Software Rights Archive, LLC v. Google Inc. et al

Filing 213

RESPONSE to Motion re 198 Opposed MOTION Granting Defendants Leave to Amend and Supplement Invalidity Contentions filed by Software Rights Archive, LLC. (Attachments: # 1 Exhibit, # 2 Exhibit, # 3 Exhibit, # 4 Exhibit, # 5 Exhibit, # 6 Exhibit, # 7 Exhibit, # 8 Affidavit, # 9 Text of Proposed Order)(Kaplan, Lee)

Download PDF
Software Rights Archive, LLC v. Google Inc. et al Doc. 213 Att. 2 Exhibit 2 Dockets.Justia.com INVALIDITY CLAIM CHART FOR US PATENT No. 5,832,494 BASED ON DE BR, P. AN POST, R.D.J., "lNORMTIONRETRIEVAL IN THE WORLD-WIDE WEB: MAKIG CLIENT-BASED SEARCIDG FEASffLE." IN COMPUTER NETWORKS AN ISDN SYSTEMS VOL. 27, PP. 183-192 (1994) ("DEBRA, 1994") 1. A method of analyzing a database with indirect relationships, using links and nodes, comprising the See, e.g., DeBra, 1994, at Abstract, pp. 183-84, 185 steps of: Finding specific infoniiation in the World Wide Web (W or Web for short) is becoming increasingly difficult. (DeBra, 1994, Abstract) The World-Wide Web ... is a fast growing wide-area hypermedia dataase. It contains infoniiation on many related and unrelated topics.... However, a hyperteÀi document like the WW, distributed over hundreds or even thousands ofloosley coupled sites can only be searched by retrieving documents and scanning them for related information, and also scanning them for extracting links pointig to other documents. ... (S)everal tyes of solutions have been proposed and implemented: (1) specially designing metahyperdocuments ... (2) robot-based searchable indecies ... (3) client-based search tools, most notably our fish search (DeBra, 1994, p. 183-84) 2.2 The schools offish metaphor. The algorithm simulates a school fish, breeding and searching for food. .. Tn the físh-search each URL corrcsponds to a fish. Whcn a docwnent is retrieved the fish breeds a number of children, depending on whether the document is relevant (contrns food) and also depending on the number oflinks (URLs) embedded in the document. Each time a relevant document is found the fish and its children become stonger. If a document is not relevant the fish become weaker and fewer children are produced. Aftr following a number oflins in a direction without finding a relevant document the search stops.... the search .... Thc fish are simulatcd by means of a list of URLS. The average number of children produced each time is called width. The number of steps made (by a fish or its offspring) without finding a relevant docmuent is called depth. Each time a relevant document is found a selection of the embedded links are added to the front of ths list. (DeBra, 1994, i 85) 2.3 The implementation of 1 (lal Selecting a node for analysis; See, e.g., DeBra 1994, at p. 185 2.2 The schools offish metaphor. The algorithm simulates a school fish, breeding and searching for food... In the fish-search each URL corresponds to a fish. When a document is retreved the fish breeds a number of children, depending on whether the document is relevant (contans food) and also depending on the number oflinks (URLs) embedded in the document. Each time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. Aftr following a number oflinks in a direction without finding a relevant document the search stops.... the search .... The fish are simulated by means of a list of URLS. The average number of children produced each time is called width. The number of steps made (by a fish or its offspring) without finding a relevant document is called depth. Each time a relevant document is found a selection of the embedded links are added to the front of this list. (DeBra 1994, 185) 2.3 The implementation of Furter, disclosed either expressly or inherently in the teachings of incorporated disclosures taken as a whole, or in combination with the state of the time of the reference and its the art at the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this char. Disclosed either expressly or inherently in the teachings of incorporated disclosures taen as a whole, or in combination with the state of the time of (lb) Generaing candidate clusterlinks for the selected node, wherein the step of generating comprises an analysis of one or more indirect relationships in the the reference and its datase; the art at the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 sttement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this char. the reference and its (Ic) Deriving actal clustr links from the candidate Disclosed either expressly or inherently in the teachings of incorporated disclosures taken as a whole, or in combination with the state of the tie of cluster links; the art at the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and accompanying chars. Rather than repeat those 2 disclosures here, they are incorporated by reference into this char. (ld.l identifying one or more nodes for display; and See, e.g., DeBra 1994, at p. 185 The result of a search is a: list of (relevant documents), with the "relevance score" of each document. the actu cluster lins. " (le.l displaying the identity of one or more nodes using I See, e.g., DeBra 1994, at Fig. 1, p. 185 l.~~'r~i; ¡ ¡¡~æ.s..m s:,"-.,,~r,~l., ;ä~Mr t;~~ I r.1 f i ¡~~~::ir::~~5'~~if=~::il ~~~~ ~ .. .1 j ¡;:¡¡. ..~:...;""..~:. ~.+.v:.."."":.....""""":"'¡"~,,............, .0;' ...... ~iI...:. .,...""..:-... .:.:~it...:.........,¡~ ..... f. The result of a search is a list of (relevant documents), with the "relevance score" of each document. 3 2. The method of clai 1 wherein each link is given a See, e.g., DeBra" 1994, at p. 185 lengt, the step of generating the candidate cluster lins comprises the steps of: 2.2 The schools offish metaphor. The algorith simulates a school fish, breeding and searching for food '" Eah tie a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. Afer tòllowing a number OflUiks in a directon wi.thout finding a relevant document the search stops .... 2.3 The implementation of the search .... The fish are simulated by means of a list of URLS. TIie average number of children produced each time is caled width. The number of steps made (by a fish or its offspring) without fiding a relevant document is called depth. Each time a relevant document is found a selection oftlie embedded links are added to the front of ths list. (DeBra 1994, 185) (2aJ Choosing a number as the maximum number of link lengths that wil be examined; and See, e.g., DeBra" 1994, at p. 185 2.2 The schools offish metaphor. The algoritInn simulates a school fish, breeding and searching for food ... Each time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. Aftr following a number oflinks in a direction without finding a relevant document the search stops .... the search .... The fish are simulated by means ofa list of URLS. The average number of children produced each time is called width. The number of steps made (by a fish or its offspring) without finding a relevant document is called depth. Each time a relevant document is found a selection of the embedded links are added to tiie front of this list. (DeBra, 1994, 185) 2.3 The implementation of (2bl exaining only those lins which are less than the I See, e.g., DeBra 1994, at p. 185 ma'Ómum number of link lengts. 2.2 The schools of fish metaphor. The algorithm simulates a school fish, breeding and searching for food ... Each time a relevant document is found the fish and its children become stroniier. If a document is not relevat the fish become weaker and fewer 4 children are produced. Aftr following a number of links in a direction without finding a relevant document the search stops .... the search .... The fish are simulated by means of a list of URS. The average number of children produced each time is caled width. The number of steps made (by a fish or its offspring) without finding a relevant document is called depth. Each time a relevant document is found a selection of the embedded links are added to the frnt of ths list. (DeBra 1994, 185) 2.3 TIie implementation of 3. The metod of claim 1 wherein the step of deriving actual cluster links comprises the step of: See, e.g., DeBra 1994, atp. 185 2.2 The schools offish met.1.phor. The algorithm simulates a school fish, breeding and selecting the top rated candidate clu&ter links, wherein the top rated candidate cluster links are those which are searching for food... In the fish-search each URL corresponds to a fish. When a most closely lined to the node under analysis. document is retrieved the fish breeds a number of children, depending on whether the document is relevant (contans food) and also depending on the number oflinks (URLs) embedded in the document. Each time a relevant document is found the fish and its children become stonger. If a document is not relevant the fish become \veaker and fewer children are produced. Aftr following a number of lins in a direction without finding a relevant document the search stops .... the search .... The fi.sh are simulated by means of a list of URLS. The average number of children produced each time is called width. The number of steps made (by a fish or its offspring) without fInding a relevant document is called depth. Each time a relevant document is found a selection of the embedded links are added to the front of ths list. (DeBra 1994, 185) 2.3 The implementation of Furter, disclosed either expressly or inherently in the teachings of incorporated disclosures taken as a whole, or in combination with the state of the time of the reference and its the art at the alleged invention, as evidenced by substantial other references identified in Defendants' P. R. 3-3 statement and accompanying chars. Raher than repeat those disclosures here, they are incorporated by reference into this chart. 5 5. The method of claim 1 wherein the step of generating the candidate cluster links comprises the step of: See, e.g., DeBra, 1994,atp. 185 2.2 The schools offish metaphor. The algorithm simulates a school fish, breeding and searching for food... hi the fish-search each URL corresponds to a fish. When a document is retreved the fish breeds a number of children, depending on whether thc eliminating candidate cluster links, wherein the number of candidate cluster links is limitcd and the closest candidate cluster links are chosen over the remaining links. document is relevant (contans food) and also depending on the number oflinks (URLs) embedded in the document. Each time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. Aftr following a number oflinks in a direction without finding a relevant document the search stops .... the search .... The fish are simulated by means of a list of URLS. The average number of children produced each time is called width. The number of steps made (by a fish or its offspring) without finding a relevant docuttent is called depth. Each time a relevant document is found a selection of the embedded links arc added to the front of this list. (DeBra, 1994, 185) 2.3 The implementation of Furter, disclosed either expressly or inherently in the teachings of incorporated disclosures taken as a whole, or in combination with the stte of the time of the reference and its the art at the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this char. Disclosed either expressly or inherently in the teachings of incorporated disclosures taen as a whole, or in combination with tlie state of the time of 7. The method of claim 1, wherein one or more nodes provide extrnal connections to objects externl to the database, the method furer comprising the steps of: the reference and its the art at the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 sttement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this char. (7aJ Activating the desired node; and Disclosed either expressly or inherently in the teachings of incorporated disclosures taken as a whole, or in combination with the state of the time of the reference and its the art at the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and accompanving chars. Raer than repeat those 6 disclosures here, they are incorporated by reference into this char. (7b) Accessing thc external object linked to the node. Disclosed either expressly or inherently in the teachings of incorporated disclosures taen as a whole, or in combination with the stte of the time of in Defendants' P. R. 3.3 statement and accompanying chars. Rather the reference and its the art at the alleged invention, as evidenced by substantial other references identified than repeat those disclosurs here, they are incorporated by reference into this char. the reference and its 8. The method of claim 7, wherein the external object Disclosed either expressly or inherently in the teachings of is an independent application which can be executed in incorporated disclosures taen as a whole, or in combination with the state of the ar at background, the method furter comprising the step of: the time of the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and accompanying chars. Rather than repeat those disclosures here, they are incorporated by reference into this char. (8a) executing the independent application. Disclosed either expressly or inherently in the teachings of the reference and its incorporated disclosures taen as a whole, or in combination with the state oftlie art at the time of the alleged invention, as evidenced by substantial other references identified in Defendants' P. R. 3-3 statement and accompanying charts. Rather than repeat those disclosurs here, they are incorporated by reference into this chart. 9. The method of clai 8, wherein one or more nodes tlie time of Disclosed cithcr expressly or inherently in the teachings of incorporated disclosures taen as a whole, or in combination with the state of the reference and its the ar at provide links to more than one independent application which can be executed as an extension, the method further comprising the stps of: the alleged invention, as evidenced by substatial other references identified in Defendants' P. R 3-3 statement and accompanying chars. Rather than repeat those disclosures here, they are incorporated by reference into this char. iii dependent applications (9a) displaying a list of linked to the node, wherein the step of accessing See, e.g., DeBra 1994, at Fig. 1, p. 185 accesses an independent application. . 7 ¡ Íl~";'~~" I~!I~ ~l '' f I !ç:~.:l CMi.fr¿")rd;;~:: (.'..~.:f !?-s:L .~l The result of a search is a list of (relevant documents), witl tle "relevance score" of each document. Disclosed either expressly or inherently in the teachings of incorporated disclosures taen as a whole, or in combination with tle stte of the reference and its 10. The method of claim 8, wherein the connection provides the independent applicaton access to tle information stored within the database. the ar at the time oftle alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and accompanying chars. Rather than repeat tlose disclosures here, tley are incorporated by reference into this char. Disclosed either expressly or inherently in tle teachings ofthe reference and its incorporated disclosures taen as a whole, or in combination with the stte ofthe ait at the time of 11. The method of claim 7, wherein the external connection is to anotlier computer, wherein information is located tlat can be accessed, the step of the alleged invention, as evidenced by substatial otler references identified accessing furter comprising the step of: in Defendants' ,Po R. 3-3 statement and accompanying charts. Rather than repeat those disclosures here. tlev are Incomorated bv reference into this chart. 8 Disclosed either expressly or inherently in the teachings oftlie reference and its incorporated disclosures taen as a whole, or in combination with the state of the time of (1Ia) accessing the information located within the computer. the ar at the alleged invention, as evidenced by substantial other references identified in Defendants' P. R. 3-3 sttement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this chart. 12. A method for determining the proximity of an object in a stored database to another object in the stored database using indircct relationships, lùiks, and a display, comprising: See, e.g., DeBra 1994, at p. 185 2.2 The schools offish metaphor. The algorithm simulates a school fish, breeding and searching for food... In the fish-search each URL corresponds to a fish. When a document is retreved the fish brceds a numbcr of childrn, depending on whcther thc document is relevant (contains food) and also depending on the number oflinks (URLs) embedded in the document. Each time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. After following a number of links in a direction without finding a relevant document the search stops .... 2.3 The implementation of the search .... .The fish are simulated by means of a list of URLS. The average number of children produced each time is called width. The number of stcps madc (by a fish or its offspring) ",'thout finding a relevant document is callcd depth. Each time a relevant document is found a selection of the embedded links are added to the front of this list. (DeBra 1994, 185) Further, disclosed either expressly or inherently in the teachigs of incorporated disclosures taken as a whole, or in combination with the state of the time of the reference and its the art at the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this char. (I2a) Selecting an object to determine the proximity of I See, e.g., DeBra, 1994, at p. 185 other objects to the selected object; 9 2.2 The schools offish metaphor. The algoritl simulates a school fish, breeding and searching for food .., In the fish-search each URL corresponds to a fish. When a document is retrieved the fish breeds a number of children, depending on whether the document is relevant (contans food) and also depending on the number oflinks (URs) embedded in the document. Each time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become ,veaker and fewer children are produced. Aftr follo"ving a number of links in a direction without finding a relevant document the search stops .... 2.3 The implementation of the search .... The fish are simulated by means of a list of URLS. The averae number of children produced each time is called width. The number of steps made (by a fish or its offspnng) without finding a relevant document is called depth. Each time a relevant document is found a selection of the embedded links are added to the front of ths list. (DeBra, 1994, 185) Furter, disclosed either expressly or inherently in the teachings of incorporated disclosures taen as a whole, or in combination with the stte of the time of the alleged invention, as the reference and its the art at evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this chart. Disclosed either expressly or inherently in the teachings of incorporated disclosures takèn as a whole, or in combination with the stte of the time of (12bJ generating a candidate clustr lin set for the the reference and its the ar at selected object, wherein the generating step includes an analysis of one or more indirect relationships in the database; the alleged invention, as evidenced by substatial other references identified in Defendants' P. R 3-3 staement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this char. the reference and its (12c J Denvig an actual cluster link set for the selected Disclosed either expressly or inherently in the teachings of incorporated disclosures taen as a whole, or in combination with tlie state oftlie art at object using the generated candidate cluster link set; the time of the alleged invention, as evidenced by substantial other references identified and in Defendants' P. R. 3-3 sttement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this chart. 10 Disclosed either expressly or inherently in the teachings of incorporated disclosures taken as a whole, or in combination with the stte of the time of the objects in the (12dJ Displaying one or more of dataase, referred to in the actual clustr link set, on a display. disclosures here, they are incorporated by reference into this char. the reference and its the art at the alleged invention, as evidenced by substantial other references identified in Defendats' P. R. 3-3 statement and accompanying chars. Rather than repeat those 13. The method of 12 wherein a set of direct lins exists for the database, and wherein the step of generating a candidate cluster link set comprises: See, e.g., DeBra, 1994, at p. 185 2.2 The schools offish metaphor. The algorith simulates a school fish, breeding and searching for food ... In the fish-search each UR corresponds to a fish. When a recursively analyzing portions of the set of direct links for indirect links. document is retrieved the fish breeds a number of children, depending on whether the document is relevant (contains food) and also depending on the number oflins (URLs) embedded in the document. Each time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. After following a number of links in a direction without finding a relevant document the search stops .... 2.3 The implementaion of the search .... The fish are simulated by means of a list of URS. The average number of children produced each time is called width. The number of stps made (by a fish or its offspring) \vithout fiding a relevant document is called depth. Each time a relevant document is found a selection of the embedded links are added to the front of ths list. (DeBra 1994, 185) Furter, disclosed either expressly or inherently in the teachings of incorporated disclosures taen as a whole, or in combination with the state of the time of the reference and its the art at the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and accompanying chars. Rather than repeat those disclosures here, they are incorporated by reference into this char. 14. A method for representing the relationship between I See, e.g., DeBra 1994, at p. 185 nodes using stored direct links, paths, and candidate cluster links, comprising tlie steps of: orithm simulates a school fish, breeding and 11 searching for food ... In the fish-search each UR corresponds to a fish. \V'hen a document is retrieved the fish breeds a number of children, depending on whether the document is relevant (contains food) and also depending on th.e number oflinks (URLs) embedded in the dociuent. Each time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. Aftr follo\ving a number of links in a direction without finding a relevant document the search stops .... 2.3 The implementaion of the search .... The fish ar simulated by means of a list of URS. The averae number of children produced each tie is called width. The number of stps made (by a fish or its offspring) without fiding a relevant document is called depth. Each time a relevant document is found a selection of the embedded links are added to the front of this list. (DeBra, 1994, 185) Furter, disclosed either expressly or inherently in the teachings of incorporated disclosures taen as a whole, or in combination with the state of the time of the reference and its the art at the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 sttement and accompanying chars. Rather than repeat those disclosures here, they are incorporated by reference into this char. (14aJ initializing a set of candidate cluster links; the time of Disclosed either expressly or inherently in the teachings of the reference and its incorporated disclosures taken as a whole, or in combination with the state of the art at the alleged invention, as evidenced by substantial other references identifìed in Defendats' P. R. 3-3 statement and accompanying chars. Rather than repeat those disclosures here, they are incorporated by reference into this char. ( 1 4b J Selecting the destination node of a path as the See, e.g., DeBra, 1994, at p. 185 selected node to analyze; 2.2 The schools of fish metaphor. The algorith simiùates a school fish, breeding and searching for food... In the fish-search each UR corresponds to a fish. . When a document is retreved the fish breeds a number of children, depending on whether the document is relevant (contains food) and also depending on the number oflinks (URLs) embedded in the document. Each time a relevant document is found the fish and its 12 children become stronger. If a document is not relevant the fish become \',¡eaker and fewer children are produced. Aftr following a number of links in a direction without finding a relevant document the search stops .... 2.3 The implementation of the search.... The fish ar simulated by means of a list of URLS. The averae number of children produced each time is called width. The number of steps made (by a fish or its offspring) without finding a relevant document is called depth. Eah time a relevant document is found a selection of the embedded links are added to the front of ths list. (DeBra, 1994, 185) Furter, disclosed either expressly or inherently in the teachings of the reference and its incorporated disclosures taen as a whole, or in combination with the state ofthe art at the time of the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this chart. (14cJ retrieving the set of direct links from the selected I See, e.g., DeBra 1994, at p. 185 node to any other node in the datase; 2.2 The schools offish metaphor. The algorithm simulates a school fish, breeding and searching for food... In the fish-search each UR corresponds to a fish. When a document is retrieved the fish breeds a number of childrn, depending on whether the document is relevant (contains food) and also depending on the number of links (URLs) embedded in the document. Each time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. Aftr followig a number of links in a direction without finding a relevant document the search stops.... 2.3 The implementation of the search .... The fish are simulated by means of a list of URLS. The average number of children produced each time is called width. The number of steps made (by a fish or its offspring) without finding a relevant document is called depth. Each time a relevant document is found a selection of added to the front of the embedded link ar this list. (DeBra, i 994, 185) Disclosed either expressly or inherently in the teachings of the reference and its 13 retrieved direct links; incorporated disclosures taken as a whole, or in combination with the stte of the time of the art at the alleged invention, as evidenced by substantial other references identified in Defendats' P. R. 3-3 staement and accompanying chars. Rather than repeat those disclosures here, they are incorporated by reference into this chart. (1 4e) repeating steps b through d for each path; and See, e.g., DeBra 1994, at p. 185 2.2 The schools of fish metaphor. The algorith simulates a school fish, breeding and searching for food... In the fish-search each UR corresponds to a fish. When a document is retreved the fish breeds a number of children, depending on whether the document is relevant (contains food) and also depending on the number of links (URLs) embedded in the document. Each time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. Aftr following a number of links in a direction without finding a relevant document the search stops .... 2.3 The implementaon of the search .... The fish are simulated by means ofa list of URS. The average number of children produced each time is called width. The number of steps made (by a fish or its offsprig) without finding a relevant document is called depth. Each time a relevant document is found a selection of the embedded links are added to the front of this list. (DeBra, 1994, 185) Further, disclosed either expressly or inherently in the teachings of incorporated disclosures taen as a whole, or in combination with the state of the time of the reference and its the ar at the alleged invention, as evidenced by subst:lItial other references identified in Defendants' P. R. 3-3 statement and accompanying charts. Rather th repeat those disclosures here, they are incorporated by reference into this char. (14f) Storing the determined weights as candidate See, e.g., DeBra 1994, at p. 185 cluster lis. 2.2 The schools offish metaphor. The algorithm simulates a school fish, breeding and searching for food. .. . Tn the fish-search each URL corresponds to a fish. When a 14 document is retreved the fish breeds a number of children, depending on whether the document is relevant (contains food) and also depending on the number oflinks (URLs) embedded in the document. Each time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. After following a number oflinks in a direction without finding a relevant document the search stops .... 2.3 The implementaion of the search.... The fish are simulated by means ofa list of URS. The average number of children produced each time is called width. The nuniber of steps made (by a fish or its offsprig) without finding a relevant document is called depth. Each time a relevant docuent is found a selection of the embedded links are added to the front of this list. .... The result of a search is a list of (relevant) documents, with the "relevance score" of each document. (DeBra, 1994, 185) Disclosed either expressly or inherently in the teachings of incorporated disclosures taken as a whole, or in combination with the stte of the time of 15. The method of claim 14 furer comprising the step of deriving the actal cluster lins wherein the actual the reference and its the art at cluster links arc a subsct of the candidate cluster links. the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this char. 16. The method of claim 15 wherein the step of Disclosed either expressly or inherently in the teachings of deriving comprises the step of choosing the top raed candidate cluster lins. the reference and its incorporated disclosures taen as a whole, or in combination with the state ofthe art at the alleged invention, as evidénced by substatial other references identified the time of in Defendants' P. R. 3-3 sttement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this char. 18. A method of analyzing a database having objects and a first numerical representation of direct relationships in the database, comprising the steps of: See, e.g., DeBra 1994, at Abstract, pp. 183,184, 185 Finding specific information in the World Wide Web (W or Web for short) is becoming increasingly difficult. (DeBra, 1994, Abstrat) The World-Wide Web... is a fas growig wide-area hypennedia datase. It contains infonnation on manv related and unrelatcd tooics.... However. a hvoert:x1: document like 15 the WWW, distributed over hundreds or even thousands of loosley coupled sites can only be searched by retrieving documents and scanning them for related information, and also scanning them for extracting links pointig to other documents. _.. (SJeveral tyes of solutions have been proposed and implemented: (1) specially designing metahyperdocuments ... (2) robot-based searchable indecies ... (3) client-based search tools, most notably our fish search (DeBra, 1994, p. 183-184) Documents are retrieved (over the Internet) and scaned for relevant information at the receiving (client end). (3) The retreved documents are scaned to find links to (URLs of) otherWW-documents. (DeBra, 1994, p. 184) When a document is retrieved the fish breeds a number of children, depending on whether the document is relevant (contais food), and also depending on the number oflinks (URLs) embedded in the document. Each time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. After following a numer of lins in a direciton without finding a relevant document the search stops invetsigating that direction (the fish die) . The fish are simulated by mean of a list of URs. The averae number of children produced each tie is called width. lHe number of steps that can be made (by a fish or its offspring) wihtout finding a relevant document is called depth. (DeBra, 1994, p. 185) See, e.g., DeBra 1994, at p. 185 (l8a) generating a second numerical representation using the first numerical representation, wherein the second numerical representation accounts for indirect relationships in the database; 2.2 The schools offish metaphor. The algorithm simulates a school fish, breeding and searching for food... In the fish-search each URL corresponds to a fish. When a document is retrieved the fish breeds a number of children, depending on whether the document is relevant (contans food) and also depending on the number oflinks (URLs) embedded in the document. Each time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. Aftr following a number of links in a direction without finding a relevant document the search stops.... 2.3 The implementation of the search .... The fish are simulated by means of a list of URS. The average number of children produced each time is called width. The number of steos made (bv a fish or its offsoring) without finding a relevant document is called 16 depth. Each time a relevant document is found a selection of added to the front of this list. (DcBra i 994, 185) Furter, disclosed either expressly or inherently in the teachings of the embedded links are the reference and its the art at the time of the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 sttement and accompanying charts. Rather than repeat those disclosurcs here, they are incorporated by reference into this chart. incorporated disclosures taen as a whole, or in combination with the state of (18b J storing the second numerical representation; See, e.g., DeBra 1994,atp.185 2.2 The schools of fish metaphor. The algorithm simulates a school fish, breeding and searching for food '" In the fish-search each URL corresponds to a fish. When a document is retreved the fish breeds a number of children, depending on whether the document is relevant (contans food) and also depending on the number oflinks (URLs) embedded in the document. Each tie a relevant document is found the fish and its childrcn becomc strongcr. If a documcnt is not relevant thc fish become wcaker and fewcr children are produccd. Aftr following a number of lins in a direction without finding a relevant document the search stops .... 2.3 The implementation of the search .... The fish are simulatd by means of a list of URLS. The average niuher of children produced each time is called width. The number depth. Each time a relevant docuent is found a selection of of steps made (by a fish or its offspring) witliout finding a relevant document is called the embedded links are addcd to the front of this list. (DcBra, 1994, 185) Furter, disclosed cither expressly or inherenty in the teachigs ofthc reference and its incorporated disclosures taken as a whole, or in combination with the stte of the time of the ar at the alleged invention, as evidenced by substantial other references identified in Defendants' P. R. 3-3 statement and accompanying chars. Raher than repeat those disclosures here, they are incorporated by reference into this char. 17 Disclosed either expressly or inherently in the teachings of incorporated disclosures taken as a whole, or in combination with the stte of the time of (18c) identifying at leas one object in the database, wherein the stored numerical representation is used to identify objects; and disclosures here, they are incorporated by reference into this char. the reference and its the art at the alleged invention, as evidenced by substantial other references identified in Defendats' P. R. 3-3 statement and accompanying charts. Rather than repeat those (18d) displaying one or more identified objects from the database. Disclosed either expressly or inherently in the teachings of the reference and its incorporated disclosures taen as a whole, or in combination with the state oftlie art at the time of the alleged invention, as evidenced by substantial other references identified in Defendants' P. R. 3-3 sttement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this char. 19. The method of claim 18 wherein the step of generating a second numerical representation comprises: See, e.g., DeBra, 1994, at p. 185 selecting an object in the databas for analysis; 2.2 The schools offish metaphor. The algorithm simulates a school fish, breeding and searching for food... hi the fish-search each URL corresponds to a fish. When a document is retreved the fish breeds a number of children, depending on whether the document is relevant (contans food) and also depending on the number oflinks (URLs) embedded in the document. Each tie a relevant document is found the fish and its children become stronger. If a docmnent is not relevant the fish become weaker and fewer children are produced. Aftr following a number oflinks in a direction without .finding a relevant document the search stops .... 2.3 The implementation of the search .... The fish are simulated by means of a list of URLS. The average number of children produced each time is called width. The number of steps made (by a fish or its offspring) without finding a relevant document is called depth. Each time a relevant document is found a selection of the embedded links are added to the front of this list. (DeBra, 1994, 185) Furter, disclosed either expressly or inherently in the teachings of incorporated disclosures taken as a whole, or in combination with the stte of the time of the reference and its the art at the alleged invention, as evidenced by substantial other references identified in Defendants' P. R. 3-3 statement and accomoanving chars. Raer than reoeal those 18 disclosures here, they are incorporated by reference into this char. (19aJ analyzing the direct relationships expressed by the first numerical representation for indirect relationships involving the selected object; and See, e.g., DeBra, 1994, at p. 185 creating a second numerical representation of and indirect relationships involving the selected object. searching for food. .. In the fish-search each URL corresponds to a fish. When a document is retreved the fish breeds a number of children, depending on whether the document is relevant (contans food) and also depending on the number oflinks (URLs) embedded in the document. Eacli time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become \veaker and fewer children are produced. Aftr following a number of links in a direction without finding a relevant document the search stops .... 2.3 The implementation of the direct 2.2 The schools offish metaphor. The algorith simulates a school fish, breeding and the search .... The fish ar simulated by means ofa list of URLS. The averae number of children produced each time is called width. The number of steps made (by a fish or its offspring) without fiding a relevant document is called depth. Each time a relevant document is found a selection of the embedded links are added to the front of ths list. (DeBra 1994, 185) Furter, disclosed either expressly or inherently in the teachings of the reference and its incorporated disclosures taen as a whole, or in combination with the state ofthe art at the time of the alleged invention, as evidenced by substantial other references identified in Defendants' P. R. 3-3 sttement and accompanying chars. Rather than repeat those disclosures here, they are incorporated by reference into this chart. Disclosed either expressly or inherenty in the teachings of incorporated disclosures taen as a whole, or in combination with the state of the time of the reference and its the ar at 20. TIie method of 18 ""herein the step of identifyng at least one object in the database comprises: searching for objects in a datbase using the stored the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this char. numerical representation, wherein direct and/or indirect relationships are searched. 21. The method of claim 18 wherein the displaying Disclosed either expressly or inherently in the teachings of incomorated disclosures taen as a whole, or in combination with the stte of the reference and its the ar at 19 step compnses: the time of in Defendants' P. R. 3-3 sttement and accompanying charts. Rather generating a graphical display for representing an object in the datbase. See, e.g., DeBra 1994, at Abstract, pp. 183-84 the alleged invention, as evidenced by substatial other references identified than repeat those disclosures here, they are incorporated by reference into this chart. 23. A method ofrepreseiiting data in a computer datase with relationships, comprising the steps of: Finding specific information in the World Wide Web (WWW or Web for short) is becoming increasingly difcult. (DeBra 1994, Abstract) TIie World-Wide Web ... is a fas growing ,vide-area hypermedia datase. It contains information on many related and unrelated topics.... HO\vever, a hyperteÀi document like the WW, distributed over hundreds or even thousands of loosley coupled sites can only be searched by retneving documents and scanning them for related information, and also scaning them for extacting links pointig to other documents. ... (S)everal tyes of solutions have been proposed and implemented: (1) specially designing metahyperdocuments ... (2) robot-based searchable iiidecies ... (3) client-based search tools, most notably our fish search (DeBra, 1994, pp. 183-84) See, e.g., DeBra, 1994, at p. 185 (23a) assigning nodes node identifications; 2.2 The schools offish metaphor. The algonthm simulates a school fish, breeding and searching for food. .. Tn the fish-search each URL corresponds to a fish. When a document is retrieved the fish breeds a niunber of children, depending on whether the document is relevant (contans food) and also depending on the number oflinks (URLs) embedded in the document. Each time a relevant document is found the fish and its children become stonger. Ifa document is'not relevant the fish become weaker and fewer children are produced. Aftr following a number oflins in a direction without finding a relevant document the search stops .... the search .... The fish are simulated by means of a list of URLS. The average number of children produced each time is called width. The number of steps made (by a fish or its offspnng) without finding a relevant dociunent is called depth. Each time a relevant document is found a selection of the embedded links are 2.3 The implementation of added to the front of ths list. ... When addiri URL's to the list, the algorithm checks 20 whether the URL already ocurs in the list. ... The esult of a search is a list of (relevant) documents... DeBra, 1994, 185) (23b J generatig links, wherein each lin represents a relationship between two nodes and is identified by the See, e.g., DeBra 1994, at Abstrct, pp. 183-84 two nodes in which the relationslp exists; Finding specific infonnation in the World Wide Web ry¡WW or Web for short) is becoming increasingly diffcult. (DeBra, 1994, Abstract) The World-Wide Web ... is a fas growing \'\'Íde-area hypermedia datbase. It contains information on many related and unrelated topics.... However, a hyperte"-i document like the WWW, distributed over hundreds or even thousands ofloosley coupled sites can only be searched by retrieving documents and scanning them for related information, and also scaiing them for extracng links pointig to other documents. ... (SJeveral tyes of solutions have been proposed and implemented: (1) specially designing met:1.- hyperdocuments ... (2) robot-based searchable indecies ... (3) client-based search tools, most notably our fish search (DeBra, 1994, pp. 183-84) Further, disclosed either expressly or inherently in the teachings of incorporated disclosures taen as a whole, or in combination with the state of the time of the reference and its the ar at the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and acompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this char. See, e.g., DeBra, 1994, at p. 185 (23cJ allocating a weight to each link, wherein the the relationship weight signies the strngt of represented by the link relative to the strngt of other relationships represented by other link; and 2.2 The schools offish metaphor. The algorith simulates a school fish, breeding and searching for food .., Tn the fish-search each URL corresponds to a fish. When a document is retrieved the fish breeds a number of children, depending on whether the document is relevant (contans food) and also depending on the number of links (URLs) embedded in the document. Each time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are oroduced. Aftr following a number of links in a direction without 21 finding a relevant document the search stops .... 2.3 The implementaon of the search .... The fish ar simulated by means of a list of .URLS. The average number of children produced each time is called width. Thc numbcr of steps made (by a fish or its offspring) without findùig a relevant document is called depth. Each time a relevant document is found a selection of the cmbedded links are added to the front of this list. .... The result of a search is a list of (relevant) documents, with the "relevance score" of each document. (DeBra, 1994, 185) See, e.g., DeBra 1994, at Fig. 1, p. 185 (23dJ displaying a node identification. ! .,. ..... .. ,-¡: .--..--~~----_.l r ~~:' r,." ¡.'!. . ~ '. ~ , ..Ah_."'.......M'__"'. ~-'~~---~"". ~ . "x.""...~. .. ',"i;~;m;i.im ...:4'*'1_",.. ¡ _~...."" i L f,~~~ ;'Mr.f:'" f""il.'!~."" t ¡ t~-i~~C~~1 ~I ¡: f l' ~~~ ~ L~.f ~~L~~~!~~~~~~~I=t~~.='!~;; ¡¡jol. The result of a search is a list of (relevant documents), with the "relevance score" of each document. 22 See, e.g., DeBra 1994, at p. 185 24. The method of claim 23, wherein the data in the database is objects, wherein the nodes represent objects and each object is assigned a node identification, and wherein the relationships that exist searching for food '" In the fish-search each UR corresponds to a fish. When a 2.2 The schools of fish metaphor. The algorith simulates a school fish, breeding and comprise direct relationships between objects, furter comprising the step of: searching generated lins, wherein nodes are located by searching the generated links. document is retreved the fish breeds a number of children, depending on whether the document is relevant (contains food) and also depending on the number oflinks (URLs) embedded in the document. Each time a relevant docwnent is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. Aftr following a number of links in a direction without finding a relevant document the search stops .... 2.3 The implementation of the search .... The fish ar simulated by means of a list of URLS. The averae number of children produced each time is called width. The number of steps made (by a fish or its offspring) without finding a relevant document is called depth. Each time a relevant document is fowid a selection of the embedded links are added to the front of this list. .,. When adding URL's to the list, the algorith checks whether the URL already ocurs in the list. ... The esult of a search is a list of (relevant) documents... DeBra, 1994, 185) Furter, disclosed either expressly or inherently in the teachings of incorporated disclosures taen as a whole, or in combination with tlie stte of the time of the reference and its the art at the alleged invention, as evidenced by substantial other references identified in Defendants' P. R. 3-3 sttement and accompanying charts. Ratherth repeat those disclosures here, they are incorporated by reference into this chart. Disclosed either expressly or inherently in the teachings of incorporated disclosures taen as a whole, or iii the time of the reference and its combination with the state of 25. The method of claim 23 furter comprising the step of: generating link sub-tyes, comprising the steps of: the ar at the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and acompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this char. (25a) identifying each link sub-type with a nan1e; and Disclosed either expressly or inherently in the teachings of incomorated disclosures taken as a whole, or in combination with the state of the reference and its the ait at 23 the time of the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and accompanying chars. Rather than repeat those disclosures here, they are incorporated by reference into this chart. Disclosed either expressly or inherently in the teachings of incorporated disclosures taen as a whole, or in combination with the state of the time of subtyes. disclosures here, they are incorporated by reference into this char. (25b) Providing a comment to one or more link the reference and its the ar at the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 statement and accompanying chars. Rather than repeat those Disclosed either expressly or inherently in the teachings of incorporated disclosures taen as a whole, or in combination with the stte of the time of 31. The metliod of claim 23 wherein attributes are assigned to nodes. the reference and its the art at the alleged invention, as evidenced by substatial other references identified in Defendants' P. R. 3-3 sttement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this chart. 32. The method of claim 3 i furter comprising the step Disclosed either expressly or inherently in the teachings of the reference and its incorporated disclosures taken as a whole, or in combination with the state of of: generating node sub-types wherein the node subthe ar at the time of the alleged invention, as evidenced by substatial other references identified types are assigned information. in Defendants' P. R. 3-3 statement and accompanying charts. Rather than repeat those disclosures here, they are incorporated by reference into this char. 33. A method of representing dat in a computer the data, See, e.g., DeBra, 1994, at Abstract, pp. 183-84 datase and for computerized searching of wherein relationships exist in the database, comprising: Finding specific information in the World Wide Web (WWW or Web for short) is becoming increasingly diffcult. (DeBra, 1994, Abstract) The World.Wide Web... is a fast growing wide-area hyperniedia database. It contains infoimatIon on many related and unelated topics.... However, a hypertext document like the WW, distrbuted over hundreds or even thousands of loosley coupled sites can only be searched by retrieving documents and scanning them for related infonnatioii, and also scaning them for extacting links pointig to other documents. ... (S)everal types of solutions have been orooosed and imolemented: (1) soeciallv designing meta- 24 hyperdocuments ... (2) robot~based searchable indecies ... (3) client-based search tools, most notably our fish search (DeBra, 1994, p. 183-84) See, e.g., DeBra 1994, at pp. 184, 185 dataase; (33a) assigning links to represent relationships in the Documents are retrieved (over the Internet) and scaned for relevant information at the receiving (client end). (3) The retrieved documents are scaned to find links to (URLs of) otherWW-documents. (DeBra, 1994, p. 184) When a document is retrieved the fish breeds a number of children, depending on whether the document is relevant (contains food), and also depending on the number oflinks (URLs) embedded in the document. Eah time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. After following a numer of lins in a direciton without finding a relevant document the search stops invetsigating that direction (the fish die) . The fish are simulated by means of a list of URLs. The averae number of children produced each tie is called width. me number of steps that can be made (by a fish or its offspring) witout finding a relevant document is called depth. (DeBra, 1994, p. 185) See, e.g., DeBra, 1994, at pp. 184, 185 (33b) generatig node identifications based upon the assigned links, wherein node identifications are generated so that each link represents a relationship between two identified nodes; Documents are retrieved (over the Internet) and scanned for relevant information at the receiving (client end). (3) The retreved documents are scaned to find links to (URLs of) otherWW-documents. (DeBra, 1994, p. 184) When a document is retrieved the fish breeds a number of children, depending on whether the document is relevant (contains food), and also depending on the number oflinks (URLs) embedded in the document. Each time a relevant document is found the fish and its c1u1dren become stonger. If a document is not relevant the fish become weaker and fewer children are produced. Afer followmg a numer of links in a direciton without finding a relevant document the search stops invetsigating tht direction (the fish die) . The fish are simulated by means of a list of URLs. The average number of children roduced each time is called width. me number of steos that can be made (bv a fish or 25 its offspring) wihtout finding a relevant document is called depth. (DeBra, 1994, p. 185) See. e.g., DeBra, 1994, at pp. 184, 185 (33c) storig the links and node identifications, wherein the links and nodes may be retreved; Documents are retrieved (over the Internet) and scaned for relevant information at the receiving (client end). (3) TIie retreved documents are scanned to find links to (URLs of) other WW-documents. (DeBra, 1994, p. 184) When a document is retrieved the fish breeds a number of children, depending on whether the document is relevant (contas food), and also depending on the number of links (URLs) embedded in the document. Each time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. Aftr following a numer of lins in a direciton without finding a relevant document the search stops invetsigating that direction (the fish die) . The fish are simulated by means of a list of URLs. The average number of children produced each time is called width. THe number of steps that can be made (by a fish or its offspring) wihtout fmding a relevant document is called depth. (DeBra, 1994, p. 185) 26 (33d) searching for node identifications using the See, e.g., DeBra 1994, atp. 185 2.2 stored links; and The schools offish metaphor. The algorith simulates a school fish, breeding and searching for food '" In the fish-search each URL corresponds to a fish. When a document is retreved the fish brceds a numbcr of children, depending on whcther the document is relevant (contans food) and also depending on the number oflinks (URLs) embedded in the document. Each time a relevant document is found the fish and its children become stronger. If a document is not relevant the fish become weaker and fewer children are produced. Aftr following a number of links in a direction without finding a relevant document the search stops .... 2.3 The implementation of the search .... The fish are simulated by means of a list of URLS. The averae number of children produced each time is called width. The number of stcps madc (by a fish or its offpring) without finding a relevant document is callcd depth. Each time a relevant document is found a selection of the embedded links are added to the front of this list. (DeBra 1994, 185) -. Further, disclosed either expressly or inherently in the teachings of the reference and its incorporated disclosures taken as a whole, or in combination with the stte of the tie of in Defendants' P. R. 3-3 the ar at the alleged invention, as evidenced by substatial other references identified statement and accompanying charts. Raer tha repeat those disclosures here, they are incorporated by reference into this char. (33e) displaying node identifications, wherein the displayed node identifications are located in the See, e.g., DeBra 1994, at Fig. 1, p. 185 searching stp. 27 1~!ää ~~ f ï ¡~l r l ¡r':~;;.~¡ r~1!T.t"'ir'ii~~l P..L The result of a search is a li.st of (relevant documents), with the "relevance score" of each document. Defendants reserve the right to revise this contention chart concerning the invalidity of the assertd claiins, any findings as to the priority date of the assertd claims, as appropriate, for example depending upon the Court's constction of the asserted claims, and/or positions that Plaintiff or its expert witness(es) may tae concerning claim interpretation, constction, infingement, and/or invalidity issues. Plaintiffs Infringement Contentions are based 011 an 'apparnt construction of the claim terms. Defendants disagree with these apparent constructions. Nothing stated herein shall be treated as an admission or suggestion that Defendants agree with Plaintiff of any of regarding either the scope the asserted claims or the claim constctions advanced by Plaintiff in its Inngement Contentions or anywhere else, or that any of the clai ternis herein IDider 35 U.S.c. § Defendants' accused technology meets any limitations of the claims. Nothing stted herein shall be consted as an admission or a waiver of any any claim tenn. Defendants also reserve all their rights to challenge any of parcular constrction of 112, including by aruing that they are indefinite, not supportd by the written description and/or not enabled. Accordingly, nothing stted herein shall be construed as a waiver of any arguent available imder 35 U.S.C. § 112. 28

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?