throbber

`
`INTRODUCTION
`I.
`I, H. V. Jagadish, declare as follows:
`
`1.
`
`I am a Professor of Electrical Engineering and Computer Science at the
`
`University of Michigan. Unless otherwise noted, I have personal knowledge of the matters
`
`stated below, and, if called to testify, I could and would testify competently thereto.
`
`2.
`
`I have been retained by the Patent Owner (“PO”), Enfish, LLC in this matter.
`
`This Declaration sets forth my opinions and the bases for those opinions regarding the
`
`validity of the instituted claims of U.S. Patent No. 6,151,604 (the “ʼ604 Patent”).
`
`II.
`
`QUALIFICATIONS
`3.
`I am an independent consultant. All of my opinions stated in this report are
`
`based on my own personal knowledge and professional judgment. In forming my opinions, I
`
`have relied on my knowledge and experience in databases and software development
`
`practices, and on the documents and information referenced in this Report. I am over 18
`
`years of age and, if I am called upon to do so, I would be competent to testify as to the
`
`matters set forth herein.
`
`4.
`
`I am the Bernard A. Galler Collegiate Professor of Electrical Engineering and
`
`Computer Science at the University of Michigan. I am part of the database group and
`
`director of the software systems laboratory at the University. As a professor, I teach
`
`courses related to database management, the web, and data structures and algorithms.
`
`5.
`
`Attached hereto as Appendix A is a true and correct copy of my C.V.
`
`1
`
`Page 1 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 1 of 126
`
`

`

`
`
`6.
`
`I obtained my Ph. D. from Stanford in 1985, and worked many years for
`
`AT&T, where I eventually headed the database department. I began my work at the
`
`University of Michigan in the fall of 1999, and also performed work at the University of
`
`Illinois.
`
`7.
`
`I have published extensively, and am recognized as a leading researcher in
`
`the area of databases. Certain academic search systems include me in the top (15) authors
`
`in the database area
`
`(http://academic.research.microsoft.com/?SearchDomain=2&SubDomain=18&entitytype=2).
`
`Appendix B, attached. In particular, I am the most published author
`
`(http://academic.research.microsoft.com/Conference/458/vldb-very-large-data-bases) in
`
`VLDB (Very Large Databases), a leading forum for database research. Appendix C,
`
`attached.
`
`8.
`
`9.
`
`I am a Fellow of the ACM, and named inventor on 37 United States Patents.
`
`I have testified as an expert at trial or by deposition within the preceding four
`
`years, as set forth in Appendix D, attached. I have additionally worked as a consulting
`
`expert in a number of cases.
`
`III.
`
`COMPENSATION
`10.
`I am being compensated at the rate of $520 per hour for my work as an
`
`expert in this case. My compensation is not dependent on the content of my opinions or the
`
`outcome of this case.
`
`2
`
`Page 2 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 2 of 126
`
`

`

`
`
`IV.
`
`BACKGROUND ON THE INVENTION DESCRIBED AND CLAIMED IN THE ʼ604 PATENT
`
`11.
`
`A database is a structured collection of related data that describes some part
`
`of the world. For example, databases can store all of the operational data needed to
`
`describe a commercial market (e.g. Amazon.com) or scientific phenomena (e.g.
`
`meteorological data).
`
`12.
`
`The information that describes and defines the organization of a database,
`
`which is called metadata, must itself be expressly defined and stored. Such metadata might
`
`include, for example, the minimum value permitted in a particular data field or the
`
`relationship among two data fields.
`
`13.
`
`The stored data and the stored metadata are both used to meet a user’s
`
`request for information, but these were typically stored separately, since they are used in
`
`different ways: parts of the data, possibly combined and manipulated, are what are provide
`
`to the user; the metadata provides important information about the data, and in particular is
`
`central to determining how the system works with the data.
`
`14. Different approaches exist to database design. In the mid-1990s, the
`
`dominant database model enabled programmers and software users to perceive the data in
`
`a database as existing in a collection of interrelated tables, even though the physical
`
`storage of the data was far different.
`
`15.
`
`In this “relational” model, the overall database can consist of many different
`
`tables, each table representing related types of data objects, and these tables are linked
`
`3
`
`Page 3 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 3 of 126
`
`

`

`
`
`together by matching data values in specified fields. Each table, in turn, consists of simple
`
`rows and columns of data. However, the collection of tables in a database can be quite
`
`large and the relationships between tables quite complex.
`
`V.
`
`PRIOR ART DATABASE TECHNOLOGIES LEFT UNMET MARKET NEEDS
`A.
`They required extensive up-front design and redesign efforts.
`16.
`Then-existing database technologies required a large, up-front investment in
`
`design. To implement a database, designers would first need to analyze the properties of
`
`and inter-relationships between real-world entities about which information is to be stored in
`
`the database. Based on this analysis, they would have to develop a logical design for the
`
`structure of the database. The database would then capture this design as metadata for the
`
`database to be created.
`
`17.
`
`All of the steps described above requires a great deal of effort, which may be
`
`affordable in situations where there is a great deal of structure that remains relatively
`
`constant so that the one-time cost of design can provide benefits for an extended period.
`
`All too often, such structure and stability are not available. In consequence, researchers of
`
`the time faced the “problems” of managing “[d]ata whose schema is unclear, changes
`
`without notice, or whose structure is irregular.” See Silberschatz et al, Database Research:
`
`Achievements and Opportunities Into the 21st Century, Report of an NSF Workshop on the
`
`Future of Database Systems Research, May 26-27, 1995, at p. 13.
`
`18. Databases of this time also were not easy to redesign. Changes might need
`
`to be made when, for example, relationships changed among the data being stored, or new
`
`4
`
`Page 4 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 4 of 126
`
`

`

`
`
`sources or types of data needed to be integrated. To make these changes, the system’s
`
`data model would need to be analyzed and modified accordingly, possibly necessitating
`
`modifications to the application programs relying on that data. The impacts of such
`
`changes were often high costs, significant downtime, and major inconvenience.
`
`They could not readily integrate multiple types and sources of data.
`B.
`19. Database technologies of the mid-1990s could not effectively manage new
`
`and varied data types. As an illustration, a database system might store date information,
`
`which is highly-structured, and also email, free-text information, and images.
`
`20.
`
`In describing this “problem” with data type management, researchers wrote,
`
`“There must be a way for the programmer to construct the types appropriate for his or her
`
`application.” Ex. 2008, p. 115.
`
`21.
`
`As new data types continued to evolve, then-existing systems were ill-
`
`equipped to accommodate them, as most systems were focused on a fixed, non-extensible
`
`set of supported data types.
`
`22. Nor did the then-existing technologies support efficient integration and
`
`management of many different data sources, as data at diverse locations might exist in
`
`different formats, languages, and systems of measure. Numerous strategies to integrate
`
`data sources were being developed, but these nascent efforts could not yet meet the
`
`business need.
`
`23.
`
`Indeed, in 1995, researchers declared the need for “tools to integrate
`
`heterogeneous information.” Ex. 2026, p. 13.
`
`5
`
`Page 5 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 5 of 126
`
`

`

`
`
`C.
`24.
`
`They failed to help users overcome information overload.
`Then-existing
`technologies
`lacked an
`intuitive way
`to readily access
`
`information of interest in a growing sea of data. Even years later, researchers were still
`
`trying to cope with the “enormous quantity of data” that was becoming available. Ex. 2009,
`
`p. 7. At the desktop level, for example, individual users were accumulating massive
`
`numbers of electronic files, and this problem was exacerbated by the increasing flood of
`
`email communications.
`
`25.
`
`Presenting this voluminous data to end-users in a quantity and format that
`
`they could comprehend became increasingly challenging. A major problem was that
`
`technologies of the time did not provide meaningful, user-editable linkages between related
`
`pieces of information. Nor did those technologies allow users to effectively search across
`
`the many different types of data.
`
`VI.
`
`INVENTIVE FEATURES THAT ENABLED ENFISH TO MEET MARKET NEEDS
`26.
`In my opinion, the Enfish patents claim at least four novel features that,
`
`present a novel database design.
`
`Single-table database
`2.
`In the claimed inventions, all of the database information is in one table,
`
`27.
`
`including indexes of the stored data that facilitate rapid searches, while rows in the table are
`
`explicitly allowed to differ in their type (and hence structure). For example, all of the claims
`
`require “a logical table, said logical table including…” (emphasis added).
`
`6
`
`Page 6 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 6 of 126
`
`

`

`
`
`28. Where the prior art required creation of a new table for new information
`
`objects, the single table of Enfish merely requires a new record type. That single table is
`
`sufficient because it can flexibly store any type of data defined by users. Maintenance and
`
`searching are also easier across only a single table.
`
`Metadata
`3.
`29. Metadata describes and defines a database, ensuring that the data, once
`
`stored, can be used effectively. For example, in a traditional relational database, metadata
`
`defines the logical structure such as the table names and column names and types. There,
`
`metadata is stored in a separate set of system tables that are managed by the database,
`
`not by the user.
`
`30.
`
`The big separation between data and metadata in traditional systems limits
`
`their use, particularly in terms of flexibility. These limitations led many to propose ways of
`
`integrating metadata, even years later. See, e.g., Ex. 2012, p. 625. Yet despite “numerous
`
`proposals . . . in order to facilitate metadata management,” “a simple, elegant approach to
`
`uniformly model and query both the data and the metadata [were] elusive.” Ex. 2013, pp. 1-
`
`2.
`
`31.
`
`In contrast, Enfish metadata records are in the same table as the data
`
`records. For example, claim 1 recites “at least one of said logical rows includes logical
`
`column information defining each of said logical columns.” ‘604 patent cl. 1. These
`
`metadata records allow users to introduce new types of rows and define new columns when
`
`7
`
`Page 7 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 7 of 126
`
`

`

`
`
`required. Users can freely add and manipulate them, making it very easy to introduce new
`
`record types into the database.
`
`Self-referentiality
`4.
`It is standard practice in relational databases for records to link related
`
`32.
`
`records (by using a common attribute value in specified fields). Usually, a record in one
`
`table is linked to a record in a different table.
`
`33.
`
`In the Enfish design, all records are in a single table, so all links between
`
`records are also within a single table. For example, to help link a row of metadata about a
`
`column, claim 1 recites “at least one of said logical rows has an OlD equal to the OlD of a
`
`corresponding one of said logical columns.” Ex. 1101, cl. 1.
`
`34.
`
`This design simplifies the maintenance of reciprocal references, which can be
`
`challenging. More generally, the ability to define an unlimited number of links between data
`
`items to model complex relationships among data closely emulates the way that humans
`
`associate pieces of information.
`
`35.
`
`In traditional database systems, links are only to data records, not to
`
`metadata records. But the Enfish design allows reference to metadata records, which
`
`leads to great flexibility in handling new types of data records, and in making changes to the
`
`design of the database as needs evolve. Cf. Ex. 2026, p. 13 (identifying challenges in
`
`handling data schemas and structure). As an example, a column may be added or changed
`
`simply by changing data in a metadata row that references that column.
`
`8
`
`Page 8 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 8 of 126
`
`

`

`
`
`Object identifiers
`5.
`The Enfish inventors provided object identifiers (OIDs) to allow users to freely
`
`36.
`
`represent relationships between any sets of data in the database. For example, claim 1
`
`recites “each said logical row having an object identification number (OlD) to identify each
`
`said logical row.” Ex. 1101, cl. 1.
`
`37.
`
`To this end, Enfish designed each row to represent an object, and used an
`
`object identifier to reference the row. Since column definitions are also rows in the table,
`
`column definitions also get object identifiers, making it easy to treat both rows and columns
`
`as objects. This minimizes the user’s burden in using the database and in translating data
`
`to and from external applications.
`
`38.
`
`Further, object identifiers enable a user to manipulate stored data without
`
`having to rely on some unique field in the data itself (e.g., social security number). These
`
`object identifiers associated with rows and columns are also natural means for one record to
`
`reference another. Indeed, any relation can be represented using object-identifier links.
`
`VII. MARKET SUCCESS OF ENFISH DUE TO ITS INVENTIVE FEATURES
`39.
`The Enfish products’ ability to support juggling large amounts of information,
`
`handle new and varied types of data, and support efficient indexing and searching were a
`
`direct result of Enfish’s patented inventions that put all data into a single table. They also
`
`resulted from the including of metadata records that allowed users to introduce new types of
`
`rows and define new columns when required.
`
`9
`
`Page 9 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 9 of 126
`
`

`

`
`
`40.
`
`And both of these design features were made possible by the use of a self-
`
`referential table using object identifiers that tied the metadata to the data by linking rows
`
`and columns.
`
`41.
`
`Enfish’s flexible and efficient search capabilities were the direct result of its
`
`novel, single-table design as well as its ability to support new data types through the use of
`
`metadata – that was accessible in the self-referential database through the use of object
`
`identifiers.
`
`42.
`
`The organizational and analytical
`
`flexibility of Enfish (e.g. automatic
`
`organization of content across data sources and ability to determine what info is important
`
`to each user) was again attributable to the four novel features implemented in DEXIS and
`
`disclosed and claimed in the ‘604 patent.
`
`VIII. CLAIM CONSTRUCTION
`A.
`The Standard for Claim Construction in Inter Partes Review
`43.
`I understand that, in Inter Partes Review, the claims are to be given their
`
`broadest reasonable interpretation (BRI) in light of the specification. See 37 C.F.R.
`
`§ 42.100(b). In performing my analysis and rendering my opinions, I have interpreted claim
`
`terms for which PO has not proposed a construction by giving them the ordinary meaning
`
`they would have to a person having ordinary skill in the art (“POSITA”), reading the ʼ604
`
`Patent with its relevant priority filing date (March 28, 1995) in mind and in light of its
`
`specification and file history.
`
`10
`
`Page 10 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 10 of 126
`
`

`

`
`
`Opinion Regarding a POSITA
`B.
`44. Counsel has advised me that to determine the appropriate level of one of
`
`ordinary skill in the art, the following factors may be considered: (a) the types of problems
`
`encountered by those working in the field and prior art solutions thereto; (b) the
`
`sophistication of the technology in question, and the rapidity with which innovations occur in
`
`the field; (c) the educational level of active workers in the field; and (d) the educational level
`
`of the inventor.
`
`45.
`
`The relevant technology field for the ʼ604 Patent is data management and
`
`information retrieval. Based on this, and the four factors above, it is my opinion that
`
`POSITA would have been someone with at least a BS degree in Electrical Engineering or
`
`Computer Science, and with at least three years of additional experience in use of relational
`
`database systems.
`
`C.
`
`46.
`
`Constructions of Specific Claim Terms
`1.
`OID
`The terms “OID” and/or “object identification number” are recited in claims 1,
`
`2, 10, 11, 12, 16, 17, 20, 24, 31, 32, 40, 41, 42, 46, 47, 50, and 54. “OID” and “object
`
`identification number” are well-known terms of art. Their broadest reasonable interpretation
`
`is the well-understood meaning to one of ordinary skill in the art. An “OID” is a system-
`
`generated number that uniquely identifies an object of interest and is immutable.
`
`11
`
`Page 11 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 11 of 126
`
`

`

`
`
`An “OID” Is Unique
`(1)
`The description in the specification is consistent with the above reading.
`
`47.
`
`First, as the patent specification describes in the background, those of skill in the art
`
`understand that in any object-oriented model, the OIDs are unique: “Key features of the
`
`object-oriented model are: 1) each item has a unique system generated object identification
`
`number that can be used for exact retrieval.” Ex. 1101, 1:65-2:1.
`
`48.
`
`The specification goes on to describe how the system must use unique OIDs:
`
`“As previously described, the system must generate a unique OID when columns and rows
`
`are formed.” Ex. 1101, 8:7-8. And every row and every column is assigned such a unique
`
`OID: “Each row is assigned a unique object identification number (OID) stored in column
`
`120 and each column also is assigned a unique OID, indicated in brackets and stored in row
`
`108.” Ex. 1101, 6:43-45.
`
`49.
`
`In one particular embodiment, the specification describes using a session
`
`identification to ensure uniqueness: “In the preferred embodiment, the session identification
`
`is derived from the unique serial number of the application installed on the users machine.”
`
`Ex. 1101, 8:22-24. Figure 4 of the specification illustrates an embodiment of a method
`
`whereby unique OIDs are ensured by combining a session identification and a timestamp.
`
`Ex. 1101, Figure 4. Even with a session ID and timestamp, the embodiment includes
`
`additional tiebreaking steps to ensure uniqueness. Id.
`
`12
`
`Page 12 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 12 of 126
`
`

`

`
`
`’604 Patent, Figure 4
`
`
`
`50.
`
`I agree with Dr. Hosking that the OIDs are unique. See Ex. 1002, ¶ 51; Ex.
`
`2003, 27:18-29:15 (“Q So do OIDs need to be unique from object to object to be able to
`
`identify an object? A Indeed, they would have to be unique otherwise they cannot be
`
`compared for [e]quality. . . . Q If you want to provide OIDs for a certain group of objects, do
`
`the OIDs for those objects need to be unique at least within that group of OIDs? . . . THE
`
`WITNESS: If I have a group of objects that I want to distinguish, then within that group of
`
`objects the OIDs must be unique.”)
`
`51.
`
`To effectively identify an object, it should never be the case that the same
`
`OID is attached to two or more objects in a database. As the specification describes, OIDs
`
`are known in the art and used in the invention for retrieval: “each item has a unique system
`
`generated object identification number that can be used for exact retrieval.” Ex. 1001, 1:60-
`
`64. Without uniqueness, retrieval of an object with an OID will result in more than one
`
`object and, thus, a non-functional database.
`
`13
`
`Page 13 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 13 of 126
`
`

`

`
`
`52.
`
`The literature further supports an interpretation of OID that requires
`
`uniqueness. Introduction to Database and Knowledge-Base Systems, published in 1992,
`
`states that an OID “uniquely identifies an object.” Ex. 2070, p. 307. I agree with Dr.
`
`Hosking that Introduction to Database and Knowledge-Base Systems is an authoritative
`
`book.
`
`53.
`
`Fundamentals of Database Systems, another authoritative text, also states
`
`that OIDs are unique:
`
`20.2.1 Object Identity
`
`An OO database system provides a unique identity to each
`independent object stored in the database. The unique identity is
`typically implemented via a unique, system-generated object
`identifier (OID). The value of an OID is not visible to the external
`user, but is used internally by the system to identify each object
`uniquely and to create and manage inter-object references. The OID
`can be assigned to program variables for the appropriate type when
`needed.
`
`The main property required of an OID is that it be immutable; that is,
`the OID value of a particular object should not change. . . . It is also
`desirable that each OID be used only once; that is, even if an
`object is removed from the database, its OID should not be
`assigned to another object.
`
`Ex. 2068, p. 644.
`
`14
`
`Page 14 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 14 of 126
`
`

`

`54.
`
`Another authoritative text, Database Systems: An Application Oriented
`
`Approach, also describes the commonly-known OID as unique:
`
`
`
`[E]very object has a unique and immutable identity, called the
`object ID (OID), which is independent of the actual value of the object.
`The OID is assigned by the system when the object is created and
`does not change during the object’s lifetime. Note the distinction
`between OIDs and primary keys of relations. Like an OID, a primary
`key uniquely identifies the object. However, unlike an OID, the value
`of a primary key might change . . .
`
`Ex. 2069, pp. 543-44 (emphasis added).
`
`55.
`
`Finally, Microsoft also considers OIDs to be unique identifiers:
`
`Object identifiers are unique numeric values that are granted by
`various issuing authorities to identify data elements, syntaxes, and
`other parts of distributed applications. Because they are globally
`unique, object identifiers ensure that the objects that are defined by
`these issuing authorities do not conflict with one another when
`different directories, such as Active Directory and Novell Directory
`Services, are brought together in a global directory namespace.
`
`Ex. 2067(emphasis added).
`
`56.
`
`Second,
`
`An “OID” Is Immutable
`(1)
`the broadest reasonable
`interpretation of OID must
`
`include
`
`immutability. Persons of ordinary skill in the art understand that a functional system must
`
`assign an identifier to an object that does not change: if an object identifier could be
`
`15
`
`Page 15 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 15 of 126
`
`

`

`
`
`changed, the object could no longer be retrieved unambiguously or referenced with
`
`confidence and, thus, the system would be non-functional.
`
`57.
`
`Again, the inclusion of immutability in the broadest reasonable interpretation
`
`of OID is supported by both the specification and the literature. For example, OIDs are
`
`shared across systems:
`
`Important date records are assigned special predetermined OIDS
`since they always have the same identity in any system. Assigning
`predetermined OID’s to dates allows Important Dates to be shared
`across systems. The predetermined OID is generated by using a
`special session identification number that signifies that the OID is an
`Important Date. In this case, the timestamp represents the value of
`the Important Date itself, not the time that it was created.
`
`Ex. 1101, 14:1-4. If an OID were to change, the change could not be propagated to other
`
`systems.
`
`58.
`
`Introduction to Database and Knowledge-Base Systems, published in 1992,
`
`states that an OID does not change even if other properties of the object change: “The
`
`main property required of an OID is that it be immutable; that is, the OID value of a
`
`particular object should not change.” Ex. 2068, p. 644 (emphasis added).
`
`59. Database Systems: An Application Oriented Approach, also describes OIDs
`
`as non-changing:
`
`[E]very object has a unique and immutable identity, called the object
`ID (OID), which is independent of the actual value of the object. The
`
`16
`
`Page 16 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 16 of 126
`
`

`

`
`
`OID is assigned by the system when the object is created and
`does not change during the object’s lifetime. Note the distinction
`between OIDs and primary keys of relations. Like an OID, a primary
`key uniquely identifies the object. However, unlike an OID, the value
`of a primary key might change . . .
`
`Ex. 2069, pp. 543-44 (emphasis added).
`
`An “OID” Is System Generated
`(1)
`Third, the broadest reasonable interpretation of “OID” includes an OID that is
`
`60.
`
`system generated. This is true at least because, in order to ensure that an OID is unique
`
`and that it is immutable, it must be system-generated rather than user-generated. Again,
`
`this interpretation is supported by the specification and the literature.
`
`61.
`
`The specification describes a “key feature” that OIDs are system generated:
`
`Key features of the object-oriented model are: 1) each item has a unique system generated
`
`object identification number that can be used for exact retrieval.” Ex. 1101, 1:65-2:1.
`
`62.
`
`Particular embodiments described in the specification also define an OID as
`
`system generated:
`
`Important date records are assigned special predetermined OIDS
`since they always have the same identity in any system. Assigning
`predetermined OID’s to dates allows Important Dates to be shared
`across systems. The predetermined OID is generated by using a
`special session identification number that signifies that the OID is
`an Important Date. In this case, the timestamp represents the value of
`the Important Date itself, not the time that it was created.
`
`17
`
`Page 17 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 17 of 126
`
`

`

`
`
`Ex. 1101, 14:1-8 (emphasis added).
`
`63.
`
`Introduction to Database and Knowledge-Base Systems, published in 1992,
`
`states that an OID is “system-generated” Ex. 2070, p. 307.
`
`64.
`
`Fundamentals of Database Systems, states that the main feature of an OID is
`
`that it is system generated:
`
`20.2.1 Object Identity
`
`to each
`identity
`An OO database system provides a unique
`independent object stored in the database. The unique identity is
`typically implemented via a unique, system-generated object
`identifier (OID). The value of an OID is not visible to the external
`user, but is used internally by the system to identify each object
`uniquely and to create and manage inter-object references. The
`OID can be assigned to program variables for the appropriate type
`when needed.
`
`Ex. 2068, p. 644 (emphasis added).
`
`65.
`
`Finally, Microsoft also considers OIDs to be system generated:
`
`Object identifiers are unique numeric values that are granted by
`various issuing authorities to identify data elements, syntaxes,
`and other parts of distributed applications. Because they are globally
`unique, object identifiers ensure that the objects that are defined by
`these issuing authorities do not conflict with one another when
`different directories, such as Active Directory and Novell Directory
`Services, are brought together in a global directory namespace.
`
`18
`
`Page 18 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 18 of 126
`
`

`

`
`
`Ex. 2067 (emphasis added).
`
`“anchor”
`2.
`The term “anchor” is recited in claims 21 and 51 of the ʼ604 Patent. In light of
`
`66.
`
`the specification, this term should be construed as “a set of values stored within a logical
`
`cell that specify the location of a key word or phrase within the logical cell and identify the
`
`key word or phrase.” Ex. 1101, 12:37-34, FIG. 12.
`
`“external documents”
`3.
`The term “external documents” is recited in claims 30 and 60 of the ʼ604
`
`67.
`
`Patent. In light of the specification, this term should be construed as “documents that are
`
`not directly stored in the database.” Ex. 1101, 16:1-9, FIG. 2.
`
`D.
`
`68.
`
`Algorithmic Support for Means-Plus-Function Limitations
`1.
`Structure Generally for Means-Plus-Function Limitations
`At least the following portions of the specification of the ʼ604 Patent disclose
`
`the structure generally to support the functions recited in the means-plus-function limitations
`
`found in the instituted claims:
`
` “Useful machines for performing the operations of the present
`invention include general purpose digital computers or other similar
`digital devices.” Ex. 1101, 4:49-52.
`
` “The present invention relates to method steps for operating a
`computer in processing electrical or other (e.g., mechanical, chemical)
`physical signals to generate other desired physical signals. The
`present invention also relates to apparatus for performing these
`
`19
`
`Page 19 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 19 of 126
`
`

`

`
`
`operations. This apparatus may be specially constructed for the
`required purposes or it may comprise a general purpose computer as
`selectively activated or reconfigured by a computer program stored in
`the computer. The algorithms presented herein are not inherently
`related to a particular computer or other apparatus. In particular,
`various general purpose machines may be used with programs written
`in accordance with the teachings herein, or it may prove more
`convenient to construct more specialized apparatus to perform the
`required method steps. The required structure for a variety of these
`machines will appear from the description given below.” Ex. 1101,
`4:55-5:4.
`
` “As illustrated [in FIG. 1], the information storage and retrieval system
`includes a computer 23 which comprises . . . a central processing unit
`(CPU) 24 . . . and a memory 26.” Ex. 1101, 5:22-25, FIG. 1.
`
`“means for configuring said memory according to a logical table”
`2.
`69. Claims 1, 11, 15-17, and 24 recite “means for configuring said memory
`
`according to a logical table.” Having reviewed the specification of the ʼ604 Patent, it is my
`
`opinion that, to one of ordinary skill in the art, certain portions of the specification and
`
`drawings would link the recited function to a series of algorithm steps. It is also my opinion
`
`that one of ordinary skill in the art would understand how to implement those algorithm
`
`steps using techniques and resources that were available at the time the ʼ604 Patent was
`
`filed.
`
`70.
`
`First Algorithm Step: The specification describes creating, in a computer
`
`memory, a logical table that need not be stored contiguously in the computer memory, the
`
`20
`
`Page 20 of 126 | Hosagrahar (H.V.) Jagadish, Ph.D.
`
`Enfish, LLC; IPR2014-00575
`Exhibit 2407
`Page 20 of 126
`
`

`

`logical table being comprised of rows and columns, the rows corresponding to records, the
`
`columns corresponding to fields or attributes, the logical table being capable of storing
`
`different kinds of records:
`
`
`
` “The table of the present invention comprises a plurality of rows and
`columns.” Ex. 1101, Abstract, Lines 5-7.
`
` “A row corresponds to a record and a column corresponds to a field . .
`. .” Id., Abstract, Lines 8-9.
`
` “The table of the present invention comprises a plurality of rows and
`columns.” Id., 2:53-54.
`
` “A row corresponds to a record and a column corresponds to an
`attribute . . . .” Id., 2:55-57

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket