Ipr2015-00232
Total Page:16
File Type:pdf, Size:1020Kb
UNITED STATES PATENT AND TRADEMARK OFFICE ____________ BEFORE THE PATENT TRIAL AND APPEAL BOARD ____________ Unified Patents Inc., Petitioner v. III Holdings 1, LLC Patent Owner IPR2015-____ Patent 7,702,781 ____________ PETITION FOR INTER PARTES REVIEW Mail Stop PATENT BOARD, PTAB Commissioner for Patents P.O. Box 1450 Alexandria, VA 22313-1450 TABLE OF CONTENTS I. INTRODUCTION ........................................................................................... 1 II. MANDATORY NOTICES ............................................................................. 2 A. Real Party-in-Interest ............................................................................ 2 B. Related Matters ...................................................................................... 4 C. Identification of Lead and Back-Up Counsel........................................ 4 D. Service Information ............................................................................... 4 III. PAYMENT OF FEES ..................................................................................... 4 IV. REQUIREMENTS FOR INTER PARTES REVIEW ...................................... 4 A. Grounds for Standing ............................................................................ 4 B. Statement of Precise Relief Requested (37 C.F.R. § 42.22(a)) and Identification of Challenges (37 C.F.R. § 42.104(b)) .................... 5 1. Ground .............................................................................................. 5 2. Citations to Exs. 1002-1005 ............................................................. 5 C. How the Construed Claims are Unpatentable under the Statutory Grounds identified in 37 C.F.R. § 42.104(b)(2) and Supporting Evidence Relied upon to Support the Challenge ................ 6 D. Threshold Showing of Reasonable Likelihood That Petitioner Would Prevail With Respect To At Least One Challenged Claim (35 U.S.C. § 314(a)) Has Been Met ........................................... 6 V. FACTUAL BACKGROUND .......................................................................... 7 A. Declaration Evidence ............................................................................ 7 B. The State of the Art as of 2006 ............................................................. 8 C. The Challenged ‘781 Patent ................................................................ 12 VI. CLAIM CONSTRUCTION (37 C.F.R. § 42.104(B)(3)) .............................. 14 ii A. Support for claim construction ............................................................ 15 VII. THE GROUNDS SHOWING THAT PETITIONER HAS A REASONABLE LIKELIHOOD OF PREVAILING .................................... 20 A. The Prior Art Discloses Each Claimed Feature And One Of Ordinary Skill Would Be Led To Form This Combination ................ 20 1. Reasons to Combine Exs. 1002-1005. ........................................... 20 2. Prior Art Analysis .......................................................................... 24 3. The WS_FTP References (Exhibits 1002-1004) Disclose An Equivalent To Claim 38’s “Means For Receiving” And “Means For Storing” Elements ...................................................... 27 4. The Prior Art Was Publicly Available Before March 3, 2005 ....... 30 B. Element-By-Element Analysis Of Challenged Claims ....................... 30 [1a] 1. A method comprising: ................................................... 30 [1b] receiving by at least one computer, at a client device of a first entity, a selection by a user of a store as command at a graphical user interface (GUI) executing on said client device, the first entity being at least one of an individual, the user, or a company; ......... 31 [1c] receiving by the at least one computer a selection of a data file on said client device by the user for transfer across a network for storage at a remote storage facility of a second entity, the user having an associated login account with the second entity, the second entity being at least one of a network service provider or an internet service provider (ISP); .................... 33 [1d] prompting by the at least one computer the user for a file name for said data file at said GUI; ............................... 34 [1e] associating by the at least one computer said file name with said data file; ...................................................... 35 iii [1f] receiving by the at least one computer a parameter selection at said GUI, said parameter selection coupled to said account and coupled to a service level agreement (SLA) between the first entity and the second entity, said parameter selection comprising a scheduled transfer time, an encryption selection, and at least one of: ...................................................................... 36 [1i] a compression level; or ....................................................... 41 [1j] a security level: .................................................................. 41 [1k] applying by the at least one computer said parameter selection to said data file;..................................................... 42 [1l] identifying by the at least one computer said SLA; ........... 43 [1m] determining by the at least one computer whether to transfer said data file based on enforcing said SLA; ........... 43 [1n] queuing, if transfer is determined to be permitted, by the at least one computer said data file in a queue for scheduled upload transmission to said remote storage facility of the second entity at said scheduled transfer time; and ............................................................................... 44 [1o] transferring, if transfer is determined to be permitted, by the at least one computer said data file to said remote storage facility at said transfer time automatically without user interaction based on said parameter selection. ............................................................. 45 [3a] 3. The method according to claim 1, wherein said selection of at least one of said store as command or said data file comprises dragging and dropping of said data file to an icon on said GUI. .......................................... 45 [4a] 4. The method according to claim 1, ................................. 46 [4b] wherein said SLA indicates a maximum size of data said first entity is permitted to store at said remote storage facility. ..................................................................... 46 iv [5a] 5. The method according to claim 1, ................................. 46 [5b] wherein said step of transferring said data file further comprises encrypting by the at least one computer said data file according to at least one of said encryption level or said security level. ......................... 46 [6a] 6. The method according to claim 1, ................................. 47 [6b] wherein said step of transferring said data file further comprises at least one of compressing by the at least one computer said data file according to said compression level or transferring said data file wherein said data file was previously compressed, wherein said compression comprises at least one of MPEG, JPEG, TIFF, and/or PDF. ....................................... 47 [7a] 7. The method according to claim 1, ................................. 47 [7b] wherein said step of transferring said data file further comprises initiating by the at least one computer a connection over said network. .......................... 47 [8a] 8. The method according to claim 1, further comprising: .......................................................................... 48 [8b] receiving by the at least one computer a request from the user to retrieve said data file from said remote storage facility; ........................................................ 48 [8c] initiating by the at least one computer an authentication sequence between said client device and said remote storage facility; and ................................... 48 [8d] receiving by the at least one computer said data file from said remote storage facility to said client device. ....... 49 [9a] 9. The method according to claim 1, further comprising: .......................................................................... 49 [9b] receiving by the at least one computer a search request from the user for said remote storage facility; ........ 49 v [9c] initiating by the at least one computer a user authentication sequence; ...................................................... 49 [9d] providing by the at least one computer a prompt to said user; .............................................................................. 50 [9e] receiving by the at least one computer search terms from said user; and ............................................................... 50 [9f] receiving by the at least one computer a results list of one or more data files corresponding to said search terms. .................................................................................... 50 [10a] 10. The method according to claim 9, further comprising............................................................................ 50 [10b] providing by the at least one computer said results list of one or more data files to said user ............................. 50 [11a] 11. The method according to claim 9, ............................. 50 [11b] wherein said results list of one or more data files is generated in response to the user entering at least one of a date, a word, a letter sequence, a number sequence, and/or a letter and