throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________
`
`RADWARE, INC.,
`
`Petitioner
`
`v.
`
`F5 NETWORKS, INC.,
`
`Patent Owner
`
`____________
`
`Inter Partes Review No. 2017-01249
`
`Patent No. 6,311,278
`
`____________________________________
`
`PETITION FOR INTER PARTES REVIEW
`
`UNDER 35 U.S.C. §§311-319 AND 37 C.F.R. §§42.1-.80, 42.100 ET SEQ.
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`TABLE OF CONTENTS
`
`Page
`INTRODUCTORY STATEMENT .......................................................................... 1
`I. MANDATORY NOTICES (37 C.F.R. §42.8(A)(1)) ..................................... 1
`
`A.
`
`B.
`
`Real Parties-in-Interest (37 C.F.R. §42.8(b)(1)) .................................. 1
`
`Related Matters (37 C.F.R. §42.8(b)(2)) .............................................. 1
`
`C. Designation of Lead and Back-Up Counsel (37 C.F.R.
`§42.8(b)(3)) .......................................................................................... 2
`
`D. Grounds for Standing (37 C.F.R. §42.104(a)) ..................................... 2
`
`E.
`
`Service Information (37 C.F.R. §42.8(b)(4)) ....................................... 3
`
`II.
`
`Payment of Fees (37 C.F.R. §42.103) .................................................. 3
`F.
`STATEMENT OF THE PRECISE RELIEF REQUESTED AND THE
`REASONS THEREFOR ................................................................................ 3
`III. THE ʼ278 PATENT (“RAANAN”) ............................................................... 4
`
`A.
`
`Summary .............................................................................................. 4
`
`Raanan’s File History ........................................................................... 8
`B.
`IV. A PERSON OF ORDINARY SKILL IN THE ART ..................................... 9
`V.
`CLAIM CONSTRUCTION (37 C.F.R. §§42.104(B)(3)) ............................ 10
`
`A.
`
`“Deriving From The Server Messages Sets Of Allowable
`Actions” .............................................................................................. 10
`VI. PRIOR ART BACKGROUND .................................................................... 12
`
`A. U.S. Patent No. 6,219,786 to Cunningham et al.
`(“Cunningham”) (Ex. 1010) ............................................................... 12
`
`B. U.S. Patent No. 5,987,611 to Freund et al. (“Freund”) (Ex.
`1011) ................................................................................................... 17
`
`C. U.S. Patent No. 6,151,624 to Teare et al. (“Teare”) (Ex. 1012) ........ 20
`IDENTIFICATION OF THE CHALLENGE (37 C.F.R. §42.104(B)) ....... 22
`
`VII.
`
`A.
`
`Claims of Raanan Are Not Entitled to the Priority Date of
`9/9/1998 .............................................................................................. 22
`
`
`
`
`
`-i-
`
`
`
`

`

`TABLE OF CONTENTS
`(continued)
`
`Page
`B. GROUND 1 ........................................................................................ 24
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`Claim 15 ................................................................................... 24
`
`Claims 1 and 25 ........................................................................ 28
`
`Claims 2 and 3 .......................................................................... 32
`
`Claim 5 ..................................................................................... 34
`
`Claims 19, 26, and 10 .............................................................. 35
`
`Claim 21 ................................................................................... 41
`
` Claims 11, 12, and 14 ............................................................. 42
`
`C. GROUND 2: Claims 1-7, 10-12, 14-15, 19-26 are Rendered
`Obvious By Cunningham In View Of Freund ................................... 44
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`Claim 15 ................................................................................... 47
`
`Claims 1 and 25 ........................................................................ 50
`
`Claims 2 and 3 .......................................................................... 55
`
`Claims 4, 5 and 7...................................................................... 58
`
`Claim 6 ..................................................................................... 60
`
`Claims 19, 26, and 10 .............................................................. 62
`
`Claims 20-21 and 23-24 ........................................................... 67
`
`Claim 22 ................................................................................... 70
`
`Claims 11, 12 and 14 ............................................................... 72
`
`D. Ground 3: Claim 23 Is Rendered Obvious By Cunningham In
`View Of Freund And Teare ................................................................ 75
`VIII. CONCLUSION ............................................................................................. 77
`IX. CERTIFICATION TO WORD COUNT UNDER 37 C.F.R.
`§42.24(D) ...................................................................................................... 78
`
`
`
`
`
`-ii-
`
`
`
`

`

`IPR2017-01249
`
`INTRODUCTORY STATEMENT
`
`Radware, Inc. (“Radware” or “Petitioner”) in accordance with 35 U.S.C.
`
`§§311-319 and 37 C.F.R. §§42.1-.80, 41.100-41.123, respectfully requests inter
`
`partes review and cancellation of claims 1-7, 10-12, 14-15, and 19-26 of U.S.
`
`Patent No. 6,311,278 (“’278 Patent” or “Raanan”) as anticipated and/or obvious
`
`under 35 U.S.C. §§102 and 103. The U.S. Patent and Trademark Office (USPTO)
`
`assignment records indicate that Raanan is assigned to F5 Networks, Inc. (“Patent
`
`Owner”).
`
`I. MANDATORY NOTICES (37 C.F.R. §42.8(a)(1))
`
`A. Real Parties-in-Interest (37 C.F.R. §42.8(b)(1))
`
`The real party-in-interest is Radware, a corporation organized under the laws
`
`of New Jersey. Radware is not barred by operation of estoppel to submit this
`
`Petition for inter partes review.
`
`B. Related Matters (37 C.F.R. §42.8(b)(2))
`
`Raanan (Ex. 1001) is asserted against Petitioner in litigation, F5 Networks,
`
`Inc. v. Radware, Inc., Case No. 16-cv-480-RAJ, pending in the United States
`
`District Court for the Western District of Washington. The complaint was filed on
`
`April 4, 2016 (Ex. 1002) and served on April 7, 2016 (Ex. 1003). Petitioner is not
`
`aware of any pending prosecution or administrative proceedings concerning
`
`-1-
`
`
`
`Raanan.
`
`
`
`
`

`

`IPR2017-01249
`
`
`C. Designation of Lead and Back-Up Counsel (37 C.F.R.
`§42.8(b)(3))
`
`Petitioner provides the following designation of counsel. Please address all
`
`correspondence to lead and back-up counsel.
`
`LEAD COUNSEL
`Fabio E. Marino (Cal. SBN 183825)
`Registration No. 43,339
`fmarino@mwe.com
`
`McDermott Will & Emery
`275 Middlefield Road, Suite 100
`Menlo Park, CA 94025-4004
`Tel: (650) 815-7605
`
`BACK-UP COUNSEL
`Barrington E. Dyer (Cal. SBN 264762)
`Pro Hac Vice to be requested
`bdyer@mwe.com
`
`McDermott Will & Emery
`275 Middlefield Road, Suite 100
`Menlo Park, CA 94025-4004
`Tel: (650) 815-7612
`
`D. Grounds for Standing (37 C.F.R. §42.104(a))
`
`Petitioner certifies that Raanan is eligible for inter partes review and further
`
`certifies that Petitioner is not barred or otherwise estopped from requesting inter
`
`partes review challenging the identified claims on the grounds in the present
`
`Petition. This Petition is filed within one year of the date Petitioner was served
`
`with a complaint of infringement of Raanan. A true copy of the Proof of Service
`
`of Summons and Complaint, showing the date of service of April 7, 2016 is
`
`included as Ex. 1003. Petitioner has not filed a civil action challenging the validity
`
`of a claim of Raanan. 35 U.S.C. §315(a).
`
`
`
`
`
`-2-
`
`
`
`

`

`IPR2017-01249
`
`
`E.
`
`Service Information (37 C.F.R. §42.8(b)(4))
`
`Papers concerning this matter should be addressed to the lead and back-up
`
`counsel at the address provided above. Petitioner consents to electronic service by
`
`email at: IPdocketMWE@MWE.com, fmarino@mwe.com and bdyer@mwe.com.
`
`F.
`
`Payment of Fees (37 C.F.R. §42.103)
`
`The Patent and Trademark Office is hereby authorized to charge Deposit
`
`Account No. 505907 for the fee set in 37 C.F.R. §42.15(a) for this Petition for inter
`
`partes review, and for any additional fees that may be due as a result of the
`
`submission of this Petition.
`
`II.
`
`STATEMENT OF THE PRECISE RELIEF REQUESTED AND
`THE REASONS THEREFOR
`Radware requests inter partes review and cancellation of claims 1-7, 10-12,
`
`14-15, and 19-26 of U.S. Patent No. 6,311,278 ( “Raanan,” Ex. 1001) based on 35
`
`U.S.C. §§102 and 103 for the reasons stated herein. This Petition establishes a
`
`reasonable likelihood that Petitioner will prevail in establishing that the challenged
`
`claims are unpatentable.
`
`The following chart summarizes the individual grounds, including the
`
`statutory basis and prior art relied upon for each ground.
`
`Ground
`No.
`1
`
`35
`U.S.C.
`§102
`
`Claims
`
`1-3, 5, 10-
`12, 14-15,
`19, 21, 25-
`
`
`
`
`
`Prior Art Reference(s)
`
`Cunningham
`
`-3-
`
`
`
`

`

`IPR2017-01249
`
`Ground
`No.
`
`35
`U.S.C.
`
`§103
`
`2
`
`3
`
`Prior Art Reference(s)
`
`Cunningham in view of Freund
`
`Claims
`
`26
`
`1-7, 10-12,
`14-15, 19-
`26
`
`§103
`
`23
`
`Cunningham in view of Freund and Teares
`
`None of the prior art references were made of record during prosecution of
`
`Raanan and were, therefore, not considered by the examiner.
`
`III. THE ʼ278 PATENT (“Raanan”)
`
`A.
`
`Summary
`
`Raanan is directed to a security system for extracting application protocol
`
`data. The system “extract[s] application protocol data from [a] server message” to
`
`retrieve the set of allowable actions which may be taken by a client; and filters the
`
`client request to “eliminate any disallowable actions requested by the client.”
`
`Raanan, 2:3-6, Fig. 3.
`
`“Application protocol data” includes “commands, fields,” or other “user-
`
`selectable options contained in the [server] message.” Id., Abstract. For example,
`
`a “‘search’ command” or “‘submit’ command on an HTML form,” or fields such
`
`as “fixed fields” and “hidden fields.” Id., 5:59-65, 6:2-4. “These items represent
`
`the set of allowable or authorized user actions for the application.” Id., Abstract,
`
`3:1-5; see also id., 2:10-12.
`
`
`
`
`
`-4-
`
`
`
`

`

`IPR2017-01249
`
`
`
`
`As depicted in Figure 2 above, the client 12 connects with the server 10 via a
`
`computer network such as “the Internet, an intranet, or any other private network
`
`that connects client 12 and server 10.” Id., 3:55-57 (emphasis added). The
`
`security system comprises a filter module 14, a protocol database 16, and a
`
`protocol extraction module 18. Id., 3:58-60. “These modules and database may be
`
`stored on the server 10, or on a computer separate from and connectable to the
`
`server 10, or on a number of separate but connectable computers.” Id., 3:61-64
`
`(emphasis added). Indeed, the claims of Raanan are not limited to being executed
`
`on only either the server or client side; the claimed “invention” need only be
`
`“interposed [somewhere] between the client and server.” Id., 1:66-67; see also
`
`Fig. 1-2A, 7:46-48. Thus, it may be on the client-side of the internet or the server-
`
`side of the internet (or, indeed, split over the two).
`
`
`
`
`
`
`
`-5-
`
`
`
`

`

`IPR2017-01249
`
`
`
`
`Figure 3, above, is a flow chart showing the process for defining allowable
`
`actions in an application protocol. The process begins with the server transmitting
`
`to the client a message “containing information relating to the application residing
`
`and running on the server 10 or a computer connected thereto” (step 30). Id., 51-
`
`54. “Using a copy of the server message or the message itself,” the protocol
`
`extraction module extracts the application protocol data from the server message.
`
`Id., 4:55-58.
`
`
`
`
`
`-6-
`
`
`
`

`

`IPR2017-01249
`
`
`The extraction of application protocol data by the extraction module 18
`
`“may be performed in a number of ways, including through the use of known
`
`techniques to identify a low level or communication protocol, such as TCP/IP,
`
`stripping such protocol while retaining required data such as IP source data, and
`
`searching the remainder of the message for allowed commands or other authorized
`
`user actions.” Id., 4:58-64.
`
`“Once extracted, the application protocol data is stored in the protocol
`
`database 16” (step 34). Id., 4:65-66. The protocol data may be added to a
`
`“permanent file” or a “temporary file” of the protocol database 16. Id., 4:66-5:4.
`
`Temporarily stored files may be “session-based” and used only for “a particular
`
`client/server session,” or used “only for a particular server message and then
`
`overwritten.” Id. (emphasis added).
`
`The server message is then sent to the client (step 36), which transmits a
`
`request back to the server (step 38). Id., 5:10-12. The client’s request may be a
`
`proper response to the server message or may be an attempt to cause the
`
`application to execute an unauthorized command. Id., 5:13-14. The filter module
`
`14 intercepts the client request, reads it, and queries the protocol database 16 (step
`
`40). Id., 5:14-16.
`
`The client request is compared to a list of allowable actions stored on the
`
`protocol database16 (step 42), which is either a list of allowable actions “for a
`
`
`
`
`
`-7-
`
`
`
`

`

`IPR2017-01249
`
`given client/server session, for a ‘stage’ or segment of the application program,” or
`
`“a static list of actions allowable for a given application program.” Id., 4:1-5
`
`(emphasis added), 5:20-22. If allowable, the filter module passes it to the server
`
`(step 44). Id., 5:22-23. If not, the request is denied access to the server (step 46).
`
`Id., 5:23-28. Alternatively, the non- allowable parts of the request are deleted
`
`before passed to the server. Id., 6:12-14.
`
`Independent Claim 15 is representative of the three main features of security
`
`system described above: a (1) protocol database for storing the list of allowable
`
`actions, (2) filter module for checking whether messages are allowable, and (3)
`
`protocol extraction module for extracting application protocol data. Mohapatra,
`
`¶44. Independent Claims 1, 19, 25, and 26 reflect the same three features, or
`
`subsets of them. Claim 1, for example, is directed to Feature 3, extracting and
`
`storing application protocol data. Id., ¶45.
`
`B. Raanan’s File History
`
`Raanan issued on October 30, 2001, from Patent Application No.
`
`09/345,920 (“’278 File History,” Ex. 1008), filed on July 1, 1999. It is a
`
`Continuation-in-Part of Application No. 09/149,911 (“’911 Application”) filed on
`
`September 9, 1998 (Ex. 1006). Despite being prosecuted for over two years,
`
`Raanan issued after just one office action.
`
`
`
`
`
`
`
`-8-
`
`
`
`

`

`IPR2017-01249
`
`
`
`
`
`
`As explained below (Section VII(A)), Raanan is not entitled to the priority date of
`
`the ’911 Application.
`
`IV. A PERSON OF ORDINARY SKILL IN THE ART
`
`With respect to Raanan, Dr. Mohapatra confirms that a person of ordinary
`
`skill in the art (“POSITA”) would have a Bachelors or Master’s degree in
`
`computer science or computer engineering or in a related field, as well as about
`
`two years of experience in design and deployment of Internet networking
`
`technology. Mohapatra, ¶18.
`
`
`
`
`
`-9-
`
`
`
`

`

`IPR2017-01249
`
`
`V. CLAIM CONSTRUCTION (37 C.F.R. §§42.104(b)(3))
`
`Because Raanan has not yet expired, each claim is given “its broadest
`
`reasonable construction in light of the specification of the patent in which it
`
`appears” to one of ordinary skill in the art. 37 C.F.R. §42.100(b). Under the
`
`broadest reasonable interpretation (BRI) standard, “the claims must be interpreted
`
`as broadly as their terms reasonably allow… This means that the words of the
`
`claim must be given their plain meaning unless the plain meaning is inconsistent
`
`with the specification.” MPEP §2111.01 (citing cases); see also In re Am. Acad. Of
`
`Sci. Tech Ctr., 367 F.3d 1359, 1369 (Fed. Cir. 2004) (“[T]he Board is required to
`
`use a different standard for construing claims than that used by district courts.”)
`
`(citations omitted).
`
`Radware’s proposed constructions are offered to comply with 37 C.F.R.
`
`§42.100(b) for this Petition only, and do not necessarily reflect the claim
`
`constructions that may be proposed by Radware or adopted by the court in any
`
`district court litigation, where a different standard applies. All claim terms for
`
`which a construction is not specifically proposed should be interpreted according
`
`to their plain meaning.
`
`A.
`
`“Deriving From The Server Messages Sets Of Allowable
`Actions”
`
`Independent claims 19 and 26 of Raanan includes the step of “deriving from
`
`the server messages sets of allowable actions which may be taken in response to
`
`
`
`
`
`-10-
`
`
`
`

`

`IPR2017-01249
`
`each of the server messages.” The BRI of “deriving from the server messages sets
`
`of allowable actions” includes “parsing the messages to identify commands, input
`
`fields, hidden fields, or hyperlinks including addresses within the server
`
`messages.” Mohapatra, ¶¶53-56.
`
`Although the specification and prosecution history never discuss “deriving
`
`from the server messages sets of allowable actions,” the dependent claims do, and
`
`thus provide the single best reference for the BRI of the term. Straight Path IP
`
`Group, Inc. v. Sipnet EU S.R.O., 806 F.3d 1356, 1360 (Fed. Cir. 2015) (“We start
`
`with the claim language—which has a meaning that can only be called plain”).
`
`Claims 20, 21, 23, and 24, each depend from Claim 19 and clarify that
`
`“deriving the set of allowable actions” comprises parsing the server message to
`
`identify specific information. Claim 19 adds that “deriving sets of allowable
`
`actions from the server messages comprises parsing the messages to identify
`
`commands allowed in the server messages.” Claim 21 specifies that “deriving sets
`
`of allowable actions from the server messages comprises parsing the messages to
`
`identify input fields in the server messages.” Claim 23 further adds that “deriving
`
`sets of allowable actions from the server messages comprises parsing the messages
`
`to identify hidden fields in the server messages.” And Claim 24 adds that
`
`“deriving sets of allowable actions from the server messages comprises parsing the
`
`messages to identify hyperlinks including addresses within the server message.”
`
`
`
`
`
`-11-
`
`
`
`

`

`IPR2017-01249
`
`
`Taken together, a POSITA would understand that “deriving from the server
`
`messages sets of allowable actions” at least comprises “parsing the messages to
`
`identify commands, input fields, hidden fields, or hyperlinks including addresses
`
`within the server messages.” Mohapatra, ¶¶53-56; see also Wright Med. Tech.,
`
`Inc. v. Osteonics Corp., 122 F.3d 1440, 1445 (Fed. Cir. 1997) (“we must not
`
`interpret an independent claim in a way that is inconsistent with a claim which
`
`depends from it”). Claims 20, 21, 23, and 24 subsequently specify which
`
`information is parsed to be identified. Further, because the same term is used in
`
`Claim 26 as in Claim 19, it should be construed consistently. See Omega Eng’g,
`
`Inc. v. Raytek Corp., 334 F.3d 1314, 1334 (Fed. Cir. 2003).
`
`VI. PRIOR ART BACKGROUND
`
`A. U.S. Patent No. 6,219,786 to Cunningham et al.
`(“Cunningham”) (Ex. 1010)
`
`Cunningham is a U.S. Patent for a “Method and System for Monitoring and
`
`Controlling Network Access” which was filed on September 9, 1998 and issued on
`
`April 17, 2001. It is therefore prior art under 35 U.S.C. §§102(e). Cunningham
`
`teaches that “[a] rules base is generated to apply at either or both of the connection
`
`time and the time subsequent to connection,” and is “maintained in a single rules
`
`base for the entire network.” Cunningham, Abstract. Data packets are examined
`
`from “the lowest level to the application-level data” to “identify the source and
`
`destination nodes, as well as contextual information (i.e., ISO Layer 7
`
`
`
`
`
`-12-
`
`
`
`

`

`IPR2017-01249
`
`information),” such as “the text of HTML pages,” in order to retrieve the access
`
`rules to be applied. Id., Abstract, 3:22-55, 11:14-49, Fig. 7.
`
`
`
`Figure 1 illustrates a system for monitoring and controlling network access
`
`using a rule base generated to apply at connection time or any time after. A router,
`
`firewall, workstation, or server, “dedicated to providing access control” acts as “a
`
`gateway between the network and an external network (e.g., the Internet).” Id.,
`
`3:40-42, 3:58-63 (emphasis added); 11:54-56. The system includes a “rule base”
`
`for storing access rules (id., 4:13-16), an “access management module” for
`
`monitoring traffic (id., 5:20-21), and a “module for receiving, assembling and
`
`examining data packet” (id., 3:63-66). By comparing data packets against the rules
`
`base, the system causes a connection attempt to be completed, denied, logged, or a
`
`combination of these and other actions. Id., Abstract.
`
`
`
`
`
`-13-
`
`
`
`

`

`IPR2017-01249
`
`
`The gateway system “receives…outbound data packets through Layers 1 and
`
`2” from a node on the network. Id., 7:59-61. A node may be a workstation or a
`
`“server 28 that is used in a conventional manner to enable selected services, such
`
`as web services.” Id., 5:11-25.
`
`
`
`When received, outbound data packets “are pieced together to identify ISO
`
`Layer 7 information, as well as lower layer information.” Id., 3:49-50. Figure 4
`
`illustrates the acquisition of Transport Layer, Network Layer, and Application
`
`Layer information. Id., 8:9-13. “For example, in an e-mail environment, the
`
`Application Layer information that may be relevant to application of the rules base
`
`-14-
`
`
`
`
`

`

`IPR2017-01249
`
`may include information within the “subject” line of an e-mail message. This
`
`information is acquired only upon accessing the data fields of the data packets of
`
`the e-mail message.” Id., 8:13-19.
`
`“Detailed information from the assembled data packets is stored until
`
`sufficient information is acquired regarding the node-to-node transmission to apply
`
`the previously configured rules base 70.” Id., 10:6-9 (emphasis added).
`
`“[I]nformation which is stored includes both low level state information and
`
`contextual information” (i.e., Application Layer information). Id., 10:21-24. In
`
`addition, “storage logs are maintained for transaction data” to allow “further
`
`analysis.” Id., 9:60-65.
`
`Enforcement of “[t]he access control rules may…depend upon application
`
`protocol data following a successful connection.” Id., 4:18-20. The system
`
`“identif[ies] which rules can be applied at the basic connection time and which
`
`rules need to be held-over for application once the connection is completed and
`
`data is flowing.” Id., 11:29-34.
`
`
`
`
`
`-15-
`
`
`
`

`

`IPR2017-01249
`
`
`
`
`While continuing to monitor the node-to-node communication, the system
`
`also “receives inbound…data packets.” Id., 7:59-61. Figure 7, above, shows the
`
`steps for application of the rule base. Id., 10:52-53. Comparing data packets
`
`“against the rules base causes a connection attempt to be completed or denied, a
`
`previously established connection to be broken, logging to occur, or a combination
`
`
`
`
`
`-16-
`
`
`
`

`

`IPR2017-01249
`
`of these and other actions” (step 102). Id., Abstract; see also, Mohapatra, ¶¶63-
`
`71.
`
`B. U.S. Patent No. 5,987,611 to Freund et al. (“Freund”) (Ex.
`1011)
`Freund is a U.S. Patent for an “internet access monitoring system” for
`
`“monitoring access to an open network” and “filtering of access” based on
`
`“[a]ccess rules which can be defined can specify criteria such as […] a list of
`
`protocols or protocol components that a user application can (or cannot) access.”
`
`Freund, Abstract, 8:42-44 (emphasis added). Freund was filed on May 6, 1997 and
`
`issued on November 16, 1999 and is prior art under 35 U.S.C. §102(e).
`
`The system “restrict[s] access to the Internet (or other Wide Area Network)
`
`to certain approved applications” through “centrally-maintained access rules” (id.
`
`8:42-53), thereby “restricting [clients to] permissible on-line activities.” Id., 9:4-9
`
`(emphasis added). The access rules include “a list of protocols or protocol
`
`components (such as Java Script™) that a user application can or cannot use,” and
`
`“what should happen if a rule is violated (e.g., denying Internet access, issue a
`
`warning, redirecting the access, creating a log entry, or the like).” Id., 4:8-19,
`
`4:26-28, 13:2-13 (emphasis added).
`
`
`
`
`
`-17-
`
`
`
`

`

`IPR2017-01249
`
`
`
`
`The system, shown above in Figure 3B, includes “central server component
`
`370” with “central supervisor application [373].” Id., 22:7-9. The central
`
`supervisor application 373 (“Supervisor”) “maintains the access rules for the client
`
`based filter” (id., 3:60-67) in a “rules database” (id., 29:50-52), and connects with
`
`“Client Monitor” 311 (“Monitor”) to enforce the access rules. Id., 22:22-7.
`
`
`
`The Monitor “can intercept the communications for determining whether the
`
`request is permitted under the rules.” Id., 15:26-24 (emphasis added).
`
`
`
`
`
`-18-
`
`
`
`

`

`IPR2017-01249
`
`
`
`
`Figure 12B, for example, illustrates a method of intercepting
`
`communications to determining whether a request is permitted. Id., 29:50-53.
`
`When the “Monitor intercepts the call” it “determines the protocol based on a
`
`combination of the TCP/IP port address, the address family, contents, and the
`
`like,…[and] checks the rules database to see if the user/computer has the right to
`
`download ‘.html’ files” (steps 1212-1214). Id., 29:44-52 (emphasis added).
`
`
`
`
`
`-19-
`
`
`
`

`

`IPR2017-01249
`
`
`If the request is allowed, it is forwarded to the Host server 350, which sends
`
`“foo.html” as requested (step 1219). Id., 29:56-57. The Monitor “intercepts,”
`
`“parses the contents of ‘foo.html,’ and checks for the following components: (a)
`
`References to Java™, ActiveX, and the like…; (b) References to Netscape style
`
`plug-ins…; (c) Imbedded scripts such as Java Script™, VBScript, and the like…;
`
`(d) References to other files or components…; and (e) Other syntax elements that
`
`are known or suspected to cause security or network problems.” Id., 29:54-30. By
`
`parsing the contents of “foo.html,” and referencing the rules database, the Monitor
`
`determines the permissible components of the HTML. Id., 30:1-10.
`
`A further discussion of Freund is provided in the Mohapatra Declaration,
`
`¶¶72-79.
`
`C. U.S. Patent No. 6,151,624 to Teare et al. (“Teare”) (Ex.
`1012)
`
`Teare is a U.S. Patent for a “Navigating Network Resources Based On
`
`Metadata” which was filed on February 3, 1998 and issued on November 21, 2000.
`
`Teare teaches “a method of navigating, based upon a natural language name, to a
`
`resource that is stored in a network.” Teare, 4:49-57. Requests are received and
`
`analyzed/parsed at the application protocol layer, and specific HTML data is
`
`identified. See, e.g., id, 25:60-26:18, 15:60-16:2, 18:18-29, 13:36-45. Figure 8,
`
`below, “is a block diagram of a computer system that can be used to implement the
`
`[Teare] invention.” Id., 5:57-58; Fig. 8.
`
`
`
`
`
`-20-
`
`
`
`

`

`IPR2017-01249
`
`
`
`
`In one embodiment, a web resource (e.g., a web page or application) is sent
`
`to the client that contains a hidden field. Id., 24:65-25:1. The system “receives the
`
`Web page, extracts the value of the hidden field, and compares the hidden field
`
`value to a table or mapping of hidden field values.” Id., 25:5-8.
`
`Thus Teare discloses parsing server messages (e.g., web pages or web
`
`applications) to identify and extract hidden fields, which are then compared to a
`
`pre-stored table or mapping.
`
`A further discussion of Teare is provided in the Mohapatra Declaration,
`
`¶¶80-82.
`
`
`
`
`
`-21-
`
`
`
`

`

`IPR2017-01249
`
`
`VII. IDENTIFICATION OF THE CHALLENGE (37 C.F.R.
`§42.104(B))
`
`Inter partes review of claims 1-7, 10-12, 14-15, 19-26 of Raanan is
`
`requested on Grounds 1-3 listed. None of the prior art references relied on herein
`
`were before (or considered by) the Examiner during prosecution of Raanan.
`
`Further, as confirmed by Dr. Mohapatra, the combinations presented below are not
`
`cumulative or redundant. Mohapatra, ¶¶85-86. As will be established by a careful
`
`analysis of the claims and the disclosure of the prior art references, all the
`
`limitations of the challenged claims were known prior to the priority date of July 1,
`
`1999. As a note, because a number of the claims share common elements, the
`
`sections below may refer back to earlier claims (and analysis) when analyzing the
`
`shared common elements in later claims. Id., ¶87.
`
`A. Claims of Raanan Are Not Entitled to the Priority Date of
`9/9/1998
`
`The application (Application No. 09/345,920) (“CIP Application”) that led
`
`to the issuance of Raanan is a Continuation-in Part of Application No. 09/149,911
`
`(“’911 Application”) filed on September 9, 1998 (Ex. 1006). However it is not
`
`entitled to this earlier priority date because the applicant added substantial new
`
`matter in the CIP Application not disclosed in the ’911 Application. See generally,
`
`Ex. 1009 (comparing the Parent Application to the CIP Application).
`
`
`
`
`
`-22-
`
`
`
`

`

`IPR2017-01249
`
`
`Other than the reference in the CIP Application to the ’911 Application, the
`
`CIP Application adds almost entirely new matter not disclosed in the ’911
`
`Application, and substitutes the original figures with new ones. Mohapatra, ¶¶57-
`
`62.
`
`This is not surprising, as the Applicant filed a “continuation-in-part” as
`
`opposed to “continuation”; indeed the “quintessential difference between a
`
`continuation and a continuation-in-part is the addition of new matter.”
`
`PowerOasis, Inc. v. T-Mobile USA, Inc., 522 F.3d 1299, n.4 (Fed. Cir. 2008).
`
`Consequently, the petitioned claims lack sufficient support from the ’911
`
`Application, and are not eligible for a priority date earlier than July 1, 1999—the
`
`filing date of the CIP Application. See id. at 1305 (“[T]here is simply no reason to
`
`presume that claims in a CIP application are entitled to the effective filing date of
`
`an earlier filed application.”).
`
`The new claimed matter without support from the ’911 Application is not
`
`limited to, but includes, (1) “extracting application protocol data from the server
`
`message”; (2) “to thereby retrieve the set of allowable actions”; (3) “storing the
`
`extracted application protocol data”; (4) “deriving from the server messages sets of
`
`allowable actions”; and (5) “disallowing any action […] not in at least one set of
`
`allowable actions.” Mohapatra, ¶¶60-61; Ex. 1009. This is critical, as the Federal
`
`Circuit emphasized in PowerOasis, stating:
`
`
`
`
`
`-23-
`
`
`
`

`

`IPR2017-01249
`
`
`“We have explained that to satisfy the written description
`
`requirement, ‘the missing descriptive matter must necessarily
`
`be present in the [original] application’s specification such that
`
`one skilled in the art would recognize such a disclosure.’”
`
`PowerOasis at 1306. Because the claimed features listed above were added in the
`
`CIP Application filed on July 1, 1999, and are required by each of the claims,
`
`Raanan is not entitled to the earlier date of the priority of the ’911 Application;
`
`only the filing date of the CIP Application. For this reason, all the references cited
`
`herein qualify as prior art.
`
`B. GROUND 1
`
`Cunningham anticipates claims 1-3, 5, 10-12, 14-15, 19, 21, and 25-26 as
`
`discussed below and explained in the Mohapatra Declaration, ¶¶88-137.
`
`1.
`
`Claim 15
`
`As explained below, Cunningham anticipates Claim 15 as it discloses every
`
`limitation of this independent claim. See also id., ¶¶112-116.
`
`Claim limitation 15[a] (preamble): “A security gateway system interposed
`
`between an external computing environment and an internal computing
`
`environment, the system comprising.” Cunningham discloses a security gateway
`
`system interposed on any network node that acts as a gateway between an external
`
`network and an internal network. Cunningham teaches that “the method and
`
`
`
`
`
`-24-
`
`
`
`

`

`IPR2017-01249
`
`system may also be implemented by examination and management at a choke
`
`point, such as a proprietary proxy 60 server, a firewall or other network node that
`
`is acting as a gateway between the network and an external network (e.g., the
`
`Internet).” Cunningham, 3:57-61. Cunningham also discloses that “Network
`
`traffic is monitored and access to internal and external resources is controlled and
`
`managed either at choke points (represented by the proxy server 28 and

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket