throbber
Trials@uspto.gov
`571-272-7822
`
`Paper: 15
`Entered: August 10, 2020
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`JUNIPER NETWORKS, INC.,
`Petitioner,
`
`v.
`
`IMPLICIT, LLC,
`Patent Owner.
`
`IPR2020-00591
`Patent 10,033,839 B2
`
`
`
`
`
`
`
`
`
`Before THOMAS L. GIANNETTI, BARBARA A. PARVIS, and
`NABEEL U. KHAN, Administrative Patent Judges.
`
`KHAN, Administrative Patent Judge.
`
`DECISION
`Granting Institution of Inter Partes Review
`35 U.S.C. § 314
`
`
`
`
`
`
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`I.
`
`INTRODUCTION
`
`A. Background
`
`Juniper Networks, Inc. (“Petitioner”) filed a Petition requesting inter
`
`partes review of claim 1 (the “challenged claim”) of U.S. Patent
`
`No. 10,033,839 B2 (Ex. 1008, the “’839 patent”). Paper 1 (“Pet.”). Implicit,
`
`LLC (“Patent Owner”) filed a Preliminary Response. Paper 5 (“Prelim.
`
`Resp.”). With our authorization, Petitioner filed a Reply (Paper 11,
`
`“Reply”) and Patent Owner filed a Sur-reply (Paper 13, “Sur-reply”).
`
`We have authority to institute an inter partes review only if the
`
`information presented in the Petition shows “there is a reasonable likelihood
`
`that the petitioner would prevail with respect to at least 1 of the claims
`
`challenged in the petition.” 35 U.S.C. § 314(a). Upon consideration of the
`
`aforementioned papers, we conclude that Petitioner has shown a reasonable
`
`likelihood of prevailing against the challenged claim. For the reasons
`
`explained below, we institute an inter partes review on the challenged claim
`
`of the ’839 patent on all grounds.
`
`II.
`
` INSTITUTION OF INTER PARTES REVIEW
`
`A. Standard for Institution
`
`The standard for institution is set forth in 35 U.S.C. § 314, which
`
`provides that an inter partes review may not be instituted unless the
`
`information presented in the Petition and the Preliminary Response shows
`
`that “there is a reasonable likelihood that the petitioner would prevail with
`
`respect to at least 1 of the claims challenged in the petition.” 35 U.S.C.
`
`§ 314; see also 37 C.F.R § 42.4(a) (“The Board institutes the trial on behalf
`
`of the Director.”).
`
`2
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`B. Related Proceedings
`
`The parties identify the following pending district court proceedings
`
`involving the ’839 patent: Implicit, LLC v. Juniper Networks, Inc., Case No.
`
`2:19-cv-00037-JRG-RSP (E.D. Tex.); Implicit, LLC v. Fortinet, Inc., Case
`
`No. 2:19-cv-00039 (E.D. Tex.); Implicit, LLC v. Imperva, Inc., Case No.
`
`2:19-cv-00040 (E.D. Tex.); Implicit, LLC v. NetScout Systems, Inc., Case
`
`No. 2:18-cv-00053 (E.D. Tex.); and Implicit, LLC v. Sandvine Corporation,
`
`Case No. 2:18-cv-00054 (E.D. Tex.). Pet. 60–61; Paper 4, 2.
`
`Petitioner identifies the following completed district court
`
`proceedings involving the ’839 patent: Implicit, LLC v. F5 Networks, Inc.,
`
`Case No. 3:14-cv-02856 (N.D. Cal.); Implicit, LLC v. Ericsson, Inc., Case
`
`No. 6:16-cv-00075 (E.D. Tex.); Implicit, LLC v. Huawei Technologies USA
`
`Inc., Case No. 6:16-cv-00076 (E.D. Tex.); Implicit, LLC v. NEC
`
`Corporation of America, Case No. 6:16-cv-00078 (E.D. Tex.); Implicit, LLC
`
`v. Nokia Solutions and Networks US LLC, Case No. 6-16-cv00079 (E.D.
`
`Tex.); Implicit, LLC v. Trend Micro, Inc., Case No. 6:16-cv-00080 (E.D.
`
`Tex.); and Implicit, LLC v. Palo Alto Networks, Inc., Case No. 6:17-cv-
`
`00336 (E.D. Tex.). Pet. 61.
`
`Patents related to the ’839 patent are challenged by Petitioner in
`
`IPR2020-00585, IPR2020-00586, IPR2020-00587, IPR2020-00590, and
`
`IPR2020-00592.
`
`C. Real Parties-in-Interest
`
`Petitioner identifies “Juniper Networks, Inc.” as the real party-in-
`
`interest. Pet. 60. Patent Owner identifies “Implicit LLC and Edward
`
`Balassanian” as the real parties-in-interest. Paper 4, 2.
`
`3
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`D. The ’839 Patent
`
`The ’839 patent is titled “Method and System for Data
`
`Demultiplexing.” Ex. 1008, code (54). According to the patent,
`
`interconnected computer systems, such as those on the Internet, “generate
`
`data in a wide variety of formats.” Id. at 1:29–30. For example, to send
`
`bitmap data from one computer system to another, the sending computer
`
`system may compress and encrypt the bitmap data, convert the data into a
`
`TCP format1 and then into an IP format, and finally, convert the data into an
`
`Ethernet format. Id. at 1:36–43. The receiving computer system performs
`
`each of these conversions in reverse order to recover the original bitmap
`
`data. Id. at 1:45–47.
`
`In order to process data in such a wide variety of formats, both
`
`sending and receiving computer systems need to have many conversion
`
`routines available to support the various formats. Id. at 1:51–54. The ’839
`
`patent recognizes that it would be desirable to dynamically identify a series
`
`of conversion routines for processing data, where “the output format of one
`
`conversion routine can be identified as being compatible with the input
`
`format of another conversion routine” and the series of conversion routines
`
`“can be quickly identified when data is received.” Id. at 2:10–18.
`
`Accordingly, the conversion method and system of the ’839 patent
`
`searches for and identifies a sequence of conversion routines for the received
`
`packets of a message, where a message may be a collection of related data,
`
`such as a video or audio stream, or an email. Id. at 2:51–58. The sequence
`
`
`1 When computers communicate over the Internet, they typically use a suite
`of protocols referred to as TCP/IP. The protocols are often described as a
`layers in a “stack.” See Ex. 1030 (“TCP/IP Illustrated Volume 1”), 23–24.
`Id.
`
`4
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`is used to convert the packets of the message from a source format to a target
`
`format using various intermediate formats. Id. at 2:58–60. Because the
`
`conversion system receives multiples messages with different source and
`
`target formats, it “effectively demultiplexes” the messages by receiving each
`
`message, identifying the sequence of conversion routines, and controlling
`
`the processing of each message by the identified sequence. Id. at 3:1–8.
`
`Moreover, the conversion system retains state information for the packets of
`
`a message by “rout[ing] all packets for a message through the same session
`
`of each conversion routine so that the same state or instance information can
`
`be used by all packets of the message.” Id. at 3:8–16. The sequence of
`
`conversion routine sessions for a given packet is called a “path.” Id. at
`
`3:16–17.
`
`Figure 4 of the ’839 patent is reproduced below.
`
`5
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`
`
`Fig. 4 is a block diagram illustrating a path data structure having several
`paths. Id. at 5:43–44.
`
`
`
`Figure 4 shows paths 4612, 462, and 463, represented by sequences of
`
`path entry structures shown as triangles. Id. at 5:61, 5:67–6:2. The paths
`
`share the same Ethernet session 410 and IP session 420, but have different
`
`TCP sessions 430, 440, and 450. Id. at 5:62–64. Each session corresponds
`
`to an instance of a protocol with associated state information. Id. at 5:55–
`
`57. The paths include “edges” 411, 421, and 431, which correspond to
`
`conversion routines for converting data from one protocol to another. Id. at
`
`
`2 Path 461 appears to be mislabeled as “464” in Figure 4.
`
`6
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`5:47–48, 5:61–62. Queues 471, 472, and 473 store messages to be
`
`processed by the edges of the paths. Id. at 6:4–7.
`
`In operation, when a “driver” of the conversion system, for example,
`
`an Ethernet driver, receives a message packet it forwards the packet to a
`
`forwarding component. Id. at 3:20–23. The forwarding component
`
`identifies the session of the conversion routine that should next process the
`
`packet. Id. at 3:23–26. In particular, “the forwarding component may use a
`
`demultiplexing (‘demux’) component to identify the session of the first
`
`conversion routine of the path that is to process the packet and then queues
`
`the packet for processing by the path.” Id. at 3:27–30. The first conversion
`
`routine “processes the packet and forwards the processed packet to the
`
`forwarding component, which then invokes the second conversion routine in
`
`the path,” and so on. Id. at 3:34–39.
`
`E. Challenged Claim
`
`Claim 1, the only claim in the patent, recites3:
`
`1. An method, comprising:
`
`[a] receiving, at a computing device having a processing
`circuit, a packet of a message;
`
`[b] determining, by the computing device, a key value for
`the packet, wherein the key value is determined based on one or
`more headers in the packet; and
`
`[c] using, by the computing device, the key value to
`determine whether the computing device is currently storing a
`previously created path for the key value;
`
`[d] in response to determining that no path is currently
`stored for the key value, the computing device:
`
`
`3 Reference letters in brackets mirror those provided by Petitioner. Pet. 34–
`45, 57–60.
`
`7
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`[d1] identifying, using the key value, one or more
`routines for processing the packet, including a routine that
`is used to execute a Transmission Control Protocol (TCP)
`to convert packets having a TCP format into a different
`format;
`
`[d2] creating a path using the identified one or more
`routines wherein the created path stores state information
`for at least one of the identified one or more routines and
`specifies an ordering in which the identified one or more
`routines are to be performed to process the packet; and
`
`[d3] processing the packet using the created path.
`
`Ex. 1008, 14:42–64.
`
`F. References and Other Evidence
`
`The Petition relies on the following references:
`
`1. Smith et al., “Protecting a Private Network: The AltaVista
`
`Firewall,” Digital Technical Journal, Vol. 9, No. 2 (1997) (hereinafter
`
`“Smith”) (Ex. 1012);
`
`2. Decasper et al., “Router Plugins: A Software Architecture for Next
`
`Generation Routers, ACM SIGCOMM Computer Communication Review,
`
`Vol. 28, No. 4 (1998) (hereinafter “Decasper”) (Ex. 1014);
`
`3. Selected Web pages from www.checkpoint.com, as archived by the
`
`Internet Archive’s Wayback Machine on February 12, 1998 (hereinafter
`
`“CheckPoint”) (Ex. 1016).
`
`Pet. 16–17.
`
`
`
`In addition, Petitioner submits the Declaration of Seth Nielson
`
`(Ex. 1011, “Nielson Decl.”). Patent Owner has not submitted an expert
`
`declaration.
`
`8
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`G. Asserted Grounds of Unpatentability
`
`Petitioner asserts the challenged claim is unpatentable on the
`
`following grounds.
`
`Claim Challenged
`
`1
`1
`
`Pet. 17.
`
`Statutory
`Basis4
`35 U.S.C. § 103 Smith, Decasper
`35 U.S.C. § 103 CheckPoint, Decasper
`
`References
`
`III. PATENT OWNER’S REQUEST FOR DISCRETIONARY DENIAL
`OF THE PETITION
`
`A. Overview
`
`Patent Owner contends we should deny the Petition under 35 U.S.C.
`
`§ 325(d) because Decasper was previously considered by the Office and the
`
`other references before us, Smith and CheckPoint, are cumulative of art that
`
`was considered during prosecution of the ’839 patent. See Prelim. Resp. 8–
`
`19; Sur-Reply 1–5. According to Patent Owner, “[t]he Patent Office has
`
`already expended significant resources examining the family of the Implicit
`
`Patents and allowed these claims.” Prelim. Resp. 8.
`
`Petitioner responds that “the base references cited in the Petitions
`
`(Smith and CheckPoint) were not previously before the Office either in form
`
`or substance.” Reply 1. Petitioner further responds that, “to the extent the
`
`Office accepted Patent Owner’s prior mischaracterization of Decasper as
`
`being limited to an IP router and overlooked the straightforward possibility
`
`of incorporating Decasper into the well-known TCP functionality of systems
`
`
`4 Because the application from which the ’839 patent issued was filed before
`March 16, 2013, citations to 35 U.S.C. §§ 102 and 103 are to their pre-AIA
`versions. Leahy-Smith America Invents Act (“AIA”), Pub. L. No. 112-29.
`
`9
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`such as Smith or CheckPoint, those errors can and should be corrected by
`
`instituting proceedings, as requested in the Petitions.” Id.
`
`B. Applicable Legal Principles
`
` Institution of inter partes review is discretionary. See Harmonic Inc.
`
`v. Avid Tech, Inc., 815 F.3d 1356, 1367 (Fed. Cir. 2016) (“[T]he PTO is
`
`permitted, but never compelled, to institute an IPR proceeding.”); 35 U.S.C.
`
`§ 314(a). Under § 325(d), in determining whether to institute an inter partes
`
`review, “the Director may take into account whether, and reject the petition
`
`or request because, the same or substantially the same prior art or arguments
`
`previously were presented to the Office.”
`
`In evaluating arguments under § 325(d), we use a two-part
`
`framework: (1) whether the same or substantially the same art previously
`
`was presented to the Office or whether the same or substantially the same
`
`arguments previously were presented to the Office; and (2) if either
`
`condition of first part of the framework is satisfied, whether the petitioner
`
`has demonstrated that the Office erred in a manner material to the
`
`patentability of challenged claims. Advanced Bionics, LLC v. MED-EL
`
`Elektromedizinische Geräte GmbH, IPR2019-01469, Paper 6 at 8 (PTAB
`
`Feb. 13, 2020) (precedential). We must also consider the non-exclusive
`
`factors set forth in Becton, Dickinson and Co. v. B. Braun Melsungen AG,
`
`IPR2017-01586, Paper 8 (PTAB Dec. 15, 2017) (precedential in relevant
`
`part), which “provide useful insight into how to apply the framework” under
`
`§ 325(d). Advanced Bionics, Paper 6 at 9. Those non-exclusive factors
`
`include:
`
`(a) the similarities and material differences between the asserted
`art and the prior art involved during examination;
`
`10
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`(b) the cumulative nature of the asserted art and the prior art
`evaluated during examination;
`
`(c) the extent to which the asserted art was evaluated during
`examination, including whether the prior art was the basis for
`rejection;
`
`(d) the extent of the overlap between the arguments made
`during examination and the manner in which Petitioner relies
`on the prior art or Patent Owner distinguishes the prior art;
`
`(e) whether Petitioner has pointed out sufficiently how the
`Examiner erred in its evaluation of the asserted prior art; and
`
`(f) the extent to which additional evidence and facts presented
`in the Petition warrant reconsideration of the prior art or
`arguments.
`
`Becton, Dickinson, Paper 8 at 17–18. “If, after review of factors (a), (b), and
`
`(d), it is determined that the same or substantially the same art or arguments
`
`previously were presented to the Office, then factors (c), (e), and (f) relate to
`
`whether the petitioner has demonstrated a material error by the Office.”
`
`Advanced Bionics, Paper 6 at 10.
`
`Our analysis begins with a discussion of the prosecution history.
`
`Then we turn to the parties’ contentions regarding § 325(d). For the reasons
`
`given below, we are not persuaded to deny the Petition based on § 325(d).
`
`C. Prosecution History
`
`The challenged ’839 patent is a member of a family that includes five
`
`other related patents challenged in IPR proceedings currently before the
`
`Board. See discussion of Related Matters, supra. The six patents share a
`
`common specification, and all descend from a common ancestor, the ’163
`
`patent (U.S. Patent No. 6,629,163), filed in 1999. A chart showing the
`
`patent family tree follows.
`
`11
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`The figure above summarizes the Implicit patent
`family.
`In 2012, the ancestor ’163 patent was involved in an inter partes
`
`
`
`reexamination (see, e.g., Ex. 1018, 4–27, 69–103) as well as district court
`
`litigation (see, e.g., Ex. 1022), in which the main prior art reference was
`
`Decasper. In the reexamination, certain claims were rejected over Decasper
`
`(Ex. 1019, 3). Patent Owner presented extensive arguments to overcome the
`
`rejection over Decasper, but they were unsuccessful. Ex. 1020. In March
`
`2013, while the claims were still under rejection in the reexamination and
`
`prosecution had closed, but before the reexaminaton was completed, the
`
`12
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`district court, in parallel infringement litigation, entered summary judgment
`
`of invalidity of those rejected claims, also based on Decasper. Ex. 1022, 1–
`
`15. In light of the district court’s decision holding the claims invalid, the
`
`reexamination was vacated by the PTO. Ex. 1021.
`
`Also in 2012, the ’857 patent (U.S. Patent No. 7,711,857), a
`
`continuation of the ’163 patent, was involved in an inter partes
`
`reexamination proceeding in which claims were rejected over Decasper. Ex.
`
`2006, 3–8; 2007, 3–6. The district court also held those claims invalid over
`
`Decasper in its summary judgment decision. Ex. 1022, 1–15.
`
`In June 2013, after the district court’s decision, Patent Owner filed a
`
`series of continuations that eventually led to issuance of the ’839 patent and
`
`the five other patents involved in these proceedings before the Board. See
`
`Implicit Application Tree, supra. These patents issued with claims amended
`
`in similar ways to overcome Decasper.5 See, e.g., Ex. 1004, 3–7. In the
`
`prosecution of the ’683 patent (U.S. Patent No. 8,694,683), each of claims 1
`
`and 10 was amended to add a limitation reciting routine packet processing
`
`operations, i.e., “to execute a Transmission Control Protocol (TCP) to
`
`convert one or more packets having a TCP format into a different format” in
`
`claim 1, and “a session associated with a transport layer protocol[6] that is
`
`executed to convert one or more packets in a transport layer format into a
`
`different format” in claim 10. Id. at 3–7, 264–267.
`
`
`
`The independent claims of the ’839 patent in this proceeding also
`
`include a similar limitation. For example, claim 1 of the ’839 patent recites:
`
`
`5 Petitioner points out that during the prosecution of the six patents, there
`was only one prior art rejection. Reply 2.
`6 TCP is an exemplary transport layer protocol. See Ex. 1030 (“TCP/IP
`Illustrated Volume 1”), 24.
`
`13
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`“identifying, using the key value, one or more routines for processing the
`
`packet, including a routine that is used to execute a Transmission Control
`
`Protocol (TCP) to convert packets having TCP format into a different
`
`format.” Ex. 1008, 14:42–64 (emphasis added).
`
`In the ’683 patent prosecution, Patent Owner cited Decasper and
`
`argued that Decasper “operates on IP packets only” and therefore did not
`
`meet the limitation to executing TCP protocol added by amendment:
`
`As described in detail below, Decasper includes an “IP core” that
`uses modules called “plugins” to operate on IP packets.
`Decasper therefore does not teach or suggest a path having a
`sequence of routines, “wherein the sequence includes a routine
`that is used to execute a Transmission Control Protocol (TCP) to
`convert packets having a TCP format into a different format.”
`
`Ex. 1004, 13 (emphasis added). The Examiner cited other references,
`
`eventually allowing the claims without citing Decasper. Id. at 283.
`
`Following this pattern, in the prosecution the ’839 patent, the Examiner
`
`allowed the claims in the first Office Action, without citing Decasper or any
`
`other prior art. Ex. 1010, 420–422.
`
`D. § 325(d)
`
`Under the first part of the § 325(d) framework, Becton, Dickinson
`
`factors (a), (b), and (d) are considered in the evaluation of whether the same
`
`or substantially the same art and arguments were previously before the
`
`Office. See Advanced Bionics, Paper 6 at 10. The challenges before us each
`
`combine Decasper with one other reference (either Smith or CheckPoint).
`
`As explained above, Decasper was before the Office during the
`
`reexamination of the ʼ163 patent. Although Decasper was cited, Decasper
`
`was not relied upon by the Examiner in the prosecution of the continuations
`
`that led to the patents involved in the current proceedings before the Board.
`
`14
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`
`
`Moreover, although Patent Owner is correct that Petitioner relies
`
`heavily on Decasper for most elements of the challenged claims, that is
`
`understandable because the district court found that Decasper discloses
`
`many claim elements that are carried over from the ’163 patent claims. See
`
`Ex. 1022. The amendments made to overcome Decasper simply recite
`
`executing a TCP protocol, which applicants acknowledged was known prior
`
`art. See, e.g., Ex. 1004, 19 n.4.
`
`While it is undisputed that Smith itself was not previously considered
`
`by the Office (Prelim. Resp. 13; Sur-Reply 2–3), Patent Owner asserts that
`
`the “subject matter” of Smith was before the Office, and identifies two
`
`references relating to gateways. Prelim. Resp. 14; Sur-Reply 3. Those
`
`references include an IBM publication (Ex. 2011, “IBM”) and a technical
`
`report by Li (Ex. 2012, “Li”), both of which discuss performance and quality
`
`of service in a more generalized way than Smith.
`
`We do not agree with Patent Owner that either IBM or Li is
`
`cumulative of Smith. See Becton, Dickinson Factor (b). For instance, Smith
`
`more completely describes an application gateway firewall, the AltaVista
`
`firewall, that “operate[s] in user space at the application layer of the open
`
`system interconnection (OSI) model.” Ex. 1012, 11. Smith further
`
`describes that its gateway “provides a high level of control over all major
`
`TCP/IP services.” Id. (emphasis added).
`
`CheckPoint’s firewall technology, however, was cited in an IDS.
`
`Ex. 1004, 91. Although Petitioner points to features in the CheckPoint
`
`descriptions cited here that differ from the subject matter previously
`
`presented to the Office (see, e.g., Reply 4–6), Patent Owner argues (and we
`
`agree) that Petitioner does not rely on those new features (Sur-Reply 2–3).
`
`Pet. 17. We do not need to reach this issue, however, as all challenged
`
`15
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`claims are included in the obviousness challenge over Smith (which was
`
`admittedly not before the Office) and Decasper. Id.
`
`Because it is our view that at least the combination of Smith and
`
`Decasper is new and not cumulative, this factor weighs towards a
`
`determination that the same art was not previously before the Office.
`
`However, because Patent Owner contends (and we agree) that Decasper is
`
`the primary reference that is relied upon for teaching most of the claim
`
`elements, and we also agree that Decasper was before the Examiner during
`
`the prosecution, we turn to the second step of the Advanced Bionics
`
`framework. We conclude that Petitioner has demonstrated that the Office
`
`erred. In particular, Petitioner has shown that the Examiner overlooked the
`
`significance of Decasper in considering the amendments made by Patent
`
`Owner.
`
`As noted, Patent Owner argued in its Preliminary Amendment that
`
`Decasper is limited to executing only IP protocol, and not other networking
`
`protocols such as TCP. Ex. 1004, 13–21. That may have led the Examiner
`
`away from applying Decasper, or from considering the straightforward
`
`combination of Decapser’s framework and an Application Layer Gateway
`
`(e.g., Smith) or Firewall (e.g., CheckPoint) as a basis for a rejection. The
`
`Examiner erred in failing to consider Decasper’s statement that Decasper’s
`
`“framework is also very well suited to Application Layer Gateways (ALGs),
`
`and to security devices like Firewalls.” Ex. 1014, 2.
`
`The Examiner erred also in not considering the district court’s
`
`invalidation of the ’163 and ’857 patent based on Decasper. Ex. 1022.
`
`Although the Examiner did not apply the Decasper reference, the district
`
`court concluded that this reference rendered substantially the same claims
`
`invalid. The district court’s decision included a detailed analysis of
`
`16
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`Decasper in relation to the claims and Decasper’s disclosures, for example,
`
`of processing IP packet flows, storing information relating to particular
`
`packets, and maintaining state. See, e.g., Ex. 1022, 7–15. The district court
`
`concluded its analysis by stating: “[T]he Court finds—based on clear and
`
`convincing evidence presented by Juniper’s expert—that the asserted claims
`
`in the ‘163 and ‘857 patents are anticipated as well as rendered obvious by
`
`Decasper98 alone and/or in combination with IBM96 and Nelson.” Id. at
`
`15.7
`
`The application of Decapser’s framework to Application Layer
`
`Gateways (e.g., Smith) is suggested by Decasper itself, and Petitioner has
`
`provided a rationale for making the combination that we find persuasive at
`
`this stage. Pet. 26–33. Petitioner also provides an explanation of the
`
`Examiner’s error in overlooking this suggestion. Pet. 13–15, Reply 6–7.
`
`Thus, we determine that Becton, Dickinson Factors (e) and (f) heavily weigh
`
`in favor of a finding of error under the second step of Advanced Bionics.
`
`We conclude that the circumstances presented here do not warrant us
`
`exercising our discretion to deny institution based on § 325(d).8
`
`
`7 Decasper98 is the same as the Decasper reference discussed herein (Exhibit
`1014) and IBM96 is the same as the IBM publication (Exhibit 2011)
`discussed herein. See Ex. 1022, 2.
`8 As discussed supra, we do not decide the question of whether CheckPoint
`was considered by the Examiner. Because we institute an inter partes
`review based on Decasper and Smith (see infra), we also must institute as to
`all other claims and all grounds, including the ground based on Decasper and
`CheckPoint. See SAS Inst. Inc. v. Iancu, 138 S. Ct. 1348, 1359–60 (2018)
`(holding that a decision to institute under 35 U.S.C. § 314 may not institute
`on fewer than all claims challenged in the petition); Patent Trial and Appeal
`Board Consolidated Trial Practice Guide (Nov. 2019) (“TPG”), at 5 (“In
`instituting a trial, the Board will either (1) institute as to all claims
`challenged in the petition and on all grounds in the petition, or (2) institute
`
`17
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`IV. OTHER PRELIMINARY MATTERS
`
`A. Level of Ordinary Skill
`
`Petitioner contends a person of ordinary skill in the art “would have a
`
`bachelor’s degree in computer science or related field and four years of
`
`industry experience in computer networking, or a master’s degree in
`
`computer science and two years of industry experience.” Pet. 17–18 (citing
`
`Ex. 1011 ¶ 14). At this stage, Patent Owner does not dispute Petitioner’s
`
`formulation of a person of ordinary skill in the art. See generally Prelim.
`
`Resp.
`
`In determining the level of ordinary skill in the art, various factors
`
`may be considered, including the “type of problems encountered in the art;
`
`prior art solutions to those problems; rapidity with which innovations are
`
`made; sophistication of the technology; and educational level of active
`
`workers in the field.” In re GPAC Inc., 57 F.3d 1573, 1579 (Fed. Cir. 1995)
`
`(citation omitted). The level of ordinary skill in the art is also reflected by
`
`the prior art of record. See Okajima v. Bourdeau, 261 F.3d 1350, 1355 (Fed.
`
`Cir. 2001).
`
`Based on our review of the ’839 Patent and the prior art of record, we
`
`determine that Petitioner’s definition is consistent with the types of problems
`
`and solutions encountered in the art. At this stage of the proceeding, we
`
`adopt Petitioner’s proposed level of ordinary skill in the art.
`
`B. Claim Construction
`
`In this inter partes review, the Board applies the same claim
`
`construction standard as that applied in federal courts. See 37 C.F.R
`
`
`on no claims and deny institution.”) (available at https://
`www.uspto.gov/TrialPracticeGuideConsolidated).
`
`18
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`§ 42.100(b) (2019). Under this standard claim terms “are generally given
`
`their ordinary and customary meaning” as understood by a person of
`
`ordinary skill in the art in question at the time of the invention. Phillips v.
`
`AWH Corp., 415 F.3d 1303, 1312–13 (Fed. Cir. 2005) (en banc) (citations
`
`omitted). “In determining the meaning of the disputed claim limitation, we
`
`look principally to the intrinsic evidence of record, examining the claim
`
`language itself, the written description, and the prosecution history, if in
`
`evidence.” DePuy Spine, Inc. v. Medtronic Sofamor Danek, Inc., 469 F.3d
`
`1005, 1014 (Fed. Cir. 2006) (citing Phillips, 415 F.3d at 1312–17).
`
`Extrinsic evidence is “less significant than the intrinsic record in
`
`determining ‘the legally operative meaning of claim language.’” Phillips,
`
`415 F.3d at 1317 (citation omitted).
`
`Petitioner provides claim constructions for several terms as set forth in
`
`the table below.
`
`Claim Term
`
`“message”
`
`“one or more routines
`for processing the
`packet”
`
`“state information”
`
` “convert packets
`having a TCP format
`into a different
`format”
`“execute a
`
`Petitioner’s Constructions
` “a collection of data that is related in some way,
`such as a stream of video or audio data or an email
`message.” Pet. 18.
` “[software routines/software conversion routines]
`arranged in a sequence that was not established in
`a chain of modules connected before receiving a
`first packet of the message.” Pet. 18–19.
`“information that is specific to a software routine
`for a specific message, that can be used for all
`packets of the message, and that is not information
`related to an overall
`path.” Pet. 19.
`“convert the outermost header structure of the
`packet(s) from TCP [a transport layer protocol
`header] to another type of header structure.” Pet.
`19–20.
`“operate on one or more packets whose outermost
`
`19
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`Claim Term
`Transmission Control
`Protocol (TCP)”
`
`“key value”
`
`Petitioner’s Constructions
`header is a TCP header.” Pet. 20.
`
`“information that can be used to identify the
`session of the protocol.” Pet. 20.
`
`Patent Owner states that “[w]hile Patent Owner does not agree with
`
`the Petition’s proposed claim constructions, for the purposes of this
`
`Preliminary Response only, Patent Owner does not contest those claim
`
`constructions.” Prelim. Resp. 7.
`
`In view of the issues we address below, we determine that it is not
`
`necessary to provide an express interpretation of any of the aforementioned
`
`claim terms at this juncture. See Nidec Motor Corp. v. Zhongshan Broad
`
`Ocean Motor Co., 868 F.3d 1013, 1017 (Fed. Cir. 2017); Vivid Techs., Inc.
`
`v. Am. Sci. & Eng’g, Inc., 200 F.3d 795, 803 (Fed. Cir. 1999) (“[O]nly those
`
`terms need be construed that are in controversy, and only to the extent
`
`necessary to resolve the controversy.”).
`
`C. Description of Prior Art References
`
`Petitioner’s challenge relies on Smith, Decasper, and CheckPoint. See
`
`Pet., passim.
`
`1.
`
`Smith (Exhibit 1012)
`
`
`
`Smith is a journal article titled “Protecting a Private Network: The
`
`AltaVista Firewall.” Ex. 1012, 4.9 Smith describes a commercial firewall,
`
`The AltaVista Firewall 97, for connecting an organization’s private network
`
`to the Internet and protecting the network from malicious attack. Id. Smith
`
`
`9 Unless otherwise indicated, we use the parties’ page numbering for
`exhibits throughout this decision.
`
`20
`
`

`

`IPR2020-00591
`Patent 10,033,839 B2
`
`begins with a general overview of firewall technology (id. at 4–7) and
`
`follows with a description of the AltaVista Firewall product (id. at 7– 17).
`
`
`
`Smith explains that a firewall protects private networks by enforcing
`
`security policies that specify which connections are allowed between a
`
`private network and the Internet. Id. at 4. In general, firewalls provide two
`
`types of controls and are categorized either as packet-filtering (packet-
`
`screening) or application-level implementations. Id. at 5.
`
`Packet-filtering firewalls control whether individual packets are
`
`forwarded or denied based on a set of rules, such as rules that specify source
`
`and destination IP addresses and ports and the packet type (for example,
`
`TC

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket