throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________________
`
`CISCO SYSTEMS, INC.,
`Petitioner
`v.
`ESTECH SYSTEMS, INC.,
`Patent Owner
`_____________________
`
`Case IPR2021-00329
`U.S. Patent No. 8,391,298
`_____________________
`
`EXPERT DECLARATION OF SHUKRI J. SOURI, PH.D.
`
`2007846.000 - 5703
`
`CISCO EXHIBIT 1002
`Page 1 of 138
`
`

`

`
`
`I.
`1.
`
`INTRODUCTION
`Exponent, Inc. (“Exponent”) has been retained by K&L Gates, LLP (“K&L Gates”) on
`
`behalf of Cisco System, Inc. (“Cisco”) to provide technical services and independent opinions on
`
`certain issues relating to the accompanying petition for Inter Partes Review (“IPR”) of United
`
`States patent no. 8,391,298 (“the ’298 patent”). At the request of K&L Gates, Exponent
`
`investigated specific issues relevant to this matter.
`
`2.
`
`In particular, I, Shukri Souri, was requested to review the subject material of the ’298
`
`patent, along with certain of the claims therein, and opine as to whether the requirements of these
`
`claims are disclosed by various prior art references. The opinions and comments formulated during
`
`this assessment are based on observations and information available at the time of the
`
`investigation. The findings presented herein are made to a reasonable degree of scientific certainty.
`
`I have made every effort to accurately and completely investigate all areas of concern identified
`
`during our investigation. I reserve the right to supplement this declaration if and when new
`
`information becomes available after this declaration is signed, including, but not limited to,
`
`additional discovery or documents, opinions of the court, and the opinions and testimony of other
`
`experts in this case. I reserve the right to respond to any opinions offered by other experts and to
`
`any testimony offered at trial. And, I reserve the right to create graphics or demonstratives to
`
`support my opinions if called to testify at a hearing.
`II. EXPERIENCE
`3.
`I am a salaried employee of Exponent. Exponent charges $650 per hour for my time plus
`
`expenses for work performed in connection with this project. I have received no additional
`
`compensation for work in this case, and my compensation does not depend upon the contents of
`
`this declaration, any testimony I may provide, or the ultimate outcome of the case.
`
`2007846.000 - 5703
`
`1
`
`CISCO EXHIBIT 1002
`Page 2 of 138
`
`

`

`
`
`4.
`
`Exponent is an engineering and science consulting firm headquartered at 149
`
`Commonwealth Drive, Menlo Park, California, 94025. Exponent has been retained by counsel for
`
`Cisco in this matter to provide independent technical expert consulting services. I, Shukri Souri,
`
`am the investigator for the subject matter in this declaration.
`
`5.
`
`I am a Principal and a Corporate Vice President at Exponent. I am based in, and Director
`
`of, Exponent’s New York office. I am also the Director of Exponent’s Electrical Engineering and
`
`Computer Science practice.
`
`6.
`
`I received my B.A. (Honors) and M.A. in Engineering Science from Oxford University,
`
`United Kingdom; my Master’s degree in Electrical Engineering from Stanford University,
`
`California; and my Ph.D. in Electrical Engineering, also from Stanford University, California.
`
`7.
`
`Before returning to Stanford for my Ph.D., I was a member of the staff at Raychem’s
`
`Corporate Research and Development Laboratories, where I designed and built electronic systems
`
`to target safe operation of commercial and industrial equipment. My work resulted in patents
`
`awarded by the United States, European, Japanese, and World Intellectual Property Organization
`
`patent offices.
`
`8.
`
`Prior to Exponent, I co-founded two software firms, arcadiaOne, Inc. (“arcadiaOne”) and
`
`Merenga, Inc., where I directed development teams and contributed to architecture and design,
`
`source code development, testing, and deployment of enterprise-level software. At arcadiaOne, I
`
`was an Engineering Manager with responsibilities for the development of software for the
`
`synchronous transfer of digital assets between enterprises, such as from content providers to
`
`content portals over arcadiaOne’s real-time messaging platform. At Merenga, Inc., I was Chief
`
`Executive Officer and President with responsibilities for the firm’s operations in delivering an
`
`Internet platform for the optimization of asset allocation to investors.
`
`2007846.000 - 5703
`
`2
`
`CISCO EXHIBIT 1002
`Page 3 of 138
`
`

`

`
`
`9.
`
`I have also worked with government institutions to advise on technological investigations
`
`and challenges. In 2012, I was selected to participate in a United States National Academy of
`
`Engineering Frontiers of Engineering Symposium to help address future technological challenges
`
`facing society. In 2010, I advised members of the United States Congress in their Investigation
`
`into Instances of Sudden Unintended Acceleration in Toyota Made Vehicles, as instituted by the
`
`Committee on Energy and Commerce in the House of Representatives. I led Exponent’s computer
`
`systems and software investigation of Toyota vehicles allegedly experiencing unintended
`
`acceleration.
`
`10. My experience with telephony, Internet communications technologies, messaging
`
`platforms, and software development spans over 25 years, during which time I have worked on
`
`telecommunications equipment, computer systems for real-time messaging, and software systems
`
`for Internet communications, including quantitative information and rich media streaming such as
`
`audio and video. My focus has been on the reliability and safety of such software systems,
`
`particularly as it relates to precision, accuracy, and robustness. Often, these are complex systems
`
`with integration challenges and involving fault tolerance.
`
`11. My knowledge of programming languages includes C, C++, Java, Matlab, Python, Fortran,
`
`APL, and HP-BASIC, among others. I am currently a Senior Member of the Institute of Electrical
`
`and Electronics Engineers (“IEEE”) and a Member of the Institution of Engineering and
`
`Technology in the United Kingdom.
`
`12.
`
`Additional details about my background and expertise, including publications, are further
`
`described in my professional resume, which is attached as Appendix A to this declaration.
`
`13. Materials I have considered in relation to this declaration include the ’298 patent and
`
`associated prosecution history, the prior art references relied upon within this declaration, and
`
`2007846.000 - 5703
`
`3
`
`CISCO EXHIBIT 1002
`Page 4 of 138
`
`

`

`
`
`other cited documents as indicated in footnotes. In forming my opinions, I have relied upon my
`
`education, knowledge of telecommunications and associated networking technology, and related
`
`experience.
`III. LEGAL STANDARDS
`14.
`It is my understanding that there are two ways that prior art references can render a patent
`
`claim unpatentable: anticipation and obviousness. Counsel has informed me that the petitioner has
`
`the burden in an IPR, such as this matter, to show unpatentability by a preponderance of the
`
`evidence. Counsel has told me that a preponderance of the evidence means more likely than not.
`
`15.
`
`I understand that there is a set process to determine anticipation, as follows: 1) the claims
`
`of a patent are properly construed, and 2) the claim language is then compared to the prior art on
`
`a limitation-by-limitation basis. If the prior art references contain all the elements of the claim
`
`language (explicitly or inherently), arranged as in the claims, that is considered anticipation.
`
`16.
`
`I understand that an invention is obvious when the differences between the subject matter
`
`sought to be patented and the prior art are such that the subject matter as a whole would have been
`
`obvious at the time of the invention to a person of ordinary skill in the art (“POSITA”). For this
`
`reason, I have been asked to consider the level of ordinary skill in the field that someone would
`
`have had at the time of the claimed invention.
`
`17.
`
`Counsel instructed me that in an obviousness determination the factors to consider are: 1)
`
`the scope and content of the prior art, 2) the differences between the prior art and the asserted
`
`claims, 3) the level of ordinary skill in the pertinent art, and 4) the existence of secondary
`
`considerations of non-obviousness. Secondary considerations include: a long-felt need;
`
`commercial success; unexpected results; praise of the invention; licensing; copying; failure of
`
`others; and skepticism by experts. At this point, I have not considered any evidence of secondary
`
`2007846.000 - 5703
`
`4
`
`CISCO EXHIBIT 1002
`Page 5 of 138
`
`

`

`
`
`considerations as none has been provided to me. I reserve my right to assess and respond to any
`
`such evidence should it become part of the record.
`
`18.
`
`Counsel also instructed me that an obviousness inquiry may involve assessing the
`
`motivation of a POSITA to combine references. The prior art references themselves may provide
`
`a suggestion, motivation, or reason to combine, but such a basis for combination need not come
`
`from the references themselves.
`
`19.
`
`It is also my understanding through Counsel that the combination of familiar elements
`
`according to known methods is likely to be obvious when it does no more than yield predictable
`
`results. It is further my understanding that a proper obviousness analysis focuses on what was
`
`known or obvious to a POSITA, not just the patentee.
`
`20.
`
`I have been told that combinations of the prior art should be analyzed based on the mindset
`
`of a POSITA at the time the invention was made. Counsel has advised me that in rendering my
`
`opinions, I should cast my mind back to the time the invention was made to occupy the mind of
`
`one skilled in the art who is presented only with the references, and who is normally guided by the
`
`then-accepted wisdom in the art.
`
`21.
`
`I understand that I am to perform the task referenced in the preceding paragraph without
`
`using “hindsight” reasoning. Instead, I was asked to consider the feasibility and combinability of
`
`references through the eyes of a POSITA as of May 29, 2003. As I describe below, the individual
`
`references contain statements and teachings that motivate those of ordinary skill in the art to look
`
`to the other references in the combinations I was asked to consider.
`
`22.
`
`I understand that relevant considerations for combining references include at least the
`
`following:
`
`(A) Combining prior art elements according to known methods to yield predictable results;
`
`2007846.000 - 5703
`
`5
`
`CISCO EXHIBIT 1002
`Page 6 of 138
`
`

`

`
`
`(B) Simple substitution of one known element for another to obtain predictable results;
`
`(C) Use of known techniques to improve similar devices, methods, or products in the same
`way;
`
`(D) Applying a known technique to a known device, method, or product ready for
`improvement to yield predictable results;
`
`(E) “Obvious to try,” which is choosing from a finite number of identified, predictable
`solutions with a reasonable expectation of success;
`
`(F) Known work in one field of endeavor may prompt variations of it for use in either the
`same field or a different one based on design incentives or other market forces if the
`variations are predictable to a POSITA; and
`
`(G) Some teaching, suggestion, or motivation in the prior art that would have led a POSITA
`to modify the prior art reference or to combine prior art reference teachings to arrive at the
`claimed invention.
`
`23.
`
`I have kept these considerations in mind when offering the opinions below regarding
`
`combinability, as well as when interpreting the scope and content of the references.
`IV. TECHNICAL BACKGROUND
`24.
`The subject matter of the ’298 patent relates to a phone directory for use with a Voice over
`
`Internet Protocol (“VoIP”) telephone system. VoIP is a method for transmitting voice
`
`communication, or other multimedia information that is intended to be consumed in real-time,
`
`through computer networks using the Internet Protocol (“IP”). The use of computer networks—
`
`which typically involves the Internet for communication beyond a single local area network
`
`(“LAN”)—provides an alternative to using the public switched telephone network, which is
`
`typically used by traditional telephones for transmitting standard telephone signals.
`
`2007846.000 - 5703
`
`6
`
`CISCO EXHIBIT 1002
`Page 7 of 138
`
`

`

`
`
`25.
`
`Since the claims relevant to this declaration place limitations upon how a phone directory
`
`for a telecommunications system is implemented throughout a network, such as placing restrictions
`
`upon the network architecture associated with such a directory, it is useful to discuss some
`
`technical background relevant to computer networking.
`
`26.
`
`In general, in the context of telecommunications, a network is comprised of a group of
`
`devices that are connected via appropriate physical infrastructure and that use a set of common
`
`protocols to communicate. For example, a typical computer network includes various connected
`
`computers (e.g., personal computers, network telephony devices, or the like) that each have
`
`suitable communication hardware for transmitting and receiving information to and from a
`
`network (e.g., ethernet hardware or wireless antennas); using this communication hardware, the
`
`computers connect to the network via a router, hub, or switch device that facilitates communication
`
`between the various connected computers. In some small networks, such as a small office or an
`
`individual dwelling, there may be a single router, hub, or switch device to which all the computers
`
`within the network connect; alternatively, for networks that span a larger local area—such as
`
`throughout an office building—there may be multiple routers, hubs, or switch devices, with each
`
`computer connecting to the most accessible such device to access the network.
`
`27.
`
`Networks that are largely self-contained (i.e., that define their own set of localized network
`
`addresses and span a relatively small physical region) are generally referred to as LANs. Within a
`
`LAN, devices communicate with each other either using a peer-to-peer system, which is common
`
`for small LANs such as a single home network, or using a client/server model, which is common
`
`for medium or larger LANs such as in an office building, on a school campus, or the like. In a
`
`peer-to-peer LAN, the router, hub, or switch device enables communication between connected
`
`computers by directly transmitting signals between the sender and destination computers: in effect,
`
`2007846.000 - 5703
`
`7
`
`CISCO EXHIBIT 1002
`Page 8 of 138
`
`

`

`
`
`the LAN router, hub, or switch handles delivery of information sent from a computer by directing
`
`it to the intended recipient. In contrast, a client/server-based LAN includes at least one server
`
`within the LAN to which the other devices connect, and which hosts network resources to facilitate
`
`communication between the connected devices.1 The connected computers then access network
`
`functionality using the client-server model where an application running on an individual computer
`
`(i.e., the client) makes requests for service to a different networked computer that provides this
`
`service (i.e., the server).
`
`28.
`
`A LAN can also include hardware for facilitating communication with computers that are
`
`connected to other networks that are not directly part of the LAN. For example, a LAN can include
`
`one or more modems, or other such access gateway devices, that enable connection to another
`
`LAN. Such access gateway devices, which are sometimes referred to as edge routers, are similar
`
`to a router device that coordinates communication with an individual LAN, but rather than connect
`
`individual computers to a LAN, an access gateway device connects to other access gateways on
`
`different LANs to provide a means for inter-LAN communication.2 In general, an arrangement
`
`where LANs are coupled together to form a larger network of networks is known as a wide-area
`
`network (“WAN”).3 Indeed, the Internet is an example of a WAN that is publicly accessible and
`
`global in scale: a computer within a LAN, such as a home network, or an office LAN, may connect
`
`to the Internet via a router and then access other distant computers (which may be within their own
`
`LAN) that are also connected to the Internet.
`
`
`1 https://www.tomshardware.com/reviews/local-area-network-wi-fi-wireless,3020-2.html. Accessed December 16,
`2020.
`2 In small LANs, such as an individual home network comprising one or a few devices, the router that coordinates
`the LAN can also provide access to a WAN. For example, a home router device may provide both the routing
`functionality for an associated home LAN and also comprise a modem device for facilitating connection to the
`Internet.
`3 https://www.comptia.org/content/guides/what-is-a-wide-area-network. Accessed December 16, 2020.
`2007846.000 - 5703
`
`8
`
`CISCO EXHIBIT 1002
`Page 9 of 138
`
`

`

`
`
`29.
`
`Thus, in the context of telecommunications, key networking hardware includes: 1) a means
`
`for each connected device to transmit and receive signals; 2) at least one or more routers, hubs, or
`
`switch devices that enable the other devices to connect to the LAN; 3) additional local servers to
`
`host network resources within the LAN if applicable; and, 4) network access gateways for
`
`accessing one or more WANs to enable communication with other devices that are outside of the
`
`LAN.
`
`30.
`
`Although there are many architectures that can be used to implement a network, each of
`
`which may have a specific hardware configuration and corresponding set of situation-dependent
`
`advantages or disadvantages, a typical computer network with which an ordinary network engineer
`
`would be familiar is likely to involve multiple LANs connected to each other by at least one WAN,
`
`and potentially many WANs. Communication between computers within the same LAN is
`
`generally handled locally by a router device or server that is in the LAN, wherein the router device
`
`or server facilitates delivery of transmitted information from the sending computer to the intended
`
`destination computer. Communication between computers that are in different LANs requires an
`
`additional layer of coordination to facilitate transmission between the LANs via a WAN: the
`
`sender’s communication is first transmitted to the LAN’s local access gateway device, and this
`
`local access gateway transmits the information to a distant access gateway within the destination
`
`LAN, which then handles transmitting the information to the intended destination computer that
`
`is part of this destination LAN.
`
`31.
`
`In addition to a means to physically distribute information between connected devices,
`
`network communication requires the use of suitable communication protocols to enable encoding
`
`of information and to ensure the network infrastructure can properly handle delivery of this
`
`information to its destination. Of particular relevance to the field of VoIP communication systems
`
`2007846.000 - 5703
`
`9
`
`CISCO EXHIBIT 1002
`Page 10 of 138
`
`

`

`
`
`is the IP, which is a primary communication protocol within the IP suite.4 Similar to the Open
`
`Systems Interconnection model (“OSI model”),5 the IP suite is a conceptual model and a set of
`
`communication protocols used for transmission of information throughout computer networks.
`
`The IP is located within the Internet layer of the IP suite, which is broadly comparable to the
`
`Network layer of the OSI model,6 and defines packet structures for encapsulating payload data
`
`along with header information that specifies the network location of the sender and recipient with
`
`source and destination IP addresses, respectively.
`
`32.
`
`The Internet layer of the IP suite is used in conjunction with the Transport layer, which
`
`facilitates delivery of IP packets between different network locations and adds various
`
`functionality for establishing connections between the source and destination and managing the
`
`flow, reliability, and other such performance characteristics of communication between these
`
`locations. For example, the most common Transport layer protocol for Internet communication is
`
`the Transmission Control Protocol (“TCP”), which is used to divide information into a sequence
`
`of many IP packets to be transmitted from the source, and to properly order packets and reconstruct
`
`information from packets received at a destination. The use of IP with TCP is often referred to as
`
`“TCP/IP” communication, where TCP is used to divide information into many IP packets for
`
`transmission from a source, and to facilitate various error checking and data integrity functionality
`
`when assembling the received information at the destination, such as correctly sequencing packets
`
`that arrive out of order and re-requesting missing packets.
`
`
`4 In addition to use for traffic on the Internet, the IP is widely used throughout other LANs and WANs that
`connect computer devices.
`5 See ISO/IEC 7498-1, “Information technology – Open Systems Interconnection – Basic Reference Model: The
`Basic Model,” Second edition, 1994.
`6 See https://www.electronicdesign.com/unused/article/21800810/whats-the-difference-between-the-osi-
`sevenlayer-network-model-and-tcpip. Accessed December 16, 2020.
`2007846.000 - 5703
`
`10
`
`CISCO EXHIBIT 1002
`Page 11 of 138
`
`

`

`
`
`33.
`
`For VoIP applications, however, much of the error correction functionality provided by the
`
`TCP may be undesirable due to the real-time nature of how the received signal may be consumed.
`
`For example, if a received transmission is being converted into an audio signal in real-time, there
`
`may be no benefit to re-requesting a missing packet because by the time such a re-request is
`
`fulfilled, the data may no longer be required. Thus, for VoIP or other real-time multimedia
`
`transmissions, the User Datagram Protocol (“UDP”), which provides some data integrity checking
`
`on an individual packet-by-packet basis, but does not guard against packet loss due to unreliability
`
`in the underlaying network, is often used as the Transport layer protocol for coordinating delivery
`
`of IP packets across a network. Such “UDP/IP” communication was introduced in 1980 and was
`
`widely known within the field of computer networking at the time of the ’298 patent.7
`
`34.
`
`Regardless of the Transport layer protocol used to implement VoIP, the use of IP packets
`
`necessitates the use of IP addresses for routing packets between source and destination network
`
`locations. In their raw format, however, IP addresses are difficult for humans to remember and use
`
`effectively. Thus, applications that communicate using the IP and associated networks typically
`
`include systems to translate between IP addresses and more easily remembered, human-friendly,
`
`address identifiers. As a familiar example, consider the case of browsing websites: the World Wide
`
`Web makes extensive use of Uniform Record Locators (“URLs”), such as www.example.com,
`
`which are sometimes referred to informally as “website addresses” or similar, and which eliminate
`
`the need for human users to directly enter the underlying IP address. This approach is widely
`
`adopted because the Internet includes a directory service called the Domain Name System
`
`(“DNS”) that translates between human-friendly URLs and the corresponding IP address. When a
`
`user enters www.example.com into their browser application to navigate to this website, the
`
`
`7 UDP/IP is discussed within the specification of the ’298 patent (e.g., at 4:13-56); see also
`https://tools.ietf.org/html/rfc768. Accessed November 8, 2020.
`2007846.000 - 5703
`
`11
`
`CISCO EXHIBIT 1002
`Page 12 of 138
`
`

`

`
`
`browser first sends this URL through a DNS lookup process to retrieve the corresponding IP
`
`address that is then used to connect to the corresponding web page. In effect, the DNS system acts
`
`as a distributed directory system to allow users to navigate to websites via a well-known URL or
`
`web address, without needing to know the corresponding IP address. In addition to removing the
`
`need for human users to remember IP addresses, the use of the DNS system increases flexibility
`
`and adaptability of network resources, since IP addresses can be reallocated or otherwise changed
`
`without the need to update every user. Instead, the URL for a resource can remain unchanged, but
`
`the DNS records can be updated so that the URL is directed to a different IP address.
`
`35.
`
`Similar to browser applications that enable users to navigate websites, VoIP systems
`
`typically involve an Application layer element that facilitates the use of such VoIP systems by
`
`providing a suitable user interface. Unlike browser applications for navigating the World Wide
`
`Web, which ubiquitously utilize URLs and the DNS service, there exists a range of different
`
`system-specific approaches for facilitating VoIP calls. Common to these approaches, however, is
`
`some directory interface that removes the requirement for a user to manually enter the IP address
`
`of an intended callee.
`
`36.
`
`For example, in some systems that function in a fashion similar to traditional telephone
`
`systems, a user may enter a telephone number for another phone—much like they would if using
`
`a traditional telephone system—which is converted to an IP address by a server that hosts a
`
`directory of such telephone numbers along with their corresponding IP addresses that have been
`
`configured according to the particular network. Alternately, a VoIP application may provide a user
`
`interface that enables access to directory functionality with which a user can search for and select,
`
`or otherwise identify, a desired callee and request that the system initiate a call, whereupon the
`
`system may establish communication to the corresponding IP address for the selected callee
`
`2007846.000 - 5703
`
`12
`
`CISCO EXHIBIT 1002
`Page 13 of 138
`
`

`

`
`
`without this IP address being entered, or even known, by the user who is placing the call. Indeed,
`
`as detailed below in Section VI, a variety of approaches for implementing such directory systems
`
`were known before the time of the ’298 patent.
`V. OVERVIEW OF US PATENT NO. 8,391,298
`37.
`The ’298 patent is entitled “Phone Directory In A Voice Over IP Telephone System,” and
`
`I have been informed by Counsel that this patent has a priority date of May 29, 2003. However,
`
`the opinions I offer below regarding the prior art, the combinations set forth below, or the
`
`applicability of those combinations to certain claims of the ’298 patent do not change in my mind
`
`whether the ’298 patent is entitled to this priority date or a priority date of February 1, 2001. I have
`
`not been asked at this time to perform an analysis regarding the proper priority date of the ’298
`
`patent.
`
`A. SUMMARY OF THE ’298 PATENT
`38.
`The ’298 patent is directed towards providing a phone directory system wherein “a user
`
`can dial numbers stored in a series of lists, which are stored in the system and displayed to the user
`
`of an IP telephone” (the ’298 patent, Abstract). The ’298 patent “relates in general to information
`
`processing systems, and in particular, to the use of Voice over IP technology to transmit voice
`
`conversations” (the ’298 patent, 1:24-26).
`
`39.
`
`The ’298 patent describes how voice capabilities may be added to a LAN via the inclusion
`
`of “an IP multimedia server 101 … and an IP telephony device 105” (the ’298 patent, 2:63-3:3),
`
`and states that “[a]n IP telephone, or telephony device, is any apparatus, device system, etc., that
`
`can communicate multimedia traffic using IP telephone technology” (the ’298 patent, 3:7-10).
`
`40.
`
`In general, the ’298 patent considers a network comprised of multiple LANs coupled
`
`together via a WAN, which a POSITA would understand to be typical of an enterprise network
`
`involving multiple company buildings, sites, or campuses in different geographic regions. For
`
`2007846.000 - 5703
`
`13
`
`CISCO EXHIBIT 1002
`Page 14 of 138
`
`

`

`
`
`example, Figure 3 of the ’298 patent (reproduced below) illustrates a network configuration in
`
`which two LANs, one located in Dallas (labeled 301) and the other located in Detroit (labeled
`
`302), are connected to each other and a remote IP phone within a telecommuter’s home network
`
`(labeled 303) via a WAN (labeled 201).
`
`
`
`Reproduction of Figure 3 of the ’298 patent showing an example
`network configuration.
`The WAN that connects the multiple LANs of the ’298 patent’s claims “may implement
`
`41.
`
`the IP protocol, and could be a public WAN, such as the Internet, a private data network, an
`
`intranet, a Virtual Private Network (‘VPN’), or any external network” (the ’298 patent, 3:26-29).
`
`42.
`
`The ’298 patent relates to a network phone directory in which a user of a
`
`telecommunications device connected to the network is able to view and interact with lists of
`
`telephone extensions, and automatically initiate a call by selecting a callee from these lists. For
`
`example, the ’298 patent states:
`
`2007846.000 - 5703
`
`14
`
`CISCO EXHIBIT 1002
`Page 15 of 138
`
`

`

`
`
`[a]n embodiment of the present invention permits a user at a remote site
`to easily scroll through a phone listing of users throughout the WAN …
`a user can scroll through displayed names and phone numbers of other
`users within their own LAN (e.g., 301), or a LAN at another remote
`location across the WAN 201 (e.g., LAN 302). Once a particular name
`and phone number is found via the display (e.g., display 810), then that
`user can easily press a button key (e.g., on keyboard 807) to commence
`a telephone conversation with the user having the selected name and
`phone number (the ’298 patent, 9:53-64).
`
`43. More specifically, the ’298 patent describes various “rolodex” functionality. For example,
`
`these different rolodex features, include a user-specific “personal rolodex” feature which a user
`
`can manage (the ’298 patent, 10:5-15) to curate their own preferred list of callees; a “station
`
`rolodex” feature that is established when a LAN is configured (the ’298 patent, 10:16-25) and
`
`allows any user of a workstation to search for callees; and a “site rolodex” feature that “permits a
`
`user at an IP telephone extension to locate other phone systems on the WAN 201 by site name”
`
`and enables the user to access the “site rolodex” for a selected LAN that contains the phone
`
`directory information for telecommunications devices coupled to that LAN (the ’298 patent, 10:47-
`
`64).
`
`44.
`
`During prosecution, the applicants appealed a rejection of the then-pending claims to the
`
`Board of Patent Appeals and Interferences (“BPAI”). On April 23, 2012, the Board issued a
`
`decision upholding the rejection of the then-pending claims over the combination of two references
`
`I address below, US Patent No. 6,298,057 (“Guy”) and US patent no. 6,829,231 (“Wilson”) (BPAI
`
`Decision, 5-8). In the same decision, the BPAI found that the Examiner had failed to show in the
`
`same combination of Guy and Wilson “enabling the user to select between observing the list
`
`coupled to the second and the third LAN” or “where Wilson teaches or suggests that a user may
`
`select between observing two different directories” (BPAI Decision, 11). I note this because in the
`
`Notice of Allowance for the ’298 patent, this subject matter of selecting between two directories
`
`2007846.000 - 5703
`
`15
`
`CISCO EXHIBIT 1002
`Page 16 of 138
`
`

`

`
`
`and viewing lists of LANs of those two directories was added to the claims and the claims were
`
`ultimately issued in their current form (Notice of Allowance, 3).
`
`B. PERSON OF ORDINARY SKILL IN THE ART
`45.
`Based on my consideration of the factors discussed in the Legal Standards section of this
`
`declaration, a POSITA in the art related to the technology of the ’298 patent at the Priority Date
`
`would have had a bachelor’s degree in Electrical Engineering, Computer Engineering, or an
`
`equivalent field, and at least two years of experience working in the fields of microelectronics or
`
`telecommunications, or associated network engineering or design. This POSITA would have had
`
`knowledge of design considerations known in the industry and would have been familiar with
`
`then-existing products and solutions and would have understood how to search available literature
`
`for relevant publications.
`
`C. CLAIM CONSTRUCTIONS
`46.
`I have been asked to apply the constructions in the below table for some of the terms of the
`
`’298 patent. I address these constructions in detail i

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket