throbber
Trials@uspto.gov
`571.272.7822
`
`
`
`
`
`
`
`
`
`
`
` Paper No. 16
`
`Entered: July 5, 2017
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`APPLE INC.,
`Petitioner,
`
`
`
`
`
`v.
`
`CALIFORNIA INSTITUTE OF TECHNOLOGY,
`Patent Owner.
`____________
`
`Case IPR2017-00423
`Patent 7,916,781 B2
`____________
`
`
`
`Before KEN B. BARRETT, TREVOR M. JEFFERSON, and
`JOHN A. HUDALLA, Administrative Patent Judges.
`
`HUDALLA, Administrative Patent Judge.
`
`
`
`DECISION
`Institution of Inter Partes Review
`35 U.S.C. § 314(a) and 37 C.F.R. § 42.108
`
`Petitioner, Apple, Inc. (“Apple”), filed a Petition (Paper 5, “Pet.”)
`
`requesting an inter partes review of claims 13–22 of U.S. Patent No.
`
`7,916,781 B2 (Ex. 1101, “the ’781 patent”) pursuant to 35 U.S.C. §§ 311–
`
`319. Apple proffered a Declaration of James A. Davis, Ph.D. (Ex. 1104)
`
`with its Petition. Patent Owner, California Institute of Technology
`
`(“Caltech”), filed a Preliminary Response (Paper 14, “Prelim. Resp.”) to the
`
`Petition.
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`Under 35 U.S.C. § 314(a), the Director may not authorize an inter
`
`partes review unless the information in the petition and preliminary response
`
`“shows that there is a reasonable likelihood that the petitioner would prevail
`
`with respect to at least 1 of the claims challenged in the petition.” For the
`
`reasons that follow, we institute an inter partes review as to claims 13–16,
`
`18, and 22 of the ’781 patent on certain grounds of unpatentability
`
`presented.
`
`
`
`
`
`A.
`
`Related Proceedings
`
`I. BACKGROUND
`
`
`
`The parties identify the following district court cases related to the
`
`’781 patent (Pet. 1; Paper 7, 1):
`
`Cal. Inst. of Tech. v. Broadcom Ltd., No. 2:16-cv-03714 (C.D. Cal.
`
`filed May 26, 2016);1
`
`Cal. Inst. of Tech. v. Hughes Commc’ns, Inc., No. 2:15-cv-01108
`
`(C.D. Cal. filed Feb. 17, 2015); and
`
`Cal. Inst. of Tech. v. Hughes Commc’ns, Inc., 2:13-cv-07245 (C.D.
`
`Cal. filed Oct. 1, 2013).
`
`The parties also identify co-pending Case IPR2017-00297, in which
`
`Apple has filed a petition for inter partes review of claims 3–12 and 19–21
`
`of the ’781 patent. Pet. 2 n.1; Paper 7, 1. In addition, the ’781 patent was
`
`previously subject to an inter partes review in Case IPR2015-00059
`
`(“059 IPR”). Pet. 19; Ex. 1111; Paper 7, 1. In the Final Written Decision
`
`from the 059 IPR, which Apple filed as Exhibit 1111 in this proceeding, the
`
`
`1 Apple is a defendant in this case. See Pet. 1.
`
`2
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`Board determined that claims 1 and 2 of the ’781 patent are unpatentable as
`
`anticipated by the Divsalar reference, which is one of the asserted references
`
`in this case. See Ex. 1111, 43.
`
`Apple additionally states that patents in the priority chain of the
`
`’781 patent were challenged in Cases IPR2015-00068, IPR2015-00067,
`
`IPR2015-00060, IPR2015-00061, and IPR2015-00081. Pet. 1. We
`
`additionally identify the following cases between the parties:
`
`Cases IPR2017-00210, IPR2017-00211, IPR2017-00219, IPR2017-00700,
`
`IPR2017-00701, IPR2017-00702, IPR2017-00703, and IPR2017-00728.
`
`
`
`B.
`
`The ’781 patent
`
`The ’781 patent describes the serial concatenation of interleaved
`
`convolutional codes forming turbo-like codes. Ex. 1101, Title. It explains
`
`some of the prior art with reference to its Figure 1, reproduced below.
`
`Figure 1 is a schematic diagram of a prior “turbo code” system. Id. at 2:20–
`
`21. The ’781 patent specification describes Figure 1 as follows:
`
`
`
`3
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`A block of k information bits is input directly to a first coder
`102. A k bit interleaver 106 also receives the k bits and
`interleaves them prior to applying them to a second coder 104.
`The second coder produces an output that has more bits than its
`input, that is, it is a coder with rate that is less than 1. The
`coders 102, 104 are typically recursive convolutional coders.
`
`Three different items are sent over the channel 150: the
`original k bits, first encoded bits 110, and second encoded bits
`112. At the decoding end, two decoders are used: a first
`constituent decoder 160 and a second constituent decoder 162.
`Each receives both the original k bits, and one of the encoded
`portions 110, 112. Each decoder sends likelihood estimates of
`the decoded bits to the other decoders. The estimates are used
`to decode the uncoded information bits as corrupted by the
`noisy channel.
`
`Id. at 1:44–60.
`
`A coder 200, according to a first embodiment of the invention, is
`
`described with respect to Figure 2, reproduced below.
`
`Figure 2 of the ’781 patent is a schematic diagram of coder 200.
`
`
`
`The coder 200 may include an outer coder 202, an interleaver
`204, and inner coder 206. . . . The outer coder 202 receives the
`uncoded data [that] may be partitioned into blocks of fixed size,
`[e.g.] k bits. The outer coder may be an (n,k) binary linear
`block coder, where n>k. The coder accepts as input a block u
`of k data bits and produces an output block v of n data bits.
`
`4
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`The mathematical relationship between u and v is v=T0u, where
`T0 is an n×k matrix, and the rate[2] of the coder is k/n.
`
`The rate of the coder may be irregular, that is, the value of T0 is
`not constant, and may differ for sub-blocks of bits in the data
`block. In an embodiment, the outer coder 202 is a repeater that
`repeats the k bits in a block a number of times q to produce a
`block with n bits, where n=qk. Since the repeater has an
`irregular output, different bits in the block may be repeated a
`different number of times. For example, a fraction of the bits in
`the block may be repeated two times, a fraction of bits may be
`repeated three times, and the remainder of bits may be repeated
`four times. These fractions define a degree sequence or degree
`profile, of the code.
`
`The inner coder 206 may be a linear rate-1 coder, which means
`that the n-bit output block x can be written as x=TIw, where TI
`is a nonsingular n×n matrix. The inner coder 210 can have a
`rate that is close to 1, e.g., within 50%, more preferably 10%
`and perhaps even more preferably within 1% of 1.
`
`Id. at 2:40–3:2 (footnote added). Codes characterized by a regular repeat of
`
`message bits into a resulting codeword are referred to as “regular repeat,”
`
`whereas codes characterized by irregular repeat of message bits into a
`
`resulting codeword are referred to as “irregular repeat.” The second
`
`(“inner”) encoder 206 performs an “accumulate” function. Thus, the two
`
`step encoding process illustrated in Figure 2, including a first encoding
`
`(“outer encoding”) followed by a second encoding (“inner encoding”),
`
`results in either a “regular repeat accumulate” (“RRA”) code or an “irregular
`
`repeat accumulate” (“IRA”) code, depending upon whether the repetition in
`
`the first encoding is regular or irregular.
`
`
`2 We understand that the “rate” of an encoder refers to the ratio of the
`number of input bits to the number of resulting encoded output bits related to
`those input bits.
`
`5
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`Figure 4 of the ’781 patent is reproduced below.
`
`
`
`Figure 4 shows an alternative embodiment in which the first encoding is
`
`carried out by a low density generator matrix. Low density generator matrix
`
`(LDGM)3 codes are a special class of low density parity check codes that
`
`allow for less encoding and decoding complexity. LDGM codes are
`
`systematic linear codes generated by a “sparse” generator matrix. No
`
`interleaver (as in the Figure 2 embodiment) is required in the Figure 4
`
`arrangement because the LDGM provides scrambling otherwise provided by
`
`the interleaver in the Figure 2 embodiment.
`
`Apple notes (Pet. 3) that the ’781 patent claims priority to a
`
`provisional application filed on May 18, 2000. Ex. 1101, at [60]. As
`
`discussed below, we determine for purposes of this Decision that Apple’s
`
`asserted references qualify as prior art even when assuming that May 18,
`
`2000, is the effective filing date for the challenged claims of the ’781 patent.
`
`
`
`
`3 We understand that a “generator” matrix (typically referred to by “G”) is
`used to create (generate) codewords. A parity check matrix (typically
`referred to by “H”) is used to decode a received message.
`6
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`C.
`
`Illustrative Claim
`
`Claims 13 and 19–21 of the ’781 patent are independent. Claims 14–
`
`18 depend directly or indirectly from claim 13, and claim 22 depends from
`
`claim 21. Claim 13 is illustrative of the challenged claims and recites:
`
`13. A method of encoding a signal, comprising:
`
`receiving a block of data in the signal to be encoded, the
`block of data including information bits; and
`
`performing an encoding operation using the information
`bits as an input, the encoding operation including an
`accumulation of mod-2 or exclusive-OR sums of bits in subsets
`of the information bits, the encoding operation generating at
`least a portion of a codeword,
`
`wherein the information bits appear in a variable number
`of subsets.
`
`Id. at 8:7–17.
`
`
`
`D.
`
`The Prior Art
`
`Apple relies on the following prior art:
`
`MacKay et al., “Comparison of Constructions of Irregular
`Gallager Codes,” IEEE TRANSACTIONS ON COMMUNICATIONS,
`Vol. 47, No. 10, pp. 1449–54, October 1999 (Ex. 1102,
`“MacKay”);
`
`Ping et al., “Low Density Parity Check Codes with Semi-
`Random Parity Check Matrix,” IEE ELECTRONICS LETTERS,
`Vol. 35, No. 1, pp. 38–39, Jan. 7, 1999 (Ex. 1103, “Ping”); and
`
`Coombes et al., U.S. Patent No. 4,271,520, filed June 25,
`1979, issued June 2, 1981 (Ex. 1118, “Coombes”).
`
`
`
`E.
`
`The Asserted Grounds
`
`Apple challenges claims 13–22 of the ’781 patent on the following
`
`grounds (Pet. 31–32, 48):
`
`7
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`References
`
`Basis
`
`Claims Challenged
`
`Ping and MacKay
`
`35 U.S.C. § 103(a) 13–15 and 17–22
`
`Ping, MacKay, and
`Coombes
`
`
`
`35 U.S.C. § 103(a) 16
`
`F.
`
`Claim Interpretation
`
`In an inter partes review, we construe claims by applying the broadest
`
`reasonable interpretation in light of the specification. 37 C.F.R. § 42.100(b);
`
`see Cuozzo Speed Techs., LLC v. Lee, 136 S. Ct. 2131, 2144–46 (2016).
`
`Under the broadest reasonable interpretation standard, and absent any
`
`special definitions, claim terms are given their ordinary and customary
`
`meaning, as would be understood by one of ordinary skill in the art in the
`
`context of the entire disclosure. See In re Translogic Tech. Inc., 504 F.3d
`
`1249, 1257 (Fed. Cir. 2007). Any special definitions for claim terms or
`
`phrases must be set forth “with reasonable clarity, deliberateness, and
`
`precision.” In re Paulsen, 30 F.3d 1475, 1480 (Fed. Cir. 1994).
`
`Based on the current record, we determine that no terms require
`
`explicit construction at this time. See Vivid Techs., Inc. v. Am. Sci. & Eng’g,
`
`Inc., 200 F.3d 795, 803 (Fed. Cir. 1999) (“[O]nly those terms need be
`
`construed that are in controversy, and only to the extent necessary to resolve
`
`the controversy”).
`
`
`
`II. ANALYSIS
`
`We now consider Apple’s asserted grounds and Caltech’s arguments
`
`in the Preliminary Response to determine whether Apple has met the
`
`8
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`“reasonable likelihood” threshold standard for institution under 35 U.S.C.
`
`§ 314(a).
`
`
`
`A.
`
`Obviousness Ground Based on Ping and MacKay
`
`Apple contends claims 3, 5–8, 10, and 12 are would have been
`
`obvious over Ping and MacKay. Pet. 31–48. Caltech disputes Apple’s
`
`contention. Prelim. Resp. 8–26.
`
`
`
`1.
`
`Ping
`
`Ping is an article directed to “[a] semi-random approach to low
`
`density parity check [LDPC] code design.” Ex. 1103, 38. In this approach,
`
`“[a]n LDPC code is defined from a randomly generated parity check matrix
`
`H.” Id. The size of matrix H is (n–k) × n where k is the information length
`
`and n is the coded length. Id. A codeword c is decomposed “as c = [p, d],
`
`where p and d contain the parity and information bits, respectively.” Id.
`
`Parity check matrix H can be decomposed into two parts corresponding to p
`
`and d as “H = [Hp, Hd].” Id. Hp is defined as follows:
`
`1
`1
`
`𝐇𝐩 = (
`
`⋱
`1
`1
`0
`Id. Hd is created such that it “has a column weight of t and a row weight of
`
`0
`
`)
`
`1 ⋱
`
`kt/(n–k) (the weight of a vector is the number of 1s among its elements)”
`
`such that
`
`9
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`Id.; Ex. 1104 ¶ 67.4
`
`Parity bits “p = {pi} can easily be calculated from a given d = {di}”
`
`using the following expressions:
`
`
`
`𝑑
`𝑝1 = ∑ ℎ1𝑗
`𝑗
`
`𝑑
`𝑑𝑗 and 𝑝𝑖 = 𝑝𝑖−1 + ∑ ℎ𝑖𝑗
`𝑗
`
`𝑑𝑗 (mod 2)
`
`Ex. 1103, 38 (equation (4)).5
`
`Apple contends Ping “was published in January 1999” and “is thus
`
`prior art to the ’781 patent under 35 U.S.C. § 102(a) and (b).” Pet. 24. Ping
`
`appears to be included in a publication from the Institution of Electrical
`
`Engineers bearing a “7th January 1999” date and a “JAN 25 1999” date
`
`stamp from “LINDA HALL LIBRARY.” Ex. 1103. Caltech does not
`
`dispute the prior art status of Ping. For purposes of this Decision, we
`
`
`4 This particular representation of Hd is taken from Dr. Davis’s testimony.
`Caltech does not dispute this representation. Cf. Prelim. Resp. 10–11 &
`n.10.
`
`5 The reference to “mod 2” refers to modulo-2 addition. Modulo-2 addition
`corresponds to the exclusive-OR (XOR or ⊕) logical operation, which is
`defined as follows: 1⊕1=0, 1⊕0=1, 0⊕1=1, and 0⊕0=0. See Pet. 11–12 &
`n.2.
`
`10
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`determine that Ping qualifies as prior art under 35 U.S.C. § 102(b)6 because
`
`the January 7, 1999, edition date and the January 25, 1999, date stamp
`
`provide some evidence of publication more than one year before the earliest
`
`possible effective filing date for the challenged claims of the ’781 patent,
`
`which is May 18, 2000. See Ex. 1101, at [60]; Ex. 1103.
`
`
`
`2. MacKay
`
`MacKay is a paper related to Gallager codes based on irregular
`
`graphs, which are “low-density parity check codes whose performance is
`
`closest to the Shannon limit.” Ex. 1102, 1449. According to MacKay,
`
`“[t]he best known binary Gallager codes are irregular codes whose parity
`
`check matrices have nonuniform weight per column.” Id. A parity check
`
`matrix that “can be viewed as defining a bipartite graph with ‘bit’ vertices
`
`corresponding to the columns and ‘check’ vertices corresponding to the
`
`rows” where “[e]ach nonzero entry in the matrix corresponds to an edge
`
`connecting a bit to a check.” Id. at 1450. As an example of an irregular
`
`code in a parity check matrix, MacKay describes a matrix that “has columns
`
`of weight 9 and of weight 3 [and] all rows hav[ing] weight 7.” Id. at 1451.
`
`Apple contends MacKay “was published in October 1999” and
`
`therefore “qualifies as prior art under 35 U.S.C. § 102(a) and (b).” Pet. 29,
`
`32. MacKay appears to be taken from a publication of the Institute of
`
`Electrical and Electronics Engineers bearing an “October 1999” date and a
`
`
`6 The Leahy-Smith America Invents Act, Pub. L. No. 112-29, 125 Stat. 284
`(2011) (“AIA”), amended 35 U.S.C. §§ 102 and 103. Because the priority
`date of the ’781 patent is before the effective date of the applicable AIA
`amendments, the pre-AIA versions of 35 U.S.C. §§ 102 and 103 apply.
`
`11
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`“NOV 02 1999” date stamp from “LINDA HALL LIBRARY.” Ex. 1102,
`
`1449. Caltech does not dispute the prior art status of MacKay. For purposes
`
`of this Decision, we determine that MacKay qualifies as prior art under
`
`35 U.S.C. § 102(a) because the October 1999 edition date and the
`
`November 2, 1999, date stamp provide some evidence of publication before
`
`the earliest possible effective filing date for the challenged claims of the
`
`’781 patent, which is May 18, 2000. See Ex. 1101, at [60]; Ex. 1102, 1449.
`
`
`
`3.
`
`Claims 13–15 and 18
`
`A claim is unpatentable under 35 U.S.C. § 103(a) if the differences
`
`between the claimed subject matter and the prior art are such that the subject
`
`matter, as a whole, would have been obvious at the time the invention was
`
`made to a person having ordinary skill in the art to which said subject matter
`
`pertains. See KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 406 (2007).
`
`The question of obviousness is resolved on the basis of underlying factual
`
`determinations, including: (1) the scope and content of the prior art; (2) any
`
`differences between the claimed subject matter and the prior art; (3) the level
`
`of skill in the art; and (4) where in evidence, so-called secondary
`
`considerations. See Graham v. John Deere Co., 383 U.S. 1, 17–18 (1966).
`
`We also recognize that prior art references must be “considered together
`
`with the knowledge of one of ordinary skill in the pertinent art.” In re
`
`Paulsen, 30 F.3d at 1480 (citing In re Samour, 571 F.2d 559, 562 (CCPA
`
`1978)). We analyze Apple’s obviousness grounds with the principles
`
`identified above in mind.
`
`In its obviousness analysis for claim 13, Apple cites the information
`
`bits in Ping denoted by vector d for the step of “receiving a block of data in
`
`12
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`the signal to be encoded.” Pet. 38 (citing Ex. 1103, 38). Apple contends
`
`“Ping receives the information bits d and computes from them an encoded
`
`codeword c.” Id. (citing Ex. 1104 ¶ 100). For the limitation “performing an
`
`encoding operation using the information bits as an input, the encoding
`
`operation including an accumulation of mod-2 or exclusive-OR sums of bits
`
`in subsets of the information bits,” Apple cites the modulo-2 summation
`
`𝑑
`∑ ℎ𝑖𝑗
`𝑗
`
`𝑑𝑗 and contends that these summations are sums of bits in a subset of
`
`the information bits, because each dj is an information bit. Id. at 38–39
`
`(citing Ex. 1103, 38; Ex. 1104 ¶ 102). Apple contends “Ping’s encoding
`
`operation also generates a codeword, so it must generate ‘at least a portion
`
`of a codeword’ as claimed.” Id. at 39 (citing Ex. 1103, 38; Ex. 1104 ¶ 103).
`
`Regarding “the information bits appear in a variable number of
`
`subsets,” Apple cites Ping in view of MacKay. See id. at 39–40. As
`
`background for its analysis of this limitation, Apple states the following
`
`regarding Ping:
`
`Ping’s outer code is regular because, in Ping, each information
`𝑑
`bit contributes to the same number of summations ∑ ℎ𝑖𝑗
`𝑑𝑗.
`𝑗
`Those summations are the “parity bits,” produced by Ping’s
`outer coder (and are distinct from the “parity bits” subsequently
`produced by Ping’s inner coder, the accumulator). The number
`of outer coder parity bits to which each information bit
`contributes is determined by Ping’s generator matrix Hd (which
`is, as explained above, also a portion of Ping’s parity-check
`matrix H). (Ex. 1103, Equations (1), (3) and (4), p. 38.) Each
`column in matrix Hd corresponds to a single information bit,
`and the number of 1s in a column determines the number of
`summations, or outer coder parity bits, to which the
`corresponding information bit contributes. (Id.) Ping refers to
`the number of 1s per column as the “column weight” of matrix
`Hd, and uses the variable “t” to set this number for every
`column. (Ex. 1103, p. 38.) (Ex. 1104, ¶87.)
`
`13
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`Id. at 32.
`
`Apple contends “[e]ach column of Ping’s matrix Hd corresponds to an
`
`information bit, and each row of the matrix Hd corresponds to a subset of
`
`information bits that are added together to form Ping’s outer coder parity
`
`𝑑
`bits, the summations (∑ ℎ𝑖𝑗
`𝑗
`
`𝑑𝑗).” Id. at 39 (citing Ex. 1104 ¶ 104).
`
`According to Apple, “[t]he number of subsets in which an information bit
`
`appears is given by the number of 1s in the column of Hd corresponding to
`
`that information bit,” which Ping teaches is “exactly ‘t’ 1s.” Id. at 34, 39.
`
`Apple further cites MacKay for teaching that “[t]he best known binary
`
`Gallager codes are irregular codes whose parity check matrices have
`
`nonuniform weight per column.” Id. at 40 (quoting Ex. 1102, 1449)
`
`(emphasis in original).
`
`Apple contends it would have been obvious to an ordinarily skilled
`
`artisan “to incorporate the non-uniform column weight of MacKay into the
`
`LDPC-accumulate codes of Ping, thus making Ping’s information bits
`
`𝑑
`contribute to different numbers of summations (∑ ℎ𝑖𝑗
`𝑗
`
`𝑑𝑗).” Id. at 40 (citing
`
`Ex. 1104 ¶ 105). Apple states that this would result in “some information
`
`𝑑
`bits . . . contribut[ing] to more summations (∑ ℎ𝑖𝑗
`𝑗
`
`𝑑𝑗) than others, such that
`
`the information bits would appear in a variable number of subsets.” Id.
`
`Based on MacKay’s teaching that “irregular codes perform better than
`
`regular codes,” Apple contends an ordinarily skilled artisan would have been
`
`motivated to incorporate irregularity into Ping’s “generator” matrix Hd. Id.
`
`at 34–36. Apple notes that Ping credits a reference written by the author of
`
`MacKay as having creating “revived interest in the low density parity check
`
`(LDPC) codes originally introduced in 1962 by Gallager.” Id. at 33 (quoting
`
`Ex. 1103, 38).
`
`14
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`Considering Apple’s analysis and submitted evidence, and the
`
`arguments presented in Caltech’s Preliminary Response, we are satisfied
`
`there is a reasonable likelihood that Apple would prevail in showing
`
`claim 13 would have been obvious over the combination of Ping and
`
`MacKay. We add the following for additional explanation.
`
`Caltech argues “Ping does not provide any disclosure of receiving
`
`data in a signal to be encoded, let alone receiving the data in a block
`
`format.” Prelim. Resp. 24. Caltech contends Ping’s “codeword c” is already
`
`encoded, and vector d “is merely a mathematical representation of the
`
`information bits in the codeword c . . . and provides no indication as whether
`
`information bits were ever received at all.” Id. In this instance, however,
`
`we understand the received “block of data to be encoded” to be
`
`commensurate with the information bits in vector d that are encoded in
`
`Ping’s described process. The Specification of the ’781 patent does not
`
`describe any particular form of the input “signal” or particular process for
`
`“receiving” a block of data. Thus, we are satisfied on the current record
`
`with Apple’s mapping of Ping’s inputted information bits from vector d to
`
`the recited “receiving a block of data in a signal to be encoded.”
`
`Caltech also argues Apple’s “analysis is flawed in that it incorrectly
`
`addresses only a portion of Ping’s parity check matrix Hd, rather than the
`
`parity check matrix H.” Prelim. Resp. 9. Accordingly, Caltech argues
`
`“Ping’s parity check matrix H already includes nonuniform weight per
`
`column—i.e., the ‘irregularity’ of MacKay.” Id. Based on Caltech’s
`
`interpretation of the “particular structure” of parity check matrix H as being
`
`[Hp, Hd], and Caltech’s allegation regarding Hd that “[t]he only value of t
`
`disclosed by Ping is 4” (Prelim. Resp. 10–12), Caltech contends that matrix
`
`15
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`H has column weights as shown in a diagram from page 12 of the
`
`Preliminary Response, which is reproduced below.
`
`
`
`Id. at 12, 18. Caltech concludes “Ping discloses a parity check matrix with
`
`different numbers of ones per column—i.e., different column weights . . .
`
`(weight 2, weight 1, and weight t = 4).” Id. at 12, 19. Thus, Caltech argues
`
`that there would be no motivation to modify Ping to include “irregularity”
`
`when Ping “already includes the aspects identified in MacKay.” Id. at 14,
`
`17–20. For similar reasons, Caltech argues Apple “has failed to show that
`
`Ping in view of MacKay discloses ‘wherein the information bits appear in a
`
`variable number of subsets.’” Id. at 20.
`
`Yet Caltech misapprehends Apple’s mapping of the teachings from
`
`Ping to the language of claim 13. Apple does not utilize Ping’s entire parity
`
`check matrix H in its analysis; rather, Apple maps Ping’s “series of
`
`𝑑
`summations ∑ ℎ𝑖𝑗
`𝑗
`
`𝑑𝑗” to the recited “encoding operation” of claim 13.
`
`Pet. 38–39. Apple correctly notes that Ping’s matrix Hd, rather than entire
`
`parity check matrix H, is utilized in forming these summations. See id. at
`
`32, 34, 36–40. Because each “subset” of claim 13 is a column of the matrix
`
`(see id. at 32, 34–36, 39–40; Prelim. Resp. 9–12), Apple’s mapping results
`
`in a “regular” number of 1s, denoted by the variable t, in each subset. See
`
`Pet. 33–34. As such, we do not agree that matrix Hd from Ping, as cited by
`
`Apple, already includes “irregularity” in the manner suggested by Caltech.
`
`16
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`We understand Apple’s combination as relating to the specific application of
`
`MacKay’s “non-uniform column weight” to Ping’s matrix Hd (see Pet. 40),
`
`not a generic application of “irregularity” (which is not a limitation in
`
`claim 13) to Ping’s teachings as a whole. As established by Apple, such a
`
`modification would result in “some information bits would contribute to
`
`𝑑
`more summations (∑ ℎ𝑖𝑗
`𝑗
`
`𝑑𝑗) than others, such that the information bits
`
`would appear in a variable number of subsets, as required by claim 13.” Id.
`
`Accordingly, Caltech’s arguments do not undermine Apple’s stated
`
`motivation to combine MacKay with Ping. Nor do they undermine Apple’s
`
`analysis of the “variable number of subsets” limitation in claim 13.
`
`Caltech additionally argues MacKay is “devoid of any teaching of
`
`modifying only a specific portion of a parity check matrix [i.e., Hd],
`
`including why or how it would be attempted.” Prelim. Resp. 15.
`
`Nevertheless, Apple shows persuasively that MacKay “teaches how to make
`
`LDPC matrices ‘irregular’ by implementing a ‘nonuniform weight per
`
`column.’” Pet. 35, 40 (both quoting Ex. 1102, 1449). Apple cites a specific
`
`example in MacKay where a matrix “has columns of weight 9 and of weight
`
`3.” Id. (quoting Ex. 1102, 1451). In light of this evidence, we agree that an
`
`ordinarily skilled artisan would have known how to add nonuniform column
`
`weights from MacKay to the uniform column weights in Ping’s matrix Hd.
`
`Finally, Caltech argues that we should deny institution under 35
`
`U.S.C. § 325(d) based on certain alleged similarities between the instant
`
`ground and the challenge of claims 13–15 in the 059 IPR based on Ping and
`
`another reference called Luby (U.S. Patent No. 6,081,909), among other
`
`things. See Prelim. Resp. 2–8. We note that MacKay was not asserted in the
`
`17
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`059 IPR, so we decline to exercise our authority under § 325(d) as to claims
`
`13–15.7
`
`Having considered Apple’s evidence and Caltech’s arguments in its
`
`Preliminary Response, we determine Apple has established sufficiently at
`
`this stage that Ping and MacKay teach every limitation of claim 13. Apple
`
`has also provided a sufficient rationale for its proposed combination. Thus,
`
`for the foregoing reasons, Apple demonstrates a reasonable likelihood of
`
`prevailing in showing that claim 13 would have been obvious over Ping and
`
`MacKay. Caltech does not address separately Apple’s explanations and
`
`supporting evidence regarding claims 14, 15, and 18. Based on the record
`
`before us, Apple has demonstrated a reasonable likelihood that it would
`
`prevail on its assertion that claims 14, 15, and 18 would have been
`
`unpatentable over Ping and MacKay. See Pet. 40–41, 42–43.
`
`
`
`
`
`4.
`
`Claim 17
`
`Claim 17 depends from claim 13 and recites “each of the subsets of
`
`the information bits includes a constant number of the information bits.”
`
`Apple cites Ping for teaching that “‘Hd has … a row weight of kt/(n-k),’
`
`meaning that every row of Hd contains exactly kt/(n-k) 1s.” Id. at 41
`
`(quoting Ex. 1103, 38). Relative to the language of claim 17, Apple explains
`
`that “[t]he number of information bits in a subset is given by the number of
`
`1s in the row of Hd corresponding to that subset” meaning that “there are
`
`
`7 For similar reasons, we decline to deny institution of the Ping-MacKay-
`Coombes obviousness ground based on § 325(d).
`
`18
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`kt/(n-k) information bits in each and every subset.” Id. (citing Ex. 1104
`
`¶ 111).
`
`Caltech notes that Apple’s analysis for claim 13 depends on Ping’s
`
`matrix Hd as modified by MacKay’s non-uniform column weights. Prelim.
`
`Resp. 21. Caltech argues that, in an apparent contradiction, Apple relies on
`
`an unmodified version of Ping’s Hd for teaching the “constant number of
`
`information bits” limitation in claim 17. Id. Caltech provides an example of
`
`how a matrix having constant row weights (like Hd) would no longer have
`
`constant weights after modification of the column weights to introduce non-
`
`uniformity. Id. at 22.
`
`We are persuaded by Caltech’s arguments. Apple’s analysis for
`
`claim 17 is inconsistent with its analysis for claim 13, which relies on a
`
`version of Ping’s Hd that has been modified according to the teachings of
`
`MacKay. See Pet. 39–40. Apple has not persuasively shown that this
`
`modified version of Hd would still have constant row weights of kt/(n-k) as
`
`in the unmodified version of Hd. Indeed, Apple’s analysis for claim 17
`
`makes no mention of MacKay or its teachings. Accordingly, Apple has not
`
`shown a reasonable likelihood that it would prevail with respect to claim 17
`
`as obvious over Ping and MacKay.
`
`
`
`5.
`
`Claims 19–21
`
`Apple’s analysis for each of claims 19–21 states:
`
`Petitioner does not contend that [this claim] requires
`irregularity, as the Board decided in IPR2015-00059. In the
`event that the Board now finds that [this claim] requires
`irregularity, the combination of Ping and MacKay teaches every
`limitation of [this claim].
`
`19
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`Pet. 43–45. The analysis for each claim then cites Ping exclusively except
`
`that “MacKay teaches irregularity if the Board finds that irregularity is
`
`required.” Id. at 44–45, 47.
`
`Apple’s generalized allegations about the concept of “irregularity” in
`
`claims 19–21 do not fulfill Apple’s requirement to “identif[y], in writing and
`
`with particularity . . . the grounds on which the challenge to each claim is
`
`based. 35 U.S.C. § 312(a)(3) (emphasis added). Instead of citing MacKay
`
`for teaching particular claim limitations in each of claims 19–21, Apple
`
`would have us use MacKay to fill potential breaches in Apple’s analysis
`
`“[i]n the event that the Board now finds that [claims 19–21] require[]
`
`irregularity.” See Pet. 43–45. We agree with Caltech (Prelim. Resp. 5 n.1)
`
`that this general invocation of MacKay fails to “specify where each element
`
`of the claim is found in the prior art patents or printed publications.”
`
`37 C.F.R. § 42.104(a)(4) (emphasis added). We have considered the entirety
`
`of Apple’s analysis for claims 19–21, including its many references to the
`
`analysis for limitations appearing in earlier claims. See Pet. 43–47. Apple’s
`
`analysis fails to map precisely MacKay’s teachings to the particular
`
`language of claims 19–21. In the absence of such a particularized showing,
`
`we determine Apple has failed to demonstrate a reasonable likelihood that it
`
`would prevail on its assertion that claims 19–21 would have been
`
`unpatentable over Ping and MacKay.
`
`
`
`20
`
`
`

`

`IPR2017-00423
`Patent 7,916,781 B2
`
`6.
`
`Claim 22
`
`Claim 22 depends from claim 21.8 For the reasons that follow, we
`
`determine that Apple’s analysis for claim 22 cures the deficiencies
`
`mentioned above regarding claim 21. In discussing claim 22, we incorporate
`
`Apple’s analysis for claim 21.
`
`Apple cites the information bits in Ping denoted by vector d for the
`
`step of “receiving a block of data in the signal to be encoded.” Pet. 38, 46
`
`(citing Ex. 1103, 38). Apple contends “Ping receives the information bits d
`
`and computes from them an encoded codeword c.” Id. at 38 (citing Ex. 1104
`
`¶ 100). Apple additionally maps the calculation of Ping’s first parity bit 𝑝1
`
`𝑑
`according to the summation ∑ ℎ1𝑗
`𝑗
`
`𝑑𝑗 for the “first parity bit” limitation. Id.
`
`at 42–43, 46. Regarding the “second parity bit” limitation, Apple maps the
`
`calculation of Ping’s second

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket