throbber
Trials@uspto.gov
`571-272-7822
`
`
`Paper 16
`
`Entered: February 27, 2017
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`UNIFIED PATENTS INC.,
`Petitioner,
`
`v.
`
`CUICA, LLC,
`Patent Owner.
`____________
`
`IPR2016-01644
`U.S. Patent 6,466,983 B1
`____________
`
`
`
`Before MATTHEW R. CLEMENTS, JENNIFER MEYER CHAGNON, and
`SHEILA F. McSHANE, Administrative Patent Judges.
`
`McSHANE, Administrative Patent Judge.
`
`
`DECISION
`Denying Institution of Inter Partes Review
`35 U.S.C. § 314(a) and 37 C.F.R. § 42.108
`
`
`
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`
`I. INTRODUCTION
`Unified Patents Inc. (hereafter “Unified” filed a Petition (“Pet.”)
`requesting an inter partes review of claims 1–4, 6, 7, 9, and 10 of
`U.S. Patent No. 6,466,983 B1 (“the ’983 patent,” Ex. 1001). Paper 2. The
`Petition identified Plano Encryption Technologies, LLC as the owner of
`the ’983 patent according to the assignment records of the United States
`Patent and Trademark Office. Pet. 1. On January 18, 2017, we were
`informed subsequently by Mr. Bradley D. Liddle, of Plano Encryption
`Technologies, that there had been a later assignment of the ’983 patent of all
`rights from Plano Encryption Technologies to Cuica, LLC (“Cuica”), and
`that the associated assignment was recorded on January 17, 2017. See
`Paper 14; Ex. 3001, 30021. We ordered Cuica to file a Mandatory Notice
`pursuant to 37 C.F.R. § 42.08(a)(2) and § 42.08(b). Paper 15. At this time,
`Cuica has not filed a Preliminary Response or a Mandatory Notice.
`Under 35 U.S.C. § 314(a), an inter partes review may not be instituted
`unless the information presented in the Petition shows “there is a reasonable
`likelihood that the petitioner would prevail with respect to at least 1 of the
`claims challenged in the petition.” For the reasons that follow, we conclude
`that the information presented in the Petition does not establish that there is a
`reasonable likelihood that Unified would prevail in challenging claims 1–4,
`6, 7, 9, and 10 of the ’983 patent as unpatentable under 35 U.S.C § 103(a).
`Pursuant to 35 U.S.C. § 314, we hereby decline to institute an inter partes
`review of the ’983 patent.
`
`                                                            
`1 The assignment shown in Ex. 3002 has been assigned Assignment Number
`504181762, recorded January 17, 2017, Reel 040995, Frame 0179.
`2
`
`
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`
`II. BACKGROUND
`A.
`Related Matters
`Unified does not identify any pending matters related to the ’983
`patent. Pet. 1.
`
`The ’983 Patent
`B.
`The ’983 patent, titled “Systems and Methods for Controlling Access
`to Data Maintained in a Repository,” issued October 15, 2002, from U.S.
`Patent Application No. 09/406,196, filed on September 30, 1999. Ex. 1001,
`at [54], [45], [21], [22]. The ’983 patent expired on October 15, 2014 due to
`non-payment of maintenance fees under 37 C.F.R. § 1.362. See Ex. 1010,
`217; Pet 13.
`The ’983 patent is directed to controlling access, assemblage, and
`presentation of data maintained in a computer system repository. Ex. 1001,
`3:22–24. The invention is intended to address deficiencies in prior methods
`of controlling content dissemination by using the data repository to
`dynamically construct responses. Id. at 3:29–30. This is done by the use of
`a “forresta”2 contained in a user’s request. Id. at 3:33–35. Figure 2,
`reproduced below, shows the configuration of the invention of the ’983
`patent.
`
`                                                            
`2 The term “forresta” appears to be a term coined by the inventor of the ’983
`patent. The meaning of this term is discussed in more detail in our claim
`construction, infra Section III.A.
`
`3
`
`
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`
`
`
`Figure 2 illustrates a block diagram of the request/response relationships for
`a client (user) with storage (content repository). Ex. 1001, 3:56–57.
`
`Client 100 may make one or more requests 200 of server 102 to have data
`returned in a response. Ex. 1001, 5:16–21. A request 200 that does not
`specify data access control process (“DAC”) 106 as the recipient is referred
`to in the ’983 patent as a “flat request,” and it always receives external data
`109 as the content of response 201 from repository server 102. Id. at 5:19–
`21, 5:66–6:5. A request 200 that is directed to DAC 106 is referred to in
`the ’983 patent as a “forresting type request,” which must be executed before
`any governed content 110 can be delivered in “privileged response 203.” Id.
`at 5:17–19, 6:5–7–. DAC 106 is subdivided into three sub-processes:
`access module 300, session module 301, and form module 302. Id. at 6:60–
`64. The modules of DAC 106 are depicted in Figure 3, reproduced below.
`
`
`
`4
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`
`
`
`Figure 3 illustrates a block diagram of the major components of DAC 106,
`including the input and output of a request and response. Ex. 1001, 3:61–64.
`
`Access module 300 is the recipient of a forresting type request and contains
`methods implementing interfacing to communications and authentication
`processes. Ex. 1001, 6:63–7:3. Session module 301 maintains and
`processes information about each client 100. Id. at 7:3–4. Form module 302
`constructs privileged response 203 to client 100 based on values of forresta
`arguments 206 and destination arguments 207. Id. at 7:12–14.
`
`
`
`5
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`
`Figure 10, which depicts session node 1000, is reproduced below.
`
`
`Figure 10 illustrates a block diagram of the data structures of session
`node 1000. Ex. 1001, 3:61–64.
`
`As forresting type requests 204 are delivered to access module 300, each is
`reformatted by access module 300 into session node 1000. Ex. 1001, 14:36–
`39. Session node 1000 is forwarded as the input argument to a process call
`to session module 301. Id. at 14:40–42. Session nodes 1000 are maintained
`as a set in a data structure known as session list 1001. Id. at 14:45–46.
`When forresting type request 204 is received, a specific session node is
`identified by matching forresta argument value 206 with the contents of
`forresta field 1003 contained within session node 1000. Id. at 18:1–5. With
`the receipt of a valid session node 1000, form module 302 begins
`assemblage of privileged response 203. Id. at 18:28–30. If the required
`6
`
`
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`permission is satisfied by privilege value 1005, form module 302 will
`include corresponding fragments and process them into a privileged
`response. Id. at 19:3–9, 19:41–48. Governed objects within a fragment may
`be modified with substitution phrases when form module 302 is building the
`privileged response. See id. at 11:3–6.
`C.
`Illustrative Claims
` Of the challenged claims, claims 1 and 9 are independent claims.
`Claims 2–4, 6, and 7 depend directly or indirectly from claim 1, and
`claim 10 depends from claim 9. Claims 1 and 9 are reproduced below:
`1. In a computer system having means for allowing access to a
`repository of data by a plurality of clients over at least one
`communications link connected to said computer system, data
`access control means comprising:
`
`means for interpreting the format of a data transmission
`occurring between said computer system and each of said clients
`wherein the transmission itself contains and is identified by one
`or more forresta identities, each of said forresta identities may be
`acted upon independently; and each of which is unique and
`unrelated to any means used to identify the parties receiving or
`sending such transmission;
`
`means for creating said forresta identity as an n-byte
`character sequence having no conflicting meaning within the
`coding constructs of a transmission;
`
`means for creating a unique session node managed by the
`data access control method, wherein said session node exists to
`identify and validate recognized forresta identities contained
`within each such transmission; and
`
`means for creating a construction sequence for each new
`transmission, said sequence identifying the components and
`forresta identities used to form the transmission and where said
`sequence results from interpreting forresta identities.
`
`
`
`
`7
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`
`9. In a computer system allowing access to a repository of data
`wherein access of the repository by a plurality of clients is
`permitted over a network communications link that may be
`connected to a server computer that is the custodian of the data
`repository, comprising in combination:
`
`a source of data that comprises the content of the
`repository, said data being eligible to be returned to a client as a
`result of an access request made by the client;
`
`means for organizing data into groups of one or more
`elements through a user interface based on criteria established
`by the designer of the repository;
`
`means for using said groups individually or in
`combination in the formation of a response to a client based on
`the access made by the client;
`
`means for controlling an access that may be executed by
`a client, said access being included as a component of group
`content;
`
`means for the selective assignment of a permission value
`to said group through a user interface, said permission value
`specifying the access and combination scope of the group to
`which it is assigned;
`
`means for determining when the intent of an access is to
`retrieve data held by the repository;
`
`means for determining when an access or sequence of
`accesses is invalid for the repository;
`
`means for control of accesses that may be executed by a
`client, said accesses being components of a named data input
`stream, comprising means for examining the content of a
`fragment file to identify embedded constructs that act as an
`access of data held by the repository when said constructs are
`executed by a client; means for identifying the data that is the
`object of the access; display means by which the content of
`fragment files is presented to the repository designer with said
`constructs displayed uniquely from other content; means for
`permitting the retention, deletion or alteration of said constructs
`
`
`
`8
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`
`by the repository designer through a user interface; and means
`for substituting said constructs with a placeholder value;
`
`means for parsing and substituting constructs that are
`components of fragment files; further including means for
`accessing a substitution table containing a set of substitution
`records, said substitution records including one each of a parse
`phrase, a substitution index and a substitution phrase;
`
`means for examining the content of a fragment file, said
`parse phrases are used in comparison with the content of the
`fragment file to identify constructs;
`
`means wherein said substitution index is paired with the
`object of the construct, said object being a reference to tangible
`data held by the repository and contained within the syntax of
`the construct, said pairing used as the placeholder value for the
`syntax of said construct; and
`
`means wherein within said means of identifying
`placeholders said substitution phrase is used as a replacement
`for a substitution index and object pair.
`Ex. 1001, 20:39–63, 22:43–23:35.
`
`
`
`Prior Art Relied Upon
`D.
`Unified relies upon the following prior art references:
`Patent
`Identifier
`Filing Date
`Reference
`
`U.S. Patent No. 6,088,451
`He
`June 28, 1996
`U.S. Patent No. 5,823,212
`Cragun
`April 19, 1996
`Shannon U.S. Patent No. 6,233,618 B1 March 31, 1998
`
`Exhibit
`No.
`1003
`1004
`1006
`
`
`
`
`
`9
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`
`Alleged Grounds of Unpatentability
`E.
`Unified challenges claims 1–4, 6, 7, 9, and 10 of the ’983 patent based
`on the alleged grounds of unpatentability set forth in the table below.
`Pet. 19, 36.
`Reference(s)
`Shannon and He
`Shannon, He, and Cragun
`
`Basis
`§ 103(a)
`§ 103(a)
`
`Claim(s) Challenged
`1
`2–4, 6, 7, 9, and 10
`
`
`
`III. ANALYSIS
`Claim Interpretation
`A.
`The ’983 patent has expired. See Ex. 1010, 217. Our review of the
`“claims of an expired patent is similar to that of a district court’s review.”
`In re Rambus, Inc., 694 F.3d 42, 46 (Fed. Cir. 2012). Because the expired
`claims of a patent are not subject to amendment, we apply the principles set
`forth in Phillips v. AWH Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005)
`(en banc) (quoting Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582
`(Fed. Cir. 1996)), that “words of a claim ‘are generally given their ordinary
`and customary meaning,’” as would be understood by a person of ordinary
`skill in the art in question at the time of the invention. A claim term,
`however, “will not receive its ordinary meaning if the patentee acted as his
`own lexicographer and clearly set forth a definition of the disputed claim
`term in either the specification or prosecution history.” CCS Fitness, Inc. v.
`Brunswick Corp., 288 F.3d 1359, 1366 (Fed. Cir. 2002). If an inventor acts
`as his or her own lexicographer, the definition must be set forth in the
`specification with reasonable clarity, deliberateness, and precision.
`
`
`
`10
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`Renishaw PLC v. Marposs Societa’ per Azioni, 158 F.3d 1243, 1249 (Fed.
`Cir. 1998).
`Unified proposes claim constructions for several terms of the claims at
`issue. We address these terms below.
`“forresta”
`Unified contends that the term “forresta” has no ordinary meaning.
`Pet. 14. Unified states that “[a]fter a diligent search,” it was unable to find
`any use of the term in common language. Id. Unified refers to the
`Specification’s description of “forresta” as passive information included
`within a user’s request as the basis of its proposed construction of the term
`to mean “any passive data which can be used to identify the user’s level of
`access to a repository of data.” Id. at 15 (citing Ex. 1001, 3:31–34; Ex. 1002
`¶ 21).
`We agree with Unified’s view that the term “forresta” does not have
`ordinary meaning because the Specification indicates that the inventor
`intended to act as a lexicographer for the term based upon the use of
`quotation marks for identification of the term therein, and referring to
`“forresta” as “a set of values herein named” and “herein labeled.” Ex. 1001,
`Abstract, 3:31–33. The Specification states that the invention “overcomes
`the deficiencies of prior schemes for controlling content dissemination,” by
`using a “forresta” as “passive information” that is included “within the
`user’s request,” and that by “[u]sing the functionality provided by the
`forresta, each of the client requests and each of the server responses are
`individualized.” Id. at 3:28–34. On this record, we agree that the
`Specification supports Unified’s proposed construction of the term
`“forresta” as “any passive data which can be used to identify the user’s level
`11
`
`
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`of access to a repository of data,” and we adopt this construction for
`purposes of this Decision.
`means-plus-function terms
`Independent claims 1 and 9 include several recitations of “means” or
`“means for” limitations. See Ex. 1001, 20:39–63, 22:43–23:35. Unified
`advocates that 35 U.S.C. § 112 ¶ 6 applies to the “means for allowing
`access” term of claim 1 and “means for organizing data” of claim 9 because
`the claim language does not provide sufficient structure to perform the
`claimed function.3 Pet. 16–18. We agree with Unified on this issue because
`the use of the word “means” in a claim element creates a rebuttable
`presumption that § 112 ¶ 6 applies, and there is no structure identified in the
`claims. Personalized Media Comm’s, LLC v. ITC, 161 F.3d 696, 703–04
`(Fed. Cir. 1998). Unified identifies the “server computer 102 [that]
`contains . . . data access control (‘DAC’) process 106 of the present
`invention” as the structure for the “means for allowing access” term of
`claim 1, and the “reference tool 500,” depicted in Figure 5, as the structure
`of the “means for organizing data” of claim 9. Pet. 16–18 (citing Ex. 1001,
`4:60–67, 7:57–8:5, Figs. 1, 2, 5; Ex. 1002 ¶¶ 25, 27).
`Unified also asserts that the remaining “means for” limitations of
`claim 1, and those of dependent claims 2–4, 6, and 7, only “further define
`the claimed ‘data access control means’ of claim 1” (i.e., the recited “means
`for allowing access”), and the corresponding structure is therefore also
`
`                                                            
`3 Section 4(c) of the AIA re-designated 35 U.S.C. § 112 ¶ 6 as 35 U.S.C.
`§ 112(f). Because the ’983 patent has a filing date before September 16,
`2012 (the effective date of AIA § 4(c)), we will henceforth refer to the
`pre-AIA version of 35 U.S.C. § 112.
`
`12
`
`
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`server computer 102 containing DAC process 106. Id. at 18. Similarly,
`Unified advocates that for other means-plus-function terms of claims 9 and
`10, the corresponding structure is the “server computer 102 [that]
`contains . . . data access control (‘DAC’) process 106.” Id. at 19.
`When construing a means-plus-function limitation under 35 U.S.C.
`§ 112 ¶ 6, we first must consider the claimed function, and then we look to
`the specification for the corresponding structure that actually performs the
`claimed function. Med. Instrumentation & Diagnostics Corp. v. Elekta AB,
`344 F.3d 1205, 1210 (Fed. Cir. 2003); Cardiac Pacemakers, Inc. v. St. Jude
`Med., Inc., 296 F.3d 1106, 1119 (Fed. Cir. 2002). The corresponding
`structure of a means-plus-function limitation must be more than simply a
`general purpose computer or microprocessor to avoid pure functional
`claiming. Aristocrat Techs. Austl. Pty Ltd. v. Int’l Game Tech., 521 F.3d
`1328, 1333 (Fed. Cir. 2008). That is, the specification must disclose
`“enough of an algorithm to provide the necessary structure under § 112,
`¶ 6.” Finisar Corp. v. The DirectTV Group, 523 F.3d 1323, 1340 (Fed. Cir.
`2008). The disclosed algorithm may be expressed in any understandable
`terms, e.g., a mathematical formula, in prose, or as a flowchart. Id. Simply
`disclosing software, however, “without providing some detail about the
`means to accomplish the function[,] is not enough.” Id. at 1340–41.
`Under 37 C.F.R. § 42.104(b)(3), a Petition is required to provide an
`identification of the portions of the specification that describe the structure,
`material, or acts corresponding to the claimed functions of the means-plus-
`function limitations that are necessary to be construed. This information
`assists us in assessing the challenges and prior art presented in a Petition.
`Here, server computer 102 that runs DAC process 106 is not identified as a
`13
`
`
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`special purpose computer, and therefore identification of algorithms or other
`terms disclosed in the Specification that describe the function of the
`structure is required. Unified states that for the majority of the means-plus-
`function limitations, the corresponding structure that performs the claimed
`functions is server computer 102 performing DAC process 106. However,
`as discussed further below, there are also specific algorithms and/or
`additional means included in the Specification of the ’983 patent that
`accomplish the specific functions of the means-plus-function limitations of
`the claims. The general term “DAC process,” as discussed supra
`Section II.B, includes three sub-processes—access module 300, session
`module 301, and form module 302—each of which is discussed at some
`length in the Specification. See Ex. 1001, Figs. 3–11, cols. 5–20. In fact,
`Unified fails to address the majority of the means-plus-function limitations
`by identifying associated portions of the Specification that disclose the
`algorithms or means to accomplish specific DAC processes corresponding to
`those limitations of the claim.4
`Not every limitation of a challenged claim requires explicit or full
`construction, but for means-plus-function limitations in which the
`corresponding structure is a general purpose computer, 37 C.F.R.
`§ 42.104(b)(3) requires some identification of the algorithms disclosed for
`performing the claimed function. For instance, as discussed in greater detail
`
`                                                            
`4 Here, we are not addressing whether there is, in fact, sufficient support in
`the Specification to support all the mean-plus-function limitations of the
`claims at issue. Rather, the issue under discussion is the sufficiency of the
`Petition’s identification of portions of the Specification pursuant to
`37 C.F.R. § 42.104(b)(3).
`
`14
`
`
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`infra Section III.B.4, in order to allow us to assess the obviousness
`challenges, we consider the claim 1 limitation of “means for creating said
`forresta identity as an n-byte character sequence,” which is a mean-plus-
`function limitation, having the function of creating the forresta identity as an
`n-byte character sequence, and with the corresponding structure of general
`purpose server computer 102, running the only disclosed algorithm for the
`function, i.e., fcode process 900. See infra Section III.B.4. For claim 9, we
`consider the limitation “means for determining when an access or sequence
`of accesses is invalid for the repository,” which is a mean-plus-function
`limitation, having the function of determining when access is invalid for the
`repository of data, with the corresponding structure being a general purpose
`server computer 102, running the only disclosed algorithm for the function,
`i.e., determining that no session node is found in a search, determining that
`the destination value fails to match any sorted order field entry, and
`comparing a forresta value to determine a failure to match an expected
`forresta field. See infra Section III.B.4. As discussed in greater detail
`below, the prior art teachings identified in the Petition are deficient as to
`these limitations, and, thus, the Petition fails to demonstrate a reasonable
`likelihood that Unified would succeed in demonstrating the obviousness of
`the claims at issue. We, therefore, need not further address the sufficiency
`of the Petition’s § 112 ¶ 6 analysis.
`Remaining Claim Terms or Phrases
`Unified also proposes a construction for the claim term “fragments.”
`Pet. 15–16 (citing Ex. 1001, 7:20–26). It is not necessary to construe this
`term, or other terms of the claims, however, to resolve the issues discussed
`below. See, e.g., Vivid Techs., Inc. v. Am. Sci. & Eng’g, Inc., 200 F.3d 795,
`15
`
`
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`803 (Fed. Cir. 1999) (explaining that only those claim terms or phrases that
`are in controversy need to be construed, and only to the extent necessary to
`resolve the controversy).
`
`B.
`
`Alleged Obviousness of Claim 1 Over Shannon and He and of
`Claims 2–4, 6, 7, 9, and 10 Over Shannon, He, and Cragun
`
`Unified contends that independent claim 1 of the ’983 patent would
`have been obvious over the combination of Shannon and He. Pet. 19–35.
`Unified also alleges that claims 2–4, 6, 7, 9, and 10 would have been
`obvious over the combination of Shannon, He, and Cragun. Id. at 36–60.
`To support its contentions, Unified provides explanations as to how the
`combination of the prior art purportedly teaches each claim limitation. Id. at
`19–60. Unified also relies upon the Declaration of Herbert Cohen (“Cohen
`Declaration”) (Ex. 1002) to support its contentions. On this record, we are
`not persuaded that Unified has demonstrated a reasonable likelihood of
`prevailing on its obviousness challenges.
`We begin our discussion with a brief summary of Shannon, He, and
`Cragun, and then address Unified’s challenges to the claims.
`1. Shannon (Ex. 1006)
`Shannon generally discloses access control to limit access to
`information content, such as that found on the Internet. Ex. 1006, Abstract,
`3:46–50. Shannon discloses providing “access control not based only upon
`content, but rather, based primarily upon the identity of the computers or
`users making the requests.” Id., Abstract. Access control is determined “by
`comparing client source information against a database of Uniform Resource
`Locators (URLs), IP addresses, or other resource identification data
`
`
`
`16
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`specifying the data requested by the client.” Id. Shannon uses a network
`device 100 that acts as a “gateway,” “configured . . . to monitor the data
`communications that pass between clients connected to the LAN 40 and
`servers connected to the WAN 45,” as depicted in Figure 1 below. Id. at
`6:5–9, Fig. 1; Ex. 1002 ¶ 32.
`
`
`Figure 1 depicts an example of the networked computer environment of
`Shannon. Ex. 1006, 4:62–63 (annotated by Unified).
`
`Shannon uses systems that control user access to information by identifying
`the users seeking the information. Ex. 1006, 7:26–40. The system then
`determines whether the identified user may view the information, and to
`what extent the user may access, download, or manipulate the information.
`Id. at 6:48–60.
`
`2. He (Ex. 1003)
`He is directed to connecting a network security server to a network “to
`control access to the network elements and protect network resources and
`
`
`
`17
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`information.” Ex. 1003, Abstract. The network is depicted in Figure 2,
`which is reproduced below.
`
`
`
`Figure 2 depicts a block diagram of the network that includes network
`security server 208. Ex. 1003, 3:23–25.
`
`He discloses the use of network security server 208 that includes “network
`authentication 202, user credential control 204 and network element access
`control 206.” Ex. 1003, 11:34–40. He also discloses the use of a general
`ticket that is provided to each user at login to facilitate future access
`requests. Id. at 2:36–37. The “general ticket is used by the network security
`server to authenticate access requests without having to verify user
`credentials for each access request.” Id. at 2:39–42.
`3. Cragun (Ex. 1004)
`Cragun discloses a censoring browser used for internet viewing.
`Ex. 1004, Abstract. The system of Cragun allows for tailoring objectionable
`content, allowing users to select censoring parameters, including “words and
`word fragments, user selected categories, and user selected super
`categories.” Id. at 2:35–38; Ex. 1002 ¶ 50. Cragun discloses that, prior to
`18
`
`
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`any text being displayed, the system “searches for and marks any words and
`words containing any word fragments on a user-defined unwanted-word list
`stored in a user profile.” Ex. 1004, 3:55–58. Any words on the user
`censoring list “are removed and replaced by user selected substitutes for
`display of the processed text in accordance with user selected censoring
`rules stored in a user profile.” Id. at 3:59–61.
`4.
`Analysis
`Of the challenged claims, claims 1 and 9 are independent. Claims 2–
`4, 6, and 7 depend directly or indirectly from claim 1, and claim 10 depends
`from claim 9. We first address independent claim 1, and the claims which
`depend therefrom, and then address independent claim 9, and claim 10
`which depends therefrom.
`a. Claims 1–4, 6, and 7
`Unified alleges that the combination of Shannon and He teaches all
`the limitations of independent claim 1. See Pet. 19–35. There are several
`mean-plus-function elements that comprise the “access control means” of
`claim 1. Claim 1 recites, in part, “means for creating said forresta identity as
`an n-byte character sequence having no conflicting meaning within the
`coding constructs of a transmission.” Ex. 1001, 20:51–54. The ’983 patent
`describes this creation of the n-byte sequence as follows:
`All forresta values, except the anonymous user value, are
`generated utilizing a time and memory based routine that uses
`multiple random values. In this preferred embodiment of the
`present invention, the resulting format of a forresta value is an
`“n”-byte character sequence that has no conflicting meaning
`within the coding constructs of a response 201. To create a
`forresta value sequence requires use of the following algorithm.
`This algorithm is defined by the current preferred embodiment of
`
`
`
`19
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`
`the present invention and is referred to herein as the “fcode
`process” 900 (Fig. 9).
`Ex. 1001, 12:13–23 (emphasis added). Figure 9, referenced above, is
`reproduced below.
`
`
`Figure 9 depicts a block diagram illustrating the required manipulation of
`values in order to form a forresta value. Ex. 1001, 4:22–23.
`
`The ’983 patent contains additional, detailed descriptions of the algorithm
`for fcode process 900, i.e., the programming used to accomplish the claimed
`function of creating the n-byte character sequence. Ex. 1001, 12:25–13:42.
`The ’983 patent does not include discussion of any other algorithm or
`corresponding structure for accomplishing this function of the claim.
`
`
`
`20
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`
`Unified relies upon the following portion of Shannon as teaching a
`“means for creating said forresta identity as an n-byte character sequence”:
`In the example shown in Table 1, client computer numbers
`are used. In a preferred embodiment, the computer numbers used
`by the group/source database 203 are preferably machine address
`(i.e., Internet Protocol (“IP”) or Media Access Control (“MAC”)
`addresses, as will be described below) to identify sources, or
`sources may be broken down even further to the username level,
`such that no matter which client computer a specific user logs in
`at, that user will always be associated with his or her respective
`group. In such a case, groups would have sources containing
`usernames,
`instead of hostnames, or sources may be
`username/hostname pairs.
` As will be explained,
`the
`group/source database 203 will be used to determine who is
`requesting the information over the network, such as web page
`data for example, and what their level of access is.
`Ex. 1006, 7:27–41; see Pet. 32.5 Unified appears to rely upon Shannon’s
`client computer number or machine addresses such as Internet Protocol
`(“IP”), Media Access Control (“MAC”) addresses, and/or usernames as
`teaching the claimed n-byte character sequence. Pet. 32. The claim
`limitation, however, requires the creation of a forresta identity as an n-byte
`character sequence, and Shannon merely discloses that there are different
`identifiers of a computer or of a user of a computer that may be associated
`with different groups and have different assigned levels of access. See
`Ex. 1006, 7:11–26. Even assuming the identifiers in Shannon are “an n-byte
`character sequence,” as recited by the claim, Shannon still fails to teach any
`“creating” because the computer numbers taught by Shannon—e.g., IP
`                                                            
`5 In the Petition, Unified cites to Exhibit 1006 at 7:11–26 (Pet. 32), but the
`text quoted by Unified, and reproduced above, is at 7:27–41. The erroneous
`citation appears to be inadvertent error, and we rely on the textual portion of
`Shannon quoted in the Petition.
`
`21
`
`
`
`

`

`IPR2016-01644
`Patent 6,466,983 B1
`
`address or MAC address—already exist and, therefore, are not “creat[ed]”
`by Shannon’s group/source database 203. Moreover, even assuming that
`Shannon teaches “creating” computer numbers, we still would not be
`persuaded that Shannon teaches the recited “means for creating said forresta
`identity” because Unified does not identify, and we cannot find, any
`teaching in Shannon of the use of the algorithm disclosed in the ’983 patent
`“for creating a forresta identity,” i.e., fcode process 900. Unified also does
`not argue that Shannon’s process is equivalent to fcode process 900, or that
`He teaches this limitation.
`We are, therefore, not persuaded that the asserted combination of
`Shannon and He teaches or suggests the limitation of “means for creating
`said forresta identity as an n-byte character sequence” of the “access control
`means” of claim 1. Because claims 2–4, 6, and 7 depend from independent
`claim 1, and because Unified cites no additional evidence in discussing these
`claims that would remedy the deficiency of the prior art discussed above
`with respect to cl

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket