throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`VMware, Inc.
`Petitioner,
`
`v.
`
`Intellectual Ventures I LLC,
`Patent Owner.
`
`
`
`Case No. IPR2020-00470
`U.S. Patent No. 7,949,752
`
`
`
`PETITION FOR INTER PARTES REVIEW OF CLAIMS
`1–4, 6, 9–11, 13–14, and 22–26 OF U.S. PATENT NO. 7,949,752
`
`
`
`
`
`
`
`

`

`
`
`TABLE OF CONTENTS
`
`Table of Contents ...................................................................................................... ii
`Petitioner’s Exhibit List ........................................................................................... vi
`I.
`Introduction ........................................................................................................ 1
`II. VMware Has Standing and the ’752 Patent is Eligible for Inter Partes
`Review........................................................................................................................ 1
`III. Background ........................................................................................................ 1
`IV. The ’752 Patent .................................................................................................. 2
`A. Specification................................................................................................... 2
`B. Prosecution History ........................................................................................ 7
`C. Effective Filing Date and Date of Invention ................................................11
`D. Level of Ordinary Skill in the Art ................................................................12
`V. Claim Construction ..........................................................................................12
`A. “Means” limitations .....................................................................................14
`B. “Service” and “Service resource” ................................................................15
`C. “Agent” ........................................................................................................16
`D. “URL defining a type of event and identifying the network-based agent” .17
`E.
`“Consumed” .................................................................................................18
`F.
`“Exhausted” .................................................................................................18
`G. “Event Handler” ...........................................................................................20
`H. “Service wrapper” ........................................................................................20
`VI. Precise Relief Requested ..................................................................................21
`A. Proposed Grounds and Prior Art ..................................................................21
`B. The Proposed Grounds Are Not Cumulative or Redundant. .......................23
`VII. Detailed Explanation of Grounds for Institution..............................................24
`A. Ground 1: Chow Rendered Claims 1–4, 9, 13–14, 22, and 24–26 Obvious.
`
`24
`1. Summary of Chow ....................................................................................24
`2. Claim 1 .....................................................................................................28
`a. Preamble ................................................................................................29
`b. “Means for receiving…” .......................................................................29
`ii
`
`
`
`

`

`
`
`
`
`c. “Means for invoking…” ........................................................................30
`d. “Means … for using…” ........................................................................33
`e. “Means for communicating…” .............................................................35
`3. Claim 2 .....................................................................................................36
`4. Claim 3 .....................................................................................................37
`5. Claim 4 .....................................................................................................38
`6. Claim 9 .....................................................................................................39
`a. Preamble ................................................................................................40
`b. “Processor” ............................................................................................40
`c. “Memory storing instructions” .............................................................40
`7. Claim 13 ...................................................................................................42
`8. Claim 14 ...................................................................................................43
`a.
`Identifying .............................................................................................44
`b. Determining...........................................................................................44
`9. Claim 22 ...................................................................................................45
`10. Claim 24 ...................................................................................................46
`a. Preamble ................................................................................................46
`b. “Receiving…” .......................................................................................47
`c. “Invoking…” .........................................................................................47
`d. “Communicating…” .............................................................................48
`11. Claim 25 ...................................................................................................48
`12. Claim 26 ...................................................................................................50
`B. Ground 2: Chow and Bauer Rendered Claims 6, 10, 11, and 23 Obvious. .51
`1. Summary of Chow ....................................................................................51
`2. Summary of Bauer ....................................................................................51
`3. A POSITA would have combined Chow and Bauer ................................52
`4. Claim 6 .....................................................................................................53
`5. Claim 10 ...................................................................................................54
`6. Claim 11 ...................................................................................................55
`7. Claim 23 ...................................................................................................55
`
`iii
`
`

`

`
`
`C. Ground 3: Chow and White Rendered Claims 1–4, 9, 13–14, 22, and 24–26
`Obvious. ...............................................................................................................56
`1. Summary of Chow ....................................................................................57
`2. Summary of White ...................................................................................57
`3. A POSITA would have combined Chow and White................................58
`4. Claims 1–4, 9, 13–14, 22, and 24–26 .......................................................59
`D. Ground 4: Chow, Bauer, and White Rendered Claims 6, 10, 11, and 23
`Obvious. ...............................................................................................................60
`1. Summary of Chow ....................................................................................60
`2. Summary of Bauer ....................................................................................60
`3. Summary of White ...................................................................................60
`4. A POSITA would have combined Chow, Bauer, and White ...................61
`5. Claims 6, 10, 11, and 23 ...........................................................................61
`E. Secondary considerations .............................................................................61
`VIII. Mandatory Notices .......................................................................................62
`A. Real Parties-in-Interest .................................................................................62
`B. Related Proceedings .....................................................................................62
`C. Lead and backup counsel .............................................................................63
`D. Electronic Service ........................................................................................63
`IX. Institution of This Inter Partes Review Would Be Equitable. .........................63
`X. Fees ...................................................................................................................65
`XI. Conclusion ........................................................................................................65
`
`
`
`
`
`iv
`
`

`

`
`
`Cases
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cuozzo Speed Techs., LLC v. Lee,
`136 S. Ct. 2131 (2016) ........................................................................................ 16
`
`Gen. Plastic Indus. Co., Ltd. v. Canon Kabushiki Kaisha,
`No. IPR2016-01357, 2017 WL 3917706 (P.T.A.B. Sept. 6, 2017) ................... 64
`
`NHK Spring Co., Ltd. v. Intri-Plex Technologies, Inc.
`IPR2018-00752, Paper No. 8, 19–20 (P.T.A.B. Sep. 12, 2018) ......................... 64
`
`Philips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) .......................................................................... 19
`
`Verizon Services Corp. v. Vonage Holdings Corp.,
`503 F.3d 1295 (Fed. Cir. 2007) .......................................................................... 19
`
`Statutes
`
`35 U.S.C. § 102 ........................................................................................................ 23
`
`35 U.S.C. § 103 .................................................................................................passim
`
`35 U.S.C. § 112 ........................................................................................................ 14
`
`Other Authorities
`
`83 FED. REG. 51340 (Oct. 11, 2018) ........................................................................ 12
`
`Rule 42.104(a) ............................................................................................................ 1
`
`
`
`v
`
`

`

`
`
`
`
`PETITIONER’S EXHIBIT LIST
`
`Ex. No.
`
`Brief Description
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`U.S. Patent No. 7,949,752
`
`File History of U.S. Patent No. 7,949,752
`
`File History of U.S. Patent No. 6,839,733
`
`File History of U.S. Patent No. 6,163,794
`
`Declaration of Darrell Long
`
`HCC Ins. Holdings, Inc. v. Intellectual Ventures I LLC,
`IPR2016-01431, Paper No. 1
`
`HCC Ins. Holdings, Inc. v. Intellectual Ventures I LLC,
`IPR2016-01431, Paper No. 6
`
`HCC Ins. Holdings, Inc. v. Intellectual Ventures I LLC,
`IPR2016-01431, Paper No. 8
`
`Report and Recommendation of United States magistrate
`judge, Intellectual Ventures I LLC v. HCC Insurance
`Holdings, Inc., 6:15-cv-660 (E.D.Tx. Aug. 26, 2016), ECF
`No. 102
`
`Plaintiff’s Objections to Magistrate Mitchell’s Report and
`Recommendation, Intellectual Ventures I LLC v. HCC
`Insurance Holdings, Inc., 6:15-cv-660 (E.D.Tx. Sep. 9,
`2016), ECF No. 110
`
`Joint Motion to Stay All Deadlines and Notice of Settlement,
`Intellectual Ventures I LLC v. HCC Insurance Holdings, Inc.,
`6:15-cv-660 (E.D.Tx. Dec. 26, 2018), ECF No. 207
`
`Scheduling Order, Intellectual Ventures I LLC v. VMware,
`Inc., 1:19-cv-01075 (W.D.Tx. Dec. 10, 2019), ECF No. 44
`
`1013
`
`IV’s infringement contentions for ’752 patent
`
`vi
`
`

`

`
`
`
`
`
`
`Ex. No.
`
`Brief Description
`
`1014
`
`1015
`
`1016
`
`1017
`
`1018
`
`1019
`
`1020
`
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`F. Cheong, Internet Agents (1996)
`
`U.S. Patent No. 7,043,532
`
`U.S. Patent No. 6,247,056
`
`U.S. Patent No. 5,740,231
`
`U.S. Patent No. 6,029,175
`
`U.S. Patent No. 5,367,635
`
`U.S. Patent No. 5,603,031
`
`Complaint, Intellectual Ventures I LLC v. VMware, Inc.,
`1:19-cv-01075 (W.D.Tx. Dec. July 31, 2019), ECF No. 1.
`
`Curriculum vitae of Darrell Long, Ph.D.
`
`Dolan, “But _I_ can’t FTP” Re: shared X systems available,
`comp.sources.d newsgroup post (January 13, 1991)
`
`Fielding, Relative Uniform Resource Locators, IETF
`RFC1808 (June 1995)
`
`Berners-Lee et al., Uniform Resource Locators (URL), IETF
`RFC1738 (December 1994)
`
`vii
`
`

`

`
`
`I.
`
`Introduction
`
`During prosecution, the examiner located every element of the claims of
`
`U.S. Patent No. 7,949,752 (“the ’752 patent”) in the prior art, except for one minor
`
`limitation about a “uniform resource locator” (“URL”). Petitioner VMware, Inc.
`
`(“VMware”) has located a reference—unknown to the examiner—that disclosed
`
`this missing element. Because all elements of the claims have now been located in
`
`the prior art, often in a single reference, VMware requests Inter Partes review of
`
`claims 1–4, 6, 9–11, 13–14, and 22–26 of the ’752 patent (Ex. 1001).
`
`II. VMware Has Standing and the ’752 Patent is Eligible for Inter Partes
`Review.
`
`VMware may file this petition. VMware certifies under Rule 42.104(a) that
`
`the ’752 patent is available for inter partes review and that VMware is not barred
`
`or estopped from requesting an inter partes review challenging the patent claims
`
`on the identified grounds. VMware was sued in the U.S. District Court for the
`
`Western District of Texas by the patent owner, Intellectual Ventures I LLC (“IV”),
`
`on July 31, 2019. Ex. 1021. The complaint alleges infringement of the ’752 patent.
`
`Id. VMware is not estopped from challenging the claims on the grounds identified
`
`in this Petition.
`
`III. Background
`
`The ’752 patent generally relates to software agents—“personal software
`
`assistants with authority delegated from their users,” Ex. 1014, 21. But software
`
`
`
`

`

`
`
`agents were not new when the ’752 patent was filed. Teachings of software agents
`
`go back to at least 1970. Id (citing the work of “early visionaries” from 1970,
`
`1984, and 1989). By 1996, there were many existing agent systems. See id., 21–50
`
`(describing twenty-two existing agent systems in introductory chapter). Many of
`
`these agents interacted with the Internet and the world wide web. For example,
`
`“WebWalker” was an agent that maintained links in a webpage and “WebShopper”
`
`was an agent that crawled the web for low-price audio compact discs. Id., 169–197,
`
`309–361.
`
`Three prior art agent systems are relevant to this petition: Chow, Bauer, and
`
`White. Chow taught an agent system that monitored a webpage for any updates
`
`and provided those updates to a user. Ex. 1018, 3:60–63. Bauer taught an agent
`
`system that was user-extensible. Ex. 1019, 3:46–57. And White taught an agent
`
`system where the agent process could execute on one computer and then move to a
`
`second computer to continue its execution. Ex. 1020, 8:27–41.
`
`IV. The ’752 Patent
`
`A.
`
`Specification
`
`The ’752 patent described a problem with services such as email, voice mail,
`
`electronic organizers, and on-line databases. Ex. 1001, 1:56–60, 2:5–6. The
`
`problem was that the software applications supporting those services were “often
`
`developed with a broad spectrum of subscribers in mind.” Id., 2:6–7. This meant
`
`
`
`2
`
`

`

`
`
`the applications “address[ed] the generalized needs of many subscribers, but not
`
`the specialized needs of any one particular subscriber or group of subscribers.” Id.,
`
`2:7–11. For a subscriber to obtain modified software to address the subscriber’s
`
`specialized needs, the subscriber would have to convince the service provider to
`
`bear the costs of developing, testing, and maintaining the modified software. Id.,
`
`2:12–34.
`
`The solution discussed as the “present invention” in the summary section of
`
`the ’752 patent is to make the network system “extensible (e.g. programmable) by
`
`‘end-users.’” Ex. 1001, 2:42–44. This is accomplished by augmenting the network
`
`system with an agent system. Id., 2:54–55. This augmentation was made possible
`
`by programmatically exposing capabilities of the network through services, service
`
`resources, and service wrappers, which software agents could use to modify the
`
`services. Id., 2:55–59.
`
`Reading these portions of the ’752 patent specification, one might get the
`
`impression that the applicants invented agent systems, or at the very least invented
`
`extensible agent systems. But as discussed in the background section, this is not the
`
`case. See § II supra. By October 1998, extensible network software agents were
`
`known in the art. See id. And the independent claims at issue don’t recite that idea,
`
`anyway. As discussed below, after a long prosecution, the claims only emerged
`
`from prosecution after being narrowly amended to include one specific aspect of
`
`
`
`3
`
`

`

`
`
`the disclosed embodiment: invoking a network-based agent via a URL. See § IV.B,
`
`infra.
`
`The disclosed embodiment was implemented in the network system (2) of
`
`Figure 1 (reproduced below). Ex. 1001, 5:23–25. The network system had two
`
`main parts: “programmable functionality component” (4) and “hard-wired
`
`functionality component” (6). Id., 5:55–56. The programmable functionality
`
`component comprised an agent system, including an agent server (20) and agents
`
`(22). Id., 5:63–67, Figure 1. The network system also included graphical and voice
`
`user interfaces (12 and 16), through which users interacted with the network
`
`system. Id., 6:5–6, 16–19, 49–52. And, finally, the network system also included
`
`one or more services (24) with associated service wrappers (26) and service
`
`resources (25). Id., Figure 1.
`
`
`
`
`
`4
`
`

`

`
`
`The agents were “implemented as a software application, program, or
`
`process” which ran on behalf of an affiliated user or “principal.” Ex. 1001, 8:26–
`
`29, 31–34. Agents were “responsible for performing a particular task or set of tasks
`
`on behalf of the respective principal.” Id., 8:56–58. Such tasks included using
`
`services (24). Id., 10:19–21. Examples included an agent placing or receiving calls
`
`or voice mails with a service that supported call processing or an agent retrieving
`
`documents, such as electronic periodicals, from an on-line data retrieval service.
`
`Id., 10:21–25, 41–45.
`
`In performing tasks like these, agents consumed computational resources
`
`(21) and service resources (25). Ex. 1001, 9:31–36. Computational resources were
`
`“resources provided or supported by a computer-based system” and included
`
`“processing time, memory storage space, and the like.” Id., 8:15–21. Service
`
`resources “enable[d] a service to be performed.” Id., 10:61–63. For example, in an
`
`on-line data retrieval service, service resources could have “include[d] a telephony
`
`connection, a modem for on-line communication, an on-line database provider
`
`services, etc.” Id., 10:66–11:2. Furthermore, some service resources might have
`
`“comprise[d] discrete units which [were] ‘consumed’ during utilization of the
`
`respective resource by an agent 22,” And which could be exhausted. Id., 11:6–8,
`
`25:31–34. For example, a service resource related to telephony services might have
`
`
`
`5
`
`

`

`
`
`comprised units of long-distance calling time that were consumed and exhausted
`
`by placing a call. Id., 11:8–12.
`
`Agents executed on the agent server, which “control[led], coordinate[d], and
`
`otherwise manage[d] the overall operation of [the] programmable functionality
`
`component.” Ex. 1001, 7:51–53. The agent server could be used to “invoke,
`
`initiate, or execute various routines, processes, objects, and the like,” including
`
`agents, and also controlled the consumption of computational resources and service
`
`resources. Id., 7:53–55, 61–65. The agent server also communicated (exchanged
`
`information) with the graphical and voice user interfaces. Id., 7:48–51. And,
`
`finally, the agent server also interfaced with the services through their associated
`
`service wrappers, which “mediate[d] the interaction between a service … and the
`
`remainder of [the] programmable functionality component.” Id., 11:18–24.
`
`Service wrappers “enable[d] communication between services 24 and agent
`
`server 20” by, for example, “converting between a computer language (or
`
`instruction set) used within agent server 20 and the computer language (or
`
`instruction set) of the respective service 24.” Ex. 1001, 11:38–42. Each service
`
`wrapper was “implemented, at least in part, with an application programming
`
`interface (API),” which programmatically exposed the capabilities of a service to
`
`an agent. Id., 11:42–47.
`
`
`
`6
`
`

`

`
`
`In operation, agents were executed upon the occurrence of “events.” Ex.
`
`1001, 10:9–11, 15:23–26. Events could include “the lapse of a predetermined
`
`amount of time (e.g., 24 hours) or the occurrence of a specified time (e.g., 6:00
`
`a.m.)” or the “delivery of an e-mail message.” Id., 15:26–28, 18:27–28. An agent
`
`would learn of an event via a “uniform resource locator (URL) which expresse[d]
`
`or provide[d] an address for a web page.” Id., 18:29–31. “The URL specifie[d]
`
`both the event’s type and the agent 22 which is [the] event’s intended recipient.”
`
`Id., 18:31–32.
`
`B.
`
`Prosecution History
`
`The ’752 patent took a long and winding road to issuance, including multiple
`
`restriction, rejection, and response milestones. In each response, the applicants
`
`added aspects of the disclosed embodiment to the claims, one by one, until the
`
`examiner finally relented and allowed the claims. The final limitation that the
`
`examiner could not find in the disclosed prior art was “receiving a URL defining a
`
`type of event and identifying the network-based agent.” As discussed in § VII
`
`below, at least Chow taught this limitation, but the examiner was unaware of that
`
`reference. See Ex. 1001, references cited.
`
`Prosecution began with a restriction requirement and election followed by
`
`the first substantive office action, which rejected all of the pending claims as
`
`anticipated by U.S. Patent No. 7,043,532 to Humpleman (Ex. 1015). Ex. 1002,
`
`
`
`7
`
`

`

`
`
`511–516, 518–525, 533–537. In response, the applicants amended the pending
`
`claims and added new claims 107–110. Id., 567–568. The amendments added
`
`limitations that the service resources were “configured to be consumed by the
`
`agent.” Id., 562, 564, 568. The applicants argued that Humpleman’s teaching of a
`
`server which included “hardware as a resource,” differed from the recited service
`
`resources that were “configured to be consumed by the agent.” Id., 570.
`
`The next office action made the rejection final. Ex. 1002, 584–590. It
`
`maintained all of the existing rejections and rejected the new claims over
`
`Humpleman too. Id. In response to the applicants’ arguments, the office action
`
`noted that “all resources can be considered to be ‘configured to be consumed,’”
`
`and therefore the applicants failed to distinguish the claims from Humpleman. Id.,
`
`585. The applicants responded with a request for continued examination and a
`
`supplemental claim amendment that amended the prior claims and added new
`
`claims 111–119. Id., 602–633. After the amendments all claims now recited that
`
`“the service resource is exhausted after it is consumed by the agent.” Id., 604, 606,
`
`609, 610. Applicants argued that Humpleman’s teaching of a server which
`
`included “hardware as a resource,” differed from the recited service resources that
`
`were “configured to be consumed by the agent … wherein the service resource is
`
`exhausted after it is consumed by the agent.” Id., 612, 630.
`
`
`
`8
`
`

`

`
`
`Continued prosecution began with another restriction requirement and
`
`election followed by the first substantive office action of continued prosecution.
`
`Ex. 1002, 641–647, 650–658. That office action rejected all the claims for lack of
`
`written description for “‘exhausting’ a resource” and also rejected all the claims as
`
`anticipated by or obvious in view of U.S. Patent No. 6,247,056 to Chou (Ex. 1016).
`
`Id., 665–672. For the written description rejection, the office action pointed out
`
`that the specification described “Computational Resources” being “consumed” or
`
`“used up,” but that these were “situations where an agent may be ‘using up’ a
`
`resource, but not necessarily ‘exhausting’ it.” Id., 667. The specification, therefore,
`
`did not provide written description support for “exhausting a resource.” Id.
`
`The applicants responded by cancelling one claim, amending the remaining
`
`claims, and adding new dependent claims 137–140. Ex. 1002, 691–706. After
`
`amendment all claims now recited that “an amount of the service resource is
`
`exhausted after it is consumed by the agent” or “a discrete unit of the service
`
`resource is exhausted upon being consumed by the agent” to remedy the written
`
`description rejection. Id., 692–694, 699–701 (emphasis in original). In response to
`
`the rejections over the Chou reference, applicants argued that Chou did not teach a
`
`service resource that was exhausted upon being consumed. Id., 703. The examiner
`
`had pointed to “cartridges” (software modules) that were “reused” by the agent.
`
`Id., 703; see Ex. 1016, 5:58–67 (Chou’s teaching of “cartridges”). The applicants
`
`
`
`9
`
`

`

`
`
`argued that a reusable service resource was “the exact opposite” of “[a] …
`
`resource [that] is exhausted upon being consumed” as recited in the claims. Ex.
`
`1002, 703 (emphasis added).
`
`The next office action made the rejection final. Ex. 1002, 711–717. The
`
`office action found applicants’ argument about Chou “misleading” because in the
`
`applicant’s invention “resources are reused” too. Id., 713. The office action points
`
`out that in the specification, “resources are defined as including processing time,
`
`memory storage space, and the like.” Id. “While these resources may be at full
`
`capacity at any given time, the [sic] can always be reused later when they are not at
`
`full capacity.” Id. Even so, the office action now rejected all the claims (including
`
`the new claims) as anticipated by a different reference, U.S. Patent No. 5,740,231
`
`to Cohn (Ex. 1017). Id., 713–715. But the office action notes that claim 135 would
`
`be allowable if it were rewritten in independent form. Id., 715. The limitation
`
`recited in dependent claim 135 was “identifying the predetermined event by a
`
`URL, wherein the URL defines a type of the predetermined event and a recipient
`
`network based agent.” Id., 697.
`
`The applicants responded by amending all of the pending independent
`
`claims to include “invoking, in response to receiving a URL defining a type of the
`
`predetermined event and identifying the network-based agent, an execution of the
`
`network-based agent,” which was similar to the limitation in claim 135 that the
`
`
`
`10
`
`

`

`
`
`office action had found allowable. Ex. 1002, 737–739, 741 (emphasis in original).
`
`The applicants noted that the claims all now recited limitations like claim 135 and
`
`requested reconsideration of the rejections. Id., 745–747. The examiner agreed,
`
`issuing a notice of allowance in response. Id., 752–753.
`
`By the end of prosecution, the claims were a far cry from the broad idea of a
`
`network system made extensible through augmentation with an agent system,
`
`which the specification’s “summary of the invention” section described as the
`
`“present invention.” Ex. 1001, 2:52–55. Instead, the issued claims recited (1)
`
`invoking an agent via a URL defining a type of event and identifying the agent and
`
`(2) using the agent so that an amount of a service resource was exhausted upon
`
`being consumed by the agent. See, e.g., Ex. 1001, 25:59–67 (“means for invoking”
`
`and “means … for using” elements of claim 1). And the only limitation the
`
`examiner ever found not present in the prior art was invoking an agent via a URL
`
`defining a type of event and identifying the agent. As discussed in § VII below,
`
`this limitation was taught in Chow, but the examiner was unaware of that
`
`reference. See Ex. 1001, references cited.
`
`C. Effective Filing Date and Date of Invention
`
`October 23, 1998, is the effective filing date of the ’752 patent. The
`
`application for the ’752 patent was filed on November 24, 2004, as a continuation
`
`
`
`11
`
`

`

`
`
`of application no. 09/712,712, which was itself a continuation of application no.
`
`09/178,366, which was filed on October 23, 1998.
`
`Likewise, October 23, 1998, is the date of invention of the ’752 patent used
`
`in this petition. Petitioner is unaware of any attempt by IV or its predecessors-in-
`
`interest of asserting that the ’752 patent is entitled to an earlier invention date.
`
`Petitioner is likewise unaware of any evidence that the ’752 patent is entitled to an
`
`earlier invention date.
`
`D. Level of Ordinary Skill in the Art
`
`As of October 1998, a person of ordinary skill in the art (“POSITA”) at the
`
`time of the ’752 patent’s effective filing date would typically be a person with a
`
`bachelor’s degree in computer science or electrical engineering and at least two
`
`years of experience in computer software systems. Ex. 1005, ¶ 21. This level of
`
`skill in the art is reflected by the references cited in this Petition, the state of the
`
`art, and the experience of Professor Darrell Long as described in his declaration. In
`
`this Petition, reference to a POSITA refers to a person with these or similar
`
`qualifications.
`
`V. Claim Construction
`
`The claims are to be construed under the same claim construction standard
`
`as civil actions in federal district court. See Changes to Claim Construction
`
`Standard, 83 FED. REG. 51340 (Oct. 11, 2018).
`
`
`
`12
`
`

`

`
`
`In prior district court and PTAB proceedings, IV agreed to certain
`
`constructions and argued for constructions of certain disputed terms. VMware will
`
`address all terms that have been subject to a prior construction dispute. But
`
`VMware does not believe that the Board will need to reach a construction for all
`
`previously disputed terms to resolve the issues in this petition. VMware will also
`
`address terms that are expected to have disputed constructions in the currently
`
`pending district court litigation between VMware and IV, but only where those
`
`disputes might be relevant to the obviousness issues presented in this petition.
`
`In the prior IPR proceeding, under the “broadest reasonable interpretation”
`
`standard, petitioner HCC suggested constructions for various “means” limitations
`
`and for “event handler.” Ex. 1006, 16–20. IV’s preliminary response did not
`
`dispute any of HCC’s “means” constructions. Instead, it argued that “exhausted”
`
`should be construed and disputed HCC’s “event handler” construction. Ex. 1007,
`
`14–17. HCC and IV settled before the Board reached an institution decision on
`
`HCC’s petition. Ex. 1008
`
`More terms were at issue in the district court litigation between HCC and
`
`IV. Before the District Court, both sides again agreed on the construction of the
`
`“means” limitations, but disputed the constructions of “agent,” “service resource,”
`
`two “URL” limitations, “consumed,” and “exhausted.” Ex. 1009, 6, 24–34. “Event
`
`handler” was neither an agreed nor a disputed term at the District Court. Id. A
`
`
`
`13
`
`

`

`
`
`magistrate judge recommended constructions for all of the disputed terms. Id.
`
`HCC and IV settled before the District Court ruled on the objections to the
`
`magistrate’s recommended constructions. Ex. 1011.
`
`A.
`
`“Means” limitations
`
`VMware proposes that all of the “means” limitations in claims 1, 3, 4, and 6,
`
`are means-plus-function elements under 35 U.S.C. §112(f). In prior proceedings,
`
`IV has agreed that these terms in claims 1 and 6 were means-plus-function
`
`limitations and that they should be construed with the functions and corresponding
`
`structure in the table below. Ex. 1009, 6. Although claims 3 and 4 were not at issue
`
`in prior litigation, VMware expects that IV will agree that the means limitations in
`
`those claims are also means-plus-function and will propose the functions and
`
`corresponding structures for those claims shown in the table below. Without
`
`prejudice to its right to argue that these terms are indefinite before the district court
`
`for not disclosing sufficient corresponding structure, VMware will apply the
`
`functions and corresponding structures from the table in the obviousness analysis
`
`of claims 1, 3, 4, and 6.
`
`Limitation
`
`Function
`
`means for receiving data for

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket