throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`____________
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________
`
`
`
`UNIFIED PATENTS INC.,
`
`Petitioner,
`
`v.
`
`SYNKLOUD TECHNOLOGIES, LLC,
`
`Patent Owner.
`
`____________
`
`
`
`Case IPR2019-01655
`
`U.S. Patent No. 9,098,526
`
`____________
`
`
`
`SECOND DECLARATION OF ZAYDOON (“JAY”) JAWADI
`IN SUPPORT OF PATENT OWNER’S RESPONSE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR 2019-01655
`Exhibit 2007
`
`Unified Patents v.
`SynKloud Technologies, LLC
`
`
`
`
`
`
`
`
`
`
`
`

`

`TABLE OF CONTENTS
`
`
`I. BACKGROUND AND QUALIFICATIONS ..................................................... 1
`
`A. Supplement to First Declaration ......................................................................................... 6
`
`II. MATERIALS REVIEWED ................................................................................ 7
`
`A. Supplemental Materials Reviewed ..................................................................................... 7
`
`III. LEGAL UNDERSTANDING ............................................................................. 8
`
`IV. CLAIM CONSTRUCTION ................................................................................ 8
`
`V. OPINIONS ........................................................................................................... 9
`
`A.
`
`Institution Decision ............................................................................................................. 9
`
`B. Ground 1: Claims 1-3, 5-11, and 13-20 Are Not Obvious in View of Prust (Ex-1006) and
`Major (Ex-1007) ......................................................................................................................... 9
`
`a. Claims 1 and 11: Copy-and-Paste (or Typing) with Web Browser Cache Does Not
`Disclose Utilizing Download Information Stored in Cache ................................................... 9
`
`i. Purpose of the ’526 Cache .......................................................................................... 13
`
`ii.
`
`No Reason to Add Cache to Prust........................................................................... 14
`
`iii. The ’526 Patent Does Not Teach Copy-and-Paste ................................................. 19
`
`iv. Major Does Not Teach Copy-and-Paste ................................................................. 19
`
`v.
`
`Prust Does Not Teach Copy-and-Paste ................................................................... 19
`
`vi. Major and Prust, Alone and/or in Combination, Do Not Teach Copy-and-Paste ... 21
`
`vii. The Steps of Using Copy-and-Paste from Web Browser Cache in Wireless Device
`Are Not Conventional and Not Obvious ........................................................................... 22
`
`viii.
`
`The User (Not the Code) Performs the Copy-and-Paste ..................................... 25
`
`ix. URLs of Data Objects Are Not Displayed by the Browser and Cannot be Copied
`Directly Using Copy-and-Paste ........................................................................................ 29
`
`x.
`
`The Web Page Containing the URL Must Be Cacheable ....................................... 33
`
`xi. Not All Web Pages Are Cacheable or Cached........................................................ 33
`
`xii. A User Cannot Tell if a Web Page Displayed by the Web Browser Is from Cache
`or Stored in Cache ............................................................................................................. 36
`
`Prust Does Not Disclose Where the URL for the Purported Out-of-Band
`xiii.
`Download Is Obtained from.............................................................................................. 38
`
`xiv. Prust Does Not Disclose Cache Storage ................................................................. 39
`
`xv. Prust Does Not Disclose Out-Of-Band Download through Browser or through
`Operating System .............................................................................................................. 39
`
`
`
`i
`
`

`

`xvi. Typing Is Impractical .............................................................................................. 42
`
`Petitioner’s Theory Regarding Utilizing Download Information Stored in Cache
`xvii.
`is Far Fetched .................................................................................................................... 43
`
`xviii.
`
`Purpose of Major’s Cache Does Not Match the ’526 Cache .............................. 45
`
`xix. Ground 1 – Utilizing Download Information Stored in Cache: Claims 1-3, 5-11,
`and 13-20 Are Not Obvious in View of Prust (Ex 1006) and Major (Ex 1007) ............... 46
`
`b.
`
`Claims 1 and 11: Prust and Major Do Not Disclose Predefined Capacity ................. 47
`
`i. Predefined Capacity in the ’526 Patent ...................................................................... 47
`
`ii.
`
`iii.
`
`iv.
`
`v.
`
`Prust’s RAID Does Not Disclose ’526 Predefined Capacity .................................. 50
`
`Prust’s Billing Address Does Not Disclose ’526 Predefined Capacity .................. 56
`
`Prust Does Not Disclose Capacity .......................................................................... 57
`
`Prust Does Not Disclose Predefined Capacity ........................................................ 58
`
`vi. Major Does Not Disclose Predefined Capacity ...................................................... 61
`
`vii. The Combination of Prust and Major Does Not Disclose Predefined Capacity ..... 61
`
`Ground 1 – Defined Capacity: Claims 1-3, 5-11, and 13-20 Are Not Obvious in
`viii.
`View of Prust (Ex 1006) and Major (Ex 1007)................................................................. 61
`
`c. Claims 1 and 11: Prust’s Email Does Not Disclose Coupling ....................................... 62
`
`d.
`
`Claims 1 and 11: Prust’s Email Does Not Disclose Retrieving ................................. 64
`
`e. Claims 1 and 11: Prust’s Email Does Not Disclose Storing and Retrieving.................. 66
`
`f. Dependent Claims 3 and 20 ........................................................................................... 67
`
`g.
`
`A POSITA Would Not Have Been Motivated to Combine Prust with Major ........... 70
`
`i. No Reason to Add Major’s Cache to Prust................................................................. 72
`
`ii. Major’s Teachings Discourage Wireless Device Access to External Storage ........ 72
`
`iii. Major Stores Data Objects in Cache, Negating the Need for External Storage ..... 75
`
`iv.
`
`v.
`
`Prust Discourages Using Only One Mode to Access Remote Storage ................... 75
`
`Prust Does Not Disclose Out-Of-Band Download through Browser ..................... 76
`
`C. Ground 2: Claims 1-20 Are Not Obvious in View of Chaganti (Ex-1008) and Major
`(Ex-1007) .................................................................................................................................. 77
`
`a. Claims 1 and 11: Chaganti’s Drag-and-Drop (or Copy-and-Paste) with Major’s Web
`Browser Cache Does Not Disclose Utilizing Download Information Stored in Cache ....... 77
`
`i. Chaganti’s User Does Not Send a Hyperlink to the Server ........................................ 77
`
`ii.
`
`Chaganti’s Digital Item Is Not a Hyperlink (Download Information) ................... 84
`
`iii. Chaganti’s Dragging and Dropping Does Not Disclose Sending Hyperlinks ........ 85
`
`iv. Chaganti’s Server Does Not Utilize Download Information .................................. 90
`
`v.
`
`Chaganti’s FIG. 6 Does Not Disclose Download Information ............................... 93
`
`
`
`ii
`
`

`

`Petitioner’s Citations Do Not Show Sending a Hyperlink to the Server and Do Not
`vi.
`Show the Server Utilizing a Hyperlink ............................................................................. 97
`
`vii. The Steps of Using Copy-and-Paste from Web Browser Cache in Wireless Device
`Are Not Conventional and Not Obvious ........................................................................... 98
`
`viii.
`
`The User (Not the Code) Performs the Drag-and-Drop (or Copy-and-Paste) .... 98
`
`ix. URLs of Data Objects Are Not Displayed by the Browser and Cannot be Copied
`Directly Using Drag-and-Drop (or Copy-and-Paste) ........................................................ 99
`
`x.
`
`The Web Page Containing the URL Must Be Cacheable ....................................... 99
`
`xi. Not All Web Pages Are Cacheable or Cached........................................................ 99
`
`xii. A User Cannot Tell if a Web Page Displayed by the Web Browser Is from Cache
`or Stored in Cache ........................................................................................................... 100
`
`Chaganti Does Not Teach Drag-and-Drop (or Copy-and Paste) for Out-of-Band
`xiii.
`Downloads ...................................................................................................................... 100
`
`xiv. Chaganti Does Not Disclose Where the URL for the Purported Out-of-Band
`Download Is Obtained from............................................................................................ 104
`
`xv. Chaganti Does Not Teach Cache for Out-of-Band Downloads ............................ 104
`
`xvi. Ground 2 – Utilizing Download Information Stored in Cache: Claims 1-20 Are Not
`Obvious in View of Chaganti (Ex 1008) and Major (Ex 1007) ...................................... 106
`
`Claims 1 and 11: Chaganti and Major Do Not Disclose Predefined Capacity by
`b.
`Server .................................................................................................................................. 106
`
`i. Chaganti Does Not Disclose ’526 Predefined Capacity ........................................... 107
`
`Ground 2: Defined Capacity: Claims 1-20 Are Not Obvious in View of Chaganti
`ii.
`(Ex 1008) and Major (Ex 1007) ...................................................................................... 113
`
`c. Dependent Claims 3 and 20 ......................................................................................... 113
`
`d.
`
`Dependent Claims 4 and 12 ...................................................................................... 114
`
`e. Dependent Claims 6, 7, 10, 13, 14, and 15 .................................................................. 115
`
`f. A POSITA Would Not Have Been Motivated to Combine Chaganti with Major ....... 118
`
`i. Major’s Teachings Discourage Wireless Device Access to External Storage ......... 121
`
`ii.
`
`Combining Two Different Cache Implementations Is Difficult ........................... 122
`
`VI. CONCLUSION ................................................................................................123
`
`
`
`
`
`iii
`
`

`

`I, Zaydoon (“Jay”) Jawadi, declare as follows:
`
`I.
`
`BACKGROUND AND QUALIFICATIONS
`
`1. My name is Zaydoon (“Jay”) Jawadi.
`
`2.
`
`I am an independent expert and consultant. I have been retained as an
`
`expert witness on behalf of SynKloud Technologies, LLC (“SynKloud”) for the
`
`above-captioned Inter Partes Review (IPR) regarding U.S. Patent No. 9,098,526
`
`(“’526 Patent”).
`
`3.
`
`As shown in my curriculum vitae (attached as Exhibit 2002), I have a
`
`Bachelor of Science in Electrical Engineering from Mosul University, a Master of
`
`Science in Computer Science from Columbia University with a Citation for
`
`Outstanding Achievement – Dean’s Honor Student, and over 40 years of
`
`experience in software and product design and development, engineering,
`
`consulting, and management in the fields of data storage, Internet, software, data
`
`networking, computing systems, and telecommunication.
`
`4.
`
`I have worked with and possess expertise in numerous technologies,
`
`including data storage
`
`technologies and
`
`interfaces, Internet and website
`
`technologies, databases, data networking
`
`technologies and protocols, and
`
`telephony.
`
`5.
`
`From 1978 to 1980, I worked as a telecommunication/electrical
`
`engineer for Emirtel (formerly Cable and Wireless, now Etisalat). During my
`
`
`
`1
`
`

`

`employment at Emirtel, among other things, I worked on telephony and
`
`telecommunication products and services, and I developed software in assembly
`
`and high-level languages for archiving, storing, and retrieving data to and from
`
`data storage devices, such as disk drives and tape drives.
`
`6.
`
`From 1981 to 1983, I worked as a software engineer for Amdahl
`
`Corporation (now Fujitsu), a California-based major supplier of computers,
`
`systems, and data storage subsystems.
`
`7.
`
`From 1984 to 1994, I worked as a software, data storage, and systems
`
`consultant to various data storage and computer companies in California, the
`
`United States, Asia, and Europe. I provided technical consulting services in data
`
`storage, data storage systems, data storage devices, software design and
`
`development, system software, device driver software, data storage device
`
`firmware, data storage software, data storage chips, data storage tools, data storage
`
`test systems and test software, data storage and I/O protocol development systems,
`
`data storage and I/O protocol analyzers, data storage and I/O monitoring systems,
`
`and data storage manufacturing systems and software.
`
`8.
`
`From 1992 to 1996, I was President and founder of Zadian
`
`Technologies, Inc., a California-based leading supplier of networked data storage
`
`test systems, with over 50,000 units installed worldwide in mission-critical
`
`customer operations with premier high-technology customers, such as Conner
`
`
`
`2
`
`

`

`Peripherals (now Seagate), DEC (now HP), EMC (now Dell EMC), Exabyte,
`
`Fujitsu, HP, IBM, Intel, Iomega, Quantum (now Seagate), Seagate, Sony,
`
`StorageTek, Tandberg, Tandem (now HP), Toshiba, Unisys, and WD. The
`
`company’s products
`
`included
`
`test systems, manufacturing systems, and
`
`development systems for data storage devices (disk drives, tape drives, removable
`
`drives, flash drives, optical drives, CD-ROM drives, Jukeboxes, and RAID) and
`
`data storage interfaces (SCSI, ATA / IDE / ATAPI, Fibre Channel, SSA, and
`
`PCMCIA / PC Card).
`
`9.
`
`In 1996, Zadian Technologies was acquired by UK-based Xyratex
`
`International LTD (NASDAQ: XRTX, which was later acquired by Seagate,
`
`NASDAQ: STX, in 2014). Following Zadian’s acquisition by Xyratex, I became
`
`an employee of Xyratex until 1998. At Xyratex, I was a general manager of a data
`
`storage interface business unit and, subsequently, a general manager of a data
`
`networking analysis tools business unit, which designed and built Gigabit Ethernet
`
`network protocol analysis and monitoring products, which were sold, under OEM
`
`agreement, by the largest supplier of network protocol analysis and monitoring
`
`products.
`
`10. From 1999 to 2001, I was CEO, Chairman, and cofounder of Can Do,
`
`Inc., a California-based Internet eCommerce and community company. The
`
`CanDo.com website offered over 10,000 products for sale as well as extensive
`
`
`
`3
`
`

`

`consumer features, such as news, chat, messages, and product information for
`
`people with disabilities. The company also provided technologies for display
`
`magnification and sound/audio adaptation through the Internet to make websites
`
`more accessible to persons with vision and hearing impairments. The company
`
`was funded by leading venture capital firms.
`
`11. From 2001 to 2007, I was President and cofounder of CoAssure, Inc.,
`
`a California-based provider of Web-based technology services and solutions for
`
`automated telephony speech recognition and touchtone applications, serving
`
`multiple Fortune-500 companies.
`
`12.
`
`In 2009, I cofounded and have since been President of Rate Speeches,
`
`Inc., a California-based Internet company providing online services, resources, and
`
`technologies for creating, rating, evaluating, and enhancing public speaking,
`
`presentation, and communication skills. Rate Speeches also operates the
`
`ratespeeches.com website and the Speech Evaluator online software.
`
`13. Since moving to Silicon Valley in Northern California in 1981, I have
`
`worked on numerous technology products that have generated billions of dollars in
`
`sales.
`
`14.
`
`I hold a California community college lifelong computer science
`
`instructor credential. I have taught various data storage and computer technologies
`
`
`
`4
`
`

`

`to thousands of professional engineers and academic students in the United States,
`
`Europe, and Asia.
`
`15.
`
`In my work as an expert and consultant, I have examined, analyzed,
`
`and inspected numerous data storage systems, computer systems, software
`
`products, cell phone applications, tens of millions of lines of source code, and the
`
`frontend and backend software of more than 100 websites, including massive,
`
`highly-trafficked consumer and business websites.
`
`16. Through my education, industry and expert experience, and industry
`
`and expert knowledge, I have gained a detailed understanding of the technologies
`
`at issue in this case.
`
`17. My additional industry experience is in my curriculum vitae.
`
`18. My expert litigation support cases, including cases in which I have
`
`testified during the last four years as an expert, can be found in my curriculum
`
`vitae, which is Exhibit 2002.
`
`19. As such, I am qualified to provide opinions regarding the state of the
`
`art at the time the ’526 Patent was filed (which I understand to be no later than
`
`December 4, 2003) and how a person of ordinary skill in the art (“POSITA”) at
`
`that time would have interpreted and understood the ’526 Patent.
`
`20.
`
`I am being compensated for my work and any travel expenses in
`
`connection with
`
`this proceeding at my standard consulting rates.
`
` My
`
`
`
`5
`
`

`

`compensation is in no way dependent on or contingent on the outcome of my
`
`analysis or opinions rendered in this proceeding and is in no way dependent on or
`
`contingent on the results of these or any other proceedings relating to the above-
`
`captioned patent.
`
`21. Although I am not rendering an opinion about the level of skill of a
`
`POSITA proffered by Petitioner, based on my professional experience, I have an
`
`understanding of the capabilities of a person of ordinary skill in the relevant field
`
`(as such a POSITA is defined by Petitioner). Over the course of my career, I have
`
`supervised and directed many such persons. Additionally, I myself, at the time the
`
`’526 Patent was filed, qualified as at least a POSITA.
`
`A.
`
`Supplement to First Declaration
`
`22.
`
`I previously submitted a declaration dated December 18, 2019
`
`(Exhibit 2001) (“First Jawadi Declaration”) in support of the Patent Owner’s
`
`Preliminary Response of this proceeding.
`
`23.
`
`In this declaration, I provide supplemental opinions and additional
`
`supporting material. Any absence of supplemental opinions in this declaration
`
`should not be construed as my conceding any previously explicitly or implicitly
`
`expressed opinions.
`
`
`
`6
`
`

`

`II. MATERIALS REVIEWED
`
`24.
`
`In preparing this declaration, I reviewed the ’526 Patent, including its
`
`claims in view of its specification, the prosecution history of the ’526 Patent,
`
`various prior art and technical references from the time of the invention, and, the
`
`IPR2019-01655 Petition and its exhibits (1001-1021).
`
`25.
`
`I also reviewed the following references attached as exhibits:
`
`Exhibit
`Exhibit
`2003
`Exhibit
`2004
`Exhibit
`2005
`
`
`
`Description
`Microsoft Computer Dictionary, 5th Edition, Microsoft Press,
`2002
`Hypertext Transfer Protocol -- HTTP/1.1, rfc2616, June 1999
`
`Management Systems: analyses and applications, August W.
`Smith, Dryden Press, 1982
`
`A.
`
`Supplemental Materials Reviewed
`
`26.
`
`I also reviewed the following additional references attached as
`
`exhibits:
`
`Exhibit
`Exhibit
`2008
`
`Exhibit
`2009
`Exhibit
`2010
`
`
`
`
`
`Description
`How two strangers set up Dropbox and made billions; Will
`Smale; BBC News; July 16, 2018; last viewed April 29, 2020;
`https://www.bbc.com/news/business-44766487
`Web Caching; Duane Wessels; O'Reilly Media; 2001
`
`Microsoft Computer Dictionary, 5th Edition, Microsoft Press,
`2002
`
`7
`
`

`

`III. LEGAL UNDERSTANDING
`
`27.
`
`I have worked with counsel in the preparation of this Declaration.
`
`Nevertheless, the opinions, statements, and conclusions offered in this Declaration
`
`are purely my own, and were neither suggested not indicated in any way by
`
`counsel or anyone other than myself. I confirmed with counsel my understanding
`
`that the term “obvious” as used in the Petition addressed herein, and as a general
`
`matter under United States law, refers to subject matter that would have occurred
`
`to a Person of Ordinary Skill in the Art (POSITA) to which the ’526 Patent is
`
`directed without inventive or creative thought. That which is obvious, it is my
`
`understanding, flows naturally from the art and the education one of skill
`
`practicing in that art would have had in the relevant time frame, which for the ’526
`
`Patent is 2003.
`
`IV. CLAIM CONSTRUCTION
`
`28.
`
`I reviewed the comments in the Petition and Petitioner’s expert
`
`Declaration, Ex-1004, pertaining to “construction of the claims” of the ’526 Patent.
`
`My understanding is simply that, in the absence of a specific controversy, one
`
`arrives at the appropriate “construction” or definition of what is embraced by the
`
`claims of the ’526 Patent and what is excluded by those claims by a reading of the
`
`’526 Patent and arriving at what, based on that reading, the inventor of the claimed
`
`subject matter intended to protect as his invention.
`
`
`
`8
`
`

`

`V. OPINIONS
`
`29. Petitioner presents two grounds under which claims of the ’526 Patent
`
`are purportedly invalid. Petition, 1. In my opinion, as described below, Petitioner
`
`has not established a reasonable basis to conclude that the ’526 Patent claims are
`
`obvious.
`
`A.
`
`Institution Decision
`
`30.
`
`I respectfully disagree with the PTAB’s institution decision. In my
`
`opinion, Petitioner has not demonstrated that the challenged claims of the ’526
`
`Patent are unpatentable.
`
`B. Ground 1: Claims 1-3, 5-11, and 13-20 Are Not Obvious in View
`of Prust (Ex-1006) and Major (Ex-1007)
`
`31. Petitioner contends that Claims 1-3, 5-11, and 13-20 are obvious in
`
`view of Prust (Ex-1006) taken in view of Major (Ex-1007). Petition, 1. I disagree
`
`for the reasons outlined below.
`
`a. Claims 1 and 11: Copy-and-Paste (or Typing) with Web
`Browser Cache Does Not Disclose Utilizing Download
`Information Stored in Cache
`
`
`
`32. Petitioner (e.g., at pp. 10, 11, 35) argues that web browser cache along
`
`with ‘copy-and-paste’ may be used to implement “utilizing download information
`
`for the file stored in [the] cache” (’526, Claim 1, element [1d.1b]) (“utilizing
`
`download information for the file stored in a cache storage of the wireless device”
`
`
`
`9
`
`

`

`in ’526, Claim 1). I disagree with these contentions for the reasons outlined in the
`
`following sections.
`
`33. For this declaration, I will assume Petitioner’s definition of the term
`
`“out-of-band” (“out-band” in the ’526 specification) download. In summary, in
`
`out-of-band download, a wireless device directs a storage server to download an
`
`object (e.g., an image) to the storage server from a remote server that is separate
`
`from the storage server and separate from the wireless device. To accomplish the
`
`process, the wireless device sends the storage server a URL or address (termed
`
`“download information” or “downloading information” in the ’526 Patent)
`
`pointing to the object, and the storage server uses that URL or address to download
`
`the object from the remote server to the storage server out-of-band (i.e., using a
`
`connection between the storage server and the remote server, bypassing the
`
`wireless device).
`
`34.
`
`In describing out-of-band downloading, Petitioner states that “[t]he
`
`’526 Patent discloses an “additional” technique for downloading a data object into
`
`the storage space from a remote location “out-band.” Ex-1001 Fig. 3, 2:50–53,
`
`5:1–10. A POSA would prefer the term-of-art “out-of-band,” signifying wireless
`
`device 1 being outside the download path (i.e. path c). Ex-1004 ¶30.” Petition, p.
`
`3. Petitioner then describes the steps involved in the out-of-band download: “In
`
`step 1, using a web browser of wireless device 1, a user browses a page on web
`
`
`
`10
`
`

`

`server 15.” Petition, p. 4, emphasis in original. “In step 2, the wireless device
`
`sends the download information to storage server 3 via path b.” Petition, p. 5,
`
`emphasis in original. Path b is between the wireless device and the storage server.
`
`“Step 3 use URL to download file to storage server” Petition, p. 4, emphasis in
`
`original. “In step 4, the server uses the download information to download the
`
`object via path c. ... In step 5, the storage server stores the object in the user’s
`
`assigned storage space.” Petition, p. 5, emphasis in original. Path c is between the
`
`storage server and the remote server.
`
`35. Claim 1 and Claim 11 of the ’526 Patent address “download
`
`information.”
`
` Petitioner defines download information as URL.
`
` “This
`
`“information” would typically be a Uniform Resource Locator (“URL”) of a
`
`hyperlink on the page. Ex-1004 ¶31; Ex-1020 461, 479; §V.B.1.” Petition, p. 4.
`
`“The download information for the object is stored in “the cached web-pages on
`
`the wireless device.” Ex-1001 5:13–17.” Petition, p. 4. For this declaration, I will
`
`assume Petitioner’s definition of download information.
`
`36. Claim 1 and Claim 11 of the ’526 Patent recite “cache storage.”
`
`Petitioner defines cache storage as web browser cache. “For context, the ’526
`
`Patent refers to “cache” just once: “cached web-pages.” Ex-1001 5:15. A POSA
`
`understood that to refer to the web-cache of a conventional web-browser. Ex-1004
`
`
`
`11
`
`

`

`¶79.” Petition, p. 20. For this declaration, I will assume Petitioner’s definition of
`
`cache storage.
`
`37. Also, in this Declaration, I will use the terms “download information”
`
`and “downloading information” interchangeably, will use the terms “browser
`
`cache” and “web browser cache” interchangeably, and will use the terms
`
`“browser” and “web browser” interchangeably.
`
`38. Petitioner assumes that element [1d.1] does not require that the
`
`wireless device obtain the download information from cache storage as part of the
`
`[1d.1] operation. My responses address both obtaining the download information
`
`from cache storage and not obtaining the download information from cache
`
`storage.
`
`39. Even though Major and Prust do not disclose copy-and-paste,
`
`Petitioner relies on copy-and-paste, contending that web-caching and copy-and-
`
`paste were conventional. For example, Petitioner contends that “Web-caching and
`
`copy-and-paste were well-known, conventional functions of web browsers.”
`
`Petition, p. 10. Petitioner also contends that “User operations, such as copy-and-
`
`paste, were well-known for remote storage, including out-of-band downloads.”
`
`Petition, p. 12. Petitioner also contends that “for [1d.1b], while Prust taught
`
`“utilizing” the URL (i.e. download information) in response to the user email as
`
`claimed, Prust did not expressly describe that the URL was “stored in said cache
`
`
`
`12
`
`

`

`storage.” Ex-1004 ¶110. Nor did Prust explain how or where the user learned of
`
`the desired file or its URL. Ex-1004 ¶110. But a POSA would have understood that
`
`finding URLs and storing them in web-cache was an obvious use case of Prust’s
`
`system that would have occurred as part of conventional web browsing. Ex-1004
`
`¶110.” Petition, p. 32. By element [1d.1b], Petitioner refers to “through utilizing
`
`download information for the file stored in said cache storage” in ’526 Claim 1.
`
`For the reasons outlined in the following sections, I disagree with these contentions
`
`by Petitioner.
`
`
`
`i. Purpose of the ’526 Cache
`
`40. The ’526 discloses cache storage in the wireless device and uses that
`
`cache for only one purpose: storing the download information. Below are all
`
`recitations of cache in the ’526 Patent, which show that cache is used only for the
`
`purpose of storing the download information.
`
`“utilizing download information for the file stored in said cache
`storage” ’526, Claim 1, emphasis added
`
`“transmitting the downloading information cached in the wireless
`device to the storage server” Id., Claim 4, emphasis added
`
`“utilizing download information for the file stored in a cache
`storage” Id., Claim 11, emphasis added
`
`“transmitting the downloading information cached in the wireless
`device” Id., Claim 12, emphasis added
`
`
`
`
`13
`
`

`

`“obtain the downloading information for the data, which becomes
`available in the cached web-pages on the wireless device” Id., 5:14-
`16, emphasis added
`
`
`ii. No Reason to Add Cache to Prust
`
`
`
`41. Prust does not disclose cache; instead, Petitioner relies on Major for
`
`the cache limitation. Pet. 33. However, a POSITA would need a reason or
`
`motivation to add cache to Prust, whether from Major or otherwise. If there was a
`
`reason or motivation in Prust to include cache, Prust’s inventor would have
`
`included cache in Prust. However, Prust does not include or disclose any cache.
`
`42. As I describe below, there is no reason or motivation to add cache
`
`to Prust, whether from Major or otherwise. In fact, as I explain later, there is
`
`reason and motivation to NOT add cache to Prust, whether from Major or
`
`otherwise.
`
`43. Prust mentions URL (universal resource locator) only once at 6:67-
`
`7:4, which Petitioner cites.
`
`“In an alternative embodiment, the user does not attach a data file but
`includes within the electronic mail message a universal resource
`locator (URL) that indicates where storage server 210 can retrieve the
`data file to be stored.” Prust (Ex-1006) at 6:67-7:4, emphasis added
`
`44. Prust does not disclose where the user obtains such URL, where the
`
`URL is stored, or where the URL originated from. Petitioner does not offer any
`
`evidentiary support from Prust to show where the user obtains such URL, where
`
`the URL is stored, or where the URL originated from. Instead, Petitioner simply
`
`
`
`14
`
`

`

`assumes that the URL is in cache based on Petitioner’s expert opinions without any
`
`evidentiary support from Prust or otherwise. Pet. 13.
`
`45. Petitioner also relies on the theory of cutting-and-pasting of or typing
`
`in the URL. Pet. 10, 11, 12, 29, 33-38. This Petitioner theory is based only on the
`
`knowledge of the POSITA offered by Petitioner’s expert without any evidentiary
`
`support from Prust. Indeed, Prust does not mention cutting-and-pasting or typing,
`
`does not mention cutting-and-pasting or typing URLs, and does not mention
`
`cutting-and-pasting or typing URLs from cached webpages.
`
`46. Even assuming that the sequence required to cut-and-paste (or type)
`
`from a cached webpage is within the knowledge of the POSITA at the time of ’526
`
`invention, Prust (alone or in combination of Major) does not disclose, suggest, or
`
`hint at any reason for Prust to include a cache, let alone cache for storing the URL
`
`(download information). Petitioner provides no rationale for why a POSITA
`
`would add cache, whether from Major or otherwise, to Prust. In my opinion, there
`
`is no rationale for a POSITA to add cache (from Major or otherwise) to Prust. To
`
`the contrary, there is a reason for a POSITA to NOT add cache, whether from
`
`Major or otherwise, to Prust. I elaborate below.
`
`47. Prust describes that the user sends an email to the server and that the
`
`email contains a file to be stored at the server or contains a URL pointing to a
`
`location of a file to be stored at the server. Prust further describes that, upon
`
`
`
`15
`
`

`

`receipt of the email from the user, the server stores the file that is received in the
`
`email from the user or that is fetched by the server using the URL.
`
`“More specifically, in order to store data files within the remote
`virtual storage area, the user sends an electronic mail message that
`includes the data file as well as user information and target data file
`information. The storage server parses the electronic mail message
`and stores the data file within the storage area according to the target
`data file information. In addition, the user can request one or more
`data files from the storage area and electronically mail the data files to
`the user. In this manner, authorized users can easily store date files
`to or retrieve data files from his or her remote storage area from
`anywhere in the world via a global computer network such as the
`Internet or a private wide-area network.” Prust (Ex-1006) at 1:37-49,
`emphasis ad

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket