throbber

`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`_______________
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________
`
`CISCO SYSTEMS INC.,
`Petitioner
`_______________
`IPR2023-00553
`U.S. Patent No. 9,210,254
`_______________
`DECLARATION OF HENRY HOUH, PH.D.,
`UNDER 37 C.F.R. § 1.68 IN SUPPORT OF PETITION
`FOR INTER PARTES REVIEW
`
`
`
`
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 1 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`TABLE OF CONTENTS
`INTRODUCTION ..........................................................................................4
`I.
`QUALIFICATIONS AND PROFESSIONAL EXPERIENCE ......................7
`II.
`III. LEVEL OF ORDINARY SKILL IN THE ART ..........................................12
`IV. RELEVANT LEGAL STANDARDS ..........................................................13
`V.
`BACKGROUND ..........................................................................................14
`A. Associating Contact Numbers and Addresses ....................................14
`B.
`Communication Application Login Procedures .................................17
`VI. OVERVIEW OF THE ’254 PATENT..........................................................18
`VII. CLAIM CONSTRUCTION..........................................................................21
`VIII. IDENTIFICATION OF HOW THE CLAIMS ARE UNPATENTABLE ....21
`IX. THE COMBINATION OF BODART, BANISTER, AND
`DHARMARAJAN RENDERS OBVIOUS CLAIMS 1, 2, 6-8, AND 12-14
` ......................................................................................................................22
`A.
`Summary of Bodart ............................................................................22
`B.
`Summary of Banister ..........................................................................25
`C.
`Summary of Dharmarajan ..................................................................26
`D.
`Reasons to Combine Bodart with Banister and Dharmarajan ............28
`1.
`Associating a telephone number with an email address ...........29
`2.
`Associating a telephone number with an IM username ............33
`3.
`Logging into an IM service ......................................................36
`Detailed Analysis of Claims ...............................................................40
`1.
`Claim 1 .....................................................................................40
`2.
`Claim 2 .....................................................................................70
`3.
`Claim 6 .....................................................................................73
`4.
`Claim 7 .....................................................................................75
`5.
`Claim 8 .....................................................................................76
`6.
`Claim 12 ...................................................................................77
`
`E.
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 2 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`7.
`Claim 13 ...................................................................................77
`Claim 14 ...................................................................................80
`8.
`X. DE CASTRO RENDERS OBVIOUS CLAIMS 1, 2, 6-8, AND 12-14 .......81
`A.
`Summary of de Castro ........................................................................81
`B.
`Detailed Analysis of Claims ...............................................................85
`1.
`Claim 1 .....................................................................................85
`2.
`Claim 2 ...................................................................................113
`3.
`Claim 6 ...................................................................................117
`4.
`Claim 7 ...................................................................................118
`5.
`Claim 8 ...................................................................................120
`6.
`Claim 12 .................................................................................120
`7.
`Claim 13 .................................................................................121
`8.
`Claim 14 .................................................................................123
`XI. CONCLUSION ..........................................................................................123
`
`
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 3 of 124
`
`

`

`
`
`
`I.
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`I, Henry Houh, Ph.D., do hereby declare as follows:
`INTRODUCTION
`1.
`I am making this declaration at the request of Cisco Systems, Inc. in the
`
`matter of the Inter Partes Review of U.S. Patent No. 9,210,254 (“the ’254 patent”)
`
`to Hunt et al.
`
`2.
`
`I am being compensated for my work in this matter at my standard
`
`hourly rate. I am also being reimbursed for reasonable and customary expenses
`
`associated with my work and testimony in this proceeding. My compensation is not
`
`contingent on the outcome of this matter or the specifics of my testimony.
`
`3.
`
`I have been asked to provide my opinions regarding whether the
`
`subject matter of claims 1, 2, 6-8, and 12-14 (“the Challenged Claims”) of the ’254
`
`patent would have been obvious to a person having ordinary skill in the art
`
`(“POSITA”) at the time of the alleged invention, in light of the prior art. It is my
`
`opinion that the Challenged Claims would have been obvious to a POSITA.
`
`4.
`
`In the preparation of this declaration, I have studied:
`
`the ’254 patent, Ex.1001.
`
`the prosecution history of the ’254 patent (“’254 File History”),
`
`a.
`
`b.
`
`Ex. 1002.
`
`c.
`
`U.S. Pat. Pub. No. 2007/0043687 to Bodart et al. (“Bodart”),
`
`Ex.1005.
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 4 of 124
`
`

`

`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`U.S. Pat. No. 6,621,892 to Banister et al. (“Banister”), Ex.1006.
`
`U.S. Pat. No. 7,089,585 to Dharmarajan (“Dharmarajan”),
`
`
`
`
`d.
`
`e.
`
`Ex.1007.
`
`f.
`
`U.S. Pat. Pub. No. 2012/0016932 to de Castro et al. (“de
`
`Castro”), Ex.1008.
`
`5.
`
`In forming the opinions expressed below, I have considered: the
`
`documents listed above; the relevant legal standards, including the standard for
`
`obviousness; and my own knowledge and experience based upon my work in the
`
`field of network communications and security as described below, as well as
`
`portions of the following additional materials:
`
`a.
`
`Ben Langfeld, Jose de Castro, “XEP-0327: Rayo,” XMPP
`
`Standards Foundation (archived August 18, 2013) (“the Rayo Specification”),
`
`Ex.1009.
`
`b.
`
`c.
`
`U.S. Pat. No. 6,298,128 to Ramey et al. (“Ramey”), Ex.1010.
`
`John Letzing “Facebook Raises Hackles on Email,” Wall Street
`
`Journal Online, June 26, 2012 (archived June 30, 2012), (“Letzing”) Ex.1011.
`
`d.
`
`Shelley O’Hara, “Easy Microsoft® Office Outlook® 2003,”
`
`(Que Publishing, September 2003) (“O’Hara”), Ex.1012.
`
`e.
`
`U.S. Pat. No. 8,130,751 to Berkley et al. (“Berkley”), Ex.1013.
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 5 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`f.
`
`U.S. Pat. No. 7,929,519 to Goldman et al. (“Goldman”),
`
`Ex.1014.
`
`g.
`
`U.S. Pat. Pub. No. 2007/0143231 to Pegaz-Paquet et al. (“Pegaz-
`
`Paquet”), Ex.1015.
`
`h.
`
`i.
`
`j.
`
`U.S. Pat. No. 1,276,825 to Swope (“Swope”), Ex.1016.
`
`U.S. Pat. No. 2,308,778 to Prince (“Prince”), Ex.1017.
`
`U.S. Patent No. 8,090,787 to Polis et al. (“Polis”), Ex.1022.
`
`6.
`
`I have also considered the following documents as demonstrating the
`
`prior art status of the non-patent literature documents listed above, including the
`
`Rayo Specification, Letzing, and O’Hara:
`
`a.
`
`Affidavit of Authenticity of “XEP-0327: Rayo,” confirming the
`
`prior art status of the Rayo Specification, Ex.1018.
`
`b.
`
`Amazon.com listing for “Easy Microsoft® Office Outlook®
`
`2003” (archived February 1, 2008) (“Amazon”), confirming the
`
`prior art status of O’Hara, Ex.1019.
`
`c.
`
`Affidavit of Authenticity of for Letzing and Amazon, confirming
`
`the prior art status of Letzing and O’Hara, Ex.1020.
`
`d.
`
`Declaration of Jose de Castro under 37 C.F.R. § 1.68, confirming
`
`the prior art status of the Rayo Specification, Ex.1021.
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 6 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`Unless otherwise noted, all emphasis in any quoted material has been
`
`7.
`
`added. Claim terms are italicized.
`
`II. QUALIFICATIONS AND PROFESSIONAL EXPERIENCE
`8. My complete qualifications and professional experience are described
`
`in my Curriculum Vitae, a copy of which can be found in Exhibit 1004. The
`
`following is a brief summary of my relevant qualifications and professional
`
`experience.
`
`9.
`
`I received a Ph.D. in Electrical Engineering and Computer Science
`
`from the Massachusetts Institute of Technology (“MIT”) in 1998. Beforehand, I
`
`received a Master of Science degree in Electrical Engineering and Computer
`
`Science in 1991, a Bachelor of Science degree in Electrical Engineering and
`
`Computer Science in 1989, and a Bachelor of Science degree in Physics in 1990,
`
`all from MIT.
`
`10.
`
`I am currently self-employed as an independent technical consultant. I
`
`am also president of a company that provides supplemental science, technology,
`
`engineering, and mathematics (“STEM”) education to children of all ages.
`
`11.
`
`I first entered telecommunications in 1987 when I worked as a
`
`summer intern at AT&T Bell Laboratories as part of a five-year dual degree
`
`program at MIT. I continued to work at AT&T Bell Laboratories as part of this
`
`MIT program. While at MIT, I was a teaching assistant (“TA”) in the Electrical
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 7 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`Engineering and Computer Science Department’s core Computer Architectures
`
`course. I first was a TA as a senior for a role typically reserved for graduate
`
`students. I later became head TA. The course covered various topics in computer
`
`architectures. As a TA, I helped write homework assignments, lab assignments,
`
`and exams. I also taught in the recitation sections.
`
`12. Later, as part of my doctoral research at MIT from 1991-1998, I was a
`
`research assistant in the Telemedia Network Systems (“TNS”) group at the
`
`Laboratory for Computer Science. The TNS group built a high-speed gigabit
`
`network and created applications that ran over the network. Example applications
`
`included ones for remote video capture, processing, and display of video on
`
`computer terminals. In addition to working on the design of core network
`
`components, designing and building the high-speed links, and designing and
`
`writing the device drivers for the interface cards, I also set up the group’s web
`
`server.
`
`13.
`
`I also helped to build the web pages that initiated the above-
`
`mentioned video sessions via a web interface. Vice President Al Gore visited our
`
`group in 1996 and received a demonstration of—and remotely drove—a radio-
`
`controlled toy car with a wireless video camera mounted on it that was built by our
`
`group. This toy car device received commands transmitted over a network from a
`
`remote computer, and video data from the toy car was transmitted wirelessly then
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 8 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`over a computer network back to the user controller. On occasion, we allowed
`
`users visiting our web site to drive the toy car from their remote computer while
`
`they watched the video on their computer. The video stream was encoded by TNS-
`
`designed hardware, streamed over the TNS-designed network, and displayed using
`
`TNS-designed software.
`
`14.
`
`I defended and submitted my Ph.D. thesis, titled “Designing Networks
`
`for Tomorrow’s Traffic,” in January 1998. As part of my thesis research, I
`
`analyzed local area and wide area flows to show a more efficient method for
`
`routing packets in a network, based on traffic patterns at the time.
`
`15. From 1997 to 1999, I was a Senior Scientist and Engineer at NBX
`
`Corporation, a start-up that made business telephone systems for streaming
`
`packetized audio over data networks instead of using traditional telephone lines.
`
`NBX was later acquired by 3Com Corporation and the phone system is still used
`
`today by numerous businesses.
`
`16. As part of my work at NBX, I designed the core audio reconstruction
`
`algorithms for the telephones, as well as the packet transmission algorithms. I also
`
`designed and validated the core packet transport protocol used by the phone
`
`system. The protocol was used for all signaling in the phone system, including for
`
`the setup of conference calls.
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 9 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`17. The NBX system also featured a computer interface for initiating
`
`phone calls, which could also initiate conference calls. The NBX system also
`
`supported the Telephony Application Programming Interface (“TAPI”) that
`
`allowed other computer programs to integrate with our system telephony features.
`
`We obtained U.S. Patent No. 6,697,963, entitled “Telecommunication method for
`
`ensuring on-time delivery of packets containing time-sensitive data,” as part of this
`
`work.
`
`18. From 1999-2004, I was employed by Empirix or its predecessor
`
`company, Teradyne. Empirix was a leader in test tools for telecommunications
`
`protocols and systems, providing functional testing tools as well as load testing
`
`tools. From 2000-2001, I conceived and built a test platform for testing Voice-
`
`over-IP (VoIP). The first application on this new test platform was a cloud
`
`emulator for simulating the effects of transmitting VoIP over a busy network.
`
`19.
`
`In 2006, as part of my role at BBN Technologies, I helped found
`
`PodZinger Inc., now known as RAMP Inc. PodZinger utilized BBN’s speech
`
`recognition algorithms to search through the spoken words in audio and video
`
`segments. While I was Vice President of Operations and Technology, PodZinger
`
`followed its initial prototype with a full streaming audio and video search solution.
`
`I also created a social networking web site, which BBN sold to a venture-funded
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 10 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`startup company. In the process of creating the web site, I designed and specified
`
`the authentication and authorization protocols.
`
`20.
`
`I have been awarded several United States patents, and I have several
`
`patent applications pending including the following examples:
`
`•
`
`U.S. Patent No. 7,975,296, “Automated security threat testing of
`
`web pages”;
`
`•
`
`U.S. Patent No. 7,877,736, “Computer language interpretation and
`
`optimization for server testing”;
`
`•
`
`U.S. Patent No. 7,801,910, “Method and apparatus for timed
`
`tagging of media content”;
`
`•
`
`U.S. Patent 7,590,542, “Method of Generating Test Scripts Using
`
`a Voice-Capable Markup Language”;
`
`•
`
`U.S. Patent No. 6,967,963, “Telecommunication method for
`
`ensuring on-time delivery of packets containing time-sensitive data”;
`
`•
`
`U.S. Patent Application Publication No. 20070106685, “Method
`
`and apparatus for updating speech recognition databases and reindexing
`
`audio and video content using the same”;
`
`•
`
`U.S. Patent Application Publication No. 20070106693, “Methods
`
`and apparatus for providing virtual media channels based on media
`
`search”;
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 11 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`•
`
`U.S. Patent Application Publication No. 20070106760, “Methods
`
`and apparatus for dynamic presentation of advertising, factual, and
`
`informational content using enhanced metadata in search-driven media
`
`applications”;
`
`•
`
`U.S. Patent Application Publication No. 20070112837, “Method
`
`and apparatus for timed tagging of media content”;
`
`•
`
`U.S. Patent Application Publication No. 20070118873, “Methods
`
`and apparatus for merging media content”; and
`
`•
`
`U.S. Patent Application Publication No. 20090222442, “User-
`
`directed navigation of multimedia search results”.
`
`III. LEVEL OF ORDINARY SKILL IN THE ART
`21.
`I understand there are multiple factors relevant to determining the
`
`level of ordinary skill in the pertinent art, including (1) the levels of education and
`
`experience of persons working in the field at the time of the invention; (2) the
`
`sophistication of the technology; (3) the types of problems encountered in the field;
`
`and (4) the prior art solutions to those problems.
`
`22. A Person of Ordinary Skill in The Art (“POSITA”) in October 2013
`
`would have had a working knowledge of the telecommunications and networking
`
`art that is pertinent to the ’254 patent. A POSITA would have had a bachelor’s
`
`degree in electrical engineering, computer science, computer engineering, or an
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 12 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`equivalent, and two years of relevant experience in telecommunications and
`
`networking. Lack of professional experience can be remedied by additional
`
`education, and vice versa.
`
`23. For purposes of this Declaration, in general, and unless otherwise
`
`noted, my statements and opinions, such as those regarding my own experience
`
`and what a POSITA would have understood or known generally (and specifically
`
`related to the references I consulted herein), reflect the knowledge that existed in
`
`the relevant field as of the priority date of the ’254 patent.
`
`IV. RELEVANT LEGAL STANDARDS
`24.
`I am not an attorney. In preparing and expressing my opinions and
`
`considering the subject matter of the ’254 patent, I am relying on certain basic
`
`legal principles that Cisco’s counsel has explained to me.
`
`25.
`
`I understand that prior art to the ’254 patent includes patents and
`
`printed publications in the relevant art that predate the priority date of the ’254
`
`patent. For purposes of this Declaration, I am applying October 9, 2013, as the
`
`priority date of the ’254 patent.
`
`26.
`
`I have been informed by Cisco’s counsel that a claimed invention is
`
`unpatentable under 35 U.S.C. § 103 if the differences between the claimed
`
`invention and the prior art are such that the subject matter as a whole would have
`
`been obvious at the time the invention was made to a POSITA. I have also been
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 13 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`informed by Cisco’s counsel that the obviousness analysis considers factual
`
`inquiries, including the level of ordinary skill in the art, the scope and content of
`
`the prior art, and the differences between the prior art and the claimed subject
`
`matter.
`
`27.
`
`I have been further informed by Cisco’s counsel that there are several
`
`recognized rationales for combining references or modifying a reference to show
`
`obviousness. These rationales include: (a) combining prior art elements according
`
`to known methods to yield predictable results; (b) simple substitution of one
`
`known element for another to obtain predictable results; (c) use of a known
`
`technique to improve a similar device (method, or product) in the same way; (d)
`
`applying a known technique to a known device (method, or product) ready for
`
`improvement to yield predictable results; (e) choosing from a finite number of
`
`identified, predictable solutions, with a reasonable expectation of success; and (f)
`
`some teaching, suggestion, or motivation in the prior art that would have led a
`
`POSITA to modify the prior art or to combine prior art teachings to arrive at the
`
`claimed invention.
`
`V. BACKGROUND
`A. Associating Contact Numbers and Addresses
`28. Storing telephone numbers and other contact addresses, such as email
`
`addresses and instant messaging (IM) usernames, is a well-known concept in
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 14 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`telecommunications applications. Communications applications are typically
`
`installed on a user’s computer to provide the user access to one or more
`
`communications services, such as email or IM. One example of a communications
`
`application is an email application which may include an email client for accessing
`
`an email server. A user’s email address, credentials, the server and protocol to be
`
`used are configured within the application to customize the access to email for a
`
`particular user.
`
`29. Communications applications often provide a database or digital
`
`rolodex of contact information that can be managed and modified by the user. See,
`
`e.g., O’Hara, pp. 112-118 (describing how contact information is stored using
`
`Microsoft Outlook 2003). This allows the user of the application to input and store
`
`the usernames, addresses, telephone numbers, website URLs, physical addresses,
`
`and any other addressing mechanisms for each individual in their personal or
`
`professional network. The addresses are typically stored as a database and in such
`
`a way that each address or contact number is associated with its corresponding
`
`individual. In the database, the user may store their own contact numbers and
`
`addresses as well as those of their associates.
`
`30. Databases that are used to store contact information are commonly
`
`structured as relational databases. A relational database is typically embodied in a
`
`set of tables where each row in each table is associated with a record, such as for
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 15 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`an individual, designated by their name or some other unique identifier. A
`
`computer language such as Structured Query Language (SQL) may be used for
`
`accessing a relational database. However, the communications software, such as an
`
`email client, provides a more user-friendly visual interface for the user to search or
`
`browse the stored contact information in the database. The columns or entries in a
`
`row in a table may include the contact numbers and addresses, including email
`
`addresses, IM addresses, or physical addresses associated with a particular user or
`
`individual. A contact database would typically indicate a communication
`
`application or platform for each type of address in the database. For example, the
`
`each entry in an IM account table would indicate IM addresses and the associated
`
`IM platform, such as Microsoft Network (MSN) Messenger, since users may have
`
`multiple IM accounts on different platforms and different usernames on each. The
`
`structure of the relational database facilitates simple associations of its entries to an
`
`individual, such as their telephone number and associated email address. See, e.g.,
`
`Berkley, 6:55 – 7:3 (describing active user registry (AUR) databases); Goldman,
`
`11:8-17; (AUR database stores telephone numbers, fax numbers, mobile telephone
`
`numbers, e-mail addresses, etc.); Pegaz-Paquet, [0116] (a reverse address match
`
`database for locating an address associated with an originating telephone number).
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 16 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`B. Communication Application Login Procedures
`31. Access to communications services such as email or IM typically
`
`involves gaining authenticated or secure access to a remote server over the internet.
`
`Software installed on the user’s computer typically provides a user-friendly
`
`interface to login to the remote server by providing security credentials, such as a
`
`username and password. In some cases, such as with email applications, the user
`
`also provides server settings or configurations, such as the server protocol, and the
`
`name or address of the server providing the service. See O’Hara, pp. 104-105;
`
`Polis, 5:27-44. For email service, the server protocol may be post office protocol
`
`(POP), such as POP3, internet message access protocol (IMAP), or Microsoft
`
`Exchange, for example. See O’Hara, pp. 104-105; Polis, 5:27-44. For IM, the
`
`server protocol may be Extensible Messaging and Presence Protocol (XMPP). The
`
`user’s computer is commonly referred to as the client computer, and the software
`
`that accesses the remote server is called a software client. If the security credentials
`
`are accepted by the remote server, the server may provide an acknowledgement to
`
`the client computer to allow the client computer to access the user’s messages and
`
`data stored on the server.
`
`32. The acknowledgement may be provided with a digital token, or by
`
`establishing an authenticated session. See, e.g., Dharmarajan, 5:46-54. A security
`
`token is an encrypted file that has a secret key. An authenticated session also
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 17 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`involves the server providing a file to the client computer. The session file
`
`specifies a time period or timing parameters for the authenticated access.
`
`33. All of the features and functionality described in this section were
`
`well known in the early 2010s, and a POSITA would have been familiar with
`
`them.
`
`VI. OVERVIEW OF THE ’254 PATENT
`34. The ’254 patent “relates generally to integrating communications
`
`services, and in particular to managing services and applications using telephone
`
`numbers as common subscriber identifiers.” ’254 patent, 1:15-19. The ’254 patent
`
`describes provisioning telecommunications services from service providers with
`
`different ecosystems using a unified software platform. ’254 patent, Abstract, 3:55-
`
`58, 11:37-42. The ’254 patent explains that a variety of different applications may
`
`be added on request:
`
`[C]lient 110 may request to add services and applications to the existing
`telephone service provided by provider 120. Any of various service and
`applications may be requested, including video conferencing, text
`messaging, interactive texting, hosted private branch exchange (PBX)
`seats, voice mail systems, and other services and applications.
`’254 patent, 3:53-58.
`
`35. The ’254 patent explains that for “large numbers of customers … the
`
`telephone number remains the universal identifier (ID) for communicating with the
`
`outside world.” ’254 patent, 1:20-26. “However, many services and applications
`Ex.1003
`CISCO SYSTEMS, INC. / Page 18 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`are supplied by third-party providers in different ecosystems. These third-party
`
`ecosystems often use different types of IDs and have different rules and policies
`
`for managing and activating their services and applications.” ’254 patent, 1:29-33.
`
`The ’254 patent offers allegedly “new techniques for integrating advanced services
`
`and applications with legacy telephone service.” ’254 patent, 1:34-36.
`
`36. To integrate third-party applications with telephone service, the ’254
`
`patent proposes “using the telephone number as the common subscriber ID.” ’254
`
`patent, 1:40-42. The ’254 patent further explains that “the telephone number may
`
`be used as the central, unifying ID to associate services and applications that are
`
`utilized by the corresponding user.” ’254 patent, 1:46-48. When a customer adds a
`
`service, the customer’s “telephone number may be translated to a second ID that is
`
`utilized as a login ID or user name within the ecosystem of the second [service]
`
`provider.” ’254 patent, 8:47-49. This allegedly provides “a unified services enabler
`
`platform” that “may allow for the association of internet protocol (IP) enabled
`
`services with telephone numbers tied to legacy telephone services.” ’254 patent,
`
`1:43-46. The customer’s telephone number is “associated with the relevant
`
`interworking data which links all of the IDs and third-party applications and
`
`services associated with the telephone number.” ’254 patent, 12:53-58.
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 19 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`37. Fig.1 below illustrates the unified services enabler platform 140
`
`connected by internet 130 to client users 110, telephone service provider 120, and
`
`application service providers 150, 160. ’254 patent, Fig.1, 3:35-37, 4:14-28.
`
`
`38. As explained in more detail below, these concepts were well known as
`
`’254 patent, Fig.1.
`
`of the priority date of the ’254 patent. In particular, it was well-known in the prior
`
`art to integrate and provision services from different ecosystems for a single user.
`
`It was also well-known in the prior art to associate a user’s telephone number with
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 20 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`a user ID corresponding to a different service provider to provision a service. See,
`
`e.g., Banister, 2:1-5; de Castro, [0139]-[0141].
`
`VII. CLAIM CONSTRUCTION
`39.
`It is my understanding that in order to properly evaluate the ’254
`
`patent, the terms of the claims must first be interpreted. It is my understanding that
`
`for the purposes of this inter partes review, the claims are to be construed under
`
`the so-called Phillips standard, under which claim terms are given their ordinary
`
`and customary meaning as would have been understood by a POSITA in light of
`
`the specification and prosecution history, unless the inventor has set forth a special
`
`meaning for a term. I have also been informed that claim terms only need to be
`
`construed to the extent necessary to resolve the obviousness inquiry. I have
`
`reviewed the entirety of the ’254 patent, as well as its prosecution history. It is my
`
`understanding that no terms in the Challenged Claims require specific construction.
`
`VIII. IDENTIFICATION OF HOW THE CLAIMS ARE UNPATENTABLE
`40. The discussion in this Declaration provides a detailed analysis of how
`
`the asserted prior art references teach each limitation of the Challenged Claims.
`
`41. As part of my analysis, I have considered, and discuss in detail, the
`
`scope and content of the prior art and any differences between the alleged invention
`
`and the prior art.
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 21 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`42.
`
`It is my opinion that the alleged invention recited in the Challenged
`
`Claims would have been obvious in view of the teachings of the asserted prior art
`
`and the knowledge of a POSITA.
`
`IX. THE COMBINATION OF BODART, BANISTER, AND
`DHARMARAJAN RENDERS OBVIOUS CLAIMS THE
`CHALLENGED CLAIMS
`Summary of Bodart
`A.
`43. Bodart relates to “personal productivity systems” that provide for “the
`
`integration of personal and public information to enable more productive
`
`individuals by automating routine tasks.” Bodart, [0001]. Like the ’254 patent,
`
`Bodart’s systems provide users access to internet-based communications services
`
`such as voicemail, text messaging, and voice attendants. See ’254 patent, 4:14-15,
`
`24-28, 11:37-40; Bodart, Abstract, [0022], [0025], [0026], [0044], [0064], [0072].
`
`Bodart teaches a virtual assistant having “access to a user’s contacts, calendar, and
`
`location,” as well as “information about the weather, traffic, and mass transit....”
`
`Bodart, Abstract. Access to this information “augment [the virtual assistant’s]
`
`ability to make decisions on the user’s behalf.” Bodart, [0020]. The virtual
`
`assistant includes “one or more user interfaces 140 which allow a user to interact
`
`with virtual assistant” including “cell phone 145” and “conventional telephone
`
`146.” Bodart, [0030]. A schematic representation of Bodart’s system is illustrated
`
`in Fig.1, reproduced in annotated form below:
`
`Ex.1003
`CISCO SYSTEMS, INC. / Page 22 of 124
`
`

`

`
`
`
`Declaration of Henry Houh, Ph.D.
`Inter Partes Review of U.S. 9,210,254
`
`
`
`Virtual
`assistant 101
`accessible by
`telephones
`145, 146
`
`Bodart, Fig. 1 (annotated)
`
` Bodart explains that “a remote user can call into his or her virtual
`
`
`
`44.
`
`assistant and provide voice commands.” Bodart, [0026]. Further, “[v]irtual
`
`assistant 101 may include the ability to receive a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket