• All Courts
  • Federal Courts
  • Bankruptcies
  • PTAB
  • ITC
Track Search
Export
Download All
Displaying 114-128 of 233 results

1043 Exhibit: Apple¿¿¿s Initial Invalidity Contentions, Seven Networks LLC v Apple Inc, Case No 219 CV 00115 JRG ED Tex August 26, 2019 Part 1 of 8

Document IPR2020-00188, No. 1043-33 Exhibit - Apple¿¿¿s Initial Invalidity Contentions, Seven Networks LLC v Apple Inc, Case No 219 CV 00115 JRG ED Tex August 26, 2019 Part 1 of 8 (P.T.A.B. May. 29...
Apple reserves the right to amend these invalidity contentions to assert these references depending on the claim construction and infringement positions SEVEN may take as the case proceeds.
Apple reserves the right to amend these invalidity contentions to assert these references depending on the claim construction and infringement positions SEVEN may take as the case proceeds.
The test for written description is “whether the disclosure of the application relied upon reasonably conveys to those skilled in the art that the inventor had possession of the claimed subject matter as of the filing date.” Ariad Pharms., Inc. v. Eli Lilly & Co., 598 F.3d 1336, 1351 (Fed. Cir. 2010).
Apple reserves the right to amend these invalidity contentions to assert these references depending on the claim construction and infringement positions SEVEN may take as the case proceeds.
Apple reserves the right to amend these invalidity contentions to assert these references depending on the claim construction and infringement positions SEVEN may take as the case proceeds.
cite Cite Document

1043 Exhibit: Apples Initial Invalidity Contentions, Seven Networks LLC v Apple Inc, Case No 219 CV 00115 JRG ED Tex August 26, 2019 Part 3 of 8

Document IPR2020-00188, No. 1043-35 Exhibit - Apples Initial Invalidity Contentions, Seven Networks LLC v Apple Inc, Case No 219 CV 00115 JRG ED Tex August 26, 2019 Part 3 of 8 (P.T.A.B. May. 29, 2...
“The present invention relates generally to data communications between a number of information providers and a push server across a computer network.
Further motivations to combine references and additional details may be found in the Cover Pleading and Exhibit 968-8. receive a first transaction from the first [1 i] device in resonse to user inut at the first Fox discloses this claim limitation.
’968 Patent — Claim 1 Fox Motivations to combine may come from the knowledge of the person of ordinary skill themselves, or from the known problems and predictable solutions as embodied in these references.
“The present invention relates generally to data communications between a number of information providers and a push server across a computer network.
“The present invention relates generally to data communications between a number of information providers and a push server across a computer network.
cite Cite Document

1043 Exhibit: SEVEN v Apple Invalidity Cover Pleading Part 7d

Document IPR2020-00188, No. 1043-41 Exhibit - SEVEN v Apple Invalidity Cover Pleading Part 7d (P.T.A.B. May. 29, 2020)
Emals from ISP Saw ‘9 Mable Wlmhs‘ Cmnnumcalbn: Davie- Upon Rental 0’ New Email Norm tram cnanl Eman Notation
Computer Ellabllsh Selm- Permanem HTTP Ccmodion wl Emmi Proxy Server (Clem GFI' Ramos!)
[1m] wherein a third transaction is received by the server in response to user input at the second device Roberts discloses this claim limitation.
For example, see the following passages and/or figures, as well as all related disclosures: “In the direct access system 200, users receive email on their mobile wireless communications devices 250 from multiple external accounts, and when
For example, see the following passages and/or figures, as well as all related disclosures: ... _ _ , _ “The identifier module 720 provrdes a centralized authentication serv1ce for the direct access system 200 and other services.
cite Cite Document

1043 Exhibit: SEVEN v Apple Invalidity Cover Pleading Part 7c

Document IPR2020-00188, No. 1043-40 Exhibit - SEVEN v Apple Invalidity Cover Pleading Part 7c (P.T.A.B. May. 29, 2020)
“In accordance with another advantageous aspect, a computer-readable medium may have computer-executable instructions for causing the user computer 36 to erform stets includin- .eriodicall -,ollin the ISP server 34 to detect new
The computer-readable medium of claim 21 further having computer- executable instructions for causing the user computer to establish a semi- permanent Hyper Text Transfer Protocol (HTTP) connection with the email proxy server.” Roberts at 20:22-25.
Motivations to combine may come from the knowledge of the person of ordinary skill themselves, or from the known problems and predictable solutions as embodied in these references.
The method of claim 16 further comprising establishing a semi-permanent I-I uer Text Transfer Protocol HTTP connection between the client email
The computer-readable medium of claim 21 further having computer- executable instructions for causing the user computer to establish a semi- perrnanent Hyper Text Transfer Protocol (HTTP) connection with the email proxy server."
cite Cite Document

1042 Exhibit: Sevens Notice Regarding Claim Reduction, Seven Networks LLC v Apple Inc, Case No 219 CV 00115 JRG ED Tex April 7, 2020

Document IPR2020-00188, No. 1042-32 Exhibit - Sevens Notice Regarding Claim Reduction, Seven Networks LLC v Apple Inc, Case No 219 CV 00115 JRG ED Tex April 7, 2020 (P.T.A.B. May. 29, 2020)
SEVEN hereby elects the following 36 claims pursuant to the Court’s Order (Dkt. 40), without prejudice as to non-elected claims and non-elected patents.
SEVEN reserves the right to seek leave of court to add, delete, substitute, or otherwise amend this list of asserted claims should further discovery or other circumstances so merit.
• • • • • • • • • ’550 patent: claims 1, 15, 18 ’127 patent: claims 24, 33, 42 ’968 patent: claims 1, 3, 5, 20 ’557 patent: claims 1, 14 ’476 patent: claims 1, 13, 23, 33, 43 ’176 patent: claims 1, 5, 8, 14 ’029 patent: claims 1, 7, 12 ’734 patent: claims 1, 6, 9 ’534 patent: claims 1, 7, 9, 11
’771 patent: claims 1, 14, 26, 28, 30 • Dated: April 7, 2020
cite Cite Document

1012 Exhibit: US Pat No 7,801,959 Lennie

Document IPR2020-00188, No. 1012-11 Exhibit - US Pat No 7,801,959 Lennie (P.T.A.B. Dec. 2, 2019)
It has proven convenient at times, princi- pally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
Computer system 110 also includes an optional data storage device 104 (e.g., thin profile removable memory) coupled with the bus 99 for storing infor- mation and instructions.
System 110 also includes an optional cursor control or directing device 107 coupled to the bus for communicating user input information and command selections to the central processor 101.
As illustrated in FIG. 4, the NPS 210 provides the neces- sary translation, compression, and load distribution services that are required to deliver notifications between the mail servers 310 and the wireless network 340.
Using this optional feature, the NPS 210 can support a number of text commands for changing its configuration, checking status, displaying trace information, testing connec- tivity, etc. SNMP Interface.
cite Cite Document

1015 Exhibit: Munford Declaration Part 2 of 2

Document IPR2020-00188, No. 1015-21 Exhibit - Munford Declaration Part 2 of 2 (P.T.A.B. Dec. 2, 2019)
The purpose in these sequence numbers is to prevent packets that get delayed in the network from being delivered later and then misinterpreted as part of an existing connection.
The Host Requirements RFC provides three reasons not to use them: (1) they can cause perfectly good connections to be dropped during transient failures, (2) they consume unnecessary bandwidth, and (3) they cost money on an internet that charges by the packet.
A common example showing the need for the keepalive feature nowadays is when personal computer users use TCP/IP to login to a host using Telnet.
When this next probe takes place, notice that we never see the TCP segments on the cable, because the host is not responding to ARP requests.
Here is the interactive session: bsdi % sock -K svrd echo hi there hi there read error: Connection reset by peer -K to enable keepalive option type this to verify connection is up and this is echoed backfrom other end here server is rebooted while disconnectedfrom Ethernet Figure 23.2 shows the tcpdump output.
cite Cite Document

1013 Exhibit: US Pat App Pub No 20020068559 Sharma

Document IPR2020-00189, No. 1013-10 Exhibit - US Pat App Pub No 20020068559 Sharma (P.T.A.B. Dec. 2, 2019)
The network management server also employs secure interfaces for receiving events, and real-time connec- tion and configuration data, from the mobile wireless capable device.
In such embodiments, the distributor or service provider preferably has been granted appropriate authoriza- tion and management responsibilities and privileges for at least a portion of the enterprise 102 network.
The media used to establish communication of the mobile wireless capable devices with the local and the central NMS may vary as suitable depend- ing on the technologies used.
Preferably, the amount and security context of infor- mation routed over the WAN link is configurable by a network administrator to prevent unauthorized reception or access.
Preferably, an appro- priate fault notification is presented to a network manager at a mobile wireless capable device in accordance with a tracked security, interest and location of the administrator.
cite Cite Document

1008 Exhibit: Stevens, TCP IP Illustrated The Protocols

Document IPR2020-00188, No. 1008-7 Exhibit - Stevens, TCP IP Illustrated The Protocols (P.T.A.B. Dec. 2, 2019)
No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form, or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior consent of the publisher.
Exercises 17.1 We’ve covered the following packet formats, each of which has a checksurn in its corre- sponding header: 1P, ICMP, IGMP, UDP, and TCP.
17.2 Why do all the Internet protocols that we've discuSSed ([F', ICMP, IGl‘vIP, UDP, TCP) quietly discard a packet that arrives with a checksum error?
Most implementations provide a configuration option (Appendix E and Figure E.l) that lets the system administrator specify whether different subnets are local or nonlocal.
The important fact here is that sun cannot send a segment with more than 256 bytes of 1': data, since it received an M88 option of 256 (line 2).
cite Cite Document

1016 Exhibit: US Provisional Application Serial No 60346881 Part 1 of 3

Document IPR2020-00188, No. 1016-14 Exhibit - US Provisional Application Serial No 60346881 Part 1 of 3 (P.T.A.B. Dec. 2, 2019)
$4,000 $2,000 $_ 2005 2004 2003 2002 2001 Sources: Goldman Sachs, Morgan Stanley Dean Witter, SEVEN analysis As customer churn becomes more costly, operators will move up the value chain The core of a mobile operator’s business has historically been the delivery of information over their network (i.e. “network transport”).
In fact, recent analysis suggests that only 10-30% of an enterprise’s workforce will use mobile data services as a critical part of every workday, making it un-economical for enterprises to pay for, deploy and manage a significant amount of new hardware and software to serve this targeted user base.
Augmented by professional servrces and transitional hosting, SEVEN can help mobile operators launch enterprise data services in the shortest possible time while maintaining the long-term financial advantages of owning the software and infrastructure.
Our solid management team is drawn from the industry's leading telecom, wireless and enterprise companies, including Excite@Home, WebMD, BellSouth, Oracle, Amazon, Ascend, Microsoft, Sun, Netscape, and Openwave.
Our solid management team is drawn from the industry’s leading telecom, wireless and enterprise companies, including Excite@Home, WebMD, BellSouth, Oracle, Amazon, Ascend, Microsoft, Sun, Netscape, and Openwave.
cite Cite Document

1003 Exhibit: Tittel Declaration

Document IPR2020-00189, No. 1003-30 Exhibit - Tittel Declaration (P.T.A.B. Dec. 2, 2019)
I was on the adjunct faculty for Austin Community College from 1997 to 2001 in the Adult and Continuing Education program, wherein I taught courses on HTML, TCP/IP, Windows NT Server administration, and networking, all aimed at practicing and aspiring webmasters.
During this time frame, I also developed and wrote textbooks on networking, TCP/IP, and various versions of Windows Server and desktop operating systems (among other similar topics) aimed at the community college market for Course Technology, Inc.
For example, when there is a design need or market pressure to solve a problem and there are a finite number of identified, predictable solutions, a POSITA has good reason to pursue the known options within his or her technical grasp because the result is likely the product not of innovation but of ordinary skill and common sense.
Instead, Boyle explains that “an important object” of his solution is to “allow[] users to retrieve the updated information when needed” but “without incurring uncontrollable costs and increasing unnecessary network traffics” that would otherwise result from automatically fetching content each time a notification was received at a client device 106.
As I explained above regarding this Fiatal-Kiss-Spacey-Outlook2000 combination (Section IX.A), it would have been obvious for the resulting system to send any of the non-IP based triggers disclosed in Kiss or Fiatal (e.g., SMS message 126) to mobile device 21 upon the management server’s receipt of pushed email from PC 38.
cite Cite Document

1014 Exhibit: Hazel, Exim The Mail Transfer Agent

Document IPR2020-00188, No. 1014-13 Exhibit - Hazel, Exim The Mail Transfer Agent (P.T.A.B. Dec. 2, 2019)
In addition to the plain text version that is included in the distribution, the manual can be downloaded in HTML (for faster browser access), in PostScript or PDF (for printing), and in Texinfo format for the info command.
However, when an application program or script needs to send a mail message as part of some automatic activity, it normally calls the MTA directly without involv- ing an MUA.
* * Exim 3.20 does contain a facility for making a “callback” to verify that an incoming sender address is acceptable as a recipient to a host that handles its domain, but this is a costly approach that is not suitable for use on busy systems.
Overview of the DNS 2] The enormous increase in the amount of unsolicited mail being transmitted over the Internet has caused MTA implementors to add facilities for blocking certain types of message as a matter of policy.
While a basic configuration is easy to read and can be created quickly, Exjm’s syntax and behavior do get more subtle as you enter complicated areas like virtual hosting, filtering, and automatic replies.
cite Cite Document

1043 Exhibit: Apple¿¿¿s Initial Invalidity Contentions, Seven Networks LLC v Apple Inc, Case No 219 CV 00115 JRG ED Tex August 26, 2019 Part 6 of 8

Document IPR2020-00188, No. 1043-38 Exhibit - Apple¿¿¿s Initial Invalidity Contentions, Seven Networks LLC v Apple Inc, Case No 219 CV 00115 JRG ED Tex August 26, 2019 Part 6 of 8 (P.T.A.B. May. 29...
’96s Patent — Claim 2 Nokia 6310 System a Note: If the digital signature icon does not appear, this means that there is a security breach, and you should not enter any personal data such as your signing PIN.
’968 Patent — Claim 3 Nokia 6310 System a Note: If the digital signature icon does not appear, this means that there is a security breach, and you should not enter any personal data such as your signing PIN.
’968 Patent — Claim 4 Nokia 6310 System a Note: If the digital signature icon does not appear, this means that there is a security breach, and you should not enter any personal data such as your signing PIN.
’968 Patent — Claim 5 Nokia 6310 System a Note: If the digital signature icon does not appear, this means that there is a security breach, and you should not enter any personal data such as your signing PIN.
’96s Patent — Claim 6 Nokia 6310 System a Note: If the digital signature icon does not appear, this means that there is a security breach, and you should not enter any personal data such as your signing PIN.
cite Cite Document

1015 Exhibit: Munford Declaration Part 1 of 2

Document IPR2020-00188, No. 1015-20 Exhibit - Munford Declaration Part 1 of 2 (P.T.A.B. Dec. 2, 2019)
These records are typically written in Machine Readable Catalog (herein referred to as “MARC”) code and contain information such as a physical description of the material, metadata from the material’s publisher, and date of library acquisition.
Professional Development Library Of Michigan Beginning Workshop, May 2008 Petoskey, MI ● Received training in cataloging, local history, collection management, children’s literacy and reference service.
Acquisitions Editor: Sherri Morningstar Technical Editor: Gayle Ehrenman Editorial Manager: Mary C. Corder Media Development Manager: Heather Dismore Layout and Graphics: Angela F. Hunckler, Brent Savage, Janet Seib, Jacque Schneider, Rashell Smith, Michael Sullivan, Brian Torwelle Proofreaders: Christine Berman, Kelli Botta, Vickie Broyles, Joel K. Draper, Jennifer Mahern, Brian Massey, Nancy Price, Ethel Winslow, Rebecca Senninger, Janet Withers Editorial Assistant: Allison Walthall Indexer: Sham“ Hilgenbe'g Special Help Suzanne Thomas
LibraryWebsite I Search I Catalog I Anicies&Fuil-Text Databases E-journalTitles Images © 2019 Corneil University Library | Privacy] Web Accessibility Assistance Feed back Release Notes
TCP/IP Illustrated, Volume 1 Addison-Wesley Professional Computing Series Brian W. Kemighan, Consulting Editor Ken Arnold/John Peyton, A C User's Guide to ANSI C Tom Cargill, C++ Programming Style David A. Curry, UNIX® System Security: A Guide for Users and System Administrators Scott Meyers, Effective C++: 50 Specific Ways to Improve Your Programs and Designs Robert B. Murray, C ++ Strategies and Tactics John K. Ousterhout, Tcl and the Tk Toolkit Craig Partridge, Gigabit Networking Radia Perlman, Interconnections: Bridges and Routers David M. Piscitello/A.
cite Cite Document

1017 Exhibit: WAP Push Architectural Overview

Document IPR2020-00188, No. 1017-17 Exhibit - WAP Push Architectural Overview (P.T.A.B. Dec. 2, 2019)
2001, Wireless Application Protocol Forum, Ltd. All rights reserved WAP-250-PushArchOverview-20010703-a, Version 03-Jul-2001 Page 6 (24) [PushMsg] [PushOTA] [PushPAP] [PushPPG] [PushSI] [PushSL]
PAP is based on standard Internet protocols; XML is used to express the delivery instructions, and the push content can be any MIME media type.
Its responsibilities include acting as an access point for content pushes from the Internet to the mobile network, and everything associated therewith (authentication, address resolution, etc).
2001, Wireless Application Protocol Forum, Ltd. All rights reserved WAP-250-PushArchOverview-20010703-a, Version 03-Jul-2001 Page 13 (24) The PPG may also send a notification to the PI when the final status of the push submission (delivered, cancelled, expired, etc.) has been reached, if the PI so requests.
When OTA-HTTP (see section 8.2) is used, the PPG may use deflate encoding [RFC1951] (i.e. general compression) to obtain better over-the-air efficiency also for content types that do not have a binary counterpart (e.g. WML 2.0).
cite Cite Document
<< 1 2 3 4 5 ... 8 9 10 11 12 ... 14 15 16 >>