throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`––––––––––
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`––––––––––
`
`META PLATFORMS, INC.,
`Petitioner,
`
`v.
`
`ANGEL TECHNOLOGIES LLC,
`Patent Owner.
`
`––––––––––
`Case IPR2023-00057
`Patent 8,954,432
`
`Case IPR2023-00058
`Patent 9,959,291
`
`Case IPR2023-00059
`Patent 10,417,275
`
`Case IPR2023-00060
`Patent 10,628,480
`
`––––––––––
`
`DECLARATION OF MARK FRIGON
`UNDER 37 C.F.R. § 1.131
`
`
`
`Angel Tech Exhibit 2005
`Meta v. Angel Tech
`IPR2023-00059
`
`

`

`I, Mark Frigon, declare:
`
`1.
`
`I am over eighteen years of age and in all respects fully competent to make this
`
`Declaration. I have personal knowledge of the facts, as stated herein, and all are true and correct.
`
`2.
`
`I am the named inventor of U.S. Patent No. 8,954,432, entitled “Users Tagging
`
`Users in Photos Online,” U.S. Patent No. 9,959,291, entitled “Users Tagging Users in Media
`
`Online” U.S. Patent No. 10,417,275, entitled “Artificial Intelligence Assisted Tagging of Users in
`
`Digital Media Online,” and U.S. Patent No. 10,628,480, entitled “Linking Tags to user Profiles.”
`
`3.
`
`Prior to September 26, 2000, I conceived and reduced to practice my invention as
`
`described and claimed in the provisional application (U.S. Provisional Application No.
`
`60/248,994) filed on November 15, 2000, from which each of the above identified patents claim
`
`priority. The provisional application was drafted in the summer of 2000 and finalized on August
`
`15, 2000 while I was living in New York. I paid for and filed the application upon my relocation
`
`to Colorado on November 15, 2000.
`
`4.
`
`As discussed below, the code developed by April 2000 demonstrate that I had a
`
`tested prototype embodying the elements of the invention claimed, and had seen that it worked for
`
`its intended purpose prior to September 26, 2000. As further evidence of this, and as detailed
`
`below, the functioning www.sacko.com website was developed between April and prior to
`
`September 26, 2000 and was selectively available to users over the internet for testing during that
`
`time period.
`
`5.
`
`What was recoverable of the code, database, and log files demonstrated the claimed
`
`invention had been conceived, coupled with reasonably continuous due diligence to reduce the
`
`invention to practice, on or before April 16, 2000. I personally wrote the code submitted herewith
`
`which embodied the elements of the invention claimed using Microsoft FrontPage, a popular web
`
`

`

`authoring platform at the time, and Microsoft Access as the database. The code was written while
`
`authoring a photo-oriented website “cmalone.com” for a friend and roommate, Chris Malone.
`
`Attached hereto as Exhibits 2006-2012 are what I believe to be true and correct copies of that code.
`
`Each of Exhibits 2006-2012 provide code that was last modified on April 16, 2000, as corroborated
`
`by the code’s metadata for each of Exhibits 2006-2013.
`
`
`
`6.
`
`The code in Exhibit 2006 for inputting a picture (pict_inpt.asp) allows for users to
`
`upload a picture to the website, provide information about the picture, and for a user to identify
`
`which people exist in the photograph. The code along with the database in Exhibit 2007
`
`(picture.mdb) generates a unique image identifier for any images uploaded by a user.
`
`7.
`
`The code in Exhibit 2008 for updating a picture (pict_upd.asp) allows any user, not
`
`just the user uploading the picture, to identify people in the photo.
`
`8.
`
`The code in Exhibit 2009 for displaying a single picture (picture.asp) retrieves from
`
`the database a listing of any people identified within the selected picture and including the unique
`
`user identifiers for each user.
`
`

`

`9.
`
`The code in Exhibit 2010 for showing all tags of users in photos (links.asp) displays
`
`a listing of all user-generated identifications along with each picture identifier (“File_ID”) and
`
`each user’s identifier (“Person_ID”). The code retrieves these relationships between the picture
`
`identifier and the user identifier from a database table (“People_in_Pict”) on line 52 of “links.asp”.
`
`This table embodies the Identifications database detailed in my specifications with a record
`
`mapping a “Person_ID” (line 89 of “links.asp”) and a “File_ID” (line 82 of “links.asp”) for each
`
`identification. The presence of this table discloses the “Identifications database 240 links
`
`information in Users database 230 with information in Images database 250” as disclosed in each
`
`of the above identified patents. It further demonstrates the conception and reduction to practice of
`
`three separate tables detailed in the specification of each of the above identified patents: the users
`
`table, an identifications table, and an images table.
`
`10.
`
`Exhibit 2011 displays a sample log file (ex0006.log, dated June 17, 2000) from the
`
`web server running the cmalone.com website, at IP address 4.22.121.22. The log files
`
`demonstrates the software was accessed by multiple users across a network with each user being
`
`identified by a unique IP address as denoted by the client ip address (the “c-ip” column). Lines 10
`
`and 19 also corroborate this with a 3rd party Alumni network website (www.infophil.com) linking
`
`into the cmalone.com website as is indicated by the user’s referring website via the cs(referrer)
`
`column. Details on Info Phil’s Alumni network at that time can be found on the Internet Archives
`
`snapshot
`
`dated
`
`June
`
`20th,
`
`2000:
`
`https://web.archive.org/web/20000620055601/http://www.alumni.net/.
`
`11.
`
`Exhibit 2012 demonstrates a code file (“messages_post.html”) which receiving
`
`naming information from a user and storing a users database. On Line 25 the code presents a form
`
`to a user comprising an input field (line 38) that allows users to include naming information to the
`
`

`

`system. Upon submission of the form by clicking the submit button (line 64) the information is
`
`sent to web server at “_vti_bin/shtml.dll/messages_post.htm” (line 25) for insertion into a users
`
`database.
`
`12.
`
`Exhibits 2006-2012 provide code which can be mapped to each and every element
`
`of the ‘432 Patent, as evidenced in the table below.
`
`Claim Element
`
`Code
`
`6. In a multi-user
`
`The code files for the web server and the log files in Exhibit
`
`computer network, a method for
`
`2011 shows a multi-user computer network (see log files)
`
`obtaining and displaying
`
`and the display of information relating to a user of the
`
`information relating to existence
`
`network an image. The presence of multiple users is
`
`of at least one user of a computer
`
`demonstrated by the multiple client devices identified by
`
`network in an image comprising:
`
`different IP addresses on line 5, line 10, line 11, line 19, and
`
`line 25.
`
`identifying users of said
`
`The web server log files sample, (“ex0006.log”) also
`
`computer network and assigning
`
`anticipates identifying users by the clients IP address (“c-
`
`a unique user identification to a
`
`ip” field) and the clients username (“c-username” field).
`
`user of said computer network;
`
`Ex-2010.
`
`Additionally, the code on lines 38, 52, and 89 of
`
`“links.asp” demonstrates the presence of an assigned
`
`unique user identifier “Person_ID” in the
`
`“People_in_Pict” table for any identification of a user in a
`
`picture. In the prototype, the “People_in_Pict” table was
`
`the precursor to the Identifications table discussed in the
`
`specification.
`
`

`

`storing said unique user
`
`identifier in an users database
`
`wherein said database is
`
`accessible by other computers of
`
`said computer network;
`
`The Microsoft Access database, “pictures.mdb”,
`
`demonstrates the storage of unique user identifiers in the
`
`“People” column of the “Picts” table:
`
`Line 52 of the “links.asp” code demonstrates unique user
`
`identifiers were also stored in a “People_In_Pict” table.
`
`Lines 82 & 89 demonstrates the “People_In_Pict” table is
`
`comprised of a “Person_ID” field and a “File_ID” field,
`
`corresponding to a user identifier and image identifier in
`
`the specifications Identifications database.
`
`obtaining image data from
`
`The code in “pict_inp.asp” receives image data from an
`
`at least one uploading user of said
`
`uploading user and the database “picture.mdb” assigns a
`
`computer network and assigning
`
`unique image identifier.
`
`a unique image identifier to said
`
`image data;
`
`Line 105 of the code begins “form” presents user interface
`
`to a user which includes a file upload element on line 115.
`
`Upon submitting the form, via a form submission button
`
`(line 138), the form sends the data to be inserted into the
`
`“Picts” table of “pictures.mdb” database (line 108). The
`
`“Picts” table of “pictures.mdb” is configured to
`
`automatically generate an image identifier for any new
`
`records, as is dictated by the “AutoNumber” datatype in
`
`Microsoft Access.
`
`

`

`
`
`
`
`
`
`The database also receives from the form and stores the
`
`name of the uploaded file in the “file_name” field.
`
`“File_name” in other embodiments might alternatively
`
`serve as a unique image identifier for the image.
`
`storing said unique image
`
`Upon insertion into the “Picts” table each image record
`
`identifier in an images database
`
`stores the associated image identifier generated from the
`
`wherein said database is
`
`“AutoNumber” data type in the “ID” field. The table also
`
`accessible by other computers of
`
`stores a unique file name on the server in the “file_name”
`
`said computer network;
`
`field.
`
`
`
`
`
`
`
`obtaining identification
`
`The picture updating code file, “pict_upd.asp”
`
`data from a first tagging user of
`
`demonstrates obtaining from a tagging user a unique
`
`said computer network, wherein
`
`image identifier and a unique user identifier of a pictured
`
`said identification data comprises
`
`user.
`
`said unique image identifier and a
`
`pictured user unique identifier of
`
`a user of said computer network
`
`pictured in said image data;
`
`Line 57 retrieves the information about the selected image
`
`from the database, including the image identifier. Line 79
`
`displays the image.
`
`

`

`Line 124 begins a “form” element for a user to send data
`
`to the server. The form element contains “input” field for
`
`information about the photo that the user can submit. The
`
`form includes a “People” input element (line 139) for a
`
`user to supply user identifiers of users in the selected
`
`image. The image identifier is embedded in the page as
`
`the user has previously selected the image to view.
`
`Upon submitting the form via a “submit” element (line
`
`151) the client sends back to the server, and the server
`
`receives the people identifiers via the “people” input data
`
`and the image identifier.
`
`storing said identification
`
`Once the identification data, including an image identifier
`
`data from said first tagging user in
`
`and a user identifier, is received from the user the code in
`
`an
`
`identifications
`
`database
`
`the related but separate “pict_upd_asp.asp” is executed.
`
`accessible by other computers of
`
`In line 47 of the code a database UPDATE command
`
`said network whereby a user
`
`executed on the “Picts” table to update the image record
`
`identifier may be associated with
`
`matching the supplied image identifier. The update
`
`one or more image identifiers and
`
`command stores user identifiers supplied by the user with
`
`an
`
`image
`
`identifier may be
`
`the image record.
`
`associated with one or more users
`
`
`
`identifiers.
`
`In addition, line 52 of the “links.asp” code demonstrates
`
`unique user identifiers were additionally, or alternatively,
`
`stored in a “People_In_Pict” table. Lines 82 & 89
`
`demonstrates the “People_In_Pict” table is comprised of a
`
`“Person_ID” field and a “File_ID” field, corresponding to
`
`

`

`a user identifier and image identifier in the specifications
`
`Identifications database.
`
`Both of the Exhibits discussed here disclose a “many-to-
`
`many” relationship between users and images: a user may
`
`be associated with many images and likewise, and image
`
`may be associated with many users.
`
`
`
`13.
`
`Exhibit 2013 displays another sample log files (ex0007.log, dated July 1, 2000)
`
`from the same web server continuing to run at the cmalone.com website from the IP address
`
`4.22.121.22 (as previously discussed and shown in the ex0006.log log file). The log files
`
`demonstrates that this was a functioning website. Line 88 of the log file further demonstrates the
`
`site was connected to the Internet as an inbound link from Yahoo’s personal profile website served
`
`as
`
`the
`
`visitors
`
`referrer
`
`as
`
`captured
`
`in
`
`the
`
`“cs(Referrer)”
`
`field:
`
`http://profiles.yahoo.com/chris_malone”.
`
`
`
`14.
`
`Exhibits 2006-2013 provide code which can be mapped to the ‘291 Patent, as
`
`evidenced in the table below.
`
`Claim Element
`
`Code
`
`1. A method implemented
`
`The code files for the web server and the log files in
`
`within a computer system including a
`
`Exhibit 2013 shows a computer system including a
`
`plurality of computing devices
`
`plurality of computing devices connected via a
`
`connected via a communications
`
`communications network, the method associating users
`
`network, the method associating users
`
`of the computer system with digital media accessible to
`
`of the computer system with digital
`
`the computer system.
`
`

`

`media accessible to one or more of the
`
`plurality of computing devices, the
`
`method comprising:
`
`identifying a plurality of users
`
`The web server log files sample in Exhibit 2013
`
`of the computer system, one or more
`
`(“ex0007.log”) shows identifying a plurality users by
`
`of the plurality of users having a
`
`the clients IP address (“c-ip” field) and the clients
`
`unique user identifier stored in
`
`username (“c-username” field). A plurality of users
`
`memory accessible to one or more of
`
`are seen by different IP addresses in line 5, line 10,
`
`the plurality of computing devices, the
`
`line 12, line 17 and subsequent unique IP addresses in
`
`plurality of users including a first user
`
`the file.
`
`and a second user, the first user being
`
`different from the second user;
`
`The Microsoft Access database, “pictures.mdb”,
`
`demonstrates the storage of unique user identifiers in
`
`determining, from memory
`
`the “People” column of the “Picts” table for a plurality
`
`accessible to one or more of the
`
`of users.
`
`plurality of computing devices,
`
`associations between descriptive
`
`information about one or more of the
`
`plurality of users and unique user
`
`Line 52 of the “links.asp” code also demonstrates
`
`unique user identifiers were also stored in a
`
`“People_In_Pict” table via the “Person_ID” field
`
`which would have referenced a unique user identifier
`
`identifiers of the users, the associations
`
`including an association between
`
`in a users table.
`
`descriptive information previously
`
`The code in Exhibit 2012 (“messages_post.html”)
`
`provided by the first user and a unique
`
`demonstrates receiving naming information from a
`
`user identifier of the first user;
`
`user and storing a users database. On Line 25, the
`
`code presents a form to a user comprising an input
`
`field (line 38) that allows users to include naming
`
`

`

`information to the system. Upon submission of the
`
`form by clicking the submit button (line 64) the
`
`information is sent to web server at
`
`“_vti_bin/shtml.dll/messages_post.htm” (line 25) for
`
`insertion into a users database.
`
`This code includes inputs from a user to submit their
`
`name (or any other descriptive information about
`
`identifying the user).
`
`determining, from memory
`
`Both the “pictures.mdb” database and the “links.asp”
`
`accessible to one or more of the
`
`code demonstrate a stored association between users
`
`plurality of computing devices,
`
`who appear in the same photo. The “pictures.mdb”
`
`associations between the plurality of
`
`demonstrates columns of people in pictures that lists IDs
`
`users, the associations including an
`
`of users side by side. Alternatively, the “links.asp”
`
`association between the first user and
`
`demonstrates the relationship between users in the same
`
`the second user;
`
`photo could be stored row by row. Beyond this specific
`
`type of relationship (pictured together), I had conceived
`
`that other forms of relationship between users would
`
`exist, such as relationships between users frequently
`
`pictured together or relationships between a user and
`
`other users whom they frequently share photos with.
`
`providing, via one or more of
`
`Both the “pictures.mdb” database and the “links.asp”
`
`the plurality of computing devices, a
`
`code show a unique user identifier that would have
`
`graphical user interface for
`
`referenced a users table. The “pictures.mdb” database
`
`presentation to the second user, the
`
`does this via a “people” column containing user
`
`graphical user interface operative to
`
`identifiers.
`
`

`

`receive one or more inputs from the
`
`The users table listed all users populated input form
`
`second user indicating a selection of
`
`allowing users to select from other users.
`
`one or more of the plurality of users
`
`
`
`from descriptive information
`
`The “links.asp” also demonstrates the storage of user
`
`associated with unique user identifiers
`
`identifiers from a “People_in_Pict” database.
`
`of the one or more of the plurality of
`
`users, the graphical user interface
`
`configured to display descriptive
`
`information associated with unique
`
`user identifiers of one or more of the
`
`plurality of users with a determined
`
`association with the second user;
`
`Since early testers would not have necessarily known
`
`the identifiers of other users I had developed a
`
`mechanism to select user from a list of other users
`
`present in the database. Additionally, the provisional
`
`application itself discloses that “the server also
`
`retrieves a list of users from the Users database (304)”
`
`and the “user information is transcribed into HTML
`
`receiving, via the
`
`elements that enable the client to select a specific user
`
`communications network, an input
`
`from the list of users (305)” See Ex-2017, pg. 4.
`
`initiated by the second user via the
`
`graphical user interface, the received
`
`input indicating a selection of the first
`
`user from descriptive information
`
`associated with the unique user
`
`identifier of the first user;
`
`The concept of further filtering this input list to users
`
`in a contact list to had been conceived at this point, and
`
`was in development at the time of drafting the
`
`provisional application from which this patent claims
`
`priority. Additionally, the provisional application
`
`itself discloses that “if the list of users is too large, one
`
`determining the unique user
`
`could narrow it down by filtering other field(s), or in
`
`identifier of the first user from the
`
`advanced situations other databases.” See Ex-2017, pg.
`
`received input initiated by the second
`
`4.
`
`user indicating the selection of the first
`
`user; and
`
`

`

`in response to receiving the
`
`Once the identification data, including an image
`
`input initiated by the second user
`
`identifier and a user identifier, is received from the
`
`indicating the selection of the first user
`
`user the code in the related but separate
`
`and to determining the unique user
`
`“pict_upd_asp.asp” is executed. In line 47 of the code
`
`identifier of the first user, storing in
`
`a database UPDATE command executed on the “Picts”
`
`memory accessible to one or more of
`
`table to update the image record matching the supplied
`
`the plurality of computing devices an
`
`image identifier. The update command stores user
`
`association between the unique user
`
`identifiers supplied by the user with the image record.
`
`identifier of the first user and the
`
`
`
`unique digital media identifier
`
`In addition, line 52 of the “links.asp” code
`
`corresponding to the digital media
`
`demonstrates unique user identifiers were additionally,
`
`selection input by the second user.
`
`or alternatively, stored in a “People_In_Pict” table.
`
`Lines 82 & 89 demonstrates the “People_In_Pict”
`
`table is comprised of a “Person_ID” field and a
`
`“File_ID” field, corresponding to a user identifier and
`
`image identifier in the specifications Identifications
`
`database.
`
`
`
`15.
`
`Exhibits 2006-2013 provide code which can be mapped to the ‘275 Patent, as
`
`evidenced in the table below.
`
`Claim Element
`
`Code
`
`1. A method implemented
`
`The code files for the web server and the log files in
`
`within a computer system including a
`
`Exhibit 2013 shows a computer system including a
`
`plurality of computing devices
`
`plurality of computing devices connected via a
`
`connected via a communications
`
`communications network, the method associating users
`
`network, the method associating users
`
`

`

`of the computer system with digital
`
`of the computer system with digital media accessible to
`
`media accessible to the computer
`
`the computer system.
`
`system, the method comprising:
`
`A plurality of users are demonstrated by the different IP
`
`addresses in line 5, line 10, line 12, line 17 and
`
`subsequent unique IP addresses in the file.
`
`distinguishing between users of
`
`The Microsoft Access database, “pictures.mdb”,
`
`the computer system via one or more
`
`demonstrates the storage of unique user identifiers in
`
`unique user identifiers stored in a
`
`the “People” column of the “Picts” table.
`
`computer-readable medium accessible
`
`to the computer system, the users of
`
`the computer system including a
`
`named user and an identifying user, the
`
`named user being different from the
`
`identifying user, the named user
`
`having naming information associated
`
`with a unique user identifier of the
`
`Line 52 of the “links.asp” code demonstrates unique
`
`user identifiers were also stored in a “People_In_Pict”
`
`table. Lines 82 & 89 demonstrates the
`
`“People_In_Pict” table is comprised of a “Person_ID”
`
`field and a “File_ID” field, corresponding to a user
`
`identifier and image identifier in the specifications
`
`Identifications database.
`
`named user;
`
`Exhibit 2012 demonstrates a code file
`
`(“messages_post.html”) which discloses receiving
`
`naming information from a user and storing a users
`
`database. On Line 25, the code presents a form to a
`
`user comprising an input field (line 38) that allows
`
`users to include naming information to the system.
`
`Upon submission of the form by clicking the submit
`
`button (line 64) the information is sent to web server at
`
`

`

`“_vti_bin/shtml.dll/messages_post.htm” (line 25) for
`
`insertion into a users database.
`
`in response to an input from the
`
`The code in “pictures.asp” shows selection of a picture
`
`identifying user indicating a selection
`
`via a hyperlink to a detail page using the image id at
`
`of an image, determining a unique
`
`line 108.
`
`image identifier corresponding to the
`
`image selected;
`
`The database “pictures.mdb” further details the field
`
`containing a hyperlink with an id.
`
`receiving, from the identifying
`
`Both the “pictures.mdb” database and the “links.asp”
`
`user, an input indicating a selection of
`
`code show a unique user identifier that would have
`
`the named user from a list of other
`
`referenced a users table. The “pictures.mdb” database
`
`users of the computer system, the list
`
`does this via a “people” column containing user
`
`of other users including naming
`
`identifiers.
`
`information previously provided by
`
`The users table listed all users populated input form
`
`other users, the list of other users
`
`allowing users to select from other users.
`
`including one or more users in a
`
`
`
`contact list associated with the
`
`The “links.asp” also demonstrates the storage of user
`
`identifying user, the identifying user’s
`
`identifiers from a “People_in_Pict” database.
`
`contact list including the named user;
`
`Since early testers would not have necessarily known
`
`in response to receiving from
`
`the identifiers of other users I had developed a
`
`the identifying user the input
`
`mechanism to select user from a list of other users
`
`indicating the selection of the named
`
`present in the database. Additionally, the provisional
`
`user from the list of other users,
`
`application itself discloses that “the server also
`
`determining a unique user identifier of
`
`retrieves a list of users from the Users database (304)”
`
`the named user;
`
`and the “user information is transcribed into HTML
`
`

`

`elements that enable the client to select a specific user
`
`from the list of users (305)” See Ex-2017, pg. 4.
`
`The concept of further filtering this input list to users in
`
`a contact list to had been conceived at this point, and
`
`was in development at the time of drafting the
`
`provisional application from which this patent claims
`
`priority. Additionally, the provisional application itself
`
`discloses that “if the list of users is too large, one could
`
`narrow it down by filtering other field(s), or in advanced
`
`situations other databases.” See Ex-2017, pg. 4.
`
`receiving, from the identifying
`
`As demonstrated in Chris Malone’s declaration, I had
`
`user, one or more inputs indicating a
`
`conceived and been working toward a way to identify
`
`set of coordinates corresponding to a
`
`the location of users in photos by boxing their face (or
`
`location of the named user within the
`
`utilizing coordinates to correspond to the location of
`
`image; and
`
`the user within the photograph).
`
`applying artificial intelligence
`
`At the time of the invention, it was known in the
`
`algorithms to image data of other
`
`industry that algorithms could be applied to find
`
`images accessible to said computer
`
`additional images with matching facial characteristics
`
`system to locate images matching
`
`of a person once the person’s face had been located
`
`characteristics of a subset of image
`
`within an image. For example, as stated in the
`
`data bound by the set of coordinates
`
`specification of each of my patents, artificial
`
`corresponding to the location of the
`
`intelligence algorithms, or image recognition systems,
`
`named user within the image, wherein
`
`may be applied against images and utilized to further
`
`the set of coordinates corresponding to
`
`define characteristics of images, obtain identifying
`
`the location of the named user within
`
`

`

`the image is associated with the unique
`
`information, and/or search a database for other
`
`user identifier of the named user and
`
`possible matches to a named object.
`
`the unique image identifier.
`
`
`
`16.
`
`As further evidence of the continued pursuit the invention, Between August 27,
`
`2000 and August 31, 2000, I made multiple purchases of web authoring software from
`
`Macromedia (now part of Adobe) as shown in the American Express Statement, Exhibit 2014.
`
`Macromedia software was a popular the web authoring software at the time and I used it to
`
`continue to build upon the technologies I previously had developed the code in April of 2000 using
`
`Microsoft FrontPage technologies, as discussed above. The website was operative and accessible
`
`to test users (although not published publicly yet) before September 26, 2000. I would grant access
`
`to friends and colleagues as test users so that they could register user profiles on the website and
`
`assist in testing its functionality.
`
`17.
`
`On September 28, 2000, the website was up and running for user registration, as
`
`demonstrated in Exhibit 2015. My September 28th email with Lisa Larson shows that by going to
`
`the website, users could register at “www.sacko.com” (the website for the business that I ultimately
`
`showcased the technology on) with a user profile.
`
`18.
`
`In summary, my statements herein and the documents concurrently submitted show
`
`conception and reduction to practice of the claimed invention prior to September 26, 2000.
`
`

`

`I declare under penalty of perjury under the laws of the United States of America that the
`
`foregoing is true and correct.
`
`Executed on
`
`
`
`2/15/2023
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Mark Frigon
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket