throbber

`
`
`
`
`
`
`
`June 6, 2017
`
`BY ELECTRONIC MAIL
`
`Mr. Wayne Stacy
`Baker Botts LLP
`101 California Street Suite 3070
`San Francisco, California 94111
`Wayne.Stacy@BakerBotts.com
`
`Re: Twilio v. TeleSign Corp., No. 5:16-CV-06925-LHK (N.D. Cal.)
`TeleSign’s Preliminary Claim Constructions and Extrinsic Evidence
`pursuant to Patent L.R. 4-2
`
`
`
`Daniel M. Staren
`
`2555 Grand Blvd.
`Kansas City, Missouri 64108
`t 816.474.6550
`f 816.421.5547
`
`Dear Wayne,
`
`In accordance with Patent Local Rule 4-2, TeleSign proposes the following
`preliminary constructions of the claim terms/phrases of U.S. Patent Nos.
`8,306,021; 8,837,465 and 8,755,376 (“asserted patents”) that were exchanged on
`May 15, 2017, attached as Exhibit A.
`
`Pursuant to Patent Local Rule 4-2(b), TeleSign may offer opinions from Dr. Seth
`Nielson in connection with the interpretation of claim terms. Dr. Nielson’s
`curriculum vita is attached as Exhibit B. Dr. Nielson may provide his testimony
`in the form of one or more declarations submitted with TeleSign’s claim
`construction briefing. Dr. Nielson, for example, is expected to provide opinions
`regarding:
`
`1.
`
`2.
`
`the construction of the disputed claim terms;
`
`his qualifications as an expert;
`
`the definition and qualifications of one of ordinary skill in the art in the
`2.
`context of the asserted patents;
`
`an overview of the technology in the asserted patents (including the
`3.
`background and context of the technology) at the time the patents were filed;
`
`regarding the terms “REST API” / “representational state transfer (REST)
`4.
`API” / “REST API request”: (a) a person of ordinary skill would be uncertain as to
`the meaning or scope of this term; and (b) the patent specification does not
`reasonably convey to a person of ordinary skill that the inventors had possession
`of the claimed subject matter, including the foregoing terms, as of the filing date
`of the patent;
`
`CHICAGO | DE NVER | HOUSTON | KA NSAS CITY | LONDON | MIAMI | ORA NGE COUNTY | PHILA DELP HIA | SAN F RANCI SCO | SEATTLE | TAMPA | W ASHINGTON, D.C
`
`
`
`
`
`
`TWILIO INC., EX 2008, Page 1
`
`

`

`
`
`
`
`
`
`
`
`
`
`regarding the term “substantially REST API,” a person of ordinary skill
`5.
`would be uncertain as to the meaning or scope of this term; and
`
`rebuttal opinions to constructions and opinions offered by Twilio or its
`6.
`experts.
`
`TeleSign reserves the right to supplement these preliminary constructions
`based on: Twilio’s proposed constructions; the meet and confer session
`required under Patent Local Rule 4-2(c); and the Local Rules.
`
`
`Best regards,
`
`
`
`
`Daniel M. Staren
`
`
`Cc: Counsel of Record, including jay.schiller@bakerbotts.com;
`jeremy.taylor@bakerbotts.com; sarah.guske@bakerbotts.com;
`DLTwilioTeleSignDCT@BakerBotts.com
`
`
`
`dmsu
`Encl.
`
`CHICAGO | DE NVER | HOUSTON | KA NSAS CITY | LONDON | MIAMI | ORA NGE COUNTY | PHILA DELP HIA | SAN F RANCI SCO | SEATTLE | TAMPA | W ASHINGTON, D.C.
`
`
`
`TWILIO INC., EX 2008, Page 2
`
`

`

`
`
`Exhibit A
`Exhibit A
`
`TWILIO INC., EX 2008, Page 3
`
`

`

`Exhibit A – TeleSign’s Preliminary Claim Constructions of U.S. Patent Nos. 8,306,021; 8,837,465, and 8,755,376 (“asserted patents”).
`
`
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`1.
`
`“[alter the] state
`of the call router”
`
`’021, Claim 1
`
`2.
`
`“API request”
`
`’376, Claim 1
`
`Proposed Construction
`
`a request sent to the call router
`“REST API”
`
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`TeleSign’s Proposed Terms
`alter the state of the “telephony
`The ’021 patent, at 8:7-28; 8:30-51; 8:52-
`session” by modifying call router
`59; 8:60-9:4; 9:4-9; 9:10-32; 9:32-40;
`resources
`9:40-46; 9:46-59; 10:28-37; 10:38-11:16;
`11:54-65; 15:46-47.
`
`
`
`The ’021 patent, at 8:7-28; 8:38-51; 8:52-
`54; 8:54-59; 8:60-9:4; 9:4-9; 9:14-16;
`9:40-46; 15:46-47.
`
`The ’376 patent, claims 1, 6, 12-16 and
`24-25.
`
`
`
`Extrinsic Evidence
`
`
`
`
`
`
`
`’021, Claim 1;
`’376, Claim 1
`
`No construction necessary.
`
`3.
`
`4.
`
`API resource
`URI” / “specified
`resource URI” /
`“addressable
`Uniform
`Resource
`Identifier (URI)”
`“application
`server” /
`“application
`
`’021, Claim 1;
`’465, Claim 1;
`’376, Claim 1
`
`a server that sends “API requests”
`and provides data processing logic
`to
`generate
`the
`recited
`
`The ’021 patent, at Figures 1-16; 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:16-3:33;
`3:44-53; 3:54-57; 3:57-4:10; 4:11-4:30;
`
`Patent Application No.
`Australian
`2009231676 Remarks, dated August 14,
`2013, at p. 2.
`
`
`1
`For brevity, only the independent claims are listed for TeleSign’s proposed terms.
`2
`The asserted patents share the same specification. For ease of reference, the citations herein correspond to the’021 patent specification.
`
`
`
`
`TWILIO INC., EX 2008, Page 4
`
`

`

`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`resource”
`
`“response”/“application
`response”
`
`Extrinsic Evidence
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`4:31-52; 4:52-57; 4:57-6:13; 6:14-6:37;
`6:38-47; 6:49-7:3 7:4-24; 7:24-8:5; 8:6-
`9:32; 9:33-11:15; 11:16-11:50; 11:51-
`12:64; 12:65-13:11; 13:12-14:14; and
`14:15-15:47.
`
`The ’021 patent, claims 1, 6, 10 and 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20
`and 22-26.
`
`The ’376 patent, claims 1-3, 6, 12-19 and
`24.
`
`TW_00010429-10430; TW_00010432,
`TW_00010465-10470; TW_00010472-
`TW10487, The ’021 patent application,
`dated 04-02-2009; The
`’021 patent
`application, dated 04-02-2009, at Figures
`1-16, Paras. 5-12, 14, 17, and claims 1-
`27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”).
`
`‘021 patent
`TW_11085-11093, The
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`
`
`
`
`TWILIO INC., EX 2008, Page 5
`
`

`

`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`5.
`
`6.
`
`“call router
`resources” / “API
`resources”
`“communicating
`with an
`application server
`to receive an
`application
`response”
`
`’021, Claim 1;
`’376, Claim 1
`
`’376, Claim 1
`
`No construction necessary.
`
`to an
`sending a “request”
`“application server” to receive an
`“application response” from the
`“application server”
`
`Extrinsic Evidence
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
`
`
`
`
`Remarks, dated May 12, 2014, European
`Application No. 09726505.2, page 3.
`
`The ‘021 patent, at Figures 1-16; 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:54-6:47;
`6:48-8:5; 8:11-15; 8:38-57; 9:1-19 and
`12:65-15:47.
`
`The ’021 patent, claims 1, 6, 10 and 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20
`and 22-26.
`
`The ’376 patent, claims 1-3, 6, 12-19 and
`24.
`
`TW_00010429-10430; TW_00010432,
`TW_00010465-10470; TW_00010472-
`TW10487, The ’021 patent application,
`dated 04-02-2009; The
`’021 patent
`
`
`
`
`TWILIO INC., EX 2008, Page 6
`
`

`

`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`7.
`
`“converting the
`application
`response into
`executable
`operations to
`process the
`telephony
`
`’376, Claim 1
`
`converting the “application
`response” from a format that may
`be handled with standard web
`servers and web applications into a
`format that may be handled by
`telephony equipment
`
`
`
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`application, dated 04-02-2009, at Figures
`1-16; Paras. 5-12, 14 and 17; and claims
`1-27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”).
`
`‘021 patent
`TW_11085-11093, The
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
`The ‘021 patent, at Figures 1-16; 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:54-6:47;
`6:48-8:5; 12:65-15:47; 2:60-67; 4:31-44;
`4:45-60; 4:63-5:1; 5:4-11; 5:11-26; 5:20-
`24; 5:34-46; 5:48-50; 6:28-30; 6:38-47;
`6:48-52; 6:62-63; 7:4-6; 8:11-15; 8:38-
`57; 9:1-19; 13:32-40; 13:29-37; 13:37-40;
`
`Extrinsic Evidence
`
`Remarks, dated May 12, 2014, European
`Application No. 09726505.2, page 3.
`
`TWILIO INC., EX 2008, Page 7
`
`

`

`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`session”
`
`Extrinsic Evidence
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`13:47-14:14; 14:15-28; 14:28-44; 14:51-
`54; 14:51-59; 14:44-15:13; and 15:46-47.
`
`The ’021 patent, claims 1, 6, 10 and 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20
`and 22-26.
`
`The ’376 patent, claims 1-3, 6, 12-19 and
`24.
`
`TW_00010429-10430; TW_00010432,
`TW_00010465-10470; TW_00010472-
`TW10487, The ’021 patent application,
`dated 04-02-2009; The
`’021 patent
`application, dated 04-02-2009, at Figures
`1-16; Paras. 5-12, 14 and 17; and claims
`1-27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”)
`
`‘021 patent
`TW_11085-11093, The
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`
`
`
`
`TWILIO INC., EX 2008, Page 8
`
`

`

`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`8.
`
`9.
`
`10.
`
`“creating at least
`one informational
`API resource”
`“internet
`connected
`system”
`“mapping”
`
`
`
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
`
`
`Extrinsic Evidence
`
`
`
`
`
`
`
`’376, Claim 1
`
`
`No construction necessary.
`
`’376, Claim 1
`
`No construction necessary.
`
`
`
`’021, Claim 1;
`’465, Claim 1
`
`assigning the initial URI to the
`“telephony session” to enable the
`“telephony
`session”
`to
`be
`converted into a format that may be
`handled with standard web servers
`and web applications
`
`The ’021 patent, at Figures 1-16, 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:54-6:47;
`12:65-15:47; 2:64-65, 4:31-44; 4:45-60;
`5:4-11; 5:11-26; 5:34-46; 5:48-50; 6:28-
`30; 8:11-15; 8:38-57; 9:1-19; 13:29-37;
`13:37-40; 13:47-14:14; 14:23-28; 14:51-
`54; and 14:51-59.
`
`The ’021 patent, claims 1, 6, 10, 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20,
`22-26.
`
`The ’376 patent, claims 1-3, 6, 12-19, 24.
`
`TW_00010429-10430; TW_00010432 ,
`TW_00010465-10470; TW_00010472-
`
`TWILIO INC., EX 2008, Page 9
`
`

`

`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`11.
`
`“media of the call
`router”
`
`’021, Claim 1
`
`a call router resource that stores
`recordings,
`text
`and
`call
`transcripts, binary-coded files, and
`other “media” for an “application
`server” to access
`
`
`
`
`Extrinsic Evidence
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`TW10487, The ’021 patent application,
`dated 04-02-2009; The
`’021 patent
`application, dated 04-02-2009, at Figures
`1-16; Paras. 5-12, 14 and 17; and claims
`1-27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”)
`
`‘021 patent
`TW_11085-11093, The
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at page 9.
`The ’021 patent, at 8:30-38; 11:66-12:4;
`12:4-6; 12:6-21; 12:46-47.
`
`
`
`TWILIO INC., EX 2008, Page 10
`
`

`

`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`12.
`13.
`
`“outside devices”
`“processing”
`telephony
`sessions /
`“processing” a
`telephony
`communication /
`“process” the
`telephony session
`
`’021, Claim 1
`’021, Claim 1;
`’465, Claim 1;
`’376, Claim 1
`
`No construction necessary.
`converting a server response into
`telephony actions or executable
`operations during a “telephony
`session”
`
`
`14.
`
`“receiving from
`the application
`server a response”
`/ “receiving a
`response” /
`“receive an
`
`’021, Claim 1;
`’465, Claim 1;
`’376, Claim 1
`
`“response”/
`a
`receiving
`“application response” from the
`“application server” regarding the
`next action to be taken
`
`
`
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`
`
`The ’021 patent, at Figures 1-16; 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:16-3:33;
`3:44-53; 3:54-57; 3:57-4:10; 4:11-4:30;
`4:31-52; 4:52-57; 4:57-6:13; 6:14-6:37;
`6:38-47; 6:49-7:3 7:4-24; 7:24-8:5; 8:6-
`9:32; 9:33-11:15; 11:16-11:50; 11:51-
`12:64; 12:65-13:11; 13:12-14:14; 14:15-
`15:47.
`
`The ’021 patent, claims 1-20.
`
`The ’465 patent, claims 1-26.
`
`The ’376 patent, claims 1-25.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
`The ’021 patent, at Figures 1-16 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 4:29-6:13;
`6:14-8:5; 12:65-15:47; 2:60-67; 5:20-24;
`6:38-47; 6:48-52; 6:62-63; 7:4-6; 8:11-
`15; 8:38-57; 9:1-19; 14:15-28; 14:28-44;
`14:44-15:13; and 15:46-47.
`
`Extrinsic Evidence
`
`
`Remarks, dated May 12, 2014, European
`Application No. 09726505.2, page 3.
`
`
`Remarks, dated May 12, 2014, European
`Application No. 09726505.2, p. 3.
`
`TWILIO INC., EX 2008, Page 11
`
`

`

`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`application
`response”
`
`Extrinsic Evidence
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`
`
`The ’021 patent, claims 1, 6, 10 and 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20
`and 22-26.
`
`The ’376 patent, claims 1-3, 6, 12-19 and
`24.
`
`TW_00010429-10430; TW_00010432 ,
`TW_00010465-10470;
`and
`TW_00010472-TW10487, The
`’021
`patent application, dated 04-02-2009; The
`’021 patent application, dated 04-02-
`2009, at Figures 1-16; Paras. 5-12, 14 and
`17; and claims 1-27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”)
`
`‘021 patent
`TW_11085-11093, The
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`
`
`
`
`TWILIO INC., EX 2008, Page 12
`
`

`

`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`15.
`
`“request”
`
`’021, Claim 1;
`’465, Claim 1
`
`communication
`a
`“response”
`/
`response”
`
`a
`seeking
`“application
`
`Extrinsic Evidence
`
`
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
`The ’021 patent, at Figures 1-16, 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:54-6:47;
`8:11-15; 8:38-57; 9:1-19; and 12:65-
`15:47.
`
`The ’021 patent, claims 1, 6, 10 and 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20
`and 22-26.
`
`The ’376 patent, claims 1-3, 6, 12-19, 24.
`
`TW_00010429-10430; TW_00010432 ,
`TW_00010465-10470; TW_00010472-
`TW10487, The ’021 patent application,
`dated 04-02-2009; The
`’021 patent
`application, dated 04-02-2009, at Figures
`1-16; Paras. 5-12, 14 and 17; and claims
`1-27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”).
`
`
`
`
`
`TWILIO INC., EX 2008, Page 13
`
`

`

`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`16.
`
`“response” /
`“application
`response”
`
`’021, Claim 1;
`’465, Claim 1;
`’376, Claim 1
`
`in
`a communication generated
`response
`to and based on a
`corresponding “request”
`
`Extrinsic Evidence
`
`Remarks, dated May 12, 2014, European
`Application No. 09726505.2, p. 3.
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`TW_11085-11093, The
`‘021 patent
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
`The ’021 patent, at Figures 1-16 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 4:29-6:13;
`6:14-8:5; 12:65-15:47.
`
`The ’021 patent, claims 1, 6, 10 and 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20
`and 22-26.
`
`The ’376 patent, claims 1, 13, 1-3, 6, 12-
`19 and 24.
`
`TW_00010429-10430; TW_00010432 ,
`TW_00010465-10470; TW_00010472-
`TW10487, The ’021 patent application,
`dated 04-02-2009; The
`’021 patent
`
`
`
`
`TWILIO INC., EX 2008, Page 14
`
`

`

`Extrinsic Evidence
`
`Roy Fielding's Dissertation "Architectural
`Styles and the Design of Network-based
`Software Architectures”, available at
`http://www.ics.uci.edu/~fielding/pubs/diss
`ertation/top.htm.
`
`Roy
`
`Fielding’s
`
`blog:
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`application, dated 04-02-2009, at Figures
`1-16; Paras. 5-12, 14, 17; and claims 1-
`27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”)
`
`‘021 patent
`TW_11085-11093, The
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
`The ’021 patent, at Figures 1-6; 1:63-
`2:23; 4:31-5:14; 5:15-26; 5:27-33; 5:34-
`46; 6:14-27; 6:28-37; 7:4-8:5; 8:6-8:15;
`8:15-20; 8:20-9:42; 9:42-46; 9:47-12:64;
`12:65-13:11; 13:32-43; 14:44-51.
`
`The ’021 patent, claims 1-3, 11 and 13.
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`’376, Claim 1
`(and ’021, Claim
`11)
`
`Indefinite
`
`Alternatively:
`
` A
`
` programmatic communication
`interface using a varying level of
`statelessness
`including cookies,
`
`17.
`
`“REST API” /
`“representational
`state transfer
`(REST) API” /
`“REST API
`request” /
`“substantially a
`
`
`
`
`TWILIO INC., EX 2008, Page 15
`
`

`

`Extrinsic Evidence
`
`http://roy.gbiv.com/untangled/2008/rest-apis-must-be-
`hypertext-driven.
`
`Goth, G, Critics Say Web Services Need a
`REST, IEEE Distributed Systems Online,
`vol. 5, no. 12, 2004.
`
`
`
`
`
`
`
`
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`
`
`The ’465 patent, claims 1 and 22.
`
`The ’376 patent, claims 1 and 24.
`
`TW_00012134-12140, The ‘376 patent
`application, Claims
`and Applicant
`Remarks Made in an Amendment, dated
`Aug. 09, 2013.
`
`
`2013
`July
`TW_00012144-12146,
`Applicant-Initiated Interview Summary.
`The ’021 patent, at 7:4-20 and 14:54-
`15:6.
`The ’465 patent, claims 9 and 10.
`
`
`
`The ’021 patent, at Figures 1-16; 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:16-3:33;
`3:44-53; 3:54-57; 3:57-4:10; 4:11-4:30;
`4:31-52; 4:52-57; 4:57-6:13; 6:14-6:37;
`6:38-47; 6:49-7:3 7:4-24; 7:24-8:5; 8:6-
`9:32; 9:33-11:15; 11:16-11:50; 11:51-
`12:64; 12:65-13:11; 13:12-14:14; 14:15-
`15:47.
`
`The ’021 patent, claims 1, 8-10, 13 and
`20.
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`Representational
`State Transfer
`(REST) API”
`
`session tracking, etc.
`
`’021, Claim 1;
`’465 Claim 1
`’465, Claim 1
`
`line-by-line
`
`a phone number or SIP address
`
`’376, Claim 1
`
`Indefinite
`
`’021, Claim 1;
`’465, Claim 1;
`’376, Claim 1
`
`Indefinite; or
`
`Alternatively:
`
` a
`
` back-and-forth exchange of
`telephony signals
`
`18.
`
`19.
`
`20.
`
`21.
`
`“sequential
`processing”
`“telephony
`endpoint”
`“telephony
`network”
`“telephony
`session” /
`“telephony voice
`session”
`
`
`
`
`TWILIO INC., EX 2008, Page 16
`
`

`

`No.
`
`Term
`
`Claim(s) No.1
`
`1.
`
`“telephony
`instructions”
`
`’021, Claim 1
`’465, Claim 1.
`
`Extrinsic Evidence
`
`Remarks, dated May 12, 2014, European
`Application No. 09726505.2, page 3.
`
`Proposed Construction
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`The ’465 patent, claims 1-11.
`
`The ’376 patent, claims 1-12, 15, 20-23
`and 24-25.
`Twilio’s Proposed Terms
`instructions in a format that may be
`The ‘021 patent, at Figures 1-16, 1:7-21;
`handled by telephony equipment
`1:63-2:23; 2:25-41; 2:46-3:15; 3:54-6:47;
`rather than standard web servers
`12:65-15:47; 2:64-65, 4:31-44; 4:45-60;
`and web applications
`5:4-11; 5:11-26; 5:34-46; 5:48-50; 6:28-
`30; 8:11-15; 8:38-57; 9:1-19; 13:29-37;
`13:37-40; 13:47-14:14; 14:23-28; 14:51-
`54; and 14:51-59.
`
`The ’021 patent, claims 1, 6, 10 and 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20
`and 22-26.
`
`The ’376 patent, claims 1-3, 6, 12-19 and
`24.
`
`TW_00010429-10430; TW_00010432,
`TW_00010465-10470;
`and
`TW_00010472-TW10487, The
`’021
`patent application, dated 04-02-2009; The
`’021 patent application, dated 04-02-
`2009, at Figures 1-16; Paras. 5-12, 14, 17;
`and claims 1-27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`
`
`
`
`TWILIO INC., EX 2008, Page 17
`
`

`

`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`2.
`
`“initiating a
`telephony
`session”
`
`’021, Claims 10
`and 12
`’465, Claim 13
`’376, Claims 1, 4,
`5 and 20-22.
`
`No construction necessary.
`
`Alternatively:
`
`Accepting an incoming message
`
`
`
`
`Extrinsic Evidence
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”).
`
`‘021 patent
`TW_11085-11093, The
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
` The ’021 patent, at Figures 1-16, 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:54-6:47;
`12:65-15:47; 2:64-65, 4:31-44; 4:45-60;
`5:4-11; 5:11-26; 5:34-46; 5:48-50; 6:28-
`30; 8:11-15; 8:38-57; 9:1-19; 13:29-37;
`13:37-40; 13:47-14:14; 14:23-28; 14:51-
`54; 14:51-59.
`
`The ’021 patent, claims 1, 8-10 and 13.
`
`The ’465 patent, claims 1, 12-13 and 24-
`26.
`
`
`
`
`TWILIO INC., EX 2008, Page 18
`
`

`

`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`3.
`
`“telephony
`endpoint”
`
`4.
`
`“URI”
`
`
`
`
`
`’465, Claims 1, 4,
`5, 9, 10 and 13
`’376, Claim 13.
`’021, Claims 1-3,
`10
`’465, Claim 1
`’376, Claims 1,
`13, 14 and 16.
`
`
`a phone number or SIP address
`
`
`No construction necessary.
`
`
`Alternatively:
`
`Uniform Resource Identifier
`
`
`5.
`
`6.
`
`“state
`information”
`“executed
`statelessly”
`
`’021, Claims 1-3
`’465, Claim 1.
`’465, Claim 22.
`
`No construction necessary.
`
`
`
`
`
`
`
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`The ’376 patent, claims 1, 3, 12 and 15.
`The 465 patent, claims 9 and 10.
`
`
`
`Extrinsic Evidence
`
`Patent Application No.
`The ’021 patent, at 2:58-65 and 3:54-58. Australian
`2009231676 Remarks, dated August 14,
`2013, at p. 2.
`
`
`
`
`
`
`
`
`
`
`
`
`
`TWILIO INC., EX 2008, Page 19
`
`

`

`
`
`Exhibit B
`Exhibit B
`
`TWILIO INC., EX 2008, Page 20
`
`

`

`
`
`Seth James Nielson’s Vita
`410.497.7384
`sethjn@cs.jhu.edu
`November 2016
`
`
`Academic Degrees
`2009
`
`Ph.D. Computer Science, Rice University, Houston, TX
`2004
`
`M.S. Computer Science, Brigham Young University, Provo, UT
`2000
`
`B.S. Computer Science, Brigham Young University, Provo, UT
`
`Academic Appointments
`
`9/2016-Present Director of Advanced Research Projects,
`
`Johns Hopkins University Information Security Institute
`
`
`
`
`1/2015-Present Adjunct Associate Research Scientist, Johns Hopkins University
`
`1/2014-12/2015 Lecturer, Johns Hopkins University
`
`2005-2008
`TA, Rice University
`
`2004
`
`TA, Brigham Young University
`
`1995-2000
`TA, Brigham Young University
`
`Academic Awards
`Brown Fellowship
`John and Eileen Tietze Fellowship
`
`
`Teaching
`Johns Hopkins University
`
`• Advanced Network Security (Spring 2017)
`• Network Security (Fall 2016)
`• Network Security (Spring 2016)
`• Network Security (Spring 2015)
`• Network Security (Spring 2014)
`
`
`
`Rice University
`
`• Data Structures and Algorithms (Spring 2008 Co-instructor)
`• Data Structures and Algorithms (2007 TA)
`• Artificial Intelligence (2006 TA)
`• Computer Systems Security (2005 TA)
`
`
`
`Brigham Young University
`
`• Computer Ethics (2004 TA)
`• Computer Networks (2000 TA)
`• Intro to C (1999 TA)
`• Intro to Assembly (1996 Head TA)
`• Intro to Computer Programming (1995-1996 TA)
`
`TWILIO INC., EX 2008, Page 21
`
`

`

`
`
`
`
`2
`
`Graduate Advising
`Capstones for Masters of Science in Security Informatics (Johns Hopkins)
`
`• Kevin Manzotti, Kashif Memon, Rahul Durgad, Replication of CryptoDrop (December 2016)
`• Harshneel More, Jingmiao Wang, Yuanqi Zhu, Detecting XSS attacks using BRO IDS (December
`2016)
`• Asmaa Aljohani, Gyan Namdhari, Yue ZhuFeasibility, Security and Privacy Analysis of EMVCo
`Payment Tokenization Technology for Identity Enabled Transactions (December 2016)
`• Richard Eaton, The Emperor Has No Friends: Identifying Botnet Customers and Mapping Out
`Botnets on Twitter (May 2015)
`• Jingru Chen, Yaning Liu, Yifan Yu, Zhiyue Zu, Investigating the Heartbleed Vulnerability (2015)
`• Kartik Thapar, Security Techniques for Developing iOS Applications (February 2015)
`• Jie Feng, Jianxiang Peng, Likai Zhang, De-anonymizing BitCoin (January 2014)
`
`
`
`Current Research Projects
`Co-investigator on a 3-year funded project to create an authoritative hub for instruction and
`guidance on practical cryptographic deployments, including identification of known vulnerabilities,
`best practices, and editorialized reviews of known conflicts
`
`Publications
`Refereed Publications
`
`Chanyang Shin, Prerit Chandok, Ran Liu, Seth James Nielson, Timothy Leschke, Potential
`Forensic Analysis of IoT Data: An Overview of Amazon Echo, Z-wave, and Home Router Data
`Extraction and Analysis. In Proceedings of IoT-SECFOR 2017: International Workshop on Security
`and Forensics of IoT, Exeter, UK, (To Appear).
`
`Seth James Nielson and Charles D. Knutson, Design Dysphasia and the Design Patterns
`Maintenance Cycle. Information & Software Technology, volume 48, number 8, pp. 660- 675,
`(August 2006)
`
`Seth James Nielson, Scott S. Crosby, and Dan S. Wallach, A Taxonomy of Rational Attacks. In
`Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS ’05), Ithica,
`New York, (February 2005)
`
`
`
`Rob Kunz, Seth Nielson, Mark Clement, Quinn Snell, Effective Bandwidth for Traffic Engineering,
`Proceedings of the IEEE Workshop on High Performance Switching and Routing (HPSR 2001),
`Dallas, TX, (May 2001)
`
`
`Theses
`
`
`
`
`PhD Thesis: Designing Incentives for Peer-to-Peer Systems (defended 10/2009)
`Master’s Thesis: OO++ Design Patterns, GOF Revisited (defended 8/2004)
`
`Technical Reports
`
`Seth James Nielson and Dan S. Wallach, The BitTorrent Anonymity Marketplace, arXiv Technical
`Report 1108.2718, (August 2011)
`
`TWILIO INC., EX 2008, Page 22
`
`

`

`
`
`
`
`3
`
`Seth James Nielson, Caleb E. Spare, and Dan S. Wallach, Building Better Incentives for
`Robustness in BitTorrent, arXiv Technical Report 1108.2716, (August 2011)
`
`
`Seth James Nielson, Seth J. Fogarty, and Dan S. Wallach, Attacks on Local Searching Tools, arXiv
`Technical Report 1108.2704 (Originally produced in December, 2004, available on arXiv as of
`August 2011)
`
`White Papers and Trade Publications
`
`Aviel D. Rubin, Seth J. Nielson, Christopher K. Monson, Evaluation of the MarkMonitor AntiPiracy
`System, Produced for the Center for Copyright Information (December 2013)
`
`Aviel D. Rubin, Seth J. Nielson, Sam Small, Christopher K. Monson, Guidelines for Source Code
`Review in Hi-Tech Litigation, Harbor Labs White Paper (September 2013)
`
`
`
`Patents
`Co-inventor: Orsini, R. 2014. Systems and methods for security data in motion. U.S. Patent
`8,745,372 filed November 24, 2010 and issued June 3, 2014.
`
`Co-inventor: Orsini, R. 2014. Systems and methods for security data in motion. U.S. Patent
`8,745,379 filed August 20, 2012 and issued June 3, 2014.
`
`Co-inventor: O’Hare, R. 2014. Systems and methods for security data. U.S. Patent 8,677,148 filed
`January 27, 2012 and issued March 18, 2014.
`
`
`Special Projects
`Development of a PROLOG style logic programming module for Python
`
`PLAYGROUND, a pedagogical framework for network security instruction available at
`http://bitbucket.org/jhusethjn/playground-base
`
`
`Industry Experience
`2016-Present
`Founder and Chief Scientist, Crimson Vista, Inc.
`Selected Projects:
`
`
`- Network Security Devices (2017): Reviewed and analyzed the source code for a major
`network security device manufacturer. Examined the source code, design
`documentation, and extensive technical materials related to SSL visibility, automatic
`malware sandboxing analysis, automated threat identification, and content
`categorization. Provided a technical tutorial to the court in addition to expert testimony.
`
`- VOIP/Telecommunications (2016): Reviewed and analyzed the source code for a major
`telecommunications software system. Examined the inner-mechanisms for establishing
`connections, transmitting video/voice/data over two different network architectures and
`across more than six different consumer products.
`
`
`TWILIO INC., EX 2008, Page 23
`
`

`

`4
`
`
`
`
`
`
`
`
`- Fraud Prevention Technologies (2016): Evaluated multiple patents related to detecting
`fraudulent registration based on an analysis of a telephone connection to the registrant.
`Compared the patents to prior art, and set forth my opinions in an expert declaration.
`
`- Financial Trading Software (2016): Reviewed two different automatic financial trading
`systems, including source code, to determine the extent to which one was derived from
`the other.
`
`- Configuration Software (2016): Reviewed two different software projects, including
`source code, that provide configuration/customization of products to customers.
`Evaluated the similarities and differences of the two, and set forth my opinions in an
`expert report.
`
`- Malware Analysis (2016): Analyzed suspicious executables for malicious behavior.
`Reverse-engineered binaries using IDA-PRO and also tested them dynamically in virtual
`environments.
`
`
`
`Principal, Harbor Labs
`
`
`Transitional Managing Partner, Ironwood Experts
`2015-2016
`
`Provided transitory guidance to consulting firm during leadership gap
`
`2011-2015
`Selected Projects:
`
`
`
`
`
`- Secure Cloud Storage System (2015): Evaluated for security robustness. Investigated
`attacks on the virtual machine appliance, attacks on the local network access, and
`attacks on the cloud data storage. Approach included analyzing the protocols for the
`data in motion and the data at rest. Used penetration testing tools including Metasploit.
`
`- Secure Gateway Software (2015): Evaluated for regulatory compliance issues related to
`HIPAA, FISMA, SOX, GLBA, NERC, ISO 27002.
`
`- Anti-Key-Logging Software (2015): Evaluated this software, written in C, C++,
`JavaScript, and other miscellaneous languages to determine changes in the product
`from 2007 to the present. Also assessed potential patent infringement and prior art
`relevancy.
`
`
`
`
`
`
`
`
`
`-
`
` TLS Protocol (2015): Evaluated the TLS protocol to determine differences between 1.0,
`1.1, and 1.2 variants. Also assessed potential patent infringement and prior art
`relevancy.
`
`- Domain Name Anti-Abuse Technologies (2015): Evaluated the design documents,
`technical specifications, and engineering tickets related to Afilias’ Anti-Abuse project.
`Evaluated the design, patents, and source code of a competitor accused of
`misappropriating trade secrets. Submitted an expert report to the court and expect to
`testify at trial later this year.
`
`- Cryptographically Certified Physical Measurements (2015): Evaluated a patent related to
`cryptographically signing a physical measurement, such a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket