throbber
Case: 21-1532
`
`Document:46
`
`Page:1
`
`Filed: 03/09/2022
`
`Anited States Court of Appeals
`for the federal Circuit
`
`APPLEINC.,
`Appellant
`
`Vv.
`
`MPH TECHNOLOGIES OY,
`Appellee
`
`2021-1532, 2021-1533, 2021-1534
`
`Appeals from the United States Patent and Trademark
`Office, Patent Trial and Appeal Board in Nos. IPR2019-
`00823, IPR2019-00824, IPR2019-00826.
`
`Decided: March 9, 2022
`
`JOSEPH R. PALMORE, Morrison & Foerster LLP, Wash-
`ington, DC, argued for appellant. Also represented by
`SETH W. LLOYD, BRIAN ROBERT MATSUI; LENA HUGHES;
`New York, NY; RICHARD HUNG, San Francisco, CA; BITA
`RAHEBI, Los Angeles, CA.
`
`BRIAN ERIK HAAN, Lee Sheikh Megley & Haan LLC,
`Chicago, IL, argued for appellee. Also represented by
`ASHLEY E. LAVALLEY, CHRISTOPHER. LEE, RICHARD BURNS
`MEGLEY,
`JR.;
`JAMES CARMICHAEL,
`STEPHEN TERRY
`SCHREINER, Carmichael IP, PLLC, Tysons Corner, VA.
`
`

`

`Case: 21-1532
`
`Document:46
`
`Page:2
`
`Filed: 03/09/2022
`
`bo
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`Before MoorRE, Chief Judge, PROST and TARANTO, Circuit
`Judges.
`
`Moore, Chief Judge.
`
`Apple appeals from three Patent Trial and Appeal
`Board inter partes review final written decisions collec-
`tively holding Apple failed to show claims2, 4, 9, and 11 of
`U.S. Patent No. 9,712,494; claims 7-9 of U.S. Patent No.
`9,712,502; and claims8, 5, 10, and 12-16 of U.S. Patent No.
`9,838,362 would have been obvious. Forthe following rea-
`sons, we affirm.
`
`BACKGROUND
`
`I
`
`The challenged patents share a written description and
`purport to improve secure messaging between arbitrary
`hosts (e.g., messaging across local area networks (LANs),
`private and public wide area networks (WANs), or the in-
`ternet) utilizing Internet Protocol (IP) security protocols.
`494 patent at 1:54-57; 7:38-45.1 IP security protocols re-
`quire establishing a security association,
`id. at 2:39-49,
`_that costs computation time and increases network la-
`tency, id. at 4:44-45. They are purportedly designed for
`static connections and, thus, not well suited for communi-
`cations with mobile computers, leading to poor quality of
`service for communication over wireless links. Id. at 4:39-
`43; 5:7-14. To solve these problems, systems commonly
`utilize an intermediate host that facilitates communication
`between a mobile terminal and its communication target
`(e.g., a security gateway). Id. at 5:15-6:14. These common
`solutions, however, heavily rely on a concept known as tun-
`neling.
`In tunneling, typically an entire data packet, in-
`cluding its outer header, is encapsulated and a new outer
`
`1
`
`For simplicity, we cite to the ’494 patent.
`
`

`

`
`
`Case: 21-1532 Page:3_Filed: 03/09/2022Document:46
`
`
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`3
`
`Id. at 3:21-49. The use of tunneling in
`header is added.
`the known solutions can cause extra packet size overhead,
`or require the intermediate computerto decrypt the packet,
`which could cause potential security problems. Id. at 6:21—
`24.
`
`The patents disclose a method for secure forwarding of
`a message from a first computer to a second computer via
`an intermediate computer in a telecommunication network
`that purportedly avoids these disadvantages.
`Id. at Ab-
`stract; 6:28-31. Preferably, a first computer “processes[a]
`formed message using a security protocol and encapsulates
`the message at least in an outer IP header,” which is sent
`to an intermediate computer. Id. at 6:54-59. The interme-
`diate computer “matches the outer IP header addressfields
`together with a unique identifier used by the security pro-
`tocol, and performsa translation of the outer addresses and
`the unique identity used by the security profile.” Id. at
`6:59-63. The translated packet is then sent to a second
`computer, which processesit using a standard security pro-
`tocol. This method does not use any “extra encapsulation
`overhead”typical of prior-art solutions. Id. at 6:65—-67.
`The claims of the 494 and ’362 patents cover the inter-
`mediate computer. Claim 1 of the 494 patent is a repre-
`sentative independent claim for those patents:
`
`1. An intermediate computer for secure forwarding
`of messagesin a telecommunication network, com-
`prising:
`
`an intermediate computer configured to
`connect to a telecommunication network;
`
`the intermediate computer configured to be
`assigned with a first network address in
`the telecommunication network;
`
`the intermediate computer configuredto re-
`ceive from a mobile computer a secure mes-
`sage sent
`to the first network address
`
`

`

`Case: 21-1532
`
`Document:46
`
`Page:4
`
`Filed: 03/09/2022
`
`4
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`having an encrypted data payload of a mes-
`sage and a unique identity, the data pay-
`load encrypted with a cryptographic key
`derived from a key exchange protocol;
`
`the intermediate computer configured to
`read the unique identity from the secure
`message sent to the first network address;
`and
`
`the intermediate computer configured to
`access a translation table, to find a destina-
`tion address from the translation table us-
`ing the unique identity, and
`
`to securely forward the encrypted data pay-
`load to the destination address using a net-
`work addressof the intermediate computer
`as a source address of a forwarded message
`containing the encrypted data payload
`wherein the intermediate computer does
`not have the cryptographic key to decrypt
`the encrypted data payload.
`
`(emphasis added).
`
`The 502 patent claims the mobile computer that sends
`the secure message to the intermediate computer. Claim 1
`is a representative independent claim:
`
`1. A computer for sending secure messages,andfor
`enabling secure forwarding of messagesinatele-
`communication network by an intermediate com-
`puter to a recipient computer, comprising:
`
`a computer configured to connect to a tele-
`communication network;
`
`the computer configured to be assigned
`with a network address in the telecommu-
`nication network, wherein the computeris
`
`

`

`
`
`Case: 21-1532 Page:5_Filed: 03/09/2022Document:46
`
`
`
`APPLE INU. v. MPH TECHNOLOGIES OY
`
`5
`
`a mobile computer in that the address of
`the mobile computer changes;
`
`the computer configured to form a secure
`message by encrypting the data payload of
`a message and giving the message a unique
`identity and a destination addressof an in-
`termediate computer, wherein the unique
`identity and the destination addressare ca-
`pable of being used by the intermediate
`computer to find an address to a recipient
`computer;
`
`the computer configured to send the secure
`message to the intermediate computerfor
`forwarding of the encrypted data payload
`to the recipient. computer; and
`
`the computer configured to set up a secure
`connection using a key exchangeprotocol.
`
`II
`
`MPHasserted claims of the challenged patents against
`Apple in the Northern District of California. Apple peti-
`tioned for inter partes review of each claim of the three pa-
`tents, relying primarily on a combination of Request for
`Comments 3104 (RFC3104)? and U.S. Patent No. 7,032,242
`(Grabelsky)(collectively, the combination). The Board held
`that Apple failed to show that several dependent claimsof
`each patent would have been obviousin view of the combi-
`nation. Apple challenges each of these determinations. We
`have jurisdiction under 28 U.S.C. § 1295(a)(4)(A).
`
`2G. Montenegro & M. Borella, RSIP Support for
`End-to-end IPsec, Request for Comments 3104, The Inter-
`net Society (Oct. 2001).
`
`

`

`Case: 21-1532
`
`Document:46
`
`Page:6
`
`Filed: 03/09/2022
`
`6
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`DISCUSSION
`
`Wereview claim construction de novo and any subsid-
`iary factual findings based on extrinsic evidence for sub-
`stantial evidence. Cisco Sys., Inc. v. Intl Trade Comm'n,
`873 F.3d 1354, 1360 (Fed. Cir. 2017). Claim termsare gen-
`erally given their plain and ordinary meaning, whichis the
`meaning one of ordinary skill in the art would ascribe to a
`term when read in the context of the claim, specification,
`and prosecution history. See Phillips v. AWH Corp., 415
`F.3d 1303, 1813-14 (Fed. Cir. 2005) (en banc). “There are
`only two exceptions to this general rule: 1) when a patentee
`sets out a definition and acts as his own lexicographer, or
`2) when the patentee disavows the full scope of a claim
`term either in the specification or during prosecution.”
`Thorner v. Sony Comput. Ent. Am. LLC, 669 F.3d 1362,
`1365 (Fed. Cir. 2012).
`
`We also review the Board’s legal conclusionsof obvious-
`ness de novo and factual findings for substantial evidence.
`Personal Web Techs., LLC v. Apple, Inc., 848 F.3d 987, 991
`(Fed. Cir. 2017). “What a piece ofprior art teaches presents
`a question of fact.” Ariosa Diagnostics v. Verinata Health,
`Inc., 805 F.3d 1359, 1364 (Fed. Cir. 2015).
`
`I
`
`Dependent claim 11 of the 494 patent and dependent
`claim 12 of the 362 patent require that “the source address
`of the forwarded messageis the same asthefirst network
`address.” The Board wasnot persuaded that RFC3104 dis-
`closes this limitation.
`
`RFC3104 discloses mechanisms for enabling IP secu-
`rity protocol communications using Realm Specific IP
`(RSIP). The document utilizes the following model topol-
`ogy:
`
`

`

`Case: 21-1532
`
`Document:46
`
`Page:7
`
`Filed: 03/09/2022
`
`APPLE INC. ¥. MPH TECHNOLOGIES OY
`
`7
`
`RSIP client
`
`RSIP server
`
`Host
`
`Xa
`
`Na
`
`Nb
`Nb1 +------------ +
`tence eee ene ne +
`[X]------ | Addr space |----[N]----- | Addr space |------- {Y]
`|
`A
`|
`Nb2
`|
`B
`|
`Hace nee wees +
`eee Pee eee eee +
`
`Yb
`
`J.A. 1187. In this model, an RSIP server examines a packet
`sent by Y destined for X. J.A. 1188.
`“X and Y belong to
`different address spaces A and B,respectively, and N is an
`[intermediate] RSIP server.” Id. N has two addresses: Na
`on address space A and Nb on addressspace B, which are
`different. Id. According to Apple, the message sent from Y
`to X is received by RSIP server N on the Nb interface and
`then must be sent to Na before being forwarded to X as
`shownin the diagram below:
`
`
`
`In Apple’s view, because the intermediate
`J.A. 249-50.
`computer sends the message from Nb to Na before forward-
`ing it to X, Na is both a first network address and the
`source address of the forwarded message. That the mes-
`sage was not sent directly to Na, Apple claims,is of no im-
`port given the claim language. The Board disagreed and
`found there was no record evidence that the mobile com-
`puter sent the message directly to Na. Apple Inc. v. MPH
`
`

`

`Case: 21-1532
`
`Document: 46
`
`Page:8
`
`Filed: 03/09/2022
`
`8
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`Techs. Oy, No. IPR2019-00823, 2020 WL 6494243, at *22
`(P.T.A.B. Nov. 4, 2020).3
`
`Apple argues the Board misconstrued the claimsto re-
`quire that the mobile computer send the secure message
`directly to the intermediate computer. According to Apple,
`that construction is inconsistent with the phrase “interme-
`diate computer configured to receive from a mobile com-
`puter a secure message sent to the first network address”
`in claim 1 of the ’494 patent, upon which claim 11 depends.4
`Underthis passive language, Apple claims, the mobile com-
`puter need not send the messageto thefirst network ad-
`dress so long as the message is sent there eventually.
`Opening Br. 27-31; Oral Arg. at 2:27-3:16.5 We do not
`agree.
`.
`
`The plain meaning of “intermediate computer config-
`ured to receive from a mobile computer a secure message
`sent to the first network address” requires the mobile com-
`puter to send the message to the first network address.
`The phrase identifies the sender(i.e., the mobile computer)
`and the destination(i.e., the first network address). The
`proximity of the concepts links them together, such that a
`natural reading of the phrase conveys the mobile computer
`sends the secure message to the first network address.
`That the claims use passive voice is of no import. The plain
`language establishes direct sending.
`
`The final written decision for the ’494 patent is
`3
`nearly identical in several respects to that of the ’362 pa-
`tent. For simplicity, we cite to the final written decision of
`the 494 patent.
`4 Claim 1 of the 362 patent, upon which claim 12 de-
`pends, contains the same phrase, cxceptit refers to a “sec-
`ond computer”instead of a “mobile computer.”
`5 Available at https://oralarguments.cafc.uscourts.
`gov/default.aspx?fl=21-1532_01142022.mp3.
`
`

`

`Case: 21-1532
`
`Document: 46
`
`Page:9
`
`Filed: 03/09/2022
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`9
`
`The written description confirms this plain meaning.
`It describes how the mobile computer forms the secure
`message with “the destination address. .
`. of the interme-
`diate computer.” 494 patent at 6:56-58 (emphasis added);
`accord id. at 11:32-33. The mobile computer then sends
`the message to that address. Jd. at 6:58-63. There is no
`passthrough destination address in the intermediate com-
`puter that the secure messageis sent to before the first des-
`tination address. Accordingly, like the claim language, the
`written description describes the secure message as sent
`from the mobile computer directly to the first destination
`address.
`
`Apple’s claim construction argument therefore fails.
`And Apple does not challenge the Board’s finding that
`RFC3104 does not disclose the limitation of claim 11 of the
`"494 patent and claim 12 of the ’362 patent under the
`Board’s construction. Accordingly, we affirm the Board’s
`holding that Apple failed to show those claims would have
`been obvious.
`
`II
`
`Dependentclaim 4 of the ’494 patentis similar to claim
`5 of the 3862 patent and recites:
`
`4. The intermediate computer of claim 1, wherein
`the translation table includes two partitions, the
`first partition containing information fields related
`to the connection over which the secure messageis
`sent to the first network address, the secondparti-
`tion containing information fields related to the
`connection over which the forwarded encrypted
`data payload is sent to the destination address.
`
`(emphasis added).
`
`The Board interpreted “information fields” in this
`claim to require “two or more fields.” Apple, 2020 WL
`6494243, at *19. And because Apple’s obviousness argu-
`ment relied on Figure 21 of Grabelsky, which disclosed a
`
`

`

`Case: 21-1532
`
`Document:46
`
`Page: 10
`
`Filed: 03/09/2022
`
`10
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`partition with only a single field, the Board found Apple
`failed to show the combination taught this limitation. Id.
`at *19-20. Moreover, the Board found Apple failed to show
`a motivation to modify the combination to use multiple
`fields. Id. at *20-21. Apple challenges this finding as well
`as the Board’s construction of informationfields.
`
`A
`
`On claim construction, Apple claims there is a pre-
`sumption that a plural term covers one or more items.
`Opening Br. 33. It suggests that patentees can overcome
`that presumption by using a word,
`like plurality, that
`clearly requires more than one item. Oral Arg. at 9:44—
`10:20. Apple misstates the law.
`
`In accordance with common English usage, we pre-
`sumea plural term refers to two or more items. See Leggett
`& Platt, Inc. v. Hickory Springs Mfg. Co., 285 F.3d 1353,
`1357 (Fed. Cir. 2002) (“[T]he claim recites ‘support wires’
`in the plural, thus requiring more than one welded ‘support
`wire.”); cf. Dayco Prods. v. Total Containment, Inc., 258
`F.3d 1317, 1327-28 (Fed. Cir. 2001) (plurality “when used
`in a claim, refers to two or more items, absent some indica-
`tion to the contrary”). That presumption can be overcome
`when the broader context shows a different meaning ap-
`plies. See Versa Corp. v. Ag-Bag Intl. Ltd., 392 F.3d 1325,
`1330 (Fed. Cir. 2004) (holding a plural term,in context, did
`not require more than one item). This is simply an appli-
`cation of the general rule that claim terms are usually
`given their plain and ordinary meaning. See Thorner, 669
`F.3d at 1365 (discussing exceptions to plain-and-ordinary
`meaning rule).é
`
` Apple’s reliance on the statutory canon that “in the
`6
`absence of the contrary indication .
`.
`. the singular includes
`the plural (and vice versa)” is misplaced. Opening Br. 33
`(quoting Antonin Scalia and Bryan A. Garner, Reading
`
`

`

`Case: 21-1532
`
`Document:46
`
`Page:11
`
`Filed: 03/09/2022
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`11
`
`Here, the term “information fields” is plural and, thus,
`presumably requires more than onefield. Nothing in the
`phrase “partition containing information fields related to
`the connection” or surrounding claim language suggests
`otherwise. There is no indication, for example, that the use
`of the plural fields represents an effort to “achieve gram-
`matical consistency” with another term. Jn re Omneprazole
`Patent Lit., 84 F. App’x 76, 80 (Fed. Cir. 2003) (non-prece-
`dential). Nor is the term used to describe a function (e.g.,
`meansfor creating fields). See Versa Corp., 392 F.3d at
`1330 (holding “meansfor creating air channels” did not re-
`quire a supporting structure that made multiple channels).
`
`The written description also does not persuade us to
`depart from the presumption that “information fields” re-
`fers to two or morefields. For example, we see no express
`language indicating the plural should include the singular
`or broadly describing the invention as containing one or
`more fields. To be sure, there is nothing in the written de-
`scription providing any significance to using a plurality of
`information fields in a partition. However, absent any con-
`trary intrinsic evidence, the Board correctly held thatfields
`referred to more thanonefield.
`
`B
`
`On motivation to modify the combination to use more
`than one field, Apple faults the Board for rejecting its ex-
`pert’s testimony. Apple argues the Board abusedits dis-
`cretion by applying the teaching, suggestion, or motivation
`
`Law: The Interpretation of Legal Texts 129 (2012)). The
`United States Code expressly states that “[i]n determining
`the meaning of any Act of Congress, unless the context in-
`dicates otherwise ... words importing the plural include
`the singular... .”
`1 U.S.C. §1. In short, Congress made
`clear throughstatute that plural includes singular. There
`is no similardefinition in this patent.
`
`

`

`Case: 21-1532
`
`Document:46
`
`Page: 12
`
`Filed: 03/09/2022
`
`12
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`test rejected in KSR IntCo. v. Teleflex Inc., 550 U.S. 398
`(2007). Wesee no sucherror in the Board’s analysis.
`
`The Board examined both the initial and the supple-
`mental declarations of Apple’s expert. It found that testi-
`mony was conclusory and was, as a whole,
`improperly
`guided by hindsight. Apple, 2020 WL 6494243, at *21. The
`Board emphasized how Apple’s expert used the phrases
`“would naturally have included”; “it would be logical”; and
`“could be, and mostlogically would be.” Id. It also found
`that there was no factual support underlying the expert
`testimony. Id. The Board determined that the testimony
`amounted to an argument about “what could be combined”
`and a conclusory statement that the combination would
`have been obvious. Apple, 2020 WL 6494243, at *21.
`
`The Board wasfree to reject Apple’s expert’s testimony
`based on a lack of factual support. See TQ Delta, LLC v.
`CISCO Sys., Inc., 942 F.3d 1352, 1362 (Fed. Cir. 2019) (re-
`versing obviousness determination when expert’s testi-
`mony was “[u]ntethered to any supporting evidence” and,
`thus, could not support the Board’s findings). Likewise,it
`was free to disregard the testimony for failure to provide
`“any meaningful explanation for why [a skilled artisan]
`would be motivated to combine these references at the time
`of this invention.” InTouch Techs., Inc. v. VGO Commcns,
`Inc., 751 F.3d 1327, 1852 (Fed. Cir. 2014). We see no use
`or endorsement of an erroneous obviousness standard in
`the Board’s analysis. Nor can we reweigh evidence on ap-
`peal. See In re Warsaw Orthopedic, Inc., 832 F.3d 1327,
`1334 (Fed. Cir. 2016). Accordingly, we decline to disturb
`the Board’s findings, which are supported by substantial
`evidence.
`
`III
`
`Claim 2 of the ’494 patent and claim 3 of the ’362 patent
`recite:
`
`

`

`Case: 21-1532
`
`Document:46
`
`Page:13
`
`Filed: 03/09/2022
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`13
`
`The intermediate computer of claim 1, wherein the
`intermediate computeris further configured to sub-
`stitute the unique identity read from the secure
`message with another unique identity prior to for-
`warding the encrypted data payload.
`
`(emphasis added).
`
`The Board construed the word substitute to require
`“changingor modifying, not merely adding to.” Apple, 2020
`WL 6494243, at *10.
`Because it determined that
`RFC3104—which Apple relied on for this lmitation—
`merely involved “adding to” the unique identity, the Board
`found Apple had failed to show RFC3104 taught this hmi-
`tation. Id. at *18. It also found that Apple failed to show
`a skilled artisan would have been motivated to modify the
`combination to arrive at the claimed invention. Jd. at *19.
`
`Apple argues the undisputed evidence shows the com-
`bination taught an intermediate computer “configured to
`substitute the unique identity” as required by claim 2 of
`the 494 patent and claim 3 of the ’362 patent. Opening Br.
`43-46. The parties agree RFC3104 taught tunneling,
`which involves adding a new outer IP header to an encap-
`sulated data packet. To Apple, this means RFC3104 “sub-
`stitute[s] the unique identity,” so the Board’s contrary
`finding is unsupported by substantial evidence.
`
`The Board’s uncontested claim construction of substi-
`tute disposes of Apple’s challenge. The Board expressly ad-
`dressed Apple’s nearly identical argument
`from the
`hearing that “adding the headeris the same asreplacing
`the header because at the end of the day you have a differ-
`ent header than what you hadbefore, a completely differ-
`ent header.” J.A. 640. The Board disagreed with Apple
`and construed substitute to mean “changing, replacing, or
`modifying, not merely adding,” and observed that this con-
`struction disposed of Apple’s position. Apple, 2020 WL
`6494243, at *10. Apple did not appeal that construction,
`and we also have no reason to doubt it, as the written
`
`

`

`Case: 21-1532
`
`Document:46
`
`Page: 14
`
`Filed: 03/09/2022
`
`14
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`description disparagesprior art solutions utilizing tunnel-
`ing. See ’494 patent at 5:15-50; 6:21-34.
`In view of the
`unchallenged construction, substantial evidence supports
`the Board’s finding that RFC3104’s disclosure of adding a
`new header does not satisfy the substitution required by
`the claims.
`
`Moreover, substantial evidence supports the Board’s
`finding that Apple failed to show a motivation to modify the
`prior art combination to include substitution. Apple, 2020
`WL 6494243, at *19. Apple relied solely on its expert’s con-
`trary testimony, which the Board properly disregarded as
`conclusory. Id.
`
`IV
`
`Claim 9 of the ’494 patent is similar to claim 10 of the
`"362 patent and recites:
`
`9. The intermediate computer of claim 1, wherein
`the intermediate computeris configured to modify
`the translation table entry address fields in re-
`sponse to a signaling message sent from the mobile
`computer when the mobile computer changes its
`address such that the intermediate computer can
`know that the address of the mobile computer is
`changed.
`
`(emphasis added).
`
`Apple argued that establishing a secure authorization
`in RFC3104 includes creating a new table entry address
`field as required by the claim. Apple, 2020 WL 6494243,at
`*21. The Board disagreed, reasoning that “modify[ing]} the
`translation table entry addressfields” requires having ex-
`isting addressfields when the mobile computer changesits
`address. J.A.51. Accordingly, it found Apple failed to show
`the combination taught this limitation.
`
`Apple now arguesthe “configured to modify the trans-
`lation table entry address fields” limitation is purely
`
`

`

`Case: 21-1532
`
`Document:46
`
`Page:15
`
`Filed: 03/09/2022
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`15
`
`functional and, thus, covers any embodimentthat results
`in a table with different address fields, including new ad-
`dress fields. We do notagree.
`
`As the Board held, the plain meaning of “modify[ing]
`the translation table entry addressfields” requires having
`existing addressfields in the translation table to modify.
`The surrounding language showing the modification occurs
`“when the mobile computer changesits address such that
`the intermediate computer can know that the address of
`the mobile computer is changed” further supports the ex-
`istence of an addressfield prior to modification. Accord-
`ingly,
`the limitation does not merely claim a result; it
`recites an operation of the intermediate computer that re-
`quires an existing addressfield.7
`
`Vv
`
`Claim 13 of the 362 patent, on which claims 14-16 de-
`pend,recites:
`
`13. The intermediate computer of claim 1, wherein
`the intermediate computer is configured to receive
`a request to update the mapping with a new ad-
`dress of the first computer.
`Apple relied on its reasoning as to claim 10 of the ’362
`patent to show that the proposed combination taught this
`limitation. The Board likewise relied on the deficiencies it
`identified for claim 10 of the ’362 patentto find Apple failed
`to show the combination taught this claim without any ad-
`ditional analysis. Apple v. MPH Techs. Oy, No. IPR2019-
`00826, 2020 WL 6494252, at *13 (P.T.A.B. Nov. 4, 2020).
`Apple argues this explanation is inadequate because the
`Board’s claim-10 analysis focuses on a different limitation:
`
`7 Because we reject Apple’s claim construction, we
`need not address its substantial evidence challenge that
`dependson that construction.
`
`

`

`Case: 21-1532
`
`Document:46
`
`Page: 16
`
`Filed: 03/09/2022
`
`16
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`the requirement to “modify the translation table entry ad-
`dress fields.”
`
`The Board’s analysis adequately disposed of Apple’s
`challenge. Certainly, the Board’s analysis focused on the
`plain meaningof “modify” andits implicit requirement that
`the objects of modification (i.e., address fields) already ex-
`ist. But the Board placed the same requirement on the
`term updatein its analysis: “the plain meaningof ‘updates,’
`requires an existing entry and existing address fields.”
`J.A. 129. Accordingly, the Board’s reliance on its analysis
`of claim 10 explains its disposition of claim 13 and associ-
`ated dependent claims; Apple failed to show the combina-
`tion taught an intermediate computer that updates an
`existing mapping. We,
`therefore, see no error in the
`Board’s analysis.
`
`VI
`
`Claim 7 of the 502 patent, on which claims 8 and 9 de-
`pend, recites:
`
`7. The computer of claim 1, wherein the computer
`is configured to send a signaling messageto the in-
`termediate computer when the computer changes
`its address such that the intermediate computer
`can know that the address of the computer is
`changed.
`
`RFC3104 disclosed an ASSIGN_REQUEST_RSIPSEC
`message that requests an IP address assignment. Apple
`argued that, when a computer movesto a new address,the
`computer uses this message as part of establishing a secure
`connection and, in the process, the intermediate computer
`knows the address has been changed. J.A. 5034-36. The
`Board found that the message was not usedto signal ad-
`dress changes. Apple Inc. v. MPH Techs. Oy, No. IPR2019-
`00824, 2020 WL 6494246, at *16 (P.T.A.B. Nov. 4, 2020).
`Accordingly,
`it
`found Apple failed to show that
`the
`
`

`

`Case: 21-1532
`
`Document:46
`
`Page:17
`
`Filed: 03/09/2022
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`17
`
`intermediate computer knowsthat the address is changed,
`as required bythe claim language.
`
`Apple reprises its arguments, which the Board re-
`jected. Claims 7—9 of the 502 patent require a computerto
`send a message to the intermediate computer “such that
`the intermediate computer can know that the address of
`the computer is changed.” Apple claims that RFC3104’s
`use of an ASSIGN_REQUEST_RSIPSEC messagein estab-
`lishing a secure authorization necessarily satisfies this lim-
`itation because the mobile computer must communicate
`the new address. However, the Board’s contrary finding is
`supported by substantial evidence, including MPH’s expert
`testimony and RFC3104itself.®
`
`MPH’s expert testified that a skilled artisan would not
`have understood the relevant disclosure in RFC3104 to
`teach any signal address changes. J.A. 8400.
`Indeed, as
`the Board found, the relevant disclosure in RFC3104 re-
`lates to establishing an RSIP-IPSecsession, not to signal
`address changes. Apple, 2020 WL 6494246, at *16—-17.
`And we see no reason why the Board was required to
`equate communicating a new address and signaling an ad-
`dress change. Accordingly, substantial evidence supports
`the Board’s finding.
`
`CONCLUSION
`
`For the foregoing reasons, we affirm the Board’s final
`written decisions holding that claims 2, 4, 9, and 11 of the
`494 patent; claims 7—9 of the ’502 patent; and claims3,5,
`
`Though framed as a claim construction issue, Ap-
`8
`ple does not dispute that the limitation requires the inter-
`mediate computer to know the addressis changed, and we
`see no error in that construction.
`The Board found
`RFC3104 failed to meet this requirement. Accordingly, we
`treat Apple’s argument as a substantial evidence chal-
`lenge.
`
`

`

`Case: 21-1532
`
`Document:46
`
`Page: 18
`
`Filed: 03/09/2022
`
`18
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`10, and 12-16 of the ’362 patent would not have been obvi-
`ous.
`
`AFFIRMED
`
`CosTS
`
`Costs to MPH.
`
`

`

`Case: 21-1532
`
`Document:47
`
`Page: 1
`
`Filed: 03/09/2022
`
`Anited States Court of Appeals
`for the federal Circuit
`
`APPLE INC.,
`Appellant
`
`MPH TECHNOLOGIESOY,
`Appellee
`
`2021-1532, 2021-1533, 2021-1534
`
`Appeals from the United States Patent and Trademark
`Office, Patent Trial and Appeal Board in Nos. IPR2019-
`00823, IPR2019-00824, IPR2019-00826.
`
`JUDGMENT
`
`THIS CAUSE having been considered,it is
`
`’ ORDERED AND ADJUDGED:
`
`AFFIRMED
`
`
`March 9, 2022
`Date
`
`FOR THE COURT
`
`/s/ Peter R. Marksteiner
`Peter R. Marksteiner
`Clerk of Court
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket