throbber
Filed: April 18, 2017
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`SYMANTEC CORPORATION
`
`Petitioner,
`
`v.
`
`Filed on behalf of:
`Patent Owner Intellectual Ventures I LLC
`John R. King
`Ted M. Cannon
`Bridget A. Smith
`KNOBBE, MARTENS, OLSON & BEAR, LLP
`2040 Main Street, 14th Floor
`Irvine, CA 92614
`Tel.: (949) 760-0404
`Fax: (949) 760-9502
`Email: BoxPGL40@knobbe.com
`
`By:
`
`
`
`
`
`
`
`
`
`
`INTELLECTUAL VENTURES I LLC,
`
`Patent Owner
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case No. IPR2016-01433
`U.S. Patent No. 7,757,298
`
`
`
`
`
`
`
`
`
`
`
`
`
`PATENT OWNER’S RESPONSE
`
`
`
`
`

`

`TABLE OF CONTENTS
`
`Page No.
`
`I. 
`
`INTRODUCTION ............................................................................................ 1 
`
`II.  LEVEL OF ORDINARY SKILL IN THE ART .............................................. 3 
`
`III.  CLAIM CONSTRUCTION .............................................................................. 4 
`
`Legal standard ....................................................................................... 4 
`A. 
`“unauthorized file” ................................................................................ 5 
`B. 
`“selecting” ............................................................................................. 8 
`C. 
`IV.  THE INSTITUTED CLAIMS ARE PATENTABLE OVER THE
`ALLEGED GROUNDS .................................................................................. 10 
`
`A. 
`
`B. 
`
`2. 
`
`The claims are patentable over the DeSouza and Hoffman
`combinations. ...................................................................................... 11 
`1. 
`Symantec did not prove that Hoffman discloses
`characterizing unauthorized files. ............................................. 11 
`Symantec did not prove that Hoffman discloses comparing
`an identification value of the selected file with
`identification values associated with unauthorized files. ......... 16 
`Symantec did not prove that DeSouza teaches a computer
`or computer program “selecting a file.” .................................... 17 
`Symantec did not prove that a skilled artisan would have
`had a reason to combine DeSouza and Hoffman ...................... 21 
`The claims are patentable over the Hyppönen and Johnson
`combinations. ...................................................................................... 27 
`1. 
`Prior Art Background ................................................................ 28 
`a. 
`Hyppönen ........................................................................ 28 
`
`3. 
`
`4. 
`
`b. 
`
`c. 
`
`Johnson ........................................................................... 29 
`
`Kuo.................................................................................. 31 
`
`-i-
`
`

`

`TABLE OF CONTENTS
`(cont’d)
`
`Page No.
`
`d. 
`
`Tate and Drake ................................................................ 33 
`
`2. 
`
`3. 
`
`Neither Hyppönen nor Johnson teaches “selecting [a] file
`based on whether the file comprises data beyond an end of
`data marker for the file.” ........................................................... 36 
`Symantec failed to prove that a skilled artisan would have
`had a reason to modify Hyppönen to select a file for virus
`scanning “based on whether the file comprises data beyond
`an end of data marker for the file.” ........................................... 38 
`V.  SYMANTEC CANNOT PROPERLY SUBMIT NEW OBVIOUSNESS
`EVIDENCE OR ARGUMENTS IN ITS REPLY .......................................... 44 
`
`VI.  CONCLUSION ............................................................................................... 45 
`
`
`
`-ii-
`
`

`

`TABLE OF AUTHORITIES
`
`Page No(s).
`
`Heart Failure Techs., LLC v. Cardiokinetix, Inc.,
`IPR2013-00183, Paper 12 (July 31, 2013) ......................................................... 21
`
`KSR Int’l Co. v. Teleflex, Inc.,
`550 U.S. 398 417–18 (2007) ......................................................................... 21, 27
`
`Microsoft Corp. v. Proxyconn, Inc.,
`789 F.3d 1292 (Fed. Cir. 2015) ............................................................................ 4
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ............................................................ 4
`
`Poly-America, L.P. v. API Indus., Inc.,
`839 F.3d 1131 (Fed. Cir. 2016) ............................................................................ 4
`
`In re Translogic Tech., Inc.,
`504 F.3d 1249 (Fed. Cir. 2007) ............................................................................ 4
`
`OTHER AUTHORITIES
`
`37 C.F.R. § 42.100 ..................................................................................................... 4
`
`77 Fed. Reg. 157 ...................................................................................................... 45
`
`
`
`-iii-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`TABLE OF EXHIBITS
`
`Exhibit No.
`
`Description
`
`2001
`
`2002
`
`2003
`
`2004
`
`2005
`
`2006
`
`2007
`
`2008
`
`2009
`
`2010
`
`2011
`
`2012
`
`Definitions of part and portion, Webster’s New Collegiate
`Dictionary 835, 896–97 (G.&C. Merriam Co. 1973)
`
`Intellectual Ventures I LLC v. HCC Insurance Holdings, Inc., No.
`6:16-cv-00660, Exhibit A to Amended Joint Claim Construction
`and Prehearing Statement (E.D. Tex. Apr. 4, 2016)
`
`Intellectual Ventures I LLC v. HCC Insurance Holdings, Inc., No.
`6:16-cv-00660, Plaintiff Intellectual Ventures I LLC and
`Intellectual Ventures II LLC’s Opening Claim Construction Brief
`(E.D. Tex. May 4, 2016)
`
`Intellectual Ventures I LLC v. HCC Insurance Holdings, Inc., No.
`6:16-cv-00660, Plaintiff Intellectual Ventures I LLC and
`Intellectual Ventures II LLC’s Reply Claim Construction Brief
`(E.D. Tex. May 25, 2016)
`
`Intellectual Ventures I LLC v. HCC Insurance Holdings, Inc., No.
`6:16-cv-00660, Exhibit A to Joint Claim Construction Chart
`Pursuant to P.R. 4-5(D) (E.D. Tex. June 1, 2016)
`
`Declaration of David M. Goldschlag, Ph.D.
`
`CV of David M. Goldschlag, Ph.D.
`
`Definition of “Unauthorized,” Merriam-Webster.com
`
`Definition of “Select,” Merriam-Webster.com
`
`Deposition transcript of Jack Davidson (April 5, 2017)
`
`Intellectual Ventures I LLC, et al. v. Erie Indemnity Company, et
`al., No. 2017-1147, Brief for Appellants (Fed. Cir.)
`
`Intellectual Ventures I LLC, et al. v. Erie Indemnity Company, et
`al., No. 2017-1147, Brief for Defendants-Appellees (Fed. Cir.)
`
`-iv-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`Exhibit No.
`
`2013
`
`Description
`
`Intellectual Ventures I LLC, et al. v. Erie Indemnity Company, et
`al., No. 2017-1147, Reply Brief for Appellants (Fed. Cir.)
`
`
`
`Exhibits 2011–2013 are briefs filed in a Federal Circuit appeal involving the
`
`’298 Patent, and are submitted herewith for the Board’s information. Exhibit 2011
`
`includes, as an addendum, a district court decision finding that claims of the ’298
`
`Patent are patent-ineligible under 35 U.S.C. § 101.
`
`
`
`-v-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`Patent Owner (“IV”) hereby submits its Patent Owner Response to the
`
`Petition (Paper 2, “Pet.”) for Inter Partes Review filed against U.S. Patent No.
`
`7,757,298 (“the ’298 patent”) by Petitioner (“Symantec”).
`
`I.
`The ’298 patent claims novel and non-obvious systems and methods for
`
`INTRODUCTION
`
`identifying and characterizing unauthorized files on a computer system or network.
`
`Unauthorized files are not simply files a user does not like. Users browsing a
`
`computer network—such as the Internet—frequently run into annoying or
`
`undesirable files, such as those that include advertisements. But the claimed
`
`invention is not about filtering out petty annoyances like advertising based on a
`
`user’s personal preferences. Rather, the claimed invention tackles the much more
`
`significant problem that bad actors would highjack a computer to store files
`
`without authority or permission from a system administrator.
`
`The invention includes two key features that work together to characterize a
`
`file as an unauthorized file. The first key feature is selecting a file for further
`
`processing based on red flags that indicate that the file has a high risk of being an
`
`unauthorized file. The second key feature is subjecting the selected file to extra
`
`scrutiny to determine whether the file is, indeed, an unauthorized file. The claims
`
`include significantly more detail for each of these key features.
`
`-1-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`There is no dispute that the claimed invention is novel. Symantec does not
`
`even allege that the alleged prior art anticipates any claim of the ’298 Patent.
`
`Instead, Symantec alleges that two general obviousness combinations—one based
`
`primarily on DeSouza and Hoffman and the other based primarily on Hyppönen
`
`and Johnson—disclose all of the claimed details of the invention. But Symantec
`
`failed to meet its burden to prove obviousness for two fundamental reasons.
`
`First, even assuming that the references can properly be combined, the
`
`proposed combinations do not even disclose all of the claim limitations. For
`
`example, with respect to the DeSouza and Hoffman combinations, Hoffman does
`
`not disclose characterizing unauthorized files. All Hoffman does is block
`
`advertisements based on a user’s personal web-browsing preferences.
`
`Advertisements may be annoying or undesirable, but they are not “unauthorized
`
`files” as that phrase is used in the ’298 Patent. And with respect to the Hyppönen
`
`and Johnson combinations, Johnson merely prints a directory listing of files that
`
`have data beyond their end-of-data marker, but it does not select any of the listed
`
`files for extra processing. Symantec’s proposed obviousness combinations also
`
`have other missing limitations, as explained below.
`
`Second, neither proposed obviousness combination can properly be
`
`combined, because Symantec failed to prove that a person of ordinary skill in the
`
`art (“skilled artisan”) would have had any reason or motivation to combine the
`
`-2-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`references in the manner proposed by Symantec. A skilled artisan would have had
`
`no reason to combine DeSouza and Hoffman because DeSouza relates to the
`
`complex technology of detecting hidden illicit content while Hoffman relates to the
`
`much different and simpler technology of filtering unhidden and easy-to-identify
`
`banner advertisements. And a skilled artisan would have had no reason to modify
`
`Hyppönen’s virus scanner to target files with data beyond their end-of-data
`
`markers because a skilled artisan would not have believed, at the relevant time, that
`
`such files are particularly susceptible to virus infection.
`
`Accordingly, because Symantec failed to meet its burden to prove
`
`obviousness for at least two independent reasons, the Board should find that all
`
`challenged claims of the ’298 Patent are patentable over the alleged prior art of
`
`record.
`
`II. LEVEL OF ORDINARY SKILL IN THE ART
`The Petition defines the level of ordinary skill in the art on pages 11 and 12.
`
`Although IV does not necessarily agree with all aspects of Symantec’s definition,
`
`the definition is sufficiently accurate to assess the patentability challenges raised
`
`against the ’298 Patent in this IPR. Ex. 2006 ¶ 25. Accordingly, IV adopts
`
`Symantec’s proposed definition for the purpose of this IPR only. IV reserves the
`
`right to pursue a different definition in other proceedings.
`
`-3-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`III. CLAIM CONSTRUCTION
`
`A. Legal standard
`The Board applies the broadest-reasonable-interpretation standard to
`
`construe claims in an IPR. 37 C.F.R. § 42.100(b). The broadest reasonable
`
`interpretation does not mean the broadest possible interpretation. Microsoft Corp.
`
`v. Proxyconn, Inc., 789 F.3d 1292, 1298 (Fed. Cir. 2015). Rather, this standard
`
`gives claim terms their ordinary and customary meanings, as understood by one of
`
`ordinary skill in the art, such that the claims as a whole receive their broadest
`
`reasonable interpretation in light of the intrinsic record. In re Translogic Tech.,
`
`Inc., 504 F.3d 1249, 1257 (Fed. Cir. 2007). The only exceptions to giving the
`
`words in a claim their ordinary meaning are (1) when the applicant acts as his own
`
`lexicographer; and (2) when the applicant disavows or disclaims the full scope of a
`
`claim term in the specification. Poly-America, L.P. v. API Indus., Inc., 839 F.3d
`
`1131, 1136 (Fed. Cir. 2016), petition for cert filed (U.S. March 16, 2017) (No. 16-
`
`1123).
`
`The ordinary meaning of a claim term is the meaning the term would have
`
`had to a person of ordinary skill in the art at the time of the invention after reading
`
`the entire patent. Phillips v. AWH Corp., 415 F.3d 1303, 1313, 1321 (Fed. Cir.
`
`2005) (en banc). Ordinary meaning may be evidenced by a variety of sources,
`
`including the words of the claims themselves, the written description, the
`
`-4-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`drawings, and extrinsic sources. Id. at 1314–19. Above all, however, the ordinary
`
`meaning must be consistent with the specification. Id. at 1315–17.
`
`“unauthorized file”
`
`B.
`The claims require “comparing the generated identification value to one or
`
`more identification values associated with one or more of a plurality of
`
`unauthorized files” and “characterizing the file as an unauthorized file if the
`
`identification value matches one of a plurality of identification values associated
`
`with the unauthorized files.” Claim 1 (emphases added).
`
`Symantec’s proposed construction of “unauthorized files” to mean “errant,
`
`illegal, or otherwise undesirable files” is legally incorrect because it is inconsistent
`
`with both the ordinary meaning of “unauthorized” and the specification of the ’298
`
`Patent. Ex. 2006 ¶ 35. Indeed, Symantec simply ignores the ordinary meaning and
`
`mischaracterizes the specification. Id.
`
`“Unauthorized” is a common English word with a clear-cut ordinary
`
`meaning. Id. ¶ 30. Specifically, “unauthorized” means “without authority or
`
`permission.” Id.; Ex. 2008. The broadest reasonable interpretation of “unauthorized
`
`file” should, at a minimum, incorporate this ordinary meaning of “unauthorized.”
`
`But Symantec’s proposed construction does not even acknowledge the ordinary
`
`meaning—“without authority or permission”—of “unauthorized.”
`
`-5-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`The ’298 Patent’s usage of “unauthorized files” is also consistent with
`
`incorporating “without authority or permission” into the broadest reasonable
`
`interpretation of “unauthorized file.” Ex. 2006 ¶ 31. Symantec incorrectly asserts
`
`that “the term ‘unauthorized’ only appears in the claims.” Pet. at 12. In fact, the
`
`specification of the ’298 Patent refers to unauthorized files in the following
`
`paragraph:
`
`In view of the relative ease of public access to these electronic file
`storage resources, there is also widespread abuse of Web server space
`in which users upload files that are offensive, illegal, unauthorized,
`or otherwise undesirable and thus wasteful of storage resources.
`These file types are predominantly of four types: music, video,
`software and graphics. Many such files may contain pornography in
`violation of the terms of use of the Web hosting service. Moreover,
`the copying of these files to the Web server may be in violation of
`U.S. copyright laws. Consequently, the identification and removal of
`such files represents a significant administrative burden to the Web
`hosting services. In addition, the presence of certain files (such as
`depictions of child pornography or copyrighted music files) on user
`computers on corporate networks poses great legal risks to the
`corporation.
`Ex. 1001 at 1:41–56 (emphases added). Thus, in the context of the ’298 Patent, the
`
`phrase “unauthorized files” refers to files that are stored on a computer without
`
`authorization or permission from a system administrator. Ex. 2006 ¶ 31. The ’298
`
`-6-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`Patent mentions a few types of files that may be stored without authorization or
`
`permission from a system administrator, such as files that violate terms of use or
`
`copyright laws. Id.
`
`
`
`Importantly, the ’298 Patent does not define “unauthorized files” broadly
`
`enough to cover files that are merely annoying or undesirable. Id. ¶ 32. Indeed, the
`
`’298 Patent expressly distinguishes “unauthorized files” from merely “undesirable”
`
`ones. Id. While the ’298 Patent discloses a broader classifications of files—
`
`including “offensive, illegal, unauthorized, or otherwise undesirable” files—the
`
`patent claims the identification of the narrower classification of “unauthorized”
`
`files. Id.1
`
`The specification passage referencing unauthorized files also indicates that
`
`unauthorized files are an “abuse of Web server space.” Ex. 1001 at 1:43 (emphasis
`
`added). Id. ¶ 34. Significantly, the specification also describes the circumvention of
`
`advertising “such that the advertisements are not displayed” as an “additional
`
`abuse of these web hosting services,” which “rely on advertising revenue to fund
`
`1 Because a system administrator would typically not authorize the storage of
`
`illegal files on a computer, a skilled artisan would recognize that illegal files are
`
`likely unauthorized files also. But unauthorized files are not necessarily illegal. Ex.
`
`2006 ¶ 33.
`
`-7-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`their operation.” Id.; Ex. 1001 at 2:27–30 (emphasis added). In other words, the
`
`specification discloses that advertisements are authorized for the positive purpose
`
`of funding the operation of a web hosting service. Ex. 2006 ¶ 34. Thus, a
`
`construction of “unauthorized files” that includes advertisements would be
`
`unreasonable in view of the specification. Id.
`
`Accordingly, the correct construction of “unauthorized file,” under the BRI
`
`standard, is “a file stored on a computer without authority or permission from a
`
`system administrator.” Id. ¶ 29.
`
`C.
`“selecting”
`The claims require “selecting a file from a plurality of files stored in a
`
`computer storage medium.” Ex. 1001, claims 1, 10, 16 (emphasis added).
`
`“Selecting” is a common English word with a clear-cut ordinary meaning.
`
`Specifically, “selecting” means “choos[ing] (as by fitness or excellence) from a
`
`number or group.” Ex. 2006 ¶ 36; Ex. 2009. This is consistent with the express
`
`claim language: “selecting a file from a plurality of files.” Ex. 1001, claims 1, 10,
`
`16 (emphasis added). Accordingly, because the ordinary meaning of this claim
`
`phrase is apparent on its face, the Board should construe “selecting a file from a
`
`plurality of files” to mean “selecting a file from a plurality of files.” Ex. 2006 ¶ 37.
`
`However, “selecting” should not be confused with merely identifying the
`
`“plurality of files” from which the selection is to be made. Id. at ¶ 39. “Selecting a
`
`-8-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`file” refers to choosing a file, not just determining the alternatives from which to
`
`choose. Id. In the context of the ’298 Patent, a computer may, in preparation for the
`
`“selecting” step, create a list of files from which the computer can choose in the
`
`“selecting” step of the claims. Id. The list may look something like this:
`
` patent_application.doc
`
` budget.xls
`
` patent_owner_response.pdf
`
`Id. Significantly, creating the list of files defines the “plurality of files” from which
`
`the single “selected filed” is chosen in the “selecting” step. Id. But creating the list
`
`of alternatives is not “selecting.” Id.
`
`Symantec’s assertions that the prior art performs the “selecting” step rely on
`
`an implicit construction of “selecting” that is unreasonably broader than its
`
`ordinary meaning. Specifically, Symantec asserts that DeSouza selects a file by
`
`displaying a prioritized list of suspicious, questionable, or okay files and that
`
`Johnson selects a file merely by displaying a list of files with data beyond their
`
`end-of-data markers. Further, Dr. Davidson’s expert does not know what it means
`
`to “select,” undermining the credibility of his testimony that the prior art discloses
`
`this limitation. Ex. 2010 at 35:22–36:23.
`
`Therefore, to resolve any potential dispute regarding the ordinary meaning
`
`of “selecting a file from a plurality of files,” the Board should clarify that this
`
`-9-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`limitation is not satisfied by creating a list of files from which to choose. Id.
`
`In addition, the “selecting a file” limitation in each independent claim is
`
`modified by an additional limitation expressly requiring a computer or computer
`
`application—not a user—to perform the “selecting a file” function. Ex. 2006 ¶ 40.
`
`Claim 1 expressly states that this function must be performed “under control of one
`
`or more configured computer systems.” Id. This express claim language excludes
`
`“selecting a file” under a user’s control. Id. Similarly, claim 10 expressly requires
`
`“a file identification application”—again, not a user—to “provid[e] the function[]
`
`of: selecting a file.” Id. Finally, claim 16 requires instructions that “cause the
`
`computing device to perform . . . operations comprising: selecting a file.” Id.
`
`The ordinary meaning of these express claim limitations is apparent, and
`
`nothing in the specification of the ’298 Patent is inconsistent with the ordinary
`
`meaning. Id. ¶ 41. Specifically, in accordance with the ordinary meaning of the
`
`express claim language, the broadest reasonable interpretation of the claims
`
`requires a computer or computer application—not a user—to perform the
`
`“selecting a file” function. Id.
`
`IV. THE INSTITUTED CLAIMS ARE
`PATENTABLE OVER THE ALLEGED GROUNDS
`
`The claims of the ’298 patent are patentable over the alleged prior art for the
`
`reasons set forth below.
`
`-10-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`A. The claims are patentable over the DeSouza and Hoffman
`combinations.
`
`The Board instituted trial on the following grounds involving DeSouza and
`
`Hoffman:
`
`claims 1, 3, 6–10, 12, 13, and 16 are unpatentable over
`DeSouza and Hoffman,
`claims 2 and 11 are unpatentable over DeSouza, Hoffman, and
`Martins, and
`claims 4 and 14 are unpatentable over DeSouza, Hoffman, and
`Farber[.]
`Inst. Dec. at 28 (the “DeSouza and Hoffman combinations”). As explained below,
`
`however, all of these claims—1–4, 6–14, and 16—are patentable because neither
`
`DeSouza nor Hoffman teaches several of the claim limitations. Ex. 2006 ¶ 43. In
`
`addition, Symantec failed to show that a skilled artisan would have had a reason to
`
`combine DeSouza and Hoffman. Id.
`
`1.
`
`Symantec did not prove that Hoffman discloses
`characterizing unauthorized files.
`
`Each of independent claims 1, 10, and 16 requires characterizing or
`
`categorizing a file as an “unauthorized file.” Id. As explained above, the broadest
`
`reasonable interpretation of “unauthorized file” is “a file stored on a computer
`
`without authority or permission from a system administrator.” Id. ¶ 29.
`
`-11-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`Symantec relies entirely on Hoffman as allegedly teaching characterizing or
`
`categorizing a file as an unauthorized file. Pet. at 24–25. Specifically, Symantec
`
`argues:
`
`Hoffman explains that, “[i]f the computed ID [i.e., CRC for the
`selected image file] is determined to represent a ‘bad’ image – that is,
`an unwanted image which is targeted for filtering (e.g., ad image)—
`the method proceeds to kill the image.” Id., 30:35-46. In other words,
`Hoffman teaches that the selected image file is characterized as “bad”
`(i.e., unauthorized) if its CRC value or signature (i.e., identification
`value) matches one of the identification values for known “bad”
`image files. Davidson Decl., ¶130. Thus, a POSITA would have
`understood that, when combined with DeSouza, the selected graphics
`file would be characterized as an unauthorized file (e.g., bad or
`unwanted image) if its identification value matched an identification
`value associated with a known unauthorized graphics file. Id., ¶131.
`
`Id. at 25. Symantec equates the so-called “bad” or “unwanted” advertising images
`
`disclosed in Hoffman with the “unauthorized files” that must be characterized or
`
`categorized in claims 1, 10, and 16 of the ’298 Patent. Id.; Ex. 2006 ¶ 46. But
`
`Symantec does not establish that Hoffman’s advertising images are “stored on a
`
`computer without authority or permission from a system administrator.” Ex. 2006 ¶
`
`46. Moreover, Symantec does not offer any construction for “unauthorized file”
`
`that would cover Hoffman’s advertising images.
`
`-12-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`
`
`Indeed, the extent of Symantec’s analysis of whether Hoffman’s “bad” or
`
`“unwanted” advertising images are “unauthorized files” as required by claims 1,
`
`10, and 16 is to put the labels “bad,” “unwanted,” and “unauthorized” in close
`
`proximity to each other and hope that the reader will assume that these terms are
`
`synonymous. Pet. at 25 (using phrases “‘bad’ (i.e., unauthorized)” and
`
`“unauthorized file (e.g., bad or unwanted image).)” The declaration of Symantec’s
`
`expert is no better, using exactly the same technique of attempting to associate
`
`“unauthorized” with “bad” or “unwanted.” Ex. 1011 ¶¶ 130–132.
`
`Symantec’s cursory analysis is flawed because neither “bad” nor
`
`“unwanted” means “unauthorized.” Ex. 2006 ¶ 47. While both “bad” and
`
`“unwanted” convey the concept that Hoffman’s advertisements are “undesirable,”
`
`they do not convey that the advertisements are placed “without authority or
`
`permission” as required by the ordinary meaning of “unauthorized.” Id. Moreover,
`
`the ’298 Patent expressly distinguishes “undesirable files,” which are disclosed but
`
`not claimed, from “unauthorized files,” which are claimed. See Ex. 1001 at 1:41–
`
`56 (“users upload files that are offensive, illegal, unauthorized, or otherwise
`
`undesirable and thus wasteful of storage resources”) (emphasis added).
`
`Symantec’s attempt to modify the narrower claim phrase “unauthorized files” to
`
`read on the broader phrase “undesirable files” should be rejected.
`
`-13-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`
`
`Further, an analysis of how Hoffman determines that advertisements are
`
`“bad” or “unwanted” confirms that those advertisements are not “unauthorized” as
`
`required by the ’298 Patent. Hoffman discloses that so-called “bad” images are
`
`simply ones that the end-user—that is, the person using a web browser—prefers
`
`not to see. Ex. 2006 ¶ 48. The portion of Hoffman Symantec relies on discloses:
`
`If the computed ID is determined to represent a ‘bad’ image—that is,
`an unwanted image which is targeted for filtering (e.g., ad image)—
`the method proceeds to kill the image at lines 620–631.
`Ex. 1005 at 30:37–41 (emphasis added). This portion does not teach anything more
`
`than the user being able to filter out advertisements based on his or her personal
`
`preferences. Ex. 2006 ¶ 48. Indeed, other portions of Hoffman make it abundantly
`
`clear that Hoffman’s filtering is based on the user’s personal preferences. Id. For
`
`example, Hoffman discloses:
`
`Of particular interest, the system 220 includes a Filter module 225 of
`the present invention. The Filter 225 manages content of Web pages
`downloaded from the Internet (or Intranet) by a user, according to
`user-configurable filter settings.
`Ex. 1005 at 5:13–17 (emphasis added).
`
`In an exemplary embodiment, the Filter method provides handlers for
`specific processing of various HTML tags, all operating according to
`user-configurable filtering preferences.
`Id. at 3:51–54 (emphasis added).
`
`-14-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`Accordingly, there is great interest in developing techniques which
`speed up the process of browsing Web content or “Web surfing,”
`including decreasing the background noise (e.g., ancillary graphics)
`which are not desired by the user.
`Id. at 2:63–67 (emphasis added).
`
`
`
`Accordingly, Hoffman consistently describes the advertisements that the
`
`user can choose to filter as annoying or undesirable to the user, but never says the
`
`advertisements violate any policy or are otherwise “unauthorized” to be on the
`
`computer. Ex. 2006 ¶ 49. Because the filtered advertisements disclosed by
`
`Hoffman are not “files stored on a computer without authority or permission from
`
`a system administrator,” they are not “unauthorized files” as properly construed
`
`under the BRI standard. Id.
`
`
`
`Therefore, Hoffman does not disclose the limitations of claims 1, 10, and 16
`
`that require characterizing or categorizing a file as an “unauthorized file.” Id. ¶ 50.
`
`Because Symantec does not even allege that DeSouza or any other reference
`
`combined with Hoffman meets this limitation, Symantec has failed to meet its
`
`burden to prove the claims unpatentable in view of the DeSouza and Hoffman
`
`combinations. Id. The Board should find claims 1–4, 6–14, and 16 patentable over
`
`the DeSouza and Hoffman combinations. Id.
`
`-15-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`2.
`
`Symantec did not prove that Hoffman discloses comparing
`an identification value of the selected file with identification
`values associated with unauthorized files.
`
`For two reasons, Symantec failed to prove that Hoffman discloses
`
`comparing an identification value of the selected file with identification values
`
`associated with unauthorized files. First, as explained above in Section IV(A)(1),
`
`Hoffman does not deal with “unauthorized files” because the advertisements that
`
`Hoffman blocks are merely annoying or undesirable, not unauthorized.
`
`Accordingly, for the same reason that Hoffman does not disclose characterizing or
`
`categorizing unauthorized files, it also does not disclose comparing identification
`
`values of unauthorized files with anything.
`
`Second, even if Hoffman disclosed characterizing or categorizing
`
`“unauthorized files”—which it does not—Symantec did not prove that such
`
`characterization includes comparing an identification value of the selected file with
`
`identification values associated with unauthorized files. Every independent claim
`
`includes a limitation requiring such a comparison.
`
`Symantec’s argument that Hoffman discloses the comparing limitation is on
`
`pages 24–26 of the Petition. Symantec relies on column 30, lines 35–46 of
`
`Hoffman and Dr. Davidson’s conclusion that:
`
`In my opinion, one of ordinary skill would have understood that
`Hoffman teaches characterizing the image file as unauthorized or
`
`-16-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`(“bad”) if its CRC value or signature (i.e., identification value)
`matches one of the identification values for image files that are known
`to be “bad.”
`Ex. 1011 ¶ 131 (cited by Pet. at 25); see also Ex. 1011 ¶¶ 128–134. Symantec
`
`argues:
`
`In other words, Hoffman teaches that the selected image file is
`characterized as “bad” (i.e. unauthorized) if its CRC value or
`signature (i.e. identification value) matches one of the identification
`values for known “bad” image files. Davidson Decl., ¶ 130. Thus, a
`POSITA would have understood that, when combined with DeSouza,
`the selected graphics file would be characterized as an unauthorized
`file (e.g., bad or unwanted image) if its identification value matched
`an identification value associated with a known unauthorized graphics
`file. Id., ¶ 131.
`Pet. at 25. Both this argument and the portions of Dr. Davidson’s declaration upon
`
`which it relies are entirely conclusory, however. Symantec failed to adequately
`
`explain how Hoffman discloses the comparing limitation and, thus, Symantec
`
`failed to meet its burden.
`
`3.
`
`Symantec did not prove that DeSouza teaches a computer
`or computer program “selecting a file.”
`
`As explained above, the claims of the ’298 Patent require a computer or
`
`computer program to performing the “selecting a file” claim limitation. The claims
`
`are not satisfied by a user selecting a file.
`
`-17-
`
`

`

`IPR2016-01433
`Symantec v. Intellectual Ventures
`
`Symantec’s DeSouza and Hoffman combinations rely entirely on DeSouza
`
`as allegedly teaching the “selecting a file” limitation. But Symantec did not prove
`
`that DeSouza meets the “selecting a file” limitation. In fact, DeSouza expressly
`
`teaches that a user—not a computer or computer program as

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket