throbber
UNITED STATES PATENT AND TRADEMARK
`OFFICE
`
`
`_________________  
`_________________  
`
`
`
`Before the Patent Trial and Appeal Board
`
`
`
`
`
`Sony Network Entertainment International LLC, Petitioner,
`
`
`v.
`
`William Grecia, Patent Owner.
`
`
`_________________  
`
`
`U.S. Patent No. 8,533,860
`Filing Date: January 11, 2013
`Issue Date: September 10, 2013
`Title: Personalized Digital Media Access System—PDMAS Part II
`
`
`__________________  
`
`
`
`
`
`
`
`Preliminary Response by Patent Owner William Grecia
`
`
`
`EWS-005398
`
`Early Warning Services 1031
`IPR of U.S. Pat. No. 8,887,308
`
`

`

`
`
`Table of Contents
`
`Introduction ........................................................................................ 1
`Background ......................................................................................... 2
`Overview of the ‘860 Patent ................................................................... 2
`Written Description ....................................................................... 2
`Exemplary Claim from the ‘860 Patent ........................................... 8
`The Examiner’s Reasons for Allowance of the ‘860 Patent Claims .............. 10
`Baiya ........................................................................................... 11
`Wimmer ...................................................................................... 13
`Argument .......................................................................................... 14
`I. Sony is unlikely to prevail with DeMello or Pestoni as anticipatory
`references because neither reference establishes a connection with a
`verified web service as claimed in the ‘860 patent. ............................ 14
`A. DeMello does not anticipate the ‘860 patent because DeMello
`requests and receives the identification reference from the same
`module or apparatus that received and authenticated the verification
`token. .......................................................................................... 15
`B. Pestoni does not anticipate the ‘860 patent because Pestoni fails
`to disclose establishing a connection with a verified web service and
`requesting an identification reference from the communications
`console. ....................................................................................... 20
`II. Sony is unlikely to prevail on the asserted obviousness grounds
`because none of the proffered combinations cure the failure of the prior
`art to establish a connection with a verified web service as claimed in
`the ‘860 invention. .......................................................................... 21
`Conclusion ........................................................................................ 22
`
`  
`
`
`
`  
`
`
`
`i  
`
`EWS-005399
`
`

`

`
`Exhibit No.
`
`Exhibit List
`
`Description
`
`2001
`
`2002
`2003
`
`
`
`2013-05-31 Notice of Allowance and Fees Due
`(PTOL-85)
`U.S. Pub. No. 2011/0288946 to Baiya et al.
`U.S. 7,526,650 to Wimmer
`
`  
`
`ii  
`
`EWS-005400
`
`

`

`Introduction
`
`U.S. Patent 8,533,860 (the “‘860 patent”) claims methods,
`
`
`
`systems, and apparatuses for facilitating access rights to digital content
`
`among a plurality of data processing devices. In stating the reasons for
`
`allowance of claims 1 through 30 of the ‘860 patent, the Examiner
`
`recognized that although the prior art included methods for facilitating
`
`access rights between a plurality of devices, no reference included the
`
`steps of “establishing a connection with . . . a verified web service” and
`
`“requesting at least one identification reference from the at least one
`
`communications console . . . .” via the connection with the verified web
`
`service. (Ex. 2001.)
`
`
`
`The Board should decline to institute inter partes review of the ‘860
`
`patent. Petitioner Sony Network Entertainment International LLC
`
`(“Sony”) cannot show a reasonable likelihood of prevailing on any of the
`
`grounds raised in the petition because each of the four references Sony
`
`cites (DeMello, Pestoni, Wiser, and Cooper) fails to teach the ‘860
`
`patent limitations that the USPTO has already determined to be novel
`
`and nonobvious. Specifically, DeMello, Pestoni, Wiser, and Cooper are
`
`cumulative to the two prior art references the Examiner believed to be
`
`  
`
`1  
`
`EWS-005401
`
`

`

`closest to the invention claimed in the ‘860 patent (Baiya and Wimmer).
`
`None of the cited art teaches, discloses, or in any way renders obvious
`
`the claimed process of establishing a connection with a verified web
`
`service and requesting an identification reference from a device through
`
`that connection.
`
`In short, the United States Patent and Trademark Office already
`
`reviewed the questions raised in the Sony’s Petition. Therefore, no basis
`
`exists to institute proceedings under 35 U.S.C. § 314.
`
`Background
`
`Overview of the ‘860 Patent
`
`Written Description
`
`The ‘860 patent claims methods, systems, and apparatuses that
`
`“work as a front-end to encrypted files as an authorization agent for
`
`decrypted access.” (‘860 patent, 5:37-39.)1 Thus, the invention claimed in
`
`the ‘860 patent is akin to a gatekeeper who authorizes access to the
`
`encrypted digital content behind him.
`
`Fig. 1, for example, shows a system containing six modules that
`
`lay at the front-end of the encrypted content:
`
`                                                                                                                
`1  The ‘860 patent has been filed as Exhibit 1001 with the Petition.
`  
`2  
`
`EWS-005402
`
`

`

`
`
`The ‘860 patent describes the various modules as being distinct
`
`and assigns an order for each module’s use.
`
`At the front of the method/system/apparatus, “The first receipt
`
`module 102 receives a branding request from at least one
`
`communications console of the plurality of data processing devices. The
`
`branding request is a read or write request of metadata of the encrypted
`
`digital media and includes a membership verification token
`
`corresponding to the encrypted digital media.” (‘860, 5:45-50.)
`
`“Subsequently, the authentication module 104 authenticates the
`
`membership verification token. The authentication is performed in
`
`connection with a token database. Further, the connection module 106
`
`  
`
`3  
`
`EWS-005403
`
`

`

`establishes communication with the at least one communication
`
`console.” (‘860 patent, 5:56-60.)
`
`There is only one request module and, as described, the request
`
`module “108 requests at least one electronic identification reference from
`
`the at least one communication console.” (‘860 patent, 6:4-6.) In
`
`contrast, however, there are two receipt modules. While the first receipt
`
`module has already received the verification token, “[t]he second receipt
`
`module 110 receives the at least one electronic identification reference
`
`from the at least one communication console.” (Id., 6:6-8.) “The
`
`branding module 112 brands metadata of the encrypted digital media by
`
`writing the membership verification token and the electronic
`
`identification into the metadata.” (Id., 6:8-11.)
`
`In context, these modules each have specific roles and operate in a
`
`specific order. For example, if the branding module were able to brand
`
`the metadata of the digital media prior to the successful completion of
`
`the previous modules, the system would fail to perform its gatekeeping
`
`function.
`
`Fig. 3 illustrates an example of the process claimed in the ‘860
`
`patent. The elements and processes described with reference to Fig. 3
`
`  
`
`4  
`
`EWS-005404
`
`

`

`clearly delineate the distinctions between the claimed invention and the
`
`prior art:
`
`“A user posts a branding request via the Kodekey GUI interface 301.”
`
`(‘860, 6:65-66.) In response, “The Kodekey GUI interface 301 prompts
`
`the user to enter the token and press the redeem button present on the
`
`
`
`  
`
`5  
`
`EWS-005405
`
`

`

`Kodekey GUI interface 301.” (‘860, 6:67-7:3.) The token is then
`
`authenticated: “The Kodekey GUI interface is connected to the database
`
`305 via the internet 304 through the networking card 303. The database
`
`305 is the database used to read/write and store the tokens, also referred
`
`to as the token database.” (Id., 7:6-10.)
`
`Clearly, many prior art systems taught the verification of a token
`
`through a GUI interface, but these next steps are where the invention
`
`claimed in the ‘860 patent distinguishes itself from the prior art. Rather
`
`than completing the process between the connection established between
`
`the Kodekey GUI and the token database, the ‘860 patent teaches a
`
`process of establishing a new and distinct connection with a verified web
`
`service: “The user is redirected to the APIwebsite.com GUI 307 through
`
`the internet 306.” (Id., 7:10-11.) The identification reference is then
`
`requested, received, and written into the metadata: “The
`
`APIwebsite.com is the GUI to the membership API in which the
`
`electronic ID is collected and sent back to the Kodekey GUI interface
`
`301. . . . The database 309 is the database connected to the web service
`
`membership in which the user’s electronic ID is queried from.” (Id.,
`
`7:11-19.)
`
`  
`
`6  
`
`EWS-005406
`
`

`

`In other words, after the user posts a branding request through a
`
`first GUI (i.e., Kodekey GUI 301) and the user’s verification token is
`
`authenticated in a first database (i.e., database 305), the system
`
`establishes a new connection through a second GUI, a verified web
`
`service (i.e., APIwebsite.com GUI 307), through which an identification
`
`reference is requested, received, and written into the metadata (i.e.,
`
`product metadata 302). The prior art simply does not teach the use of a
`
`verified web service in the manner claimed in the ‘860 patent.
`
`
`
`The ‘860 patent’s description of the metadata underscores that this
`
`invention “will work as a front-end to encrypted files as an authorization
`
`agent for decrypted access” (id., 5:38-39): “The product metadata 302 is
`
`read/writable metadata associated with the digital media to be acquired.”
`
`(Id., 7:3-4 (emphasis added).) Simply put, the invention claimed in the
`
`‘860 patent does not handle the digital content itself, but rather acts as a
`
`gatekeeper to that content. The invention authorizes access by ultimately
`
`writing the verification token or the identification reference into the
`
`metadata of the digital content. To extend the gatekeeper metaphor, the
`
`digital content itself is behind the gatekeeper who authorizes decrypted
`
`access by completing the process claimed in the ‘860 patent.
`
`  
`
`7  
`
`EWS-005407
`
`

`

`  
`
`
`
`Exemplary Claim from the ‘860 Patent
`
`Claim 1 of the ‘860 patent is an exemplary claim, and it is
`
`reproduced as follows with annotations from Figures 1 and 3:
`
`A method for authorizing access to digital
`content using a cloud system [Fig. 3]
`
`comprising connected modules [102, 104, 106,
`
`108, 110, 112] in operation as one or more of a
`
`cloud computing or a cloud storage in
`
`connection with devices and users, wherein the
`
`digital content is at least one of encrypted or not
`
`encrypted, the method facilitating access rights
`
`between a plurality of data processing devices,
`
`the method comprising:
`
`
`[102; 301] receiving a digital content access
`
`request from at least one communications
`
`console of the plurality of data processing
`
`devices, the access request being a read or write
`
`request of metadata of the digital content,
`
`wherein the read or write request of metadata is
`
`performed in connection with a combination of
`
`at least one device and the cloud system, the
`
`request comprising a verification token provided
`
`by a first user corresponding to the digital
`
`content, wherein the verification token is one or
`
`8  
`
`  
`
`EWS-005408
`
`

`

`more of a password, e-mail address, payment
`
`system, credit card, authorization ready device,
`
`rights token, or one or more redeemable
`
`instruments of trade;
`
`
`[104; 303, 304, & 305] authenticating the
`
`verification token;
`
`
`[106; 306 & 307] establishing a connection with
`
`the at least one communications console,
`
`wherein the communications console is a
`
`combination of a graphical user interface (GUI)
`
`and an Application Programmable Interface
`
`(API) wherein the API is related to a verified
`
`web service, the web service capable of
`
`facilitating a two way data exchange session to
`
`complete a verification process wherein the data
`
`exchange session comprises at least one
`
`identification reference;
`
`
`[108; 307, 308 & 309] requesting the at least one
`
`identification reference from the at least one
`
`communications console, wherein the
`
`identification reference comprises one or more
`
`of a verified web service account identifier,
`
`letter, number, rights token, e-mail, password,
`
`9  
`
`  
`
`EWS-005409
`
`

`

`access time, serial number, address,
`
`manufacturer identification, checksum,
`
`operating system version, browser version,
`
`credential, cookie, or key;
`
`
`[110; 309, 308, 307, & 306] receiving the at least
`
`one identification reference from the at least one
`
`communications console; and
`
`
`[112; 302] writing at least one of the verification
`
`token or the identification reference into the
`
`metadata.
`
`The Examiner’s Reasons for Allowance of the ‘860 Patent Claims
`
`During examination, the Examiner cited the following two
`
`references as being the closest materials to the subject matter of the ‘860
`
`patent: Baiya et al. PG Pub. 20110288946, Method and System of
`
`Managing Digital Multimedia Content (“Baiya”); and Chris Wimmer,
`
`U.S. Patent 7,526,650, Personal Identifiers for Protecting Video Content
`
`(“Wimmer”). (Ex. 2001.) In short, the examiner found that while Baiya
`
`and Wimmer disclose certain of the ‘860 patent limitations, these
`
`references lack disclosure of “facilitating access rights between a plurality
`
`of data processing devices” by establishing a connection with a verified
`
`  
`
`  
`
`web service that then requests an identification reference. (Id.)
`
`10  
`
`EWS-005410
`
`

`

`Closer examination of the Baiya and Wimmer disclosures
`
`illustrates the novelty and nonobviousness of the ‘860 patent, as
`
`determined by the Examiner.
`
`Baiya
`
`
`
`In Baiya, a user accesses digital media through an interface called
`
`the Content Manager [0022]:
`
`Baiya discloses a process of ‘the management of
`
`digital multimedia content comprises a
`
`computer-implemented digital multimedia
`
`content management system comprising the
`
`following computer executable components: an
`
`upload component that allows a first user to tag
`
`the digital media content with one or more
`
`attributes . . . a grouping component that groups
`
`the digital media content according to the one or
`
`more attributes; a licensing component that
`
`attaches one or more keys to the digital media
`
`content; a security component that encrypts the
`
`digital media content; and a sharing component
`
`that allows one or more second users to access
`
`the digital media content [sic] (Fig. 3-4 and
`
`paragraphs [0008]).
`
`
`
`  
`
`11  
`
`EWS-005411
`
`

`

`(Ex. 2001 at 13-14.) The Examiner then notes that the Content Manager
`
`uses an API protocol “for access control authentication and
`
`authorization information.” (Id. at 14 (citing paragraph [0064]).)
`
`
`
`As the Examiner recognized, Baiya does not suggest “facilitating
`
`access rights between a plurality of data processing devices” according to
`
`the invention claimed in the ‘860 patent because, for example, Baiya
`
`only practices the first and second steps of claim 1 of the ‘860 patent.
`
`Indeed, in Baiya, “At 440 the Content Manager receives a request for
`
`access to content from a second user, where prior to sharing the content
`
`with the second user, the second user is authenticated 445.” (Ex. 2002
`
`(Baiya [0078].) This disclosure corresponds to, for example, the first and
`
`second steps of claim 1 of the ‘860 patent as illustrated in Figure 3 at
`
`301, 303, and 305. Baiya stops there, however, and critically lacks the
`
`third, fourth, and fifth steps of claim 1 of the ‘860 patent: establishing a
`
`connection with a verified web service (306 and 307), requesting an
`
`identification reference (307, 308, and 309), and a second receipt, this
`
`time of the identification reference (309, 308, 307, and 306).
`
`  
`
`12  
`
`EWS-005412
`
`

`

`Wimmer
`
`The Examiner cited, among other things, Figure 5 of Wimmer as
`
`disclosing some of the limitations of the ‘860 patent. The disclosure
`
`corresponding to Figure 5 of Wimmer suggests, for example, the
`
`limitations of the first, second, and sixth steps of claim 1 of the ‘860
`
`patent:
`
`The branding decision engine 504 receives the
`
`metadata 302 or interpretation from the
`
`metadata reader 502 and may be employed to
`
`decide which parts or programs within a video
`content 102 are to receive a brand 104. When
`
`the branding decision engine 504 decides to
`
`brand a video content 102 or program, an
`
`indication is sent to the brand generator 508 to
`
`brand the associated video content 102.
`
`
`(Ex. 2003 (Wimmer, 6:22-28).) This disclosure corresponds to, for
`
`example, the first, second, and sixth steps of claim 1 of the ‘860 patent as
`
`illustrated in Figure 3 at 301, 303, and 305 (i.e., receiving a write request
`
`and authentication) and 302 (i.e., writing the verification token into the
`
`metadata). Wimmer stops there, however, and critically lacks the third,
`
`fourth, and fifth steps of claim 1 of the ‘860 patent: establishing a
`
`  
`
`13  
`
`EWS-005413
`
`

`

`connection with a verified web service (306 and 307), requesting an
`
`identification reference (307, 308, and 309), and a second receipt, this
`
`time of the identification reference (309, 308, 307, and 306).
`
`Argument
`
`I.
`
`
`
`
`Sony is unlikely to prevail with DeMello or Pestoni as
`anticipatory references because neither reference establishes a
`connection with a verified web service as claimed in the ‘860
`patent.
`
`DeMello and Pestoni are similar to Baiya and Wimmer in that
`
`these references teach some of the limitations of the ‘860 patent. Some
`
`crossover between the ‘860 patent and the prior art is to be expected,
`
`however, because communicating access rights over the Internet to a
`
`license server—the first and second steps of method claim 1 in the ‘860
`
`patent—was well known in the digital rights management field: “Prior
`
`art DRM methods rely on content providers to maintain computer
`
`servers to receive and send session authorization keys to client
`
`computers with an Internet connection.” (‘860 patent, 2:54-56.)
`
`
`
`As described below, DeMello and Pestoni are also similar to Baiya
`
`and Wimmer in that neither discloses, nor even suggests, establishing a
`
`connection with a verified web service after having authenticated the
`
`  
`
`14  
`
`EWS-005414
`
`

`

`verification token. For this reason, DeMello and Pestoni cannot
`
`anticipate the ‘860 patent:
`
`Because the hallmark of anticipation is prior
`
`invention, the prior art reference—in order to
`
`anticipate under 35 U.S.C. § 102—must not
`
`only disclose all elements of the claim within the
`
`four corners of the document, but must also
`
`disclose those elements “arranged as in the
`
`claim.”
`Net Moneyin, Inc. v. Verisign, Inc., 545 F.3d 1359, 1369 (Fed. Cir. 2008).
`
`A. DeMello does not anticipate the ‘860 patent because
`DeMello requests and receives the identification reference
`from the same module or apparatus that received and
`authenticated the verification token.
`
`DeMello does not disclose a DRM method, system, or apparatus
`
`
`
`
`“arranged as in” the ‘860 patent claims. Returning to claim 1 of the ‘860
`
`patent as exemplary, the first step of the method is:
`
`receiving a digital content access request from at
`
`least one communications console of the
`
`plurality of data processing devices, the access
`
`request being a read or write request of metadata
`
`of the digital content, wherein the read or write
`
`request of metadata is performed in connection
`
`  
`
`with a combination of at least one device and
`
`the cloud system, the request comprising a
`
`15  
`
`EWS-005415
`
`

`

`verification token provided by a first user
`
`corresponding to the digital content . . . .
`
`(‘860 patent, 14:38-46.) Sony relies on two disclosures in DeMello to
`
`meet this element: (1) a web content server’s receipt of a user’s credit
`
`card information upon the user’s request to purchase an electronic book
`
`(Petition at 21 (citing DeMello, 40:23-29)); and (2) an activation server’s
`
`receipt of login credentials from a user’s device. (Id. (citing DeMello,
`
`13:30-35).) Accepting these citations as meeting the first step of the ‘860
`
`method, each of the web content server and the activation server would
`
`correspond to the “First receipt module” (102) in Figure 1 of the ‘860
`
`patent and the “KODEKEY GUI” (301) in Figure 3 of the ‘860 patent.
`
`
`
`The second step of the ‘860 patent is “authenticating the
`
`verification token” (id., 14:50). Sony relies on the same disclosure,
`
`arguing that in DeMello the web content server and the activation server
`
`authenticate the credit card information and login credentials,
`
`respectively. (Petition at 24.) Thus, according to Sony, the web content
`
`server and the activation server would also serve as the “Authentication
`
`Module” (104) in Figure 1 of the ‘860 patent and line up with the
`
`networking card (303), the internet connection (304), and database (305)
`
`in Figure 3 of the ‘860 patent.
`
`  
`
`16  
`
`EWS-005416
`
`

`

`
`
`The comparison of DeMello to the ‘860 patent begins to falter at
`
`the third step of claim 1, which provides as follows:
`
`establishing a connection with the at least one
`
`communications console, wherein the
`
`communications console is a combination of a
`
`graphical user interface (GUI) and an
`
`Application Programmable Interface (API)
`
`wherein the API is related to a verified web
`
`service, the web service capable of facilitating a
`
`two way data exchange session to complete a
`
`verification process wherein the data exchange
`
`session comprises at least one identification
`
`reference . . . .
`
`(‘860, 14:51-59.) Sony again points to the same two examples (the web
`
`content server and the activation server) performing the “establishing a
`
`connection” step. (Petition at 25-26.) Critically, however, Sony points to
`
`the same connections that DeMello has already used to receive and
`
`authenticate the verification token: “Once user’s PASSPORT™
`
`credentials are authenticated (step 156), a PASSPORT™ API is queried
`
`for the user alias and e-mail address (step 158). Thereafter, at steps 160-
`
`162, the activation servers 94 will request that the client (via the ActiveX
`
`control) upload a unique hardware ID . . . .” (DeMello, 23:18-23.)
`
`  
`
`17  
`
`EWS-005417
`
`

`

`
`
`For DeMello to anticipate, the disclosure of that invention must be
`
`found within the four corners of DeMello and “arranged as in” claim 1
`
`of the ‘860 patent. Net Moneyin, Inc., 545 F.3d at 1369. The ‘860 patent
`
`claims “establishing a connection with . . . a verified web service” after,
`
`and separately, from receiving and authenticating the verification token.
`
`In DeMello, however, the connection used to request and receive the
`
`identification reference had already been established, as this connection
`
`is the same connection that DeMello used to authenticate the
`
`verification token. (DeMello, 23:18-23.) As such, DeMello lacks the
`
`“Connection module,” “Request module,” and “Second receipt module”
`
`of Figure 1 of the ‘860 patent:
`
`  
`
`18  
`
`
`
`EWS-005418
`
`

`

`
`
`
`
`Additionally, DeMello lacks establishing a connection with a
`
`verified web service and therefore lacks half of the disclosure in Figure 3
`
`of the ‘860 patent:
`
`*
`
`*
`
`*
`
`
`
`
`
`Sony relies on the same disclosure in DeMello to meet the ‘860
`
`patent’s limitation of “establishing a connection with a verified web
`
`service” for each of independent claims 1, 9, 11, and 21. (Petition at 41,
`
`  
`
`19  
`
`EWS-005419
`
`

`

`44, & 55.) Therefore, DeMello does not anticipate claims 1, 9, 11, and
`
`21 or the claims that depend therefrom for at least the reasons stated
`
`above.
`
`B. Pestoni does not anticipate the ‘860 patent because Pestoni
`fails to disclose establishing a connection with a verified
`web service and requesting an identification reference from
`the communications console.
`
`
`Pestoni also fails to anticipate the ‘860 patent for not disclosing
`
`
`
`establishing a connection with a verified web service to request and
`
`receive an identification reference. Pestoni’s deficiency in this respect,
`
`however, is more pronounced than DeMello. Sony relies on both a
`
`“content license request” and a “join-domain request” as disclosure of
`
`the “receiving a digital content access request” step of claim 1 of the ‘860
`
`patent. (Petition at 31.) But any overlap between Pestoni and the ‘860
`
`patent ends after comparing receipt and authentication of the verification
`
`token.
`
`
`
`First, Sony argues that the communications console (“a
`
`combination of a graphic user interface (GUI) and an Application
`
`Programmable Interface (API)” (‘860 patent, 14:53-55)) is inherent in
`
`Pestoni. (Petition at 29-30.) Second, Sony admits that the same
`
`connection supports Pestoni’s receipt of both the verification token and
`
`  
`
`20  
`
`EWS-005420
`
`

`

`identification reference, arguing that the disclosure of a simultaneous
`
`receipt could be split into multiple acts (albeit over the same connection).
`
`(Id. at 30-32.) Third, Sony admits that Pestoni altogether lacks a
`
`“Request module” corresponding to 108 in Figure 1 of the ‘860 patent,
`
`as Pestoni merely receives what Sony identifies as the identification
`
`reference. (Petition at 33.) This is in contrast to the ‘860 patent, which
`
`establishes a connection with a verified web service that requests the
`
`identification reference from the communications console. (‘860 patent,
`
`14:51-15:2.)
`
`*
`
`*
`
`*
`
`Sony relies on the same disclosure in Pestoni to meet the ‘860
`
`patent’s limitation of “establishing a connection with a verified web
`
`service” for each of independent claims 1, 9 and 11. (Petition at 41 &
`
`44.) Therefore, Pestoni does not anticipate claims 1, 9 and 11 of the ‘860
`
`patent or the claims that depend therefrom for at least the reasons stated
`
`above.
`
`II.
`
`Sony is unlikely to prevail on the asserted obviousness grounds
`because none of the proffered combinations cure the failure of
`the prior art to establish a connection with a verified web
`service as claimed in the ‘860 invention.
`
`
`
`  
`
`21  
`
`EWS-005421
`
`

`

`No inter partes review should be instituted because Sony is not
`
`likely to succeed on the asserted section 103 grounds. Neither Wiser nor
`
`Cooper discloses establishing a connection with a verified web service
`
`after a verification token has been authenticated. (Petition at 55
`
`(incorporating DeMello and Pestino disclosure).) Therefore, no
`
`combination of DeMello, Pestino, Wiser, and Cooper discloses, teaches,
`
`suggests, or otherwise renders obvious the invention claimed in the ‘860
`
`patent.
`
`Conclusion
`
`
`
`William Grecia respectfully requests that the Board decline to
`
`institute proceedings under 35 U.S.C. § 314.
`
`Respectfully submitted,
`
`/Patrick D. Richards/
`Patrick Richards
`Registration No. 48,905
`Richards Patent Law P.C.
`233 S. Wacker Drive 84th Floor
`Chicago, IL 60606
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`  
`
`Dated: March 11, 2015
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`22  
`
`EWS-005422
`
`

`

`CERTIFICATE OF SERVICE
`
`
`
`I hereby certify that on this 11th day of March 2015, a copy of this
`
`Preliminary Response, including its supporting exhibits (2001-2003) has
`
`been served in its entirety by Express Mail on the following counsel of
`
`record for Petitioner:
`
`Paul Haughey
`Kilpatrick, Townsend & Stockton LLP
`Two Embarcadero Center, Eighth Floor
`San Francisco, CA 94111
`phaughey@kilpatricktownsend.com
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Respectfully submitted,
`
`/Patrick D. Richards/
`Patrick Richards
`Registration No. 48,905
`Richards Patent Law P.C.
`233 S. Wacker Drive 84th Floor
`Chicago, IL 60606
`
`Dated: March 11, 2015
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`  
`
`EWS-005423
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket