`
`
`
`____________
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________
`
`
`
`UNIFIED PATENTS INC.,
`
`Petitioner,
`
`v.
`
`SYNKLOUD TECHNOLOGIES, LLC,
`
`Patent Owner.
`
`____________
`
`
`
`Case IPR2019-01655
`
`U.S. Patent No. 9,098,526
`
`____________
`
`
`
`SECOND DECLARATION OF ZAYDOON (“JAY”) JAWADI
`IN SUPPORT OF PATENT OWNER’S RESPONSE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR 2019-01655
`Exhibit 2007
`
`Unified Patents v.
`SynKloud Technologies, LLC
`
`
`
`
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`
`I. BACKGROUND AND QUALIFICATIONS ..................................................... 1
`
`A. Supplement to First Declaration ......................................................................................... 6
`
`II. MATERIALS REVIEWED ................................................................................ 7
`
`A. Supplemental Materials Reviewed ..................................................................................... 7
`
`III. LEGAL UNDERSTANDING ............................................................................. 8
`
`IV. CLAIM CONSTRUCTION ................................................................................ 8
`
`V. OPINIONS ........................................................................................................... 9
`
`A.
`
`Institution Decision ............................................................................................................. 9
`
`B. Ground 1: Claims 1-3, 5-11, and 13-20 Are Not Obvious in View of Prust (Ex-1006) and
`Major (Ex-1007) ......................................................................................................................... 9
`
`a. Claims 1 and 11: Copy-and-Paste (or Typing) with Web Browser Cache Does Not
`Disclose Utilizing Download Information Stored in Cache ................................................... 9
`
`i. Purpose of the ’526 Cache .......................................................................................... 13
`
`ii.
`
`No Reason to Add Cache to Prust........................................................................... 14
`
`iii. The ’526 Patent Does Not Teach Copy-and-Paste ................................................. 19
`
`iv. Major Does Not Teach Copy-and-Paste ................................................................. 19
`
`v.
`
`Prust Does Not Teach Copy-and-Paste ................................................................... 19
`
`vi. Major and Prust, Alone and/or in Combination, Do Not Teach Copy-and-Paste ... 21
`
`vii. The Steps of Using Copy-and-Paste from Web Browser Cache in Wireless Device
`Are Not Conventional and Not Obvious ........................................................................... 22
`
`viii.
`
`The User (Not the Code) Performs the Copy-and-Paste ..................................... 25
`
`ix. URLs of Data Objects Are Not Displayed by the Browser and Cannot be Copied
`Directly Using Copy-and-Paste ........................................................................................ 29
`
`x.
`
`The Web Page Containing the URL Must Be Cacheable ....................................... 33
`
`xi. Not All Web Pages Are Cacheable or Cached........................................................ 33
`
`xii. A User Cannot Tell if a Web Page Displayed by the Web Browser Is from Cache
`or Stored in Cache ............................................................................................................. 36
`
`Prust Does Not Disclose Where the URL for the Purported Out-of-Band
`xiii.
`Download Is Obtained from.............................................................................................. 38
`
`xiv. Prust Does Not Disclose Cache Storage ................................................................. 39
`
`xv. Prust Does Not Disclose Out-Of-Band Download through Browser or through
`Operating System .............................................................................................................. 39
`
`
`
`i
`
`
`
`xvi. Typing Is Impractical .............................................................................................. 42
`
`Petitioner’s Theory Regarding Utilizing Download Information Stored in Cache
`xvii.
`is Far Fetched .................................................................................................................... 43
`
`xviii.
`
`Purpose of Major’s Cache Does Not Match the ’526 Cache .............................. 45
`
`xix. Ground 1 – Utilizing Download Information Stored in Cache: Claims 1-3, 5-11,
`and 13-20 Are Not Obvious in View of Prust (Ex 1006) and Major (Ex 1007) ............... 46
`
`b.
`
`Claims 1 and 11: Prust and Major Do Not Disclose Predefined Capacity ................. 47
`
`i. Predefined Capacity in the ’526 Patent ...................................................................... 47
`
`ii.
`
`iii.
`
`iv.
`
`v.
`
`Prust’s RAID Does Not Disclose ’526 Predefined Capacity .................................. 50
`
`Prust’s Billing Address Does Not Disclose ’526 Predefined Capacity .................. 56
`
`Prust Does Not Disclose Capacity .......................................................................... 57
`
`Prust Does Not Disclose Predefined Capacity ........................................................ 58
`
`vi. Major Does Not Disclose Predefined Capacity ...................................................... 61
`
`vii. The Combination of Prust and Major Does Not Disclose Predefined Capacity ..... 61
`
`Ground 1 – Defined Capacity: Claims 1-3, 5-11, and 13-20 Are Not Obvious in
`viii.
`View of Prust (Ex 1006) and Major (Ex 1007)................................................................. 61
`
`c. Claims 1 and 11: Prust’s Email Does Not Disclose Coupling ....................................... 62
`
`d.
`
`Claims 1 and 11: Prust’s Email Does Not Disclose Retrieving ................................. 64
`
`e. Claims 1 and 11: Prust’s Email Does Not Disclose Storing and Retrieving.................. 66
`
`f. Dependent Claims 3 and 20 ........................................................................................... 67
`
`g.
`
`A POSITA Would Not Have Been Motivated to Combine Prust with Major ........... 70
`
`i. No Reason to Add Major’s Cache to Prust................................................................. 72
`
`ii. Major’s Teachings Discourage Wireless Device Access to External Storage ........ 72
`
`iii. Major Stores Data Objects in Cache, Negating the Need for External Storage ..... 75
`
`iv.
`
`v.
`
`Prust Discourages Using Only One Mode to Access Remote Storage ................... 75
`
`Prust Does Not Disclose Out-Of-Band Download through Browser ..................... 76
`
`C. Ground 2: Claims 1-20 Are Not Obvious in View of Chaganti (Ex-1008) and Major
`(Ex-1007) .................................................................................................................................. 77
`
`a. Claims 1 and 11: Chaganti’s Drag-and-Drop (or Copy-and-Paste) with Major’s Web
`Browser Cache Does Not Disclose Utilizing Download Information Stored in Cache ....... 77
`
`i. Chaganti’s User Does Not Send a Hyperlink to the Server ........................................ 77
`
`ii.
`
`Chaganti’s Digital Item Is Not a Hyperlink (Download Information) ................... 84
`
`iii. Chaganti’s Dragging and Dropping Does Not Disclose Sending Hyperlinks ........ 85
`
`iv. Chaganti’s Server Does Not Utilize Download Information .................................. 90
`
`v.
`
`Chaganti’s FIG. 6 Does Not Disclose Download Information ............................... 93
`
`
`
`ii
`
`
`
`Petitioner’s Citations Do Not Show Sending a Hyperlink to the Server and Do Not
`vi.
`Show the Server Utilizing a Hyperlink ............................................................................. 97
`
`vii. The Steps of Using Copy-and-Paste from Web Browser Cache in Wireless Device
`Are Not Conventional and Not Obvious ........................................................................... 98
`
`viii.
`
`The User (Not the Code) Performs the Drag-and-Drop (or Copy-and-Paste) .... 98
`
`ix. URLs of Data Objects Are Not Displayed by the Browser and Cannot be Copied
`Directly Using Drag-and-Drop (or Copy-and-Paste) ........................................................ 99
`
`x.
`
`The Web Page Containing the URL Must Be Cacheable ....................................... 99
`
`xi. Not All Web Pages Are Cacheable or Cached........................................................ 99
`
`xii. A User Cannot Tell if a Web Page Displayed by the Web Browser Is from Cache
`or Stored in Cache ........................................................................................................... 100
`
`Chaganti Does Not Teach Drag-and-Drop (or Copy-and Paste) for Out-of-Band
`xiii.
`Downloads ...................................................................................................................... 100
`
`xiv. Chaganti Does Not Disclose Where the URL for the Purported Out-of-Band
`Download Is Obtained from............................................................................................ 104
`
`xv. Chaganti Does Not Teach Cache for Out-of-Band Downloads ............................ 104
`
`xvi. Ground 2 – Utilizing Download Information Stored in Cache: Claims 1-20 Are Not
`Obvious in View of Chaganti (Ex 1008) and Major (Ex 1007) ...................................... 106
`
`Claims 1 and 11: Chaganti and Major Do Not Disclose Predefined Capacity by
`b.
`Server .................................................................................................................................. 106
`
`i. Chaganti Does Not Disclose ’526 Predefined Capacity ........................................... 107
`
`Ground 2: Defined Capacity: Claims 1-20 Are Not Obvious in View of Chaganti
`ii.
`(Ex 1008) and Major (Ex 1007) ...................................................................................... 113
`
`c. Dependent Claims 3 and 20 ......................................................................................... 113
`
`d.
`
`Dependent Claims 4 and 12 ...................................................................................... 114
`
`e. Dependent Claims 6, 7, 10, 13, 14, and 15 .................................................................. 115
`
`f. A POSITA Would Not Have Been Motivated to Combine Chaganti with Major ....... 118
`
`i. Major’s Teachings Discourage Wireless Device Access to External Storage ......... 121
`
`ii.
`
`Combining Two Different Cache Implementations Is Difficult ........................... 122
`
`VI. CONCLUSION ................................................................................................123
`
`
`
`
`
`iii
`
`
`
`I, Zaydoon (“Jay”) Jawadi, declare as follows:
`
`I.
`
`BACKGROUND AND QUALIFICATIONS
`
`1. My name is Zaydoon (“Jay”) Jawadi.
`
`2.
`
`I am an independent expert and consultant. I have been retained as an
`
`expert witness on behalf of SynKloud Technologies, LLC (“SynKloud”) for the
`
`above-captioned Inter Partes Review (IPR) regarding U.S. Patent No. 9,098,526
`
`(“’526 Patent”).
`
`3.
`
`As shown in my curriculum vitae (attached as Exhibit 2002), I have a
`
`Bachelor of Science in Electrical Engineering from Mosul University, a Master of
`
`Science in Computer Science from Columbia University with a Citation for
`
`Outstanding Achievement – Dean’s Honor Student, and over 40 years of
`
`experience in software and product design and development, engineering,
`
`consulting, and management in the fields of data storage, Internet, software, data
`
`networking, computing systems, and telecommunication.
`
`4.
`
`I have worked with and possess expertise in numerous technologies,
`
`including data storage
`
`technologies and
`
`interfaces, Internet and website
`
`technologies, databases, data networking
`
`technologies and protocols, and
`
`telephony.
`
`5.
`
`From 1978 to 1980, I worked as a telecommunication/electrical
`
`engineer for Emirtel (formerly Cable and Wireless, now Etisalat). During my
`
`
`
`1
`
`
`
`employment at Emirtel, among other things, I worked on telephony and
`
`telecommunication products and services, and I developed software in assembly
`
`and high-level languages for archiving, storing, and retrieving data to and from
`
`data storage devices, such as disk drives and tape drives.
`
`6.
`
`From 1981 to 1983, I worked as a software engineer for Amdahl
`
`Corporation (now Fujitsu), a California-based major supplier of computers,
`
`systems, and data storage subsystems.
`
`7.
`
`From 1984 to 1994, I worked as a software, data storage, and systems
`
`consultant to various data storage and computer companies in California, the
`
`United States, Asia, and Europe. I provided technical consulting services in data
`
`storage, data storage systems, data storage devices, software design and
`
`development, system software, device driver software, data storage device
`
`firmware, data storage software, data storage chips, data storage tools, data storage
`
`test systems and test software, data storage and I/O protocol development systems,
`
`data storage and I/O protocol analyzers, data storage and I/O monitoring systems,
`
`and data storage manufacturing systems and software.
`
`8.
`
`From 1992 to 1996, I was President and founder of Zadian
`
`Technologies, Inc., a California-based leading supplier of networked data storage
`
`test systems, with over 50,000 units installed worldwide in mission-critical
`
`customer operations with premier high-technology customers, such as Conner
`
`
`
`2
`
`
`
`Peripherals (now Seagate), DEC (now HP), EMC (now Dell EMC), Exabyte,
`
`Fujitsu, HP, IBM, Intel, Iomega, Quantum (now Seagate), Seagate, Sony,
`
`StorageTek, Tandberg, Tandem (now HP), Toshiba, Unisys, and WD. The
`
`company’s products
`
`included
`
`test systems, manufacturing systems, and
`
`development systems for data storage devices (disk drives, tape drives, removable
`
`drives, flash drives, optical drives, CD-ROM drives, Jukeboxes, and RAID) and
`
`data storage interfaces (SCSI, ATA / IDE / ATAPI, Fibre Channel, SSA, and
`
`PCMCIA / PC Card).
`
`9.
`
`In 1996, Zadian Technologies was acquired by UK-based Xyratex
`
`International LTD (NASDAQ: XRTX, which was later acquired by Seagate,
`
`NASDAQ: STX, in 2014). Following Zadian’s acquisition by Xyratex, I became
`
`an employee of Xyratex until 1998. At Xyratex, I was a general manager of a data
`
`storage interface business unit and, subsequently, a general manager of a data
`
`networking analysis tools business unit, which designed and built Gigabit Ethernet
`
`network protocol analysis and monitoring products, which were sold, under OEM
`
`agreement, by the largest supplier of network protocol analysis and monitoring
`
`products.
`
`10. From 1999 to 2001, I was CEO, Chairman, and cofounder of Can Do,
`
`Inc., a California-based Internet eCommerce and community company. The
`
`CanDo.com website offered over 10,000 products for sale as well as extensive
`
`
`
`3
`
`
`
`consumer features, such as news, chat, messages, and product information for
`
`people with disabilities. The company also provided technologies for display
`
`magnification and sound/audio adaptation through the Internet to make websites
`
`more accessible to persons with vision and hearing impairments. The company
`
`was funded by leading venture capital firms.
`
`11. From 2001 to 2007, I was President and cofounder of CoAssure, Inc.,
`
`a California-based provider of Web-based technology services and solutions for
`
`automated telephony speech recognition and touchtone applications, serving
`
`multiple Fortune-500 companies.
`
`12.
`
`In 2009, I cofounded and have since been President of Rate Speeches,
`
`Inc., a California-based Internet company providing online services, resources, and
`
`technologies for creating, rating, evaluating, and enhancing public speaking,
`
`presentation, and communication skills. Rate Speeches also operates the
`
`ratespeeches.com website and the Speech Evaluator online software.
`
`13. Since moving to Silicon Valley in Northern California in 1981, I have
`
`worked on numerous technology products that have generated billions of dollars in
`
`sales.
`
`14.
`
`I hold a California community college lifelong computer science
`
`instructor credential. I have taught various data storage and computer technologies
`
`
`
`4
`
`
`
`to thousands of professional engineers and academic students in the United States,
`
`Europe, and Asia.
`
`15.
`
`In my work as an expert and consultant, I have examined, analyzed,
`
`and inspected numerous data storage systems, computer systems, software
`
`products, cell phone applications, tens of millions of lines of source code, and the
`
`frontend and backend software of more than 100 websites, including massive,
`
`highly-trafficked consumer and business websites.
`
`16. Through my education, industry and expert experience, and industry
`
`and expert knowledge, I have gained a detailed understanding of the technologies
`
`at issue in this case.
`
`17. My additional industry experience is in my curriculum vitae.
`
`18. My expert litigation support cases, including cases in which I have
`
`testified during the last four years as an expert, can be found in my curriculum
`
`vitae, which is Exhibit 2002.
`
`19. As such, I am qualified to provide opinions regarding the state of the
`
`art at the time the ’526 Patent was filed (which I understand to be no later than
`
`December 4, 2003) and how a person of ordinary skill in the art (“POSITA”) at
`
`that time would have interpreted and understood the ’526 Patent.
`
`20.
`
`I am being compensated for my work and any travel expenses in
`
`connection with
`
`this proceeding at my standard consulting rates.
`
` My
`
`
`
`5
`
`
`
`compensation is in no way dependent on or contingent on the outcome of my
`
`analysis or opinions rendered in this proceeding and is in no way dependent on or
`
`contingent on the results of these or any other proceedings relating to the above-
`
`captioned patent.
`
`21. Although I am not rendering an opinion about the level of skill of a
`
`POSITA proffered by Petitioner, based on my professional experience, I have an
`
`understanding of the capabilities of a person of ordinary skill in the relevant field
`
`(as such a POSITA is defined by Petitioner). Over the course of my career, I have
`
`supervised and directed many such persons. Additionally, I myself, at the time the
`
`’526 Patent was filed, qualified as at least a POSITA.
`
`A.
`
`Supplement to First Declaration
`
`22.
`
`I previously submitted a declaration dated December 18, 2019
`
`(Exhibit 2001) (“First Jawadi Declaration”) in support of the Patent Owner’s
`
`Preliminary Response of this proceeding.
`
`23.
`
`In this declaration, I provide supplemental opinions and additional
`
`supporting material. Any absence of supplemental opinions in this declaration
`
`should not be construed as my conceding any previously explicitly or implicitly
`
`expressed opinions.
`
`
`
`6
`
`
`
`II. MATERIALS REVIEWED
`
`24.
`
`In preparing this declaration, I reviewed the ’526 Patent, including its
`
`claims in view of its specification, the prosecution history of the ’526 Patent,
`
`various prior art and technical references from the time of the invention, and, the
`
`IPR2019-01655 Petition and its exhibits (1001-1021).
`
`25.
`
`I also reviewed the following references attached as exhibits:
`
`Exhibit
`Exhibit
`2003
`Exhibit
`2004
`Exhibit
`2005
`
`
`
`Description
`Microsoft Computer Dictionary, 5th Edition, Microsoft Press,
`2002
`Hypertext Transfer Protocol -- HTTP/1.1, rfc2616, June 1999
`
`Management Systems: analyses and applications, August W.
`Smith, Dryden Press, 1982
`
`A.
`
`Supplemental Materials Reviewed
`
`26.
`
`I also reviewed the following additional references attached as
`
`exhibits:
`
`Exhibit
`Exhibit
`2008
`
`Exhibit
`2009
`Exhibit
`2010
`
`
`
`
`
`Description
`How two strangers set up Dropbox and made billions; Will
`Smale; BBC News; July 16, 2018; last viewed April 29, 2020;
`https://www.bbc.com/news/business-44766487
`Web Caching; Duane Wessels; O'Reilly Media; 2001
`
`Microsoft Computer Dictionary, 5th Edition, Microsoft Press,
`2002
`
`7
`
`
`
`III. LEGAL UNDERSTANDING
`
`27.
`
`I have worked with counsel in the preparation of this Declaration.
`
`Nevertheless, the opinions, statements, and conclusions offered in this Declaration
`
`are purely my own, and were neither suggested not indicated in any way by
`
`counsel or anyone other than myself. I confirmed with counsel my understanding
`
`that the term “obvious” as used in the Petition addressed herein, and as a general
`
`matter under United States law, refers to subject matter that would have occurred
`
`to a Person of Ordinary Skill in the Art (POSITA) to which the ’526 Patent is
`
`directed without inventive or creative thought. That which is obvious, it is my
`
`understanding, flows naturally from the art and the education one of skill
`
`practicing in that art would have had in the relevant time frame, which for the ’526
`
`Patent is 2003.
`
`IV. CLAIM CONSTRUCTION
`
`28.
`
`I reviewed the comments in the Petition and Petitioner’s expert
`
`Declaration, Ex-1004, pertaining to “construction of the claims” of the ’526 Patent.
`
`My understanding is simply that, in the absence of a specific controversy, one
`
`arrives at the appropriate “construction” or definition of what is embraced by the
`
`claims of the ’526 Patent and what is excluded by those claims by a reading of the
`
`’526 Patent and arriving at what, based on that reading, the inventor of the claimed
`
`subject matter intended to protect as his invention.
`
`
`
`8
`
`
`
`V. OPINIONS
`
`29. Petitioner presents two grounds under which claims of the ’526 Patent
`
`are purportedly invalid. Petition, 1. In my opinion, as described below, Petitioner
`
`has not established a reasonable basis to conclude that the ’526 Patent claims are
`
`obvious.
`
`A.
`
`Institution Decision
`
`30.
`
`I respectfully disagree with the PTAB’s institution decision. In my
`
`opinion, Petitioner has not demonstrated that the challenged claims of the ’526
`
`Patent are unpatentable.
`
`B. Ground 1: Claims 1-3, 5-11, and 13-20 Are Not Obvious in View
`of Prust (Ex-1006) and Major (Ex-1007)
`
`31. Petitioner contends that Claims 1-3, 5-11, and 13-20 are obvious in
`
`view of Prust (Ex-1006) taken in view of Major (Ex-1007). Petition, 1. I disagree
`
`for the reasons outlined below.
`
`a. Claims 1 and 11: Copy-and-Paste (or Typing) with Web
`Browser Cache Does Not Disclose Utilizing Download
`Information Stored in Cache
`
`
`
`32. Petitioner (e.g., at pp. 10, 11, 35) argues that web browser cache along
`
`with ‘copy-and-paste’ may be used to implement “utilizing download information
`
`for the file stored in [the] cache” (’526, Claim 1, element [1d.1b]) (“utilizing
`
`download information for the file stored in a cache storage of the wireless device”
`
`
`
`9
`
`
`
`in ’526, Claim 1). I disagree with these contentions for the reasons outlined in the
`
`following sections.
`
`33. For this declaration, I will assume Petitioner’s definition of the term
`
`“out-of-band” (“out-band” in the ’526 specification) download. In summary, in
`
`out-of-band download, a wireless device directs a storage server to download an
`
`object (e.g., an image) to the storage server from a remote server that is separate
`
`from the storage server and separate from the wireless device. To accomplish the
`
`process, the wireless device sends the storage server a URL or address (termed
`
`“download information” or “downloading information” in the ’526 Patent)
`
`pointing to the object, and the storage server uses that URL or address to download
`
`the object from the remote server to the storage server out-of-band (i.e., using a
`
`connection between the storage server and the remote server, bypassing the
`
`wireless device).
`
`34.
`
`In describing out-of-band downloading, Petitioner states that “[t]he
`
`’526 Patent discloses an “additional” technique for downloading a data object into
`
`the storage space from a remote location “out-band.” Ex-1001 Fig. 3, 2:50–53,
`
`5:1–10. A POSA would prefer the term-of-art “out-of-band,” signifying wireless
`
`device 1 being outside the download path (i.e. path c). Ex-1004 ¶30.” Petition, p.
`
`3. Petitioner then describes the steps involved in the out-of-band download: “In
`
`step 1, using a web browser of wireless device 1, a user browses a page on web
`
`
`
`10
`
`
`
`server 15.” Petition, p. 4, emphasis in original. “In step 2, the wireless device
`
`sends the download information to storage server 3 via path b.” Petition, p. 5,
`
`emphasis in original. Path b is between the wireless device and the storage server.
`
`“Step 3 use URL to download file to storage server” Petition, p. 4, emphasis in
`
`original. “In step 4, the server uses the download information to download the
`
`object via path c. ... In step 5, the storage server stores the object in the user’s
`
`assigned storage space.” Petition, p. 5, emphasis in original. Path c is between the
`
`storage server and the remote server.
`
`35. Claim 1 and Claim 11 of the ’526 Patent address “download
`
`information.”
`
` Petitioner defines download information as URL.
`
` “This
`
`“information” would typically be a Uniform Resource Locator (“URL”) of a
`
`hyperlink on the page. Ex-1004 ¶31; Ex-1020 461, 479; §V.B.1.” Petition, p. 4.
`
`“The download information for the object is stored in “the cached web-pages on
`
`the wireless device.” Ex-1001 5:13–17.” Petition, p. 4. For this declaration, I will
`
`assume Petitioner’s definition of download information.
`
`36. Claim 1 and Claim 11 of the ’526 Patent recite “cache storage.”
`
`Petitioner defines cache storage as web browser cache. “For context, the ’526
`
`Patent refers to “cache” just once: “cached web-pages.” Ex-1001 5:15. A POSA
`
`understood that to refer to the web-cache of a conventional web-browser. Ex-1004
`
`
`
`11
`
`
`
`¶79.” Petition, p. 20. For this declaration, I will assume Petitioner’s definition of
`
`cache storage.
`
`37. Also, in this Declaration, I will use the terms “download information”
`
`and “downloading information” interchangeably, will use the terms “browser
`
`cache” and “web browser cache” interchangeably, and will use the terms
`
`“browser” and “web browser” interchangeably.
`
`38. Petitioner assumes that element [1d.1] does not require that the
`
`wireless device obtain the download information from cache storage as part of the
`
`[1d.1] operation. My responses address both obtaining the download information
`
`from cache storage and not obtaining the download information from cache
`
`storage.
`
`39. Even though Major and Prust do not disclose copy-and-paste,
`
`Petitioner relies on copy-and-paste, contending that web-caching and copy-and-
`
`paste were conventional. For example, Petitioner contends that “Web-caching and
`
`copy-and-paste were well-known, conventional functions of web browsers.”
`
`Petition, p. 10. Petitioner also contends that “User operations, such as copy-and-
`
`paste, were well-known for remote storage, including out-of-band downloads.”
`
`Petition, p. 12. Petitioner also contends that “for [1d.1b], while Prust taught
`
`“utilizing” the URL (i.e. download information) in response to the user email as
`
`claimed, Prust did not expressly describe that the URL was “stored in said cache
`
`
`
`12
`
`
`
`storage.” Ex-1004 ¶110. Nor did Prust explain how or where the user learned of
`
`the desired file or its URL. Ex-1004 ¶110. But a POSA would have understood that
`
`finding URLs and storing them in web-cache was an obvious use case of Prust’s
`
`system that would have occurred as part of conventional web browsing. Ex-1004
`
`¶110.” Petition, p. 32. By element [1d.1b], Petitioner refers to “through utilizing
`
`download information for the file stored in said cache storage” in ’526 Claim 1.
`
`For the reasons outlined in the following sections, I disagree with these contentions
`
`by Petitioner.
`
`
`
`i. Purpose of the ’526 Cache
`
`40. The ’526 discloses cache storage in the wireless device and uses that
`
`cache for only one purpose: storing the download information. Below are all
`
`recitations of cache in the ’526 Patent, which show that cache is used only for the
`
`purpose of storing the download information.
`
`“utilizing download information for the file stored in said cache
`storage” ’526, Claim 1, emphasis added
`
`“transmitting the downloading information cached in the wireless
`device to the storage server” Id., Claim 4, emphasis added
`
`“utilizing download information for the file stored in a cache
`storage” Id., Claim 11, emphasis added
`
`“transmitting the downloading information cached in the wireless
`device” Id., Claim 12, emphasis added
`
`
`
`
`13
`
`
`
`“obtain the downloading information for the data, which becomes
`available in the cached web-pages on the wireless device” Id., 5:14-
`16, emphasis added
`
`
`ii. No Reason to Add Cache to Prust
`
`
`
`41. Prust does not disclose cache; instead, Petitioner relies on Major for
`
`the cache limitation. Pet. 33. However, a POSITA would need a reason or
`
`motivation to add cache to Prust, whether from Major or otherwise. If there was a
`
`reason or motivation in Prust to include cache, Prust’s inventor would have
`
`included cache in Prust. However, Prust does not include or disclose any cache.
`
`42. As I describe below, there is no reason or motivation to add cache
`
`to Prust, whether from Major or otherwise. In fact, as I explain later, there is
`
`reason and motivation to NOT add cache to Prust, whether from Major or
`
`otherwise.
`
`43. Prust mentions URL (universal resource locator) only once at 6:67-
`
`7:4, which Petitioner cites.
`
`“In an alternative embodiment, the user does not attach a data file but
`includes within the electronic mail message a universal resource
`locator (URL) that indicates where storage server 210 can retrieve the
`data file to be stored.” Prust (Ex-1006) at 6:67-7:4, emphasis added
`
`44. Prust does not disclose where the user obtains such URL, where the
`
`URL is stored, or where the URL originated from. Petitioner does not offer any
`
`evidentiary support from Prust to show where the user obtains such URL, where
`
`the URL is stored, or where the URL originated from. Instead, Petitioner simply
`
`
`
`14
`
`
`
`assumes that the URL is in cache based on Petitioner’s expert opinions without any
`
`evidentiary support from Prust or otherwise. Pet. 13.
`
`45. Petitioner also relies on the theory of cutting-and-pasting of or typing
`
`in the URL. Pet. 10, 11, 12, 29, 33-38. This Petitioner theory is based only on the
`
`knowledge of the POSITA offered by Petitioner’s expert without any evidentiary
`
`support from Prust. Indeed, Prust does not mention cutting-and-pasting or typing,
`
`does not mention cutting-and-pasting or typing URLs, and does not mention
`
`cutting-and-pasting or typing URLs from cached webpages.
`
`46. Even assuming that the sequence required to cut-and-paste (or type)
`
`from a cached webpage is within the knowledge of the POSITA at the time of ’526
`
`invention, Prust (alone or in combination of Major) does not disclose, suggest, or
`
`hint at any reason for Prust to include a cache, let alone cache for storing the URL
`
`(download information). Petitioner provides no rationale for why a POSITA
`
`would add cache, whether from Major or otherwise, to Prust. In my opinion, there
`
`is no rationale for a POSITA to add cache (from Major or otherwise) to Prust. To
`
`the contrary, there is a reason for a POSITA to NOT add cache, whether from
`
`Major or otherwise, to Prust. I elaborate below.
`
`47. Prust describes that the user sends an email to the server and that the
`
`email contains a file to be stored at the server or contains a URL pointing to a
`
`location of a file to be stored at the server. Prust further describes that, upon
`
`
`
`15
`
`
`
`receipt of the email from the user, the server stores the file that is received in the
`
`email from the user or that is fetched by the server using the URL.
`
`“More specifically, in order to store data files within the remote
`virtual storage area, the user sends an electronic mail message that
`includes the data file as well as user information and target data file
`information. The storage server parses the electronic mail message
`and stores the data file within the storage area according to the target
`data file information. In addition, the user can request one or more
`data files from the storage area and electronically mail the data files to
`the user. In this manner, authorized users can easily store date files
`to or retrieve data files from his or her remote storage area from
`anywhere in the world via a global computer network such as the
`Internet or a private wide-area network.” Prust (Ex-1006) at 1:37-49,
`emphasis ad