throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`WTS Paradigm, LLC,
`
`Petitioner
`
`v.
`
`EdgeAQ, LLC,
`
`Patent Owner
`
`
`
`Case IPR: Unassigned
`
`Patent 7,805,461
`
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 7,805,461
`
`
`
`
`
`Mail Stop “PATENT BOARD”
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`P. O. Box 1450
`Alexandria, VA 22313-1450
`
`
`

`
`Table of Contents
`
`I. MANDATORY NOTICES (37 CFR § 42.8) ................................................. 1
`II. GROUNDS FOR STANDING AND IDENTIFICATION OF
`CHALLENGE (37 CFR § 42.104) ................................................................. 1
`A.
`Standing And Statutory Grounds For Each Claim ............................... 1
`B.
`Claim Construction .............................................................................. 3
`C. How The Claim Is Unpatentable .......................................................... 3
`D.
`Evidence Supporting Challenge ........................................................... 4
`III. THERE IS A REASONABLE LIKELIHOOD THAT THE
`CHALLENGED CLAIMS ARE UNPATENTABLE ................................... 4
`A. Description Of The Alleged Inventions ............................................... 4
`B. Ground 1: Claims 1–11 Are Unpatentable Under 35 USC § 103
`By The Combination of Greef, Bader, and Weida ............................... 7
`1.
`Background on the claimed subject matter ................................ 7
`2.
`Greef nearly anticipates the Challenged Claims ........................ 9
`3.
`In view of the prior art, Greef renders the Challenged
`Claims obvious ......................................................................... 12
`a.
`Greef recognizes an issue with its system’s
`identification of attributes and proposes one
`solution .......................................................................... 12
`Bader teaches an alternative solution: prompting
`the user to identify attributes ......................................... 12
`Bader and Greef teach that prompting the user to
`identify attributes can rely on an indirect
`identification .................................................................. 17
`d. Weida teaches that user input should occur via
`predefined questions ...................................................... 19
`The Challenged Claims are obvious .............................. 21
`e.
`The combination of Greef with Bader and Weida
`discloses every limitation of Claim 1 ...................................... 22
`The combination of Greef with Bader and Weida
`discloses every limitation of Claims 2–5 ................................. 40
`
`b.
`
`c.
`
`4.
`
`5.
`
`
`
`
`
`i
`
`
`
`

`
`Table of Contents
`(continued)
`
`
`
`6.
`
`7.
`
`The combination of Greef with Bader and Weida
`discloses every limitation of Claim 6 ...................................... 47
`The combination of Greef with Bader and Weida
`discloses every limitation of Claims 7–11 ............................... 51
`C. Ground 2: Claims 1–11 Are Rendered Unpatentable Under 35
`USC § 103 By The Combination of Greef, Weider, Bader, And
`Altman ................................................................................................ 57
`1.
`The combination of Greef with Bader, Weida, and
`Altman renders the Challenged Claims obvious ..................... 57
`The combination of Greef with Bader, Weida, and
`Altman discloses every limitation of Claims 1–11 .................. 59
`IV. CONCLUSION ............................................................................................. 60
`
`2.
`
`
`
`
`
`ii
`
`
`
`

`
`
`Exhibit List (37 C.F.R. §42.63(e))
`
`Exhibit No. Brief Description
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`
`
`
`
`
`
`Declaration of Deborah McGuinness
`
`Curriculum vitae of Deborah McGuinness
`
`Declaration of Louis A. Klapp
`
`U.S. Patent No. 7,805,461 (“the ’461 Patent”)
`
`U.S. Patent No. 6,397,221 (“Greef”)
`
`U.S. Patent No. 6,810,401 (“the ’401 Patent”)
`
`Fikes & Kehler, The Role of Frame Based Representation in
`Reasoning, Communication of the ACM, Volume 28, Number 9
`(September 1985) (“Fikes”)
`
`Excerpts from Alison Cawsey, The Essence of Artificial Intelligence
`(1998) (“Cawsey”)
`
`U.S. Patent No. 6,108,670 (“Weida”)
`
`U.S. Patent No. 5,953,726 (“Carter”)
`
`U.S. Patent No. 5,467,471 (“Bader”)
`
`U.S. Patent No. 6,442,566 (“Altman”)
`
`Wright et al., A Knowledge-Based Configurator That Supports
`Sales, Engineering, and Manufacturing at AT&T Network Systems,
`AI Magazine (Fall 1993) (“Wright”)
`
`iii
`
`
`
`

`
`
`
`In accordance with 35 U.S.C. § 311 Petitioner WTS Paradigm, LLC
`
`(“WTS”) respectfully requests inter partes review (“IPR”) of Claims 1–11 of U.S.
`
`Patent No. 7,805,461 (“the ’461 Patent”), attached hereto as Exhibit 1004.
`
`I. MANDATORY NOTICES (37 CFR § 42.8)
`WTS is the real party-in-interest for Petitioner. EdgeAQ, LLC (“EdgeAQ”)
`
`has asserted the ’461 Patent in a pending patent infringement lawsuit, WTS
`
`Paradigm, LLC v. EdgeAQ, LLC, No. 3:15–cv–00330 (W.D. Wis.). This case may
`
`affect, or be affected by, decisions in this proceeding.
`
`WTS provides the following designation of counsel, to which all
`
`correspondence should be addressed (WTS consents to service by email):
`
`Lead Counsel
`Michael Jaskolski (Reg. No. 37,551)
`michael.jaskolski@quarles.com
`QUARLES & BRADY LLP
`411 East Wisconsin Avenue, Suite 2400
`Milwaukee, Wisconsin 53202
`Telephone: (414) 277-5711
`Fax: (414) 978-8711
`
`Backup Counsel
`Louis A. Klapp (Reg. No. 73,603)
`louis.klapp@quarles.com
`QUARLES & BRADY LLP
`300 North LaSalle Street, Suite 4000
`Chicago, Illinois 60654
`Telephone: (312) 715-2712
`Fax: (312) 632-1948
`
`II. GROUNDS FOR STANDING AND
`CHALLENGE (37 CFR § 42.104)
`A.
`Standing And Statutory Grounds For Each Claim
`Petitioner certifies that the ’461 Patent is available for inter partes review
`
`IDENTIFICATION OF
`
`having been filed on April 10, 2007, and that Petitioner is not barred or estopped
`
`from requesting this inter partes review.
`
`1
`
`

`
`
`
`WTS requests IPR of Claims 1–11 of the ’461 Patent (the “Challenged
`
`Claims”). IPR of the Challenged Claims is requested in view of the following:
`
`Ground
`
`1
`
`2
`
`Proposed Statutory Rejections for the ’461 Patent
`Claims 1–11 are obvious under 35 U.S.C. § 103 in view of the
`combination of U.S. Patent No. 6,397,221 to Greef et al. (Ex. 1005,
`“Greef”), U.S. Patent No. 5,467,471 to Bader (Ex. 1011, “Bader”) and
`U.S. Patent No. 6,108,670 to Weida et al. (Ex. 1009, “Weida”)1.
`Claims 1–11 are obvious under 35 U.S.C. § 103 in view of the
`combination of Greef, Bader, Weida, and U.S. Patent No. 6,442,566 to
`Altman et al. (Ex. 1012, “Altman”).
`
`Greef, Bader, Weida, and Altman are all prior art under 35 USC § 102(b)
`
`because they are patents that issued more than one year prior to the filing date of
`
`the application to which the ’461 Patent claims priority (December 5, 2003). Greef
`
`issued on May 28, 2002 (Ex. 1005), Bader issued on November 14, 1995 (Ex.
`
`1011), Weida issued on August 22, 2000 (Ex. 1009), 2 and Altman issued on
`
`August 27, 2002 (Ex. 1012).
`
`
`1 Weida’s disclosures include the disclosures of U.S. Patent No. 5,953,726 to
`
`Carter et al. (Ex. 1010, “Carter”), which Weida incorporates by reference.
`
`2 Carter, which Weida incorporates by reference, is also prior art under 35 USC §
`
`102(b) because it is a patent issued on September 14, 1999 (Ex. 1010).
`
`2
`
`

`
`
`
`B. Claim Construction
`In accordance with 37 C.F.R. § 42.100(b), the challenged claims must be
`
`given their broadest reasonable interpretations. For clarity, the term “frame” means
`
`a structured representation of an object or a class of objects. (Ex. 1001,
`
`McGuinness Decl. ¶ 35.) This is consistent with how the term is used in the patent.
`
`(Ex. 1004, ’461 Patent at 1:37–52 (describing role of frames in representing
`
`attributes of objects).) This is also consistent with how the term is used in the ’401
`
`patent, which is incorporated by references into the ’461 patent. (Ex. 1006, ’401
`
`Patent at 4:67–5:3 (“Frame Engine 104 represents knowledge in a hierarchical tree-
`
`like structure. The nodes of the tree are generally called “frames” (e.g.,
`
`corresponding to product categories)”.) This is also consistent with how the term
`
`would have been understood by a person of ordinary skill in the art at the time of
`
`the claimed invention. (Ex. 1001, McGuinness Decl. ¶¶ 33, 35; Ex. 1007, Fikes at
`
`904 col.2 (“a frame provides a structured representation of an object or a class of
`
`objects”); Ex. 1008, Cawsey 180 (“Frame: Record-like structure used to represent
`
`knowledge. A frame is used to represent simple facts about an object or class as
`
`slots and slot values, and inheritance used to make inferences.”).)
`
`C. How The Claim Is Unpatentable
`A detailed explanation of how the Challenged Claims are unpatentable is
`
`provided in Section III.
`
`3
`
`

`
`
`
`D. Evidence Supporting Challenge
`An Appendix of Exhibits is attached. Relevance of the evidence, including
`
`identifying the specific portions of the evidence that support the challenge, may be
`
`found in Section III. WTS submits a declaration of Deborah McGuinness in
`
`support of this Petition in accordance with 37 C.F.R. § 1.68. (Ex. 1001, “Decl.”.)
`
`III. THERE
`IS A REASONABLE LIKELIHOOD THAT THE
`CHALLENGED CLAIMS ARE UNPATENTABLE
`A. Description Of The Alleged Inventions
`The Challenged Claims involve taking data stored in a database table and
`
`rearranging it into a hierarchical structure (a “frame-based knowledge tree”) based
`
`on input received from user. (Ex. 1001, Decl. ¶¶ 26–29.) The independent method
`
`claim, Claim 6, requires the following:
`
`A method of automatically constructing a frame-based knowledge
`tree, the method comprising:
`
`identifying a plurality of attributes within a vendor database to be
`inducted into a frame-based knowledge tree by querying at least one
`vendor-supplied product knowledge database table for data regarding
`the attributes;
`
`presenting pre-defined questions about the data to a user to identify a
`set of SQL queries to be answered to construct the frame-based
`knowledge tree;
`
`automatically determining respective locations of the plurality of
`attributes within the frame-based knowledge tree based upon input
`
`4
`
`

`
`
`
`answers received from a user regarding the data, wherein the input
`answers are provided in response to the pre-defined questions about
`the data provided to the user; and
`
`inserting at least one of the attributes into the frame-based knowledge
`tree based on the determined respective locations, whereby the frame-
`based knowledge tree is constructed.
`
`(Ex. 1004, ’461 Patent at 12:13–31.)
`
`The specification explains the claimed invention using the example of a
`
`table containing eight different products defined by three different attributes: color,
`
`size, and shape:
`
`TABLE 1A is an exemplary product data table that contains specific
`product data for eight different products. Each row defines a separate
`product. Each of the eight products have features that fall under the
`same three attributes. In this example, the first attribute is color, the
`second attribute is size and the third attribute is shape. For example,
`the first product listed is red, is small and is in the shape of a circle.
`The second product listed is blue, is small and is in the shape of a
`square, and so on.
`
`
`
`5
`
`

`
`
`
`(Id. at 8:38–60.) The claimed invention takes the product data from this tabular
`
`organization and converts into a hierarchical organization:
`
`
`
`(Id. at 10:7–50, Fig. 6.)
`
`The process of converting the data from a table to a tree involves asking for,
`
`and receiving, input from a user. The products in Table 1A theoretically could have
`
`been arranged in any one of several different hierarchies. For example, although
`
`Figure 6 shows that the data is organized first by color, then by size, then by shape
`
`(i.e., color is the highest-level node and shape is the lowest-level node),
`
`conceivably the data could have been organized, for example, first by size, then by
`
`shape, then by color. (See Ex. 1001, Decl. ¶ 28.) The patent explains that the
`
`decisions about where in the tree (i.e., highest-level node, middle-level node,
`
`6
`
`

`
`
`
`lowest-level node) each attribute (i.e., color, size, shape) should be located are
`
`based on instructions received from a user:
`
`In one embodiment, an interactive (i.e., manual) knowledge tree
`construction may be utilized, where the user interface 100 prompts
`the user with a series of questions requiring the user to select from a
`list of product attributes, the answers to which determine the order,
`and manner in which the attributes are added to the frame based
`knowledge tree. In another embodiment, automatic construction
`(described below) may be utilized, where the process of knowledge
`tree construction is automatic based on user specified generalization
`and optimization criteria.
`
`(Ex. 1004, ’461 Patent at 5:41–50.) 3 Once the user’s instructions are known, the
`
`process creates the SQL queries that pull the data out of the table and place it in the
`
`correct location in the tree. (Id. at 9:43–52.)
`
`The content of each Challenged Claims is discussed in more detail in each
`
`Ground presented below.
`
`B. Ground 1: Claims 1–11 Are Unpatentable Under 35 USC § 103 By
`The Combination of Greef, Bader, and Weida
`1.
`The ’461 Patent describes the claimed inventions as an improvement over a
`
`Background on the claimed subject matter
`
`prior-art system in which a human user assembles information (specifically,
`
`
`3 All emphasis added unless otherwise noted.
`
`7
`
`

`
`
`
`information about configurable products) into a tree organization. (Ex. 1001, Decl.
`
`¶¶ 22–24.) After collecting the information from a variety of sources, the user of
`
`the prior art system rearranges the information into the tree organization—what the
`
`patent calls, “a frame based knowledge tree.” (Ex. 1004, ’461 Patent at 1:33–37,
`
`1:53–58.) The user alone—i.e., not any logic embedded within the computer—
`
`decides where each piece of information is stored in the tree. (Id. at 1:38–52.) That
`
`is, the user of the prior art system—not the computer—determined his or her
`
`preferences for organizing the tree (e.g., placing parameters with many possible
`
`values closer to the root of the tree). (See id. at 1:30–2:8.) And, the user—not the
`
`computer—determined how to place the information into the tree in a manner
`
`consistent with his or her preferences.
`
`According to the ’461 Patent, the alleged invention improves upon this prior
`
`art system by having a computer automatically perform some of the tasks
`
`previously performed by the user. In particular, the ’461 Patent explains that, in its
`
`system, the user should still indicate certain preferences about the organization of
`
`the tree, but thereafter, the computer should automatically construct the tree
`
`consistent with the user’s preferences. (Id. at 1:66–2:8.)
`
`Although not discussed in the ’461 Patent’s discussion of the prior art, prior
`
`art systems existed where the computer performed functions that would otherwise
`
`8
`
`

`
`
`
`have been performed by the human user. (Ex. 1001, Decl. ¶ 25.) Greef and Bader
`
`are examples of such systems. (Id.; see also Section III below.)
`
`2. Greef nearly anticipates the Challenged Claims
` Greef concerns the rearrangement of data from a database table to a frame-
`
`based tree. (Ex. 1001, Decl. ¶¶ 37–40.) It discloses two embodiments: one that
`
`requires relatively substantial user input, and one that requires relatively little user
`
`input. (See Ex. 1005, Greef at Abstract.) This IPR focuses on the second
`
`embodiment, which discloses almost every limitation of the Challenged Claims.
`
`Greef discloses (among other things) that it (1) accesses product data from a
`
`database table; (2) queries the table to identify attributes; (3) identifies preferences
`
`for constructing a frame-based hierarchy of the attributes; and (4) based on those
`
`preferences, determines locations for the attributes in the hierarchy and inserts
`
`them accordingly. (Ex. 1001, Decl. ¶ 38; see also Section III.B below.)
`
`Greef discloses a manner for determining preferences about the hierarchy,
`
`but also flags a potential weakness in its approach. (Ex. 1001, Decl. ¶¶ 48–53.)
`
`Greef looks for certain names in the table’s column headers—in particular columns
`
`named “Class” and “Type—and determines preferences about the structure of the
`
`hierarchy based on those names. (Id. ¶¶ 48–49; Ex. 1005, Greef at 29:8–14, 29:59–
`
`30:3.) For example, Greef determines preferences by looking at the column
`
`headers (attribute names) in the table shown in Figure 17 (reproduced below).
`
`9
`
`

`
`
`
`
`The system knows that (1) “Camera” should exist in a frame closest to the
`
`root of the tree—it is a value of what Greef calls a “category” attribute—because
`
`its associated attribute is titled, “Class” and (2) “Point & Shoot,” “SLR,” and
`
`“Digital,” should appear in frames subordinate to that—they are values of what
`
`Greef calls a “subcategory” attribute—because their associated attribute is titled,
`
`“Type.” (Ex. 1001, Decl. ¶ 49; Ex. 1005, Greef at 29:8–14, 29:59–30:3.)
`
`Thus, because the table used “Class” and “Type” as headers, the computer
`
`can identify preferences for the structure of the hierarchy without explicitly
`
`seeking the user’s input:
`
`Upon closer consider of table 400, it will be appreciated that since
`product attributes that identify category and subcategory such as
`Class and Type are included in the table data, the tabular data contains
`information from which a frame-based hierarchical structure to
`accommodate the product records might be generated.
`
`(Ex. 1005, Greef at 29:8–14; Ex. 1001, Decl. ¶ 49.)
`
`10
`
`

`
`
`
`Additionally, the system identifies “Model Name” as a “suitable identifying
`
`attribute… [for] identifying the respective products.” (Ex. 1005, Greef at 30:44–
`
`47.) As such, the system concludes that frames for the values of “Model Name”
`
`should appear subordinate to those of “Type.” (Id. at Fig. 18; Ex. 1001, Dec. ¶ 50.)
`
`Based on this analysis, Greef determines that the hierarchy should have the
`
`following general structure:
`
`
`(Ex. 1005, Greef at Fig. 18 (cropped); Ex. 1001, Decl. ¶ 51.) Thereafter, based on
`
`these preferences, Greef determines locations for (and inserts) the remaining
`
`attributes “without intervention of the user”:
`
`
`(Ex. 1005, Greef at Fig. 19 (cropped), 29:14–24; Ex. 1001, Decl. ¶ 52.)
`
`11
`
`

`
`
`
`3.
`
`In view of the prior art, Greef renders the Challenged
`Claims obvious
`
`As discussed below, the Challenged Claims are invalid as obvious because a
`
`person having ordinary skill in the art at the time of the claimed invention would
`
`have had reason to design Greef’s system so that it prompted the user with pre-
`
`defined questions to identify which attributes in the table correspond to the
`
`category, subcategory, and/or identifying attributes.
`
`a. Greef recognizes an
`system’s
`its
`issue with
`identification of attributes and proposes one solution
`
`If Greef’s system does not encounter a table with columns labeled as “Class”
`
`and “Type” the system would need an alternative way to identify which attribute
`
`should be treated as the category attribute and which should be treated as the
`
`subcategory attribute. (Ex. 1001, Decl. ¶ 53.) Greef recognizes this and suggests
`
`the system could reference a “look up” to figure out which attributes correspond to
`
`category and subcategory: “if table 400 includes category and subcategory
`
`information under attribute names other than Class and Type, the method would
`
`identify the category subcategory information by comparison to a term reference
`
`look up.” (Ex. 1005, Greef at 30:33–42; Ex. 1001, Decl. ¶ 53.)
`
`b.
`
`Bader teaches an alternative solution: prompting the
`user to identify attributes
`
`A person of ordinary skill in the art would have recognized that Greef’s
`
`system should be designed to present the user with a list of the attributes and ask
`
`12
`
`

`
`
`
`the user to identify which correspond to category and subcategory. (Ex. 1001,
`
`Decl. ¶ 54.) This is taught by Bader. (Id. ¶ 55.)
`
`Bader discloses “a system and method pertaining to hierarchical and
`
`relational databases maintained by a computer.” (Ex. 1011, Bader at 1:8–9; Ex.
`
`1001, Decl. ¶ 57.) Among other disclosures, Bader “teaches a system for…
`
`converting a database that is maintained as relational to one that is hierarchical.”
`
`(Ex. 1011, Bader at 3:34–37.) For example, it discloses converting the database
`
`table in Figure 12 into various hierarchies (id. at Fig. 12; Ex. 1001, Decl. ¶ 57):
`
`
`The construction of these hierarchies occurs in three principal steps. (Ex.
`
`1001, Decl. ¶ 58.) First, the user selects which subset of attributes from the table
`
`(i.e., which attributes among “Department,” “Company,” “Location,” “First
`
`Name,” “Last Name,” and “Children’s Names”) will be used to form the general
`
`structure of the hierarchy.
`
`The preferred system and method for converting from a relational
`database to a hierarchical database is as follows. First, some of the
`
`13
`
`

`
`
`
`attributes or keywords of the relational database (i.e., the column
`headers in FIG. 12) are selected by a user to be the elements on
`which the hierarchy to be created will be based. In the example…
`there are three keywords chosen on which the hierarchy will be based:
`“Department”, “Company”, and “Last Name”.
`
`(Id. at 11:53–60.) Second, based upon the number of unique values for each of the
`
`selected attributes, the ordering of the attributes (“keywords”) within the hierarchy
`
`is determined—i.e., which attribute is closest to the root:
`
`[T]he keyword “Company” is preferably selected as the keyword for
`records at Level 1 of the hierarchy, the keyword “Department” is
`preferably selected as the keyword for records at Level 2 of the
`hierarchy, and the keyword “Last Name” is preferably selected as the
`keyword for records at Level 3 of the hierarchy.
`
`(Id. at 11:61–12:9.) Third, based on the user’s preferences the system places all
`
`remaining attributes within the hierarchy, such as that of Figure 14 (the hierarchy
`
`is spread over two sub-figures, and only Figure 14a is reproduced below):
`
`(Id. at Fig. 14a; see also id. at Fig. 14b, 12:10–40.)
`
`14
`
`
`
`

`
`
`
`Thus, Bader teaches that its system first determines preferences about the
`
`attributes to determine the general structure of the hierarchy and, thereafter,
`
`automatically builds the hierarchy. (Ex. 1001, Decl. ¶ 59.) Additionally, Bader
`
`teaches that, in determining preferences, the system should ask the user to identify
`
`the attributes on which the hierarchy will be based and, of those, which should be
`
`placed closest to the hierarchy’s root (i.e., “Company”), which below that (i.e.,
`
`“Department”), and which is further below that (i.e., “Last Name”). (Id.)
`
`In addition to this explicit disclosure from Bader, a person having ordinary
`
`skill would have had other reasons to present the user with these predefined
`
`questions asking which attributes correspond to category and subcategory. First,
`
`the person would have recognized the impracticality of depending exclusively on
`
`an external lookup functionality when “class” and “type” column headers are
`
`missing. (Ex. 1001, Decl. ¶ 54.) Prompting the user to make selections solves that
`
`problem. (Id.)
`
`Second, the person would have known that asking the user to identify the
`
`attributes on which the hierarchy should be based would have supported potential
`
`customization of the hierarchy to suite the intended use. (Id.) As taught by Bader,
`
`different selections by the user will produce different hierarchies, each of which
`
`will have its own advantages and disadvantages. In particular, Bader explains that
`
`different hierarchies can be created from the same tabular data based on the user’s
`
`15
`
`

`
`
`
`selections. (Ex. 1011, Bader at 12:26–40; Ex. 1001, Decl. ¶ 60.) For example,
`
`Bader cites the hierarchy of Figure 15 as an alternative to Figure 14, which,
`
`although based on the same underlying data, is based on different user selections.
`
`(Ex. 1011, Bader at 12:26–40; see also id. at Fig. 15.) Bader teaches that this is
`
`advantageous, as each hierarchy will have benefits for different purposes:
`
`There may be certain advantages or disadvantages to a user in having
`the hierarchy of FIGS. 14a-b or FIGS. 15a-b; thus it is a useful
`capability of the invention to allow a user to choose which
`hierarchical structure is created from the original relational database
`(in this example, the relational database of FIG. 12).
`
`(Id. at 12:35–40; Ex. 1001, Decl. ¶ 60.)
`
`Similar to prompting the user to identify category and subcategory attributes,
`
`person of ordinary skill would have had a reason to prompt the user to indicate the
`
`user’s preference for the identifying attribute (e.g., “Model Name” in Greef’s
`
`example). (Ex. 1001, Decl. ¶ 62.) Greef’s disclosure does not specify how it
`
`determines which of the table’s attributes is selected as the identifying attribute,
`
`only that the determination occurs. (Id.; Ex. 1005, Greef at 30:44–47.) Given that
`
`attributes additional to “Model Name” would be suitable (e.g., “Md. No.” (model
`
`number)), it would have been a simple, predictable modification of Greef to ask the
`
`user to identify which attribute should serve as the identifying attribute. (Ex. 1001,
`
`Decl. ¶¶ 63–65.) Indeed, this is consistent with the teaching of Greef’s first
`
`16
`
`

`
`
`
`embodiment, wherein the user selects the identifying attribute and Greef explains
`
`that there is value in selecting “model number” over some other attribute. (Id.; Ex.
`
`1005, Greef at 18:42–46 (model number selected as identified because it is “likely
`
`to receive recognition across presentation formats”).)
`
`c.
`
`Bader and Greef teach that prompting the user to
`identify attributes
`can
`rely on an
`indirect
`identification
`
`As noted above, a person having ordinary skill in the art would have reason
`
`to modify Greef’s system such that it prompted the user to identify the subset of
`
`attributes on which the hierarchy will be based and their respective levels—that is,
`
`directly ask the user which attributes correspond to “category,” “subcategory,”
`
`and/or “identifying” attributes in the language of Greef. (See Section III.B.3.b.)
`
`Additionally, a person having ordinary skill would also have reason to implement
`
`the prompts to enable indirect selection of attributes. (Ex. 1001, Decl. ¶¶ 66–68.)
`
`The person of ordinary skill would know that—in situations when the user is
`
`unsure which attributes to select—the system should be designed to ask the user
`
`whether the user wants the system to determine this information based on count of
`
`unique values for each attribute, as is taught by Bader. (Id. ¶ 67.) Bader explains
`
`that attributes with few values should be placed toward the top of the hierarchy:
`
`It is preferable that the highest level of the hierarchy to be created
`has the fewest number of unique keyword values, with each next
`
`17
`
`

`
`
`
`subordinate level having the same or the next greater number of
`unique keyword values.”
`
`(Ex. 1011, Bader at 11:61–12:9.) Thus, given Bader’s disclosure that it is desirable
`
`to choose attributes based on number of unique values, a person of ordinary skill
`
`would have a reason to design the modified Greef system such that it asked the
`
`user whether the attributes corresponding to “category,” “subcategory” and/or
`
`“identifying” attributes should be selected by the number of unique values
`
`associated with the various attributes. (Ex. 1001, Decl. ¶ 67.)
`
`Additionally, the person would have had a reason to modify Greef such
`
`that—in situations when the user is unsure which attributes to select—the system
`
`asks the user whether the user wants the system to determine the identity and order
`
`of the attributes on which the hierarchy will be based by deferring to an existing
`
`hierarchy. (Ex. 1001, Decl. ¶ 68.) This is taught by the first embodiment of Greef.
`
`In that Greef embodiment, the user identifies an initial hierarchy (Fig. 3) on which
`
`the final hierarchy (Fig. 5) will be based. (Ex. 1005, Greef at 6:5–25, 12:1–9,
`
`14:35–42.)
`
`(Id. at Fig. 3.)
`
`
`
`18
`
`

`
`
`
`(Id. at Fig. 5.) In particular, Greef explains the following:
`
`
`
`Get Information step 102, itself, includes an initial step 122, at which
`the method asks; i.e., prompts, the user to identify the source of the
`tabular data, and the source of any frame-based, hierarchical
`organizational data to be employed as the starting point for the
`organizational structure that will be fashioned to accommodate the
`tabular data to be imported.
`
`(Id. at 14:35–42.) It would have been a routine, predictable variation of Greef’s
`
`second embodiment to incorporate this teaching from Greef’s first embodiment.
`
`(Ex. 1001, Decl. ¶ 68.)
`
`d. Weida teaches that user input should occur via
`predefined questions
`
`The person of ordinary skill would have known that, in prompting the user
`
`to identify preferences regarding category, subcategory, or identifying attributes,
`
`19
`
`

`
`
`
`the modified Greef system would seek the preferences by asking the user
`
`predefined questions. For example, the person would know to present a screen on a
`
`graphical user interface showing a list of the table’s attributes and asking the user
`
`to “Select the highest-level attribute,” “Select the identifying attribute,” or the like.
`
`(Ex. 1001, Decl. ¶ 69.) Such a means for soliciting user input was well known and
`
`would have been no more than a routine, predictable modification to Greef. (Id.)
`
`Indeed, Weida—via its incorporation of Carter by reference—discloses,
`
`among other things, a system and method for adding, deleting, or modify the
`
`contents of a hierarchy. (Ex. 1010, Carter at Abstract, 1:30–33.) Although
`
`Weida/Carter is “computer automated” (id. at 1:32), its process “is an interactive
`
`one where some of the steps… are performed by the computer, while the
`
`remaining steps are performed by the user in response to interrogations by the
`
`computer.” (Id. at 6:42–45.) Carter’s hierarchy is maintained by “a human agent
`
`using a Graphic User Interface (GUI).” (Id. at 2:30–42.)
`
`When the computer needs input to arrange the hierarchy, Weida/Carter’s
`
`system prompts the user with a predefined question seeking the user’s preferences
`
`via the graphical user interface. (Ex. 1001, Decl. ¶ 69.) For example, when the user
`
`deletes an attribute associated with a frame and indicates that it should be moved to
`
`a sub-frame, the system will ask the user to “Select the target item,” and provide a
`
`list of possible sub-frames for the user to select (e.g., “Desktop,” “Mobile”):
`
`20
`
`

`
`
`
`
`(Id. at Fig. 27, 6:59–65.) Other operations will result in different questions being
`
`asked to the user, such as asking the user to “Select categories to remove” and to
`
`indicate whether an item “is to be copied to or moved to the new parent.” (Id. at
`
`6:42–65, 3:32–50, Figs. 2, 25–27.)
`
`A person of ordinary skill would know that in seeking user input for the
`
`modified Greef system, the input could be sought by presenting predefined
`
`questions asking the user to make selections via a graphical user interface, just as
`
`in Weida/Carter. (Ex. 1001, Decl. ¶ 69.)
`
`e.
`Consequently, a person of ordinary skill in the art at the time of the claimed
`
`The Challenged Claims are obvious
`
`invention would have had reason to modify Greef’s system in accordance with
`
`Bader and Weida so as to present the user with predefined questions via a
`
`graphical user interface asking the user’s preference for category, subcategory, and
`
`identifying attributes. (Id. ¶ 70.) As explained in more detail below, such a system
`
`21
`
`

`
`
`
`would have each and every limitation of the Challenged Claims. (See Sections
`
`III.B.4–III.B.7.) Thus, the Challenged Claims are obvious and unpatentable.
`
`4.
`
`The combination of Greef with Bader and Weida discloses
`every limitation of Claim 1
`Preamble [1.0]. Greef discloses a database processing system. (Ex. 1001,
`
`Decl. ¶¶ 79–81.) In particular, Greef discloses the processing of a database of
`
`tabularly organized data so as to convert the data into a hierarchical organization.
`
`Greef
`
`is
`
`titled “Method for Creating and Maintaining a Frame-Based
`
`Hierarchically Organized Databases with Tabularly Organized Data.” (Ex. 1005 at
`
`Title.) Such tabularly

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket