`
`
`
`
`
`
`
`June 6, 2017
`
`BY ELECTRONIC MAIL
`
`Mr. Wayne Stacy
`Baker Botts LLP
`101 California Street Suite 3070
`San Francisco, California 94111
`Wayne.Stacy@BakerBotts.com
`
`Re: Twilio v. TeleSign Corp., No. 5:16-CV-06925-LHK (N.D. Cal.)
`TeleSign’s Preliminary Claim Constructions and Extrinsic Evidence
`pursuant to Patent L.R. 4-2
`
`
`
`Daniel M. Staren
`
`2555 Grand Blvd.
`Kansas City, Missouri 64108
`t 816.474.6550
`f 816.421.5547
`
`Dear Wayne,
`
`In accordance with Patent Local Rule 4-2, TeleSign proposes the following
`preliminary constructions of the claim terms/phrases of U.S. Patent Nos.
`8,306,021; 8,837,465 and 8,755,376 (“asserted patents”) that were exchanged on
`May 15, 2017, attached as Exhibit A.
`
`Pursuant to Patent Local Rule 4-2(b), TeleSign may offer opinions from Dr. Seth
`Nielson in connection with the interpretation of claim terms. Dr. Nielson’s
`curriculum vita is attached as Exhibit B. Dr. Nielson may provide his testimony
`in the form of one or more declarations submitted with TeleSign’s claim
`construction briefing. Dr. Nielson, for example, is expected to provide opinions
`regarding:
`
`1.
`
`2.
`
`the construction of the disputed claim terms;
`
`his qualifications as an expert;
`
`the definition and qualifications of one of ordinary skill in the art in the
`2.
`context of the asserted patents;
`
`an overview of the technology in the asserted patents (including the
`3.
`background and context of the technology) at the time the patents were filed;
`
`regarding the terms “REST API” / “representational state transfer (REST)
`4.
`API” / “REST API request”: (a) a person of ordinary skill would be uncertain as to
`the meaning or scope of this term; and (b) the patent specification does not
`reasonably convey to a person of ordinary skill that the inventors had possession
`of the claimed subject matter, including the foregoing terms, as of the filing date
`of the patent;
`
`CHICAGO | DE NVER | HOUSTON | KA NSAS CITY | LONDON | MIAMI | ORA NGE COUNTY | PHILA DELP HIA | SAN F RANCI SCO | SEATTLE | TAMPA | W ASHINGTON, D.C
`
`
`
`
`
`
`TWILIO INC., EX 2008, Page 1
`
`
`
`
`
`
`
`
`
`
`
`
`
`regarding the term “substantially REST API,” a person of ordinary skill
`5.
`would be uncertain as to the meaning or scope of this term; and
`
`rebuttal opinions to constructions and opinions offered by Twilio or its
`6.
`experts.
`
`TeleSign reserves the right to supplement these preliminary constructions
`based on: Twilio’s proposed constructions; the meet and confer session
`required under Patent Local Rule 4-2(c); and the Local Rules.
`
`
`Best regards,
`
`
`
`
`Daniel M. Staren
`
`
`Cc: Counsel of Record, including jay.schiller@bakerbotts.com;
`jeremy.taylor@bakerbotts.com; sarah.guske@bakerbotts.com;
`DLTwilioTeleSignDCT@BakerBotts.com
`
`
`
`dmsu
`Encl.
`
`CHICAGO | DE NVER | HOUSTON | KA NSAS CITY | LONDON | MIAMI | ORA NGE COUNTY | PHILA DELP HIA | SAN F RANCI SCO | SEATTLE | TAMPA | W ASHINGTON, D.C.
`
`
`
`TWILIO INC., EX 2008, Page 2
`
`
`
`
`
`Exhibit A
`Exhibit A
`
`TWILIO INC., EX 2008, Page 3
`
`
`
`Exhibit A – TeleSign’s Preliminary Claim Constructions of U.S. Patent Nos. 8,306,021; 8,837,465, and 8,755,376 (“asserted patents”).
`
`
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`1.
`
`“[alter the] state
`of the call router”
`
`’021, Claim 1
`
`2.
`
`“API request”
`
`’376, Claim 1
`
`Proposed Construction
`
`a request sent to the call router
`“REST API”
`
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`TeleSign’s Proposed Terms
`alter the state of the “telephony
`The ’021 patent, at 8:7-28; 8:30-51; 8:52-
`session” by modifying call router
`59; 8:60-9:4; 9:4-9; 9:10-32; 9:32-40;
`resources
`9:40-46; 9:46-59; 10:28-37; 10:38-11:16;
`11:54-65; 15:46-47.
`
`
`
`The ’021 patent, at 8:7-28; 8:38-51; 8:52-
`54; 8:54-59; 8:60-9:4; 9:4-9; 9:14-16;
`9:40-46; 15:46-47.
`
`The ’376 patent, claims 1, 6, 12-16 and
`24-25.
`
`
`
`Extrinsic Evidence
`
`
`
`
`
`
`
`’021, Claim 1;
`’376, Claim 1
`
`No construction necessary.
`
`3.
`
`4.
`
`API resource
`URI” / “specified
`resource URI” /
`“addressable
`Uniform
`Resource
`Identifier (URI)”
`“application
`server” /
`“application
`
`’021, Claim 1;
`’465, Claim 1;
`’376, Claim 1
`
`a server that sends “API requests”
`and provides data processing logic
`to
`generate
`the
`recited
`
`The ’021 patent, at Figures 1-16; 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:16-3:33;
`3:44-53; 3:54-57; 3:57-4:10; 4:11-4:30;
`
`Patent Application No.
`Australian
`2009231676 Remarks, dated August 14,
`2013, at p. 2.
`
`
`1
`For brevity, only the independent claims are listed for TeleSign’s proposed terms.
`2
`The asserted patents share the same specification. For ease of reference, the citations herein correspond to the’021 patent specification.
`
`
`
`
`TWILIO INC., EX 2008, Page 4
`
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`resource”
`
`“response”/“application
`response”
`
`Extrinsic Evidence
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`4:31-52; 4:52-57; 4:57-6:13; 6:14-6:37;
`6:38-47; 6:49-7:3 7:4-24; 7:24-8:5; 8:6-
`9:32; 9:33-11:15; 11:16-11:50; 11:51-
`12:64; 12:65-13:11; 13:12-14:14; and
`14:15-15:47.
`
`The ’021 patent, claims 1, 6, 10 and 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20
`and 22-26.
`
`The ’376 patent, claims 1-3, 6, 12-19 and
`24.
`
`TW_00010429-10430; TW_00010432,
`TW_00010465-10470; TW_00010472-
`TW10487, The ’021 patent application,
`dated 04-02-2009; The
`’021 patent
`application, dated 04-02-2009, at Figures
`1-16, Paras. 5-12, 14, 17, and claims 1-
`27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”).
`
`‘021 patent
`TW_11085-11093, The
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`
`
`
`
`TWILIO INC., EX 2008, Page 5
`
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`5.
`
`6.
`
`“call router
`resources” / “API
`resources”
`“communicating
`with an
`application server
`to receive an
`application
`response”
`
`’021, Claim 1;
`’376, Claim 1
`
`’376, Claim 1
`
`No construction necessary.
`
`to an
`sending a “request”
`“application server” to receive an
`“application response” from the
`“application server”
`
`Extrinsic Evidence
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
`
`
`
`
`Remarks, dated May 12, 2014, European
`Application No. 09726505.2, page 3.
`
`The ‘021 patent, at Figures 1-16; 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:54-6:47;
`6:48-8:5; 8:11-15; 8:38-57; 9:1-19 and
`12:65-15:47.
`
`The ’021 patent, claims 1, 6, 10 and 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20
`and 22-26.
`
`The ’376 patent, claims 1-3, 6, 12-19 and
`24.
`
`TW_00010429-10430; TW_00010432,
`TW_00010465-10470; TW_00010472-
`TW10487, The ’021 patent application,
`dated 04-02-2009; The
`’021 patent
`
`
`
`
`TWILIO INC., EX 2008, Page 6
`
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`7.
`
`“converting the
`application
`response into
`executable
`operations to
`process the
`telephony
`
`’376, Claim 1
`
`converting the “application
`response” from a format that may
`be handled with standard web
`servers and web applications into a
`format that may be handled by
`telephony equipment
`
`
`
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`application, dated 04-02-2009, at Figures
`1-16; Paras. 5-12, 14 and 17; and claims
`1-27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”).
`
`‘021 patent
`TW_11085-11093, The
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
`The ‘021 patent, at Figures 1-16; 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:54-6:47;
`6:48-8:5; 12:65-15:47; 2:60-67; 4:31-44;
`4:45-60; 4:63-5:1; 5:4-11; 5:11-26; 5:20-
`24; 5:34-46; 5:48-50; 6:28-30; 6:38-47;
`6:48-52; 6:62-63; 7:4-6; 8:11-15; 8:38-
`57; 9:1-19; 13:32-40; 13:29-37; 13:37-40;
`
`Extrinsic Evidence
`
`Remarks, dated May 12, 2014, European
`Application No. 09726505.2, page 3.
`
`TWILIO INC., EX 2008, Page 7
`
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`session”
`
`Extrinsic Evidence
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`13:47-14:14; 14:15-28; 14:28-44; 14:51-
`54; 14:51-59; 14:44-15:13; and 15:46-47.
`
`The ’021 patent, claims 1, 6, 10 and 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20
`and 22-26.
`
`The ’376 patent, claims 1-3, 6, 12-19 and
`24.
`
`TW_00010429-10430; TW_00010432,
`TW_00010465-10470; TW_00010472-
`TW10487, The ’021 patent application,
`dated 04-02-2009; The
`’021 patent
`application, dated 04-02-2009, at Figures
`1-16; Paras. 5-12, 14 and 17; and claims
`1-27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”)
`
`‘021 patent
`TW_11085-11093, The
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`
`
`
`
`TWILIO INC., EX 2008, Page 8
`
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`8.
`
`9.
`
`10.
`
`“creating at least
`one informational
`API resource”
`“internet
`connected
`system”
`“mapping”
`
`
`
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
`
`
`Extrinsic Evidence
`
`
`
`
`
`
`
`’376, Claim 1
`
`
`No construction necessary.
`
`’376, Claim 1
`
`No construction necessary.
`
`
`
`’021, Claim 1;
`’465, Claim 1
`
`assigning the initial URI to the
`“telephony session” to enable the
`“telephony
`session”
`to
`be
`converted into a format that may be
`handled with standard web servers
`and web applications
`
`The ’021 patent, at Figures 1-16, 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:54-6:47;
`12:65-15:47; 2:64-65, 4:31-44; 4:45-60;
`5:4-11; 5:11-26; 5:34-46; 5:48-50; 6:28-
`30; 8:11-15; 8:38-57; 9:1-19; 13:29-37;
`13:37-40; 13:47-14:14; 14:23-28; 14:51-
`54; and 14:51-59.
`
`The ’021 patent, claims 1, 6, 10, 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20,
`22-26.
`
`The ’376 patent, claims 1-3, 6, 12-19, 24.
`
`TW_00010429-10430; TW_00010432 ,
`TW_00010465-10470; TW_00010472-
`
`TWILIO INC., EX 2008, Page 9
`
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`11.
`
`“media of the call
`router”
`
`’021, Claim 1
`
`a call router resource that stores
`recordings,
`text
`and
`call
`transcripts, binary-coded files, and
`other “media” for an “application
`server” to access
`
`
`
`
`Extrinsic Evidence
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`TW10487, The ’021 patent application,
`dated 04-02-2009; The
`’021 patent
`application, dated 04-02-2009, at Figures
`1-16; Paras. 5-12, 14 and 17; and claims
`1-27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”)
`
`‘021 patent
`TW_11085-11093, The
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at page 9.
`The ’021 patent, at 8:30-38; 11:66-12:4;
`12:4-6; 12:6-21; 12:46-47.
`
`
`
`TWILIO INC., EX 2008, Page 10
`
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`12.
`13.
`
`“outside devices”
`“processing”
`telephony
`sessions /
`“processing” a
`telephony
`communication /
`“process” the
`telephony session
`
`’021, Claim 1
`’021, Claim 1;
`’465, Claim 1;
`’376, Claim 1
`
`No construction necessary.
`converting a server response into
`telephony actions or executable
`operations during a “telephony
`session”
`
`
`14.
`
`“receiving from
`the application
`server a response”
`/ “receiving a
`response” /
`“receive an
`
`’021, Claim 1;
`’465, Claim 1;
`’376, Claim 1
`
`“response”/
`a
`receiving
`“application response” from the
`“application server” regarding the
`next action to be taken
`
`
`
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`
`
`The ’021 patent, at Figures 1-16; 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:16-3:33;
`3:44-53; 3:54-57; 3:57-4:10; 4:11-4:30;
`4:31-52; 4:52-57; 4:57-6:13; 6:14-6:37;
`6:38-47; 6:49-7:3 7:4-24; 7:24-8:5; 8:6-
`9:32; 9:33-11:15; 11:16-11:50; 11:51-
`12:64; 12:65-13:11; 13:12-14:14; 14:15-
`15:47.
`
`The ’021 patent, claims 1-20.
`
`The ’465 patent, claims 1-26.
`
`The ’376 patent, claims 1-25.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
`The ’021 patent, at Figures 1-16 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 4:29-6:13;
`6:14-8:5; 12:65-15:47; 2:60-67; 5:20-24;
`6:38-47; 6:48-52; 6:62-63; 7:4-6; 8:11-
`15; 8:38-57; 9:1-19; 14:15-28; 14:28-44;
`14:44-15:13; and 15:46-47.
`
`Extrinsic Evidence
`
`
`Remarks, dated May 12, 2014, European
`Application No. 09726505.2, page 3.
`
`
`Remarks, dated May 12, 2014, European
`Application No. 09726505.2, p. 3.
`
`TWILIO INC., EX 2008, Page 11
`
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`application
`response”
`
`Extrinsic Evidence
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`
`
`The ’021 patent, claims 1, 6, 10 and 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20
`and 22-26.
`
`The ’376 patent, claims 1-3, 6, 12-19 and
`24.
`
`TW_00010429-10430; TW_00010432 ,
`TW_00010465-10470;
`and
`TW_00010472-TW10487, The
`’021
`patent application, dated 04-02-2009; The
`’021 patent application, dated 04-02-
`2009, at Figures 1-16; Paras. 5-12, 14 and
`17; and claims 1-27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”)
`
`‘021 patent
`TW_11085-11093, The
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`
`
`
`
`TWILIO INC., EX 2008, Page 12
`
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`15.
`
`“request”
`
`’021, Claim 1;
`’465, Claim 1
`
`communication
`a
`“response”
`/
`response”
`
`a
`seeking
`“application
`
`Extrinsic Evidence
`
`
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
`The ’021 patent, at Figures 1-16, 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:54-6:47;
`8:11-15; 8:38-57; 9:1-19; and 12:65-
`15:47.
`
`The ’021 patent, claims 1, 6, 10 and 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20
`and 22-26.
`
`The ’376 patent, claims 1-3, 6, 12-19, 24.
`
`TW_00010429-10430; TW_00010432 ,
`TW_00010465-10470; TW_00010472-
`TW10487, The ’021 patent application,
`dated 04-02-2009; The
`’021 patent
`application, dated 04-02-2009, at Figures
`1-16; Paras. 5-12, 14 and 17; and claims
`1-27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”).
`
`
`
`
`
`TWILIO INC., EX 2008, Page 13
`
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`16.
`
`“response” /
`“application
`response”
`
`’021, Claim 1;
`’465, Claim 1;
`’376, Claim 1
`
`in
`a communication generated
`response
`to and based on a
`corresponding “request”
`
`Extrinsic Evidence
`
`Remarks, dated May 12, 2014, European
`Application No. 09726505.2, p. 3.
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`TW_11085-11093, The
`‘021 patent
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
`The ’021 patent, at Figures 1-16 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 4:29-6:13;
`6:14-8:5; 12:65-15:47.
`
`The ’021 patent, claims 1, 6, 10 and 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20
`and 22-26.
`
`The ’376 patent, claims 1, 13, 1-3, 6, 12-
`19 and 24.
`
`TW_00010429-10430; TW_00010432 ,
`TW_00010465-10470; TW_00010472-
`TW10487, The ’021 patent application,
`dated 04-02-2009; The
`’021 patent
`
`
`
`
`TWILIO INC., EX 2008, Page 14
`
`
`
`Extrinsic Evidence
`
`Roy Fielding's Dissertation "Architectural
`Styles and the Design of Network-based
`Software Architectures”, available at
`http://www.ics.uci.edu/~fielding/pubs/diss
`ertation/top.htm.
`
`Roy
`
`Fielding’s
`
`blog:
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`application, dated 04-02-2009, at Figures
`1-16; Paras. 5-12, 14, 17; and claims 1-
`27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”)
`
`‘021 patent
`TW_11085-11093, The
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
`The ’021 patent, at Figures 1-6; 1:63-
`2:23; 4:31-5:14; 5:15-26; 5:27-33; 5:34-
`46; 6:14-27; 6:28-37; 7:4-8:5; 8:6-8:15;
`8:15-20; 8:20-9:42; 9:42-46; 9:47-12:64;
`12:65-13:11; 13:32-43; 14:44-51.
`
`The ’021 patent, claims 1-3, 11 and 13.
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`’376, Claim 1
`(and ’021, Claim
`11)
`
`Indefinite
`
`Alternatively:
`
` A
`
` programmatic communication
`interface using a varying level of
`statelessness
`including cookies,
`
`17.
`
`“REST API” /
`“representational
`state transfer
`(REST) API” /
`“REST API
`request” /
`“substantially a
`
`
`
`
`TWILIO INC., EX 2008, Page 15
`
`
`
`Extrinsic Evidence
`
`http://roy.gbiv.com/untangled/2008/rest-apis-must-be-
`hypertext-driven.
`
`Goth, G, Critics Say Web Services Need a
`REST, IEEE Distributed Systems Online,
`vol. 5, no. 12, 2004.
`
`
`
`
`
`
`
`
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`
`
`The ’465 patent, claims 1 and 22.
`
`The ’376 patent, claims 1 and 24.
`
`TW_00012134-12140, The ‘376 patent
`application, Claims
`and Applicant
`Remarks Made in an Amendment, dated
`Aug. 09, 2013.
`
`
`2013
`July
`TW_00012144-12146,
`Applicant-Initiated Interview Summary.
`The ’021 patent, at 7:4-20 and 14:54-
`15:6.
`The ’465 patent, claims 9 and 10.
`
`
`
`The ’021 patent, at Figures 1-16; 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:16-3:33;
`3:44-53; 3:54-57; 3:57-4:10; 4:11-4:30;
`4:31-52; 4:52-57; 4:57-6:13; 6:14-6:37;
`6:38-47; 6:49-7:3 7:4-24; 7:24-8:5; 8:6-
`9:32; 9:33-11:15; 11:16-11:50; 11:51-
`12:64; 12:65-13:11; 13:12-14:14; 14:15-
`15:47.
`
`The ’021 patent, claims 1, 8-10, 13 and
`20.
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`Representational
`State Transfer
`(REST) API”
`
`session tracking, etc.
`
`’021, Claim 1;
`’465 Claim 1
`’465, Claim 1
`
`line-by-line
`
`a phone number or SIP address
`
`’376, Claim 1
`
`Indefinite
`
`’021, Claim 1;
`’465, Claim 1;
`’376, Claim 1
`
`Indefinite; or
`
`Alternatively:
`
` a
`
` back-and-forth exchange of
`telephony signals
`
`18.
`
`19.
`
`20.
`
`21.
`
`“sequential
`processing”
`“telephony
`endpoint”
`“telephony
`network”
`“telephony
`session” /
`“telephony voice
`session”
`
`
`
`
`TWILIO INC., EX 2008, Page 16
`
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`1.
`
`“telephony
`instructions”
`
`’021, Claim 1
`’465, Claim 1.
`
`Extrinsic Evidence
`
`Remarks, dated May 12, 2014, European
`Application No. 09726505.2, page 3.
`
`Proposed Construction
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`The ’465 patent, claims 1-11.
`
`The ’376 patent, claims 1-12, 15, 20-23
`and 24-25.
`Twilio’s Proposed Terms
`instructions in a format that may be
`The ‘021 patent, at Figures 1-16, 1:7-21;
`handled by telephony equipment
`1:63-2:23; 2:25-41; 2:46-3:15; 3:54-6:47;
`rather than standard web servers
`12:65-15:47; 2:64-65, 4:31-44; 4:45-60;
`and web applications
`5:4-11; 5:11-26; 5:34-46; 5:48-50; 6:28-
`30; 8:11-15; 8:38-57; 9:1-19; 13:29-37;
`13:37-40; 13:47-14:14; 14:23-28; 14:51-
`54; and 14:51-59.
`
`The ’021 patent, claims 1, 6, 10 and 13.
`
`The ’465 patent, claims 1, 13, 15, 18-20
`and 22-26.
`
`The ’376 patent, claims 1-3, 6, 12-19 and
`24.
`
`TW_00010429-10430; TW_00010432,
`TW_00010465-10470;
`and
`TW_00010472-TW10487, The
`’021
`patent application, dated 04-02-2009; The
`’021 patent application, dated 04-02-
`2009, at Figures 1-16; Paras. 5-12, 14, 17;
`and claims 1-27.
`
`TW_00011021-11033, The ’021 patent
`application, Non-final Rejection, dated
`
`
`
`
`TWILIO INC., EX 2008, Page 17
`
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`2.
`
`“initiating a
`telephony
`session”
`
`’021, Claims 10
`and 12
`’465, Claim 13
`’376, Claims 1, 4,
`5 and 20-22.
`
`No construction necessary.
`
`Alternatively:
`
`Accepting an incoming message
`
`
`
`
`Extrinsic Evidence
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`04-26-2012, at p. 11 (“Allowable Subject
`Matter”).
`
`‘021 patent
`TW_11085-11093, The
`application, Claims
`and Applicant
`Arguments/Remarks Made
`in
`an
`Amendment, both dated 06-19-2012, at
`pp. 2-8.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at pp. 9, 11.
`
`TW_00013235-13246, August 12, 2013
`Amendment and Response
`to Office
`Action dated 13-May-2013, ’465 Patent,
`at p. 9.
` The ’021 patent, at Figures 1-16, 1:7-21;
`1:63-2:23; 2:25-41; 2:46-3:15; 3:54-6:47;
`12:65-15:47; 2:64-65, 4:31-44; 4:45-60;
`5:4-11; 5:11-26; 5:34-46; 5:48-50; 6:28-
`30; 8:11-15; 8:38-57; 9:1-19; 13:29-37;
`13:37-40; 13:47-14:14; 14:23-28; 14:51-
`54; 14:51-59.
`
`The ’021 patent, claims 1, 8-10 and 13.
`
`The ’465 patent, claims 1, 12-13 and 24-
`26.
`
`
`
`
`TWILIO INC., EX 2008, Page 18
`
`
`
`No.
`
`Term
`
`Claim(s) No.1
`
`Proposed Construction
`
`3.
`
`“telephony
`endpoint”
`
`4.
`
`“URI”
`
`
`
`
`
`’465, Claims 1, 4,
`5, 9, 10 and 13
`’376, Claim 13.
`’021, Claims 1-3,
`10
`’465, Claim 1
`’376, Claims 1,
`13, 14 and 16.
`
`
`a phone number or SIP address
`
`
`No construction necessary.
`
`
`Alternatively:
`
`Uniform Resource Identifier
`
`
`5.
`
`6.
`
`“state
`information”
`“executed
`statelessly”
`
`’021, Claims 1-3
`’465, Claim 1.
`’465, Claim 22.
`
`No construction necessary.
`
`
`
`
`
`
`
`
`Intrinsic Evidence (Specification2 and
`Prosecution History)
`The ’376 patent, claims 1, 3, 12 and 15.
`The 465 patent, claims 9 and 10.
`
`
`
`Extrinsic Evidence
`
`Patent Application No.
`The ’021 patent, at 2:58-65 and 3:54-58. Australian
`2009231676 Remarks, dated August 14,
`2013, at p. 2.
`
`
`
`
`
`
`
`
`
`
`
`
`
`TWILIO INC., EX 2008, Page 19
`
`
`
`
`
`Exhibit B
`Exhibit B
`
`TWILIO INC., EX 2008, Page 20
`
`
`
`
`
`Seth James Nielson’s Vita
`410.497.7384
`sethjn@cs.jhu.edu
`November 2016
`
`
`Academic Degrees
`2009
`
`Ph.D. Computer Science, Rice University, Houston, TX
`2004
`
`M.S. Computer Science, Brigham Young University, Provo, UT
`2000
`
`B.S. Computer Science, Brigham Young University, Provo, UT
`
`Academic Appointments
`
`9/2016-Present Director of Advanced Research Projects,
`
`Johns Hopkins University Information Security Institute
`
`
`
`
`1/2015-Present Adjunct Associate Research Scientist, Johns Hopkins University
`
`1/2014-12/2015 Lecturer, Johns Hopkins University
`
`2005-2008
`TA, Rice University
`
`2004
`
`TA, Brigham Young University
`
`1995-2000
`TA, Brigham Young University
`
`Academic Awards
`Brown Fellowship
`John and Eileen Tietze Fellowship
`
`
`Teaching
`Johns Hopkins University
`
`• Advanced Network Security (Spring 2017)
`• Network Security (Fall 2016)
`• Network Security (Spring 2016)
`• Network Security (Spring 2015)
`• Network Security (Spring 2014)
`
`
`
`Rice University
`
`• Data Structures and Algorithms (Spring 2008 Co-instructor)
`• Data Structures and Algorithms (2007 TA)
`• Artificial Intelligence (2006 TA)
`• Computer Systems Security (2005 TA)
`
`
`
`Brigham Young University
`
`• Computer Ethics (2004 TA)
`• Computer Networks (2000 TA)
`• Intro to C (1999 TA)
`• Intro to Assembly (1996 Head TA)
`• Intro to Computer Programming (1995-1996 TA)
`
`TWILIO INC., EX 2008, Page 21
`
`
`
`
`
`
`
`2
`
`Graduate Advising
`Capstones for Masters of Science in Security Informatics (Johns Hopkins)
`
`• Kevin Manzotti, Kashif Memon, Rahul Durgad, Replication of CryptoDrop (December 2016)
`• Harshneel More, Jingmiao Wang, Yuanqi Zhu, Detecting XSS attacks using BRO IDS (December
`2016)
`• Asmaa Aljohani, Gyan Namdhari, Yue ZhuFeasibility, Security and Privacy Analysis of EMVCo
`Payment Tokenization Technology for Identity Enabled Transactions (December 2016)
`• Richard Eaton, The Emperor Has No Friends: Identifying Botnet Customers and Mapping Out
`Botnets on Twitter (May 2015)
`• Jingru Chen, Yaning Liu, Yifan Yu, Zhiyue Zu, Investigating the Heartbleed Vulnerability (2015)
`• Kartik Thapar, Security Techniques for Developing iOS Applications (February 2015)
`• Jie Feng, Jianxiang Peng, Likai Zhang, De-anonymizing BitCoin (January 2014)
`
`
`
`Current Research Projects
`Co-investigator on a 3-year funded project to create an authoritative hub for instruction and
`guidance on practical cryptographic deployments, including identification of known vulnerabilities,
`best practices, and editorialized reviews of known conflicts
`
`Publications
`Refereed Publications
`
`Chanyang Shin, Prerit Chandok, Ran Liu, Seth James Nielson, Timothy Leschke, Potential
`Forensic Analysis of IoT Data: An Overview of Amazon Echo, Z-wave, and Home Router Data
`Extraction and Analysis. In Proceedings of IoT-SECFOR 2017: International Workshop on Security
`and Forensics of IoT, Exeter, UK, (To Appear).
`
`Seth James Nielson and Charles D. Knutson, Design Dysphasia and the Design Patterns
`Maintenance Cycle. Information & Software Technology, volume 48, number 8, pp. 660- 675,
`(August 2006)
`
`Seth James Nielson, Scott S. Crosby, and Dan S. Wallach, A Taxonomy of Rational Attacks. In
`Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS ’05), Ithica,
`New York, (February 2005)
`
`
`
`Rob Kunz, Seth Nielson, Mark Clement, Quinn Snell, Effective Bandwidth for Traffic Engineering,
`Proceedings of the IEEE Workshop on High Performance Switching and Routing (HPSR 2001),
`Dallas, TX, (May 2001)
`
`
`Theses
`
`
`
`
`PhD Thesis: Designing Incentives for Peer-to-Peer Systems (defended 10/2009)
`Master’s Thesis: OO++ Design Patterns, GOF Revisited (defended 8/2004)
`
`Technical Reports
`
`Seth James Nielson and Dan S. Wallach, The BitTorrent Anonymity Marketplace, arXiv Technical
`Report 1108.2718, (August 2011)
`
`TWILIO INC., EX 2008, Page 22
`
`
`
`
`
`
`
`3
`
`Seth James Nielson, Caleb E. Spare, and Dan S. Wallach, Building Better Incentives for
`Robustness in BitTorrent, arXiv Technical Report 1108.2716, (August 2011)
`
`
`Seth James Nielson, Seth J. Fogarty, and Dan S. Wallach, Attacks on Local Searching Tools, arXiv
`Technical Report 1108.2704 (Originally produced in December, 2004, available on arXiv as of
`August 2011)
`
`White Papers and Trade Publications
`
`Aviel D. Rubin, Seth J. Nielson, Christopher K. Monson, Evaluation of the MarkMonitor AntiPiracy
`System, Produced for the Center for Copyright Information (December 2013)
`
`Aviel D. Rubin, Seth J. Nielson, Sam Small, Christopher K. Monson, Guidelines for Source Code
`Review in Hi-Tech Litigation, Harbor Labs White Paper (September 2013)
`
`
`
`Patents
`Co-inventor: Orsini, R. 2014. Systems and methods for security data in motion. U.S. Patent
`8,745,372 filed November 24, 2010 and issued June 3, 2014.
`
`Co-inventor: Orsini, R. 2014. Systems and methods for security data in motion. U.S. Patent
`8,745,379 filed August 20, 2012 and issued June 3, 2014.
`
`Co-inventor: O’Hare, R. 2014. Systems and methods for security data. U.S. Patent 8,677,148 filed
`January 27, 2012 and issued March 18, 2014.
`
`
`Special Projects
`Development of a PROLOG style logic programming module for Python
`
`PLAYGROUND, a pedagogical framework for network security instruction available at
`http://bitbucket.org/jhusethjn/playground-base
`
`
`Industry Experience
`2016-Present
`Founder and Chief Scientist, Crimson Vista, Inc.
`Selected Projects:
`
`
`- Network Security Devices (2017): Reviewed and analyzed the source code for a major
`network security device manufacturer. Examined the source code, design
`documentation, and extensive technical materials related to SSL visibility, automatic
`malware sandboxing analysis, automated threat identification, and content
`categorization. Provided a technical tutorial to the court in addition to expert testimony.
`
`- VOIP/Telecommunications (2016): Reviewed and analyzed the source code for a major
`telecommunications software system. Examined the inner-mechanisms for establishing
`connections, transmitting video/voice/data over two different network architectures and
`across more than six different consumer products.
`
`
`TWILIO INC., EX 2008, Page 23
`
`
`
`4
`
`
`
`
`
`
`
`
`- Fraud Prevention Technologies (2016): Evaluated multiple patents related to detecting
`fraudulent registration based on an analysis of a telephone connection to the registrant.
`Compared the patents to prior art, and set forth my opinions in an expert declaration.
`
`- Financial Trading Software (2016): Reviewed two different automatic financial trading
`systems, including source code, to determine the extent to which one was derived from
`the other.
`
`- Configuration Software (2016): Reviewed two different software projects, including
`source code, that provide configuration/customization of products to customers.
`Evaluated the similarities and differences of the two, and set forth my opinions in an
`expert report.
`
`- Malware Analysis (2016): Analyzed suspicious executables for malicious behavior.
`Reverse-engineered binaries using IDA-PRO and also tested them dynamically in virtual
`environments.
`
`
`
`Principal, Harbor Labs
`
`
`Transitional Managing Partner, Ironwood Experts
`2015-2016
`
`Provided transitory guidance to consulting firm during leadership gap
`
`2011-2015
`Selected Projects:
`
`
`
`
`
`- Secure Cloud Storage System (2015): Evaluated for security robustness. Investigated
`attacks on the virtual machine appliance, attacks on the local network access, and
`attacks on the cloud data storage. Approach included analyzing the protocols for the
`data in motion and the data at rest. Used penetration testing tools including Metasploit.
`
`- Secure Gateway Software (2015): Evaluated for regulatory compliance issues related to
`HIPAA, FISMA, SOX, GLBA, NERC, ISO 27002.
`
`- Anti-Key-Logging Software (2015): Evaluated this software, written in C, C++,
`JavaScript, and other miscellaneous languages to determine changes in the product
`from 2007 to the present. Also assessed potential patent infringement and prior art
`relevancy.
`
`
`
`
`
`
`
`
`
`-
`
` TLS Protocol (2015): Evaluated the TLS protocol to determine differences between 1.0,
`1.1, and 1.2 variants. Also assessed potential patent infringement and prior art
`relevancy.
`
`- Domain Name Anti-Abuse Technologies (2015): Evaluated the design documents,
`technical specifications, and engineering tickets related to Afilias’ Anti-Abuse project.
`Evaluated the design, patents, and source code of a competitor accused of
`misappropriating trade secrets. Submitted an expert report to the court and expect to
`testify at trial later this year.
`
`- Cryptographically Certified Physical Measurements (2015): Evaluated a patent related to
`cryptographically signing a physical measurement, such a