Claims are construed in computer networking case

Morris James LLP
Contact

International Business Machines Corporation v. The Priceline Group Inc. et al, C.A. No. 15-137-LPS, October 28, 2016.

Stark, C. J.   Claim construction opinion issues regarding twenty-seven terms from four patents.  A Markman hearing took place on August 29, 2016.The disputed technology relates to interactive computer networks and communications between networked computers The following terms were considered:

  1. "Object(s)”
  2. "Application(s)"
  3. "The objects being retrieved from the objects stored at the respective reception system, or if unavailable from the objects stored at the respective reception system, then from the network”
  4. “The method of claim 2 wherein the predetermined plan”
  5. "Permit random movement"
  6. "At least one procedure for navigating to a new application / a plurality of different procedure [sic] for navigating to a new application"
  7. "Storage control parameter”
  8. "Computer network / the network"
  9. “Partition(s)”
  10. "Command function(s)"
  11. “Object(s)”
  12. “Application(s)”
  13. "Selectively storing advertising objects at a store established at the reception system"

14.“Storing a predetermined amount of the advertising data in a store established at the respective reception systems”

15.“Computer network/the network”

16. "Structuring advertising in a manner compatible to that of the applications so that it may be presented"

17.“Portion”

18.“Recursively embedding the state information in all identified continuations”

19. “Continuation(s)”

20. “State detection means for detecting when the request for a service requires preservation of the state information”

21. Search means for identifying all continuations in an output from said service, in response to said step of detecting,"

22. “Converter means for recursively embedding the state information in all identified continuations”

23. “Communication means for communicating the output to the client”

24. “[Dynamically downloading computer program code to the client to] perform said step of embedding which is responsive to said step of communicating the output to the client”

25. Filtering one of said hyperlinks and data output from said services according to a predetermined criteria"

26. Adding one of said hyperlinks and data to said output from said services according to a predetermined criteria”

27. “HTML”

28. “CGI program”

29.. "Stateless protocol”

30. "Client”

31. "Conversation(s)”

32. "State information”

33. "Federated computing environment”

34. “A method for managing user authentication within a distributed data processing system, wherein a first system and a second system interact within a federated computing environment and support single-sign-on operations in order to provide access to protected resources, at least one of the first system and the second system comprising a processor, the method comprising," which is the preamble of claim 1 of the '346 patent, is construed to be limiting.”

35."Protected resource(s)”

36. “Single-sign-on operation(s)”

37."User authentication”

38."Fourth system”

39."Pull authentication information”

40. "Back-channel information retrieval mechanism”

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Morris James LLP | Attorney Advertising

Written by:

Morris James LLP
Contact
more
less

Morris James LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide