throbber
Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 1 of 31 PageID #: 26793
`
`EXHIBIT 26 - Part 1
`
`

`

`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 2 of 31 PageID #: 26794
`
`Exhibit C-7
`
`Claim Chart Applying Apple Internet Address Detectors System Against the '843 Patent
`
`The Apple Internet Address Detectors ("IAD") product, also referred to as "Data Detectors," was offered for
`sale, sold, publicly disseminated, and publicly used in the United States at least by September 8, 1997.
`It
`therefore constitutes prior art under pre-AIA 35 U.S.C. § 102(a), (b) and (g).
`
`An additional product named US Geographic Detectors 1.0 ("Geographic Detectors"), which utilized Data
`Detectors, was offered for sale, sold, publicly disseminated, and publicly used in the United States around
`December 23, 1997 and therefore constitutes prior art under pre-AIA 35 U.S.C. § 102(a) and (g).
`
`As shown below, an Apple computer system running IAD and Simple Text and/or Claris Emailer, and for some
`elements Geographic Detectors, ("IAD System") anticipates and/or renders obvious claims 1, 8, 13, 15, 17-19,
`23, and 30 of the '843 patent. The IAD System constitutes prior art under pre-AIA 35 U.S.C. § 102(a) and (g)
`with Geographic Detectors and 102(a), (b), and (g) without Geographic Detectors.
`If the Judge or Jury finds
`that the IAD System does not anticipate a particular claim, then the IAD System still renders the claim obvious
`for the reasons discussed in Exhibit F.
`
`Evidence of the availability of IAD, Geographic Detectors, and the IAD System include the following:
`
`"Apple Introduces Internet Address Detectors," September 8, 1997
`US Geographic Detectors Read Me file, containing metadata of December 23, 1997
`
`Evidence of the design and operation of IAD, Geographic Detectors, and the IAD System include the following:
`
`"Apple Introduces Internet Address Detectors," September 8, 1997
`US Geographic Detectors Read Me file, containing metadata of December 23, 1997
`Web page for "Apple Data Detectors," last updated December 30, 1996
`Apple Internet Address Detectors User Manual, August 28, 1997 ('User Manual")
`"Apple, StarNine updates in mail," February 23, 1998
`Nardi, B. A, Miller, J. R. & Wright, D. J. (1998).
`"Collaborative, Programmable Intelligent
`Agents." Communications of the ACM, Vol. 41 No. 3, March 1998 ("Nardi")
`"Claris Em@iler Getting Started"
`Source code for IAD, available for inspection at DLA Piper
`A system running IAD Version 1.0.1 (which is an example of an IAD System), available for
`inspection at DLA Piper
`A system running IAD Version 1.0.2 and US Geographic Detectors 1.0 (which is an example of
`an IAD System), available for inspection at DLA Piper
`Screenshots from the system running IAD Version 1.0.1 (which is an example of an IAD
`System), available for inspection at DLA Piper, as shown below
`Screenshots from the system running IAD Version 1.0.2 and US Geographic Detectors 1.0
`(which is an example of an IAD System), available for inspection at DLA Piper, as shown below
`
`1
`
`

`

`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 3 of 31 PageID #: 26795
`
`'843 Patent Claims
`Claim 1
`A computer-implemented method
`for finding data related to the
`contents of a document using a first
`computer program running on a
`computer, the method comprising:
`
`Exhibit C-7
`
`Disclosure
`
`The User Manual states at pp. 1-2:
`
`Apple Internet Address Detectors User's Manual
`
`Apple Internet Address Detectors utilizes a neu Apple technology called
`Data Detectors. Data Detectors enables your computer to recognize and then
`act on certain ty pes of information, or data, in your documents. Apple Data
`Detectors can recognize several diflerent types of data, and soon software
`developers will extend the capabilities of Apple Data Detectors even further.
`
`.Apple Internet Address Detectors for Mac OS 8 can recognize and act on
`data that's in the form of Internet addresses, which includes the following:
`a e-mail addresses
`• Websites
`• newsgroup names
`• filenames on FTP (file transfer protocol) sites
`a names of remote computers
`
`For example, if you have a word-processing document that contains sev eral
`e-mail addresses. Apple Data Detectors can quickly scan the document
`identify all the addresses, and then open a new e-mail message addressed to
`the one you select. Or. lets say that someone sends you a World Wide Web
`address in an e-mail message. You can use Apple Data Detectors to find the
`address within the message, then open the Web page in your favorite Web
`browser program.
`
`For each type of information that Apple Data Detectors identifies, you can
`select an action to perform with it. The actions available with Apple Internet
`Address Detectors include
`• addressing a new e-mail message to the selected address
`• opening a Web browser program and connecting to the selected Web site
`• bookmarking the selected Web site in a Web browser program
`• saving a Web document as a file on your hard disk
`• downloading the selected file from an FTP site
`a connecting to the selected remote computer
`• opening a newsgroup with your news reader program
`
`The User Manual states at p. 4:
`
`2
`
`

`

`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 4 of 31 PageID #: 26796
`
`'843 Patent Claims
`
`Disclosure
`Getting started with Apple Data Detectors
`
`Exhibit C-7
`
`Apple Data Dilectors works «ith any Mac OS program in which you can
`select or highlight text. Apple Data Detectors quickly scans the selected te.vt
`for information in specific formats. It uses detectors that are programmed to
`recognize specific types of information. For example, this version of Apple
`Data Detectors includes several detectors that can recognize Internet
`addresses and uniform resource locators (URLs).
`
`Once a detector has identified a piece of information it recognizes. Apple
`Data Detectors creates a menu of actions for you to choose from. .Actions are
`things you can do w ith the detected information, such as sending it to another
`program or saving it for later use. The actions that are available depend on
`the ty pe of information detected.
`
`This table summarizes the actions supplied with Apple Internet
`Address Detectors;
`
`Type of data
`
`Example
`
`Actions
`
`t-mil 3dcr«s
`
`moof@9ppl<.com
`
`stud
`
`iiittii
`
`Web iddress
`
`knpitavw.ipplt.conyfilt.litril mw W<b site, boeknift Hi
`orsm as dectmttt
`
`ntnsgrctp
`
`Mirp.sys.mJe
`
`rod nms group
`
`(i« on in FTP sitt
`
`ftp-'.'jpplt.cor.lik si
`
`davmload the fi«
`
`host addttss
`
`rts<>rdi.ipp<«.oim
`
`otMeet to
`
`renole eorrpusr
`
`The User Manual states at pp. 5-6:
`
`3
`
`

`

`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 5 of 31 PageID #: 26797
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`Using Apple Data Detectors
`
`To use Apple Data Deteclors. follow these steps:
`
`1
`
`Select some text in any application that allows you to highlight text.
`
`Make sure the selected text contains at least one type of data that Apple Data
`Detectors recognizes. (In this example, the selected text contains one
`complete Internet address.)
`
`•
`
`Note Pail
`
`E B
`rs.
`For cddiUonol informalion, sea
`Apple's Vteb sil9 ol wvyw.oppie corn
`
`2
`
`Hold down the Control key. then press and hold down the mouse button.
`
`A "contextual menu" appears. It lists all the recognized data found in
`the selection.
`
`Note Pail
`
`•
`QB
`MMffllW- Help
`
`www^pplexom •
`
`Tip: If the contextual menu is empty, or the message "no structures
`found in selection" appears, the text you selected did not contain am
`recognizable data.
`
`After the contextual menu appears, you can release the Control key. Be sure
`to keep holding dow n the mouse button or the menu «ill disappear.
`
`3 Choose a recognized data item from the contextual menu, then choose an action from
`the submenu that appears.
`
`•
`
`Note Pad z
`
`For oddilionol infomnolion, se©
`Apple a WeD site at wrvw eppleconrj
`
`ETBI m Help
`
`wfc-w.<i|ip le.ro m •
`
`Connect with Cyberdog
`Connect with Internet Confuj
`Connect wtth NCSA Telnet
`View in America Online
`View in CVberdog
`View In Internet explorer
`View in Netscape Noviqotor
`Vii'W with Intrmi't (nnhij
`
`IAD could operate on text entered by a user in a Simple Text file, a
`Claris Emailer email, or text entered using any other application.
`
`See also Nardi at pp. 96-98 (including figs. 1,2): "As Apple Computer
`researchers, we started from a simple but focused approach to agents:
`That they should have the ability to infer appropriate high-level goals
`from user actions and requests and take action to achieve these goals.
`Further, based on a study of reference librarians as exemplary human
`agents [9], we wanted to build a system in which the user would not have
`to state goals explicitly and in detail. We learned from librarians that a
`
`4
`
`

`

`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 6 of 31 PageID #: 26798
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`large part of their value to clients is in working with imprecise requests.
`Beyond this concern, our general design strategy was to keep the most
`basic user question in front of us at all times: Will this software do
`something useful for users in an intelligent way that makes them more
`productive? The system we describe here—Apple Data
`Detectors—meets our criteria of being unobtrusive, being able to infer
`user needs, and doing useful work. Apple Data Detectors shipped as a
`product in 1997.
`
`Earlier work on intelligent agents was multifaceted, to the point where it
`is difficult to find a consensus among researchers on exactly what
`constitutes an 'agent' or even 'intelligence.' However, in nearly all
`cases, systems described as 'agent-based' rely on some explicitly
`represented knowledge about relevant aspects of the world—the objects
`or concepts being addressed by the software, the tasks relevant to the
`user, and the user's own knowledge about the world. Researchers have
`used machine learning techniques to track user actions and construct
`models of user preferences [7], create explicit models of user knowledge
`and skill levels in an attempt to anticipate user actions, misconceptions,
`and information needs [2], and implement planning systems to leap from
`a user's stated intention to the specific actions required to achieve that
`intention |3]. The locality of agents also varies across different
`agent-based systems; some act only within one's own machine, find
`others autonomously crawl the Web, searching for interesting content
`[4]. We tried to find a middle ground by using explicit representations
`of user-relevant information as a means of identifying actions users
`might wish to take but to leave the choice of these actions to users."
`
`See also Nardi at fig. 4: "This script uses two applications: First, a
`'personal information manager' (Now Contact 3.5) is opened and used as
`a database. Then the script opens an empty word processor document
`(via Corel WordPerfect) and writes the date, name, address, and
`salutation into it, leaving the user ready to write the letter."
`
`See also Nardi at 103-04: "Apple Data Detectors is a first step toward
`extracting semantics from everyday documents without asking users to
`create documents in new ways. Such an intelligent agent redefines
`'document' from a stream of characters to a data structure containing
`specific, known kinds of structures that can play specific, known roles in
`user interactions. Such an approach can provide a foundation for more
`powerful analyses beyond our current recognition and parsing
`technology. Future work could explore the use of more sophisticated
`kinds of recognition and parsing, including those that rely on finite state
`technology and linguistically informed context analysis [5], as well as
`integration with statistical techniques of data analysis, such as
`relevance-based techniques.
`
`5
`
`

`

`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 7 of 31 PageID #: 26799
`
`'843 Patent Claims
`
`Disclosure
`
`Exhibit C-7
`
`displaying the document
`electronically using the first
`computer program;
`
`One important future step for research will be to build knowledge into
`the system about the structures being recognizing and how these
`structures are related to user goals and tasks. Doing so will provide the
`basis for more flexible and powerful task support. For instance, if we
`can attribute some reasonable set of email address semantics to the
`textual presentation of an email address in a document, the system can
`use the address as a pointer to the person with that address. We can
`then carry out system actions intended for people (such as 'Place a phone
`call to this person') on an email address and let the system figure out the
`person implied by the address.
`(This can already be done through
`Apple Data Detectors but requires writing a script, rather than relying on
`inferencing as suggested here.) Such interaction might require a
`different user interface from the one used today. One can certainly
`imagine many different kinds of user interfaces to the basic
`structure-detection technology underlying the current system."
`IAD could operate on text entered by a user in a Simple Text file, a
`Claris Emailer email, or text entered using any other application.
`
`See also Nardi at fig. 1.
`
`See also Nardi at fig. 4: "This script uses two applications: First, a
`'personal information manager' (Now Contact 3.5) is opened and used as
`a database. Then the script opens an empty word processor document
`(via Corel WordPerfect) and writes the date, name, address, and
`salutation into it, leaving the user ready to write the letter."
`
`See also Nardi at 98: "Our first step was to find a user problem that
`needed solving in which intelligent agents would add value.
`In an
`investigation of how people file information on their computer desktops
`[1], we discovered that a common user complaint is that they cannot
`easily take action on the structured information found in everyday
`documents (structured information being data-recognizable by a
`grammar). Ordinary documents are full of such structured information:
`phone numbers, fax numbers, street addresses, email addresses, email
`signatures, abstracts, tables of contents, lists of references, tables,
`figures, captions, meeting announcements, Web addresses, and more.
`In addition, there are countless domain-specific structures .... These
`structures are not only relevant to users, but because of their structure,
`are also recognizable by parsing technologies. Once identified, the
`structure's type can be used to identify appropriate actions that might be
`carried out, like placing a meeting on a calendar, adding an address to an
`address book, dialing a phone number, opening a URL, finding the
`current price of a stock, filing an ISBN number, and compiling a list of
`abstracts.
`
`6
`
`

`

`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 8 of 31 PageID #: 26800
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`Apple Data Detectors supports a wide range of uses. Think of all the
`structured information in the documents you work with; in addition to
`those mentioned already, add bibliography items, forms (such as travel
`expensive reports and non-disclosure agreements), executive summaries,
`and most important, such domain-specific kinds of data as legal
`boilerplate, customer orders, and library search requests. Specific
`detectors can be created for each of these types of information."
`
`See also Nardi at 98: "User interface. To use Apple Data Detectors,
`users select a region of a document with some information of interest.
`Pressing a modifier key and the mouse button instructs the system to
`analyze the data within the selected region and to find all structures for
`which it has grammars.
`It then offers appropriate actions for each
`structure (see Figure 1)."
`
`See also Nardi at 101: "Apple Data Detectors therefore has the ability
`to infer appropriate high-level goals from user actions and requests and
`take appropriate action to achieve these gaols. When users invoke it on
`a region of text in a document, they are saying, in effect, 'Find the
`important stuff in here and help me do reasonable things to it.' Users
`can be imprecise, throwing the system a broad hint that there is
`something of interest, then let the system use its knowledge to do the
`right thing. Users work on their tasks in terms of high-level goals, such
`as 'put this address in my address book'—not by opening folders,
`clicking on icons, cutting, and pasting. Direct manipulation is a
`wasteful, frustrating way for users to interact with machines capable of
`showing more intelligence."
`
`See also Nardi at 101: "Apple Data Detectors assumes a world of
`heterogenous data (in the user's machine) that comes from different
`applications in different file formats. For example, it makes sense to
`put an address in an address book, whether the address is from a message
`sent in any of several mail programs, appears in a downloaded document,
`or is in another address book maintained by the user. Apple Data
`Detectors is a pervasive technology, giving users access to actions
`appropriate for data in an entire set of documents."
`
`See also Nardi at 102: "We also see evidence that end users with
`varying degrees of programming skill are extending actions much as we
`had expected. One user—a skilled programmer—used the basic
`detectors and actions that ship with the product as the basis for a new
`detector/action pair for a personally relevant task. He wanted to look
`up software bug reports in a database based on the ID numbers of the
`reports commonly found in other bug reports, email messages, and other
`program management documents. He distributed this detector/action
`throughout his work group, and a colleague—a marketing manager with
`
`7
`
`

`

`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 9 of 31 PageID #: 26801
`
`'843 Patent Claims
`
`while the document is being
`displayed, analyzing, in a computer
`process, first information from the
`document to determine if the first
`information is at least one of a
`plurality of types of information
`that can be searched for in order to
`find second information related to
`the first information;
`
`Exhibit C-7
`
`Disclosure
`much less programming experience than the original programmer—was
`able to adapt the action so the detector could run on his laptop computer
`(where his email and other documents reside) and display the bug reports
`on his desktop machine (where is program management tools reside).
`This extension required changes to only a few lines of code in the action,
`something well within his technical ability."
`
`See also Nardi at 103-04: "Apple Data Detectors is a first step toward
`extracting semantics from everyday documents without asking users to
`create documents in new ways. Such an intelligent agent redefines
`'document' from a stream of characters to a data structure containing
`specific, known kinds of structures that can play specific, known roles in
`user interactions. Such an approach can provide a foundation for more
`powerful analyses beyond our current recognition and parsing
`technology. Future work could explore the use of more sophisticated
`kinds of recognition and parsing, including those that rely on finite state
`technology and linguistically informed context analysis [5], as well as
`integration with statistical techniques of data analysis, such as
`relevance-based techniques.
`
`One important future step for research will be to build knowledge into
`the system about the structures being recognizing and how these
`structures are related to user goals and tasks. Doing so will provide the
`basis for more flexible and powerful task support. For instance, if we
`can attribute some reasonable set of email address semantics to the
`textual presentation of an email address in a document, the system can
`use the address as a pointer to the person with that address. We can
`then carry out system actions intended for people (such as 'Place a phone
`call to this person') on an email address and let the system figure out the
`person implied by the address.
`(This can already be done through
`Apple Data Detectors but requires writing a script, rather than relying on
`inferencing as suggested here.) Such interaction might require a
`different user interface from the one used today. One can certainly
`imagine many different kinds of user interfaces to the basic
`structure-detection technology underlying the current system."
`The User Manual states at pp. 5-6:
`
`8
`
`

`

`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 10 of 31 PageID #: 26802
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`Using Apple Data Detectors
`
`To use Apple Data Deteclors. follow these steps:
`
`1
`
`Select some text in any application that allows you to highlight text.
`
`Make sure the selected text contains at least one type of data that Apple Data
`Detectors recognizes. (In this example, the selected text contains one
`complete Internet address.)
`
`•
`
`Note Pail
`
`E B
`rs.
`For cddiUonol informalion, sea
`Apple's Vteb sil9 ol wvyw.oppie corn
`
`2
`
`Hold down the Control key. then press and hold down the mouse button.
`
`A "contextual menu" appears. It lists all the recognized data found in
`the selection.
`
`Note Pail
`
`•
`QB
`MMffllW- Help
`
`www^pplexom •
`
`Tip: If the contextual menu is empty, or the message "no structures
`found in selection" appears, the text you selected did not contain am
`recognizable data.
`
`After the contextual menu appears, you can release the Control key. Be sure
`to keep holding dow n the mouse button or the menu «ill disappear.
`
`3 Choose a recognized data item from the contextual menu, then choose an action from
`the submenu that appears.
`
`•
`
`Note Pad z
`
`For oddilionol infomnolion, se©
`Apple a WeD site at wrvw eppleconrj
`
`ETBI m Help
`
`wfc-w.<i|ip le.ro m •
`
`Connect with Cyberdog
`Connect with Internet Confuj
`Connect wtth NCSA Telnet
`View in America Online
`View in CVberdog
`View In Internet explorer
`View in Netscape Noviqotor
`Vii'W with Intrmi't (nnhij
`
`When a user selects text and right-clicks in Simple Text, IAD can detect
`URLs and provide options:
`
`9
`
`

`

`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 11 of 31 PageID #: 26803
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`I pi nip
`
`mmmm
`
`Edit Font
`
`www.apple com
`
`Si?P Style Sound Help
`untitled
`
`iii r
`
`1
`
`Connect with Cyberdog
`Connect with Internet Confiq
`Connect with NCSA Telnet
`View in America Online
`View in Cyberdog
`View in Internet Explorer
`View in Netscape Navigator
`Viewwith InternetConfig
`
`This feature was available in a Claris Emailer email as well, and starting
`with Claris Emailer version 2.0v3, a user needed to only right-click (and
`not select text) to obtain a list of actions for a URL.
`
`When a user selects text and right-clicks in Simple Text, IAD can detect
`email addresses and provide options:
`
`1
`£.
`m i n e r ^ a p a l e c o m
`
`untitled
`
`J
`
`\ Jmlller^applejom •
`apple.com
`
`Add p-mad address to Emailer addres% bo
`Send mail with America Online
`Send mail with Claris En
`liler
`Send mad with Cyberdoij
`Send mail with Fudora
`Send mail with Internet i
`Send mail with Internet 1
`Sfiui mail with NeUcape
`
`This feature was available in a Claris Emailer email as well, and starting
`with Claris Emailer version 2.0v3, a user needed to only right-click (and
`not select text) to obtain a list of actions for an email address.
`
`When a user selects text and right-clicks in Simple Text, IAD can detect
`occurrences of a city name followed by a state name or US Postal
`abbreviation and occurrences of the name of a state, territory, or
`
`10
`
`

`

`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 12 of 31 PageID #: 26804
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`protectorate of the United States and provide options. The user could
`then obtain a map of the selected US city, for which the system would
`search the Yahoo map website for a map of the city, or the user could
`obtain a zip code for the selected US city, for which the system would
`search the US Postal Service website for a list of zip codes for the city.
`See US Geographic Detectors 1.0 Read Me file. For example:
`
`lout Sl/e Slvlp Sound Help
`
`^ IMc Filit
`n
`[LgVSjo^o Palo AUo, CA and see whots there
`
`jymt
`
`llllllll.Ml
`
`Help
`[tatiS
`
`Get Map for US City
`[ uukup /ipt ode for City
`
`j
`
`This feature was available in a Claris Emailer email as well, and starting
`with Claris Emailer version 2.0v3, a user needed to only right-click (and
`not select text) to obtain a list of actions for geographic information.
`
`See also Nardi at 98: "Our first step was to find a user problem that
`needed solving in which intelligent agents would add value.
`In an
`investigation of how people file information on their computer desktops
`[1], we discovered that a common user complaint is that they cannot
`easily take action on the structured information found in everyday
`documents (structured information being data-recognizable by a
`grammar). Ordinary documents are full of such structured information:
`phone numbers, fax numbers, street addresses, email addresses, email
`signatures, abstracts, tables of contents, lists of references, tables,
`figures, captions, meeting announcements, Web addresses, and more.
`In addition, there are countless domain-specific structures .... These
`structures are not only relevant to users, but because of their structure,
`are also recognizable by parsing technologies. Once identified, the
`structure's type can be used to identify appropriate actions that might be
`carried out, like placing a meeting on a calendar, adding an address to an
`address book, dialing a phone number, opening a URL, finding the
`current price of a stock, filing an ISBN number, and compiling a list of
`abstracts.
`
`Apple Data Detectors supports a wide range of uses. Think of all the
`structured information in the documents you work with; in addition to
`those mentioned already, add bibliography items, forms (such as travel
`expensive reports and non-disclosure agreements), executive summaries,
`and most important, such domain-specific kinds of data as legal
`boilerplate, customer orders, and library search requests. Specific
`detectors can be created for each of these types of information."
`
`See also Nardi at 99: "Apple Data Detectors is an open extensible
`
`11
`
`

`

`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 13 of 31 PageID #: 26805
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`Its
`system allowing the recognition and parsing of complex structures.
`recognition technology is a hybrid system that uses Barley's algorithm
`and deterministic finite automata. The algorithms permit recognition of
`not only simple structures, such as predefined strings and atomic patterns
`like URLs and email addresses, but complex composite structures, such
`as meeting announcements composed of small more atomic structures,
`like date, time, and place."
`
`See also Nardi at p. 99 ("Figure 4. An action script, demonstrating the
`generality of Apple Data Detectors' use of a scripting language and
`external applications as information repositories and as end-user tools.
`This script can be activated when the system detects a telephone number.
`It then generates word processor letterhead addressed to the person
`possessing that number, with appropriate date and salutation information.
`This script uses two applications: First, a "personal information
`manager" (Now Contact 3.5) is opened and used as a database. Then the
`script opens an empty word processor document (via Corel WordPerfect)
`and writes the date, name, address, and salutation into it, leaving the user
`ready to write the letter.").
`
`See also Nardi at 103-04: "Apple Data Detectors is a first step toward
`extracting semantics from everyday documents without asking users to
`create documents in new ways. Such an intelligent agent redefines
`'document' from a stream of characters to a data structure containing
`specific, known kinds of structures that can play specific, known roles in
`user interactions. Such an approach can provide a foundation for more
`powerful analyses beyond our current recognition and parsing
`technology. Future work could explore the use of more sophisticated
`kinds of recognition and parsing, including those that rely on finite state
`technology and linguistically informed context analysis [5], as well as
`integration with statistical techniques of data analysis, such as
`relevance-based techniques.
`
`One important future step for research will be to build knowledge into
`the system about the structures being recognizing and how these
`structures are related to user goals and tasks. Doing so will provide the
`basis for more flexible and powerful task support. For instance, if we
`can attribute some reasonable set of email address semantics to the
`textual presentation of an email address in a document, the system can
`use the address as a pointer to the person with that address. We can
`then carry out system actions intended for people (such as 'Place a phone
`call to this person') on an email address and let the system figure out the
`person implied by the address.
`(This can already be done through
`Apple Data Detectors but requires writing a script, rather than relying on
`inferencing as suggested here.) Such interaction might require a
`different user interface from the one used today. One can certainly
`
`12
`
`

`

`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 14 of 31 PageID #: 26806
`
`Exhibit C-7
`
`'843 Patent Claims
`
`retrieving the first information;
`
`Disclosure
`imagine many different kinds of user interfaces to the basic
`structure-detection technology underlying the current system."
`See previous element.
`
`See also Nardi at 99-101 (discussion of "Architecture and
`Implementation").
`When a user selects text and right-clicks in Simple Text, IAD can detect
`URLs and provide options:
`
`' I P fedit
`
`pi
`|www.apple com
`
`Font Si7e Style Sound Hplp
`untitled
`
`•
`
`www.apple.fom •
`
`1
`
`Connect with Cyberdoq
`Connect with Internet Contig
`Connect with NCSA Telnet
`View in America Online
`View in Cyberdog
`View in Internet Explorer
`View in Netscape Navigator
`View with Internet Config
`
`providing an input device,
`configured by the first computer
`program, that allows a user to enter
`a user command to initiate an
`operation, the operation comprising
`(i) performing a search using at
`least part of the first information as
`a search term in order to find the
`second information, of a specific
`type or types, associated with the
`search term in an information
`source external to the document,
`wherein the specific type or types
`of second information is dependent
`at least in part on the type or types
`of the first information, and (ii)
`performing an action using at least
`part of the second information;
`
`This feature was available in a Claris Emailer email as well, and starting
`with Claris Emailer version 2.0v3, a user needed to only right-click (and
`not select text) to obtain a list of actions for a URL.
`
`When a user selects text and right-clicks in Simple Text, IAD can detect
`email addresses and provide options:
`
`13
`
`

`

`Case 1:13-cv-00919-LPS Document 307-6 Filed 03/10/21 Page 15 of 31 PageID #: 26807
`
`'843 Patent Claims
`
`Exhibit C-7
`
`Disclosure
`["
`j"''
`P
`jmlller^apjle.com
`
`Styi^Snniic^plii
`untltlpd
`
`kcnnnnrnHzmoi1
`
`| <ipple.com
`
`•
`
`Add e-mail Address to Emniler addr
`Send mdil with America Online
`Send mail with Clnris Ei<
`liler
`Send mail with Cyberdo.i
`Send mail with Fudora
`Send mail with Internet Config
`Send mail with Internet Explorer
`Send mall with Netscape s.tvuj.itnr
`
`This feature was available in a Claris Emailer email as well, and starting
`with Claris Emailer version 2.0v3, a user needed to only right-click (and
`not select text) to obtain a list of actions for an email address.
`
`When I AD detects an email address and a user selects "Send mail with
`Claris Emailer," Claris Emailer will search its information source for a
`company name associated with the domain of the email address and will
`insert this into the Outgoing Message panel for a new email. For
`example:
`
`L ®
`
`|ta
`
`I Out Bo
`
`Setup Window ^ Hplp
`jSIB
`Outcimtiq Message:
`
`foVllow*
`Sw>d YM |
`
`Subject |f
`
`SOHEZZ.
`Q TO a
`
`R»«ipw>t
`
`Mfross
`
`jmilVr
`
`D»sty»Atv
`
`AppW Computer
`
`t> <?
`f
`When a user selects text and right-clicks in Simple Text, IAD can detect
`occurrences of a city name follow

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket