throbber
DECLARATION OF JODI L. GREGORY
`
`I, Jodi L. Gregory, declare as follows:
`
`1.
`
`I am over the age of 21 and otherwise competent to make this
`
`declaration. I have personal knowledge regarding the facts contained herein.
`
`2.
`
`I am the founder and President of Access Information Services, Inc.,
`
`which provides customized business research and analyses. I have been the owner
`
`there since 1988. My duties include research and analysis, and I conduct
`
`workshops on Internet research. I am regularly engaged by a wide variety of
`
`companies to conduct research regarding the availability of scientific literature. In
`
`the year 2014, Access Information Services Inc. merged with Seek Information
`
`Services, an intellectual property research firm, and began doing business as Seek
`
`Services.
`
`3,
`
`From 1989 to 1994,
`
`I was also Manager of the Information &
`
`Analysis Center with UESInc., a research, development, and technology creation
`
`and transfer company. My work duties there included creating and managing a
`
`centralized information resource center, managing research on over 200 companies
`
`and their competitors, and acquiring online databases, end-user tools, collection
`
`development systems, and database management systems.
`
`Page | of 7
`
`GOOGLE EXHIBIT 1044
`Google LLC v. Blackberry Ltd.
`IPR2017-01620
`
`GOOGLE EXHIBIT 1044
`Google LLC v. Blackberry Ltd.
`IPR2017-01620
`
`Page 1 of 7
`
`

`

`4.
`
`I have served on the Association of Independent
`
`Information
`
`Professionals’ Board of Directors, and I have held the positions of President-Elect
`
`and President of the Association.
`
`5.
`
`A true and correct copy of my Curriculum Vitae is attached hereto as
`
`AttachmentA.
`
`6.
`
`I have been asked to provide an opinion regarding the public
`
`availability of the book identified as Exhibit 1016 to Google LLC’s Petitions for
`
`Inter Partes Review of U.S. Patent No. 8,489,868 in IPR2017-01619 and
`
`IPR2017-01620. For the reasons detailed below in paragraphs 7-15, based on my
`
`review of Exhibit 1016 and myresearch, it is my opinion that the book identified
`
`as Exhibit 1016 was publicly available before September 21, 2000, so that
`
`interested members of the public could have obtained the book with reasonable
`
`diligence if they so desired.
`
`7.
`
`Based on myreview of Exhibit 1016 and my research, Exhibit 1016 is
`
`an excerpt of a true and accurate copy of Gong, Li, “Inside Java 2 Platform
`
`Security Architecture: Cryptography, APIs, and Implementation” (hereinafter,
`
`“Gong”), obtained from the North Carolina State University Libraries (hereinafter,
`
`“NCSU Libraries”). The online cataloguing information provided by the NCSU
`
`Libraries for Gong is marked as Exhibit 1038, and reflects the same,title, author,
`
`Page 2 of 7
`
`Page 2 of 7
`
`

`

`call number(i.e., QA76.73 .J38 G65 1999), and ISBN (i.e., 0201310007) as shown
`
`in Exhibit 1016.
`
`8.
`
`As shown on page 4 of Exhibit 1016, Gong includes a stamped date
`
`due card. Each stamp on the date due card indicates that Gong was borrowed from
`
`the NCSU Libraries by a patron and was expected to be returned by the date
`
`stamped on the card. This is shown onthecarditself, which states that the “bookis
`
`due on the date indicated,” and is consistent with the well-known and common
`
`practice of libraries at
`
`the time that used a manual system for allowing the
`
`borrowing of items from their collections. The earliest stamped due date on the
`
`card on page 4 of Exhibit 1016 indicates that Gong was checked out from the
`
`NCSULibraries on or before February 8, 2000.
`
`9.
`
`In response to my inquiry to the NCSU Libraries, a librarian at the
`
`NCSULibraries confirmed that its copy of Gong identified as Exhibit 1016 was
`
`date stamped on the cover page upon borrowing with dates on which the book was
`
`to be returned to the NCSU Libraries, indicating that Gong was publicly available
`
`on or before those dates at the NCSU Libraries.
`
`10. As indicated by Exhibit 1039, Gong was available for purchase online
`
`no later than November 14, 1999, via the website Amazon.com. Exhibit 1039 is a
`
`true and accurate copy of a printout of the HTML file captured on November14,
`
`1999, using the Internet Archive’s Wayback Machine service for the URL (ie.,
`
`Page 3 of 7
`
`Page 3 of 7
`
`

`

`Uniform Resource Locator, colloquially termed a web address) to purchase Gong
`
`from Amazon.com.
`
`11.
`
`The Wayback Machineis an archive of information obtained from the
`
`World Wide Web that is created and maintained by the Internet Archive, a non-
`
`profit organization. The Wayback Machine enables a user to access archived
`
`versions of a web page over a period of time. To accomplish this, the Wayback
`
`Machine captures “snapshots” of publicly accessible web pages on the Internet—
`
`preserving these web pages as they existed on the Internet at the point of time of
`
`capture. A user can supply a URL of a desired web page to the Wayback
`
`Machine’s website interface and the user will be presented with a list of dates upon
`
`which the web page was archived. The user can click one of the listed dates to
`
`access and view the web pageasit existed on the selected date. Each archived web
`
`page is assigned a distinct URL that includes the original web page URL as well as
`
`a date code, which is a list of numbers in the format of “yyyymmddhhmmss”(..e.,
`
`year, month, day, hour, minute, second). The date code indicates, down to the
`
`second, when the archived web page was captured. The foregoing is based on my
`
`knowledge and years of experience using the Wayback Machine.
`
`12.
`
`A search of the Internet Archive’s Wayback Machine shows that
`
`Gong waspublicly available for purchase online at least as early as November14,
`
`1999. For example, an archived version of the Amazon.com webpage for
`
`Page 4 of 7
`
`Page 4 of 7
`
`

`

`purchasing
`
`Gong
`
`is
`
`available
`
`at
`
`the
`
`URL:
`
`https://web.archive.org/web/19991114194120/http://www.amazon.com/exec/obido
`
`s/ASIN/0201310007/ (see Exhibit 1039). The date code embedded in this URL
`
`indicates that the webpage was captured by the Wayback Machine on November
`
`14, 1999, at 7:41 p.m. and 20 seconds.
`
`13. Accordingly, as explained above, an interested party could have
`
`purchased Gong byat least November 14, 1999, by browsing to the Amazon.com
`
`webpage
`
`at
`
`the
`
`publicly
`
`accessible
`
`URL
`
`https://web.archive.org/web/19991114194120/http://www.amazon.com/exec/obido
`
`s/ASIN/0201310007/.
`
`14.
`
`Exhibit 1040 is a true and accurate copy of a webpage belonging to
`
`Addison-Wesley (the publisher of Gong) that was captured by Internet Archive’s
`
`Wayback Machine on January 15, 2000. The webpage discusses an online chat
`
`with Li Gong (the author of Gong) held on September 30, 1999, to discuss Java
`
`Security and Gong. The archived version of the webpageis available at the URL:
`
`https://web.archive.org/web/200001 15 153655/http:/www.awl.com:80/cseng/author
`
`s/chats/septemberchats.shtml (see Exhibit 1040). The date code embeddedin this
`
`URL indicates that
`
`the webpage was captured by the Wayback Machine on
`
`January 15, 2000, at 3:36 p.m. and 55 seconds.
`
`Page 5 of 7
`
`Page 5 of 7
`
`

`

`15. As
`
`indicated by Exhibit 1041
`
`(annotated to highlight
`
`relevant
`
`publications), Gong wascited by various publications prior to September 21, 2000.
`
`Exhibit 1041 is a true and accurate copy of a printout of the HTMLfile accessible
`
`at the following URL: https://dl.acm.org/citation.cfm?id=3 10688&preflayout=flat.
`
`The URL is a webpage of the Association for Computing Machinery’s Digital
`
`Library that provides a list of publications that cite Gong. As indicated by the
`
`annotations in Exhibit 1041, Gong wascited by publications from December 1999
`
`(Exhibit 1042) and September 2000 (Exhibit 1043).
`
`16. While I am being compensated at the rate of $125 per hour for my
`
`services in this matter,
`
`I have no interest
`
`in the proceedings to which this
`
`declaration pertains.
`
`17.
`
`I declare that all statements made herein of my knowledgeare true,
`
`and that all statements made on information and belief are believed to be true, and
`
`that these statements were made with the knowledge that willful false statements
`
`and the like so made are punishable by fine or imprisonment, or both, under
`
`Section 1001 of Title 18 of the United States Code.
`
`Page 6 of 7
`
`Page 6 of 7
`
`

`

`I declare under penalty of perjury under the laws of the United States of
`
`Americathat the foregoing is true and correct.
`
`ExecutedonJanuary24,2018
`
`di K. fh Ge
`
`di L. Gregory
`
`Page 7 of 7
`
`Page 7 of 7
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket