creation of simpler, more flexible networks.” A POSA
`
`would readily understand that it is quite common for technology to not unfold
`
`according to plan. Frequently promised technology either is not completed in
`
`time, or does not have all the expected functionality.
`
`34. The ComputerWorld article does not constitute prior art. Instead
`
`it is a marketing piece describing technology that the author hopes will be
`
`available “in the second half of next year.”
`
`35. The ComputerWorld article cannot be prior art. It was allegedly
`
`published in December of 1998, and the article itself says this technology may
`
`be available in the “second half of next year”, which would be at least June of
`
`1999. The application for the ‘158 patent was filed on January 25, 1999. Even
`
`if one ignores the fact that this article does not describe how to accomplish its
`
`goals in sufficient detail, and then ignores the fact that technology often fails
`
`to meet expectations, then further assumes that every item in the article is
`
`exactly what the petitioner claims it is, and it was all fully functional when the
`
`article said it would be, that would still be at least six months after the ‘158
`
`patent was filed. This article cannot be considered prior art.
`
`B. McCandless
`
`36. The
`
`petitioner
`
`appears
`
`to
`
`completely misunderstand
`
`McCandless. The section the petitioner cites is from a section "In the pipeline"
`
`
`
`which discusses various improvements to PDA's that the author believes will
`
`come at some point in the future. The author is not describing what PDA’s
`
`can do at the time of the writing, or even what is in the immediate future, but
`
`rather a wish list for what may eventually happen.
`
`37. Citations throughout this section of McCandless demonstrate this
`
`(emphasis added) “PDA's will soon come with built-in access to a ubiquitous
`
`wireless network". In the paragraph just preceding the one the petitioner cites
`
`(emphasis added) "Using this network your PDA will eventually subsume
`
`functionality of the remote controls in your home". Then in the paragraph
`
`immediately after the one that the petitioner cites (emphasis added) "In due
`
`time, your PDA will absorb the other things you now feel compelled to carry
`
`in your pockets". Taken in context, a POSA would immediately see that
`
`McCandless is not discussing what was available at the time of the writing,
`
`but rather things the author hoped would eventually be added to PDA’s.
`
`38. Reading all of McCandless it would be a clear to a POSA that
`
`the article is not describing any technology that existed at the time of the
`
`writing of the article. Rather, the article is the authors speculation about future
`
`improvements to PDA’s that he believes may happen someday. It is therefore
`
`impossible for a POSA to combine McCandless with any other prior art.
`
`
`
`C. Motivation to Combine
`
`39. The preceding section leads naturally to a dissection of the
`
`alleged the motivation to combine. On paragraph 37 of Dr. Houh’s declaration
`
`he states “ (f) some teaching, suggestion, or motivation in the prior art that
`
`would have led one of ordinary skill to modify the prior art reference or to
`
`combine prior art reference.” On this issue I am in complete agreement with
`
`Dr. Houh.
`
`40. However, throughout Dr. Houh’s declaration, not once does he
`
`explain any motivation to combine. He continually recites “it is my opinion
`
`that one of ordinary skill in the art would have been motivated to combine..”
`
`but never provides any reason at all why a POSA would be motivated to
`
`combine.
`
`41. Beyond that issue, since the Jini-QS article a) did not fully
`
`describe how to implement its technology and b) described technology it
`
`admitted did not yet exist, it would have been impossible to combine Jini-QS
`
`with anything. Jini-QS did not yet exist. There was simply an article that
`
`hoped it would be ready “in the second half of next year”, at least six months
`
`after the application for the ‘158 patent was filed.
`
`
`
`VII. GROUND 1 SPECIFIC CLAIMS
`
`42.
`
`I have reviewed the claims in light of the proposed combinations
`
`and believe they do not disclose the claimed features.
`A. Claim 1 “accessing a description of the service from a
`directory of services, the description of the service including at
`least a reference to program code for controlling the service”
`
`43. The petitioner states:
`
`“Jini-QS discloses this limitation because it teaches that the Jini
`platform includes a Lookup Service that keeps track of which
`services are available on the network – i.e., “Lookup is the
`equivalent of a network bulletin board for all available services.”
`APPL-1005, p. 29 (left column). Jini-QS illustrates the Lookup
`Service:”
`and
`“Jini-QS further teaches that the user requests (accesses)
`descriptions of the available services via the Lookup Service and
`in response is shown descriptive icons corresponding to the
`services: “[t]he user requests services that are available, and
`icons appear on his screen.” APPL-1005, p. 29 (main figure).
`“Lookup stores pointers to various sources on the network as
`well as code for other services,” and when a user selects a service
`from the list of services, the Lookup “server instantly sends
`proxy code back to the device.” Id. at p. 29(left column; main
`figure).”
`44. Aside from the previously discussed fact that Jini-QS is not prior
`
`art, and in fact did not actually exist, but rather there was an article discussing
`
`what it might do “in the second half of next year”, nothing in Jini-QS teaches
`
`or even suggests “at least a reference to program code for controlling the
`
`service”
`
`
`
`45. The petitioner appears to claim that the proxy code referenced by
`
`Jini-QS is a “reference to program code”. However, what Jini-QS actually
`
`states is:
`
`Proxy: This is the piece of Java code that moves around from device to
`device acting as the front end for all the Jini-enabled or legacy systems.
`The proxy essentially tells the client how to use the device. For
`example, it may include a graphical user interface that shows the user
`how to work the network projector. In the PC world, the equivalent
`would be the device driver.
`
`
`46. This proxy is first shared code for all the Jini-enabled or legacy
`
`systems. It has information about how the client could use the device, but does
`
`not include “a reference to program code for controlling the service”
`
`47. The petitioner further claims:
`
`Thus, Jini-QS’s teaching registering a new device in the Lookup
`Service and advertising its services by storing a descriptive name or
`icon associated with the service and a pointer to the service’s associated
`proxy code, in view of Arnold’s teaching of registering services with
`the lookup service, which stores in the lookup service an object
`corresponding to the service that facilitates access to the service, render
`obvious the claimed: “registering the service in the directory of services
`by storing the description of the service in the directory of services.”
`
`
`48. Aside from the fact that Jini-QS was merely a description of
`
`technology that might exist “in the second half of next year” and therefore
`
`could not anticipate anything, nor be combined with anything, there are other
`
`errors in the petitioners claim.
`
`
`
`49. The petitioner even states that Jini-QS stored “a descripted name
`
`or icon associated with the service’ and the petitioner does not claim that this
`
`in and of itself is a “a reference to program code for controlling the service”.
`
`Arnold describes in claim 1 “initiating a communications link between a
`
`browser stored on a client and a server; receiving selection of a service
`
`identifier from a set of service identifiers; receiving Downloadable code
`
`corresponding to the selected service identifier from the server;”
`
`50. Arnold was not about finding services on a network one could
`
`control, but rather going through a web page, using the client browser, to find
`
`out what services a web server offered. Nothing in Arnold teaches, or even
`
`suggests controlling a network device.
`
`B. Claim 1 “downloading the program code to the palm sized
`computer”
`
`51. The petitioner equates the proxy code of Jini-QS with program
`
`code. In the early 2000’s I published a book about Enterprise Java Beans, a
`
`common way of accessing remote programming code in Java. I have a detailed
`
`understanding of remote programming code used in Java. As any POSA
`
`would understand, proxy code is what one uses instead of program code.
`
`Rather than download the actual program code, one downloads a proxy that
`
`
`
`allows one to route commands to the actual program code that is remote1. The
`
`following excerpt demonstrates this:
`
`
`
`MSDN https://msdn.microsoft.com/en-us/library/ee809525.aspx
`
`52. As the preceding excerpt describes, when using proxy code, the
`
`programmer is making calls to code that is running on a remote server. This
`
`requires some technical steps to be taken such as serializing and de-serializing
`
`information. More importantly, the code being executed is remote. That code
`
`is not on the client.
`
`53. Proxy code is a completely different approach than downloading
`
`the program code. Proxy code is used when, for whatever reason,
`
`downloading the program code is infeasible or undesirable.
`
`C. Claim 1 “sending control commands to the service from the
`palm sized computer in response to the executing”
`
`54. The petitioner states “Jini-QS in view of Arnold render obvious
`
`this limitation. First, Jini-QS teaches that in response to and during execution
`
`of the proxy code, a user’s input to the graphical user interface results in
`
`
`1 https://docs.oracle.com/javase/7/docs/technotes/guides/net/proxies.html
`
`
`
`sending control commands/instructions to the service in order to control the
`
`service: “The proxy essentially tells the client how to use the device. For
`
`example, it may include a graphical user interface[.]” APPL-1005, p. 29 (left
`
`column). Jini-QS further teaches that a service will receive a command or
`
`“instruction via that proxy code[.]” Id. at p. 29 (main figure). In the example
`
`described in association with item 3 in the main figure, the client controls a
`
`print service by issuing a “printing instruction.” APPL-1005, p. 29 (main
`
`figure).”
`
`55. Aside from the fact that Jini-QS was merely a description of
`
`technology that might exist “in the second half of next year” and therefore
`
`could not anticipate anything, nor be combined with anything, there are other
`
`errors in the petitioners claim.
`
`56. The petitioner misunderstands both Jini-QS and the ‘158 patent.
`
`As the petitioner sites, Jini-QS “The proxy essentially tells the client how to
`
`use the device”, however using a device is not the same thing as controlling
`
`the device. The Jini-QS system merely sends information. And as has been
`
`previously discussed, there is no executing program code. This claim
`
`limitation is ‘in response to the executing’.
`
`D. Claim 8 “A method of controlling a program on a network
`device from a palm sized computer, the computer is not capable of
`executing the program by itself, the network device and computer
`
`
`
`being coupled in communications via a network, the method
`comprising”
`
`57. Aside from the fact that Jini-QS was merely a description of
`
`technology that might exist “in the second half of next year” and therefore
`
`could not anticipate anything, nor be combined with anything, there are other
`
`errors in the petitioners claim.
`
`58. The petitioner claims “Jini-QS in view of Arnold and
`
`McCandless render obvious this limitation.” It is immediately obvious that
`
`neither Jini-QS nor Anderson ever discuss (emphasis added) “controlling a
`
`program on a network device from a palm sized computer, the computer is
`
`not capable of executing the program by itself”
`
`59. The petitioner points to McCandless:
`
`The network relaxes where and how computation occurs. For
`example, applications that are too compute- or space intensive to
`run directly on your PDA will run, instead, on a remote high
`performance computer, but then return the output of the
`computation. When new versions of applications are released,
`your PDA will automatically update.
`
`
`60. The
`
`petitioner
`
`appears
`
`to
`
`completely misunderstand
`
`McCandless. The section the petitioner cites is from a section "In the pipeline"
`
`which discusses various improvements to PDA's that the author believes will
`
`come at some point in the future. The author is not describing what PDA’s
`
`
`
`can do at the time of the writing, or even what is in the immediate future, but
`
`rather a wish list for what may eventually happen.
`
`61. Citations throughout this section of McCandless demonstrate this
`
`(emphasis added) “PDA's will soon come with built-in access to a ubiquitous
`
`wireless network". In the paragraph just preceding the one the petitioner cites
`
`(emphasis added) "Using this network your PDA will eventually subsume
`
`functionality of the remote controls in your home". Then in the paragraph
`
`immediately after the one that the petitioner cites (emphasis added) "In due
`
`time, your PDA will absorb the other things you now feel compelled to carry
`
`in your pockets". Taken in context, a POSA would immediately see that
`
`McCandless is not discussing what was available at the time of the writing,
`
`but rather things the author hoped would eventually be added to PDA’s.
`
`E. Claim 8 “loading the program code”
`
`62. The petitioner again conflates proxy code with program code. As
`
`described previously in this declaration in reference to claim 1, proxy code is
`
`used specifically because, for some reason, program code is either impractical
`
`or undesirable.
`
`F. Claim 9 “The method of claim 8, wherein loading the
`program code includes loading the program code onto the palm
`
`
`
`sized computer and the issuing the control commands includes the
`palm siz