`
`
`
`____________
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________
`
`
`
`UNIFIED PATENTS INC.,
`
`Petitioner,
`
`v.
`
`SYNKLOUD TECHNOLOGIES, LLC,
`
`Patent Owner.
`
`____________
`
`
`
`Case IPR2019-01655
`
`U.S. Patent No. 9,098,526
`
`____________
`
`
`
`DECLARATION OF ZAYDOON (“JAY”) JAWADI
`IN SUPPORT OF PATENT OWNER’S RESPONSE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR 2019-01655
`Exhibit 2001
`
`Unified Patents v.
`Synkloud Technologies, LLC
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`
`I. BACKGROUND AND QUALIFICATIONS ..................................................... 1
`
`II. MATERIALS REVIEWED ................................................................................ 6
`
`III. LEGAL UNDERSTANDING ............................................................................. 7
`
`IV. CLAIM CONSTRUCTION ................................................................................ 7
`
`V. OPINIONS ........................................................................................................... 8
`
`A. Ground 1: Claims 1-3, 5-11, and 13-20 Are Not Obvious in View of Prust (Ex-1006) and
`Major (Ex-1007) ......................................................................................................................... 8
`
`a. Claims 1 and 11: Copy-and-Paste with Web Browser Cache Does Not Disclose
`Utilizing Download Information Stored in Cache .................................................................. 8
`
`i. The ’526 Patent Does Not Teach Copy-and-Paste ..................................................... 12
`
`ii. Major Does Not Teach Copy-and-Paste ................................................................. 12
`
`iii.
`
`Prust Does Not Teach Copy-and-Paste ................................................................... 12
`
`iv. Major and Prust, Alone and/or in Combination, Do Not Teach Copy-and-Paste ... 14
`
`The Steps of Using Copy-and-Paste from Web Browser Cache in Wireless Device
`v.
`Are Not Conventional and Not Obvious ........................................................................... 14
`
`vi.
`
`The User (Not the Code) Performs the Copy-and-Paste ......................................... 18
`
`vii. URLs of Data Objects Are Not Displayed by the Browser and Cannot be Copied
`Directly Using Copy-and-Paste ........................................................................................ 22
`
`viii.
`
`The Web Page Containing the URL Must Be Cacheable ................................... 26
`
`ix. Not All Web Pages Are Cacheable or Cached........................................................ 26
`
`A User Cannot Tell if a Web Page Displayed by the Web Browser Is from Cache
`x.
`or Stored in Cache ............................................................................................................. 29
`
`Prust Does Not Disclose Where the URL for the Purported Out-of-Band Download
`xi.
`Is Obtained from ............................................................................................................... 31
`
`xii. Prust Does Not Disclose Cache Storage ................................................................. 32
`
`Prust Does Not Disclose Out-Of-Band Download through Browser or through
`xiii.
`Operating System .............................................................................................................. 32
`
`b.
`
`Claims 1 and 11: Prust and Major Do Not Disclose Predefined Capacity ................. 35
`
`i. Prust Does Not Disclose Predefined Capacity ........................................................... 36
`
`ii. Major Does Not Disclose Predefined Capacity ...................................................... 39
`
`iii. The Combination of Prust and Major Does Not Disclose Predefined Capacity ..... 39
`
`c. Claims 1 and 11: Prust’s Email Does Not Disclose Coupling ....................................... 40
`
`
`
`i
`
`
`
`d.
`
`Claims 1 and 11: Prust’s Email Does Not Disclose Retrieving ................................. 42
`
`e. Claims 1 and 11: Prust’s Email Does Not Disclose Storing and Retrieving.................. 44
`
`f. Dependent Claims 3 and 20 ........................................................................................... 45
`
`g.
`
`A POSITA Would Not Have Been Motivated to Combine Prust with Major ........... 48
`
`i. Major’s Teachings Discourage Wireless Device Access to External Storage ........... 50
`
`ii. Major Stores Data Objects in Cache, Negating the Need for External Storage ..... 53
`
`iii.
`
`iv.
`
`Prust Discourages Using Only One Mode to Access Remote Storage ................... 53
`
`Prust Does Not Disclose Out-Of-Band Download through Browser ..................... 54
`
`B. Ground 2: Claims 1-20 Are Not Obvious in View of Chaganti (Ex-1008) and Major
`(Ex-1007) .................................................................................................................................. 54
`
`a. Claims 1 and 11: Chaganti’s Copy-and-Paste with Major’s Web Browser Cache Does
`Not Disclose Utilizing Download Information Stored in Cache .......................................... 54
`
`i. The Steps of Using Copy-and-Paste from Web Browser Cache in Wireless Device
`Are Not Conventional and Not Obvious ........................................................................... 55
`
`ii.
`
`The User (Not the Code) Performs the Copy-and-Paste ......................................... 55
`
`iii. URLs of Data Objects Are Not Displayed by the Browser and Cannot be Copied
`Directly Using Copy-and-Paste ........................................................................................ 56
`
`iv.
`
`v.
`
`The Web Page Containing the URL Must Be Cacheable ....................................... 56
`
`Not All Web Pages Are Cacheable or Cached........................................................ 56
`
`vi. A User Cannot Tell if a Web Page Displayed by the Web Browser Is from Cache
`or Stored in Cache ............................................................................................................. 56
`
`vii. Chaganti Does Not Teach Copy-and Paste for Out-of-Band Downloads............... 57
`
`Chaganti Does Not Disclose Where the URL for the Purported Out-of-Band
`viii.
`Download Is Obtained from.............................................................................................. 60
`
`ix. Chaganti Does Not Teach Cache for Out-of-Band Downloads .............................. 61
`
`Claims 1 and 11: Chaganti and Major Do Not Disclose Predefined Capacity by
`b.
`Server .................................................................................................................................... 62
`
`c. Dependent Claims 3 and 20 ........................................................................................... 64
`
`d.
`
`Dependent Claims 4 and 12 ........................................................................................ 65
`
`e. Dependent Claims 6, 7, 10, 13, 14, and 15 .................................................................... 65
`
`f. A POSITA Would Not Have Been Motivated to Combine Chaganti with Major ......... 68
`
`i. Major’s Teachings Discourage Wireless Device Access to External Storage ........... 71
`
`ii.
`
`Combining Two Different Cache Implementations Is Difficult ............................. 72
`
`VI. CONCLUSION ..................................................................................................73
`
`
`
`
`
`ii
`
`
`
`I, Zaydoon (“Jay”) Jawadi, declare as follows:
`
`I.
`
`BACKGROUND AND QUALIFICATIONS
`
`1. My name is Zaydoon (“Jay”) Jawadi.
`
`2.
`
`I am an independent expert and consultant. I have been retained as an
`
`expert witness on behalf of SynKloud Technologies, LLC (“SynKloud”) for the
`
`above-captioned Inter Partes Review (IPR) regarding U.S. Patent No. 9,098,526
`
`(“’526 Patent”).
`
`3.
`
`As shown in my curriculum vitae (attached as Exhibit 2002), I have a
`
`Bachelor of Science in Electrical Engineering from Mosul University, a Master of
`
`Science in Computer Science from Columbia University with a Citation for
`
`Outstanding Achievement – Dean’s Honor Student, and over 40 years of
`
`experience in software and product design and development, engineering,
`
`consulting, and management in the fields of data storage, Internet, software, data
`
`networking, computing systems, and telecommunication.
`
`4.
`
`I have worked with and possess expertise in numerous technologies,
`
`including data storage
`
`technologies and
`
`interfaces, Internet and website
`
`technologies, databases, data networking
`
`technologies and protocols, and
`
`telephony.
`
`5.
`
`From 1978 to 1980, I worked as a telecommunication/electrical
`
`engineer for Emirtel (formerly Cable and Wireless, now Etisalat). During my
`
`
`
`1
`
`
`
`employment at Emirtel, among other things, I worked on telephony and
`
`telecommunication products and services, and I developed software in assembly
`
`and high-level languages for archiving, storing, and retrieving data to and from
`
`data storage devices, such as disk drives and tape drives.
`
`6.
`
`From 1981 to 1983, I worked as a software engineer for Amdahl
`
`Corporation (now Fujitsu), a California-based major supplier of computers,
`
`systems, and data storage subsystems.
`
`7.
`
`From 1984 to 1994, I worked as a software, data storage, and systems
`
`consultant to various data storage and computer companies in California, the
`
`United States, Asia, and Europe. I provided technical consulting services in data
`
`storage, data storage systems, data storage devices, software design and
`
`development, system software, device driver software, data storage device
`
`firmware, data storage software, data storage chips, data storage tools, data storage
`
`test systems and test software, data storage and I/O protocol development systems,
`
`data storage and I/O protocol analyzers, data storage and I/O monitoring systems,
`
`and data storage manufacturing systems and software.
`
`8.
`
`From 1992 to 1996, I was President and founder of Zadian
`
`Technologies, Inc., a California-based leading supplier of networked data storage
`
`test systems, with over 50,000 units installed worldwide in mission-critical
`
`customer operations with premier high-technology customers, such as Conner
`
`
`
`2
`
`
`
`Peripherals (now Seagate), DEC (now HP), EMC (now Dell EMC), Exabyte,
`
`Fujitsu, HP, IBM, Intel, Iomega, Quantum (now Seagate), Seagate, Sony,
`
`StorageTek, Tandberg, Tandem (now HP), Toshiba, Unisys, and WD. The
`
`company’s products
`
`included
`
`test systems, manufacturing systems, and
`
`development systems for data storage devices (disk drives, tape drives, removable
`
`drives, flash drives, optical drives, CD-ROM drives, Jukeboxes, and RAID) and
`
`data storage interfaces (SCSI, ATA / IDE / ATAPI, Fibre Channel, SSA, and
`
`PCMCIA / PC Card).
`
`9.
`
`In 1996, Zadian Technologies was acquired by UK-based Xyratex
`
`International LTD (NASDAQ: XRTX, which was later acquired by Seagate,
`
`NASDAQ: STX, in 2014). Following Zadian’s acquisition by Xyratex, I became
`
`an employee of Xyratex until 1998. At Xyratex, I was a general manager of a data
`
`storage interface business unit and, subsequently, a general manager of a data
`
`networking analysis tools business unit, which designed and built Gigabit Ethernet
`
`network protocol analysis and monitoring products, which were sold, under OEM
`
`agreement, by the largest supplier of network protocol analysis and monitoring
`
`products.
`
`10. From 1999 to 2001, I was CEO, Chairman, and cofounder of Can Do,
`
`Inc., a California-based Internet eCommerce and community company. The
`
`CanDo.com website offered over 10,000 products for sale as well as extensive
`
`
`
`3
`
`
`
`consumer features, such as news, chat, messages, and product information for
`
`people with disabilities. The company also provided technologies for display
`
`magnification and sound/audio adaptation through the Internet to make websites
`
`more accessible to persons with vision and hearing impairments. The company
`
`was funded by leading venture capital firms.
`
`11. From 2001 to 2007, I was President and cofounder of CoAssure, Inc.,
`
`a California-based provider of Web-based technology services and solutions for
`
`automated telephony speech recognition and touchtone applications, serving
`
`multiple Fortune-500 companies.
`
`12.
`
`In 2009, I cofounded and have since been President of Rate Speeches,
`
`Inc., a California-based Internet company providing online services, resources, and
`
`technologies for creating, rating, evaluating, and enhancing public speaking,
`
`presentation, and communication skills. Rate Speeches also operates the
`
`ratespeeches.com website and the Speech Evaluator online software.
`
`13. Since moving to Silicon Valley in Northern California in 1981, I have
`
`worked on numerous technology products that have generated billions of dollars in
`
`sales.
`
`14.
`
`I hold a California community college lifelong computer science
`
`instructor credential. I have taught various data storage and computer technologies
`
`
`
`4
`
`
`
`to thousands of professional engineers and academic students in the United States,
`
`Europe, and Asia.
`
`15.
`
`In my work as an expert and consultant, I have examined, analyzed,
`
`and inspected numerous data storage systems, computer systems, software
`
`products, cell phone applications, tens of millions of lines of source code, and the
`
`frontend and backend software of more than 100 websites, including massive,
`
`highly-trafficked consumer and business websites.
`
`16. Through my education, industry and expert experience, and industry
`
`and expert knowledge, I have gained a detailed understanding of the technologies
`
`at issue in this case.
`
`17. My additional industry experience is in my curriculum vitae.
`
`18. My expert litigation support cases, including cases in which I have
`
`testified during the last four years as an expert, can be found in my curriculum
`
`vitae, which is Exhibit 2002.
`
`19. As such, I am qualified to provide opinions regarding the state of the
`
`art at the time the ’526 Patent was filed (which I understand to be no later than
`
`December 4, 2003) and how a person of ordinary skill in the art (“POSITA”) at
`
`that time would have interpreted and understood the ’526 Patent.
`
`20.
`
`I am being compensated for my work and any travel expenses in
`
`connection with
`
`this proceeding at my standard consulting rates.
`
` My
`
`
`
`5
`
`
`
`compensation is in no way dependent on or contingent on the outcome of my
`
`analysis or opinions rendered in this proceeding and is in no way dependent on or
`
`contingent on the results of these or any other proceedings relating to the above-
`
`captioned patent.
`
`21. Although I am not rendering an opinion about the level of skill of a
`
`POSITA proffered by Petitioner, based on my professional experience, I have an
`
`understanding of the capabilities of a person of ordinary skill in the relevant field
`
`(as such a POSITA is defined by Petitioner). Over the course of my career, I have
`
`supervised and directed many such persons. Additionally, I myself, at the time the
`
`’526 Patent was filed, qualified as at least a POSITA.
`
`II. MATERIALS REVIEWED
`
`22.
`
`In preparing this declaration, I reviewed the ’526 Patent, including its
`
`claims in view of its specification, the prosecution history of the ’526 Patent,
`
`various prior art and technical references from the time of the invention, and, the
`
`IPR2019-01655 Petition and its exhibits (1001-1021).
`
`23.
`
`I also reviewed the following references attached as exhibits:
`
`Exhibit
`Exhibit
`2003
`Exhibit
`2004
`Exhibit
`2005
`
`
`
`Description
`Microsoft Computer Dictionary, 5th Edition, Microsoft Press,
`2002
`Hypertext Transfer Protocol -- HTTP/1.1, rfc2616, June 1999
`
`Management Systems: analyses and applications, August W.
`Smith, Dryden Press, 1982
`
`6
`
`
`
`III. LEGAL UNDERSTANDING
`
`24.
`
`I have worked with counsel in the preparation of this Declaration.
`
`Nevertheless, the opinions, statements, and conclusions offered in this Declaration
`
`are purely my own, and were neither suggested not indicated in any way by
`
`counsel or anyone other than myself. I confirmed with counsel my understanding
`
`that the term “obvious” as used in the Petition addressed herein, and as a general
`
`matter under United States law, refers to subject matter that would have occurred
`
`to a Person of Ordinary Skill in the Art (POSITA) to which the ’526 Patent is
`
`directed without inventive or creative thought. That which is obvious, it is my
`
`understanding, flows naturally from the art and the education one of skill
`
`practicing in that art would have had in the relevant time frame, which for the ’526
`
`Patent is 2003.
`
`IV. CLAIM CONSTRUCTION
`
`25.
`
`I reviewed the comments in the Petition and Petitioner’s expert
`
`Declaration, Ex-1004, pertaining to “construction of the claims” of the ’526 Patent.
`
`My understanding is simply that, in the absence of a specific controversy, one
`
`arrives at the appropriate “construction” or definition of what is embraced by the
`
`claims of the ’526 Patent and what is excluded by those claims by a reading of the
`
`’526 Patent and arriving at what, based on that reading, the inventor of the claimed
`
`subject matter intended to protect as his invention.
`
`7
`
`
`
`V. OPINIONS
`
`26. Petitioner presents two grounds under which claims of the ’526 Patent
`
`are purportedly invalid. Petition, 1. In my opinion, as described below, Petitioner
`
`has not established a reasonable basis to conclude that the ’526 Patent claims are
`
`obvious.
`
`A. Ground 1: Claims 1-3, 5-11, and 13-20 Are Not Obvious in View
`of Prust (Ex-1006) and Major (Ex-1007)
`
`27. Petitioner contends that Claims 1-3, 5-11, and 13-20 are obvious in
`
`view of Prust (Ex-1006) taken in view of Major (Ex-1007). Petition, 1. I disagree
`
`for the reasons outlined below.
`
`a. Claims 1 and 11: Copy-and-Paste with Web Browser Cache
`Does Not Disclose Utilizing Download Information Stored in
`Cache
`
`
`
`28. Petitioner (e.g., at pp. 10, 11, 35) argues that web browser cache along
`
`with ‘copy-and-paste’ may be used to implement “utilizing download information
`
`for the file stored in [the] cache” (’526, Claim 1, element [1d.1b]) (“utilizing
`
`download information for the file stored in a cache storage of the wireless device”
`
`in ’526, Claim 1). I disagree with these contentions for the reasons outlined in the
`
`following sections.
`
`29. For this declaration, I will assume Petitioner’s definition of the term
`
`“out-of-band” (“out-band” in the ’526 specification) download. In summary, in
`
`out-of-band download, a wireless device directs a storage server to download an
`
`
`
`8
`
`
`
`object (e.g., an image) to the storage server from a remote server that is separate
`
`from the storage server and separate from the wireless device. To accomplish the
`
`process, the wireless device sends the storage server a URL or address (termed
`
`“download information” or “downloading information” in the ’526 Patent)
`
`pointing to the object, and the storage server uses that URL or address to download
`
`the object from the remote server to the storage server out-of-band (i.e., using a
`
`connection between the storage server and the remote server, bypassing the
`
`wireless device).
`
`30.
`
`In describing out-of-band downloading, Petitioner states that “[t]he
`
`’526 Patent discloses an “additional” technique for downloading a data object into
`
`the storage space from a remote location “out-band.” Ex-1001 Fig. 3, 2:50–53,
`
`5:1–10. A POSA would prefer the term-of-art “out-of-band,” signifying wireless
`
`device 1 being outside the download path (i.e. path c). Ex-1004 ¶30.” Petition, p.
`
`3. Petitioner then describes the steps involved in the out-of-band download: “In
`
`step 1, using a web browser of wireless device 1, a user browses a page on web
`
`server 15.” Petition, p. 4, emphasis in original. “In step 2, the wireless device
`
`sends the download information to storage server 3 via path b.” Petition, p. 5,
`
`emphasis in original. Path b is between the wireless device and the storage server.
`
`“Step 3 use URL to download file to storage server” Petition, p. 4, emphasis in
`
`original. “In step 4, the server uses the download information to download the
`
`
`
`9
`
`
`
`object via path c. ... In step 5, the storage server stores the object in the user’s
`
`assigned storage space.” Petition, p. 5, emphasis in original. Path c is between the
`
`storage server and the remote server.
`
`31. Claim 1 and Claim 11 of the ’526 Patent address “download
`
`information.”
`
` Petitioner defines download information as URL.
`
` “This
`
`“information” would typically be a Uniform Resource Locator (“URL”) of a
`
`hyperlink on the page. Ex-1004 ¶31; Ex-1020 461, 479; §V.B.1.” Petition, p. 4.
`
`“The download information for the object is stored in “the cached web-pages on
`
`the wireless device.” Ex-1001 5:13–17.” Petition, p. 4. For this declaration, I will
`
`assume Petitioner’s definition of download information.
`
`32. Claim 1 and Claim 11 of the ’526 Patent recite “cache storage.”
`
`Petitioner defines cache storage as web browser cache. “For context, the ’526
`
`Patent refers to “cache” just once: “cached web-pages.” Ex-1001 5:15. A POSA
`
`understood that to refer to the web-cache of a conventional web-browser. Ex-1004
`
`¶79.” Petition, p. 20. For this declaration, I will assume Petitioner’s definition of
`
`cache storage.
`
`33. Also, in this Declaration, I will use the terms “download information”
`
`and “downloading information” interchangeably, will use the terms “browser
`
`cache” and “web browser cache” interchangeably, and will use the terms
`
`“browser” and “web browser” interchangeably.
`
`
`
`10
`
`
`
`34. Petitioner assumes that element [1d.1] does not require that the
`
`wireless device obtain the download information from cache storage as part of the
`
`[1d.1] operation. My responses address both obtaining the download information
`
`from cache storage and not obtaining the download information from cache
`
`storage.
`
`35. Even though Major and Prust do not disclose copy-and-paste,
`
`Petitioner relies on copy-and-paste, contending that web-caching and copy-and-
`
`paste were conventional. For example, Petitioner contends that “Web-caching and
`
`copy-and-paste were well-known, conventional functions of web browsers.”
`
`Petition, p. 10. Petitioner also contends that “User operations, such as copy-and-
`
`paste, were well-known for remote storage, including out-of-band downloads.”
`
`Petition, p. 12. Petitioner also contends that “for [1d.1b], while Prust taught
`
`“utilizing” the URL (i.e. download information) in response to the user email as
`
`claimed, Prust did not expressly describe that the URL was “stored in said cache
`
`storage.” Ex-1004 ¶110. Nor did Prust explain how or where the user learned of
`
`the desired file or its URL. Ex-1004 ¶110. But a POSA would have understood that
`
`finding URLs and storing them in web-cache was an obvious use case of Prust’s
`
`system that would have occurred as part of conventional web browsing. Ex-1004
`
`¶110.” Petition, p. 32. By element [1d.1b], Petitioner refers to “through utilizing
`
`download information for the file stored in said cache storage” in ’526 Claim 1.
`
`
`
`11
`
`
`
`For the reasons outlined in the following sections, I disagree with these contentions
`
`by Petitioner.
`
`
`
`i. The ’526 Patent Does Not Teach Copy-and-Paste
`
`36. The ’526 Patent itself does not teach or even mention copy-and-paste.
`
`Petitioner does not provide any evidence that the ’526 Patent discloses copy-and-
`
`paste. In my opinion, the ’526 Patent does not even suggest copy-and-paste to a
`
`POSITA.
`
`
`
`ii. Major Does Not Teach Copy-and-Paste
`
`37. Major does not teach or even mention copy-and-paste. Petitioner does
`
`not provide any evidence that Major discloses copy-and-paste. In my opinion,
`
`Major does not even suggest copy-and-paste to a POSITA.
`
`
`
`iii. Prust Does Not Teach Copy-and-Paste
`
`38. Prust does not teach or even mention copy-and-paste. Petitioner does
`
`not provide any evidence that Prust discloses copy-and-paste. In my opinion, Prust
`
`does not even suggest copy-and-paste to a POSITA.
`
`39. Petitioner claims that “in 1999 industry stakeholders published the
`
`Web Distributed Authoring and Versioning (WebDAV) protocol that specified
`
`operations for remote file and folder management, including a “copy” operation for
`
`transferring data from one location on the Internet to another by identifying the
`
`
`
`12
`
`
`
`source and destination URLs. Ex-1019 §8.8, Ex-1018 294, 303; Prust (Ex-1006)
`
`5:63–65 (using the WebDAV protocol). Ex-1004 ¶63.” Petition, p. 12.
`
`40.
`
`I disagree with Petitioner’s conjecture that Prust implies copy-and-
`
`paste (because Prust references WebDAV).
`
`41. First, Petitioner’s WebDAV’s references (Ex-1018 and Ex-1019) do
`
`not teach or even mention copy-and-paste. Petitioner and Petitioner’s expert
`
`(including at Ex-1004 ¶63) do not provide any citations from Ex-1018 or Ex-1019
`
`showing copy-and-paste. Indeed, Ex-1018 and Ex-1019 do not describe or detail
`
`copy-and-paste.
`
`42. Second, Petitioner relies on copy-and-paste for allegedly sending the
`
`URL (download information) from the user to the storage server for use in out-of-
`
`band transfer. The download information element of the ’526 Patent discloses
`
`“utilizing download information for the file stored in said cache storage” (’526
`
`Claim 1) and “utilizing download information for the file stored in a cache storage
`
`of the wireless device” (’526 Claim 11). The download information (of the file to
`
`be transferred out-of-band) is sent from the wireless client device to the storage
`
`server, so that the storage server can then use that download information to transfer
`
`the data object (the file) from the remote server to the storage server out-of-band.
`
`43.
`
`In contrast to the ’526 Patent, WebDAV’s copy operation deals with
`
`transferring the file from the remote server to the storage server. WebDAV’s copy
`
`
`
`13
`
`
`
`operation does not describe that the download information (URL of the data
`
`object) is sent from the wireless client device to the storage server. In other words,
`
`the download information element of the ’526 Patent requires sending the URL of
`
`the content for out-of-band download, not the content itself as suggested in
`
`Petitioner’s WebDAV citation.
`
`iv. Major and Prust, Alone and/or in Combination, Do Not
`Teach Copy-and-Paste
`
`
`
`44. Since neither Major nor Prust teaches or mentions copy-and-paste, the
`
`combination of Major and Prust does not teach copy-and-paste.
`
`45. Furthermore, Petitioner provides no prior art evidence to support
`
`Petitioner’s theory of using the combination of web browser cache with copy-and-
`
`paste, relying instead on Petitioner’s expert whose opinions about using the
`
`combination of web browser cache and copy-and-paste are also unsupported by
`
`prior art evidence.
`
`v. The Steps of Using Copy-and-Paste from Web Browser
`Cache in Wireless Device Are Not Conventional and Not
`Obvious
`
`
`
`46. A POSITA would have known that using web browser cache along
`
`with copy-and-paste to purportedly implement utilizing download information for
`
`the file stored in the cache element (’526 Claim 1 element [1d.1b] and the
`
`corresponding element in Claim 11) would have involved the following eight steps
`
`(including six substeps) performed by the user:
`
`
`
`14
`
`
`
`47. Step 1: find a URL (the purported download information pointing to
`
`the data object) in a page on a remote server (Petitioner described this step at p. 34:
`
`“browsing the Internet to find URLs of files of interest”).
`
`48. Step 2: analyze the page to ensure that the page is cacheable (non-
`
`cacheable page will not be cached and will not meet the claim element – more
`
`about cacheable pages in subsequent sections) (Petitioner did not mention this
`
`step).
`
`49. Step 3: request the page using the client browser; the browser will
`
`render and display the page containing the URL; the browser will presumably store
`
`the page in the browser cache (if the page is cacheable), but, at this point, the page
`
`display is from the remote server, not from the browser cache.
`
`50. Step 4: request the page again from the client browser; the browser
`
`will presumably fetch the page from the browser cache (if the page was stored
`
`earlier in cache, has not expired, and has not been replaced) and then display the
`
`page; however, there is no guarantee that the page came from the browser cache,
`
`and the user cannot tell without further analysis if the page came from the cache
`
`(this step is needed only in the interpretation requiring obtaining the download
`
`information from cache storage).
`
`
`
`15
`
`
`
`51. Step 5: display the URL of the data object within the page display.
`
`For the Blackberry device (BlackBerry 6510 User Guide (Ex-1014), p. 64), the
`
`substeps to show the web link address (URL) of the data object are:
`
`52. Step 5-A: on the Home screen, click a browser icon; the startup screen
`
`appears.
`
`53. Step 5-B: after selecting the link whose address (URL) is to be
`
`viewed, click the trackwheel to view the menu and click Link Address; the
`
`Address dialog box appears, displaying the web link address (URL).
`
`54. Step 6: copy (using the copy-and-paste mechanism) the URL from the
`
`page displayed by the web browser on the wireless client device. For the
`
`Blackberry device (BlackBerry 6510 User Guide (Ex-1014), p. 159), the copy
`
`operation substeps are:
`
`55. Step 6-A: press the Alt key and click the trackwheel to enter selection
`
`mode.
`
`56. Step 6-B: hold a Shift key and roll the trackwheel to select the next
`
`character, roll the trackwheel to select the line of text.
`
`57. Step 6-C: press the Alt key and click the trackwheel to copy the
`
`selected text or character.
`
`58. Step 6-D: press the Escape button to exit selection mode.
`
`
`
`16
`
`
`
`59. Step 7: paste (using the copy-and-paste mechanism) the copied URL
`
`into an application running on the wireless client device (e.g., another browser
`
`page). For the Blackberry device, the paste operation substeps are: press a Shift
`
`key and click the trackwheel to paste the selected text or character.
`
`60. Step 8: send (using the application running on the wireless client
`
`device) the pasted URL to the storage server.
`
`61. The storage server can then use the URL to perform the out-of-band
`
`download of the data object (pointed to by the URL) from the remote server to the
`
`storage server.
`
`62. Step 4 is necessary for the interpretation that requires obtaining the
`
`download information from cache storage. Major describes that when the browser
`
`receives a page, the browser renders and displays the page as received from the
`
`remote server, rather than from cache. In other words, even though Major does not
`
`mention step 4, the user (in Major) must perform Step 4 (requesting the page again
`
`from the client browser) to ensure that the page (if cacheable) is from cache.
`
`“A method for rendering a page on a wireless communication device,
`in another aspect of the invention, comprises the steps of receiving
`the page over a wireless network, selecting a converter for the page,
`rendering the page to created a rendered page for display by a
`browser, and storing the rendered page in a page cache.” Major
`(Ex-1007), 6:1-5, emphasis added
`
`“At step 612 the content is rendered to create a page and at step
`614 the page is added to the page cache. Process 600 then returns at
`step 616.” Major (Ex-1007), 24:9-11, emphasis added
`
`
`
`17
`
`
`
`
`
`63.
`
`In my opinion, the eight steps (including the six substeps) involved in
`
`using the web browser cache along with copy-and-paste in a wireless device to
`
`purportedly implement utilizing download information for the file stored in the
`
`cache element are not conventional and not obvious on their own and not
`
`conventional and not obvious in the context of out-of-band download.
`
`64. Furthermore, I note that even with these eight steps, there is no
`
`guarantee that the URL is from the browser cache.
`
`65. Even without obtaining the download information from cache storage,
`
`in my opinion, the remaining seven steps (including the six substeps) are not
`
`conventional and not obvious, especially in the context of out-of-band download.
`
`66. Furthermore, the combination and sequence of these steps are not
`
`disclosed in Prust, Major, Chaganti, or any of the other references cited by
`
`Petitioner.
`
`
`
`vi. The User (Not the Code) Performs the Copy-and-Paste
`
`67. The’526 Patent requires program code to cause the wireless device to
`
`perform the claim elements.
`
`68