throbber

`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`———————
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`———————
`
`CISCO SYSTEMS, INC.,
`Petitioner
`
`———————
`
`IPR2021-01242
`U.S. Patent No. 9,100,431
`
`
`PETITION FOR INTER PARTES REVIEW
`UNDER 35 U.S.C. § 312 AND 37 C.F.R. § 42.104
`
`
`
`
`
`

`

`
`
`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`TABLE OF CONTENTS
`
`Petitioner’s Exhibit List ............................................................................................. 5
`
`I.
`
`II.
`
`Introduction ...................................................................................................... 7
`
`Grounds for standing ....................................................................................... 7
`
`III. Note .................................................................................................................. 7
`
`IV. Summary of the ’431 patent ............................................................................ 8
`
`V.
`
`Prosecution history .......................................................................................... 9
`
`VI. Effective priority date of the ’431 patent ......................................................10
`
`VII. Level of ordinary skill in the art ....................................................................10
`
`VIII. Claim construction .........................................................................................10
`
`IX. Relief requested and reasons therefore ..........................................................11
`
`X.
`
`Identification of how the claims are unpatentable .........................................11
`
`A.
`
`B.
`
`C.
`
`Challenged claims .............................................................................. 11
`
`Statutory grounds for challenges ........................................................ 12
`
`Ground 1 ............................................................................................. 13
`
`1.
`
`2.
`
`3.
`
`4.
`
`Summary of W-L ..................................................................... 13
`
`Claim 14 ................................................................................... 14
`
`Claim 19 ................................................................................... 33
`
`Claim 20 ................................................................................... 35
`
`D. Ground 2 ............................................................................................. 36
`
`1.
`
`Summary of Hill....................................................................... 36
`
`2
`
`

`

`
`
`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`Reasons to combine W-L and Hill ........................................... 37
`
`Claim 1 ..................................................................................... 43
`
`Claim 2 ..................................................................................... 48
`
`Claim 4 ..................................................................................... 53
`
`Claim 5 ..................................................................................... 55
`
`Claim 6 ..................................................................................... 56
`
`Claim 7 ..................................................................................... 59
`
`Claim 8 ..................................................................................... 59
`
`10. Claim 9 ..................................................................................... 61
`
`11. Claim 10 ................................................................................... 64
`
`12. Claim 11 ................................................................................... 69
`
`13. Claim 12 ................................................................................... 70
`
`14. Claim 15 ................................................................................... 72
`
`15. Claim 16 ................................................................................... 72
`
`16. Claim 17 ................................................................................... 73
`
`17. Claim 18 ................................................................................... 75
`
`XI. Discretionary denial is inappropriate .............................................................75
`
`A. Discretionary denial under 35 U.S.C. § 325(d) is not appropriate .... 75
`
`B.
`
`Discretionary denial under the Fintiv factors is not appropriate ........ 78
`
`1.
`
`Potential for stay of co-pending litigation ............................... 78
`
`3
`
`

`

`
`
`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`2.
`
`3.
`
`4.
`
`Estimated trial date vs. deadline for a final written
`decision .................................................................................... 79
`
`Investment in the parallel proceeding ...................................... 80
`
`Overlap of issues ...................................................................... 80
`
`5. Whether the petitioner is a defendant ...................................... 81
`
`6.
`
`Other circumstances that impact the Board’s exercise of
`discretion, including the merits ................................................ 81
`
`XII. Conclusion .....................................................................................................82
`
`XIII. Mandatory notices .........................................................................................83
`
`A.
`
`B.
`
`C.
`
`Real party-in-interest .......................................................................... 83
`
`Related matters ................................................................................... 83
`
`Lead and back-up counsel and service information ........................... 84
`
`XIV. Appendix of Challenged Claims....................................................................85
`
`Certificate of Word Count .......................................................................................96
`
`Certificate of Service ...............................................................................................97
`
`4
`
`

`

`
`
`Ex.1001
`
`Ex.1002
`
`Ex.1003
`
`Ex.1004
`
`Ex.1005
`
`Ex.1006
`Ex.1007
`
`Ex.1008
`
`Ex.1009
`
`Ex.1010
`
`Ex.1011
`
`Ex.1012
`
`Ex.1013
`
`Ex.1014
`Ex.1015
`
`Ex.1016
`
`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`PETITIONER’S EXHIBIT LIST
`
`U.S. 9,100,431
`
`Prosecution History of U.S. 9,100,431
`
`Declaration of A.L. Narasimha Reddy, Ph.D. under 37 C.F.R. §
`1.68
`Curriculum Vitae of A.L. Narasimha Reddy, Ph.D.
`
`U.S. 7,359,962 to Willebeek-LeMair et al.
`
`U.S. 6,088,804 to Hill et al.
`RESERVED
`
`Prosecution History of U.S. 9,117,069 (selected pages)
`
`Markus Goncalves & Steven Brown, Check Point Firewall-1
`(McGraw-Hill 2000)
`Plaintiff’s Combined Opening and Responsive Claim Construction
`Brief, SecurityProfiling, LLC v. Trend Micro America, Inc. et al.,
`No. 3:17-cv-01484-N, Dk. #94 (N.D. Tex. Jan. 22, 2018).
`IPR2017-02191, Granting Request for Adverse Judgment, Paper
`18, September 26, 2018
`IPR2017-02192, Final Written Decision, Paper 31, April 8, 2019
`
`Complaint, SecurityProfiling, LLC v. Cisco Systems, Inc., 6-21-cv-
`00337 (W.D.Tex., April 7, 2021)
`
`RESERVED
`Timing Statistics, U.S. District Court for the Western District of
`Texas (Source: Lex Machina, July 8, 2021).
`
`Markman Order, SecurityProfiling LLC v. Trend Micro America
`Inc et al., 3-17-cv-01484, (N.D.Tex., Sept. 25, 2018)
`
`5
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`Exhibit 8 to Complaint, SecurityProfiling, LLC v. Cisco Systems,
`Inc., 6-21-cv-00337 (W.D.Tex., April 7, 2021)
`U.S. 6,856,627 to Saleh et al.
`
`U.S. 6,584,093 to Salama et al.
`U.S. 7,398,273 to Dobberpuhl et al.
`
`U.S. Publication 2003/0093509 by Li et al.
`
`U.S. 6,735,766 to Chamberlain et al.
`U.S. 6,668,230 to Mansky et al.
`
`
`
`
`
`
`Ex.1017
`
`Ex.1018
`
`Ex.1019
`Ex.1020
`
`Ex.1021
`
`Ex.1022
`Ex.1023
`
`6
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`INTRODUCTION
`
`
`I.
`
`Cisco Systems, Inc. (“Petitioner”) respectfully requests that the Board
`
`review and cancel as unpatentable claims 1-2, 4-12, and 14-20 (hereinafter, the
`
`“Challenged Claims”) of U.S. 9,100,431 (the “’431 patent,” Ex.1001).
`
`The ’431 patent “relates to … management of security of computing and
`
`network devices” connected in a network. Ex.1001, 1:18-20. An examiner allowed
`
`the claims because the prior art allegedly “fail[ed] to teach identifying a
`
`remediation technique based on the operating system.” Ex.1002, 780. However,
`
`U.S. 7,359,962 (“W-L,” Ex.1005) teaches addressing operating-system-specific
`
`threats, such as “malicious code intended to exploit a Microsoft IIS web server
`
`running on a Microsoft operating system.” Ex.1005, 12:46-50. This and the other
`
`prior art disclosures render the Challenged Claims obvious, as explained below and
`
`confirmed in the Declaration of Dr. Narasimha Reddy (Ex.1003).
`
`II. GROUNDS FOR STANDING
`
`Petitioner certifies the ’431 patent is IPR-eligible, and Petitioner is not
`
`barred or estopped from requesting IPR challenging the patent claims. 37 C.F.R.
`
`§ 42.104(a).
`
`III. NOTE
`Petitioner cites to exhibits’ original page numbers. Emphasis in quoted
`
`material has been added. Claim terms are italicized. Where not included as a
`
`7
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`heading above the claim analysis, the full claim text is available in the Appendix of
`
`Challenged Claims.
`
`IV. SUMMARY OF THE ’431 PATENT
`
`The ’431 patent “relates to…management of security of computing and
`
`network devices.” Ex.1001, 1:18-20. The ’431 patent part of a family of patents
`
`and applications, including two patents that had claims cancelled in IPRs. See
`
`generally Exs.1011, 1012.
`
`A “security server 135” collects operating system and other configuration
`
`data about devices in the network. Ex.1001, 2:20-28, 32-35; see also Fig.1 below;
`
`Ex.1003, ¶¶24-25. The server determines whether network traffic “is attempting to
`
`take advantage of a particular known vulnerability.” Ex.1001, 3:60-62, 4:4-12. If
`
`so, the server “selects one or more remediation techniques” for the particular
`
`vulnerability. Ex.1001, 4:45-47; Ex.1003, ¶26.
`
`8
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`
`Ex.1001, Fig. 1
`
`
`
`V.
`
`PROSECUTION HISTORY
`
`In response to an Office action, the Applicant amended the independent
`
`claims to include subject matter indicated as allowable. Ex.1002, 763. In the
`
`Notice of Allowance, the Examiner explained that “the prior arts fail to teach
`
`identifying a remediation technique based on the operating system.” Ex.1002, 780.
`
`9
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`VI. EFFECTIVE PRIORITY DATE OF THE ’431 PATENT
`
`The earliest claimed priority date is July 1, 2003. Ex.1001. In prosecution,
`
`the Applicant alleged a reduction to practice on October 15, 2002. Ex.1002, 765-
`
`766. This petition cites prior art predating October 15, 2002, so Petitioner has not
`
`undertaken a priority date analysis. Petitioner does not waive any right or
`
`opportunity it may have to dispute the priority date of the ’431 patent in this or
`
`another forum where the issue is relevant.
`
`VII. LEVEL OF ORDINARY SKILL IN THE ART
`
`A Person of Ordinary Skill in The Art (“POSITA”) in July 2003 would have
`
`had a working knowledge of the network communications art that is pertinent to
`
`the ’431 Patent, including network security. A POSITA would have had a
`
`bachelor’s degree in computer science, computer engineering, or an equivalent,
`
`and two years of professional experience relating to network communications.
`
`Lack of professional experience can be remedied by additional education, and vice
`
`versa. Ex.1003, ¶¶17-19.
`
`VIII. CLAIM CONSTRUCTION
`
`Claims are construed according to the “Phillips standard,” as set forth in
`
`Phillips v. AWH Corp., 415 F.3d 1303 (Fed. Cir. 2005) (en banc). See 83 Fed. Reg.
`
`51341 (Oct. 11, 2018). Petitioner believes that, for purposes of this proceeding and
`
`10
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`the analysis presented herein, no claim term requires express construction.1 Nidec
`
`Motor Corp. v. Zhongshan Broad Ocean Motor Co., 868 F.3d 1013, 1017 (Fed.
`
`Cir. 2017); see also Ex.1003, ¶28.
`
`IX. RELIEF REQUESTED AND REASONS THEREFORE
`
`Petitioner asks that the Board institute a trial for inter partes review and
`
`cancel the Challenged Claims in view of the analysis below.
`
`X.
`
`IDENTIFICATION OF HOW THE CLAIMS ARE UNPATENTABLE
`
`A. Challenged claims
`
`Petitioner challenges claims 1-2, 4-12, and 14-20. Claim 14 is asserted
`
`against Petitioner in copending litigation. Ex.1017. Thus, a finding that the
`
`Challenged Claims are unpatentable in this proceeding will eliminate the need for a
`
`trial regarding the ’431 patent in the copending litigation, substantially reducing
`
`the time and expense of that litigation for all parties.
`
`
`1 A district court previously construed certain claim terms in the ’431 Patent in a
`
`prior lawsuit. See Ex.1016. Petitioner was not a party to that case, and the case
`
`therefore involved different points of dispute from this IPR proceeding. Petitioner
`
`reserves its rights to: (1) respond to assertions by Patent Owner that any claim term
`
`requires construction for the purposes of this IPR proceeding; and (2) seek
`
`construction of any claim term in other forums as appropriate.
`
`11
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`B.
`
`Statutory grounds for challenges
`
`Grounds
`#1
`#2
`
`Claims
`14, 19, 20
`1-2, 4-12, 15-
`18
`
`Basis
`35 U.S.C. § 103 (Pre-AIA) over U.S. 7,359,962
`35 U.S.C. § 103 (Pre-AIA) over U.S. 7,359,962 and
`U.S. 6,088,804
`
`U.S. 7,359,962 to Willebeek-LeMair (Ex. 1005, “W-L”) was filed on April
`
`
`
`
`
`30, 2002, making W-L prior art under 35 U.S.C. § 102(e) (pre-AIA).
`
`U.S. 6,088,804 to Hill (Ex. 1006, “Hill)” issued July 11, 2000, making Hill
`
`prior art under 35 U.S.C. § 102(b) (pre-AIA).2
`
`Petitioner’s obviousness grounds rely on the combined teachings of the
`
`references and not on a physical incorporation of elements. See In re Mouttet, 686
`
`F.3d 1322, 1332 (Fed. Cir. 2012); Ex.1003, ¶106.
`
`Petitioner and Dr. Reddy cite to additional prior art as evidence of the
`
`background knowledge of a POSITA and to provide contemporaneous context to
`
`support assertions regarding what a POSITA would have understood from the prior
`
`art in the grounds. See Yeda Research v. Mylan Pharm. Inc., 906 F.3d 1031, 1041-
`
`1042 (Fed. Cir. 2018) (affirming the use of “supporting evidence relied upon to
`
`
`2 If Patent Owner argues that the ’431 patent is an AIA patent, W-L and Hill would
`
`still qualify as prior art under post-AIA 35 U.S.C. § 102(a).
`
`12
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`support the challenge”); 37 C.F.R. § 42.104(b); see also K/S HIMPP v. Hear-Wear
`
`Techs., LLC, 751 F.3d 1362, 1365-66 (Fed. Cir. 2014); Arendi S.A.R.L. v. Apple
`
`Inc., 832 F.3d 1355, 1363 (Fed. Cir. 2016).
`
`For example, Exhibit 1009 (Goncalves) is a book published by a well-known
`
`publisher (McGraw-Hill) having a copyright date of 2000, indicating that
`
`Goncalves was publicly available at least one year before the ’431 patent.
`
`C. Ground 1
`Summary of W-L
`1.
`
`Like the ’431 patent, W-L “relates to network security.” Ex.1005, 1:7-10.
`
`W-L describes integrating “the functionalities performed by a firewall, IDS and
`
`[vulnerability assessment scanner] for network security into one system.” Ex.1005,
`
`3:14-18. W-L’s unified system includes “an enterprise resource database” with
`
`data identifying potential “vulnerabilities associated with” hosts in the network.
`
`Ex.1005, 5:9-15. A “signature database” stores “detection signatures,” which
`
`include “security rules, policies and algorithms” to “mitigate or avert network
`
`damage from detected vulnerabilities.” Ex.1005, 5:20-24.; Ex.1003, ¶¶32-36; see
`
`also Figure 1:
`
`13
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`
`Ex.1005, FIG. 1
`
`
`
`
`Claim 14
`
`2.
`[14.0] A computer program product embodied on a non-transitory computer
`readable medium, the computer program product comprising:
`
`W-L teaches using an appliance with “underlying hardware, operating
`
`system [software],” and other facilities to execute a security application. Ex.1005,
`
`16:1-5; Ex.1003, ¶¶37-38. The appliance includes “a security application
`
`functionality 512 that… is implemented as the unified network defense system 10
`
`shown in FIGS. 1 and 2.” Ex.1005, 16:11-15; Fig.6. It would have been obvious to
`
`a POSITA to store the security application on a non-transitory computer readable
`
`14
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`medium, since executable applications were commonly stored in that manner. See,
`
`e.g., Ex.1022, Abstract; Ex.1023, 55:60-64. Therefore, it would have been obvious
`
`to implement W-L’s “security application functionality 512” as a computer
`
`program product that is embodied on the “platform 510” as a non-transitory
`
`computer readable medium.3 Ex. 1003, ¶¶37-41.
`
`
`3 Because the “security application functionality 512 … is implemented as the
`
`unified network defense system 10 shown in FIGS. 1 and 2,” Ex.1005, 16:11-15,
`
`the extensive discussion of network defense system 10 herein applies to security
`
`application functionality 512 in Figure 5.
`
`15
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`
`Computer
`program
`product
`embodied on
`non-transitory
`computer
`readable
`medium
`Ex.1005, FIG. 6 (annotated); Ex.1003, ¶39
`
`
`
`
`
`[14.1] code for: accessing at least one data structure identifying a plurality of
`mitigation techniques that mitigate effects of attacks that take advantage of
`vulnerabilities, where:
`
`First, W-L discloses a “signature database 20” that stores a plurality of
`
`“signatures.” Ex.1005, 5:20-27, FIG.1:
`
`16
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`
`Data
`structure
`
`Ex. 1005, FIG. 1 (annotated); Ex.1003, ¶¶42-43
`
`
`Signatures are also stored in “threat aggregation functionality 128” in FIG.2.
`
`
`
`Ex.1005, 10:36-52. W-L teaches that FIG.2’s embodiment is an example
`
`“integrated architecture of a unified network defense system 10,” such as was
`
`illustrated in FIG.1. Ex.1005, 8:39-42, FIG.2:
`
`17
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`
`Data
`structure
`
`Ex.1005, FIG. 2 (annotated); Ex.1003, ¶¶44-45
`
`Thus, W-L teaches that FIGS. 1 and 2 describe the “unified network defense
`
`
`
`system 10,” with options regarding where the signatures are kept (inside or outside
`
`of system 10). The option selected would have been a mere design choice to a
`
`POSITA. Ex.1003, ¶45.
`
`Second, each signature includes multiple objects “that are designed to
`
`mitigate or avert network damage from detected vulnerabilities.” Ex.1005,
`
`5:20-24. W-L’s detection signatures include, as an object, an “action set…to be
`
`performed by the system 10 if the threat is detected.” Ex.1005, 10:53-67. W-L
`
`teaches that the actions specified by the object (the “action set”) in the relevant
`
`signature are applied when a match occurs (i.e., a threat is detected). Ex.1005,
`
`18
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`5:59-63; 10:53-67. The “action set” in a given signature accordingly teaches a
`
`“mitigation technique.” Ex.1003, ¶¶46-47.
`
`Therefore, W-L’s database of signatures is a “data structure,” with the
`
`plurality of signatures’ respective action sets together teaching the “plurality of
`
`mitigation techniques” identified by the database. Ex.1003, ¶48.
`
`Third, as an alternative mapping to the claimed “mitigation technique,” W-
`
`L’s action (one “mitigation technique”) or actions (“a plurality of mitigation
`
`techniques”) included in a given action set also render obvious “mitigation
`
`techniques.” See infra, [14.6]. These action(s) are in an action set object in a
`
`signature, with the signature stored in W-L’s database. The individual actions in an
`
`action set are, therefore, identified by the database and by a corresponding
`
`signature. Ex.1003, ¶49.
`
`Fourth, W-L’s actions, action sets, and signatures are designed to mitigate
`
`damage from attacks. Ex.1005, 5:59-65, 7:4-9. W-L teaches that the intrusion
`
`detector or firewalling functionality compares criteria included in each signature
`
`against traffic. Ex.1005, 9:49-51. Each signature “further includes response
`
`instructions which the intrusion detector functionality 116 and/or firewalling
`
`functionality 118 follow” when a “match” occurs (which indicates a threat has
`
`been detected). Ex.1005, 9:51-55. The action set object of a signature maintains the
`
`“response instructions” to take one or more actions in response to a detected threat.
`
`19
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`See Ex.1005, 10:54-60; Ex.1003, ¶¶50-52.
`
`Fifth, W-L teaches obtaining the signatures (with action set and defined
`
`actions) from the database 20, an example of “accessing at least one data
`
`structure” for the mitigation techniques “that mitigate the effects of an attack.”
`
`See, e.g., Ex.1005, 5:50-53 (showing comparing traffic against “the detection
`
`signatures 22 obtained from the signature database 20.”), 10:50-52 (retrieving
`
`the signatures from FIG. 2’s functionality 128). W-L further teaches, in response to
`
`discovering a vulnerability, accessing the location where the signatures (with the
`
`action set object, and action(s) in each action set object) are stored. Ex.1005,
`
`13:25-35 (“[T]he agent 126 retrieves from enterprise vulnerabilities database 132
`
`(step 206) a detection signature 132 associated with the discovered vulnerability.”);
`
`Ex.1003, ¶53.
`
`W-L’s database and functionality teachings, whether internal or external to
`
`the system 10, renders obvious accessing the data structure (database) for the
`
`signatures (which identify a plurality of “mitigation techniques”). Considering
`
`each action as a “mitigation technique,” W-L teaches looking at the “action set”
`
`object which identifies the “actions” (“mitigation techniques”) to perform in
`
`response to a detected attack. See Ex.1005, 10:58-60. Thus, W-L further renders
`
`obvious accessing the object containing the actions to be taken (a “plurality of
`
`mitigation techniques”) in response to an attack that is detected. Ex.1003, ¶¶54-55.
`
`20
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`It would have further been obvious for this functionality and database to be
`
`
`
`stored as part of W-L’s “security application functionality 512” with “the functions
`
`necessary to have the platform 510 function as a network security appliance 500.”
`
`Ex.1005, 16:15-19. It was obvious that the functionality would include the
`
`appropriate “code.” Indeed, as discussed at [14.0], it would have been obvious for
`
`W-L’s security application functionality 512 to include “code” (e.g., as part of the
`
`“functions necessary”) for implementing system 10’s functionality. See Ex.1005,
`
`16:15-19; see also FIG.6; Ex.1003, ¶¶54-56.
`
`Therefore, W-L renders obvious [14.1]. Ex.1003, ¶57.
`
`[14.2] each mitigation technique is capable of mitigating an effect of an attack
`that takes advantage of a corresponding vulnerability, and
`
`First, W-L’s detection signatures include “security rules, policies and
`
`algorithms[] that are designed to mitigate or avert network damage from
`
`detected vulnerabilities.” Ex.1005, 5:20-27; see also 10:46-52 (signatures are
`
`correlated to the vulnerabilities “that they address”). In an example, each signature
`
`is designed to address an attack. Ex. 1005, 11:56-64. Each signature’s action set is
`
`designed to address an attack by defining one or multiple actions including
`
`“permit, deny, log, block, terminate, and the like” that are capable of mitigating an
`
`effect of an attack. See Ex.1005, 10:58-60. Thus, W-L teaches that each signature’s
`
`action set, or actions defined in a set (each an example “mitigation technique”) is
`
`21
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`“capable of mitigating an effect of an attack.” Ex.1003, ¶¶58-61.
`
`Second, W-L teaches that the attacks being mitigated are ones “that take[]
`
`advantage of a corresponding vulnerability.” For example, W-L teaches that
`
`“detection signature[s]” address “vulnerability concern[s].” Ex.1005, 15:37-43. As
`
`another example, W-L describes retrieving a signature associated with a
`
`vulnerability upon discovering a vulnerability. Ex.1005, 14:46-56. The signature is
`
`activated to identify, and implement protective action against, a subsequent attack
`
`that would exploit the vulnerability. Ex.1005, 14:57-15:6, and FIG.4. Thus, W-L
`
`renders obvious [14.2]. Ex.1003, ¶¶62-64.
`
`[14.3] each mitigation technique has a mitigation type including at least one of a
`patch, a policy setting, or a configuration option;
`
`As already noted, W-L teaches a plurality of signatures that include
`
`“security rules, policies and algorithms[].” Ex.1005, 5:20-27. W-L teaches
`
`specifying in an action set of a signature multiple actions including “permit, deny,
`
`log, block, terminate, and the like.” See Ex.1005, 10:58-60, and [14.2]. These are
`
`examples of mitigation techniques. Ex.1003, ¶¶65-66.
`
`As discussed further below, each action and action set has a mitigation type
`
`such as “a patch, a policy setting, or a configuration option.” W-L teaches or renders
`
`obvious each of the recited options, any one of which is sufficient to render the
`
`limitation obvious. Ex.1003, ¶¶67-69.
`
`22
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`The ’431 patent specification does not define “policy setting” or
`
`
`
`“configuration option;” instead, each term is simply referred to in a list. See
`
`Ex.1001, Abstract, 1:31-35, 5:36-40. A POSITA looking at “policy setting” and
`
`“configuration option” would recognize that there is conceptual overlap between
`
`them, which Patent Owner acknowledged as well in a prior litigation asserting the
`
`’431 patent. See generally Ex.1010, 15-17. For example, Patent Owner
`
`acknowledged that some actions, including dropping or rejecting a connection
`
`request, are considered both a policy setting and a configuration option. Ex.1010,
`
`16-17; Ex.1003, ¶¶70-71.
`
`W-L’s actions defined in an action set are instantiated (by instantiation of
`
`corresponding signature(s)) at an intrusion detector functionality 116 and/or
`
`firewalling functionality 118. Ex.1005, 3:64-66, 9:45-48. Each functionality
`
`applies policy settings and configuration options. For example, W-L teaches an
`
`intrusion detector functionality 116 detecting an attack, and firewalling
`
`functionality 118 “dropping packets or shutting down the session or origin of the
`
`attack.” Ex.1005, 9:31-35. W-L shows both a policy setting and a configuration
`
`option, therefore renders [14.3] obvious. Ex.1003, ¶72.
`
`The action(s) for each detection signature are examples of both a policy
`
`setting and a configuration option. Specifically, W-L discloses an “action set”
`
`selected from the group “permit, deny, log, block, terminate, and the like” for each
`
`23
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`signature, Ex.1005, 10:43-60, which renders also obvious [14.3]. Further, each
`
`claimed “mitigation type” is specifically taught or rendered obvious by W-L, as
`
`explained below. Ex.1003, ¶¶73-74.
`
`Policy Setting
`
`W-L specifically teaches a signature including a policy setting to block
`
`traffic originating from an attacker’s IP address. Ex.1005, 14:46-15:8 (“[T]he agent
`
`126 instantiates a policy on the firewalling functionality 118 in step 318 instructing
`
`the firewall to block all traffic originating from the noted IP address of the
`
`attacker.”); Ex.1005, 15:9-21 (discussing “authorizing activation of a policy by the
`
`firewalling functionality 118 in step 332 that instructs the firewall to block all
`
`traffic originating from the noted IP address of the attacker.”); Ex.1003, ¶¶75-77.
`
`Configuration Option
`
`W-L further teaches signatures that include a configuration option. For
`
`example, W-L teaches “the detection signature 132 specifies block and terminate
`
`actions to be taken,” with “a block action to be taken by the firewalling
`
`functionality 118 to block the attack-related traffic, and a terminate action to be
`
`taken by the intrusion detector functionality 116 to terminate any session
`
`associated with a possible attack.” Ex.1005, 12:33-43; see also 13:35-42 (logging
`
`or blocking traffic, generating an alert, terminating a session); Ex.1003, ¶78.
`
`The actions that the firewall and the intrusion detector functionalities are
`
`24
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`configured to take responsive to attack are both examples of configuration options.
`
`This is consistent with the ’431 patent’s explanation that configuration information
`
`“often determines what and how data is accepted from other devices, sent to other
`
`devices, processed, stored, or otherwise handled” (Ex.1001, 5:26-35), and with
`
`PO’s litigation argument. Ex.1010, 16-17; Ex.1003, ¶79.
`
`Patch
`
`W-L also renders obvious a patch as a “mitigation technique.” In operation,
`
`“vulnerability assessments” are generated which can “include severity assessment
`
`and links to vendor patches and other pertinent data from the web that would
`
`assist in addressing the vulnerability.” Ex.1005, 14:34-42. W-L further teaches
`
`that, in response to detecting a vulnerability, an agent in system 10 updates the
`
`network administrator about the detected vulnerability, retrieves a detection
`
`signature associated with the vulnerability, and activates the signature on the
`
`intrusion detector functionality. See Ex.1005, 14:46-59. Because “vendor patches”
`
`are described as options for network-defending actions, Ex.1005, 14:38-45, it
`
`would have been obvious for at least one detection signature to include as an action
`
`the installation of a vendor patch. Ex.1003, ¶ 81. It would have therefore been
`
`obvious for at least one of the detection signatures (e.g., stored in database 20, see
`
`[14.1]) to include a patch as a mitigation type. For these reasons, W-L teaches, and
`
`renders obvious, [14.3]. Ex.1003, ¶¶80-83.
`
`25
`
`

`

`IPR2021-01242 Petition
`Inter Partes Review of 9,100,431 (Claims 1-2, 4-12, 14-20)
`
`
`[14.4] code for: receiving information in connection with at least one of a
`plurality of devices; and
`
`W-L teaches collecting “network device vulnerabilities” from “machines” in
`
`the network. Ex.1005, 5:9-19; see also Ex.1005, 14:48-51 (describing network
`
`discovery functionality performing a scan of the network 14 and discovering a
`
`vulnerability), 8:39-53 (describing collection of information about network devices
`
`with network discovery functionality). W-L’s disclosure of collecting network
`
`device vulnerabilities is an example of “receiving information in connection with
`
`at least one of a plurality of devices.” Ex.1003, ¶¶84-87.
`
`W-L’s “information” is collected from packets received (and inspected) at
`
`the system 10. W-L teaches having “an inspection agent extract features (for
`
`example, packet features) from entering traffic.” Ex.1005, 3:41-44. The system
`
`10 inspects “traffic 30 that is entering the protected network 14” including “a
`
`header portion 34 and a payload portion 36” of the entering traffic. Ex.1005, 5:37-
`
`41. W-L’s further description of collecting packet traffic information, including the
`
`packet traffic itself, further discloses “receiving information in connection with at
`
`least one of a plurality of devices.” Ex.1003, ¶ 88.
`
`Finally, W-L teaches “code” as claimed. See [14.1]. Therefore, W-L renders
`
`obvious [14.4]. Ex.1003, ¶¶89-90.
`
`[14.5] [code

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket