throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`PATENT:
`
`8,165,024
`
`INVENTORS: Andrew Dolganow
`Keith Allen
`Colin Leon Kahn
`
`FILED:
`
`ISSUED:
`
`TITLE:
`
`April 3, 2008
`
`April 24, 2012
`
`USE OF DPI TO EXTRACT AND FORWARD
`APPLICATION CHARACTERISTICS
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`Microsoft Corp.
`Petitioner
`v.
`Proven Networks, LLC
`Patent Owner
`
`Case IPR 2021-00887
`
`PETITION FOR INTER PARTES REVIEW OF
`U.S. PATENT NO. 8,165,024
`CHALLENGING CLAIMS 1-4, 7-19, AND 22-25
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`
`TABLE OF CONTENTS
`INTRODUCTION ........................................................................................... 1
`I.
`II. MANDATORY NOTICES ............................................................................. 2
`A.
`Real Party-in-Interest ............................................................................ 2
`B.
`Related Matters ...................................................................................... 2
`C.
`Counsel .................................................................................................. 3
`III. CERTIFICATION OF GROUNDS FOR STANDING .................................. 4
`IV. OVERVIEW OF CHALLENGE AND RELIEF REQUESTED .................... 4
`A.
`Prior Art Patents and Printed Publications ............................................ 5
`B.
`Relief Requested .................................................................................... 5
`C.
`Discretionary Denial is Not Appropriate .............................................. 5
`LEVEL OF ORDINARY SKILL IN THE ART ............................................. 8
`V.
`VI. OVERVIEW OF THE ’024 PATENT ............................................................ 8
`A.
`The Purported Invention of the ’024 Patent .......................................... 8
`B.
`Relevant Prosecution History .............................................................. 14
`VII. CLAIM CONSTRUCTION .......................................................................... 16
`VIII. GROUNDS FOR CHALLENGE .................................................................. 18
`A.
`Overview of Prior Art.......................................................................... 19
`B.
`Ground I: Claims 1-4, 7-19, and 22-25 are anticipated by
`Packeteer ’406 ..................................................................................... 23
`1.
`Packeteer ’406 ............................................................................ 23
`2.
`Claim 1 ....................................................................................... 32
`3.
`Claim 2: The method of claim 1, wherein the packet is an IP
`packet, and further comprising: placing the information
`identifying the classification in a header extension of the IP
`packet. ......................................................................................... 54
`Claim 3: The method of claim 1, further comprising:
`formatting the packet according to a proprietary protocol;
`
`4.
`
`i
`
`

`

`6.
`
`7.
`
`5.
`
`U.S. Patent No. 8,165,024
`IPR2021-00887
`and placing the information identifying the classification in a
`proprietary protocol extension of the packet. ............................. 55
`Claim 4: The method of claim 1, wherein the packet is a
`Generic Routing Encapsulation (GRE) packet. ......................... 56
`Claim 7: The method of claim 1, wherein the step of
`determining the classification for the packet further
`comprises: considering at least one of an effect of the packet
`on a user experience and an importance of the packet to the
`identified application. ................................................................. 56
`Claim 8: The method of claim 1, wherein the step of
`performing processing on the packet at the downstream
`device further comprises: performing a traffic management
`function on the packet. ............................................................... 57
`Claim 9: The method of claim 8, wherein the traffic
`management function further comprises: dropping the
`packet. ......................................................................................... 58
`Claim 10: The method of claim 8, wherein the traffic
`management function further comprises: modifying a quality
`of service associated with the packet. ........................................ 59
`10. Claim 11: The method of claim 1, further comprising:
`selecting the application associated with the active flow from
`the group consisting of an audio application and a video
`application. ................................................................................. 60
`11. Claim 12: the method of claim 1, wherein the at least one
`other packet belongs to the active flow. ..................................... 60
`12. Claim 13: The method of claim 1, wherein the at least one
`other packet belongs to a flow other than the active flow. ........ 61
`13. Claim 14: The method of claim 1, wherein the step of
`performing DPI to identify an application comprises at least
`one of the following: signature matching, pattern matching,
`stateful monitoring, behavioral analysis, and statistical
`analysis. ...................................................................................... 61
`14. Claim 15: The method of claim 1, wherein, in performing
`DPI to identify an application, the processor is configured to
`perform at least one of the following: signature matching,
`
`8.
`
`9.
`
`ii
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`pattern matching, stateful monitoring, behavioral analysis,
`and statistical analysis. ............................................................... 63
`15. Claim 16 ..................................................................................... 63
`16. Claim 17: The device of claim 16, wherein the packet is an
`IP packet and the information identifying the classification is
`placed in a header extension of the IP packet. ........................... 65
`17. Claim 18: The device of claim 16, wherein the packet is
`formatted according to a proprietary protocol and the
`information identifying the classification is placed in a
`proprietary protocol extension of the packet. ............................. 65
`18. Claim 19: The device of claim 16, wherein the packet is a
`Generic Routing Encapsulation (GRE) packet. ......................... 66
`19. Claim 22: The device of claim 16, wherein the processor
`determines a classification for the packet by considering at
`least one of an effect of the packet on a user experience and
`an importance of the packet to the identified application. ......... 66
`20. Claim 23: The device of claim 16, wherein the downstream
`device performs a traffic management function on the
`packet. ......................................................................................... 66
`21. Claim 24: The device of claim 16, wherein the at least one
`other packet belongs to the active flow. ..................................... 66
`22. Claim 25: The device of claim 16, wherein the at least one
`other packet belongs to a flow other than the active flow. ........ 66
`Ground III: Claims 7, 11, and 22 are obvious over Packeteer ’406
`in view of NBAR ................................................................................. 67
`1.
`Overview of NBAR .................................................................... 67
`2.
`Claim 7: The method of claim 1, wherein the step of
`determining the classification for the packet further
`comprises: considering at least one of an effect of the packet
`on a user experience and an importance of the packet to the
`identified application .................................................................. 67
`Claim 11: The method of claim 1, further comprising:
`selecting the application associated with the active flow from
`the group consisting of an audio application and a video
`application. ................................................................................. 71
`iii
`
`3.
`
`C.
`
`

`

`4.
`
`U.S. Patent No. 8,165,024
`IPR2021-00887
`Claim 22: The device of claim 16, wherein the processor
`determines a classification for the packet by considering at
`least one of an effect of the packet on a user experience and
`an importance of the packet to the identified application. ......... 74
`IX. CONCLUSION .............................................................................................. 74
`
`iv
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`Petitioner Microsoft Corp. (“Microsoft” or “Petitioner”) respectfully
`
`requests Inter Partes Review of claims 1-4, 7-19, and 22-25 of U.S. Patent No.
`
`8,165,024 (“’024 patent”) (Ex. 1001) pursuant to 35 U.S.C. §§ 311-19 and 37
`
`C.F.R. § 42.1 et seq. This Petition is a substantively identical “copy” of IPR2021-
`
`00194 by VMWare, Inc. and Dell Technologies Inc. (“Dell IPR”), and is filed
`
`concurrently with a motion for joinder. This petition differs only in that it
`
`addresses, without relying on any additional references, certain district court claim
`
`constructions promulgated after the Dell IPR was filed, and non-substantive
`
`modifications to meet word count and address discretionary denial issues.
`
`I.
`
`INTRODUCTION
`The ’024 patent concerns a method for classifying network packets using
`
`deep packet inspection (“DPI”) and modifying the packets to convey classification
`
`information to downstream devices that receive the packets. See Ex. 1001, Title,
`
`Abstract. To address perceived shortcomings with the then-admitted state of the
`
`art, the ’024 applicants (“Applicants”) proposed using a network device to (1) use
`
`DPI to identify an application associated with a flow of data packets passing
`
`through the network, (2) classify a packet based on characteristics of the
`
`application, and (3) insert that classification information into the packet so that
`
`another, downstream device receiving the packet could use the classification
`
`1
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`information to process the packet without having to perform DPI itself. See, e.g.,
`
`Ex. 1001, 1:12-2:37.
`
`These ideas were not new. Industry pioneer Packeteer had already described
`
`the same DPI-based techniques, in more detail and sophistication than the ’024
`
`patent, in U.S. Patent No. 7,742,406 (“Packeteer ’406”). Similarly, Cisco disclosed
`
`a Network Based Application Recognition engine (“NBAR”) that, like the ’024
`
`patent, used DPI-based techniques to classify application packets within flows
`
`through a network.
`
`Petitioner accordingly requests that the Board find the challenged ’024
`
`claims unpatentable.
`
`II. MANDATORY NOTICES
`A.
`Real Party-in-Interest
`Petitioner Microsoft Corp. (“Microsoft” or “Petitioner”) is the real party-in-
`
`interest.
`
`Related Matters
`B.
`Proven Networks, LLC (the “Patent Owner”) is the owner of the ’024 patent.
`
`Proven Networks has asserted the ’024 patent against Microsoft in Proven
`
`Networks, LLC v. Microsoft Corporation, 6-21-cv-00022 (W.D. Tex. Jan. 11,
`
`2021). Patent Owner has also asserted the ’024 patent in: Proven Networks, LLC v.
`
`Palo Alto Networks, Inc., 6-21-cv-00369 (W.D. Tex.); Proven Networks, LLC v.
`
`2
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`Barracuda Networks, Inc., 3-21-cv-02185 (N.D. Cal.); Proven Networks, LLC v.
`
`Juniper Networks, Inc., 6-21-cv-00305 (W.D. Tex.); Proven Networks, LLC v.
`
`Broadcom Incorporated, 6-21-cv-00003 (W.D. Tex.); Proven Networks, LLC v.
`
`Cisco Systems, Inc., 6-20-cv-00983 (W.D. Tex.); Proven Networks, LLC v. Hewlett
`
`Packard Enterprise Company et al, 6-20-cv-00632 (W.D. Tex.); Proven Networks,
`
`LLC v. Solarwinds Corp., 1-20-cv-01221 (W.D. Tex.); Proven Networks, LLC v.
`
`Arista Networks, Inc., 6-20-cv-00281 (W.D. Tex.); Proven Networks, LLC v. Dell
`
`Technologies, Inc. et al, 6-20-cv-00976 (W.D. Tex.); Proven Networks, LLC v. F5
`
`Networks, Inc., 5-20-cv-02521 (N.D. Cal.). The ’024 patent is also the subject of
`
`SonicWall Inc. v. Proven Networks, LLC, 6:20-cv-00977-ADA (W.D. Tex.), in
`
`which SonicWall Inc. is seeking declaratory judgments of noninfringement and
`
`invalidity.1
`
`C.
`
`Counsel
`
`Lead Counsel
`James M. Heintz (Reg. No. 41,828)
`Email: jim.heintz@dlapiper.com
`
`Back-Up Counsel
`Robert C. Williams (pro hac vice to
`be requested)
`
`1 Many of the listed cases have been consolidated for pre-trial in the Western
`
`District of Texas as In re Proven Networks Patent Litigation, Case No. 6:20-mc-
`
`02959-ADA. Petitioner Microsoft’s case, however, has not been consolidated in
`
`6:20-mc-02959-ADA.
`
`3
`
`

`

`Lead Counsel
`11911 Freedom Dr., Suite 300
`Reston VA 20190
`Phone: 703.773.4148
`Fax: 703.773.5000
`
`U.S. Patent No. 8,165,024
`IPR2021-00887
`Back-Up Counsel
`Email: robert.williams@dlapiper.com
`401 B Street, Suite 1700
`San Diego, CA 92101
`Phone: 619.699.2820
`Fax: 619.699.2701
`
`Nandan R. Padmanabhan (pro hac
`vice to be requested)
`Email:
`nandan.padmanabhan@dlapiper.com
`2000 Avenue of the Stars, Suite 400
`North Tower
`Los Angeles, CA 90067
`Phone: 310.595.3082
`Fax: 310.595.3482
`
`Please address all correspondence to lead counsel and back-up counsel at the
`
`addresses shown above. Microsoft also consents to electronic service by email at
`
`the email addresses above and at DLA-MicroIPR-Proven@us.dlapiper.com.
`
`III. CERTIFICATION OF GROUNDS FOR STANDING
`Petitioner certifies pursuant to Rule 42.104(a) that the ʼ024 patent is
`
`available for IPR and that Petitioner is not barred or estopped from requesting an
`
`IPR challenging the patent claims on the grounds identified herein.
`
`IV. OVERVIEW OF CHALLENGE AND RELIEF REQUESTED
`Pursuant to Rules 42.22(a)(1) and 42.104(b)(1)-(2), Petitioner challenges
`
`claims 1-4, 7-19, and 22-25 of the ’024 patent (“challenged claims”) and requests
`
`that each be canceled.
`
`4
`
`

`

`Prior Art Patents and Printed Publications
`A.
`Petitioner relies upon the following patents and printed publications:
`
`U.S. Patent No. 8,165,024
`IPR2021-00887
`
`1.
`
`U.S. Patent No. 7,742,406 to Muppala et al., filed by Packeteer, Inc.
`
`(“Packeteer ’406”) (Ex. 1005).
`
`2.
`
`Classifying Network Traffic Using NBAR by Cisco Systems, Inc.
`
`(“NBAR”) (Ex. 1008).
`
`Relief Requested
`B.
`Petitioner requests that the Board cancel the challenged claims because they
`
`are unpatentable under 35 U.S.C. §§ 102 and/or 103.
`
`Discretionary Denial is Not Appropriate
`C.
`The Board should not deny institution due to the pendency of Proven
`
`Networks’ district-court case against Microsoft.
`
`The Board has provided six factors to weigh when considering discretionary
`
`denial:
`
`1. whether the court granted a stay or evidence exists that one may be
`
`granted if a proceeding is instituted;
`
`2. proximity of the court’s trial date to the Board’s projected statutory
`
`deadline for a final written decision;
`
`3. investment in the parallel proceeding by the court and the parties;
`
`5
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`4. overlap between issues raised in the petition and in the parallel
`
`proceeding;
`
`5. whether petitioner and defendant in the parallel proceeding are the
`
`same party; and
`
`6. other circumstances that impact the Board’s exercise of discretion,
`
`including the merits.
`
`Apple v. Fintiv, Inc., IPR2020-00019, Paper 11, 6-16 (P.T.A.B. Mar. 20,
`
`2020) (precedential). These factors favor institution.
`
`Factor 1 is neutral. The PTAB has declined to speculate on the likelihood of
`
`Judge Albright entering a stay after institution and has found this factor neutral.
`
`See Western Digital Corp. et al. v. Kuster, IPR2020-01391, Paper 10 at 9 (PTAB
`
`Feb. 16, 2021)); Globalfoundries Inc. v. UNM Rainforest Innovations, IPR2020-
`
`00984, Paper 11 at 10-11 (PTAB Dec. 9, 2020). Furthermore, the district court
`
`litigation is in its infancy and the PTAB will likely resolve this petition before a
`
`trial takes place against Microsoft in Texas.
`
`Factors 2 and 3 strongly support institution because the district court case
`
`remains in its infancy; the initial case scheduling conference has yet to occur, and
`
`no Markman hearing date or trial date are set. Petitioner has not engaged in any
`
`discovery nor served invalidity contentions.
`
`6
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`Factor 4 strongly favors institution. Microsoft stipulates that, if the Board
`
`institutes this IPR, Microsoft will not pursue in the district court litigation any
`
`ground raised or that could have been reasonably raised in this IPR. This will
`
`mitigate any concerns about duplicative efforts. See Sotera Wireless, Inc. v.
`
`Masimo Corp., IPR2020-01019, Paper 12, 18-19 (Dec. 1, 2020) (precedential as to
`
`§ II.A). Thus, the district court will not have to resolve invalidity challenges to the
`
`challenged claims for any ground Petitioner raised or reasonably could have raised
`
`in the IPR.
`
`Factor 5 supports institution because Petitioner is a party in only one of the
`
`eleven currently co-pending litigations, and is not related to any party in the ten
`
`other co-pending litigations. The other cases should not be considered in the
`
`analysis because it is Patent Owner that decided to file serial cases and delay in
`
`suing Microsoft. Patent Owner should not be able to avoid review of its patents by
`
`choosing to delay suing Microsoft.
`
`Factor 6 strongly favors institution because the grounds herein provide a
`
`strong showing of obviousness. “[I]f the merits of a ground raised in the petition
`
`seem particularly strong on the preliminary record, this fact has favored
`
`institution.” Fintiv, IPR2020-00019, Paper 11, 14-15.
`
`Because the Fintiv factors support institution, discretionary denial is not
`
`appropriate.
`
`7
`
`

`

`V.
`
`LEVEL OF ORDINARY SKILL IN THE ART
`A person of ordinary skill in the art (“POSITA”) at the time of the alleged
`
`U.S. Patent No. 8,165,024
`IPR2021-00887
`
`invention of the ’024 patent would have had at least the equivalent of a Bachelor’s
`
`degree in computer engineering and four or more years of experience in
`
`networking devices and traffic management design. Less work experience may be
`
`compensated by a higher level of education, such as a Master’s degree, and vice
`
`versa. See Ex. 1003, ¶¶ 17-18.
`
`VI. OVERVIEW OF THE ’024 PATENT
`A.
`The Purported Invention of the ’024 Patent
`The ’024 patent is directed to using DPI2 to classify packets based on
`
`characteristics of an application associated with the packets. See Ex. 1001, Title.
`
`The ’024 background section acknowledges that, by the time of the ’024
`
`patent, mobile network operators utilized packet marking to prioritize and forward
`
`packets. For example, voice packets could be marked as higher priority than data
`
`packets to improve the quality of calls placed over a mobile network. Id., 1:49-57.
`
`According to the patent, however, these prior approaches purportedly relied
`
`on end-user equipment to do the packet marking, reducing the flexibility of
`
`2 Generally, DPI concerns inspecting a packet to learn information about the packet
`
`other than its source and destination. Ex. 1003, ¶¶ 20-23.
`
`8
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`operators to define new applications and markings. Id., 1:58-66. The applicants
`
`further claimed that prior DPI systems “treat[ed] all data packets associated with
`
`an application in the same manner” and, for example, “fail[ed] to consider that
`
`some packets associated with an application flow are more important than others
`
`and therefore fail[ed] to most efficiently utilize bandwidth in the network.” Id.,
`
`2:3-10.
`
`The applicants contended that a device was needed that would operate in the
`
`network to identify characteristics of the applications generating the packets and to
`
`convey that information to downstream components:
`
`[T]here is a need for an in-line device that identifies characteristics
`
`of applications associated with data packets and conveys this
`
`information for downstream processing. There is also a need for
`
`associating application characteristic information with data packets
`
`without requiring the packet to be marked at end-user equipment. In
`
`addition, there is a need for packet marking in a mobile network that
`
`utilizes a packet marking scheme such that a large number of
`
`applications and application characteristics may be identified at any
`
`location in the network, without requiring Deep Packet Inspection
`
`(DPI) processing to be performed at each location.
`
`9
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`
`Id., 2:11-21.3
`
`Accordingly, the ’024 applicants proposed a DPI device 150 that would
`
`reside in the network as a standalone device, as shown in Figure 1, or as a
`
`component that could be integrated into a router. See id., 5:39-41.
`
`Ex. 1001, Fig.1.
`
`The applicants further proposed a purportedly improved method for
`
`performing DPI using this device. Figure 6 shows the basic method of the claimed
`
`invention. The DPI device receives a packet (620) and uses information in the
`
`packet’s header to associate it with a “flow,” which a POSITA would have
`
`understood to be a sequence of related packets typically having, e.g., at least the
`
`same source and destination addresses and port numbers. See, e.g., id., 8:43-48
`
`(“DPI device 150 intercepts, sniffs, or otherwise receives a packet transmitted
`
`from a source node to a destination node [and] identifies a flow associated with
`
`3 All emphasis added unless noted otherwise.
`
`10
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`the packet using header information from the packet”). The DPI device then
`
`performs DPI processing (630) on the packet and identifies an application
`
`associated with that packet’s flow. See id., 8:50-56 (“DPI device 150 examines any
`
`combination of information in OSI layers 3 through 7 of one or more packets to
`
`identify an application associated with the flow. DPI device 150 may determine []
`
`whether the flow relates to email, streaming video, web browsing, peer-to-peer
`
`transfer, Voice over IP (VoIP), or any other application of interest to the service
`
`provider”).
`
`11
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`
`Ex. 1001, Fig. 6.
`
`Once the application is identified, the DPI device further classifies the
`
`packet (640) based on some underlying characteristic of the application. This
`
`application characteristic is broad. It may be, for example, a “compression
`
`scheme” or “data structure” (id., 5:31-35; see also id., 6:47-50), or a “frame[]
`
`type[] used for an encoding scheme” (id., 7:50-54). Or it may be based on the
`
`“importance of the packet to the user experience” or “the needs of the application.”
`
`12
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`Id., 8:64-67. Indeed, the patent explains that the further classification can be of
`
`“any characteristic of the underlying application.” Id., 8:6-9; see also 8:66-67
`
`(“some other criterion”), 5:34-35 (“any other application characteristic”).
`
`Once the packet is so-classified, the DPI device inserts application and/or
`
`classification information into the packet (650), for example, by adding “an
`
`alphanumeric value identifying the classification of the packet.” Id., 9:8-10.
`
`The so-marked packet is forwarded onto the network (660) and
`
`subsequently received by a downstream device, which can then process (670) the
`
`packet using the inserted classification information, without the need to perform
`
`DPI on that packet itself. For example, “the downstream device may determine
`
`how to treat the packet, including whether to allow the packet to proceed or
`
`whether the packet should instead be dropped.” Id., 9:45-50.
`
`As filed, claim 1 recited a method directed to performing DPI to identify an
`
`application and classifying packets based on characteristics of that application:
`
`1.
`
`A method of processing packets sent from a source node
`
`to a destination node, the method comprising:
`
`receiving a packet sent from the source node to the destination
`
`node;
`
`associating the packet with an active flow by accessing
`
`information in the packet;
`
`13
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`performing deep packet inspection (DPI) to identify an
`
`application associated with the active flow;
`
`determining a classification for the packet based on
`
`characteristics of the identified application;
`
`associating, with the packet, information identifying the
`
`classification;
`
`forwarding the packet including the information identifying the
`
`classification towards the destination node; and
`
`performing processing on the packet at a downstream device by
`
`extracting the classification from the packet.
`
`Ex. 1002, at 25.
`
`Relevant Prosecution History
`B.
`The ’024 patent application was filed on April 3, 2008. At no point did
`
`applicants submit any prior art.
`
`The examiner initially rejected all claims based on Luft (U.S. Patent No.
`
`7,606,147) and Wybenga (U.S. Patent No. 7,362,763), finding that they taught or
`
`rendered obvious the network DPI device and method, as recited in the original
`
`claims. See Ex. 1002, at 56 (Non-Final Rejection, 5/12/10). The applicants did not
`
`dispute those findings and instead amended the claims to specifically require
`
`14
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`inserting the classification information into the packets before forwarding them.
`
`See id., at 72 (Amendment, 6/11/10).
`
`The examiner again rejected the so-amended claims based on Olsson (U.S.
`
`Pre-grant Publication No. 2007/0162289) and Taaghol (U.S. Pre-grant Publication
`
`No. 2008/0214189), finding that they taught or rendered obvious the network DPI
`
`device and method, including inserting classification information into the packets.
`
`See id., at 199-202 (Non-final Rejection, 6/7/11). The applicants also did not
`
`dispute those findings and instead amended the claims to further require that the
`
`DPI step identify an application “by analyzing at least one other packet.” See id.,
`
`at 221 (Amendment, 8/4/11).
`
`The examiner, apparently unaware that this too was known, allowed the
`
`amended claims, noting that “[t]he prior art of record fails to teach the step of
`
`performing DPI to identify an application associated with the active flow by
`
`analyzing at least one other packet in specific combination as recited.” Id., at 271
`
`(Notice of Allowance, 12/21/11).
`
`The final version of claim 1 is presented below with deletions and additions
`
`made during prosecution indicated with underline and strikethrough, respectively:
`
`1. A method of processing packets sent from a source node to a
`
`destination node, the method comprising:
`
`15
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`receiving a packet sent from the source node to the destination
`
`node;
`
`associating the packet with an active flow by accessing
`
`information in the packet;
`
`performing deep packet inspection (DPI) to identify an
`
`application associated with the active flow by analyzing at least one
`
`other packet;
`
`determining a classification for the packet based on
`
`characteristics of the identified application;
`
`associating, with the packet inserting information identifying
`
`the classification into the packet;
`
`forwarding the packet, including the information identifying the
`
`classification, towards the destination node; and performing such that
`
`a downstream device is enabled to perform processing of the packet
`
`by extracting the classification from the packet.
`
`Ex. 1001, cl. 1.
`
`VII. CLAIM CONSTRUCTION
`Petitioner does not believe claim construction is necessary in this
`
`proceeding. Only claim terms “in controversy” need be construed in an IPR “and
`
`only to the extent necessary to resolve the controversy.” Nidec Motor Corp. v.
`16
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`Zhongshan Broad Ocean Motor Co., 868 F.3d 1013, 1017 (Fed. Cir. 2017).
`
`Because the prior art asserted herein discloses the preferred embodiment within the
`
`indisputable scope of the claims, the Board need not construe the outer bounds of
`
`the claims as part of these proceedings. See, e.g., 83 Fed. Reg. 51340 at 47-48, 55,
`
`65-71.
`
`Certain claim terms were construed in the Proven Networks, LLC v.
`
`Amazon.com, Inc. et al., 6-20-mc-02959 (W.D. Tex.) district court litigation (to
`
`which Microsoft is not a party). Judge Albright issued the following construction:
`
`Exhibit 1023 at 3. The Amazon parties also agreed that the term “analyzing at least
`
`one other packet” in claims 1 and 16 means “analyzing at least one packet other
`
`than the packet.” Exhibit 1024 at 2.
`
`17
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`Although Petitioner does not believe claim construction is necessary for this
`
`proceeding, to the extent the Board adopts the constructions from the Amazon
`
`litigation (which it need not do), the invalidity analyses set forth herein remain the
`
`same. 4
`
`VIII. GROUNDS FOR CHALLENGE
`This Petition, supported by the Declaration of Dr. Riccardo Bettati filed
`
`herewith as Exhibit 1003, demonstrates that there is a reasonable likelihood that
`
`Petitioner will prevail with respect to at least one challenged claim and that each of
`
`the challenged claims is not patentable. See 35 U.S.C. §314(a).
`
`Dr. Bettati is a professor of Computer Science and & Engineering at Texas
`
`A&M University. Dr. Bettati earned his Ph.D. in Computer Science in 1994 from
`
`the University of Illinois Urbana-Champaign. He has published numerous
`
`academic papers on various subjects, including network-level support for
`
`distributed applications such as distributed multimedia and secure computation,
`
`early forms of DPI, and technologies that can be integrated into DPI – such as DPI
`
`counter-measures for secure, encrypted communication. See Ex. 1003, ¶ 4.
`
`4 Petitioner does not contend that the constructions adopted in the Amazon
`
`litigation are complete constructions of these limitations or the claims for any other
`
`purpose, including for any issues raised in the related litigation.
`
`18
`
`

`

`Overview of Prior Art
`A.
`The basic ideas claimed in the ’024 patent were well known in the art. Just
`
`U.S. Patent No. 8,165,024
`IPR2021-00887
`
`as there was nothing new about a network device performing DPI to identify an
`
`application and classifying packets based on characteristics of that application,
`
`there also was nothing new about identifying an application “by analyzing at least
`
`one other packet.”
`
`As a general matter, using DPI to learn something about a packet (other than
`
`its source or destination) dates back decades. As Dr. Bettati explains, the concept
`
`of DPI – whether or not the term “DPI” was used – extends to at least the early
`
`1990s. As the term suggests, DPI techniques were used to extract information from
`
`layers of a packet deeper than its outermost header. For example, DPI techniques
`
`could parse a packet to examine higher level headers and/or payload to identify
`
`information about the packet that could be used in managing network traffic. Using
`
`information obtained from multiple packets in the same flow was also known. This
`
`was often called “stateful” inspection, because the system had to store the
`
`information extracted from previous packets (i.e., the “state”) so that it could be
`
`used in conjunction with information extracted from later packets. See Ex. 1003, ¶¶
`
`40-46.
`
`19
`
`

`

`U.S. Patent No. 8,165,024
`IPR2021-00887
`Using DPI to classify a packet with characteristic information about an
`
`application is likewise old. For example, Cisco’s NBAR5 (Ex. 1008) disclosed a
`
`system that, like the ’024 patent, “recognize[d] and classifie[d] a wide variety of
`
`protocols and applications.” See Ex. 1008, at 1. NBAR, like the ’024 patent, also
`
`operated in a network-based device (e.g., a router) and classified packets moving
`
`through a network from a source to a destination. See id., at 2. In NBAR,
`
`classification was “based on deep packet inspection” of “content within the
`
`payload such as that transaction identifier, message type, or other similar data.” See
`
`id., at 4, 5; see also Szigeti, Ex. 1009, at 74 (“NBAR examines the packet payload
`
`itself and classifies packets on the payload content, such as transaction identifiers,
`
`message types, or other similar data”). See Ex. 1003, ¶ 46.
`
`For example, NBAR’s DPI could further classify Citrix Independent
`
`Computing Architecture (ICA) traffic based on whether it was high, medium, low,
`
`and background priorities (e.g., printing traffic could be classified as low priority
`
`traffic, whereas updates to the user’s display could be classified as higher priority
`
`traffic). See Ex. 1008, at 9. NBAR’s packet inspection and classification was
`
`5 “NBAR” is an acronym for “network-based application recognition,” conveying
`
`that a primary focus of NBAR was to recognize an application associated with
`
`packets it was inspecting. See Ex. 1008, at 1.
`
`20
`
`

`

`U.S. Patent No. 8,165

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket