throbber

`
`
`
`
`
`
`
`
`EXPERT DECLARATION OF KEVIN C. ALMEROTH IN SUPPORT OF
`IRONSOURCE LTD.’S PETITION FOR POST-GRANT REVIEW OF CLAIMS 1-18 OF
`U.S. PATENT NO. 10,782,951
`

`
`
`
`ironSource Exhibit 1008
`
`

`

`
`
`Table of Contents
`Background ................................................................................................................................... 1
`The ’951 Patent ........................................................................................................................... 11
`Person of Ordinary Skill in the Art ........................................................................................... 14
`Technology Background of the ‘951 Patent.............................................................................. 15
`U.S. Patent No. 10,353,686 to Pasha et al. ....................................................................... 17
`U.S. Published Patent Application 2010/0095294 to Yamada et. al. ............................... 21
`U.S. Published Patent Application US 2016/0142859 to Molinet et al. ........................... 21
`Claim Construction ..................................................................................................................... 21
`Summary of Invalidity Grounds................................................................................................ 24
`Anticipation by Pasha ................................................................................................................. 24
`Independent Claims 1, 12, and 17.............................................................................................. 25
`Dependent Claims 3-11, 14-16 and 18 ....................................................................................... 35
`Claim 3 ................................................................................................................ 35
`Claim 4 ................................................................................................................ 36
`Claim 5 ................................................................................................................ 37
`Claims 6 and 14 ................................................................................................... 38
`Claims 7 and 15 ................................................................................................... 39
`Claim 8 ................................................................................................................ 40
`Claim 9 ................................................................................................................ 41
`Claim 10 .............................................................................................................. 42
`Claims 11, 16, and 18 .......................................................................................... 42
`Obviousness in view of Pasha..................................................................................................... 43
`Claims 2 and 13 are obvious over Pasha ............................................................. 45
`Claim 4 is obvious over Pasha ............................................................................ 46
`Claim 5 is obvious over Pasha ............................................................................ 47
`Claims 6 and 14 are obvious over Pasha ............................................................. 47
`Claim 11, 16, and 18 are obvious over Pasha ..................................................... 49
`Obviousness in view of Pasha and Yamada .............................................................................. 50
`Obviousness in view Pasha and Molinet ................................................................................... 53
`
`i
`
`

`

`The Limitations set Forth in the Claims of the ‘951 Patent Recite Nothing More Than
`Conventional Hardware and Computer Functionality ........................................................... 55
`The Combination of the Elements ............................................................................................. 68
`
`
`ii
`
`

`

`DECLARATION OF KEVIN C. ALMEROTH
`I Kevin, C. Almeroth, declare as follows:
`
`1.
`
`2.
`
`I am over 18 years of age and I am competent to express the opinions set forth herein.
`
`I am currently a Professor Emeritus in the Department of Computer Science at the
`
`Background
`
`University of California, Santa Barbara (UCSB). While active at UCSB, I held faculty
`
`appointments and was a founding member of the Computer Engineering (CE) Program, Media
`
`Arts and Technology (MAT) Program, and the Technology Management Program (TMP). I also
`
`served as the Associate Director of the Center for Information Technology and Society (CITS)
`
`from 1999 to 2012. I have been a faculty member at UCSB since July 1997.
`
`3.
`
`I hold three degrees from the Georgia Institute of Technology: (1) a Bachelor of Science
`
`degree in Information and Computer Science (with minors in Economics, Technical
`
`Communication, and American Literature) earned in June 1992; (2) a Master of Science degree
`
`in Computer Science (with specialization in Networking and Systems) earned in June 1994; and
`
`(3) a Doctor of Philosophy (Ph.D.) degree in Computer Science (Dissertation Title: Networking
`
`and System Support for the Efficient, Scalable Delivery of Services in Interactive Multimedia
`
`System, minor in Telecommunications Public Policy) earned in June 1997. During my education,
`
`I have taken a wide variety of courses as demonstrated by my minor. My undergraduate degree
`
`also included a number of courses more typical of a degree in electrical engineering including
`
`digital logic, signal processing, and telecommunications theory.
`
`4.
`
`One of the major concentrations of my research has been the delivery of multimedia
`
`content and data between computing devices, including various network architectures. In my
`
`research, I have studied large-scale content delivery systems, and the use of servers located in a
`
`variety of geographic locations to provide scalable delivery to hundreds or thousands of users
`
`1
`
`

`

`simultaneously. I have also studied smaller-scale content delivery systems in which content is
`
`exchanged between individual computers and portable devices. My work has emphasized the
`
`exchange of content more efficiently across computer networks, including the scalable delivery
`
`of content to many users, mobile computing, satellite networking, delivering content to mobile
`
`devices, and network support for data delivery in wireless networks.
`
`5.
`
`In 1992, the initial focus of my research was on the provision of interactive functions
`
`(e.g., VCR-style functions like pause, rewind, and fast-forward) for near video-on-demand
`
`systems in cable systems; in particular, how to aggregate requests for movies at a cable head-end
`
`and then how to satisfy a multitude of requests using one audio/video stream broadcast to
`
`multiple receivers simultaneously. This research has continually evolved and resulted in the
`
`development of techniques to scalably deliver on-demand content, including audio, video, web
`
`documents, and other types of data, through the Internet and over other types of networks,
`
`including over cable systems, broadband telephone lines, and satellite links.
`
`6.
`
`An important component of my research has been investigating the challenges of
`
`communicating multimedia content, including video, between computers and across networks
`
`including the Internet. Although the early Internet was used mostly for text-based, non-real time
`
`applications, the interest in sharing multimedia content, such as video, quickly developed.
`
`Multimedia-based applications ranged from downloading content to a device to streaming
`
`multimedia content to be instantly used. One of the challenges was that multimedia content is
`
`typically larger than text-only content, but there are also opportunities to use different delivery
`
`techniques since multimedia content is more resilient to errors. I have worked on a variety of
`
`research problems and used a number of systems that were developed to deliver multimedia
`
`content to users. One content-delivery method I have researched is the one-to-many
`
`2
`
`

`

`communication facility called “multicast,” first deployed as the Multicast Backbone, a virtual
`
`overlay network supporting one-to-many communication. Multicast is one technique that can be
`
`used on the Internet to provide streaming media support for complex applications like video-on-
`
`demand, distance learning, distributed collaboration, distributed games, and large-scale wireless
`
`communication. The delivery of media through multicast often involves using Internet
`
`infrastructure, devices and protocols, including protocols for routing and TCP/IP.
`
`7.
`
`Starting in 1997, I worked on a project to integrate the streaming media capabilities of the
`
`Internet together with the interactivity of the web. I developed a project called the Interactive
`
`Multimedia Jukebox (IMJ). Users would visit a web page and select content to view. The content
`
`would then be scheduled on one of a number of channels, including delivery to students in
`
`Georgia Tech dorms delivered via the campus cable plant. The content of each channel was
`
`delivered using multicast communication.
`
`8.
`
`In the IMJ, the number of channels varied depending on the capabilities of the server
`
`including the available bandwidth of its connection to the Internet. If one of the channels was
`
`idle, the requesting user would be able to watch their selection immediately. If all channels were
`
`streaming previously selected content, the user’s selection would be queued on the channel with
`
`the shortest wait time. In the meantime, the user would see what content was currently playing
`
`on other channels, and because of the use of multicast, would be able to join one of the existing
`
`channels and watch the content at the point it was currently being transmitted.
`
`9.
`
`The IMJ service combined the interactivity of the web with the streaming capabilities of
`
`the Internet to create a jukebox-like service. It supported true Video-on-Demand when capacity
`
`allowed, but scaled to any number of users based on queuing requested programs. As part of the
`
`project, we obtained permission from Turner Broadcasting to transmit cartoons and other short-
`
`3
`
`

`

`subject content. We also connected the IMJ into the Georgia Tech campus cable television
`
`network so that students in their dorms could use the web to request content and then view that
`
`content on one of the campus’s public access channels.
`
`10. More recently, I have also studied issues concerning how users choose content, especially
`
`when considering the price of that content. My research has examined how dynamic content
`
`pricing can be used to control system load. By raising prices when systems start to become
`
`overloaded (i.e., when all available resources are fully utilized) and reducing prices when system
`
`capacity is readily available, users’ capacity to pay as well as their willingness can be used as
`
`factors in stabilizing the response time of a system. This capability is particularly useful in
`
`systems where content is downloaded or streamed on-demand to users.
`
`11.
`
`As a parallel research theme, starting in 1997, I began researching issues related to
`
`wireless devices and sensors. In particular, I was interested in showing how to provide greater
`
`communication capability to “lightweight devices,” i.e., small form-factor, resource-constrained
`
`(e.g., CPU, memory, networking, and power) devices. Starting in 1998, I published several
`
`papers on my work to develop a flexible, lightweight, battery-aware network protocol stack. The
`
`lightweight protocols we envisioned were similar in nature to protocols like Bluetooth, Universal
`
`Plug and Play (UPnP) and Digital Living Network Alliance (DLNA).
`
`12.
`
`From this initial work, I have made wireless networking—including ad hoc, mesh
`
`networks and wireless devices—one of the major themes of my research. My work in wireless
`
`network spans the protocol stack from applications through to the encoding and exchange of data
`
`at the data link and physical layers.
`
`13.
`
`At the application layer, even before the large-scale “app stores” were available, my
`
`research looked at building, installing, and using apps for a variety of purposes, from network
`
`4
`
`

`

`monitoring to support for traditional computer-based applications (e.g., content retrieval) to new
`
`applications enabled by ubiquitous, mobile devices. For example, my research has looked at
`
`developing applications for virally exchanging and tracking “coupons” through “opportunistic
`
`contact” (i.e., communication with other devices coming into communication range with a user).
`
`In many of the courses I have taught there is a project component. Through these projects I have
`
`supervised numerous efforts to develop new “apps” for download and use across a variety of
`
`mobile platforms.
`
`14.
`
`Toward the middle of the protocol stack, my research also looked to build wireless
`
`infrastructure support to enable communication among a set of mobile devices unaided by any
`
`other kind of network infrastructure. These kinds of networks are useful either in challenged
`
`network environments (e.g., when a natural disaster has destroyed existing infrastructure) or
`
`when suitable support for network communication never existed. The deployment of such
`
`networks (or even the use of traditional network support) are critical to support services like
`
`disaster relief, catastrophic event coordination, and emergency services deployment.
`
`15.
`
`Yet another theme is monitoring wireless networks, in particular different variants of
`
`IEEE 802.11 compliant networks, to (1) understand the operation of the various protocols used in
`
`real-world deployments, (2) use these measurements to characterize use of the networks and
`
`identify protocol limitations and weaknesses, and (3) propose and evaluate solutions to these
`
`problems. I have successfully used monitoring techniques to study wireless data link layer
`
`protocol operation and to improve performance by enhancing the operation of such protocols.
`
`For wireless protocols, this research includes functions like network acquisition and channel
`
`bonding.
`
`5
`
`

`

`16.
`
`Protecting networks, including their operation and content, has been an underlying theme
`
`of my research almost since the beginning of my research career. Starting in 2000, I have been
`
`involved in several projects that specifically address security, network protection, and firewalls.
`
`After significant background work, a team on which I was a member successfully submitted a
`
`$4.3M grant proposal to the Army Research Office (ARO) at the Department of Defense to
`
`propose and develop a high-speed intrusion detection system. Key aspects of the system included
`
`associating streams of packets and analyzing them for viruses and other malware. Once the grant
`
`was awarded, we spent several years developing and meeting the milestones of the project. A
`
`number of my students worked on related projects and published papers on topics ranging from
`
`intrusion detection to developing advanced techniques to be incorporated into firewalls. I have
`
`also used firewalls, including their associated malware detection features, in developing
`
`techniques for the classroom to ensure that students are not distracted by online content.
`
`17.
`
`Recent work ties some of the various threads of my past research together. I have
`
`investigated content delivery in online social networks and proposed reputation management
`
`systems in large-scale social networks and marketplaces. On the content delivery side, I have
`
`looked at issues of caching and cache placement, especially when content being shared and the
`
`cache has geographical relevance. We were able to show that effective caching strategies can
`
`greatly improve performance and reduce deployment costs. Our work on reputation systems
`
`showed that reputations have economic value, and as such, creates a motivation to manipulate
`
`reputations. In response, we developed a variety of solutions to protect the integrity of
`
`reputations in online social networks. The techniques we developed for content delivery and
`
`reputation management were particularly relevant in peer-to-peer communication and
`
`recommendations for downloadable “apps.”
`
`6
`
`

`

`18.
`
`As an important component of my research program, I have been involved in the
`
`development of academic research into available technology in the market place. One aspect of
`
`this work is my involvement in the Internet Engineering Task Force (IETF). The IETF is a large
`
`and open international community of network designers, operators, vendors, and researchers
`
`concerned with the evolution of the Internet architecture and the smooth operation of the
`
`Internet. I have been involved in various IETF groups including many content delivery-related
`
`working groups like the Audio Video Transport (AVT) group, the MBone Deployment
`
`(MBONED) group, Source Specific Multicast (SSM) group, the Inter-Domain Multicast Routing
`
`(IDMR) group, the Reliable Multicast Transport (RMT) group, the Protocol Independent
`
`Multicast (PIM) group, etc. I have also served as a member of the Multicast Directorate
`
`(MADDOGS), which oversaw the standardization of all things related to multicast in the IETF.
`
`Finally, I was the Chair of the Internet2 Multicast Working Group for seven years.
`
`19. My involvement in the research community extends to leadership positions for several
`
`academic journals and conferences. I am the co-chair of the Steering Committee for the ACM
`
`Network and System Support for Digital Audio and Video (NOSSDAV) workshop and on the
`
`Steering Committees for the International Conference on Network Protocols (ICNP), ACM
`
`Sigcomm Workshop on Challenged Networks (CHANTS), and IEEE Global Internet (GI)
`
`Symposium. I have served or am serving on the Editorial Boards of IEEE/ACM Transactions on
`
`Networking, IEEE Transactions on Mobile Computing, IEEE Network, ACM Computers in
`
`Entertainment, AACE Journal of Interactive Learning Research (JILR), and ACM Computer
`
`Communications Review. I have co-chaired a number of conferences and workshops including
`
`the IEEE International Conference on Network Protocols (ICNP), IEEE Conference on Sensor,
`
`Mesh and Ad Hoc Communications and Networks (SECON), International Conference on
`
`7
`
`

`

`Communication Systems and Networks (COMSNETS), IFIP/IEEE International Conference on
`
`Management of Multimedia Networks and Services (MMNS), the International Workshop On
`
`Wireless Network Measurement (WiNMee), ACM Sigcomm Workshop on Challenged
`
`Networks (CHANTS), the Network Group Communication (NGC) workshop, and the Global
`
`Internet Symposium, and I have served on the program committees for numerous conferences.
`
`20.
`
`Furthermore, in the courses I taught at UCSB, a significant portion of my curriculum
`
`covered aspects of the Internet and network communication including the physical and data link
`
`layers of the Open System Interconnect (OSI) protocol stack, and standardized protocols for
`
`communicating across a variety of physical media such as cable systems, telephone lines,
`
`wireless, and high-speed Local Area Networks (LANs). The courses I have taught also cover
`
`most major topics in Internet communication, including data communication, multimedia
`
`encoding, and mobile application design. My research and courses have covered a range of
`
`physical infrastructures for delivering content over networks, including cable, Integrated
`
`Services Digital Network (ISDN), Ethernet, Asynchronous Transfer Mode (ATM), fiber, and
`
`Digital Subscriber Line (DSL). For a complete list of courses I have taught, see my curriculum
`
`vitae (CV).
`
`21.
`
`In addition, I co-founded a technology company called Santa Barbara Labs that was
`
`working under a sub-contract from the U.S. Air Force to develop very accurate emulation
`
`systems for the military’s next generation internetwork. Santa Barbara Labs’ focus was in
`
`developing an emulation platform to test the performance characteristics of the network
`
`architecture in the variety of environments in which it was expected to operate, and, in particular,
`
`for network services including IPv6, multicast, Quality of Service (QoS), satellite-based
`
`8
`
`

`

`communication, and security. Applications for this emulation program included communication
`
`of a variety of multimedia-based services, including video conferencing and video-on-demand.
`
`22.
`
`In addition to having co-founded a technology company myself, I have worked for,
`
`consulted with, and collaborated with companies for nearly 30 years. These companies range
`
`from well-established companies to start-ups and include IBM, Hitachi Telecom, Turner
`
`Broadcasting System (TBS), Bell South, Digital Fountain, RealNetworks, Intel Research, Cisco
`
`Systems, and Lockheed Martin.
`
`23.
`
`I am a Member of the Association of Computing Machinery (ACM) and a Fellow of the
`
`Institute of Electrical and Electronics Engineers (IEEE).
`
`24.
`
`Additional details about my employment history, fields of expertise, courses taught, and
`
`publications are further included in my CV attached as Appendix A to this Report.
`
`25.
`
`Additional details about my employment history, fields of expertise, and publications are
`
`further included in my curriculum vitae, attached hereto as Attachment A. A list of publications
`
`and cases in which I have provided testimony in trial or by deposition over the last four years is
`
`also included in Attachment A.
`
`26.
`
`I have been retained by ironSource Ltd in connection with its petition for post-grant
`
`review of U.S. Patent No. 10,782,951 (“the ‘951 Patent”). Exh. 10011. I have over 30 years of
`
`experience in fields relevant to the ‘951 Patent.
`
`27.
`
`I am being compensated for my time at a rate of $700 per hour. No component of my
`
`compensation is contingent on my opinions expressed herein or on the outcome of this (or any
`
`other) proceeding.
`

`1References to Exhibits “Exh. 10XX” are to Petitioner’s Exhibits.
`
`9
`
`

`

`28.
`
`I have reviewed the ‘951 Patent (Exh. 1001), as well as its prosecution history (Exh.
`
`1002). In forming my opinions, I have also reviewed and considered the following exhibits:
`
`Exhibit
`
`Description
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1009
`
`1010
`
`1011
`
`U.S. Patent No. 10,782,951 (Issued September 22, 2020), Instant
`Installation of Apps (“’951 Patent”)
`
`Prosecution history of the ’951 Patent
`
`U.S. Patent No. 10,353,686 to Pasha et al.
`
`U.S. Published Patent Application No. 2010/0095294 to Yamada et al.
`
`U.S. Published Patent Application No. 2016/0142859 to Molinet et al.
`
`“App Store Data (2021) - Business of Apps,” by David Curry,
`businessofapps.com available at https://www.businessofapps.com/data/app-
`stores/ (May 13, 2021)
`
`“A Brief History of Deep Linking,” by Chris Maddern, TechCrunch
`available at https://techcrunch.com/2015/06/12/a-brief-history-of-deep-
`linking/#:~:text=Deep, (June 12, 2015)
`
`U.S. Patent No. 10,296,641 to Sogani et al.
`
`U.S. Patent No. 9,940,400 to Shapira et al.
`
`“Android vs. iOS Development: Background Processing,” by
`Matthew Casey available at https://www.linkedin.com/pulse/android-
`vs-ios-development-background-processing-matthew-casey/ (June
`27, 2016)
`
`1012
`
`U.S. Patent No. 10,671,367 to Matthews et al.
`
`1013
`
`1014
`
`1015
`
`1016
`
`U.S. Patent No. 8,732,827 to Zhukov et al.
`
`U.S. Patent No. 9,800,609 to Liao
`
`U.S. Patent No. 6,266,811 to Nabahi
`
`U.S. Patent No. 6,131,192 to Slivka et al.
`
`10
`
`

`

`Exhibit
`
`1017
`
`
`
`Description
`
`“Using Java Reflect,” by Glen McCluskey, available at
`https://www.oracle.com/technical-
`resources/articles/java/javareflection.html (Jan. 1998)
`
`The ’951 Patent
`
`29.
`
`The ’951 Patent is entitled “Instant Installation of Apps.” The ’951 Patent asserts that it
`
`provides a “solution to the problem of enabling users easy download of new software
`
`applications onto their devices while maintaining interactions with their current application.”
`
`Exh. 1001, col. 1, line 66 to col. 2, line 2. The ‘951 Patent further suggests that “[t]his solution is
`
`an improvement of the state current art, in which an additional connection must be established
`
`and maintained between the device and the app store in order to enable installation of the new
`
`app.” Exh. 1001, col. 2, lines 11-14.
`
`30.
`
`The “background” section of the ’951 Patent describes conventional Internet
`
`“advertisement campaigns which encourage users to buy and install apps on their devices.” Exh.
`
`1001, col. 1 lines 15-16. In this regard, it is noted that “[t]ypically, when a user viewing the ad is
`
`interested in installing a new app, the user clicks on a link. After the link is clicked, the device
`
`connects to an app store from which the new app may be downloaded.” The ‘951 Patent suggests
`
`that this routing to an app store may lead to poor ad conversion and fraud. Exh. 1001, col. 1 lines
`
`15-41.
`
`31.
`
`The ’951 Patent implements the disclosed methods as software on a conventional mobile
`
`device. Figure 1, shown below, depicts “a device [100] for running software applications, [in
`
`which] installation client 140 is used to install a new app onto the device without going through
`
`an app store.” Exh. 1001, col. 9 lines 17-23.
`
`11
`
`

`

`
`
`32.
`
`The components of device 100 are generic computer components, which are conventional
`
`in any computing device, e.g., a processor 110 and a non-transitory memory 120 for storing code
`
`instructions to be executed by processor 110, and a conventional network interface 150 which is
`
`used by the device when it communicates with external elements (such as the content provider)
`
`over a network. Exh. 1001, col. 9 lines 29-35. The device 100 further includes an installation
`
`client 140, which is defined as an “application running on the device and having the role of
`
`downloading and installing software applications on the device (e.g. installing an app on a
`
`mobile phone).” Exh. 1001, col. 2 lines 64-67.
`
`33.
`
`The method of downloading an app is generally shown in the flow chart of Figure 6.
`
`12
`
`

`

`
`
`34.
`
`This flow chart is described in Col. 13, lines 48-63 with little elaboration on this method
`
`beyond the captions in the flowchart found in blocks 610, 620, 630, 640, 650, and 660. When
`
`the user is running a first app on device 100, the current app displays a link (e.g. an ad containing
`
`a clickable link) to download a new app. When the user selects the link to download the new app
`
`(step 610), the device determines if the installation client 140 is available (step 620). If so, it is
`
`invoked to run in the background (step 630). The installation client 140 automatically downloads
`
`an installation file for the new app (e.g. an Android ® APK file) (step 640) which is then used to
`
`install the new app on the device (step 650). If at step 620, the installation client 140 is not
`
`available, the user is redirected to the app store in step 660. Exh. 1001, col. 9 lines 36-54.
`
`35.
`
`The installation client 140 is described in the schematic of Figure 7 “as several modules
`
`performing separate functions.” Exh. 1001, col. 14 lines 6-8.
`
`13
`
`

`

`
`
`36. With respect to the claimed subject matter, the most relevant of these enumerated
`
`functions is the Download & Installation client 720 which “downloads and installs the new app
`
`when the instant install link is selected (for example by downloading the respective APK file
`
`from external storage (such as a content delivery network or cloud storage such as Amazon Web
`
`Services) and installing the new app using the downloaded APK file).” Exh. 1001, col. 14 lines
`
`26-32.
`
`Person of Ordinary Skill in the Art
`
`37.
`
`I understand that the teaching of the prior art is viewed through the eyes of a person of
`
`ordinary skill in the art (“POSIA”) at the time claimed invention was made. To assess the level
`
`of ordinary skill in the art, I understand one can consider the types of problems encountered in
`
`the art, the prior solutions to those problems found in the prior art references, the rapidity with
`
`which innovations are made, the sophistication of the technology, and the level of education of
`
`active workers in the field. My opinion as to what constitutes a POSIA is set forth below.
`
`38.
`
`The ’951 Patent is directed to the field of installing software applications on devices,
`
`such as installing apps on mobile devices. Exh. 1001, 1:6-9. The processes described in the ’951
`
`14
`
`

`

`Patent were well known as of the February 23, 2018 priority date of the ’951 Patent, required
`
`only modest skill using various programming languages, such as Java, HTML, C (or C++) and
`
`the like as well as familiarity with operating systems such as Google’s Android operating system
`
`and Apple’s iOS to conceive and implement.
`
`39.
`
`In my opinion, POSIA would be qualified to perform work on the subject matter
`
`described and claimed in the ’951 Patent through a combination of formal education in computer
`
`programming, computer science or similar discipline and/or work experience, such as two or
`
`more years of computer programming experience. Formal education of a POSIA in this field
`
`may range widely from certificate programs specifically directed to creating apps for mobile
`
`devices to advanced degrees up to and including a PhD in computer science or a related field
`
`such as computer engineering. Although my qualifications place me at the high end of the range
`
`of qualifications for a POSIA, I was a POSIA in the field of the ‘951 Patent as of February 23,
`
`2018 and am undertaking my analysis and opinions rendered herein through the lens of such a
`
`POSIA.
`
`Technology Background of the ‘951 Patent
`
`40.
`
`As of the February 23, 2018, which I understand is the priority date of the ‘951 Patent,
`
`there was a substantial body of technology in use, and literature in the field of “installing
`
`software applications on devices and, more specifically, but not exclusively, to installing apps on
`
`mobile devices.” Exh. 1001, col. 1, lines 5-9. Indeed, as the ‘951 Patent concedes, “[t]he use of
`
`apps on mobile devices such as cell phones was very widespread. Users frequently install new
`
`apps on their devices, providing the devices with new functionality such as access to new
`
`services, online shopping, gaming and more.” Id. at 1:10-14. The Apple App Store and Google
`
`Play Store for instance, were both introduced nearly a decade before the priority date of the ‘951
`
`15
`
`

`

`Patent and by 2017, there were more than 3 million apps available in each of these ecosystems.
`
`See Exh. 1006.
`
`41.
`
`In addition to the ubiquitous practice of downloading apps onto mobile phones and
`
`tablets, it was well known that app installation is a subset of the larger field of downloading
`
`software and other content to a computer over a network. While the App Store and Google Play
`
`Store are specific marketplaces for downloading software applications, the methods used to
`
`download software to a personal computer that were widely used since the 1990’s are
`
`fundamentally no different than those used to download software applications.
`
`42.
`
`The concept of downloading software as a background task was also widely known and
`
`practiced in the field long prior to February 2018. For example, commercial software packages,
`
`such as Windows 95 allowed upgrades of the software to be downloaded and installed as a
`
`background task while allowing the user to perform other tasks in the foreground since at least
`
`the 90s. Exh. 1015, col. 15, lines 11-17 (“It has been found that during a typical Silent install
`
`associated with the InstallShield(R) program, the installation is often considered “too silent” for
`
`the user. It has been found that the optional display of a minimal progress indicator or Silent
`
`Notification Icon is desirable, so that users may have some indicator of the events taking place in
`
`the background.”) Exh. 1016, col. 5, line 17 to 36 (“The present invention is directed toward a
`
`method for installing a Software product.”), col. 7, lines 38-42 (“The Shell program module is
`
`preferably executed in a multitasking operating System, and those skilled in the art will
`
`appreciate that a multitasking operating System allows a program module to run in either the
`
`foreground or the background.”) Moreover, the use of background tasks is integral to JAVA
`
`programming language and the Android operat

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket