`Paper No. 14
`Filed: September 5, 2019
`
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________________
`
`
`PAYPAL, INC.
`UPWORK GLOBAL INC.
`SHOPIFY, INC.
`SHOPIFY (USA), INC.
`STRAVA, INC.
`VALASSIS COMMUNICATIONS, INC.
`RETAILMENOT, INC.
`DOLLAR SHAVE CLUB, INC.
`Petitioners
`
`v.
`
`PERSONALWEB TECHNOLOGIES LLC
`LEVEL 3 COMMUNICATIONS, LLC
`Patent Owners
`
`____________________
`
`
`Case IPR2019-01111
`Patent No. 7,802,310
`
`____________________
`
`
`PATENT OWNERS’ PRELIMINARY RESPONSE
`
`
`
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`
`I.
`
`TABLE OF CONTENTS
`
`INTRODUCTION ........................................................................................... 1
`
`II.
`
`BACKGROUND ............................................................................................. 1
`
`A.
`
`B.
`
`C.
`
`D.
`
`The ’310 Patent ..................................................................................... 1
`
`The Challenged Claims ......................................................................... 6
`
`Prior Post-Grant Proceedings ................................................................ 7
`
`The Cited References .......................................................................... 10
`
`1.
`
`2.
`
`Francisco ................................................................................... 10
`
`Grube ......................................................................................... 14
`
`III. REVIEW SHOULD NOT BE INSTITUTED BECAUSE THE
`PETITION IS TIME-BARRED .................................................................... 15
`
`A.
`
`B.
`
`C.
`
`D.
`
`PersonalWeb Sued Amazon Years Ago .............................................. 15
`
`Amazon Is an RPI and Is in Privity with Its Customers—
`Including Petitioners............................................................................ 17
`
`The District Court Concluded that Amazon and Its Customers
`Are in Privity—Just As Amazon Argued ............................................ 18
`
`The District Court’s Privity Determination Comports with
`Binding Precedent and PTAB Practice ............................................... 22
`
`E.
`
`The District Court’s Analysis Confirms that Amazon Is an RPI ........ 23
`
`IV. THE BOARD SHOULD DISCRETIONARILY DENY
`INSTITUTION UNDER § 314 ..................................................................... 26
`
`V.
`
`CLAIM CONSTRUCTION .......................................................................... 29
`
`A.
`
`B.
`
`C.
`
`Legal Standard ..................................................................................... 29
`
`Response to Petitioners’ Proposed Constructions ............................... 29
`
`Patent Owners’ Proposed Constructions ............................................. 30
`
`1.
`
`“message digest function or a hash function” (claims 20,
`69) ............................................................................................. 30
`
`a.
`
`b.
`
`Patent Owners’ Construction Is Correct ......................... 31
`
`Petitioners’ Implicit Construction Is Incorrect ............... 36
`
`i
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`VI. REVIEW SHOULD NOT BE INSTITUTED ON GROUND 1 ................... 37
`
`A.
`
`Petitioners Have Not Shown that All Elements of Claims 20
`and 69 Are Present in, or Obvious Over, Francisco ............................ 38
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`“Message Digest Function or a Hash Function.” ...................... 38
`
`Allowing Access Based on a “Content-Dependent Name”
`Computed from a “Message Digest Function or Hash
`Function” ................................................................................... 44
`
`“Wherein Two Identical Data Items Will Have the Same
`Content-Dependent Name” ....................................................... 45
`
`“Controlling Distribution of Content From a First
`Computer to at Least One Other Computer” (Claim 20) .......... 46
`
`“Permitting the Content to be Provided to or Accessed by
`the at Least One Other Computer” (Claim 20) ......................... 48
`
`Limitation 69(b)(i) (Claim 69) .................................................. 49
`
`Limitation 69(b)(ii) (Claim 69) ................................................. 53
`
`B.
`
`Petitioners Have Not Established a Logical Reason for
`Modifying Francisco, or a Reasonable Expectation of Success
`in Doing So .......................................................................................... 54
`
`VII. REVIEW SHOULD NOT BE INSTITUTED ON GROUND 2 ................... 57
`
`A.
`
`B.
`
`The Alleged Combination of Grube and Francisco Does Not
`Disclose All Elements of Any Challenged Claim ............................... 57
`
`Petitioners Have Not Established a Logical Reason for
`Combining Francisco and Grube, or a Reasonable Expectation
`of Success in Doing So ........................................................................ 61
`
`VIII. CONCLUSION .............................................................................................. 64
`
`
`
`
`
`
`
`
`ii
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`LISTING OF EXHIBITS
`
`EX. #
`
`Exhibit Description
`
`2001 Declaration of Lawrence M. Hadley in Support of Patent Owner’s
`
`Motion for Pro Hac Vice Admission
`
`2002 Declaration of Samuel H. Russ, Ph.D.
`
`2003 Request for Ex Parte Reexamination in Rexam No. 90/014,368
`
`2004 U.S. Pat. No. 7,802,310
`
`2005 Markman decision from In re PersonalWeb Technologies, LLC et al.
`
`Patent Litigation, 18-md-02834, Dkt. No. 485 (N.D. Cal. 2019)
`
`2006 10/26/2017 Samuel Russ Declaration, submitted by Patent Owners in
`
`Reexamination Control No. 90/013,487 of U.S. Pat. No. 6,415,280
`
`2007
`
`July 22, 2019 Appeal Brief in Reexamination Control No. 90/013,764
`
`2008 Complaint from PersonalWeb Technologies LLC v. Amazon Web
`
`Services LLC et al, 6-11-cv-00658 (E.D. Tex.)
`
`2009 Order of Dismissal from PersonalWeb Technologies LLC v. Amazon
`
`Web Services LLC et al, 6-11-cv-00658 (E.D. Tex.)
`
`2010 Complaint from PersonalWeb Technologies, LLC et al. v. Venmo, Inc.,
`
`3:18-cv-177 (N.D. Cal.)
`
`2011 Complaint from Amazon.com, Inc. et al. v. PersonalWeb Technologies,
`
`LLC et al., 5-18-cv-00767 (N.D. Cal.)
`
`2012 Order Granting in Part and Denying in Part Amazon’s Motion for
`
`Summary Judgment from In re: PersonalWeb Technologies, LLC et al.
`
`Patent Litigation, 5:18-md-02834-BLF, Dkt. 394 (N.D. Cal. 3/13/2019)
`
`2013 Stipulation Re Remaining Customer Cases from In re: PersonalWeb
`
`Technologies, LLC et al., Patent Litigation, Case Nos. 5:18-md-02834-
`
`BLF and 5:18-cv-00767-BLF, Dkt. 417 (N.D. Cal. April 26, 2019)
`
`iii
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`2014 Amazon’s Motion for Summary Judgment from In re: PersonalWeb
`
`Technologies, LLC et al., Patent Litigation, Case Nos. 5:18-md-02834-
`
`BLF and 5:18-cv-00767-BLF, Dkt. 315, (N.D. Cal. November 28, 2018)
`
`2015 Public excerpts from Amazon’s Interrogatory Responses from In re:
`
`PersonalWeb Technologies, LLC et al., Patent Litigation, Case Nos.
`
`5:18-md-02834-BLF and 5:18-cv-00767-BLF, (N.D. Cal. November 1,
`
`2018)
`
`2016 Certificate of Service for Dollar Shave Club, Inc.
`
`
`
`
`
`
`
`
`
`iv
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`I.
`
`INTRODUCTION
`
`U.S. Patent No. 7,802,310 (“the ’310 Patent”) belongs to a patent family that
`
`revolutionized the field of computer file storage, by pioneering the concept of
`
`content-based “True Names.” Petitioners assert that claims 20 and 69 of the ’310
`
`Patent are obvious over Francisco. Pet. at 21-46. Petitioners further assert that
`
`these claims are obvious over the combination of Francisco and Grube. Id. at 40-
`
`49.
`
`The Petition is time-barred under 35 U.S.C. § 315(b). The Board should also
`
`discretionarily deny review under 35 U.S.C. § 314.
`
`The Petition should also be denied on the merits. Seven separate elements of
`
`the claims are neither disclosed in, nor obvious over, Francisco or Grube, nor any
`
`alleged combination thereof. Moreover, Petitioners have failed to prove that a
`
`person of ordinary skill in the art (“POSITA”) would have had a logical rationale
`
`to modify Francisco, or to combine it with Grube in the way alleged.
`
`Petitioners have not shown a reasonable likelihood of success on either
`
`ground of the Petition. Thus, the Petition must be denied.
`
`II. BACKGROUND
`
`A. The ’310 Patent
`
`The ’310 Patent is part of the True Name family of patents. These patents
`
`1
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`teach a novel way of identifying and locating data in any computer system. On a
`
`single computer, or within a small network, the task is relatively easy: Simply
`
`name the data or file, and identify it by that name and its location. Early operating
`
`systems facilitated this approach with standardized conventions for naming files,
`
`creating folders, and designating storage devices, which allowed the system to
`
`locate data. Ex. 1001, 1:50-2:5. A familiar example might look like this:
`
`c:\mydocuments\Budget_Forecast_1993.doc.
`
`But as networks grew, particularly with the development of the Internet,
`
`conventional naming and locating systems could not keep pace. As systems
`
`evolved, files could be divided and stored across different devices in dispersed
`
`locations. While offering benefits, this also created a problem: Different users
`
`could give identical names to different files or parts of files—or unknowingly give
`
`different names to identical files. Existing systems had no means to ensure that
`
`identical names referred to the same data, and conversely, that different names
`
`referred to different data. Lachman and Farber, the inventors of the True Name
`
`patents, realized that, if these limitations were not surmounted, it would become
`
`infeasible to accurately identify, locate, retrieve, de-duplicate, replicate, and
`
`synchronize data within advanced systems. Ex. 1001, 2:26-3:29.
`
`Lachman and Farber found a solution: They developed a new system that
`
`2
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`replaced conventional naming with “substantially unique,” content-based
`
`identifiers. Id., 3:30-48. If the item’s content were unique, its identifier would be
`
`unique. This approach could assign substantially-unique identifiers to an endless
`
`variety of “data items”—“the contents of a file, a portion of a file, a page in
`
`memory, an object in an object-oriented program, a digital message, a digital
`
`scanned image, a part of a video or audio signal, or any other entity which can be
`
`represented by a sequence of bits.” Id., 2:16-25. Applied system-wide, this
`
`approach, with pinpoint precision, would permit any data item to be stored,
`
`located, managed, synchronized, and accessed using its content-based identifier.
`
`But how could a system generate a “substantially-unique identifier” for any
`
`size data item, system-wide? For this, Lachman and Farber turned to cryptography.
`
`Cryptographic hash functions, including MD4, MD5, and SHA, had been used in
`
`computer systems to verify the integrity of retrieved data—a so-called
`
`“checksum.” Id., 12:21-51. Lachman and Farber recognized that these same hash
`
`functions could be devoted to a vital new purpose: If a cryptographic hash function
`
`were applied to a sequence of bits (a “data item”), it would produce a unique value
`
`that: (1) is “virtually guarantee[d]” to produce a different value if the data item is
`
`changed; (2) is “computationally difficult” to reproduce with a different sequence
`
`of bits; and (3) cannot be used to recreate the original sequence of bits. Id., 12:21-
`
`3
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`51. These cryptographic hash functions can assign any unique sequence of bits—
`
`based on content alone—a substantially-unique identifier. Lachman and Farber
`
`estimated that the odds of these hash functions producing the same identifier for
`
`two different sequences of bits (i.e., the “probability of collision”) was at least 1 in
`
`229. Id., 12:58-13:8. With such a low probability of collision, Lachman and Farber
`
`dubbed their content-based identifier a “True Name.” Id., 12:21-51.
`
`With this insight, Lachman and Farber crafted novel ways for using True
`
`Names to manage the universe of data in a network, no matter its complexity. They
`
`conceived various data structures, including a “Local Directory Extension Table”
`
`(LDE) and “True File Registry” (TFR), for tracking and managing information
`
`about every data item, and associating each True Name with any user-provided
`
`name, location, dependency, and migration information:
`
`
`
`4
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`Id., Fig. 1(b); 8:27-43. These data structures permitted a key-map organization,
`
`allowing rapid determinations of whether a particular data item exists in a system
`
`and, if so, its location everywhere on that system. This functionality was simply
`
`not possible using the conventional art.
`
`The ’310 Patent envisions and allows for all data operations within the
`
`system to be managed using the True Name and associated information. This
`
`includes assimilating, identifying, and accessing all data items in the system by
`
`True Name, regardless of their actual storage location and user-designated name.
`
`In one embodiment, the ’310 Patent uses True Names to “track” data items
`
`“for licensing purposes.” Id., 31:3-32. In this embodiment, the True Name is used
`
`to “ensure[] that licensed files are not used by unauthorized parties.” Id. The ’310
`
`Patent discloses two different types of “licensing” functions: (i) “active”
`
`monitoring; and (ii) “passive” monitoring. Id. In “active” monitoring, the ’310
`
`Patent uses the True Name to “refus[e] to provide access to a file without
`
`authorization.” Id. The challenged claims are directed to “active” monitoring.
`
`To perform “active” monitoring, the ’310 Patent creates a “license table
`
`136.” Id., 11:33-45. The table includes a number of “record[s] 150.” Id. Each
`
`record “records a relationship between a licensable data item and the user[s]
`
`licensed to have access to it.” Id. An example is shown in Fig. 9, below:
`
`5
`
`
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`In each record, the “True Name” entry lists the True Name of “a data item
`
`subject to license validation.” Id., 11:40-45. For instance, if the data item is a
`
`“software product” (e.g., Microsoft Word), the license table could list the True
`
`Name of the “main executable image” (WINWORD.exe) of the program. Id.,
`
`31:17-23. Meanwhile, the “licensee” entry lists the “identity of [each] user
`
`authorized to have access to this [data item].” Id., 11:40-45.
`
`In operation, a user may try to access a file on the network. Id., 31:3-32.
`
`When that happens, the system checks the True Name of the file, and looks it up in
`
`the license table 136. Id., 11:33-45. If the True Name appears in the license table,
`
`the file is subject to licensing restrictions. Id. In that case, the system looks up the
`
`record for the True Name in the license table, then looks up the “licensees” for that
`
`True Name. Id. If the user is one of the “licensees,” the system allows the user to
`
`access the file. Id., 31:4-31. If not, the system disallows access. Id.
`
`B.
`
`The Challenged Claims
`
`Both challenged claims are independent claims. Claim 20 recites a
`
`“computer-implemented method operable in a system which includes a plurality of
`
`computers.” Claim 69 recites a “system operable in a network of computers.”
`
`6
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`Both claims recite using a “content-dependent name” to control access to a
`
`“data item.” In both claims, the content-dependent name is computed by applying a
`
`“message digest function or a hash function” to the data item. In both claims, a
`
`“first computer[/device]” receives a “request” from a “second[/other]
`
`computer[/device].” The “request” includes the “content-dependent name” of the
`
`data item. In both claims, the first computer/device uses the content-dependent
`
`name to determine whether the second computer/device is authorized to access the
`
`data item. If the first computer/device determines that the second computer/device
`
`is authorized, it permits it to access the data item; otherwise, it does not.
`
`C.
`
`Prior Post-Grant Proceedings
`
`The ’310 Patent has been subject to extensive post-grant proceedings,
`
`including three separate IPRs, a reexamination, and two Federal Circuit appeals.
`
`First, on 9/18/2013, Apple filed a Petition for Inter Partes Review of claims
`
`24, 32, 70, 81, 82 and 86. IPR2013-00596, Paper 1. Apple’s Petition asserted that
`
`the challenged claims were anticipated by and/or obvious over five references:
`
`Browne, Stefik, Woodhill, Langer, and Farber. Id. at 11. Apple’s Petition was
`
`instituted on 3/26/2014, on one ground: obviousness over Woodhill and Stefik.
`
`IPR2013-00596, Paper 9 at 13-21. On 3/25/2015, the Board issued a Final Written
`
`Decision, finding all challenged claims obvious over Woodhill and Stefik.
`
`7
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`IPR2013-00596, Paper 33. Patent Owners appealed. Id., Paper 36.
`
`On 2/14/2017, the Federal Circuit issued its decision in the Appeal.
`
`PersonalWeb Techs., LLC. v. Apple, Inc., 848 F.3d 987 (Fed. Cir. 2017)
`
`(“PersonalWeb I”). The Federal Circuit vacated the obviousness determination,
`
`because the Board “did not adequately support its findings.” Id. at 989. The
`
`Federal Circuit remanded for further proceedings. Id. at 994.
`
`On 2/7/2018, the Board issued its decision after the remand. IPR2013-
`
`00596, Paper 44. Again, the Board found all challenged claims obvious over
`
`Woodhill and Stefik. Id. at 12-28. Again, Patent Owners appealed. Id., Paper 45.
`
`On 3/8/2019, the Federal Circuit issued its decision in the second appeal.
`
`PersonalWeb Techs., LLC v. Apple, Inc., 917 F.3d 1376 (Fed. Cir. 2019)
`
`(“PersonalWeb II”). Once again, the Federal Circuit found for Patent Owners. Id.
`
`The Federal Circuit found that neither of the cited references disclosed the claimed
`
`feature of “causing the content-dependent name of the particular data item to be
`
`compared to a plurality of values.” Id. at 1381-83. Since that element, or an
`
`analogous element, was present in all challenged claims, there was no prima facie
`
`case of obviousness against any claim. Id. Therefore, the Federal Circuit reversed
`
`the Board’s decision, concluding the IPR in Patent Owners’ favor. Id.
`
`Second, while IPR2013-00596 was pending, another Petitioner—
`
`8
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`Rackspace—filed a petition for Inter Partes Review of claims 1, 2, 5-8, 10-12, 14,
`
`16-19, 24, 29, 32, 70, 81, 82 and 86. IPR2014-00062, Paper 1 at 4. The Rackspace
`
`Petition asserted obviousness over five references: Kinetech, Brunk, Francisco1,
`
`Woodhill, and Langer. Id. The Petition was instituted on 4/15/2014. IPR2014-
`
`00062, Paper 9.
`
`After institution, Patent Owners and Rackspace executed a settlement
`
`agreement, settling IPR2014-00062 and several other IPRs. IPR2014-00062, Paper
`
`29 at 1. Pursuant to that agreement, on 10/16/2014, the parties filed a Joint Motion
`
`to Terminate IPR2014-00062. Id. That Motion was granted, and IPR2014-00062
`
`was terminated, on 10/28/2014. IPR2014-00062, Paper 32.
`
`Third, while the other two IPRs were pending, yet another Petitioner—
`
`Google—filed a Petition for Inter Partes Review of the ’310 Patent. IPR2014-
`
`00978, Paper 1. Google asked the Board to initiate review on the “identical
`
`grounds as those asserted by petitioners Rackspace … in IPR2014-00062.” Id. at 1.
`
`On 10/30/2014, the Board denied institution of Google’s Petition, because it was
`
`barred by 35 U.S.C. § 315(b), and Google did not timely file a motion to join its
`
`Petition with IPR2014-00062. IPR2014-00978, Paper 11.
`
`
`1 This is the same “Francisco” reference asserted in the present Petition.
`
`9
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`Thus, the ’310 patent has already been subjected to three IPRs.
`
`Moreover, on 8/20/2019, Apple filed a request for Ex Parte Reexamination
`
`of the ’310 patent. Ex. 2003. The Request challenges claims 70, 81, 82 and 86. Id.
`
`at 1. In the Request, Apple argues that the challenged claims are obvious over
`
`Browne in view of Langer. Id. at 23-48. The Examiner has not yet decided whether
`
`to grant Apple’s Request.
`
`D. The Cited References
`
`1.
`
`Francisco
`
`Francisco describes a “method of maintaining software program integrity
`
`and security.” Ex. 1003, Abstract. Francisco discloses two different techniques to
`
`do so: (i) an “authentication” technique, which uses “electronic identification
`
`indicia” (“EID”) to determine whether a copy of a program “differs in some
`
`respects from the base or true program;” (id., 3:5-16); and (ii) an “authorization”
`
`technique, which determines whether a user is authorized to use the program, and
`
`if so, allows the user to access the program. Id., 3:20-36. Francisco’s entire written
`
`disclosure takes up less than three columns. Id., 1:1-3:35.
`
`In its “authentication” technique, Francisco generates EIDs from the
`
`contents of a “true” or “base” program. Id., 2:11-50. Francisco discloses one, and
`
`only one, algorithm to generate EIDs:
`
`10
`
`
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`[T]he total number of ones and zeroes in the binary
`
`coded input Program A could be totalled; the total
`
`number of “ones” multiplied by an arbitrary number, e.g.
`
`22; the product of such multiplication could then be
`
`divided by the number of zeros in the binary coded
`
`program; and the remainder thereof be modified by
`
`addition to (or subtraction therefrom) of an arbitrary
`
`number, i.e. 7.
`
`Id., 2:29-45. According to Francisco, “[t]he resulting electronic numerical indicia
`
`would then, in all probability, be selectively unique for the particular program.” Id.
`
`Francisco is mistaken. Francisco’s algorithm can be summarized as follows:
`
`1. Count all 1s in Program A; store result as C1(A).
`
`2. Count all 0s in Program A; store result as C0(A).
`
`3. Compute EID(A) = rem((X*C1(A))/C0(A)) ± Y
`
`a. where, e.g., X = 22, Y = 7, “rem()” = remainder function.
`
`As seen above, the only inputs used to calculate EID(A) are : (i) C1(A), the
`
`count of the “1s” in A; (ii) C0(A), the count of the “0s” in A; (iii) X, an arbitrary
`
`constant; and (iv) Y, an arbitrary constant. Ex. 2002, ¶¶ 22-24
`
`Critically, the counts of the “1s” and “0s” in a file are unaffected by
`
`reordering the file’s contents. Id., ¶¶ 25-26. Thus, any two files with the same
`
`contents, in a different order, will produce the exact same EID. Id. That will
`
`11
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`happen even though any two such files are clearly different files. Id.
`
`Thus, contrary to what Francisco says, its EID is not “selectively unique for
`
`a particular program.” Rather, it is trivial to find a large number of files that will
`
`produce the same EID as Program A, simply by reordering its contents. Id.
`
`Once Francisco has generated the EID from a “true” copy of a program, it
`
`adds it to the “EID library 14.” Ex. 1003, 2:45-50. Francisco calls these “true”
`
`EIDs the “first electronic identification indicia.” Id.
`
`Subsequently, when a user wishes to run a program—e.g., “Program S” —
`
`Francisco passes Program S to an “electronic indicia generator 32,” which is a
`
`“section of a general purpose digital computer.” Id., 2:10-28, 2:65-3:16. The
`
`“indicia generator” applies the above-described algorithm to Program S, generating
`
`an EID for Program S (“EID-Program S.”) Id., 2:65-3:16. Francisco compares
`
`EID-Program S with the EID stored in the library for the “base” version of
`
`Program S. Id. If the EIDs match, Francisco concludes that Program S is
`
`“authentic” (i.e., has not been modified). Id., 3:17-20. If they do not match,
`
`Francisco concludes that “the requested program differs in some respects from the
`
`base or true program.” Id., 3:8-16.
`
`If Francisco determines that the EID of Program S matches the “true” EID, it
`
`proceeds to the second step, which asks whether the user is authorized to run
`
`12
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`Program S. Id., 3:16-36. To do this, Francisco maintains an “authorized user
`
`profile library.” Id., 2:51-64. The user profile library stores a “correlative relation”
`
`between the “base” EID of a program and the “electronic identification of all
`
`authorized users thereof.” Id. As Petitioners admit, “Francisco does not specify the
`
`structure of the authorized user profile library.” Pet. at 36.
`
`However the “authorized user library” is structured, Francisco uses it as
`
`follows: First, Francisco introduces the “electronic identification of the user
`
`making the request” to a “second comparator 40.” Ex. 1003, 3:16-36. The “second
`
`comparator” is “the automatic logic unit of a general purpose digital computer.” Id.
`
`Francisco also introduces the EID generated from the user’s copy of the program to
`
`the comparator. Id. Finally, Francisco introduces the “authorized user profile” from
`
`the “authorized user library” to the comparator. Id.
`
`Once all of these values are introduced to the comparator, Francisco
`
`compares them. Id. If they “match,” then “the requested program [is] released for
`
`use by the particular identified user.” Id. If they do not match, then “the requested
`
`program will not be released for use.” Id.
`
`Francisco does not disclose, or render obvious, several elements recited in
`
`the challenged claims. Accordingly, Ground 1 must be denied.
`
`13
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`2. Grube
`
`Grube discloses a system for detecting unauthorized uses of programs in a
`
`computer network. Grube uses a “monitoring computer 115” to monitor the
`
`communications of “processing devices” in the network. Ex. 1004, 3:25-60. The
`
`monitoring computer maintains “database tables,” shown in Fig. 2. Id., 3:60-4:59.
`
`These tables identify each processing device by a “device ID code,” or identify
`
`groups of processing devices by a “group ID code.” Id. For each device ID or
`
`group ID, the table lists “Application Serial Nos.” of the programs the device or
`
`group is authorized to use. Id. The “serial number” is typically “the application
`
`manufacturer’s unique serial number.” Id., 5:64-6:3.
`
`When a computer sends a communication over the network, the monitoring
`
`computer scans it to see whether it contains content generated by any of the
`
`programs listed in the databases. Id., 5:45-6:33. If it does, the monitoring computer
`
`checks the databases to see whether the sending computer is authorized to use that
`
`program. Id. If so, the system does nothing. Id. If not, the monitoring computer
`
`“generate[s] a report (405) to indicate that at least one processing device … is
`
`using an unauthorized … software application.” Id.
`
`Petitioners rely on Grube solely in Ground 2, and solely for its disclosure of:
`
`(i) a “network[/plurality] of computers” (Pet. at 40-44); and (ii) “compared to a
`
`14
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`plurality of values” (Pet. at 44-49). Even if Grube does disclose these features
`
`(which Patent Owners do not concede), it does not cure the other deficiencies in
`
`Francisco, described in Section VI.A infra. Therefore, Ground 2 must be denied.
`
`III. REVIEW SHOULD NOT BE INSTITUTED BECAUSE THE
`PETITION IS TIME-BARRED
`
`The Northern District of California recently found that Petitioners are in
`
`privity with Amazon.com, Inc. and Amazon Web Services, Inc. (collectively,
`
`“Amazon”). But, more than seven years prior to the filing of the instant Petition,
`
`PersonalWeb filed a complaint against Amazon, alleging infringement of (inter
`
`alia) the ’310 Patent. The District Court’s findings are dispositive: The Petition is
`
`time-barred under 35 U.S.C. § 315(b).
`
`A.
`
`PersonalWeb Sued Amazon Years Ago
`
`PersonalWeb sued Amazon in PersonalWeb Technologies LLC v. Amazon
`
`Web Services LLC et al, 6-11-cv-00658 (E.D. Tex.) on 12/8/2011, alleging
`
`infringement of the ’310 Patent, based on Amazon’s Simple Storage Service
`
`(“Amazon S3”). Ex. 2008. The court dismissed the case on 6/9/2014. Ex. 2009.
`
`In January 2018, PersonalWeb sued a number of parties, based on their
`
`usage of Amazon S3. For instance, PersonalWeb sued Venmo/PayPal, alleging
`
`infringement of the ’310 Patent. PersonalWeb Technologies, LLC et al. v. Venmo,
`
`Inc., 3:18-cv-177 (N.D. Cal.). Ex. 2010.
`
`15
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`In February 2018, Amazon filed a declaratory judgment action against
`
`PersonalWeb, seeking to preclude infringement actions against Amazon’s S3
`
`customers. Amazon.com, Inc. et al. v. PersonalWeb Technologies, LLC et al., 5-18-
`
`cv-00767 (N.D. Cal.). Ex. 2011. Amazon’s Complaint stated that it “is an action to
`
`protect AWS customers” from “patent infringement based on their use of AWS’s
`
`Simple Storage Service.” Id. Amazon argued that the res judicata and Kessler
`
`doctrines barred PersonalWeb’s claims against Amazon’s customers. Id.
`
`Subsequently, PersonalWeb sued the eight Petitioners, alleging infringement
`
`based on their use of Amazon S3. Pet. at 2. Amazon is defending and indemnifying
`
`the Petitioners in court. Ex. 2014 (Amazon summary judgment motion in 5:18-md-
`
`02834) at 9 (Amazon stating that it “has expressly assumed the defense of the 60
`
`customers who have sought Amazon’s aid, and has not turned away any customer
`
`who has asked for it”); Ex. 2015 (Amazon interrogatory responses in 5:18-md-
`
`02834)2 at 3-4 (admitting that “Amazon is indemnifying” Petitioners “PayPal, Inc.”
`
`and “Dollar Shave Club, Inc.”); Ex. 2013 (stipulation in 5:18-md-02834, signed by
`
`Amazon on behalf of customers in customer cases) at 2-6 (noting that cases against
`
`
`2 This Exhibit was publically available via PACER. Thus, Amazon has waived any
`
`confidentiality claim it might have over it.
`
`16
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`Petitioners “Upwork Global, Inc.,” “Shopify, Inc. et al..,” “Strava, Inc.,” “Valassis
`
`Communications, Inc.,” and “RetailMeNot” are covered by the stipulation).
`
`Petitioners filed this Petition in May 2019. But, the original complaint
`
`against Amazon was served years ago. This Petition is time-barred because
`
`Amazon is in privity with Petitioners—as stated by the District Court. In re:
`
`PersonalWeb Technologies, LLC et al. Patent Litigation, 5:18-md-02834-BLF,
`
`Dkt. 394 (N.D. Cal. 3/13/2019) (Ex. 2012) (“Order”). This Petition also is time-
`
`barred because, as shown below, Amazon is a currently unnamed real party in
`
`interest (RPI) separately barred under § 315(b).
`
`B. Amazon Is an RPI and Is in Privity with Its Customers—
`Including Petitioners
`
`A petition is time-barred if “filed more than 1 year after the date on which
`
`the petitioner, the real party in interest, or a privy of the petitioner is served with a
`
`complaint alleging infringement.” 35 U.S.C. § 315(b). PersonalWeb served
`
`complaints alleging infringement by Amazon in 2011. Because Amazon is an RPI,
`
`and is in privity with Petitioners, institution should be denied.
`
`The Petition does not list Amazon as an RPI. However, there is no
`
`“presumption” that a petition names the correct RPIs. Worlds Inc. v. Bungie, Inc.,
`
`903 F.3d 1237, 1243 (Fed. Cir. 2018). A petitioner’s initial identification of RPIs is
`
`accepted only until it is disputed. Id. at 1243-44.
`
`17
`
`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`Ultimately, the petitioner bears the burden of proving that the petition
`
`properly names all RPIs. Id. at 1247. The Board has held that Worlds’ “logic
`
`requires placing the burden on IPR petitioners to demonstrate that its petitions are
`
`not time-barred under § 315(b) based on a complaint served on a privy more than a
`
`year before a petition is filed.” Ventex Co., Ltd. v. Columbia Sportswear North
`
`America, Inc., IPR2017-00651 (Paper 148) at 4-5 (precedential).
`
`“[T]he inclusion of the terms ‘real party in interest’ and ‘privy of the
`
`petitioner’ in § 315(b) makes clear that Congress planned for the provision to apply
`
`broadly—sweeping in not only what might be traditionally known as real parties in
`
`interest, but privies as well.” Applications in Internet Time, LLC v. RPX Corp., 897
`
`F.3d 1336, 1346 (Fed. Cir. 2018) (“AIT”). Thus, petitions are barred “where
`
`proxies or privies would benefit from an instituted IPR, even where the petitioning
`
`party might separately have its own interest in initiating an IPR.” Id. at 1347.
`
`Because the RPI and privity inquiries are separate, they are addre