throbber

`Paper No. 14
`Filed: September 5, 2019
`
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________________
`
`
`PAYPAL, INC.
`UPWORK GLOBAL INC.
`SHOPIFY, INC.
`SHOPIFY (USA), INC.
`STRAVA, INC.
`VALASSIS COMMUNICATIONS, INC.
`RETAILMENOT, INC.
`DOLLAR SHAVE CLUB, INC.
`Petitioners
`
`v.
`
`PERSONALWEB TECHNOLOGIES LLC
`LEVEL 3 COMMUNICATIONS, LLC
`Patent Owners
`
`____________________
`
`
`Case IPR2019-01111
`Patent No. 7,802,310
`
`____________________
`
`
`PATENT OWNERS’ PRELIMINARY RESPONSE
`
`
`
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`
`I.
`
`TABLE OF CONTENTS
`
`INTRODUCTION ........................................................................................... 1
`
`II.
`
`BACKGROUND ............................................................................................. 1
`
`A.
`
`B.
`
`C.
`
`D.
`
`The ’310 Patent ..................................................................................... 1
`
`The Challenged Claims ......................................................................... 6
`
`Prior Post-Grant Proceedings ................................................................ 7
`
`The Cited References .......................................................................... 10
`
`1.
`
`2.
`
`Francisco ................................................................................... 10
`
`Grube ......................................................................................... 14
`
`III. REVIEW SHOULD NOT BE INSTITUTED BECAUSE THE
`PETITION IS TIME-BARRED .................................................................... 15
`
`A.
`
`B.
`
`C.
`
`D.
`
`PersonalWeb Sued Amazon Years Ago .............................................. 15
`
`Amazon Is an RPI and Is in Privity with Its Customers—
`Including Petitioners............................................................................ 17
`
`The District Court Concluded that Amazon and Its Customers
`Are in Privity—Just As Amazon Argued ............................................ 18
`
`The District Court’s Privity Determination Comports with
`Binding Precedent and PTAB Practice ............................................... 22
`
`E.
`
`The District Court’s Analysis Confirms that Amazon Is an RPI ........ 23
`
`IV. THE BOARD SHOULD DISCRETIONARILY DENY
`INSTITUTION UNDER § 314 ..................................................................... 26
`
`V.
`
`CLAIM CONSTRUCTION .......................................................................... 29
`
`A.
`
`B.
`
`C.
`
`Legal Standard ..................................................................................... 29
`
`Response to Petitioners’ Proposed Constructions ............................... 29
`
`Patent Owners’ Proposed Constructions ............................................. 30
`
`1.
`
`“message digest function or a hash function” (claims 20,
`69) ............................................................................................. 30
`
`a.
`
`b.
`
`Patent Owners’ Construction Is Correct ......................... 31
`
`Petitioners’ Implicit Construction Is Incorrect ............... 36
`
`i
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`VI. REVIEW SHOULD NOT BE INSTITUTED ON GROUND 1 ................... 37
`
`A.
`
`Petitioners Have Not Shown that All Elements of Claims 20
`and 69 Are Present in, or Obvious Over, Francisco ............................ 38
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`“Message Digest Function or a Hash Function.” ...................... 38
`
`Allowing Access Based on a “Content-Dependent Name”
`Computed from a “Message Digest Function or Hash
`Function” ................................................................................... 44
`
`“Wherein Two Identical Data Items Will Have the Same
`Content-Dependent Name” ....................................................... 45
`
`“Controlling Distribution of Content From a First
`Computer to at Least One Other Computer” (Claim 20) .......... 46
`
`“Permitting the Content to be Provided to or Accessed by
`the at Least One Other Computer” (Claim 20) ......................... 48
`
`Limitation 69(b)(i) (Claim 69) .................................................. 49
`
`Limitation 69(b)(ii) (Claim 69) ................................................. 53
`
`B.
`
`Petitioners Have Not Established a Logical Reason for
`Modifying Francisco, or a Reasonable Expectation of Success
`in Doing So .......................................................................................... 54
`
`VII. REVIEW SHOULD NOT BE INSTITUTED ON GROUND 2 ................... 57
`
`A.
`
`B.
`
`The Alleged Combination of Grube and Francisco Does Not
`Disclose All Elements of Any Challenged Claim ............................... 57
`
`Petitioners Have Not Established a Logical Reason for
`Combining Francisco and Grube, or a Reasonable Expectation
`of Success in Doing So ........................................................................ 61
`
`VIII. CONCLUSION .............................................................................................. 64
`
`
`
`
`
`
`
`
`ii
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`LISTING OF EXHIBITS
`
`EX. #
`
`Exhibit Description
`
`2001 Declaration of Lawrence M. Hadley in Support of Patent Owner’s
`
`Motion for Pro Hac Vice Admission
`
`2002 Declaration of Samuel H. Russ, Ph.D.
`
`2003 Request for Ex Parte Reexamination in Rexam No. 90/014,368
`
`2004 U.S. Pat. No. 7,802,310
`
`2005 Markman decision from In re PersonalWeb Technologies, LLC et al.
`
`Patent Litigation, 18-md-02834, Dkt. No. 485 (N.D. Cal. 2019)
`
`2006 10/26/2017 Samuel Russ Declaration, submitted by Patent Owners in
`
`Reexamination Control No. 90/013,487 of U.S. Pat. No. 6,415,280
`
`2007
`
`July 22, 2019 Appeal Brief in Reexamination Control No. 90/013,764
`
`2008 Complaint from PersonalWeb Technologies LLC v. Amazon Web
`
`Services LLC et al, 6-11-cv-00658 (E.D. Tex.)
`
`2009 Order of Dismissal from PersonalWeb Technologies LLC v. Amazon
`
`Web Services LLC et al, 6-11-cv-00658 (E.D. Tex.)
`
`2010 Complaint from PersonalWeb Technologies, LLC et al. v. Venmo, Inc.,
`
`3:18-cv-177 (N.D. Cal.)
`
`2011 Complaint from Amazon.com, Inc. et al. v. PersonalWeb Technologies,
`
`LLC et al., 5-18-cv-00767 (N.D. Cal.)
`
`2012 Order Granting in Part and Denying in Part Amazon’s Motion for
`
`Summary Judgment from In re: PersonalWeb Technologies, LLC et al.
`
`Patent Litigation, 5:18-md-02834-BLF, Dkt. 394 (N.D. Cal. 3/13/2019)
`
`2013 Stipulation Re Remaining Customer Cases from In re: PersonalWeb
`
`Technologies, LLC et al., Patent Litigation, Case Nos. 5:18-md-02834-
`
`BLF and 5:18-cv-00767-BLF, Dkt. 417 (N.D. Cal. April 26, 2019)
`
`iii
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`2014 Amazon’s Motion for Summary Judgment from In re: PersonalWeb
`
`Technologies, LLC et al., Patent Litigation, Case Nos. 5:18-md-02834-
`
`BLF and 5:18-cv-00767-BLF, Dkt. 315, (N.D. Cal. November 28, 2018)
`
`2015 Public excerpts from Amazon’s Interrogatory Responses from In re:
`
`PersonalWeb Technologies, LLC et al., Patent Litigation, Case Nos.
`
`5:18-md-02834-BLF and 5:18-cv-00767-BLF, (N.D. Cal. November 1,
`
`2018)
`
`2016 Certificate of Service for Dollar Shave Club, Inc.
`
`
`
`
`
`
`
`
`
`iv
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`I.
`
`INTRODUCTION
`
`U.S. Patent No. 7,802,310 (“the ’310 Patent”) belongs to a patent family that
`
`revolutionized the field of computer file storage, by pioneering the concept of
`
`content-based “True Names.” Petitioners assert that claims 20 and 69 of the ’310
`
`Patent are obvious over Francisco. Pet. at 21-46. Petitioners further assert that
`
`these claims are obvious over the combination of Francisco and Grube. Id. at 40-
`
`49.
`
`The Petition is time-barred under 35 U.S.C. § 315(b). The Board should also
`
`discretionarily deny review under 35 U.S.C. § 314.
`
`The Petition should also be denied on the merits. Seven separate elements of
`
`the claims are neither disclosed in, nor obvious over, Francisco or Grube, nor any
`
`alleged combination thereof. Moreover, Petitioners have failed to prove that a
`
`person of ordinary skill in the art (“POSITA”) would have had a logical rationale
`
`to modify Francisco, or to combine it with Grube in the way alleged.
`
`Petitioners have not shown a reasonable likelihood of success on either
`
`ground of the Petition. Thus, the Petition must be denied.
`
`II. BACKGROUND
`
`A. The ’310 Patent
`
`The ’310 Patent is part of the True Name family of patents. These patents
`
`1
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`teach a novel way of identifying and locating data in any computer system. On a
`
`single computer, or within a small network, the task is relatively easy: Simply
`
`name the data or file, and identify it by that name and its location. Early operating
`
`systems facilitated this approach with standardized conventions for naming files,
`
`creating folders, and designating storage devices, which allowed the system to
`
`locate data. Ex. 1001, 1:50-2:5. A familiar example might look like this:
`
`c:\mydocuments\Budget_Forecast_1993.doc.
`
`But as networks grew, particularly with the development of the Internet,
`
`conventional naming and locating systems could not keep pace. As systems
`
`evolved, files could be divided and stored across different devices in dispersed
`
`locations. While offering benefits, this also created a problem: Different users
`
`could give identical names to different files or parts of files—or unknowingly give
`
`different names to identical files. Existing systems had no means to ensure that
`
`identical names referred to the same data, and conversely, that different names
`
`referred to different data. Lachman and Farber, the inventors of the True Name
`
`patents, realized that, if these limitations were not surmounted, it would become
`
`infeasible to accurately identify, locate, retrieve, de-duplicate, replicate, and
`
`synchronize data within advanced systems. Ex. 1001, 2:26-3:29.
`
`Lachman and Farber found a solution: They developed a new system that
`
`2
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`replaced conventional naming with “substantially unique,” content-based
`
`identifiers. Id., 3:30-48. If the item’s content were unique, its identifier would be
`
`unique. This approach could assign substantially-unique identifiers to an endless
`
`variety of “data items”—“the contents of a file, a portion of a file, a page in
`
`memory, an object in an object-oriented program, a digital message, a digital
`
`scanned image, a part of a video or audio signal, or any other entity which can be
`
`represented by a sequence of bits.” Id., 2:16-25. Applied system-wide, this
`
`approach, with pinpoint precision, would permit any data item to be stored,
`
`located, managed, synchronized, and accessed using its content-based identifier.
`
`But how could a system generate a “substantially-unique identifier” for any
`
`size data item, system-wide? For this, Lachman and Farber turned to cryptography.
`
`Cryptographic hash functions, including MD4, MD5, and SHA, had been used in
`
`computer systems to verify the integrity of retrieved data—a so-called
`
`“checksum.” Id., 12:21-51. Lachman and Farber recognized that these same hash
`
`functions could be devoted to a vital new purpose: If a cryptographic hash function
`
`were applied to a sequence of bits (a “data item”), it would produce a unique value
`
`that: (1) is “virtually guarantee[d]” to produce a different value if the data item is
`
`changed; (2) is “computationally difficult” to reproduce with a different sequence
`
`of bits; and (3) cannot be used to recreate the original sequence of bits. Id., 12:21-
`
`3
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`51. These cryptographic hash functions can assign any unique sequence of bits—
`
`based on content alone—a substantially-unique identifier. Lachman and Farber
`
`estimated that the odds of these hash functions producing the same identifier for
`
`two different sequences of bits (i.e., the “probability of collision”) was at least 1 in
`
`229. Id., 12:58-13:8. With such a low probability of collision, Lachman and Farber
`
`dubbed their content-based identifier a “True Name.” Id., 12:21-51.
`
`With this insight, Lachman and Farber crafted novel ways for using True
`
`Names to manage the universe of data in a network, no matter its complexity. They
`
`conceived various data structures, including a “Local Directory Extension Table”
`
`(LDE) and “True File Registry” (TFR), for tracking and managing information
`
`about every data item, and associating each True Name with any user-provided
`
`name, location, dependency, and migration information:
`
`
`
`4
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`Id., Fig. 1(b); 8:27-43. These data structures permitted a key-map organization,
`
`allowing rapid determinations of whether a particular data item exists in a system
`
`and, if so, its location everywhere on that system. This functionality was simply
`
`not possible using the conventional art.
`
`The ’310 Patent envisions and allows for all data operations within the
`
`system to be managed using the True Name and associated information. This
`
`includes assimilating, identifying, and accessing all data items in the system by
`
`True Name, regardless of their actual storage location and user-designated name.
`
`In one embodiment, the ’310 Patent uses True Names to “track” data items
`
`“for licensing purposes.” Id., 31:3-32. In this embodiment, the True Name is used
`
`to “ensure[] that licensed files are not used by unauthorized parties.” Id. The ’310
`
`Patent discloses two different types of “licensing” functions: (i) “active”
`
`monitoring; and (ii) “passive” monitoring. Id. In “active” monitoring, the ’310
`
`Patent uses the True Name to “refus[e] to provide access to a file without
`
`authorization.” Id. The challenged claims are directed to “active” monitoring.
`
`To perform “active” monitoring, the ’310 Patent creates a “license table
`
`136.” Id., 11:33-45. The table includes a number of “record[s] 150.” Id. Each
`
`record “records a relationship between a licensable data item and the user[s]
`
`licensed to have access to it.” Id. An example is shown in Fig. 9, below:
`
`5
`
`

`

`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`In each record, the “True Name” entry lists the True Name of “a data item
`
`subject to license validation.” Id., 11:40-45. For instance, if the data item is a
`
`“software product” (e.g., Microsoft Word), the license table could list the True
`
`Name of the “main executable image” (WINWORD.exe) of the program. Id.,
`
`31:17-23. Meanwhile, the “licensee” entry lists the “identity of [each] user
`
`authorized to have access to this [data item].” Id., 11:40-45.
`
`In operation, a user may try to access a file on the network. Id., 31:3-32.
`
`When that happens, the system checks the True Name of the file, and looks it up in
`
`the license table 136. Id., 11:33-45. If the True Name appears in the license table,
`
`the file is subject to licensing restrictions. Id. In that case, the system looks up the
`
`record for the True Name in the license table, then looks up the “licensees” for that
`
`True Name. Id. If the user is one of the “licensees,” the system allows the user to
`
`access the file. Id., 31:4-31. If not, the system disallows access. Id.
`
`B.
`
`The Challenged Claims
`
`Both challenged claims are independent claims. Claim 20 recites a
`
`“computer-implemented method operable in a system which includes a plurality of
`
`computers.” Claim 69 recites a “system operable in a network of computers.”
`
`6
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`Both claims recite using a “content-dependent name” to control access to a
`
`“data item.” In both claims, the content-dependent name is computed by applying a
`
`“message digest function or a hash function” to the data item. In both claims, a
`
`“first computer[/device]” receives a “request” from a “second[/other]
`
`computer[/device].” The “request” includes the “content-dependent name” of the
`
`data item. In both claims, the first computer/device uses the content-dependent
`
`name to determine whether the second computer/device is authorized to access the
`
`data item. If the first computer/device determines that the second computer/device
`
`is authorized, it permits it to access the data item; otherwise, it does not.
`
`C.
`
`Prior Post-Grant Proceedings
`
`The ’310 Patent has been subject to extensive post-grant proceedings,
`
`including three separate IPRs, a reexamination, and two Federal Circuit appeals.
`
`First, on 9/18/2013, Apple filed a Petition for Inter Partes Review of claims
`
`24, 32, 70, 81, 82 and 86. IPR2013-00596, Paper 1. Apple’s Petition asserted that
`
`the challenged claims were anticipated by and/or obvious over five references:
`
`Browne, Stefik, Woodhill, Langer, and Farber. Id. at 11. Apple’s Petition was
`
`instituted on 3/26/2014, on one ground: obviousness over Woodhill and Stefik.
`
`IPR2013-00596, Paper 9 at 13-21. On 3/25/2015, the Board issued a Final Written
`
`Decision, finding all challenged claims obvious over Woodhill and Stefik.
`
`7
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`IPR2013-00596, Paper 33. Patent Owners appealed. Id., Paper 36.
`
`On 2/14/2017, the Federal Circuit issued its decision in the Appeal.
`
`PersonalWeb Techs., LLC. v. Apple, Inc., 848 F.3d 987 (Fed. Cir. 2017)
`
`(“PersonalWeb I”). The Federal Circuit vacated the obviousness determination,
`
`because the Board “did not adequately support its findings.” Id. at 989. The
`
`Federal Circuit remanded for further proceedings. Id. at 994.
`
`On 2/7/2018, the Board issued its decision after the remand. IPR2013-
`
`00596, Paper 44. Again, the Board found all challenged claims obvious over
`
`Woodhill and Stefik. Id. at 12-28. Again, Patent Owners appealed. Id., Paper 45.
`
`On 3/8/2019, the Federal Circuit issued its decision in the second appeal.
`
`PersonalWeb Techs., LLC v. Apple, Inc., 917 F.3d 1376 (Fed. Cir. 2019)
`
`(“PersonalWeb II”). Once again, the Federal Circuit found for Patent Owners. Id.
`
`The Federal Circuit found that neither of the cited references disclosed the claimed
`
`feature of “causing the content-dependent name of the particular data item to be
`
`compared to a plurality of values.” Id. at 1381-83. Since that element, or an
`
`analogous element, was present in all challenged claims, there was no prima facie
`
`case of obviousness against any claim. Id. Therefore, the Federal Circuit reversed
`
`the Board’s decision, concluding the IPR in Patent Owners’ favor. Id.
`
`Second, while IPR2013-00596 was pending, another Petitioner—
`
`8
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`Rackspace—filed a petition for Inter Partes Review of claims 1, 2, 5-8, 10-12, 14,
`
`16-19, 24, 29, 32, 70, 81, 82 and 86. IPR2014-00062, Paper 1 at 4. The Rackspace
`
`Petition asserted obviousness over five references: Kinetech, Brunk, Francisco1,
`
`Woodhill, and Langer. Id. The Petition was instituted on 4/15/2014. IPR2014-
`
`00062, Paper 9.
`
`After institution, Patent Owners and Rackspace executed a settlement
`
`agreement, settling IPR2014-00062 and several other IPRs. IPR2014-00062, Paper
`
`29 at 1. Pursuant to that agreement, on 10/16/2014, the parties filed a Joint Motion
`
`to Terminate IPR2014-00062. Id. That Motion was granted, and IPR2014-00062
`
`was terminated, on 10/28/2014. IPR2014-00062, Paper 32.
`
`Third, while the other two IPRs were pending, yet another Petitioner—
`
`Google—filed a Petition for Inter Partes Review of the ’310 Patent. IPR2014-
`
`00978, Paper 1. Google asked the Board to initiate review on the “identical
`
`grounds as those asserted by petitioners Rackspace … in IPR2014-00062.” Id. at 1.
`
`On 10/30/2014, the Board denied institution of Google’s Petition, because it was
`
`barred by 35 U.S.C. § 315(b), and Google did not timely file a motion to join its
`
`Petition with IPR2014-00062. IPR2014-00978, Paper 11.
`
`
`1 This is the same “Francisco” reference asserted in the present Petition.
`
`9
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`Thus, the ’310 patent has already been subjected to three IPRs.
`
`Moreover, on 8/20/2019, Apple filed a request for Ex Parte Reexamination
`
`of the ’310 patent. Ex. 2003. The Request challenges claims 70, 81, 82 and 86. Id.
`
`at 1. In the Request, Apple argues that the challenged claims are obvious over
`
`Browne in view of Langer. Id. at 23-48. The Examiner has not yet decided whether
`
`to grant Apple’s Request.
`
`D. The Cited References
`
`1.
`
`Francisco
`
`Francisco describes a “method of maintaining software program integrity
`
`and security.” Ex. 1003, Abstract. Francisco discloses two different techniques to
`
`do so: (i) an “authentication” technique, which uses “electronic identification
`
`indicia” (“EID”) to determine whether a copy of a program “differs in some
`
`respects from the base or true program;” (id., 3:5-16); and (ii) an “authorization”
`
`technique, which determines whether a user is authorized to use the program, and
`
`if so, allows the user to access the program. Id., 3:20-36. Francisco’s entire written
`
`disclosure takes up less than three columns. Id., 1:1-3:35.
`
`In its “authentication” technique, Francisco generates EIDs from the
`
`contents of a “true” or “base” program. Id., 2:11-50. Francisco discloses one, and
`
`only one, algorithm to generate EIDs:
`
`10
`
`

`

`
`
`
`IPR2019-01111
`Patent No. 7,802,310
`
`[T]he total number of ones and zeroes in the binary
`
`coded input Program A could be totalled; the total
`
`number of “ones” multiplied by an arbitrary number, e.g.
`
`22; the product of such multiplication could then be
`
`divided by the number of zeros in the binary coded
`
`program; and the remainder thereof be modified by
`
`addition to (or subtraction therefrom) of an arbitrary
`
`number, i.e. 7.
`
`Id., 2:29-45. According to Francisco, “[t]he resulting electronic numerical indicia
`
`would then, in all probability, be selectively unique for the particular program.” Id.
`
`Francisco is mistaken. Francisco’s algorithm can be summarized as follows:
`
`1. Count all 1s in Program A; store result as C1(A).
`
`2. Count all 0s in Program A; store result as C0(A).
`
`3. Compute EID(A) = rem((X*C1(A))/C0(A)) ± Y
`
`a. where, e.g., X = 22, Y = 7, “rem()” = remainder function.
`
`As seen above, the only inputs used to calculate EID(A) are : (i) C1(A), the
`
`count of the “1s” in A; (ii) C0(A), the count of the “0s” in A; (iii) X, an arbitrary
`
`constant; and (iv) Y, an arbitrary constant. Ex. 2002, ¶¶ 22-24
`
`Critically, the counts of the “1s” and “0s” in a file are unaffected by
`
`reordering the file’s contents. Id., ¶¶ 25-26. Thus, any two files with the same
`
`contents, in a different order, will produce the exact same EID. Id. That will
`
`11
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`happen even though any two such files are clearly different files. Id.
`
`Thus, contrary to what Francisco says, its EID is not “selectively unique for
`
`a particular program.” Rather, it is trivial to find a large number of files that will
`
`produce the same EID as Program A, simply by reordering its contents. Id.
`
`Once Francisco has generated the EID from a “true” copy of a program, it
`
`adds it to the “EID library 14.” Ex. 1003, 2:45-50. Francisco calls these “true”
`
`EIDs the “first electronic identification indicia.” Id.
`
`Subsequently, when a user wishes to run a program—e.g., “Program S” —
`
`Francisco passes Program S to an “electronic indicia generator 32,” which is a
`
`“section of a general purpose digital computer.” Id., 2:10-28, 2:65-3:16. The
`
`“indicia generator” applies the above-described algorithm to Program S, generating
`
`an EID for Program S (“EID-Program S.”) Id., 2:65-3:16. Francisco compares
`
`EID-Program S with the EID stored in the library for the “base” version of
`
`Program S. Id. If the EIDs match, Francisco concludes that Program S is
`
`“authentic” (i.e., has not been modified). Id., 3:17-20. If they do not match,
`
`Francisco concludes that “the requested program differs in some respects from the
`
`base or true program.” Id., 3:8-16.
`
`If Francisco determines that the EID of Program S matches the “true” EID, it
`
`proceeds to the second step, which asks whether the user is authorized to run
`
`12
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`Program S. Id., 3:16-36. To do this, Francisco maintains an “authorized user
`
`profile library.” Id., 2:51-64. The user profile library stores a “correlative relation”
`
`between the “base” EID of a program and the “electronic identification of all
`
`authorized users thereof.” Id. As Petitioners admit, “Francisco does not specify the
`
`structure of the authorized user profile library.” Pet. at 36.
`
`However the “authorized user library” is structured, Francisco uses it as
`
`follows: First, Francisco introduces the “electronic identification of the user
`
`making the request” to a “second comparator 40.” Ex. 1003, 3:16-36. The “second
`
`comparator” is “the automatic logic unit of a general purpose digital computer.” Id.
`
`Francisco also introduces the EID generated from the user’s copy of the program to
`
`the comparator. Id. Finally, Francisco introduces the “authorized user profile” from
`
`the “authorized user library” to the comparator. Id.
`
`Once all of these values are introduced to the comparator, Francisco
`
`compares them. Id. If they “match,” then “the requested program [is] released for
`
`use by the particular identified user.” Id. If they do not match, then “the requested
`
`program will not be released for use.” Id.
`
`Francisco does not disclose, or render obvious, several elements recited in
`
`the challenged claims. Accordingly, Ground 1 must be denied.
`
`13
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`2. Grube
`
`Grube discloses a system for detecting unauthorized uses of programs in a
`
`computer network. Grube uses a “monitoring computer 115” to monitor the
`
`communications of “processing devices” in the network. Ex. 1004, 3:25-60. The
`
`monitoring computer maintains “database tables,” shown in Fig. 2. Id., 3:60-4:59.
`
`These tables identify each processing device by a “device ID code,” or identify
`
`groups of processing devices by a “group ID code.” Id. For each device ID or
`
`group ID, the table lists “Application Serial Nos.” of the programs the device or
`
`group is authorized to use. Id. The “serial number” is typically “the application
`
`manufacturer’s unique serial number.” Id., 5:64-6:3.
`
`When a computer sends a communication over the network, the monitoring
`
`computer scans it to see whether it contains content generated by any of the
`
`programs listed in the databases. Id., 5:45-6:33. If it does, the monitoring computer
`
`checks the databases to see whether the sending computer is authorized to use that
`
`program. Id. If so, the system does nothing. Id. If not, the monitoring computer
`
`“generate[s] a report (405) to indicate that at least one processing device … is
`
`using an unauthorized … software application.” Id.
`
`Petitioners rely on Grube solely in Ground 2, and solely for its disclosure of:
`
`(i) a “network[/plurality] of computers” (Pet. at 40-44); and (ii) “compared to a
`
`14
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`plurality of values” (Pet. at 44-49). Even if Grube does disclose these features
`
`(which Patent Owners do not concede), it does not cure the other deficiencies in
`
`Francisco, described in Section VI.A infra. Therefore, Ground 2 must be denied.
`
`III. REVIEW SHOULD NOT BE INSTITUTED BECAUSE THE
`PETITION IS TIME-BARRED
`
`The Northern District of California recently found that Petitioners are in
`
`privity with Amazon.com, Inc. and Amazon Web Services, Inc. (collectively,
`
`“Amazon”). But, more than seven years prior to the filing of the instant Petition,
`
`PersonalWeb filed a complaint against Amazon, alleging infringement of (inter
`
`alia) the ’310 Patent. The District Court’s findings are dispositive: The Petition is
`
`time-barred under 35 U.S.C. § 315(b).
`
`A.
`
`PersonalWeb Sued Amazon Years Ago
`
`PersonalWeb sued Amazon in PersonalWeb Technologies LLC v. Amazon
`
`Web Services LLC et al, 6-11-cv-00658 (E.D. Tex.) on 12/8/2011, alleging
`
`infringement of the ’310 Patent, based on Amazon’s Simple Storage Service
`
`(“Amazon S3”). Ex. 2008. The court dismissed the case on 6/9/2014. Ex. 2009.
`
`In January 2018, PersonalWeb sued a number of parties, based on their
`
`usage of Amazon S3. For instance, PersonalWeb sued Venmo/PayPal, alleging
`
`infringement of the ’310 Patent. PersonalWeb Technologies, LLC et al. v. Venmo,
`
`Inc., 3:18-cv-177 (N.D. Cal.). Ex. 2010.
`
`15
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`In February 2018, Amazon filed a declaratory judgment action against
`
`PersonalWeb, seeking to preclude infringement actions against Amazon’s S3
`
`customers. Amazon.com, Inc. et al. v. PersonalWeb Technologies, LLC et al., 5-18-
`
`cv-00767 (N.D. Cal.). Ex. 2011. Amazon’s Complaint stated that it “is an action to
`
`protect AWS customers” from “patent infringement based on their use of AWS’s
`
`Simple Storage Service.” Id. Amazon argued that the res judicata and Kessler
`
`doctrines barred PersonalWeb’s claims against Amazon’s customers. Id.
`
`Subsequently, PersonalWeb sued the eight Petitioners, alleging infringement
`
`based on their use of Amazon S3. Pet. at 2. Amazon is defending and indemnifying
`
`the Petitioners in court. Ex. 2014 (Amazon summary judgment motion in 5:18-md-
`
`02834) at 9 (Amazon stating that it “has expressly assumed the defense of the 60
`
`customers who have sought Amazon’s aid, and has not turned away any customer
`
`who has asked for it”); Ex. 2015 (Amazon interrogatory responses in 5:18-md-
`
`02834)2 at 3-4 (admitting that “Amazon is indemnifying” Petitioners “PayPal, Inc.”
`
`and “Dollar Shave Club, Inc.”); Ex. 2013 (stipulation in 5:18-md-02834, signed by
`
`Amazon on behalf of customers in customer cases) at 2-6 (noting that cases against
`
`
`2 This Exhibit was publically available via PACER. Thus, Amazon has waived any
`
`confidentiality claim it might have over it.
`
`16
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`Petitioners “Upwork Global, Inc.,” “Shopify, Inc. et al..,” “Strava, Inc.,” “Valassis
`
`Communications, Inc.,” and “RetailMeNot” are covered by the stipulation).
`
`Petitioners filed this Petition in May 2019. But, the original complaint
`
`against Amazon was served years ago. This Petition is time-barred because
`
`Amazon is in privity with Petitioners—as stated by the District Court. In re:
`
`PersonalWeb Technologies, LLC et al. Patent Litigation, 5:18-md-02834-BLF,
`
`Dkt. 394 (N.D. Cal. 3/13/2019) (Ex. 2012) (“Order”). This Petition also is time-
`
`barred because, as shown below, Amazon is a currently unnamed real party in
`
`interest (RPI) separately barred under § 315(b).
`
`B. Amazon Is an RPI and Is in Privity with Its Customers—
`Including Petitioners
`
`A petition is time-barred if “filed more than 1 year after the date on which
`
`the petitioner, the real party in interest, or a privy of the petitioner is served with a
`
`complaint alleging infringement.” 35 U.S.C. § 315(b). PersonalWeb served
`
`complaints alleging infringement by Amazon in 2011. Because Amazon is an RPI,
`
`and is in privity with Petitioners, institution should be denied.
`
`The Petition does not list Amazon as an RPI. However, there is no
`
`“presumption” that a petition names the correct RPIs. Worlds Inc. v. Bungie, Inc.,
`
`903 F.3d 1237, 1243 (Fed. Cir. 2018). A petitioner’s initial identification of RPIs is
`
`accepted only until it is disputed. Id. at 1243-44.
`
`17
`
`

`

`
`IPR2019-01111
`Patent No. 7,802,310
`
`
`
`Ultimately, the petitioner bears the burden of proving that the petition
`
`properly names all RPIs. Id. at 1247. The Board has held that Worlds’ “logic
`
`requires placing the burden on IPR petitioners to demonstrate that its petitions are
`
`not time-barred under § 315(b) based on a complaint served on a privy more than a
`
`year before a petition is filed.” Ventex Co., Ltd. v. Columbia Sportswear North
`
`America, Inc., IPR2017-00651 (Paper 148) at 4-5 (precedential).
`
`“[T]he inclusion of the terms ‘real party in interest’ and ‘privy of the
`
`petitioner’ in § 315(b) makes clear that Congress planned for the provision to apply
`
`broadly—sweeping in not only what might be traditionally known as real parties in
`
`interest, but privies as well.” Applications in Internet Time, LLC v. RPX Corp., 897
`
`F.3d 1336, 1346 (Fed. Cir. 2018) (“AIT”). Thus, petitions are barred “where
`
`proxies or privies would benefit from an instituted IPR, even where the petitioning
`
`party might separately have its own interest in initiating an IPR.” Id. at 1347.
`
`Because the RPI and privity inquiries are separate, they are addre

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket