throbber
Trials@uspto.gov
`571-272-7822
`
`
`
`
`
` Paper 25
` Entered: January 5, 2018
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`SYMANTEC CORPORATION,
`Petitioner,
`
`v.
`
`INTELLECTUAL VENTURES I LLC,
`Patent Owner.
`____________
`
`Case IPR2016-01433
`Patent 7,757,298 B2
`____________
`
`
`
`Before THOMAS L. GIANNETTI, HYUN J. JUNG, and
`GREGG I. ANDERSON, Administrative Patent Judges.
`
`JUNG, Administrative Patent Judge.
`
`
`
`DECISION
`35 U.S.C. § 318(a) and 37 C.F.R. § 42.73
`
`
`
`
`
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`I.
`
`INTRODUCTION
`Symantec Corporation (“Petitioner”) filed a Petition (Paper 2, “Pet.”),
`requesting institution of an inter partes review of claims 1–16 of
`U.S. Patent No. 7,757,298 B2 (Ex. 1001, “the ’298 patent”). Intellectual
`Ventures I LLC (“Patent Owner”) filed a Preliminary Response (Paper 5,
`“Prelim. Resp.”). Upon considering the Petition and the Preliminary
`Response, we instituted inter partes review of claims 1–4, 6–14, and 16 of
`the ’298 patent. Paper 6 (“Dec. on Inst.”).
`After institution, Patent Owner filed a Response (Paper 11, “PO
`Resp.”), and Petitioner filed a Reply (Paper 16, “Pet. Reply”)1. Petitioner
`proffered a Declaration of Jack W. Davidson, Ph.D. (Ex. 1011, “Davidson
`Declaration” or “Davidson Decl.”) with its Petition, and Patent Owner
`proffered a Declaration of David M. Goldschlag, Ph.D. (Ex. 2006,
`“Goldschlag Declaration” or “Goldschlag Decl.”) with its Response.
`Deposition transcripts for Dr. Goldschlag (Ex. 1035) and Dr. Davidson (Ex.
`2010) were filed.
`An oral hearing in this proceeding was held on October 12, 2017; a
`transcript of the hearing is included in the record (Paper 24, “Tr.”).
`We have jurisdiction under 35 U.S.C. § 6. This Final Written
`Decision is issued pursuant to 35 U.S.C. § 318(a) and 37 C.F.R. § 42.73.
`For the reasons that follow, we determine that Petitioner has shown by a
`preponderance of the evidence that claims 1–4, 6–14, and 16 of the ’298
`patent are unpatentable.
`
`
`
`1 We granted Petitioner’s unopposed motion to excuse the late filing of its
`Reply to the Patent Owner Response. Paper 19.
`
`
`
`2
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`
`A. Grounds of Unpatentability at Issue
`We instituted inter partes review on the grounds that, under 35 U.S.C.
`§ 103(a):
`(1) claims 1, 3, 6–10, 12, 13, and 16 are unpatentable over De Souza2
`and Hoffman3,
`(2) claims 2 and 11 are unpatentable over De Souza, Hoffman, and
`Martins4,
`(3) claims 4 and 14 are unpatentable over De Souza, Hoffman, and
`Farber5,
`(4) claims 1–3, 6–11, 13, and 16 are unpatentable over Hyppönen6
`and Johnson7,
`(5) claims 4 and 14 are unpatentable over Hyppönen, Johnson, and
`Farber, and
`(6) claim 12 is unpatentable over Hyppönen, Johnson, and
`Nachenberg8. Dec. on Inst. 10, 11–12, 13, 18–19, 20, 28.
`B. Related Proceedings
`The parties indicate that the ’298 patent has been asserted in
`Intellectual Ventures I LLC v. HCC Insurance Holdings, Inc., Case No.
`6:15-cv-00660-JRG (E.D. Tex.); Intellectual Venture I LLC v. PNC
`Financial Services Group, Inc., Case No. 2:13-cv-00740-AJS (W.D. Pa.);
`
`
`2 U.S. Pat. No. 5,848,418, iss. Dec. 8, 1998 (Ex. 1002).
`3 U.S. Pat. No. 6,122,657, iss. Sept. 19, 2000 (Ex. 1005).
`4 U.S. Pat. No. 5,649,205, iss. July 15, 1997 (Ex. 1010).
`5 U.S. Pat. No. 5,978,791, iss. Nov. 2, 1999 (Ex. 1009).
`6 U.S. Pat. No. 6,577,920 B1, iss. June 10, 2003 (Ex. 1003).
`7 Alan Johnson, Steganography for DOS Programmers, Dr. Dobb’s J.,
`(1997) (Ex. 1006).
`8 U.S. Pat. No. 5,696,822, iss. Dec. 9, 1997 (Ex. 1008).
`
`
`
`3
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`Intellectual Venture I LLC v. PNC Financial Services Group, Inc., Case No.
`2:14-cv-00832-AJS (W.D. Pa.); and Intellectual Venture I LLC v. Erie
`Indemnity Co., Case No. 1:14-cv-00220-MRH (W.D. Pa.). Pet. 1; Paper 4,
`1; Paper 12, 1; Exs. 2011–2013.
`The ’298 patent was also the subject of cases CBM2014-00032 and
`IPR2014-01516. Pet. 2; Paper 4 at 2.
`C. The ’298 Patent (Ex. 1001)
`The ’298 patent relates to “methods and apparatus for identifying and
`characterizing errant electronic files stored on computer storage devices.”
`Ex. 1001, 1:29–31. The ’298 patent states that when “users upload files that
`are offensive, illegal, unauthorized, or otherwise undesirable,” storage
`resources are wasted, and thus, it provides a method “for identifying and
`characterizing files electronically stored on a computer storage device.” Id.
`at 1:43–46, 2:49–51. Figure 1 of the ’298 patent is reproduced below:
`
`
`Figure 1 illustrates a wide area network in which a web host delivers
`web pages to users. Id. at 3:9–11, 36–38. User computer 120 communicates
`
`
`
`4
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`with Web host 110 through Internet 102. Id. at 3:41–48. Web host 110
`includes server 112 that can access data files stored in database 116, and the
`data files can be requested, retrieved, and viewed at user computer 120. Id.
`at 3:48–58. Web host 110 further includes file identification application 114
`that analyzes data files stored on database 116 and tests various attributes of
`those files to determine whether they satisfy a particular profile in order to
`identify suspect files. Id. at 4:19–27, 4:48–54, Fig. 2A.
`File identification application 114 can review the contents of a file to
`determine whether the file structure is as expected for a file of the type
`indicated, and if not, the file can be reported as a suspect file or marked for
`deletion. Id. at 7:4–14, Fig. 2B. File identification application 114 can also
`determine whether the file contains data extending past an end of data
`marker because any such additional data may constitute a portion of an illicit
`file. Id. at 7:26–31, Fig. 2B.
`After the files within a directory have been reviewed and a list of
`suspect files generated, file identification application 114 compares a
`checksum generated from the suspect files to a library of checksum values
`corresponding to known illicit files. Id. at 7:40–45, Fig. 2C. The checksum
`is a unique number, generated by one of “numerous possible algorithms,”
`based on a range of bytes in a file. Id. at 7:45–47, 9:10–12; Fig. 3.
`D. Illustrative Claim
`The ’298 patent has 16 claims, and of the claims at issue, claims 1, 10,
`and 16 are independent. Claim 1 is reproduced below:
`1. A computer-implemented method for identifying
`and characterizing stored electronic
`files, said method
`comprising:
`
`
`
`5
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`
`under control of one or more configured computer
`systems:
`selecting a file from a plurality of files stored in a
`computer storage medium, wherein selecting the file is
`performed according to at least one of:
`selecting the file based on the size of the file by
`determining whether an aggregate size of plural
`identically-sized files exceeds a predetermined threshold;
`selecting the file based on whether content of the
`file matches a file type indicated by a name of the file; or
`selecting the file based on whether the file
`comprises data beyond an end of data marker for the file;
`generating an identification value associated with the
`selected file, wherein the identification value is representative of
`at least a portion of the content of the selected file;
`comparing the generated identification value to one or
`more identification values associated with one or more of a
`plurality of unauthorized files; and
`characterizing the file as an unauthorized file if the
`identification value matches one of the plurality of identification
`values associated with the unauthorized files.
`Ex. 1001, 12:21–44.
`
`II.
`
`CLAIM INTERPRETATION
`In an inter partes review, claim terms in an unexpired patent are
`interpreted according to their broadest reasonable construction in light of the
`specification of the patent in which they appear. 37 C.F.R. § 42.100(b);
`Cuozzo Speed Techs. LLC v. Lee, 136 S. Ct. 2131, 2144–46 (2016)
`(upholding the use of the broadest reasonable interpretation standard).
`In the Decision on Institution, we interpreted “portion” as “a
`subdivision that is less than the whole.” Dec. on Inst. 7 (citing Ex. 2001,
`835, 896). Neither party presents post-institution arguments or evidence
`regarding the term “portion.” See PO Resp. 4–10; Pet. Reply 3–9. Thus,
`
`
`
`6
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`based on our review of the complete record, we do not perceive any reason
`or evidence that compels any deviation from our interpretation of “portion.”
`Petitioner proposes interpretations for “unauthorized files” and
`“checksum.” Pet. 12–13. Patent Owner proposes an interpretation for
`“unauthorized file.” PO Resp. 5–8.
`For the term “selecting,” Patent Owner contends that the “ordinary
`meaning of [‘selecting from a plurality of files’] is apparent on its face” but
`“‘selecting’ should not be confused with merely identifying the ‘plurality of
`files’ from which the selection is to be made.” PO Resp. 8–9 (citing
`Goldschlag Decl. ¶¶ 37, 39). Patent Owner also argues that “selecting a file
`from a plurality of files” is “not satisfied by creating a list of files from
`which to choose.” Id. at 9–10. Petitioner replies that “there is no need for
`the Board to construe this phrase” and that “[t]here is no dispute that merely
`‘creating’ a list of files, by itself, does not necessarily ‘select a file.’” Pet.
`Reply 7.
`For purposes of this Decision, we adopt the parties’ agreed to
`understanding of “selecting a file from a plurality of files,” as recited by
`independent claims 1, 10, and 16, to require more than creating a list of files.
`No further express interpretation of the phrase is necessary for determining
`whether Petitioner has demonstrated unpatentability of the challenged claims
`by a preponderance of the evidence. Vivid Techs., Inc. v. Am. Sci. & Eng’g,
`Inc., 200 F.3d 795, 803 (Fed. Cir. 1999) (construing only those claim terms
`in controversy and only to the extent necessary to resolve the controversy).
`Also, we determine that no other claim term requires express interpretation
`to determine whether Petitioner has proven unpatentability by a
`preponderance of the evidence. Id.
`
`
`
`7
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`III. OBVIOUSNESS CHALLENGES
`To prevail in its challenges, under 35 U.S.C. § 103(a), of (1) claims 1,
`3, 6–10, 12, 13, and 16 as unpatentable over De Souza and Hoffman; (2)
`claims 2 and 11 as unpatentable over De Souza, Hoffman, and Martins; (3)
`claims 4 and 14 as unpatentable over De Souza, Hoffman, and Farber; (4)
`claims 1–3, 6–11, 13, and 16 as unpatentable over Hyppönen and Johnson;
`(5) claims 4 and 14 as unpatentable over Hyppönen, Johnson, and Farber;
`and (6) claim 12 as unpatentable over Hyppönen, Johnson, and Nachenberg,
`Petitioner must prove unpatentability by a preponderance of the evidence.
`35 U.S.C. § 316(e); 37 C.F.R. § 42.1(d).
`A claim is unpatentable under 35 U.S.C. § 103(a) if the differences
`between the subject matter sought to be patented and the prior art are such
`that the subject matter as a whole would have been obvious at the time the
`invention was made to a person having ordinary skill in the art to which said
`subject matter pertains. KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 406
`(2007). The question of obviousness is resolved on the basis of underlying
`factual determinations including: (1) the scope and content of the prior art;
`(2) any differences between the claimed subject matter and the prior art; (3)
`the level of ordinary skill in the art; and (4) objective evidence of
`nonobviousness. Graham v. John Deere Co., 383 U.S. 1, 17–18 (1996).
`As discussed below, the parties do not present arguments or evidence
`disputing the level of ordinary skill in the art or present objective evidence
`of nonobviousness. Instead, the parties’ dispute relates to the scope and
`content of the prior art and differences between the claimed subject matter
`and the prior art.
`
`
`
`8
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`
`A. Level of Ordinary Skill
`Petitioner contends that
`A person of ordinary skill in the art . . . would have a Master’s
`degree in computer science, computer engineering, or a similar
`field, or a Bachelor’s degree in computer science, computer
`engineering, or a similar field, with approximately two years of
`industry experience relating to computer security. Additional
`graduate education might substitute for experience, while
`significant experience in the field of computer programming
`might substitute for formal education.
`
`
`Pet. 11–12 (citing Davidson Decl. ¶¶ 34–36).
`Patent Owner responds that, although it “does not necessarily agree
`with all aspects of Symantec’s definition, the definition is sufficiently
`accurate to assess the patentability challenges raised,” and Patent Owner
`“adopts Symantec’s proposed definition for the purpose of this IPR only.”
`PO Resp. 3 (citing Goldschlag Decl. ¶ 25); Goldschlag Decl. ¶ 25 (Patent
`Owner’s declarant stating that “I believe that [Petitioner’s] definition is
`sufficiently accurate to assess the patentability challenges raised against the
`’298 Patent in this IPR” and “for the purpose of my analysis in this IPR
`only, I have adopted Symantec’s proposed definition of the person of
`ordinary skill in the art of the ’298 Patent”).
`We, therefore, apply Petitioner’s proposed level of ordinary skill in
`the art, as stated on pages 11–12 of the Petition and quoted above, in
`analyzing its obviousness challenges.
`B. Challenge Based on De Souza and Hoffman
`Petitioner contends that claims 1, 3, 6–10, 12, 13, and 16 are rendered
`obvious by De Souza and Hoffman and supports this contention with
`citations to De Souza, Hoffman, and the Davidson Declaration (Ex. 1011).
`
`
`
`9
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`Pet. 6, 16–28. Patent Owner opposes this contention and responds with
`citations to the same references and the Goldschlag Declaration (Ex. 2006).
`PO Resp. 11–27.
`1. De Souza (Ex. 1002)
`De Souza relates to “an apparatus and method for locating and
`analyzing electronic documents that contain graphic images or objectionable
`language.” Ex. 1002, 1:9–11. De Souza states that “widespread use of
`personal computers” and “easy access to computer networks” provide access
`to “adult subject matter consist[ing] of pornographic literature and
`photographs, descriptions of violent activities, and potential illegal activities,
`not to mention the use of offensive language.” Id. at 1:15–22.
`De Souza’s method “checks each file to determine the file’s real type
`property” and “looks for files that are disguised, such as a file with an
`executable suffix (.exe) which in reality is a graphics file that should have
`had a graphics suffix (like .gif).” Id. at 2:1–2, 2:18–21. A “file suffix is
`typically the last three characters of the file name that come after the final
`‘.’” and is “used as a handy way to differentiate between different files and
`different file formats.” Id. at 5:21–27.
`The file suffix is read and compared to real type property 616 which
`“designat[es] the actual type of file found by analyzing the contents of the
`file.” Id. at 3:50–52, 4:14–16, 4:23, 5:19–30, Fig. 2, step 206, Fig. 3, steps
`302, 316, 318. The method subsequently decides if each file contains text as
`well as graphic images or audio clips. Id. at 4:3–6, Fig. 2, step 208. If real
`property type 616 is not equivalent to the claimed type property, then the
`result type property 620 is set to “questionable” with yellow color code
`
`
`
`10
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`property 608 or “suspicious” with red color code property 608. Id. at 5:42–
`53, Fig. 4, step 402.
`Once all of the files have been checked, a list of the various files is
`presented on a display for a user to review for subsequent destruction or
`some other action. Id. at 7:20–22. “The files are ordered by their result type
`property 620 and a color icon is displayed according to the color code
`property 608 in order to aid the user in distinguishing harmful files from
`innocuous ones.” Id. at 7:23–26.
`2. Hoffman (Ex. 1005)
`Hoffman relates to “methods for speeding up the process of browsing
`Web content in a computer system.” Ex. 1005, 1:23–25. Hoffman describes
`a filter module that manages content of Web pages downloaded from the
`Internet according to user-configurable filter settings. Id. at 5:13–17. The
`filter processes Web browser requests for content. Id. at 8:20–32. Hoffman
`indicates that Cyclic Redundancy Checking (“CRC”) is a “well-known
`checksum technique.” Id. at 27:3–5. Hoffman states that for ads, it
`“connects to the Web site, grabs the image file from the site, and then
`proceeds to perform a CRC calculation . . . on the image” and the
`“calculated CRC value is then compared against a list of image signatures or
`IDs.” Id. at 30:29–35. “If the computer ID is determined to represent a
`‘bad’ image . . . the method proceeds to kill the image.” Id. at 30:37–41.
`The filter can also be “configured to kill ads or kill images larger than a
`preselected image size.” Id. at 30:23–24.
`3. Independent Claims 1, 10, and 16
`Petitioner contends that De Souza teaches or suggests the limitations
`of independent claims 1, 10, and 16. Pet. 18–23 (citing Exs. 1002, 1005,
`
`
`
`11
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`1006; Davidson Decl. ¶¶ 69–73, 94–115). In particular, for “selecting a file
`from plurality of files,” Petitioner argues that De Souza teaches a method
`that locates and “selects particular files that meet certain criteria (e.g., files
`that have a suffix that does not match the file contents . . . ), designates them
`as questionable/red, suspicious/yellow, or unknown, and includes them in a
`listing of files presented to a user for further review.” Id. at 21 (citing Ex.
`1001, 2:24–27, 3:13–4:13, 7:10–13; Davidson Decl. ¶ 105).
`Petitioner also argues that “[t]o the extent De Souza does not teach
`generating the claimed ‘identification value’ for a selected file, this would
`have been obvious” because it was “commonplace in the prior art” and
`Hoffman expressly teaches the feature. Pet. 23–24 (citing Exs. 1004, 1005,
`1007; Davidson Decl. ¶¶ 52–59, 116–120); see also id. at 25 (citing
`Davidson Decl. ¶ 270).
`Petitioner contends that a person of ordinary skill in the art would
`look to De Souza and Hoffman and asserts that “it would have been obvious
`that the automated process for inspecting image files using CRCs (i.e.,
`identification values) taught by Hoffman could be applied to the mismatched
`graphic files identified and selected in De Souza” so as “to reduce or
`eliminate the need for manual review of graphic files” and “would have
`merely involved combining well known prior art elements, using well-
`known computer programming techniques, to achieve a predictable result.”
`Pet. 17 (citing Davidson Decl. ¶¶ 85–93). Petitioner also asserts that a
`person of ordinary skill in the art “would have found it obvious to apply
`Hoffman’s automated checksumming method for inspecting image files to
`analyze the graphics files selected by De Souza’s system.” Pet. 24 (citing
`Davidson Decl. ¶¶ 121–125).
`
`
`
`12
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`
`Petitioner also argues that a person of ordinary skill in the art “would
`have understood that, when [Hoffman is] combined with De Souza, the
`selected graphics file would be characterized as an unauthorized file . . . if its
`identification value matched an identification value associated with a known
`unauthorized graphics file.” Pet. 25 (citing Davidson Decl. ¶ 131).
`Petitioner contends that it would have been obvious to characterize selected
`graphics files as unauthorized “based on whether their checksums matched
`one of the checksums associated with unauthorized image files.” Id. (citing
`Davidson Decl. ¶¶ 128, 129, 131, 132).
`We determine that the record before us indicates that Petitioner
`sufficiently demonstrates that its proposed combination of De Souza and
`Hoffman teaches the limitations of independent claims 1, 10, and 16. Pet.
`18–26 (citing Ex. 1002, Abstract, 1:7–13, 1:29–57, 2:1–4, 2:13–14, 2:18–21,
`2:24–27, 2:57–4:13, 5:18–6:15, 6:50–61, 7:1–32, Fig. 1; Ex. 1005, Abstract,
`3:14–38; 8:1–30:62, Davidson Decl. ¶¶ 52–59, 69–73, 94–104, 106–117).
`We are persuaded that the portions of De Souza and Hoffman cited by
`Petitioner teach or suggest the limitations of independent claims 1, 10, and
`16. Further, Petitioner provides articulated reasoning with some rational
`underpinning. Pet. 17, 24, 25 (citing Davidson Decl. ¶¶ 85–93, 121–134,
`270). We credit Dr. Davidson’s testimony as to why one of ordinary skill in
`the art would have combined De Souza and Hoffman.
`Patent Owner first responds that Petitioner fails to show that Hoffman
`teaches characterizing or categorizing a file as an unauthorized file, as
`required by independent claims 1, 10, and 16. PO Resp. 11–12 (citing Pet.
`24–25; Goldschlag Decl. ¶¶ 29, 43). Patent Owner also responds that
`Petitioner does not rely on “DeSouza or any other reference combined with
`
`
`
`13
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`Hoffman” to teach characterizing or categorizing a file as an “unauthorized
`file.” Id. at 15 (citing Goldschlag Decl. ¶ 50).
`In view of the complete record, Petitioner shows by a preponderance
`of the evidence that De Souza and Hoffman teach characterizing or
`categorizing unauthorized files. Petitioner argues that one of ordinary skill
`in the art “would have found it obvious to apply Hoffman’s automated
`checksumming method for inspecting image files to analyze the graphics
`files selected by De Souza’s system” (Pet. 24 (citing Davidson Decl. ¶¶ 121–
`125)) and “would have understood that, when [Hoffman is] combined with
`DeSouza, the selected graphics file would be characterized as an
`unauthorized file . . . if its identification value matched an identification
`value associated with a known unauthorized graphics file” (id. at 25 (citing
`Davidson Decl. ¶ 131)).
`Patent Owner also responds that Petitioner equates the advertising
`images of Hoffman to the unauthorized files of claims 1, 10, and 16 but that
`Hoffman’s advertising images are not “stored on a computer without
`authority or permission from a system administrator.” PO Resp. 12 (citing
`Pet. 25; Goldschlag Decl. ¶ 46). Patent Owner also contends that “bad” or
`“unwanted” advertising images are not “unauthorized” files because the ’298
`patent distinguishes “undesirable files” from “unauthorized files.” Id. at 13
`(citing Pet. 25; Ex. 1001, 1:41–56; Davidson Decl. ¶¶ 130–132; Goldschlag
`Decl. ¶ 47). Patent Owner further contends that the “bad” images of
`Hoffman “are simply the ones that the end-user . . . prefers not to see” and
`that “Hoffman’s filtering is based on the user’s personal preferences.” Id. at
`14–15 (citing Ex. 1005, 2:63–67, 3:51–54, 5:13–17, 30:37–41; Goldschlag
`
`
`
`14
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`Decl. ¶ 48). Patent Owner asserts that “annoying or undesirable” images are
`not “unauthorized files.” Id. at 15.
`Patent Owner’s arguments focus on Hoffman’s filtering of advertising
`images, which Patent Owner asserts are not “unauthorized images” (PO
`Resp. 11–15). Petitioner, however, does not equate the advertising images
`of Hoffman to the unauthorized files of the independent claims, as argued by
`Patent Owner. Patent Owner’s arguments do not address De Souza’s
`teachings of a method that locates “electronic documents that contain
`graphic images or objectionable language” (Ex. 1001, 1:9–11), which
`Petitioner relies on for the recited “unauthorized file.” See Pet. 25
`(“POSITA would have understood that when combined with DeSouza, the
`selected graphics file would be characterized as an unauthorized file (e.g.,
`bad or unwanted image) if its identification value matched an identification
`value associated with a known unauthorized graphics file.”).
`Petitioner’s proposed combination applies “Hoffman’s automated
`checksumming method for inspecting image files to analyze the graphics
`files selected by DeSouza’s system” (Pet. 24) so as to result in locating
`“electronic documents that contain graphic images” such as “pornographic
`. . . photographs . . . and potential illegal activities,” as disclosed by De
`Souza (Ex. 1001, 1:9–11, 1:19–21). The record before us indicates that such
`photographs would be “a file stored on a computer without authority or
`permission from a system administrator.” Goldschlag Decl. ¶ 21 (“There are
`several types of files that a system administrator may deem to be
`unauthorized . . . such as pornographic files.”).
`Also, even if we were to accept Patent Owner’s proposed construction
`of “unauthorized file” as “a file stored on a computer without authority or
`
`
`
`15
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`permission from a system administrator” (PO Resp. 8), we would find that
`De Souza teaches that its method locates “electronic documents that contain
`graphic images or objectionable language” (Ex. 1001, 1:9–11), finds
`“objectionable material” (id. at 1:56), and remedies problems related to
`“files containing pre-selected objectionable subject matter” (id. at 1:46–50)
`such as “pornographic literature and photographs, descriptions of violent
`activities, and potential illegal activities” (id. at 1:19–21).
`Further, Patent Owner states that the “’298 Patent mentions a few
`types of files that may be stored without authorization or permission from a
`system administrator, such as files that violate terms of use or copyright
`laws.” PO Resp. 6–7. Because the full record does not indicate any
`meaningful difference between “potential illegal activities” (Ex. 1001, 1:19–
`21) and “files that violate . . . copyright laws” (PO Resp. 6–7), we determine
`that such potentially illegal activities are “file[s] stored on a computer
`without authority or permission from a system administrator” (PO Resp. 8).
`See also Goldschlag Decl. ¶ 21 (“There are several types of files that a
`system administrator may deem to be unauthorized . . . such as . . . files that
`violate the law.”).
`Patent Owner also responds that Petitioner failed to demonstrate that
`Hoffman teaches comparing an identification value of a selected file with
`identification values of unauthorized files, as required by the independent
`claims, because Petitioner fails to show that Hoffman teaches “unauthorized
`files.” PO Resp. 16. Patent Owner further responds that, even if Hoffman
`discloses characterizing or categorizing unauthorized files, Petitioner failed
`to demonstrate that the characterizing includes comparing an identification
`value of a selected file with identification values of unauthorized files. Id.
`
`
`
`16
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`Patent Owner asserts that Petitioner’s explanation is inadequate. Id. at 16–
`17 (citing Pet. 24–25; Davidson Decl. ¶¶ 128–134).
`However, Petitioner argues that one of ordinary skill in the art “would
`have found it obvious to apply Hoffman’s automated checksumming method
`for inspecting image files to analyze the graphics files selected by
`DeSouza’s system.” Pet. 24 (citing Davidson Decl. ¶¶ 121–125). As
`explained above, the record indicates that Petitioner is relying on De Souza
`for teaching “unauthorized files,” not Hoffman as asserted by Patent Owner.
`We are persuaded that Petitioner shows by a preponderance of the evidence
`that its proposed combination of De Souza and Hoffman teaches comparing
`an identification value of a selected file with identification values of
`unauthorized files and that the characterizing includes comparing an
`identification value of a selected file with identification values of
`unauthorized files, as required by the independent claims. See also
`Davidson Decl. ¶ 90 (Petitioner’s declarant testifying “it would have been
`obvious . . . that the automated process for inspecting image files through the
`use of CRCs . . . taught by Hoffman could be applied to the graphic files
`identified and selected by De Souza’s system”).
`Patent Owner additionally responds that the proposed combination of
`De Souza and Hoffman does not teach a computer or computer program for
`performing the “selecting a file” limitation of the independent claims. PO
`Resp. 17–18. Patent Owner argues that “DeSouza expressly teaches that a
`user . . . selects a file” from a displayed list of files flagged for various
`reasons. Id. at 18–20 (citing Ex. 1002, 1:7–8, 1:56–57, 2:25–27, 5:42–67,
`6:1–15, claims 1–20; Goldschlag Decl. ¶¶ 53, 54, 56, 57, 59). Patent Owner
`also argues that one of ordinary skill in the art would understand that
`
`
`
`17
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`presenting an itemized list of files is not selecting a file.” Id. at 20 (citing
`Goldschlag Decl. ¶ 57). Patent Owner further argues that De Souza does not
`suggest a computer selecting a file and does not refer to selecting a file for
`further processing. Id. (citing Ex. 1002, 1:46–49; Goldschlag Decl. ¶ 58).
`The record supports Petitioner’s position by a preponderance of the
`evidence that De Souza “selects particular files that meet certain criteria” –
`e.g., files that are designated as “questionable/red, suspicious/yellow, or
`unknown” and “presented to a user for further review.” Pet. 21. We are
`persuaded that De Souza teaches that a computer or computer program
`“select[s] a file from a plurality of files,” as recited by independent claims 1,
`10, and 16, and the file is selected for further processing. See Ex. 1001, 3:9–
`12 (“Alternate embodiments of computer system 10 may include mainframe
`computers, or networks of PCs”), 7:20–22 (“Once all of the files have been
`reviewed, a list of the various files are presented . . . for the user’s review
`and if necessary, destruction or some other action.”); Goldschlag Decl. ¶ 54
`(“In one step in De Souza, files are marked as suspicious, questionable, or
`okay.”). Petitioner proposes modifying De Souza to include Hoffman’s
`checksumming method “to reduce or eliminate the need for manual review
`of graphic files.” Pet. 17.
`Also, we find that De Souza teaches selecting files according to a
`certain criteria, specifically, selecting files that have mismatching real type
`property 616 and claimed type property 618. Ex. 1002, 5:42–53; see also
`Goldschlag Decl. ¶ 36 (“The verb ‘selecting’ is not a technical term with any
`special meaning unique to the field of computer security”), ¶ 55 (“De Souza
`also lists some of the ‘[r]easons as to why the file was flagged.’”). The
`record persuades us that De Souza, thus, teaches “selecting a file from a
`
`
`
`18
`
`

`

`IPR2016-01433
`Patent 7,757,298 B2
`
`plurality of files,” as required by independent claims 1, 10, and 16. We find
`that De Souza teaches that, if a file has mismatching real type property 616
`and claimed type property 618, the file is presented for user review or some
`other action. Ex. 1001, 5:42–53, 7:20–22. In other words, the file is
`selected from a plurality of files based on the mismatching of its properties
`616, 618.
`Patent Owner argues that De Souza does not meet the “selecting a
`file” limitation because De Souza describes how the user (and not a
`computer or computer program) selects from a listing of files that are
`suspicious or questionable. PO Resp. 18. However, we find that De Souza
`meets this limitation because, as discussed above, it teaches a prior selecting
`was accomplished by its method that results in a file being flagged as
`suspicious or questionable. Ex. 1001, 5:42–53, 7:20–22. Each of the
`flagged files in the listing has met the mismatching criteria, and each
`requires user review; however, other files do not meet the mismatching
`criteria and do not require further user review. Id. at 7:20–26. Thus, each
`file flagged as suspicious or questionable is the result of “selecting a file
`from a plurality of files,” such that it can be listed and subsequently dealt
`with by a user.
` To further illustrate the point above, we find that De Souza’s method
`can flag just a single file with mismatching real type property 616 and
`claimed type property 618 that would be presented to a user for further
`action. In such a case with only a single file flagged, the method of De
`Souza would teach a single selection, and the single selected f

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket