throbber

`
`
`
`
`
`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`ZSCALER, INC.
`Petitioner
`
`v.
`
`
`
`SYMANTEC CORPORATION,
`PATENT OWNER
`
`
`
`
`
`
`Case IPR 2017-01345
`Patent No. 7,392,543
`
`
`
`
`
`
`
`
`
`
`
`1160301
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW OF
`U.S. PATENT NO. 7,392,543
`UNDER 35 U.S.C. §§ 311-319 AND 37 C.F.R. § 42.100 ET SEQ.
`
`
`
`Mail Stop: Patent Board
`Patent Trial and Appeal Board
`United States Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`
`TABLE OF CONTENTS
`
`
`I.
`
`INTRODUCTION ............................................................................................... 1
`
`II. BACKGROUND ................................................................................................. 1
`
`A. Description of the Alleged Invention of the ’543 Patent .............................. 1
`B. Person of Ordinary Skill in the Art ............................................................... 4
`C. Prosecution History ....................................................................................... 4
`III. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R. §
`42.104 .................................................................................................................. 7
`
`A. Grounds for Standing Under 37 C.F.R. § 42.104(a) ..................................... 7
`B. Identification of Challenge Under 37 C.F.R. § 42.104(b) ............................ 7
`1. Grounds for Challenge ............................................................................ 7
`2. How the Challenged Claims Are To Be Construed Under 37 C.F.R. §
`42.104 (b) ............................................................................................................ 8
`IV. THE CHALLENGED CLAIMS ARE UNPATENTABLE .............................14
`
`A. Ground 1: Claims 1-3, 5-8, 20, 22, 26, and 29-31 are anticipated under 35
`U.S.C. § 102 by Arnold. ..............................................................................14
`1. Claim 1 ..................................................................................................16
`2. Claim 30 ................................................................................................29
`3. Claims 2 and 7 .......................................................................................30
`4. Claims 3 and 8. ......................................................................................31
`5. Claim 5 ..................................................................................................32
`6. Claim 6 ..................................................................................................33
`7. Claim 31 ................................................................................................35
`8. Claim 20 ................................................................................................35
`9. Claim 29 ................................................................................................40
`10. Claim 22 ................................................................................................41
`11. Claim 26 ................................................................................................41
`B. Ground 2: Claims 4, 9-19, and 21 are obvious under 35 U.S.C. § 103 in
`view of Arnold and the knowledge of one of ordinary skill in the art........42
`
`
`
`i
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`
`1. Claims 4 and 9 .......................................................................................43
`2. Claim 10 ................................................................................................44
`3. Claims 11, 12, 14, and 15......................................................................46
`4. Claims 13 and 16 ...................................................................................47
`5. Claim 17 ................................................................................................48
`6. Claim 18 ................................................................................................49
`7. Claim 19 ................................................................................................49
`8. Claim 21 ................................................................................................50
`C. Ground 3: Claims 20 and 29 are obvious under 35 U.S.C. § 103 in view of
`Arnold and Nachenberg ’008. .....................................................................50
`D. Ground 4: Claims 23-25 and 27-28 are obvious under 35 U.S.C. § 103 in
`view of Arnold and White. ..........................................................................53
`V. SECONDARY CONSIDERATIONS ...............................................................55
`
`VI. THE OFFICE DID NOT PREVIOUSLY CONSIDER THE GROUNDS
`PRESENTED IN THIS PETITION ..................................................................55
`
`VII. NOTICES, STATEMENTS AND PAYMENT OF FEES UNDER 37 C.F.R.
`§ 42.8(A)(1) .......................................................................................................56
`
`A. Real Party In Interest Under 37 C.F.R. § 42.8(b)(1) ...................................56
`B. Pending Related Matters Under 37 C.F.R. § 42.8(b)(2) .............................56
`C. Lead and Back-Up Counsel Under 37 C.F.R. § 42.8(b)(3) ........................57
`D. Service Information Under 37 C.F.R. § 42.8(b)(4) .....................................57
`E. Fees Under 37 C.F.R. § 42.103 ...................................................................57
`VIII. CONCLUSION ..............................................................................................58
`
`
`
`
`
`
`
`ii
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`
`PETITIONERS’ EXHIBIT LIST
`
`
`Exhibit 1003
`
`Exhibit 1004
`Exhibit 1005
`
`Description
`Exhibit No.
`Exhibit 1001 U.S. Patent No. 7,392,543 to Szor (“the ’543 patent”)
`Exhibit 1002
`’543 patent File History excerpt, February 26, 2007 Information
`Disclosure Statement
`’543 patent File History excerpt, May 4, 2007 Non-Final
`Rejection
`’543 patent File History excerpt, June 5, 2007 Amendment
`’543 patent File History excerpt, August 20, 2007 Final
`Rejection
`Exhibit 1006
`’543 patent File History excerpt, Appeal Brief
`Exhibit 1007
`’543 patent File History excerpt, Notice of Allowability
`Exhibit 1008 U.S. Patent No. 5,440,723 to Arnold, et al. (“Arnold”)
`Exhibit 1009 U.S. Patent No. 6,357,008 to Nachenberg (“Nachenberg ’008”)
`Exhibit 1010 White et al., “Anatomy of a Commercial-Grade Immune
`System,” (June 1999) (“White”)
`Exhibit 1011 Declaration of Professor Erez Zadok, PhD in Support of Petition
`for inter partes review
`Exhibit 1012 Curriculum vitae of Professor Erez Zadok
`Exhibit 1013 Excerpt of Microsoft’s Computer Dictionary, 5th edition (2002),
`Definition of Packet
`Exhibit 1014 U.S. Patent No. 7,228,563 to Szor (“Szor ’563”)
`Exhibit 1015 U.S. Patent No. 7,287,281 to Szor (“Szor ’281”)
`Exhibit 1016 U.S. Patent No. 6,546,493 to Magdych, et al. (“Magdych”)
`Exhibit 1017 U.S. Patent No. 6,412,071 to Hollander, et al. (“Hollander”)
`Exhibit 1018 U.S. Patent App. Pub. No. 2003/0088680 (“Nachenberg ’680”)
`Exhibit 1019 U.S. Patent No. 6,611,925 to Spear, et al.
`Exhibit 1020 U.S. Patent No. 7,340,777 to Szor (“Szor ’777”)
`Exhibit 1021 U.S. Patent No. 7,093,239 to van der Made
`Exhibit 1022 U.S. Patent No. 6,016,546 to Kephart, et al.
`
`
`
`iii
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`
`Exhibit 1023 M. G. Schultz, E. Eskin, E. Zadok, and S. J. Stolfo, “Data mining
`methods for detection of new malicious executables,” In
`Proceedings of the IEEE Symposium on Security and Privacy,
`pages 38–49, Oakland, CA, May 2001
`Exhibit 1024 W. Lee, W. Fan, M. Miller, S. Stolfo, and E. Zadok, “Toward
`cost-sensitive modeling for intrusion detection and response,”
`Journal of Computer Security, 10(1–2):5–22, January 2002
`Exhibit 1025 U.S. Patent No. 7,979,907 to Shultz, et al.
`Exhibit 1026 U.S. Patent No. 7,487,544 to Shultz, et al.
`Exhibit 1027 Eugene H. Spafford, “The Internet Worm Program: An
`Analysis,” published December 8, 1988
`
`
`
`iv
`
`
`
`
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`I. INTRODUCTION
`
`Zscaler, Inc. (“Zscaler” or “Petitioner”) petitions for inter partes review of
`
`claims 1-31 of U.S. Patent No. 7,392,543 (“the ’543 patent,” Ex. 1001), and
`
`requests a finding that each claim is unpatentable. As the examiner of the
`
`application for the ’543 patent understood, the claims recite a series of well-
`
`known, prior-art techniques in the field of virus and malware detection. The
`
`applicant tried to distinguish the prior art during prosecution by adding claim
`
`limitations, but those limitations are also disclosed by the prior art. If the examiner
`
`had been able to consider the references and combinations relied on herein, none of
`
`the challenged claims would have issued.
`
`This Petition demonstrates a reasonable likelihood that Zscaler will establish
`
`invalidity of at least one (in fact, all) of the challenged claims based on the grounds
`
`and prior art references relied on below. An explanation of why each claim is
`
`unpatentable under 35 U.S.C. § 102 and/or § 103 is provided. Additional
`
`explanation and support is set forth in the Declaration of Professor Erez Zadok
`
`(“Zadok,” Ex. 1011) and other exhibits.
`
`II. BACKGROUND
`
`A. Description of the Alleged Invention of the ’543 Patent
`
`The ’543 patent issued on June 24, 2008 from U.S. Patent Application No.
`
`10/611,472, which was filed on June 30, 2003. See Ex. 1001 (’543) at 1. Patent
`
`1160301
`
`1
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`owner Symantec Corp. (“Symantec”)1 has not asserted a priority date for any claim
`
`of the ’543 patent before June 30, 2003.
`
`The ’543 patent generally relates to a computer security system that detects
`
`“malicious code” (e.g., computer viruses and worms) and then generates signatures
`
`for that malicious code. See, e.g., Ex. 1001 (’543) at Abstract, 1:60-67. When
`
`malicious code is detected, a host computer sends an “extracted malicious code
`
`packet,” including extracted “signatures” or “parameters associated with” the
`
`malicious code, to a “local analysis center” for further analysis. Id.; see also id. at
`
`Fig. 3.
`
`The Background section of the ’543 patent discusses several commercial
`
`prior art computer “immune systems” or “intrusion detection systems,” such as
`
`IBM’s Digital Immune System, Symantec’s ManHuntTM system, or the open
`
`source “snort” system. See id. at 1:11-47. The ’543 patent criticizes alleged
`
`limitations of these systems. Id. It purports to improve on the prior art by more
`
`“rapidly detect[ing] and prevent[ing]” the “spread of the malicious code.” Id. at
`
`2:7-8.
`
`The’543 patent describes and claims a number of known prior-art techniques
`
`
`1 Petitioner’s identification of Symantec as the patent owner is based on
`
`Symantec’s allegation of ownership in the District Court Litigation.
`
`1160301
`
`2
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`for detecting and reporting malicious code. As detailed herein and in the Zadok
`
`Declaration, the ’543 patent was far from the first patent or publication to describe
`
`a system that detects malicious code, extracts snippets and signatures from that
`
`code, or notifies an analysis center. By the filing date of the ’543 patent, these
`
`were standard functions of existing virus detection and security software products.
`
`Ex. 1011 (Zadok) at ¶¶ 64-88. For instance, the ’543 patent itself admits that the
`
`mechanics of creating and sending the claimed “malicious code packet” were well-
`
`known in the art and not novel:
`
`Protocols and formats for network packets are well known to
`those of skill in the art and depend, for example, on the
`particular type of network 106, and so create extracted
`malicious code packet operation 214A is not discussed further
`to avoid detracting from the principals of the invention.
`
`Ex. 1001 (’543) at 10:32-36.
`
`Independent method claims 1 and 6―and their counterpart system claims 30
`
`and 31 respectively―share limitations and differ only in whether a “malicious
`
`code signature” (claim 1) or “parameters associated with said malicious code”
`
`(claim 6) are extracted and included in the “malicious code packet.” Id. at 18:7-20,
`
`18:34-46. As explained below, the specific technique for extracting a malicious
`
`code signature, and the specific list of parameters, were added during prosecution
`
`to obtain allowance over the examiner’s rejection. But as shown below, none of
`
`the added limitations were actually novel at the time of the alleged invention,
`
`1160301
`
`3
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`because prior-art patents and publications already disclosed detecting attacks,
`
`extracting signatures or parameters from the malicious code (including the specific
`
`techniques and parameters added to the claims), creating malicious code packets,
`
`and sending them to analysis centers. See, e.g., Ex. 1011 (Zadok) at ¶¶ 68-81.
`
`B. Person of Ordinary Skill in the Art
`
`A person of ordinary skill in the art at the time of the alleged invention of
`
`the ’543 patent would have had at least a bachelor’s (four-year) degree in computer
`
`science, computer engineering, or a related field; and a few years of experience in
`
`software development, preferably related to cyber-security or information
`
`assurance. A higher level of education might make up for less experience or skill,
`
`and vice-versa. Ex. 1011 (Zadok) at ¶¶ 35-36. Such a person would have been
`
`familiar with the techniques disclosed in publications and patents related to well-
`
`known prior art such as IBM’s Digital Immune System. Id. at ¶¶ 66-88.
`
`C. Prosecution History
`
`The examiner found all of the original claim limitations in the prior art and
`
`rejected the then-pending claims as anticipated by U.S. Patent No. 6,546,493 to
`
`Magdych et al. (Ex. 1016). See Ex. 1003 (May 4, 2007 Non-Final Rejection) at 2-
`
`20. The examiner found that Magdych “clearly encompasses the claimed
`
`limitations as broadly interpreted by the examiner” for each limitation of each
`
`claim then presented. Id. For example, Magdych clearly disclosed the detecting,
`
`1160301
`
`4
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`extracting, creating, and sending steps of independent claims 1 and 27, now claims
`
`1 and 30. See id. at 3-4. It also clearly disclosed the attack threshold limitation of
`
`claims 16 and 29, now claims 20 and 29, via its discussion of “risk assessment.”
`
`Id. at 13-14.
`
`To overcome the rejection, the applicant amended each of the independent
`
`claims. See Ex. 1004 (June 5, 2007 Amendment) at 3-9. Claims 1 and 27, now
`
`claims 1 and 30, were amended to add requirements to the extracting limitation,
`
`namely “locating a caller’s address of said malicious code in a memory of said first
`
`computer system” and “extracting a specific number of bytes backwards from said
`
`caller’s address.” Id. at 3, 7. Claims 5 and 28, now claims 6 and 31, were
`
`amended to include a list of specific parameters. Id. at 3-4, 7-8. Claims 16 and 29,
`
`now claims 20 and 29, were amended to include the requirement of “delivering a
`
`signature update comprising a malicious code signature to an intrusion detection
`
`system” after the attack threshold has been determined to be exceeded. Id. at 5-6,
`
`8; see also Ex. 1011 (Zadok) at ¶¶ 91-93.
`
`These amendments eventually led to allowance. See Ex. 1011 (Zadok) at ¶¶
`
`94-96. In particular, the new “locating a caller’s address” and “extracting a
`
`specific number of bytes backward” limitations were discussed by the examiner,
`
`who believed the limitations to be satisfied by the prior art teaching of “the
`
`collection of the stack/frame involved in the area of memory associated with the
`
`1160301
`
`5
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`address of the malicious code.” Ex. 1005 (August 20, 2007 Final Rejection) at 23-
`
`24. Applicant disputed that this well-known concept was actually taught in the
`
`particular asserted reference. See Ex. 1006 (Appeal Brief ) at 14.
`
`In the final Notice of Allowance, the examiner concluded:
`
`Nowhere in the prior art is found collectively the italicized claim
`elements (i.e., the specific aspects of signature extraction of [specific
`block/bytes] malware [executable] code, relative to the calling address
`location [backwards], with the subsequent forwarding to another
`processing [computer] system), at the time of the invention, serving to
`patently distinguish the invention from said prior art.
`
`Ex. 1007 (Notice of Allowability) at 2. The examiner did not find or call out any
`
`limitations of the dependent claims to be novel in themselves over the prior art,
`
`instead merely stating that the dependent claims were “allowable by virtue of their
`
`dependencies” on the amended independent claims. Id. at 3.
`
`In summary, the examiner did not find any of the individual steps of the
`
`independent (or dependent) claims to be novel, but instead allowed the claims
`
`because of the belief that the limitations were not disclosed “collectively” with, for
`
`example, “the specific aspects of signature extraction of [specific block/bytes]
`
`malware [executable] code, relative to the calling address location [backwards].”
`
`Id. As shown below, however, the prior art not before the examiner actually
`
`disclosed all of the supposedly distinguishing limitations added by claim
`
`amendments―but that art was not considered.
`
`1160301
`
`6
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`III. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R.
`§ 42.104
`
`A. Grounds for Standing Under 37 C.F.R. § 42.104(a)
`
`
`
`Zscaler certifies under 37 C.F.R. § 42.104(a) that the ’543 patent is available
`
`for inter partes review, and that Zscaler is not barred or estopped from requesting
`
`inter partes review based on the grounds herein, specifically: (i) Zscaler does not
`
`own the ’543 patent; (ii) Zscaler has not filed a civil action challenging the validity
`
`of any claim of the ’543 patent, and (iii) this Petition is filed less than one year
`
`after the date that Zscaler was first served with a complaint alleging infringement
`
`of the ’543 patent.
`
`B. Identification of Challenge Under 37 C.F.R. § 42.104(b)
`
`1. Grounds for Challenge
`
`Zscaler requests inter partes review of the challenged claims in view of the
`
`references, and on the grounds described, below:
`
`a. Ground 1: Claims 1-3, 5-8, 20, 22, 26, and 29-31 are invalid as anticipated
`
`under 35 U.S.C. § 102 by U.S. Patent No. 5,440,723 to Arnold et al.
`
`(“Arnold”) (Ex. 1008).
`
`b. Ground 2: Claims 4, 9-19, and 21 are invalid as obvious under 35 U.S.C. §
`
`103 in view of Arnold and the knowledge of one of ordinary skill in the art.
`
`1160301
`
`7
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`
`c. Ground 3: Claims 20 and 29 are invalid as obvious under 35 U.S.C. § 103
`
`in view of Arnold and U.S. Patent No. 6,357,008 to Nachenberg
`
`(“Nachenberg ’008”) (Ex. 1009).
`
`d. Ground 4: Claims 23-25, and 27-28 are invalid as obvious under 35 U.S.C.
`
`§ 103 in view of Arnold and White et al., “Anatomy of a Commercial-Grade
`
`Immune System,” June 1999 (“White”) (Ex. 1010).
`
`Section IV identifies where each limitation of the challenged claims is found
`
`in the prior-art references. 37 C.F.R. § 42.104(b)(4). The exhibit numbers of the
`
`supporting evidence relied upon to support the challenges are provided above and
`
`the relevance of the evidence to the challenges raised are provided in Section IV.
`
`37 C.F.R. § 42.104(b)(5).
`
`2. How the Challenged Claims Are To Be Construed Under 37 C.F.R. § 42.104
`(b)
`
`“A claim in an unexpired patent that will not expire before a final written
`
`decision is issued shall be given its broadest reasonable construction in light of the
`
`specification of the patent in which it appears.” 37 C.F.R. § 42.100(b). Zscaler
`
`proposes the following broadest reasonable constructions for the claim terms
`
`below. The constructions are offered solely for purposes of this Petition and do not
`
`necessarily reflect appropriate claim constructions in a Markman hearing in
`
`litigation. Claim construction has yet to occur in the District Court Litigation, and
`
`to Zscaler’s knowledge the claim terms have not been previously construed.
`8
`
`1160301
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`
`a. “caller’s address”
`
`The broadest reasonable interpretation for “caller’s address” is a “memory
`
`location of the malicious code.”
`
`The ’543 patent defines “caller’s address” in the specification as including
`
`“the memory location, sometimes called the caller’s address, of the malicious
`
`code.” Ex. 1001 (’543) at 5:19-24, 5:45-50. Zscaler’s proposed construction
`
`tracks this definition verbatim. In addition to the specification, the claim language
`
`itself makes clear that the caller’s address is a memory location of the malicious
`
`code. For example, in claim 1, the caller’s address is “of said malicious code in a
`
`memory.” Id. at 18:13-14. The ’543 specification also incorporates “by reference
`
`in its entirety” an application that led to U.S. Patent No. 7,287,281 (“Szor ’281,”
`
`Ex. 1015). Ex. 1001 (’543) at 3:54-58. The incorporated application and patent
`
`contains further disclosure consistent with the proposed construction that “the
`
`Caller’s Address is an address located in the malicious code.” Ex. 1015 (Szor
`
`’281) at 7:42-47; see also Ex. 1011 (Zadok) at ¶¶ 99-105.
`
`Additionally, the ’543 specification describes an embodiment in which “the
`
`caller’s address is the memory location of the instruction or set of instructions that
`
`originated the critical operating system function call.” Ex. 1001 (’543) at 5:57-59.
`
`An example is given in the specification in which the caller’s address is the “call”
`
`instruction at location “00000174,” referred to in the example as a “sendto()”
`
`1160301
`
`9
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`instruction, and the corresponding malicious code signature is the 32 bytes of
`
`malicious code extracted from the memory locations preceding it. Id. at 9:38-10:4.
`
`In another embodiment in the specification, the caller’s address is similarly
`
`referred to as “the location of the sendto( ) API of the malicious code.” Id. at 6:9-
`
`11.
`
`A person of ordinary skill in the art would understand that, while the
`
`“caller’s address” memory location described in the ’543 patent may be at or near
`
`the beginning (or “head”) of the malicious code in memory, it may not be the very
`
`first malicious code instruction location in memory. See Ex. 1011 (Zadok) at ¶¶
`
`103-104. Whether in the front or middle of the malicious code, the “caller’s
`
`address” is the address, within the malicious code in memory, of the hooked
`
`system call instruction at which the system detects the malicious code. Id.
`
`That person of ordinary skill would therefore understand that the claim
`
`requirement of “extracting a specific number of bytes backward” from the caller’s
`
`address location could capture an extracted malicious code signature, made up of a
`
`specific sequence of bytes of the malicious code, according to the claims. For
`
`example, in the embodiment given in the ’543 patent, the 32-byte sequence of
`
`bytes of the malicious code starts at (hexadecimal) location 00000155, which is 32-
`
`bytes backwards from the caller’s address location at (hexadecimal) 00000174.
`
`See Ex. 1001 (’543) at 9:38-10:4; Ex. 1011 (Zadok) at ¶ 100. This is consistent
`
`1160301
`
`10
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`with each of the constructions proposed here.
`
`For all of these reasons, the broadest reasonable interpretation of “caller’s
`
`address” in the claims in light of the specification is a “memory location of the
`
`malicious code.”
`
`b. “malicious code signature”
`
`The broadest reasonable interpretation for “malicious code signature” is
`
`“specific sequence of bytes of the malicious code.”
`
`The proposed construction is what would be understood by a person of
`
`ordinary skill in light of the specification. Ex. 1011 (Zadok) at ¶¶ 106-109. First,
`
`the proposed construction is supported by the plain meaning of the claim language
`
`itself, which describes obtaining the malicious code signature by “extracting a
`
`specific number of bytes” back from the caller’s address “of the malicious code.”
`
`Ex. 1001 (’543) at 18:11-16 (claim 1), 18:32-33 (claim 5).
`
`The specification supports the proposed construction, explaining that the
`
`malicious code signature is made up of bytes “extracted” from the code itself,
`
`rather than being a mere identifier assigned to the code. See, e.g., Ex. 1001 (’543)
`
`at 9:25-29 (“In extract malicious code signature operation 304, the signature,
`
`sometimes called malicious code signature, of the malicious code is extracted.
`
`For example, a custom size signature from the malicious code is extracted using an
`
`extraction engine.”) (emphasis added). The specification also directly defines a
`
`1160301
`
`11
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`signature as a “specific sequence of information, e.g., bytes.” Id. at 9:29-32
`
`(emphases added); see also id. at 9:38-10:4 (example of an extracted malicious
`
`code signature that is a 32-byte sequence of the malicious code).
`
`This construction is further supported in the prosecution history. In the
`
`“Summary of Claimed Subject Matter” in the appeal brief leading to allowance, the
`
`applicant described the “malicious code signature” as follows:
`
`For example, a custom size signature from the malicious code is
`extracted using an extraction engine. In one embodiment, the
`malicious code signature is 32 bytes of the malicious code
`extracted backwards from the callers address. A signature is a
`specific sequence of information, e.g., bytes.
`
`Ex. 1006 (Appeal Brief) at 6 (emphasis in original). In sum, a “malicious code
`
`signature” is a “specific sequence of bytes of the malicious code” in the ’543
`
`patent.
`
`c. “attack threshold”
`
`The broadest reasonable interpretation for “attack threshold” is “a minimum
`
`level of suspicious activity associated with the received extracted malicious code
`
`packets that results in a conclusion that an attack has occurred.”
`
`The proposed construction is consistent with the specification, as understood
`
`by one of ordinary skill in the art. See Ex. 1011 (Zadok) at ¶¶ 110-112. The
`
`specification explicitly defines an “attack threshold” to be “a minimum threshold
`
`of suspicious activity associated with the received extracted malicious code
`
`1160301
`
`12
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`packets to results [sic] in a conclusion that an attack has occurred.” Ex. 1001
`
`(’543) at 12:66-13:2. The proposed construction tracks this given definition
`
`verbatim.
`
`The sole disclosed embodiment in the specification also is consistent with
`
`the proposed construction, providing an example of a threshold implemented as a
`
`“counter” that “is incremented each time an extracted malicious code packet is
`
`received by local analysis center computer system.” Id. at 13:3-5. That counter
`
`may be “incremented more or less” (i.e., weighted) based on different levels of
`
`suspicion associated with different malicious code packets, such that a single
`
`instance of a particular suspicious packet could exceed the attack threshold. Id. at
`
`13:5-29.
`
`d. “sendable”
`
`The broadest reasonable interpretation for “sendable” is “small enough to be
`
`sent without unacceptable network congestion.”
`
`The proposed construction is consistent with the explicit definition and
`
`disclosed embodiments in the specification, as well as the understanding of a
`
`person of ordinary skill in the art. See Ex. 1011 (Zadok) at ¶¶ 113-114. The patent
`
`specification refers to “malicious code sendable check operation 206” which is, in
`
`all disclosed embodiments, a size check. See, e.g., Ex. 1001 (’543) at 5:12-17 (“As
`
`is well known to those of skill in the art, shell code is written in a very short and
`
`1160301
`
`13
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`compact way and is therefore typically sendable”), 5:33-36 (“if the size of the
`
`malicious code is greater than 8 KB, . . . the malicious code is not sendable”), 5:40-
`
`41 (“relatively long and not sendable”). The ’543 patent defines “sendable”
`
`generally as being small enough to be sent without “unacceptable congestion” on
`
`the network. Id. at 5:37-39 (“Generally, the malicious code is not sendable if
`
`sending of the malicious code on network 106 causes unacceptable congestion.”).
`
`IV. THE CHALLENGED CLAIMS ARE UNPATENTABLE
`
`Pursuant to 37 C.F.R. §§ 42.104(b)(4) and (b)(5), Zscaler sets forth an
`
`explanation below of why the challenged claims are unpatentable under 35 U.S.C.
`
`§ 102 and/or § 103. The claim charts identify the exemplary supporting evidence
`
`relied upon to support the challenge by exhibit number and set forth the relevance
`
`of the evidence to the challenge raised, including an identification of those specific
`
`portions of the evidence that support the challenge. An Exhibit List (see 37 C.F.R.
`
`§ 42.63(e)) identifying the Declaration of Professor Erez Zadok (Ex. 1011) and
`
`other evidence supporting the petition is also included, supra, at p. iii.
`
`A. Ground 1: Claims 1-3, 5-8, 20, 22, 26, and 29-31 are anticipated under
`35 U.S.C. § 102 by Arnold.
`
`Claims 1-3, 5-8, 20, 22, 26, and 29-31 are invalid as anticipated by U.S.
`
`Patent No. 5,440,723 to Arnold, et al. (“Arnold”), entitled “Automatic Immune
`
`System for Computers and Computer Networks.” Ex. 1008 (Arnold) at 1. Arnold
`
`is prior art to the ’543 patent under pre-AIA 35 U.S.C. §§ 102(a), (b), and (e), as it
`14
`
`1160301
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`issued on August 8, 1995 from an application filed on January 19, 1993. Id.
`
`One of the objects of Arnold’s invention was to “provide methods and
`
`apparatus to automatically detect and extract a signature from an undesirable
`
`software entity, such as a computer virus or worm.” Id. at 2:34-37 (emphases
`
`added). Another object of Arnold’s invention was to “provide methods and
`
`apparatus for immunizing a computer system, and also a network of computer
`
`systems, against a subsequent infection by a previously unknown and undesirable
`
`software entity.” Id. at 2:38-42.
`
`Arnold accomplished this immunization by sending packets over the
`
`network with “all pertinent details of the viral infection, such as the set of
`
`signatures extracted thus far, so that an expert, either human or software program,
`
`can identify the problem as quickly as possible.” Id. at 20:64-68.
`
`Arnold is addressed to the same problems of malware detection and
`
`prevention as addressed in the ’543 patent. The similarities in the solutions can be
`
`seen from comparing Figure 2 of Arnold with Figure 3 of the ’543 patent, as
`
`below. Both figures clearly show the primary limitations of, for example, ’543
`
`independent claims 1 and 30, including a detection step (compare “Anomalous
`
`Behavior Detected” with “Attack?”), extraction of a malicious code signature
`
`(compare “Extract Signature From Code” with “Extract Malicious Code
`
`Signature”), as well as creation and sending of a malicious code packet (compare
`
`1160301
`
`15
`
`

`

`Case IPR 2017-01345
`Petition for Inter Partes Review of Patent 7,392,543
`
`“Inform Other Network Processors” with “Create Extracted Malicious Code
`
`Packet” and “Send Packet”):
`
`Ex. 1008 (Arnold) at Fig. 2
`
`
`
`
`
`
`
`
`
`Ex. 1001 (’543) at Fig. 3
`
`As detailed further below, Arnold’s method of malicious code signature
`
`extraction was more complex than the comparatively simplistic appro

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket