throbber
Paper No. __
`Filed: August 31, 2016
`
`Jonathan Stroud
`Unified Patents Inc.
`1875 Connecticut Ave. NW, Floor 10
`Washington, D.C., 20009
`Telephone: 650-999-0899
`
`
`

`Filed on behalf of Unified Patents Inc.
`By:
`P. Andrew Riley
`James D. Stein
`Finnegan, Henderson,
`Farabow, Garrett & Dunner, L.L.P.
`901 New York Avenue, NW
`Washington, DC 20001–4413
`Telephone: 202-408-4266
`Facsimile: 202-408-440
`Email: Plano983IPR@finnegan.com
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`UNIFIED PATENTS INC.,
`Petitioner
`
`v.
`
`PLANO ENCRYPTION TECHNOLOGIES, LLC,
`Patent Owner
`
`
`
`
`
`
`
`IPR2016-01644
`U.S. Patent 6,466,983 B1
`
`SYSTEMS AND METHODS FOR CONTROLLING ACCESS
`TO DATA MAINTAINED IN A REPOSITORY
`
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW
`OF CLAIMS 1-4, 6, 7, 9, and 10
`UNDER 35 U.S.C. § 312 AND 37 C.F.R. § 42.104
`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`
`Table of Contents
`
`
`I. MANDATORY NOTICES ................................................................................. 1
`A. Real Party-in-Interest ........................................................................................ 1
`B. Related Matters ................................................................................................. 1
`C. Counsel ............................................................................................................. 1
`D. Service Information, Email, Hand Delivery, and Postal .................................. 1
`II. Certification of Grounds for Standing ................................................................. 2
`III. Overview of Challenge and Relief Requested ................................................. 2
`A. Prior Art Patents and Printed Publications ....................................................... 2
`B. Grounds for Challenge ..................................................................................... 3
`IV. Technology Background .................................................................................. 3
`V. Overview of ’983 patent ...................................................................................... 7
`A. Summary of the Alleged Invention .................................................................. 7
`B. Level of Ordinary Skill in the Art .................................................................. 11
`C. Prosecution History ........................................................................................ 12
`VI. Claim Construction ......................................................................................... 14
`A. “Forresta” ........................................................................................................ 14
`B. “Fragment[s]” ................................................................................................. 15
`C. “means for allowing access to a repository of data by a plurality of clients
`over at least one communications link connected to said computer systems”
`[claim 1] ................................................................................................................ 16
`D. Claims 1-4, 6, and 7 Means-Plus-Function Constructions ............................. 17
`E. “means for organizing data into groups of one or more elements through a
`user interface based on criteria established by the designer of the repository”
`[claim 9] ................................................................................................................ 18
`F. Claims 9 and 10 Means Plus Function Constructions .................................... 19
`VII. Specific Grounds for Petition ......................................................................... 19
`i 
`

`


`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`
`A. Ground 1: Claim 1 is rendered obvious over Shannon (EX1006) in view of
`He ’451 (EX1003)................................................................................................. 19
`1. Shannon (EX1006) ...................................................................................... 19
`
`2. He ’451 (EX1003) ....................................................................................... 21
`
`3. Motivation to combine He ’451 (EX1003) and Shannon (EX1006) .......... 22
`
`4. Chart for claim 1: Shannon in view of He ’451. See Cohen Decl. (EX1002)
`at ¶ 46) ............................................................................................................... 28
`
`B. Ground 2: Claims 2-4, 6, 7, 9, and 10 are rendered obvious by Shannon in
`view of He ’451, further view of Cragun ............................................................. 36
`1. Cragun ......................................................................................................... 36
`
`2. Motivation to combine Cragun with He ’451 and Shannon ....................... 36
`
`3. Chart for claims 2-4, 6, 7, 9, and 10: Shannon in view of He ’451, further
`in view of Cragun (see Cohen Decl. (EX1002) at ¶ 57) ................................... 40
`
`VIII. Conclusion ...................................................................................................... 60
`
`
`
`ii 
`

`
`
`


`
`

`
`IPR2016—01644, Petition for Inter Partes Review
`
`U.S. Patent 6,466,983 B1
`
`Exhibit List
`
`Exhibit
`
`Description
`
`EX1001 (’983 patent) U.S. Pat. No. 6,466,983 B1 (‘983 patent)
`
`EX1002 (Cohen C1601.) Declaration of Herbert Cohen (Cohen decl.)
`EX1003 (He .451)
`})JIiSJ_ul1’a:.1N;(.)5(f1led on Jun. 28, 1996; published
`
`EX1004 (Craglm)
`EX1005 (Blumenau)
`
`U.S. Pat. No. 5,832,212 (filed on Apr.
`ublished on Nov 3 1998
`C1 a un
`'
`3
`‘
`O.
`U.S_ Pat. No. 7,756,986 B2 to Blumenau (Blumenau)
`
`.
`
`19, 1996;
`
`.
`
`‘ 3
`
`EX1007 (Gebauer)
`
`U.S. Pat. No. 7,062,489 B1 to Gebauer (Gebauer)
`
`.k
`EX1008 P .
`( “p'er"'“ )
`EX1009 (Ginter)
`
`U.S._ Pat. No. 6,714,931 (filed on Apr. 29, 1998;
`ublished on Mar. 30, 2004 Pa ierniak
`U_S. Pat. No. 5,982,891 to Gitner (Gitner)
`
`EX1010 (File History) U_S. Pat. No. 6,466,983 B1 File History
`
`EXl01 1
`
`EX1012
`
`Unified Patents Inc. ’s Voluntary Interrogatories
`
`Excerpt of HTML 4.0 Specification (1997)
`
`iii
`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`
`I. MANDATORY NOTICES
`
`A. Real Party-in-Interest
`
`Pursuant to 37 C.F.R. § 42.8(b)(1), Unified Patents Inc. (“Unified” or
`
`“Petitioner”) certifies that Unified is the real party-in-interest, and further certifies
`
`that no other party exercised control or could exercise control over Unified’s
`
`participation in this proceeding, the filing of this petition, or the conduct of any
`
`ensuing trial. In this regard, Unified has submitted voluntary discovery. See
`
`EX1011 (Unified Patents Inc.’s Voluntary Interrogatories).
`
`B. Related Matters
`
`U.S. Pat. No. 6,466,983 (“’983 patent” (EX1001)) is owned by Plano
`
`Encryption Technologies, LLC (“Plano” or “Patent Owner”) according to the
`
`assignment records of the United States Patent and Trademark Office.
`
`C. Counsel
`
`P. Andrew Riley will act as lead counsel; Jonathan Stroud and James Stein
`
`will act as backup counsel.
`
`D. Service Information, Email, Hand Delivery, and Postal
`
`Petitioner consents to electronic service, and request patent owners do the
`
`same. Petitioner
`
`can be
`
`served
`
`at Plano983IPR@finnegan.com
`
`and
`
`jonathan@unifiedpatents.com. P. Andrew Riley and James D. Stein can be reached
`
`at Finnegan, Henderson, Farabow, Garrett & Dunner, L.L.P., 901 New York
`


`
`1 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`Avenue, NW, Washington, DC 20001–4413, and can be reached by telephone at
`
`202-408-4266 or fax at 202-408-4400. Jonathan Stroud can be reached at Unified
`
`Patents Inc., 1875 Connecticut Ave. NW, Floor 10, Washington, D.C., 20009, at
`
`650-999-0455.
`
`II. CERTIFICATION OF GROUNDS FOR STANDING
`
`Petitioner certifies pursuant to Rule 42.104(a) that the patent for which
`
`review is sought is available for inter partes review and that Petitioner is not
`
`barred or estopped from requesting an inter partes review challenging the patent
`
`claims on the grounds identified in this Petition.
`
`III. OVERVIEW OF CHALLENGE AND RELIEF REQUESTED
`
`Pursuant to Rules 42.22(a)(1) and 42.104(b)(1)–(2), Petitioner challenges
`
`claims 1-4, 6, 7, 9, and 10 of the ’983 Patent.
`
`A. Prior Art Patents and Printed Publications
`
`The following references are pertinent to the grounds of unpatentability
`
`explained below1:
`
` U.S. No. 6,088,451 (filed on Jun. 28, 1996; published on Jul. 11, 2000) (“He
`
`’451”) (EX1003)), which is prior art under 35 U.S.C. § 102(a)
`
`                                                            
`1 The ’983 patent issued from a patent application filed prior to enactment of the
`
`America Invents Act (“AIA”). Accordingly, pre-AIA statutory framework applies.
`


`
`2 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`
` U.S. No. 5,832,212 (filed on Apr. 19, 1996; published on Nov. 3, 1998)
`
`(“Cragun” or (EX1004)), which is prior art under 35 U.S.C. § 102(a)
`
` U.S. No. 6,233,618 (filed on Mar. 31, 1998; published on May 15, 2001)
`
`(“Shannon”) (EX1006)), which is prior art under 35 U.S.C. § 102(a)
`
`B. Grounds for Challenge
`
`This Petition, supported by the expert declaration of Herbert Cohen, requests
`
`cancellation of challenged claims 1-4, 6, 7, 9, and 10 as unpatentable under 35
`
`U.S.C. § 103. See 35 U.S.C. § 314(a).
`
`IV. TECHNOLOGY BACKGROUND
`
`Well before the application for the ’983 patent, the widespread use and
`
`sharing of electronic data storage devices led to a desire for better security and
`
`control over access to information. He ’451 (EX1003) at 1:7–9, 1:30–37; Shannon
`
`(EX1006) at 1:44-48, 3:46-50. Prior art developers created software and hardware
`
`systems to regulate who gets to view and access what information on a network.
`
`He ’451(EX1003) at Abstract; Shannon (EX1006) at 3:35–58; see generally U.S.
`
`Pat. No. 7,756,986 B2 to Blumenau (EX1005) at Abstract; U.S. Pat. No. 7,062,489
`
`B1 to Gebauer (EX1007) at Abstract; U.S. Pat. No. 5,982,891 to Ginter (EX1009)
`
`at Abstract.
`


`
`3 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`To protect information and regulate access, these prior systems and methods
`
`generally had three steps: (1) identifying a user, (2) limiting access, and (3)
`
`disseminating data. He ’451 (EX1003) at 8:35–9:61; Shannon (EX1006) at Fig. 2;
`
`Blumenau (EX1005) at Abstract; Gebauer (EX1007) at Abstract; Ginter (EX1009)
`
`at Abstract.
`
`Systems that control user access to information must identify the users
`
`seeking the information. The system can then determine whether the user may
`
`view the information, and to what extent the user may access, download, or
`
`manipulate the information. See Shannon (EX1006) at 6:48–60. A school
`
`administrator, for example, might want to prevent the frivolous access of certain
`
`websites during school hours. Id. Websites which direct students to on-line games
`
`could distract from the learning process. Id.The same administer, however, may
`
`not wish to regulate a chess club’s access to those same sites, depending on the
`
`time of day. Id.
`
`In this example from Shannon, the system would be required to identify the
`
`student (EX1006 at 7:26–40), the requested data (see id. at 8:24–67), the location
`
`from where the request was made (see id. at 7:26–40), and the time and date the
`
`request was made (id. at 6:48-60; 7:57–12; Table 2). The system would then
`
`compare these parameters with acceptable access parameters. Id. at 6:28-47, 8:24-
`
`67; Papierniak (EX1008) at 10:10–63; FIG. 7.
`


`
`4 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`
`Papierniak (EX1008) at FIG. 7
`
`
`
`This second step would regulate whether the user, a student in the proposed
`
`example, could access the desired site, and to what extent access should be
`
`granted. Shannon (EX1006) at 6:48–60, 7:5712, Table 2. Though the student may
`
`be allowed access to a chess website, the system would deny access to the pay-to-
`
`play section of the same website. Id. Alternatively, an administrator may wish his
`
`students to have access to certain educational websites, but may also wish to limit
`
`the extent to which a student can access certain parts of the sites. Id.
`


`
`5 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`In another example, a company may wish for its employees to be able to
`
`access certain corporate records while also wanting to restrict which employees
`
`can access what records. See He ’451 (EX1003) at 4:54–5:3. A human resources
`
`employee, for example, may need access to all employee records, but an IT
`
`employee should probably not have the same level of access. Some systems would
`
`then issue a “ticket” or code for each session (or attempt to access the information),
`
`which sets the limits of access for that session. See He ’451 (EX1003) at 27:44–50.
`
`Finally, after determining the extent to which the identified user can access
`
`the requested information, the system would provide the appropriate access. In
`
`doing so, the system should provide no more and no less information than that
`
`authorized for the particular user. Whether restricted information—information the
`
`user does not have access to—is redacted, replaced, or removed is up to the
`
`system’s designer. Cragun (EX1004) at 7:65–8:15, FIG. 7.
`


`
`Cragun (EX1004) at FIG. 7.
`
`6 
`

`
`
`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`Determining whether a person should have access to information requires a
`
`certain level of cognition. Systems, at the time of ’983 patent’s filing, would
`
`primarily use key words or categorization to determine the type of information
`
`being requested. See EX1006 at 7:57-12, Table 2. The “information type” could be
`
`compared to the user’s access rights and the restricted information could thus be
`
`blocked. Id.
`
`V. OVERVIEW OF ’983 PATENT
`
`A. Summary of the Alleged Invention
`
`The ’983 patent describes a number of ways the prior art is used to protect
`
`data and how some of these methods are flawed. The background focuses primarily
`
`on the well-known techniques it calls the “cookie approach” (’983 patent at 1:65),
`
`the “re-direction method” (id. at 2:19) and “data censure” (id. at 2:29). The patent
`
`treats these data access methods as similar but mutually exclusive solutions. Id. at
`
`2:51–53. It describes the singular problem with the prior art as the “attribute that
`
`regulated content is assembled into a fixed form prior to its availability.” Id.
`
`Specifically, the patent claims the prior methods required “duplication of many
`
`elements used to implement the content since no mechanism exist[ed] to
`
`dynamically replace only the sensitive portion at the time of the request.” Id. at
`
`2:56-58.
`


`
`7 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`Despite this characterization of the prior art, the ’983 patent does not
`
`primarily address this alleged deficiency. Instead, the ’983 patent addresses a
`
`method to identify the user, create a unique session for said user, and to regulate
`
`the extent of the data shared in each session. EX1002 (Cohen Decl.) at ¶¶ 12-13.
`
`The ’983 patent relies on the fractured packet nature of internet protocols to
`
`accomplish this last part. The method simply blocks and replaces the restricted
`
`packets based on the user’s access. EX1001 at 19:3–9; EX1002 (Cohen Decl.) at ¶
`
`13.
`
`The ’983 patent specification devotes the remaining portion of the detailed
`
`description of the invention to describe how the system determines the level of
`
`access for the user. The ’983 patent primarily relies on identifiers intrinsic to the
`
`user. EX1002 (Cohen Decl.) at 14. The invention describes using this user data to
`
`create a unique “session” for the user which will control the user’s access to a data
`
`repository. An “access module” 300 creates a session node 1000. See EX1001 at
`
`FIG. 10.
`


`
`8 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`
`Figure 10 of ’983 patent (EX1001).
`
`
`
`The session node acts as the system’s access ticket, determining the level of
`
`access the user has from his location at the time of his request. EX1001 at 18:1-
`
`19:52, Figs. 7, 10 & 11; EX1002 (Cohen Decl.) at 15. The system disclosed in the
`
`’983 patent then uses the session node to compare the user’s allowed data to the
`
`requested data. See id., see also id. at FIG. 5; EX1002 (Cohen Decl.) at 15.
`


`
`9 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`
`Figure 5 of ’983 patent (EX1001).
`
`
`
`If the requested data contains data which the user is not authorized to access,
`
`it can be redacted or replaced with a phrase of the designer’s choosing. See
`
`EX1001 at 18:28-19:40, FIG. 7; EX1002 (Cohen Decl.) at 16. Finally the data is
`
`compiled into a readable format and presented to the user. EX1001 at 19:41-52.;
`
`EX1002 (Cohen Decl.) at 16.
`


`
`10 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`
`Figure 7 of ’983 patent (EX1001).
`
`B. Level of Ordinary Skill in the Art
`
`
`
`A person of ordinary skill in the art (POSA) at the time of filing the
`
`provisional application for the ’983 patent, i.e., September 30, 1999, would be
`
`familiar with network security and have at least the equivalent of a Bachelor of
`
`Science degree in electrical or computer engineering, with multiple years (two or
`
`more) of experience in the field of software design, development, or evaluation.
`
`EX1002 (Cohen Decl.) at 17. A higher level of education may make up for less
`
`experience. (Id.)
`


`
`11 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`
`C. Prosecution History
`
`On September 30, 1999, Stephen Strazza filed application number
`
`09/406,196, titled “Systems and methods for controlling access to data maintained
`
`in a repository.” See EX1012 (’983 file history) at 8. The original application
`
`included 23 claims. Id. at 42–49.
`
`On April 8, 2002, Examiner Young Won issued a non-final office action,
`
`objecting to the drawings and the specification and rejecting claims 19, 20, and 22
`
`as anticipated by U.S. Patent 6,088,728 to Bellemore et al. (Bellmore), claims 1–7,
`
`13, 14, 16–18, 21, and 22 as obvious in light of Bollemore in view of U.S. Patent
`
`6,009,442 to Chen et al. (Chen), and claim 23 as obvious in light of Bellmore in
`
`view of Chen and U.S. Patent 5,850,490 to Johnson (Johnson). See EX1012 (’983
`
`file history) at 98–100, 100–108, 108–110. While they were objected to as
`
`depending from a rejected claim, the Examiner indicated that claims 8, 9, 10–12,
`
`and 15 would be allowable if written in independent form, because neither
`
`Bellemore nor Chen taught the recited language. Id. at 110–113.
`
`Two months later on June 27, 2002, Mr. Strazza, and his attorney Thomas
`
`M. Marshall met and conferred with Examiner Won and Examiner Won’s
`
`supervisor primary examiner. Id. at 145. In that conference, Mr. Strazza was
`
`“asked to further describe in claim language applicant’s forresta identity.” Id. at
`
`145.
`


`
`12 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`Complying, Mr. Strazza filed amended claims on July 6, 2016, id. at 119,
`
`adding language from the specification directly into claim 19. See id. at 145. He
`
`then rewrote allowable claims 9, 10, and 15 in independent form, and rewrote
`
`claims 19, 20, and 22 to include further limitations. Id. In addition, Mr. Strazza
`
`acknowledged that the feature he was basing his patentability arguments on was
`
`the uniquely named “forresta” element. Id. at 145.
`
`Further, Mr. Strazza stated that “[a]s presently claimed, this invention is
`
`based on the forresta identity being assigned by the data access control means or
`
`method steps to the transmission itself wholly independent from and unrelated to
`
`the identity or operational state of the user.” Id. at 146.
`
`By this amendment, Mr. Strazza also sought to distinguish Chatterjee et al.
`
`(U.S. Pat. No. 6,024,375), Peterson et al. (U.S. Pat. No. 6,303,179), Kullick et al.
`
`(U.S. Pat. No. 5,751,997), Ferguson et al. (U.S. Pat. No. 6,237,011), and Anglin
`
`(U.S. Pat. No. 6,260,069). Id. at 147–48.
`
`Two months later on August 8, 2002, Examiner Won issued an examiner’s
`
`amendment cancelling claims 25-31 and allowing the patent. Id. at 209. The
`
`examiner did not indicate any reasons for allowability. Id. at 209–211.
`
`On November 7, 2014, the patent expired because the maintenance fees were
`
`not paid. Id. at 217. On May 6, 2015, the ’983 patent was assigned to Plano
`
`Encryption Technologies, along with U.S. Patent 6,587,858. The assignment is
`


`
`13 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`recorded at Reel/Frame 035583/0938. The two patents have very similar subject
`
`matter, and were filed on the same day by the same inventor, but are not formally
`
`linked and were examined by different patent examiners.
`
`VI. CLAIM CONSTRUCTION
`
`“[T]he Board’s review of the claims of an expired patent is similar to that of
`
`a district court’s review.” In re Rambus, Inc., 694 F.3d 42, 46 (Fed. Cir. 201 2).
`
`Under Phillips v. AWH Corp. 41 5 F.3d 1303, 1312–13 (Fed. Cir. 2005) (en banc),
`
`claim terms are given their ordinary and customary meanings as would be
`
`understood by a person of ordinary skill in the art at the time of the invention,
`
`having taken into consideration the language of the claims, the specification, and
`
`the prosecution history of record. See, e.g., Cisco Systems, Inc., v. AIP Acquisition,
`
`LLC, IPR2014-00247, Paper No. 20 at 2–3 (July 10, 2014).
`
`Any claim terms not included in the discussion below should be given their
`
`ordinary and customary meanings in light of the specification, as commonly
`
`understood by those of ordinary skill in the art.
`
`A. “Forresta”
`
`After a diligent search, the word Forresta was not found in any known
`
`Romantic or Germanic language, and one of ordinary skill in the art would be
`
`unfamiliar with its use. EX1002 (Cohen Decl.) at ¶ 20. Thus, it has no ordinary
`
`meaning in the “common parlance or by persons of skill in the pertinent art.” See
`


`
`14 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`Advanced Ground Information Systems, Inc. v. Life360, Inc., No. 2015-1732 (Fed.
`
`Cir. July 28, 2016) (slip op.).
`
`Based on its use, context, and all available evidence, a POSA reading the
`
`specification would understand the term “forresta” here to mean any passive data
`
`which can be used to identify the user’s level of access to a repository of data. This
`
`would include, for example, the user’s IP address, the geographic location of
`
`request, or any other indictor which may identify the user. EX1002 (Cohen Decl.)
`
`at ¶ 21.
`
`For example, the specification states “forresta” is “passive information”
`
`included within the user’s request. See ’983 patent at 3:31–34. The specification
`
`also uses the terms like “forresta value” (id. at 4:23; 6:43; 12:14; 12:17; 12:19) and
`
`“forresta argument” (id. at 6:42; 6:46; 7:16; 12:12). These variations of the term
`
`“forresta” are not clearly defined by the specification. EX1002 (Cohen Decl.) at
`
`¶ 21. Nor, however, are these variations used in the claims. Id. A POSA would
`
`understand the use of “forresta” in these terms is intended to indicate the value as
`
`been influenced by the forresta information. Id.
`
`B. “Fragment[s]”
`
`“Fragments” is defined in the specification as “files.” EX1001 at 7:20–26. A
`
`POSA would understand the term to include data that can be compartmentalized
`
`based on the designer’s parameters, allowing him to exclude any data he or she
`


`
`15 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`may wish. EX1002 (Cohen Decl.) at ¶¶ 22-23. This data could include the use of
`
`specific phrases, images, links, or objects found on the requested site. See EX1001
`
`at FIG. 4; EX1002 (Cohen Decl.) at ¶¶ 22-23.
`
`Figure 4 of ’983 patent.
`C. “means for allowing access to a repository of data by a plurality of
`clients over at least one communications link connected to said
`computer systems” [claim 1]
`
`
`
`Challenged claim 1 recites “means for allowing access to a repository of
`
`data by a plurality of clients over at least one communications link connected to
`
`said computer systems.” EX1001 at 20:39-42. In determining whether a particular
`
`limitation should be construed under 35 U.S.C. § 112, 6th paragraph/(f) as “means-
`
`plus-function” language, “the essential inquiry is not merely the presence or
`
`absence of the word ‘means’ but whether the words of the claim are understood by
`
`persons of ordinary skill in the art to have a sufficiently definite meaning as the
`16 



`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`name for structure.” Williamson v. Citrix Online, LLC¸ 792 F.3d 1339, 1348 (Fed.
`
`Cir. 2015). Here, Petitioner submits that this claim term should be construed as
`
`means-plus-function limitation because the surrounding claim language does not
`
`provide sufficient structure to perform the claimed function.
`
`“Construing a means-plus function claim term is a two-step process. The
`
`court must first identify the claimed function. . . . Then, the court must determine
`
`what structure, if any, disclosed in the specification corresponds to the claimed
`
`function.” Williamson, 792 F.3d 1339, 1351 (Fed. Cir. 2015).
`
`The claim itself identifies the claimed function: “allowing access to a
`
`repository of data by a plurality of clients over at least one communications link
`
`connected to said computer systems.” The ’983 patent identifies the relevant
`
`structure as “server computer 102 contains . . . the data access control (‘DAC’)
`
`process 106 of the present invention.” Id. at 4:60-67, FIGs. 1 and 2; see EX1002
`
`(Cohen Decl.) at ¶ 25.
`
`D. Claims 1-4, 6, and 7 Means-Plus-Function Constructions
`The preamble to challenged claim 1 recites “means for allowing access to a
`
`repository of data by a plurality of clients over at least one communications link
`
`connected to said computer systems, data access control means comprising...”
`
`EX1001 at 20:39–42. The remaining limitations in claim 1 and dependent claims
`
`2-8, only contain additional “means for” limitations that further define the claimed
`


`
`17 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`“data access control means” of claim 1. EX1002 (Cohen Decl.) at ¶ 26. Therefore,
`
`the “means for” limitations found claims 1-4, 6, and 7 all have the same
`
`corresponding structure as the claimed “data access control means”—namely,
`
`“server computer 102 contains . . . the data access control (‘DAC’) process 106 of
`
`the present invention.” Id. at 4:60–67, FIGs. 1 and 2.
`
`E. “means for organizing data into groups of one or more elements
`through a user interface based on criteria established by the
`designer of the repository” [claim 9]
`
`Challenged claim 9 recites “means for organizing data into groups of one or
`
`more elements through a user interface based on criteria established by the
`
`designer of the repository.” EX1001 at 22:52–54. This claim term should be
`
`construed as means-plus-function limitation because the surrounding claim
`
`language does not provide sufficient structure to perform the claimed function.
`
`EX1002 (Cohen Decl.) at ¶ 27. The claim identifies the claimed function:
`
`“organizing data into groups of one or more elements through a user interface
`
`based on criteria established by the designer of the repository.” The ’983 patent
`
`identifies the relevant structure as “reference tool 500,” which is “a process of the
`
`current invention that is executed by the designer as a standalone method. It is
`
`typically executed on a computer that is not the server 102 (Fig. 1).” Id. at 7:57–
`
`8:5, Fig. 5; see also id. at 8:6–67; EX1002 (Cohen Decl.) at ¶ 27
`


`
`18 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`
`F. Claims 9 and 10 Means Plus Function Constructions
`Claims 9 and 10 contain a number of means plus function limitations. Id. at
`
`22:53–25:8. These claim terms should be construed as means-plus-function
`
`limitations because the surrounding claim language does not provide sufficient
`
`structure to perform the claimed functions. EX1002 (Cohen Decl.) at ¶ 28. The
`
`structure disclosed in the specification for performing these claimed functions is
`
`the “server computer 102 [that] contains . . . the data access control (‘DAC’)
`
`process 106 of the present invention.” Id. at 4:60–67, FIGS. 1 and 2; EX1002
`
`(Cohen Decl.) at ¶ 28.
`
`VII. SPECIFIC GROUNDS FOR PETITION
`
`A. Ground 1: Claim 1 is rendered obvious over Shannon
`(EX1006) in view of He ’451 (EX1003)
`1. Shannon (EX1006)
`
`Shannon is directed to an “Access control of network data.” Shannon
`
`(EX1006) at Title. Shannon describes “An access control technique to limit access
`
`to information content such as available on the Internet.” Id. at Abstract. The
`
`system and methods disclosed in Shannon “provide[] access control not based only
`
`upon content, but rather, based primarily upon the identity of the computers or
`
`users making the requests.” Id. The access control disclosed in Shannon “may be
`
`determined by comparing client source information against a database of Uniform
`


`
`19 
`

`
`

`
`[PR20l6-01644, Petition for Inter Partes Review
`
`U.S. Patent 6,466,983 B1
`
`Resource Locators (URLs), IP addresses, or other resource identification data
`
`specifying the data requested by the client.” Id. As illustrated in Figure 1, Shannon
`
`discloses a network device 100 that acts as a “gateway,
`
`configured ...to monitor
`
`7’ G‘
`
`the data communications that pass between clients connected to the LAN 40 and
`
`servers connected to the WAN 45.” Id. at 625-9; Fig. 1.
`
`FIG. 1
`
`Shannon (EX1006) Fig. 1 (annotated).
`
`20
`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`
`2. He ’451 (EX1003)
`
`He ’451 is directed to a “Security System and Method for Network Element
`
`Access.” He ’451 (EX1003) at Title. He ’451 describes connecting a network
`
`security server to a network “to control access to the network elements and protect
`
`network resources and information.” Id. at Abstract. This network is illustrated in
`
`Figure 2.
`
`He ’451 (EX1003) at Fig. 2
`
`
`
`He ’451 discloses a “network security server (NSS; also called the master
`
`server)” 208 that includes “a network authentication 202, user credential control
`
`204 and network element access control 206.” Id. at 11:34–40.
`


`
`21 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`
`3. Motivation to combine He ’451 (EX1003) and Shannon (EX1006)
`
`Both He ’451 and Shannon are concerned with the unauthorized access to
`
`information over a network. He ‘451 (EX1003) at 1:30–33; Shannon (EX1006) at
`
`1:44–48. Both offer solutions that allow access to data from a repository based on
`
`the identity of the user. See e.g., He ’451 (EX1003) at 2:24–30; Shannon (EX1006)
`
`at 7:11–13, 7:21–34; EX1002 (Cohen Decl.) at ¶ 37. Additionally, both references
`
`provide a centralized access control component that separate from the user
`
`component and the server component to which the user component is requesting
`
`access. EX1002 (Cohen Decl.) at ¶ 37. This feature makes their systems more
`
`efficient and difficult to circumvent, and it also makes the two systems compatible
`
`with one another. Id.
`
`Shannon criticizes prior art access control systems that restrict access
`
`“primarily upon content” and do so “at either the server or the client,” and provides
`
`a solution that instead restricts access “based upon the requests made by whom, at
`
`what times, and according to different categories of subject matter.” EX1006 at
`
`4:26-31; EX1002 (Cohen Decl.) at ¶ 37. To do so, Shannon creates a system in
`
`which the identity of the user can by confirmed using passive information, like log-
`
`on identity and geographic location. See, e.g., Shannon (EX1006) at 6:4–8, 7:11–
`
`13, 7:21–34; EX1002 (Cohen Decl.) at ¶ 37.
`


`
`22 
`

`
`

`
`U.S. Patent 6,466,983 B1
`IPR2016-01644, Petition for Inter Partes Review
`
`Shannon provides a centralized “gateway,” located at an Internet service
`
`provider (ISP) for example, that “monito

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket