throbber

`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`__________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`__________
`
`
`JUNIPER NETWORKS, INC.,
`
`“Petitioner”
`
`v.
`
`IMPLICIT, LLC,
`
`“Patent Owner”
`___________
`
`U.S. Patent No. 9,591,104
`
`Issued: March 7, 2017
`
`Named Inventor:
`Edward Balassanian
`
`Title: Method and System for Data Demultiplexing
`___________
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 9,591,104
`
`
`
`
`Mail Stop: PATENT BOARD
`Patent Trial and Appeal Board
`U.S. Patent & Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`10788584
`
`
`
`
`

`

`TABLE OF CONTENTS
`
`Page
`INTRODUCTION ........................................................................................ 1
`
`STATE OF THE ART .................................................................................. 4
`
`I.
`
`II.
`
`III. THE PURPORTED INVENTION ............................................................... 6
`
`A.
`
`B.
`
`C.
`
`The ’104 Patent .................................................................................. 6
`
`History of the ’104 Patent .................................................................. 8
`
`Decasper’s Anticipation of the Broadly Similar Claims of the
`’163 Patent ........................................................................................ 10
`
`IV.
`
`325(D) DOES NOT APPLY TO THIS PETITION ................................... 12
`
`A.
`
`B.
`
`314(a) ................................................................................................ 12
`
`325(d) ............................................................................................... 13
`
`V.
`
`IDENTIFICATION OF CHALLENGE AND GROUNDS ....................... 16
`
`VI. LEVEL OF ORDINARY SKILL IN THE ART ........................................ 18
`
`VII. CLAIM CONSTRUCTION ....................................................................... 18
`
`A.
`
`B.
`
`C.
`
`D.
`
`“message” ......................................................................................... 18
`
`“sequence of two or more routines” ................................................. 18
`
`“state information” ........................................................................... 19
`
`“execute a Transmission Control Protocol (TCP) to process
`packets having a TCP format”/“execute TCP to process at
`least one of the subsequent packets having a TCP format” ............. 19
`
`E.
`
`“key value” ....................................................................................... 20
`
`VIII. GROUND 1: THE CHALLENGED CLAIMS ARE OBVIOUS
`OVER SMITH IN VIEW OF DECASPER ................................................ 20
`
`10788584
`
`
`- i -
`
`

`

`Page
`A. Overview .......................................................................................... 20
`
`B.
`
`C.
`
`Smith................................................................................................. 20
`
`Decasper ........................................................................................... 23
`
`i.
`
`ii.
`
`Extensibility via Modular Plugins ......................................... 23
`
`Classifying Packets (and TCP Connections) into Flows ....... 24
`
`iii. Binding Plugins to Flows Using Decasper’s
`Framework ............................................................................. 25
`
`D. Motivation To Combine ................................................................... 27
`
`E.
`
`F.
`
`G.
`
`H.
`
`I.
`
`J.
`
`K.
`
`L.
`
`The Combined Smith-Decasper System .......................................... 29
`
`Claim 1 ............................................................................................. 33
`
`Claim 2 ............................................................................................. 42
`
`Claim 3 ............................................................................................. 43
`
`Claim 4 ............................................................................................. 43
`
`Claim 5 ............................................................................................. 43
`
`Claim 6 ............................................................................................. 44
`
`Claim 7 ............................................................................................. 45
`
`M. Claim 10 ........................................................................................... 45
`
`N.
`
`O.
`
`P.
`
`Q.
`
`Claim 11 ........................................................................................... 47
`
`Claim 12 ........................................................................................... 48
`
`Claim 13 ........................................................................................... 48
`
`Claim 16 ........................................................................................... 48
`
`10788584
`
`
`- ii -
`
`

`

`Page
`Claim 19 ........................................................................................... 49
`
`Claim 20 ........................................................................................... 50
`
`R.
`
`S.
`
`IX. GROUND 2: THE CHALLENGED CLAIMS ARE OBVIOUS
`OVER CHECK POINT IN VIEW OF DECASPER .................................. 50
`
`A. Overview .......................................................................................... 50
`
`B.
`
`CheckPoint ....................................................................................... 51
`
`i.
`
`ii.
`
`Inspection Module.................................................................. 52
`
`Security Servers ..................................................................... 53
`
`iii. Anti-virus Inspection ............................................................. 54
`
`iv. Additional CVP Processing ................................................... 56
`
`C.
`
`Decasper ........................................................................................... 57
`
`D. Motivation To Combine ................................................................... 57
`
`E.
`
`F.
`
`G.
`
`H.
`
`I.
`
`J.
`
`K.
`
`L.
`
`The Combined CheckPoint-Decasper System ................................. 59
`
`Claim 1 ............................................................................................. 62
`
`Claim 2 ............................................................................................. 64
`
`Claim 3 ............................................................................................. 64
`
`Claim 4 ............................................................................................. 65
`
`Claim 5 ............................................................................................. 65
`
`Claim 6 ............................................................................................. 65
`
`Claim 7 ............................................................................................. 66
`
`M. Claim 10 ........................................................................................... 66
`
`10788584
`
`
`- iii -
`
`

`

`Page
`Claim 11 ........................................................................................... 68
`
`Claim 12 ........................................................................................... 68
`
`Claim 13 ........................................................................................... 69
`
`Claim 16 ........................................................................................... 69
`
`Claim 19 ........................................................................................... 70
`
`Claim 20 ........................................................................................... 70
`
`N.
`
`O.
`
`P.
`
`Q.
`
`R.
`
`S.
`
`X.
`
`STATUTORY REQUIREMENTS ............................................................ 70
`
`A. Notice of Real Party-In-Interest (37 C.F.R. § 42.8(b)(1)) ............... 70
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`Notice of Related Matters (37 C.F.R. § 42.8(b)(2)) ......................... 70
`
`Designation of Lead And Back-Up Counsel (37 C.F.R.
`§ 42.8(b)(3)) ..................................................................................... 72
`
`Service Information (37 C.F.R. § 42.8(b)(4)) .................................. 72
`
`Fees ................................................................................................... 72
`
`Grounds for Standing ....................................................................... 72
`
`XI. CONCLUSION ........................................................................................... 73
`
`
`
`10788584
`
`
`- iv -
`
`

`

`
`
`EXHIBIT LIST
`
`Exhibit Description
`1001
`U.S. Patent No. 6,629,163 (“the ’163 patent”)
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`10788584
`
`
`File History of the ’163 patent
`
`U.S. Patent No. 8,694,683 (“the ’683 patent”)
`
`File History of the ’683 patent
`
`U.S. Patent No. 9,270,790 (“the ’790 patent”)
`
`U.S. Patent No. 9,591,104 (“the ’104 patent”)
`
`U.S. Patent No. 10,027,780 (“the ’780 patent”)
`
`U.S. Patent No. 10,033,839 (“the ’839 patent”)
`
`U.S. Patent No. 10,225,378 (“the ’378 patent”)
`
`File History of the ’104 patent
`
`Expert Declaration of Dr. Seth Nielson (“Nielson Dec.”) – Ex. A
`Curriculum Vitae of Dr. Nielson
`
`J. Mark Smith et al., “Protecting a Private Network: The AltaVista
`Firewall,” Digital Technical Journal, Vol. 9, No. 2 (1997) (“Smith”)
`
`Declarations of S.D. Hall-Ellis and D. Ramsey; supporting exhibits &
`attachments
`
`D. Decasper et al., “Router Plugins, A Software Architecture for Next
`Generation Routers, ACM SIGCOMM Computer Communication
`Review, Vol. 28, No. 4, October 1998 (“Decasper”)
`
`Declaration of Martin L. Knott & Exhibit (Decasper)
`
`Selected webpages from www.checkpoint.com, as archived by the
`Internet Archive’s WayBack Machine on February 12, 1998
`(“CheckPoint”), and Affidavit of Christopher Butler
`
`- v -
`
`

`

`1017
`
`1018
`
`1019
`
`1020
`
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`1026
`
`1027
`
`1028
`
`1029
`
`
`
`Request for Inter Partes Reexamination of the ’163 patent, February 13,
`2012
`
`Office Action in Inter Partes Reexamination of the ’163 patent, August
`16, 2013
`
`Action Closing Prosecution in Inter Partes Reexamination of the ’163
`patent, October 1, 2012
`
`Patent Owner Comments to Action Closing Prosecution in Inter Partes
`Reexamination of the ’163 patent, December 12, 2012
`
`Decision Vacating Inter Partes Reexamination of the ’163 patent,
`December 12, 2013
`
`Order Granting Defendants’ Motion for Summary Judgment, March 13,
`2013
`
`Opposition to Defendants’ Motion for Summary Judgment, November
`16, 2012
`
`Joint Claim Construction and Prehearing Statement Pursuant to P.R. 4-
`3, November 26, 2019
`
`Exhibit A to Joint Claim Construction and Prehearing Statement
`Pursuant to P.R. 4-3, November 26, 2019
`
`Exhibit B to Joint Claim Construction and Prehearing Statement
`Pursuant to P.R. 4-3, November 26, 2019
`
`Implicit, LLC v. Trend Micro, Inc., Case No. 6:16-cv-80-JRG, Claim
`Construction Memorandum and Order, March 29, 2017
`
`Implicit, LLC v. Netscout Systems, Inc. et al., Case No. 2:18-CV-53-
`JRG, Claim Construction Memorandum and Order, April 15, 2019
`
`Implicit, LLC v. Huawei Technologies USA, Inc. et al., Case No. 6:17-
`CV-182-JRG, Claim Construction Memorandum and Order, March 6,
`2018
`
`1030 W. Richards Stevens, TCP/IP Illustrated Volume 1, The Protocols,
`Addison-Wesley Professional Computing Series, 1994
`
`10788584
`
`
`- vi -
`
`

`

`
`
`RFC 2068, Hypertext Transfer Protocol -- HTTP/1.1, January 1997
`
`R. Hunt, Internet/Intranet firewall security – policy, architecture and
`transaction services, Computer Communications 21 (1998) 1107-1123
`
`Check Point Company Overview
`
`Awards and Recognition – Check Point
`
`Check Point Newsletter, 1997
`
`CheckPoint FireWall-1 White Paper, Version 2.0, 1995
`
`RFC 1825, Security Architecture for the Internet Protocol, August 1995
`
`RFC 1826, IP Authentication Header, August 1995
`
`RFC 1827, IP Encapsulating Security Payload (ESP), August 1995
`
`The SSL Protocol, Version 3.0, November 18, 1996.
`
`First Amended Complaint for Patent Infringement, Civil Action No.
`2:19-cv-37-JRG-RSP, March 19, 2019
`
`Original Complaint and Demand for Jury Trial, Case No. C 10-4234
`EDL, September 20, 2010
`
`K. Jonas et al., “Audio streaming on the Internet. Experiences with real-
`time streaming of audio streams,” ISIE '97 Proceeding of the IEEE
`International Symposium on Industrial Electronics, 1997.
`
`L. Peterson at al., “Computer Networks, A System Approach,” Morgan
`Kaufman Publishers, Inc., 1996.
`
`B. Godwin-Jones, “Emerging Technologies, Real-time Audio and Video
`Playback on the Web,” Language Learning & Technology, vol. 1, no. 1,
`July 1997.
`
`S. Bellovin et al., “Network Firewalls,” IEEE Communications
`Magazine, 1994.
`
`RFC 791, Internet Protocol, September 1981
`
`RFC 793, Transmission Control Protocol, September 1981
`
`- vii -
`
`1031
`
`1032
`
`1033
`
`1034
`
`1035
`
`1036
`
`1037
`
`1038
`
`1039
`
`1040
`
`1041
`
`1042
`
`1043
`
`1044
`
`1045
`
`1046
`
`1047
`
`1048
`
`10788584
`
`
`

`

`
`
`RFC 879, The TCP Maximum Segment Size and Related Topics,
`November 1983
`
`RFC 1919, Classical versus Transparent IP Proxies, March 1996
`
`RFC 1945, Hypertext Transfer Protocol – HTTP/1.0, May 1996
`
`SSL 0.2 Protocol Specification, Netscape Communications Corp.,
`February 9, 1995
`
`A. Luotonen et al., “World-Wide Web Proxies,” Computer Networks
`and ISDN Systsems 27 (1994) 147-154
`
`RFC 854, Telnet Protocol Specification, May 1983
`
`RFC 959, File Transfer Protocol, October 1985
`
`RFC 788, Simple Mail Transfer Protocol, November 1981
`
`RFC 2616, Hypertext Transfer Protocol – HTTP/1/1, June 1999
`
`1049
`
`1050
`
`1051
`
`1052
`
`1053
`
`1054
`
`1055
`
`1056
`
`1057
`
`
`
`
`
`10788584
`
`
`- viii -
`
`

`

`U.S. Patent No. 9,591,104
`
`I.
`
`INTRODUCTION
`The ’104 patent descends from and shares the same specification as U.S.
`
`Patent No. 6,629,163 (“the ’163 patent”)(Ex. 1001), whose main claims were found
`
`by a district court to be anticipated in light of the same Decasper reference relied on
`
`here.1 The ’104 patent claims the same basic approach as the ’163 patent of
`
`identifying an appropriate sequence of routines to process incoming packets from a
`
`network (see Section III.C). In fact, Patent Owner now asserts the ’104 patent
`
`against the very same products that it had earlier accused of infringing the ‘163
`
`patent—thus further demonstrating the significant overlap between the claims of
`
`these two patents.2
`
`
`1 See generally Ex. 1022 (finding Decasper anticipates independent claims 1,
`
`15 and 35 of the ’163 patent). These claims were also rejected over Decasper as
`
`being anticipated/obvious during an inter partes reexamination of the ’163 patent
`
`(“the ’163 reexam), which was later vacated in light of the district court decision.
`
`See Ex. 1018; Ex. 1021 at 3.
`
`2 E.g., Juniper’s SRX Series Gateways are accused of infringing the ’104
`
`patent (Ex. 1041 at 5), just as they were accused of infringing the ’163 patent (Ex.
`
`1042 at 3).
`
`10788584
`
`
`- 1 -
`
`

`

`U.S. Patent No. 9,591,104
`
`
`To distinguish Decasper during prosecution of a parent patent (the ’683
`
`patent), the Patent Owner merely added a trivial new limitation that one of the
`
`routines must execute a transport layer protocol specifically, such as TCP, arguing
`
`that Decasper is limited to an IP router that processes packets using only the IP
`
`protocol, not TCP.3 Ex. 1004 at 13-20. This limitation is also found in the claims
`
`of the ’104 patent. However, as detailed below, there is nothing novel or invention-
`
`worthy about executing well-known protocols.
`
`Nevertheless, Decasper is not limited to IP routers, but rather describes an
`
`example of how its framework can be used in the context of an IP router. This
`
`example is the linchpin for Patent Owner’s argument during prosecution that
`
`Decasper can only process IP packets and not TCP packets, as required by the ’683
`
`patent (which is also required by the ’104 patent). But Patent Owner failed to
`
`mention to the examiner that Decasper’s framework is not limited to the given
`
`example of an IP router, as explained by Decasper:
`
`Our framework is also very well suited to Application
`Layer Gateways (ALGs), and to security devices like
`Firewalls. In both situations, it is very important to be able
`to quickly and efficiently classify packets into flows, and
`
`
`3 Exhibit citations refer to page numbers added by the Petitioner, except in
`
`the case of Ex. 1011 (Nielson), which references paragraph numbers.
`
`10788584
`
`
`- 2 -
`
`

`

`U.S. Patent No. 9,591,104
`
`
`to apply different policies to different flows: these are both
`things that our architecture excels at doing.
`
`Ex. 1014 (Decasper) at 2.4 As a POSA would recognize, ALGs and firewalls often
`
`have to execute TCP in order to perform their basic functions—and the Decasper
`
`framework is indeed “very well suited” to such TCP functions as well. Ex. 1011
`
`(hereinafter “Nielson”) at ¶¶123-128, 379-391. Patent Owner’s attempt to
`
`distinguish around Decasper with the trivial limitation of TCP is untenable, given
`
`Decasper’s direct advice to apply itself to applications that require performing
`
`TCP—such as Smith and CheckPoint.
`
`It is in these further examples of implementing Decasper’s framework,
`
`neither considered by the examiner, that Decasper is relied upon here. Specifically,
`
`Ground 1 applies Decasper to an ALG firewall (Smith), and Ground 2 applies
`
`Decasper to a firewall (CheckPoint). Smith and CheckPoint each clearly perform
`
`the trivial TCP requirement added by Patent Owner, while Decasper’s framework
`
`continues to carry out the packet processing approach that was already found to
`
`anticipate the broadly similar claims of the parent ’163 patent. As such, the ’104
`
`patent is just as unpatentable as the parent ’163 patent before it.
`
`
`4 All emphasis added unless otherwise indicated.
`
`10788584
`
`
`- 3 -
`
`

`

`U.S. Patent No. 9,591,104
`
`II.
`
`STATE OF THE ART
`At the time of the ’104 patent, many computer networks (including the global
`
`Internet) were packet-based networks in which messages are communicated from
`
`one computer to another by breaking them up into discrete blocks called “packets”
`
`that are then reassembled into the original messages after they have traveled through
`
`the network. Nielson at ¶15.
`
`Transmitting messages over a packet-based network
`
`required
`
`the
`
`development of a standardized suites of protocols—a pre-established set of rules for
`
`communication—that the host computers and shared nodes of the network could
`
`follow. Id. These protocols include certain network protocols, such as TCP
`
`(Transmission Control Protocol) and IP (Internet Protocol). Id. These protocols tell
`
`each machine on the network how to form, transmit, process, and respond to
`
`messages.
`
`Network architects divided network communications responsibilities into
`
`different protocols in part because a single protocol would have been exceedingly
`
`complex and less versatile. Id. However, the use of multiple protocols (such as
`
`HTTP, TCP, and IP) has the natural consequence that even a single transfer of data
`
`across the Internet (in response, for example, to a single user’s visit to one web page)
`
`involves a multitude of conversions of data from one format into another. Id. The
`
`various protocol components that work together form a “network stack.” A
`
`10788584
`
`
`- 4 -
`
`

`

`U.S. Patent No. 9,591,104
`
`conceptual reference model for network stacks—a group of protocols that work
`
`together to process data—was created in the 1970’s and 1980’s called the Open
`
`Systems Interconnection model (OSI model). This model did not identify specific
`
`protocols such as TCP or IP, but rather defined what a protocol at a specific
`
`numbered layer should do. The OSI model defined 7 layers as shown below,
`
`illustrating also how one layer is encapsulated inside another by showing the data
`
`and the various headers present at each layer:
`
`In practice, most networking applications and devices deal with only layer 2
`
`(Data Link), such as Ethernet and Wifi, layer 3 (Network), such as IP, layer 4
`
`(Transport), such as TCP and UDP, and layer 7 (Application).
`
`
`
`10788584
`
`
`- 5 -
`
`

`

`U.S. Patent No. 9,591,104
`
`III. THE PURPORTED INVENTION
`A. The ’104 Patent
`
`The ’104 patent describes itself as relating “generally to a computer system
`
`for data demultiplexing.” Ex. 1006 (’104 patent) at 1:22-23. The ’104 patent
`
`purports to address issues associated with the need to convert packet-based data into
`
`“many different intermediate formats” when transmitting data from one computer to
`
`another. Id. at 1:28-30.
`
`The ’104 patent suggests that its advantage lies in being able to “dynamically”
`
`identify a series of conversion routines for processing data. Id. at 2:8-10. This
`
`“dynamic” approach involves using a key value in one or more received packets to
`
`identify a sequence of two or more routines to process packets having a TCP format.
`
`Id. at 14:40-57 (claim 1).
`
`Figure 4 of the ’104 patent shows the “paths” for received packets from
`
`bottom to top in the figure.
`
`10788584
`
`
`- 6 -
`
`

`

`U.S. Patent No. 9,591,104
`
`
`
`
`
`
`Each rectangle in Figure 4 (highlighted in green) represents a session 410,
`
`420, 430, 440, 450 for a protocol, where the session includes an instance of the
`
`protocol and state information for that instance of the protocol. Id. at 5:51-55. Each
`
`protocol session has an edge 411, 421, 431 (which is a conversion routine) to which
`
`10788584
`
`
`- 7 -
`
`

`

`U.S. Patent No. 9,591,104
`
`a corresponding binding 412, 422, 432, 442, 452 (highlighted in red) is used to bind
`
`or “nail” one or more paths to that protocol session. Id. at 6:5-11; see also Nielson
`
`at ¶49-53.
`
`Following the blue line in Figure 4 above starting at the entry, the queue (472)
`
`receives a packet and passes it to an Ethernet session (labeled 410) at the entry
`
`labeled 414. That routine processes the packet at the Ethernet level, converts the
`
`packet to an IP packet, and passes the packet to the IP session (labeled 420) at the
`
`path entry labeled 424. The IP session processes the packet at the IP level, converts
`
`the packet to a TCP packet, and then passes the packet to a particular TCP session
`
`(labeled 440) at path entry 443. Id. at 54-57. The TCP session converts the packet
`
`to another format and the packet continues along the path. Id.
`
`B. History of the ’104 Patent
`
`The ’104 patent is one of a series of continuations of U.S. Patent Application
`
`No. 09/474,464, which was filed on December 29, 1999 and issued as the above-
`
`mentioned ’163 patent. Id. The ’163 patent and the ’104 patent share a common
`
`specification.
`
`The ’163 patent was the subject of an inter partes reexamination during which
`
`the examiner found independent claims 1, 15 and 35 to be anticipated or rendered
`
`obvious by Decasper. Ex. 1018; see also supra fn 1. The Patent Owner attempted
`
`to distinguish Decasper by arguing, inter alia, that “[t]he packets of Decasper always
`
`10788584
`
`
`- 8 -
`
`

`

`U.S. Patent No. 9,591,104
`
`have the same format (IP), and therefore, by definition, do not have ‘different
`
`formatting needs.’” Ex. 1020 at 21-22. The examiner rejected this argument because
`
`the word “format” is broad and “does not state any particular format such as IP, TCP,
`
`Ethernet or HTTP etc.” Ex. 1018 at 16; see also generally id. at 13-19.
`
`Around this same timeframe, and three months after claims of the parent ’163
`
`patent were found by a district court to be anticipated by Decasper (Ex. 1022), the
`
`application that led to the parent ’683 patent was filed with broadly similar claims
`
`(see Section III.C), albeit with the additional requirement of executing a transport
`
`layer protocol specifically, such as TCP, to convert packets to a “different format”
`
`or “different protocol.”5 Alongside these claims, the applicant included remarks
`
`characterizing Decasper as being limited to the IP protocol—arguing that Decasper
`
`taught “operat[ing] on IP packets only and thus execut[ing] the IP protocol but not
`
`other protocols,” and that “nothing in Decasper contemplates processing a non-IP
`
`packet format such as a TCP packet.” Ex. 1004 at 13-20. The examiner did not
`
`comment on this characterization of Decasper, which is incorrect for the reasons
`
`discussed below in at least Sections VIII.C & VIII.E.
`
`
`5 For purposes of this proceeding, Petitioner interprets the term “executing”
`
`TCP, in the context of the ’104 patent, to mean operating on a packet whose
`
`outermost header is TCP, respectively. See Section VII.E.
`
`10788584
`
`
`- 9 -
`
`

`

`U.S. Patent No. 9,591,104
`
`
`After an obviousness rejection in view of other art and amendments made to
`
`include specific recitation that subsequent packets in the message would be
`
`processed using the same sequence of routines, the examiner allowed the claims. Id.
`
`at 263-284.
`
`The Patent Owner’s comments with respect to Decasper were not expressly
`
`repeated during prosecution of the ’104 patent, but were incorporated by reference.
`
`Ex.1010 (’104 file history) at 10. The claims of the ’104 patent, added by
`
`preliminary amendment during prosecution, were subject to a first action allowance.
`
`Id. at 224-231.
`
`C. Decasper’s Anticipation of the Broadly Similar Claims of the ’163
`Patent
`
`The claims of the ’104 patent are broadly similar to the claims of the ’163
`
`patent that were found to be anticipated by Decasper in a final district court decision.
`
`Ex. 1022 at 12; Nielson at ¶¶75-77. These similarities are evident from the overlap
`
`between the products Patent Owner previously accused of infringing the ’163 patent
`
`to the products Patent Owner now accuses as infringing the ’104 patent in a parallel
`
`litigation. See supra at fn 2.
`
`The broad similarities are also evidenced by the language of the claims, as
`
`explained by Patent Owner itself. For example, in the context of the ’163 patent,
`
`Patent Owner explained to a district court that “[i]n Implicit’s systems individual
`
`code processing functions were captured in individual code modules, known as
`
`10788584
`
`
`- 10 -
`
`

`

`U.S. Patent No. 9,591,104
`
`“beads.”6 “The beads were not glued together at compile time, but rather remained
`
`individual and then were recruited as part of a message/flow-specific processing path
`
`after a first packet of a new flow arrived.” Ex. 1023 at 7. Patent Owner further
`
`explained that “[u]nlike [the] prior art, the actual processing path in the Implicit
`
`system was built dynamically after the first packet of a new flow arrived and variant
`
`on information in that first packet.” Ex. 1023 at 8. This feature, which was found
`
`by the district court to be disclosed by Decasper, was reflected in the claims of the
`
`’163 patent as “for the first packet of the message, dynamically identifying a non-
`
`predefined sequence of components for processing the packets of the message….”
`
`Id. at 9; Ex. 1001 at 29. The ’104 patent contains essentially the same feature—
`
`found by the district court to be disclosed in Decasper—by reciting that a sequence
`
`of routines is identified using a key value based on information in a received packet
`
`of a message, where packets are processed using the sequence of routines. See e.g.,
`
`Ex. 1006 (’104 patent), Claim 1.
`
`Patent Owner further explained to the district court that “a message specific
`
`path is built, and all subsequent packets in the same message shuttle through that
`
`path,” and that when read together, the claim “limitations describe constructing,
`
`post-first packet, a stateful, message specific data processing path – that is exactly
`
`
`6 Decasper calls these plugins. See Section VIII.C.i.
`
`10788584
`
`
`- 11 -
`
`

`

`U.S. Patent No. 9,591,104
`
`what the claims say.” Ex. 1023 at 9-10. This feature, also found to be disclosed by
`
`Decasper, was recited in the claims of the ’163 patent as “storing an indication of
`
`each of the identified components so that the non-predefined sequence does not need
`
`to be re-identified for subsequent packets of the message….” Id. at 10; Ex. 1001 at
`
`29. The ’104 patent again contains essentially the same feature by reciting that a
`
`path is created that includes data structures that indicate the identified sequence of
`
`routines, where subsequent packets are processed using this sequence of routines
`
`indicated in the path. See e.g., Ex. 1006 (’104 patent), Claim 1.
`
`IV. 325(D) DOES NOT APPLY TO THIS PETITION
`A.
`314(a)
`
`The Board should not exercise its discretion under Section 314(a) for at least
`
`the following reasons (following the General Plastic Factors)7: First, no other
`
`petition has been filed against the ’104 patent, whether by Petitioner or otherwise.
`
`Second, because there are no earlier petitions, Factors 2-5 do not apply. Third, only
`
`two grounds of attack are presented for consideration (Factor 6). Fourth, parallel
`
`litigation between the parties will not prevent the issuance of a final written decision
`
`
`7 Gen. Plastic Indus. Co. v. Canon Kabushiki Kaisha, Case IPR2016-01357
`
`et al., Paper 19 (Sept. 6 2017).
`
`10788584
`
`
`- 12 -
`
`

`

`U.S. Patent No. 9,591,104
`
`within 1 year (Factor 7). Implicit, LLC v. Juniper Networks, Inc., Case No. 2:19-cv-
`
`00037-JRG-RSP (E.D. Tex.).
`
`Additional factors that weigh in favor of institution include: (1) the trial date
`
`in the parallel litigation, currently scheduled for July 6, 2020, can change; (2) the
`
`claims challenged here include additional claims beyond those asserted in the
`
`parallel litigation; (3) the strong merits of the petition, which is based on prior art
`
`already found to anticipate broadly similar claims of a parent patent. See Sections I
`
`and III.B-C.
`
`B.
`
`325(d)
`
`In exercising its discretion, the Board “may take into account whether, and
`
`reject the petition or request because, the same or substantially the same prior art or
`
`arguments previously were presented to the Office.” 35 U.S.C. § 325(d).
`
`Previously, the Board has identified six non-exhaustive factors in Becton, Dickinson
`
`& Co. v. B. Braun Melsungen AG, IPR2017-01586 (Dec. 15, 2017). As analyzed
`
`below, the Becton factors do not weigh in favor of exercising discretion under §
`
`325(d).
`
`Factors 1 and 2: (1) the similarities and material differences between the
`asserted art and the prior art involved during examination; and (2) the
`cumulative nature of the asserted art and the prior art evaluated during
`examination
`Petitioner acknowledges that, although not commented on by the examiner,
`
`Decasper was specifically discussed by Patent Owner during the prosecution of the
`
`10788584
`
`
`- 13 -
`
`

`

`U.S. Patent No. 9,591,104
`
`parent ’683 patent. However, the Office never considered whether the supposedly
`
`missing limitations were otherwise known elsewhere in the art and whether their
`
`incorporation would have been obvious to a POSA. Nielson at ¶¶610-611. Here,
`
`Petitioner presents Smith and CheckPoint for the supposedly missing limitations and
`
`explains why a POSA, in light of Decasper’s own disclosure that it is “very well
`
`suited” to ALGs (Smith) and firewalls (CheckPoint), would have had a reason to
`
`combine each of these references with Decasper’s framework. See Sections VIII.D,
`
`IX.D (collectively describing motivations to combine).
`
`Of note, neither Smith nor CheckPoint was considered during the ’104
`
`prosecution or are substantially similar to any art substantively considered by the
`
`examiner during the prosecution. Nielson at ¶602. And these references are used to
`
`provide the specific teaching that Patent Owner argued was missing from Decasper
`
`during prosecution. In particular, the Patent Owner argued during prosecution of the
`
`parent ’683 patent that Decasper does not disclose executing TCP to convert packets
`
`to a different format. Ex. 1004, p. 19. And, while the examiner did not comment on
`
`this characterization of Decasper, the examiner presumably relied on it as the claims
`
`were subsequently allowed over Decasper. When a petitioner includes previously
`
`unconsidered references for an allegedly missing limitation, that factor weighs
`
`against exercising discretion under 325(d). Vestas-American Wind Technology, Inc.
`
`v. General Elec. Co., IPR2018-01015, Paper 9 at 23 (PTAB, Nov. 14, 2018).
`
`107885

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket