Professional Documents
Culture Documents
Petition For Inter Partes Review UNDER 35 U.S.C. 311-319 AND 37 C.F.R. 42.100 ET SEQ
Petition For Inter Partes Review UNDER 35 U.S.C. 311-319 AND 37 C.F.R. 42.100 ET SEQ
Petition For Inter Partes Review UNDER 35 U.S.C. 311-319 AND 37 C.F.R. 42.100 ET SEQ
TABLE OF CONTENTS
Page
I.
INTRODUCTION ..........................................................................................1
II.
III.
IV.
V.
A.
Overview ..............................................................................................2
B.
B.
C.
D.
E.
2.
3.
4.
5.
6.
7.
8.
9.
10.
TABLE OF CONTENTS
(continued)
B.
VI.
Page
11.
12.
2.
3.
4.
5.
6.
7.
B.
C.
VII. CONCLUSION.............................................................................................48
ii
LIST OF EXHIBITS
Exhibit 1001: U.S. Patent No. 8,239,347 to Alexander et al. (the 347 patent)
Exhibit 1002: File History of U.S. Patent No. 8,239,347 to Alexander et al. (File
History)
Exhibit 1003: U.S. Patent Application Publication No. 2003/0025599 to Monroe
(Monroe)
Exhibit 1004: U.S. Patent No. 6,708,292 to Mangasarian (Mangasarian)
Exhibit 1005: U.S. Patent No. 6,975,617 to Walker et al. (Walker)
Exhibit 1006: Declaration of Zaydoon Jawadi (Decl.)
Exhibit 1007: Petitioners Voluntary Interrogatory Responses
Exhibit 1008: Declaration of An P. Doan in Support of Petition for Inter Partes
Review of U.S. Patent No. 8,239,347
iii
INTRODUCTION
The 347 patent was issued on August 7, 2012 and assigned to Olivistar,
LLC (Olivistar) on May 28, 2014. The 347 patent is directed to a system and
method of custom data storage according to a data archival profile where a
processor receives data from various monitoring devices and stores the data based
on whether the attributes of the device data match particular attributes of an
archival profile. (See, e.g., 347 patent, Ex. 1001, cl. 1). As shown below, the
system and method recited in claims 1, 3, 4, 8-12, and 17-20 of the 347 patent
were neither new nor non-obvious at the time the 347 patent was filed.
II.
barred or estopped from requesting IPR, nor is Petitioner in privity with any party
who is barred or estopped from challenging the patent claims on the grounds
identified herein. (See Petitioners Voluntary Interrogatory Responses, Ex. 1007).
III.
Overview
The 347 patent was filed on September 10, 2009, and issued on August 7,
2012. The 347 patent is a continuation of, and claims priority to, U.S. Patent App.
No. 10/377,866, filed February 28, 2003, which issued as U.S. Patent No.
7,606,843 (the 843 patent), which claims priority to U.S. Provisional App. No.
60/361,886, filed March 4, 2002. Independent claim 1 (upon which claims 2-16
depend) recites a system that has (1) one or more monitoring devices that generate
data with one or more data archival attributes; (2) at least one data repository; and
(3) a monitoring device data processor that obtains an archival profile, determines
whether the archival profile matches attributes of the device data, processes that
device data into a compressed format, and selectively stores that device data on the
data repository. (See Ex. 1001 cl. 1).
In certain claims, the obtained archival profile may correspond to a type of
monitoring device data archival attribute, a user archival attribute, or an event
archival attribute. (Id. cls. 2-4). In certain claims, the device data may be device
state information (e.g., device statues, time of day, device sensor value, premise
identifier, or user identifier) or device information and can include audio and/or
video data. (See id. cls. 5-7, 18-19). In addition to compressing the incoming data,
in certain claims, the processor could also normalize, transfer, and/or replicate the
device data. (See id. cls. 8-9). In certain claims, following storage, the processor
may retrieve the archived data according to an archival profile, uncompress the
data, manage the data within the repository, and/or delete the archived data. (See
id. cls. 10-16, 19-20). In one claim, the system can further include a client machine
for requesting archived data. (See id. cl. 10).
Independent claim 17 recites computer-readable media that includes
instructions for performing a data archiving method, where the steps of the
method are (1) obtaining incoming data from a device; (2) obtaining a data archival
profile; (3) determining whether the data archival profile is related to at least one
attribute of the incoming data; (4) processing the incoming data with the matching
attribute(s) of the data archival profile into a compressed format; and (5) storing
the compressed data on a medium. (Id. cl. 17). Claim 17 recites the same language
as claim 29 of its parent, the 843 patentbut without the added limitation
narrowing archival attributes to specific ones. (See id. 843 patent cl. 29).
B.
Applicant filed App. No. 12/557,341, which issued as the 347 patent, on
August 7, 2012. (See generally File History of 347 patent, Ex. 1002). During
prosecution, the examiner rejected all claims for nonstatutory obviousness-type
double patenting over claims 1-30 of the 843 patent. (Id. 78-80). The examiner
also rejected claims 1-16 as anticipated under 35 U.S.C. 102(e) by U.S.
IPR is requested for claims 1, 3, 4, 8-12, and 17-20 of the 347 patent.
B.
U.S. Patent No. 6,975,617 to Walker et al. (Walker) (Ex. 1005), filed March
23, 2001, published November 8, 2001, issued on December 13, 2005, and is
prior art under at least 35 U.S.C. 102(a) and (e).
The specific statutory grounds on which the challenge to the claims is based
and the patents relied upon for each ground are:
Ground
Ground 1
Claims
1, 3, 4, 8-12, 17-20
Ground 2
C.
the broadest reasonable construction for this claim term encompasses the following
Archival profile. For purposes of this petition, Petitioner proposes that the
broadest reasonable construction for this claim term encompasses the following
meaning a specified set of data characteristics. This construction is fully
supported by the specification of the 843 patent which describes that the archival
profile specifies the archival parameters of the date (see Ex. 1001 9:4-5) by
comparison of the archival profile the specific archival attributes of the data (see
id. 10:52-59). The archival profile may be created by a user using a graphical user
interface to designate the data to be archived, such as data from particular
monitoring devices (see id. 9:21-28). Accordingly, a person of ordinary skill in the
art would understand that the broadest reasonable construction of archival profile
would encompass a specified set of data characteristics. (Decl. 22).
D.
Independent Claim 1
Monroe discloses all of the elements of and anticipates claim 1. (Decl. 58,
68, Ex. A cl. 1). Monroe discloses a system with monitoring devices (e.g., cameras,
sensor appliances, video appliances, legacy devices) generating monitoring device
data (e.g., sensor data; event/scene/video/image data; event signals) with archival
attributes (e.g., parameters characterizing events such as change in scene,
displacement of object, the opening of door contacts, authorized use as well as
unauthorized use), a monitoring device data processor (e.g., processor of servers,
PCs, intelligent cameras, or intelligent sensors) for obtaining an archival profile
61, 68, Ex. A cl. 1[a]). Monroe recognizes the need for the camera or video
encoder appliance to capture . . . the image on-site and discloses collecting the
image data on a preselected basis at the camera. (Ex. 1003 32, 109, cl. 32;
Decl. 59, 68, Ex. A cl. 1[a]).
Monroe further discloses the requirement of claim 1 that this data is
characterized by archival attributes, criteria or event data that may trigger
transmission, such as a change in condition, to the archival server for storage.
(Decl. 59, 61, 68, Ex. A cl. 1[a]). For example, Monroe teaches collecting the
image data on a preselected basis at the camera, comparing [s]ubsequent data of
the scene to the data representing the scene in its original state, and transmitting
to a remote location [o]nly subsequent data representing a change [in] the original
scene. (Ex. 1003 27, 109; Decl. 59, 61, 68, Ex. A cl. 1[a]). Monroe also
describes generation and transmission of a notification signal for alerting response
personnel when a detected object [is] left in a specific location or taken from a
specific location at the time the object is detected appearing or disappearing. (Ex.
1003 35; Decl. 61, 68, Ex. A cl. 1[a]). In addition, the location, type and
priority of event are tagged at the point where a sensor picks up the event, and
for image data, the camera additionally sends a short file containing the motion
matrix and a calculated value representing the total degree of motion for the
scene. (Ex. 1003 26, 126; Decl. 61, 68, Ex. A cl. 1[a]). [W]hile periodic
10
data may be gathered at a sensor, only data indicating a change in condition will be
transmitted. (Ex. 1003 26; Decl. 61, 64, 68, Ex. A cl. 1[a]).
Monroe also discloses a monitoring device data processor. (Decl. 62, 68,
Ex. A cl. 1[b]). The above monitoring devices can be intelligent cameras and
intelligent sensors that utilize processors to process the image and sensor data.
(See Ex. 1003 25, 41, 112, 240; Decl. 62, 68, Ex. A cl. 1[b]). Monroe
discloses the monitoring device data processors obtaining an archival profile
corresponding to data archival attributes. (Decl. 62, 68, Ex. A cl. 1[b]). The
archival profile in Monroe could consist of parameters configurable by a remote
user, such as changes in data, event filtering to qualify alarm and supervisory
events, video thresholds or difference thresholds indicative of motion
detected, and masks (e.g., [v]ideo motion detection configurable by a remote
user to select areas of interest or disinterest in the video scene) to control what
data is compressed and archived. (See Ex. 1003 28, 31-33, 36, 41, 163-64, Figs.
6, 8, 9, 17; Decl. 59, 62, 68, Ex. A cl. 1[b]). For instance, Monroe discloses that
while continuous data is captured by the camera, only when a scene changes from
the previous captured image is it required that the image be transmitted to a remote
monitoring station, and more importantly, stored on the archive database. . . . [T]he
level of change is monitored at the camera and only specific criteria trigger a
transmission. For example, the rotation of a ceiling fan may be ignored by masking
11
12
13
Monroe further discloses that when it is determined that the archival profile
is associated with attributes of the incoming monitoring device data, that data
should be processed into a compressed format and stored in a data repository.
Monroe discloses that the images or video are suitably compressed prior to
storage. (Ex. 1003 230; see also 170-71; Decl. 65-66, 68, Ex. A cl. 1[e][e][i]). In one example, [t]he camera's video signal is then optionally compressed
in compressors 203A through 203N[, where] [a] variety of digital video
compression schemes are in common usage[, and] [t]he compressed video is then
conveyed via network 205 to a monitor station 206, or to an archive server 208 for
image storage on disk 209 or tape 210. (Ex. 1003 212; Decl. 65-66, 68, Ex. A
cl. 1[e]-[e][i]). In another example, legacy monitoring devices (e.g., fire alarms,
motion detectors, smoke sensors, fire sensors, panic buttons, pull alarms) may be
incorporated into the system disclosed by Monroe and the signals generated by
such devices may be transmitted, archived and retrieved similar to the monitoring
devices previously discussed. (See Ex. 1003 159; Decl. 65-66, 68, Ex. A cl.
1[e]-[e][i]). In particular, when used in combination with legacy closed-circuit
analog security cameras . . . the signal is digitized prior to transmission. (Ex. 1003
159; Decl. 65, 68, Ex. A cl. 1[e]-[e][i]). Monroe also discloses that after a
video signal is converted into digital form, it may be compressed by a compressor
before being conveyed to the network. (See Ex. 1003 112; Decl. 65-66, 68,
14
15
Dependent Claim 3
Dependent Claim 4
16
28; Decl. 59, 62, 67-68, Ex. A cl. 4). The video motion detection trigger can be
configured through a graphical user interface (GUI) that allows users to select or
draw areas of interest and enter appropriate weighting values corresponding to
motion detection sensitivity. (See Ex. 1003 121-22, 264, Fig. 3; Decl. 62, 6768, Ex. A cl. 4). The weighting values and threshold levels allow the user to
specify video capture for certain events while not capturing video for unwanted
events. (Decl. 59, 62, 67-68, Ex. A cl. 4). Accordingly, claim 4 is anticipated by
the disclosure of Monroe. (Decl. 58, 68, Ex. A cl. 4).
4.
Dependent Claim 8
17
schemes are in common usage[, and] [t]he compressed video is then conveyed via
network 205 to a monitor station 206, or to an archive server 208 for image storage
on disk 209 or tape 210. (Ex. 1003 212; Decl. 65-66, 68, Ex. A cl. 8). In
another example, legacy monitoring devices may be incorporated in to the system
disclosed by Monroe and the signals generated by such devices may be
transmitted, archived and retrieved similar to the monitoring devices previously
discussed. (See Ex. 1003 159; Decl. 65, 67-68, Ex. A cl. 8). In particular,
when used in combination with legacy closed-circuit analog security cameras . . .
the signal is digitized prior to transmission. (Ex. 1003 159; Decl. 65, 68, Ex.
A cl. 8). Monroe also discloses that after a video signal is converted into digital
form, it may be compressed by a compressor before being conveyed to the
network. (See Ex. 1003 112; Decl. 65, 68, Ex. A cl. 8). Accordingly claim 8 is
anticipated by the disclosure of Monroe. (Decl. 58, 68, Ex. A cl. 8).
5.
Dependent Claim 9
18
such robotic tape, optical or high-density disk storage. (Ex. 1003 43, 112, Fig.
1; Decl. 63, 66, 68, Ex. A cl. 9). As discussed above, Monroe discloses the
monitoring device data processor (e.g., the intelligent camera or sensor)
transmitting compressed data to the server for storage, see V.A.1. (See Ex. 1003
211-13; Decl. 65-66, 68, Ex. A cl. 9). Thus, Monroe discloses the monitoring
device data processor replicating the device data in at least two repositories, the
disk drive of the server, and back-up tape drive or large storage array device.
(Decl. 63, 66, 68, Ex. A cl. 9). Accordingly, claim 9 is anticipated by the
disclosure of Monroe. (Decl. 58, 68, Ex. A cl. 9).
6.
Dependent Claim 10
19
monitors 7, upon request by a user. (Ex. 1003 136, 112; Decl. 62, 67-68, Ex.
A cl. 10[pre]). For example, a client may want to view all archived images from a
selected camera over some selected span of time. (Ex. 1003 137; Decl. 67-68,
Ex. A cl. 10[pre]). Monroe discloses that a Graphical User Interface (GUI) is
provided to allow a user to search or browse images in the database[, and] [t]he
GUI also allows the user to perform automated searches through the Archive for
events of interest. (Ex. 1003 256, see also 137, 231, Figs. 1, 4; Decl. 6768, Ex. A cl. 10[pre]).
Monroe discloses the processors discussed above, see V.A.1, obtaining an
archival profile (set of parameters related to events configurable by users)
corresponding to the archived data (stored sensor data). (Decl. 62, 67-68, Ex. A
cl. 1[b] & 10[a]). Monroe discloses a user obtaining an archival profile of detected
motion according to user configured parameters that corresponds to the archived
images and sensor data. (Decl. 62, 67-68, Ex. A cl. 10[a]). For example,
amount of motion indication may be used [] for still images being viewed from
the servers archive, and [w]hen used with archived still images, all camera icons
on the map may be used to indicate the degree of motion detected by the
represented camera at the currently viewed time. (Ex. 1003 259; Decl. 62,
67-68, Ex. A cl. 10[a]). Additionally, [s]ince all detected motion data is stored on
the server, the GUI can present to the user facility-wide histogram bar chart
20
summarizing all motion in the facility at the time of the currently viewed image.
(Ex. 1003 261; Decl. 62, 67-68, Ex. A cl. 10[a]).
Monroe also discloses processing the archival profile to retrieve archived
images and sensor data from the servers storage. (Decl. 62, 67-68, Ex. A cl.
10[b]). Because each data event, image or frame [] received, [] is filed with a
unique identifier comprising date, time, camera or encoder and/or file
information, Monroes system allows [for] full search capability by date, time,
event, user, and/or camera on command, greatly enhancing retrieval and
reconstruction of events. (Ex. 1003 43; Decl. 59, 62, 67-68, Ex. A cl. 10[b]).
Monroe discloses returning the archived images and/or sensor data
according to the data request. (Decl. 59, 67-68, Ex. A cl. 10[c]). Through the
GUI, Monroe returns archived images for a user to view. (See Ex. 1003 257, Fig.
4; Decl. 59, 62, 67-68, Ex. A cl. 10[c]). For example, the bottom of the screen
contains a series of controls used for image searching and browsing, and [a] play
button 45 causes stored images from the current camera to be displayed
sequentially. (Ex. 1003 257; see also 262; Decl. 59, 67-68, Ex. A cl. 10[c]).
Accordingly, claim 10 is anticipated by the disclosure of Monroe. (Decl. 58, 68,
Ex. A cl. 10[pre]-[c]).
7.
Dependent Claim 11
Claim 11, which depends from claim 1, additionally recites: wherein the
21
monitoring device data processor obtains archival retrieval parameters from the
archival profile and determines whether the archival request satisfies the archival
retrieval parameters.
Monroe discloses obtaining retrieval parameters, such as retrieval by date,
time, event, user, and/or camera, and determining whether the request satisfies the
retrieval parameters, since each data event, image or frame [] received, [] is filed
with a unique identifier comprising date, time, camera or encoder and/or file
information. (See Ex. 1003 43; Decl. 59, 62, 68, Ex. A cl. 11). Accordingly,
claim 11 is anticipated by the disclosure of Monroe. (Decl. 58, 68, Ex. A cl. 11).
8.
Dependent Claim 12
Claim 12, which depends from claim 1, additionally recites: wherein the
monitoring device data processor further uncompresses the archived data.
Monroe disclose that the video signals are digitally compressed for
transmission and decompressed at the receiving end. (Ex. 1003 17; Decl. 5859, 65, 68, Ex. A cl. 12). Accordingly, claim 12 is anticipated by the disclosure of
Monroe. (Decl. 58, 68, Ex. A cl. 12).
9.
Independent Claim 17
22
1[a]-[b] & 17[a]-[b]). Elements [c]-[d][ii] of claim 17 corresponds to elements [d][e][ii] of claim 1, except that claim 17 refers to a storage medium where claim 1
refers to a data repository. (Decl. 58, 68, Ex. A cls. 1[d]-[e][ii] & 17[c][d][ii]). The disclosure in Monroe for respective elements of claim 1 are the same
for corresponding elements of claim 17, see V.A.1. (Decl. 58, 68, Ex. A cls. 1
& 17).
The preamble of claim 17 requires instructions to perform the above method
are included in a computer-readable medium. Monroe teaches that the disclosed
methodology will be performed by processing devices executing stored
instructions. (See Ex. 1003 28, 36, 112, 117, 183, 195, 213, 264; Decl. 58,
59, 68, Ex. A cl. 17[pre]). Therefore, claim 17 is invalid as anticipated by Monroe.
(Decl. 58, 68, Ex. A cl. 17).
10.
Dependent Claim 18
Claim 18, which depends from claim 17, additionally recites: wherein the
monitoring device data includes device state information and wherein processing
the incoming monitoring device data includes processing the device state
information according to a device state portion of the archival profile.
Monroe discloses that monitoring device data includes device state
information, such as ON/OFF status of the device or local time of day, which is
processed according to the archival profile. (See Ex. 1003 136, 156; Decl. 59,
23
61, 68, Ex. A cl. 18). Monroe discloses that events detected at remote locations
and generating signals in response to such detection can also be incorporated in the
system for transmitting event data via the network 5 to the server including on a
much simpler basis, the archiving and retrieval of these simple ON/OFF event
signals. (Ex. 1003 136; Decl. 59, 61, 68, Ex. A cl. 18). Monitoring devices
also generate time-related device state information because each camera must be
equipped with its own local clock, and cameras append their local time to the
image data. (Ex. 1003 156; Decl. 59, 61, 68, Ex. A cl. 18). Accordingly,
claim 18 is anticipated by the disclosure of Monroe. (Decl. 58, 68, Ex. A cl. 18).
11.
Dependent Claim 19
Claim 19, which depends from claim 18, which further depends from claim
17, additionally recites: wherein the device state information can include data
selected from a group consisting of a status of a monitoring device, a time of day,
value for one or more sensors associated with the monitoring device, a premises
identifier, and a user identifier.
As discussed above, see V.A.10, Monroe discloses device state
information. (See Ex. 1003 136, 156; Decl. 59, 61, 68, Ex. A cl. 18 & 19).
The device state information can be status of a monitoring device, such as ON/OFF
status, or a time of day, such as local time. (See Ex. 1003 136, 156, 159, 237;
Decl. 59, 61, 68, Ex. A cl. 19). Accordingly, claim 19 is anticipated by the
24
Dependent Claim 20
Claim 20, which depends from claim 17, additionally recites substantially
similar elements as claim 10. (Decl. 58, 68, Ex. A cls. 10, 17 & cl. 20).
Elements [a]-[d] of claim 20 correspond to elements [pre]-[c] of claim 10,
respectively, see V.A.6. (Decl. 58, 68, Ex. A cls. 10[pre]-[c] & 20[a]-[d]).
Accordingly, claim 20 is anticipated by the disclosure of Monroe. (Decl. 58, 68,
Ex. A cl. 20).
B.
Ground 2: Claims 1, 3, 4, 9, 10, 17, and 20 Are Obvious Over
Mangasarian in View of Walker
Claims 1, 3, 4, 9, 10, 17, and 20 are rendered obvious under 103 by
Mangasarian (Ex. 1004) in view of Walker (Ex. 1005). (Decl. 69). Mangasarian
and Walker are both directed to monitoring data on a network. (Decl. 89). While
claims of the 347 patent refer to device data, Mangasarian discloses one example
of monitoring device data, network data, that falls within that category of data.
(Decl. 70). The 347 patent claims a monitoring device data processor that
manages the device data, where Mangasarian discloses one example of such a
monitoring device data processor: protocol analyzers, or sniffers, that monitor
network data. (Ex. 1004 1:14-19; Decl. 70). Where claims of the 347 patent
refer to determining whether an archival profile is associated with archival
attributes of the data, Mangasarians protocol analyzer discloses one example of a
25
profile, using filters to capture and/or store only those network data packets that
meet certain criteria for later analysis. (See Ex. 1004 1:19-23; Decl. 70). Protocol
analyzers also allow for remote management through use of a remote probe to
monitor and gather data and a host computer to display and analyze data. (See Ex.
1004 1:55-67; Decl. 70). Mangasarian discloses a protocol analyzer system with
network interface cards and remote probes that capture data network data packets,
a remote probe buffer and/or protocol analyzer memory or mass storage to store
data packets according to the routines profile, and a remote probe processor and
protocol analyzer processor that obtains a profile with filter routines, classification
routines, and upload routines that obtains data packets on a network captured by a
remote probe, determines whether the routines are associated with attributes that
match packet selection criteria, processes, and selectively stores the data packets in
the buffer of the remote probe or in the memory or mass storage of the protocol
analyzer host. (Decl. 70). Mangasarian does not expressly disclose processing
and selectively storing the data packets in a compressed format. (Decl. 71).
However, Walker discloses compressing monitoring data (e.g., packets, frames,
cells or protocol data units) prior to transmission. (Decl. 71, 95).
1.
Independent Claim 1
26
cards or remote probes) generating monitoring device data (e.g., network interface
cards or remote probes capturing network data packets) with archival attributes
(e.g., packet selection criteria), a monitoring device data processor (e.g., remote
probe processor or protocol analyzer processor) for obtaining an archival profile
(e.g., filter routines; classification routines; upload routines) corresponding to data
archival attributes (e.g., packet selection criteria) for processing the monitoring
device data according to the archival profile, and a data repository (e.g., remote
probe buffer or protocol analyzer memory or storage) for storing monitoring device
data according to the archival profile. (Decl. 70, 72, 74, 95, Ex. B cl. 1).
Mangasarian discloses the elements of claim 1 in at least two ways. (Decl.
72). In one approach (First Perspective), the claimed monitoring device is a
network interface card 202, the claimed monitoring device data processor is a
processor of remote probe 107 operating in conjunction with the protocol
analyzer/host 111, and the claimed data repository is the remote probes packet
buffer and/or class tracking buffer. (See e.g., Ex. 1004 4:46-49, 5:6-15, 5:16-22,
5:34-36, 5:45-46, 5:51-56, Figs. 1, 2; Decl. 72, 74, 95, Ex. B cl. 1[a]-[c]).
Alternately (Second Perspective), the claimed monitoring device is the
remote probe 107, the claimed monitoring device data processor is the processor of
protocol analyzer/host 111 in Fig. 1 that is connected to the host network interface
in Fig. 2, and the claimed data repository is the protocol analyzer/host memory or
27
mass storage. (See Ex. 1004 6:38-40, 6:15-26, Figs. 1, 2; see also 4:61-65; Decl.
72, 75, 95, Ex. B cl. 1[a]-[c]). Under either approach, additional data repositories
include one or more locations of shared storage such as disk farm (not shown)
that provides mass storage capacity beyond what an individual [remote probe or
protocol analyzer] device can efficiently use and manage. (Ex. 1004 4:29-36, Fig.
1; Decl. 75, 82, 95, Ex. B cl. 1[c]).
Claim 1 describes the system for processing monitoring device data that
includes monitoring devices generating monitoring device data, a monitoring
device data processor for obtaining an archival profile and processing monitoring
device data accordingly, and a data repository for storing the monitoring device
data. (Decl. Ex. B cl. 1[pre]-[c]).
(a)
28
29
30
probe executes filter routines 214, classify routines 224 and upload routines 234
among other programs. (Ex. 1004 5:17-22; see also 5:36-39, 6:48-50; Decl. 74,
77-78, 95, Ex. B cl. 1[b]).
Where claim 1 claims the monitoring device data processor determining
whether the archival profile is associated with one or more archival attributes of
the incoming monitoring device data, Mangasarian discloses using an example of a
specific profileconsisting of filter routines, classification routines, and upload
routinesto determine whether data packets have attributes matching packet
selection criteria. (Decl. 80, 95, Ex. B cl. 1[d]). Specifically, Mangasarian
discloses that remote probe filter routines operate to select packets meeting
predefined criteria and classify/classification routines operate to associate a class
code with each of the selected packets. (Ex. 1004 2:42-47; see also 5:34-42, cl.
13; Decl. 74, 80, 95, Ex. B cl. 1[d]). The routines discriminate between packet
types, and selection criteria for packets [include] type, size, source node
identification, destination node identification, and the like. (Ex. 1004 6:47-51;
1:19-23; Decl. 80-81, 95, Ex. B cl. 1[d]).
While claim 1 claims a monitoring device data processor processing and
selectively storing the incoming monitoring device data in a data repository if the
archival profile is associated with one or more archival attributes, Mangasarian
discloses the remote probe processor processing and selectively storing the
31
32
one association between a class entry 216 and a buffer entry 218. (Ex. 1004 5:4546, 5:54-56; Decl. 74, 80-82, 95, Ex. B cl. 1[e]-[e][ii]). Also, upload routines
234 may include data processing routines that perform analytic and/or statistical
operations on packet buffer entries 218. (Ex. 1004 6:6-8; Decl. 78-79, 95, Ex.
B cl. 1[e]-[e][ii]).
(b)
33
34
Mangasarian discloses all the above elements of claim 1 but does not
expressly disclose processing and storing the incoming monitoring device data in a
35
36
captured data may be too large or require too much space for transmission and
storage. In such situations, a person of ordinary skill in the art would realize that it
would be advantageous to have the ability to process and store data in a
compressed format. (Decl. 86). Mangasarian states that one problem in the prior
art is the massive quantity of data captured in a typical environment creates a
significant obstacle in remote management and slowly transporting it over the
networks requires an unacceptable amount of time. (Ex. 1004 2:5-17; Decl.
87). Mangasarian expressly recognizes that [a] need exists for system, methods
and software to more efficiently transport probe data. (Ex. 1004 2:14-16; Decl.
87). While Mangasarian partially solves this problem through use of filtering, a
person of ordinary skill in the art would recognize that compressing data for
storage and transport would further increase efficiency. (Decl. 87). Walker
teaches, in its disclosure of a network monitoring system, processing monitoring
device data into a compressed format prior to transmission. (See Ex. 1005 7:45-48,
11:5-9, 14:22-25, 15:7-12; Decl. 88, 95, Ex. B cl. 1[e][i]).
A person of ordinary skill in the art would have been motivated to combine
Walkers processing of data into a compressed format with Mangasarian because
both references are directed to a system and method of monitoring data on a
network. (Decl. 89). A person of ordinary skill in the art would recognize that
Walker describes compression as a way to reduce the amount of data to be
37
transferred through the network, and would have found it obvious to combine such
teachings with the teachings of Mangasarian to more efficiently transport probe
data. (Decl. 89). Accordingly, claim 1 is obvious over Mangasarian in view of
Walker. (Decl. 89, 95, Ex. B cl. 1[e][i]).
2.
Independent Claim 17
38
more processing units, memory, mass storage, and software configured to monitor
network traffic and capture all or selected portions of the monitored traffic. (Ex.
1004 4:46-49; Decl. 74, 90, 95, Ex. B cl. 17[pre]-[a]). Probe processor 204
comprises, for example, a Pentium-class microprocessor [with] program code used
to implement [filter, classify, and upload] routines. (Ex. 1004 5:16-22; Decl. 74,
90, 95, Ex. B cls. 17[pre] & 1[b]). The [p]rogram code [is] in the form of
executable code, scripts, applets, or the like describing filter routines 214 and
classification routines 224 is generated on a host and are either downloaded to
probe processor or stored in [probe] processor 204 that is customized by
downloading parameters and/or code components to implement specific filters and
classification operations. (Ex. 1004 5:23-33; Decl. 77, 90, 92, 95, Ex. B cl.
17[pre][d][ii]).
In the second application, the medium disclosed is the [p]rotocol analyzers
that typically include one or more processing units, memory, mass storage, and
software configured to program remote probes. (Ex. 1004 4:61-64; Decl. 75-80,
90, 95, Ex. B cl. 17[pre]). The protocol analyzer [p]rocessor 304 executes stored
program code to implement filter specification routines 314, class specification
routines 324, upload routines 334, and user interface generator 344. (Ex. 1004
6:38-40; Decl. 75-80, 90, 95, Ex. B cl. 17[pre]-[d][ii]). Accordingly, claim 17 is
invalid as obvious over Mangasarian and Walker. (Decl. 69, 95, Ex. B cl. 17).
39
3.
Dependent Claim 3
Dependent Claim 4
40
event archival attribute (criteria specified by a user that are used to select data
packets, including those related to events). (Decl. 91-92, 95, Ex. B cl. 4).
Specifically, Mangasarian discloses that the archival profilefilter and
classification routinesdescribe the logic and variables required to discriminate
between packet types [and] select packets having characteristics specified in the
routines. (Ex. 1004 6:38-51; Decl. 78-80, 95, Ex. B cl. 4). Such packet
selection characteristics may encompass those related to events. (Decl. 92, 95,
Ex. B cl. 4). Accordingly, claim 4 is invalid as obvious over Mangasarian and
Walker. (Decl. 69, 95, Ex. B cl. 4).
5.
Dependent Claim 9
41
entry for every class code associated with its respective data packet. (Ex. 1004
5:47-56; Decl. 74, 82, 95, Ex. B cl. 9). In the Second Perspective, Mangasarian
discloses that the protocol analyzer has both memory and auxiliary devices to
provide . . . mass storage for storage of the captured data packets. (Ex. 1004 4:6165, 6:15-18; Decl. 75, 82, 95, Ex. B cl. 9). Additionally, under both reads,
Mangasarian discloses for each of the remote probe and the protocol analyzer, [i]n
addition to local memory and storage associated with each device, it is often
desirable to provide one or more locations of shared storage such as disk farm (not
shown) that provides mass storage capacity beyond what an individual device can
efficiently use and manage. (Ex. 1004 4:29-34; Decl. 82, 95, Ex. B cl. 9).
Where claim 9 claims that the monitoring device data processor selectively
replicates at least a portion of the incoming monitoring device data in at least two
data repositories, Mangasarian discloses one example, selectively replicating
portions of the data packets from the probe buffer to protocol analyzer. (See Ex.
1004 6:15-18; Decl. 82, 95, Ex. B cl. 9). Specifically, Mangasarian discloses
that a host includes both memory and mass storage. (See Ex. 1004 6:15-18,
3:2-7; see also 5:66-6:5, 7:17-25; Decl. 82, 95, Ex. B cl. 9). The Mangasarian
host computer memory availability may be less than the size of the probe buffer
so that the host does not upload the entire set of packets from the probe, which
allows a user to specify and select which contents of the probe buffer are
42
Dependent Claim 10
43
44
discloses one example of the processor of the protocol analyzer processing the
archival profile, using class codes resulting from filter routines and classification
routines to select portions of data, to retrieve one specific example of data from
one example of a data repository, selected packet buffer entries from packet buffer
in remote probe. (Decl. 92-93, 95, Ex. B cl. 10[b]). Mangasarians system has a
host [p]rocessor 304 [that] executes stored program code to implement filter
specification routines 314, class specification routines 324, upload routines 334,
and user interface generator 344. (Ex. 1004 6:38-40; Decl. 75, 77, 95, Ex. B cl.
10[b]). Using the routines, the host processor is operable to retrieve data from the
capture unit based upon the classification tag associated with each captured packet
and analyze the retrieved data. (Ex. 1004 cl. 5; Decl. 92-93, 95, Ex. B cl.
10[b]). Specifically, Mangasarian discloses that after upload routines enable[] a
user to select portions of the contents of packet buffer 208 for upload using the
class code information, the host requests class code information and then uses
the class information to enable intelligent selection of portions of packet buffer 208
to be downloaded. (Ex. 1004 5:67-6:5, 6:57-7:3; Decl. 77-78, 82, 92-93, 95,
Ex. B cl. 10[b]).
While claim 10 recites that the monitoring device processor returns the
archived data according to the data request, Mangasarian discloses one example of
the host processor returning specific data, network data packets corresponding to
45
selected class code. (Decl. 93, 95, Ex. B cl. 10[c]). Specifically, Mangasarian
discloses that the host retrieve[s] data from the capture unit based upon the
classification tag associated with each captured packet, and in conjunction with
user interface generator 344, can visually depict the data. (Ex. 1004 cl. 5, 7:55-63,
7:1-3, Fig. 4; Decl. 93, 95, Ex. B cl. 10[c]). Accordingly, claim 10 is invalid as
obvious over Mangasarian and Walker. (Decl. 69, 95, Ex. B cl. 10).
7.
Dependent Claim 20
Claim 20, which depends from claim 17, additionally recites substantially
similar elements as claim 10. (Decl. 69, 95, Ex. B cls. 10, 17 & 20). Elements
[a]-[d] of claim 20 correspond to elements [pre]-[c] of claim 10, respectively, see
V.B.6. (Decl. 69, 95, Ex. B cls. 10[pre]-[c] & 20[a]-[d]). Accordingly, claim
20 is invalid as obvious over Mangasarian and Walker. (Decl. 69, 95, Ex. B cl.
20).
VI.
46
Olivistar, LLC v. Amegy Bank Natl Assn, 2:15-cv-311; Olivistar, LLC v. Am.
Bank of Tex., 2:15-cv-313; Olivistar, LLC v. Bank of Am. Corp., 2:15-cv-314;
Olivistar, LLC v. WoodForest Natl Bank, 2:15-cv-315; Olivistar, LLC v. BOK Fin.
Corp., 2:15-cv-316; Olivistar, LLC v. Wells Fargo Bank, NA, 2:15-cv-318;
Olivistar, LLC v. BBVA Compass Bancshares, Inc., 2:15-cv-319; Olivistar, LLC v.
The Bank of N.Y. Mellon Corp., 2:15-cv-331; Olivistar, LLC v. Capital One, Natl
Assn, 2:15-cv-321; Olivistar, LLC v. Citicorp, 2:15-cv-322; Olivistar, LLC v. City
Bank, 2:15-cv-323; Olivistar, LLC v. First United Bank & Trust Co., 2:15-cv-324;
Olivistar, LLC v. HSBC USA Inc., 2:15-cv-325; Olivistar, LLC v. JPMorgan Chase
& Co., 2:15-cv-326; Olivistar, LLC v. TD Bank US Holding Co., 2:15-cv-327;
Olivistar, LLC v. PlainsCapital Bank, 2:15-cv-328; Olivistar, LLC v. Regions
Bank, 2:15-cv-329; Olivistar, LLC v. TD Bank US Holding Co., 2:15-cv-327;
Olivistar, LLC v. The PNC Fin. Servs. Group, Inc., 2:15-cv-330; Olivistar, LLC v.
LegacyTexas Bank, 2:15-cv-331.
These judicial matters may affect, or be affected by, decisions made in this
proceeding.
C.
47
LEAD COUNSEL
Joseph Melnik
Reg. No. 48,741
jmelnik@jonesday.com
JONES DAY
1755 Embarcadero Road
Palo Alto, California 94303
Telephone: (650) 739-3939
Facsimile: (650) 739-3900
BACK-UP COUNSEL
An P. Doan
Reg. No. 57,085
apdoan@jonesday.com
JONES DAY
1755 Embarcadero Road
Palo Alto, California 94303
Telephone: (650) 739-3939
Facsimile: (650) 739-3900
Respectfully submitted,
/Joseph Melnik/
Joseph Melnik
Registration No. 48,741
jmelnik@jonesday.com
JONES DAY
1755 Embarcadero Road
Palo Alto, California 94303
Lead Counsel for Petitioner
48
CERTIFICATE OF SERVICE
The undersigned hereby certifies that a copy of the foregoing Petition for
Inter Partes Review of U.S. Patent No. 8,239,347 and all supporting exhibits were
served on May 18, 2015, upon the following parties via UPS delivery:
Sean S. Wooden
Andrews Kurth LLP
1350 I Street, NW
Suite 1100
Washington, DC 20005
/Joseph Melnik/
Joseph Melnik
Registration No. 48,741
jmelnik@jonesday.com
JONES DAY
1755 Embarcadero Road
Palo Alto, California 94303
Lead Counsel for Petitioner