throbber

`
`
`
`
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Backholm, et al.
`In re Patent of:
`10,027,619 Attorney Docket No.: 39521-0089IP1/IP2
`U.S. Patent No.:
`July 17, 2018
`Issue Date:
`Appl. Serial No.: 14/609,189
`Filing Date:
`Jan. 29, 2015
`Title:
`MESSAGING CENTRE FOR FORWARDING E-MAIL
`
`
`Mail Stop Patent Board
`Patent Trial and Appeal Board
`U.S. Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`
`
`
`PETITIONER’S NOTICE RANKING PETITIONS AND EXPLAINING
`MATERIAL DIFFERENCES BETWEEN PETITIONS FOR U.S. PATENT
`NO. 10,027,619
`
`
`
`
`
`1
`
`

`

`Petitioner is filing two concurrent Petitions challenging the validity of
`
`claims of U.S. Patent No. 10,027,619 (“the ’619 patent”). Petitioner submits this
`
`paper pursuant to the Board’s July 2019 Trial Practice Guide Update.
`
`I.
`
`Ordering of Petitions
`Although Petitioner believes that both Petitions are meritorious and justified,
`
`Petitioner requests that the Board consider the Petitions in the following order:
`
`Rank Attny. Docket No. Primary Reference
`A
`39521-0089IP1
`Hind
`B
`39521-0089IP2
`Brown
`
`II. Material Differences that Compel Permitting Multiple Petitions
`A. Difference in Focus of Primary References
`While Hind and Brown are both generally directed toward e-mail redirection
`
`(by necessity, due to the subject matter of the ’619 patent), the specifications of
`
`Hind and Brown focus on different aspects of the redirection process. For
`
`example, Brown’s disclosure is largely dedicated to descriptions of authentication
`
`of a requesting device by an authenticating device through exchange of an
`
`authentication password (APPLE-1012, 1:60-4:26, 7:44-9:36; 14:15-16-67) with
`
`comparatively limited (yet still complete) disclosure of e-mail redirection (APPLE-
`
`1012, 5:37-7:43). By contrast, while Hind’s disclosure of the “PIN” used for
`
`service activation fully discloses the relevant portions of the challenged claims,
`
`such discussion of Hind’s PIN is limited to a few brief sections (APPLE-1004,
`
`
`
`2
`
`

`

`12:8-11, 17:18-31, 20:14-19, 28:25-29) while the bulk of Hind’s disclosure
`
`addresses message redirection. This difference in focus of the primary references
`
`leads to a difference in how the secondary references are applied by each Petition.
`
`B. Disclosure of the device that receives the “service activation
`code” in relation to receiving/sending the message
`Hind provides a clear and express disclosure that the device that receives the
`
`“PIN” and authenticates the requesting device (the mobile device) is the same
`
`device that redirects (receives, encrypts, and sends) the e-mail messages (the host
`
`system). APPLE-1004, 17:11-31, 28:27-29:1; Hind Petition, pp. 15-27. By
`
`contrast, the bulk of the relevant disclosure in Brown regarding device
`
`authentication refers generically to “requesting” and “authenticating” devices.
`
`APPLE-1012, 1:60-4:26, 7:64-8:15; 14:15-16-67. Due to this distinction, the
`
`Brown petition relies on obviousness arguments (based on Brown alone and an
`
`alternative argument based on the combination of Brown and Thompson) to
`
`demonstrate that it was obvious for the device that receives the authentication
`
`password to be the device that redirects messages. Brown Petition, pp. 20-42.
`
`C. Claims 32, 46 “…the encryption key is closely related to the
`service activation code.”
`The Brown reference discloses an example in which the password (which
`
`serves as Brown’s service activation code) is used as the encryption key to encrypt
`
`information (Brown Petition, pp. 48-59) while the Hind petition relies solely on a
`
`
`
`3
`
`

`

`secondary reference (Richardson) for such disclosures.
`
`D. Claim 33 “…store an association between at least two of…”
`The Hind reference discloses examples in which the PIN (which serves as
`
`Hind’s service activation code) is stored in association with an identifier of the
`
`remote device and where the PIN is stored in association with the messaging
`
`account. Hind Petition, pp. 32-33. By contrast, the Brown petition relies solely on
`
`a secondary reference (Eaton) for such disclosures.
`
`E.
`
`Claims 36, 50, 52 “…a control message is received from the
`remote device upon user interaction with the message”
`The Hind reference discloses an example in which a control message is sent
`
`from the mobile device to the host system to cause the host system to redirect an
`
`attachment to an e-mail to another device, in response to user interaction with the
`
`message. Hind Petition, pp. 33-34. By contrast, the Brown petition relies solely on
`
`a secondary reference (Friend) for these claims.
`
`F.
`Type of Prior Art
`Grounds 1 and 2 of the Hind petition rely on references (Hind, Nielsen, and
`
`Thompson) that qualify as prior art under §102(b) and therefore cannot be
`
`antedated. By contrast, Brown qualifies as prior art under §102(e) and furthermore
`
`relies on an earlier filed provisional patent application for this status, thus requiring
`
`a Dynamic Drinkware type analysis, which opens up opportunities for both
`
`antedating by the Patent Owner, and an attack of the Dyanmic Drinkware analysis.
`
`
`
`4
`
`

`

` In view of the material differences shown above, the Board should exercise
`
`its discretion to institute both Petitions. Both Petitions are necessary to show the
`
`breadth of prior art that reads on the overly broad claims. Instituting on only one
`
`Petition would give Patent Owner an unfair advantage, allowing Patent Owner to
`
`strategically attempt to distinguish its claims over the instituted prior art even if
`
`those same arguments would effectively show invalidity over the non-instituted
`
`prior art. This danger of Patent Owner gamesmanship is particularly relevant in
`
`this case, because the ’619 patent has never before been challenged in IPR, and
`
`consequently, Patent Owner has yet to take an official position of what its claims
`
`do and do not cover (other than Patent Owner’s litigation infringement contentions,
`
`which suggests that both sets of prior art are invalidating).
`
`Moreover, this is not a situation where Petitioner has filed many IPR
`
`petitions against one patent or is asserting dozens of independent grounds. Rather,
`
`Petitioner has filed only two petitions, each based on a single primary reference.
`
`Given the number of claims asserted in litigation by Petitioner, (20 claims in the
`
`’619 patent, alone), instituting two petitions is reasonable. The differences
`
`between the petitions are due to Seven’s uncertain positions and aggressive
`
`litigation strategy, which will continue until the Patent Owner Responses are filed.
`
`
`
`
`
`
`
`5
`
`

`

`
`
`Dated: January 3, 2020
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Respectfully submitted,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`/W. Karl Renner/
`W. Karl Renner, Reg. No. 41,265
`Stuart A. Nelson, Reg. No. 63,947
`Patrick J. Bisenius, Reg. No. 63,893
`Fish & Richardson P.C.
`3200 RBC Plaza, 60 South Sixth Street
`Minneapolis, MN 55402
`T: 202-783-5070
`F: 877-769-7945
`
`Attorneys for Petitioner
`
`6
`
`

`

`CERTIFICATE OF SERVICE
`
`Pursuant to 37 CFR §§ 42.6(e)(4)(i) et seq. and 42.105(b), the undersigned
`
`certifies that on January 3, 2020, a complete and entire copy of this Petitioner’s
`
`Notice Ranking Petitions And Explaining Material Differences Between Petitions
`
`was provided via Federal Express, to the Patent Owner by serving the
`
`correspondence address of record as follows:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`NK Patent Law- Seven Networks
`4917 Waters Edge Drive, Suite 275
`Raleigh NC 27606
`
`
`
`
`
`
`
`
`/Diana Bradley/
`
`Diana Bradley
`Fish & Richardson P.C.
`60 South Sixth Street, Suite 3200
`Minneapolis, MN 55402
`(858) 678-5667
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket