throbber

`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`———————
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`———————
`
`CISCO SYSTEMS, INC.,
`Petitioner
`
`———————
`
`IPR2022-00259
`U.S. Patent No. 10,609,063
`
`
`PETITION FOR INTER PARTES REVIEW
`UNDER 35 U.S.C. § 312 AND 37 C.F.R. § 42.104
`
`
`
`
`
`

`

`
`
`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`TABLE OF CONTENTS
`
`Petitioner’s Exhibit List ............................................................................................. 5
`
`I.
`
`II.
`
`Introduction ...................................................................................................... 7
`
`Grounds for standing ....................................................................................... 7
`
`III. Note .................................................................................................................. 7
`
`IV. Summary of the ’063 patent ............................................................................ 8
`
`V.
`
`Prosecution history .......................................................................................... 9
`
`VI. Effective priority date of the ’063 patent ......................................................10
`
`VII. Level of ordinary skill in the art ....................................................................10
`
`VIII. Claim construction .........................................................................................10
`
`IX. Relief requested and reasons therefore ..........................................................11
`
`X.
`
`Identification of how the claims are unpatentable .........................................11
`
`A.
`
`B.
`
`C.
`
`Challenged claims .............................................................................. 11
`
`Statutory grounds for challenges ........................................................ 12
`
`Ground 1 ............................................................................................. 13
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`Summary of W-L ..................................................................... 13
`
`Claim 10 ................................................................................... 15
`
`Claim 11 ................................................................................... 44
`
`Claim 39 ................................................................................... 46
`
`Claim 58 ................................................................................... 49
`
`D. Ground 2 ............................................................................................. 49
`
`
`
`2
`
`

`

`
`
`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`Summary of Gupta ................................................................... 49
`
`Summary of Graham ................................................................ 50
`
`Reasons to combine Gupta and Graham .................................. 50
`
`Similarity to IPR2017-02192 (US 8,984,644) ......................... 51
`
`Claim 10 ................................................................................... 54
`
`Claim 11 ................................................................................... 69
`
`Claim 39 ................................................................................... 71
`
`Claim 58 ................................................................................... 75
`
`XI. Discretionary denial is inappropriate .............................................................75
`
`A. Discretionary denial under 35 U.S.C. § 325(d) is not appropriate .... 75
`
`B.
`
`Discretionary denial under the Fintiv factors is not appropriate ........ 78
`
`1.
`
`2.
`
`3.
`
`4.
`
`Potential for stay of co-pending litigation ............................... 79
`
`Estimated trial date vs. deadline for a final written
`decision .................................................................................... 79
`
`Investment in the parallel proceeding ...................................... 80
`
`Overlap of issues ...................................................................... 81
`
`5. Whether the petitioner is a defendant ...................................... 82
`
`6.
`
`Other circumstances that impact the Board’s exercise of
`discretion, including the merits ................................................ 82
`
`C.
`
`Discretionary denial under the General Plastic factors is not
`appropriate .......................................................................................... 83
`
`XII. Conclusion .....................................................................................................84
`
`
`
`3
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`XIII. Mandatory notices .........................................................................................85
`
`A.
`
`B.
`
`C.
`
`Real party-in-interest .......................................................................... 85
`
`Related matters ................................................................................... 85
`
`Lead and back-up counsel and service information ........................... 86
`
`Certificate of Word Count .......................................................................................87
`
`Certificate of Service ...............................................................................................88
`
`
`
`4
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`PETITIONER’S EXHIBIT LIST
`
`U.S. 10,609,063
`
`Prosecution History of U.S. 10,609,063
`
`Declaration of A.L. Narasimha Reddy, Ph.D. under 37 C.F.R. §
`1.68
`Curriculum Vitae of A.L. Narasimha Reddy, Ph.D.
`
`U.S. 7,359,962 to Willebeek-LeMair et al.
`
`U.S. Pub. 2003/0004689 to Gupta et al.
`U.S. 7,237,264 to Graham et al.
`
`Prosecution History of U.S. 9,117,069 (selected pages)
`
`Prosecution History of U.S. 9,100,431 (selected pages)
`Prosecution History of U.S. 10,050,988 (selected pages)
`
`IPR2017-02191, Granting Request for Adverse Judgment, Paper 18
`(September 26, 2018)
`
`IPR2017-02192, Final Written Decision, Paper 31 (April 8, 2019)
`Complaint, SecurityProfiling, LLC v. Cisco Systems, Inc., 6-21-cv-
`01106 (W.D. Tex., October 25, 2021)
`U.S. 6,493,871 to Mcguire et al.
`
`Timing Statistics, U.S. District Court for the Western District of
`Texas (Source: Lex Machina, August 27, 2021).
`
`U.S. Pub. 2003/0084340 to Schertz et al.
`Exhibit 7 to the Complaint, SecurityProfiling, LLC v. Cisco
`Systems, Inc., 6-21-cv-01106 (W.D. Tex., October 25, 2021)
`
`Ex.1001
`
`Ex.1002
`
`Ex.1003
`
`Ex.1004
`
`Ex.1005
`
`Ex.1006
`Ex.1007
`
`Ex.1008
`
`Ex.1009
`Ex.1010
`
`Ex.1011
`
`Ex.1012
`Ex.1013
`
`Ex.1014
`
`Ex.1015
`
`Ex.1016
`Ex.1017
`
`Ex.1018
`
`U.S. 6,735,766 to Chamberlain et al.
`
`5
`
`
`
`
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`Ex.1019
`
`Ex.1020
`
`Reserved
`
`U.S. 8,205,161 to King et al.
`
`
`6
`
`
`
`
`
`
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`INTRODUCTION
`
`
`I.
`
`Cisco Systems, Inc. (“Petitioner”) respectfully requests that the Board
`
`review and cancel as unpatentable claims 10, 11, 39 and 58 (hereinafter, the
`
`“Challenged Claims”) of U.S. 10,609,063 (the “’063 patent,” Ex.1001).
`
`This is Petitioner’s second IPR filing on the ’063 patent and is prompted by
`
`the Patent Owner’s filing of a new complaint alleging infringement of different
`
`claims than previously. See Ex.1013; see also IPR2021-01428. Patent Owner now
`
`asserts in litigation claim 11 (among others) which depends from claim 10.
`
`Ex.1017, 19-42. This Petition shows that claims 10 and 11 are unpatentable over
`
`the same prior art addressed in IPR2021-01428. Claims 39 and 58 are
`
`substantially similar to claims 10 and 11, respectively, and are therefore also
`
`challenged in this Petition.
`
`II. GROUNDS FOR STANDING
`
`Petitioner certifies the ’063 patent is IPR-eligible, and Petitioner is not
`
`barred or estopped from requesting IPR challenging the patent claims. 37 C.F.R.
`
`§ 42.104(a).
`
`III. NOTE
`Petitioner cites to exhibits’ original page numbers. Emphasis in quoted
`
`material has been added. Claim terms are italicized.
`
`
`
`7
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`IV. SUMMARY OF THE ’063 PATENT
`
`The ’063 patent “relates to… management of security of computing and
`
`network devices.” Ex.1001, 1:23-26. The ’063 patent is part of a family of patents
`
`and applications, including two patents that had claims cancelled in previous IPRs.
`
`See generally Exs.1011, 1012.
`
`A “security server 135” collects operating system and other configuration
`
`data about devices in the network. Ex.1001, 2:30-38, 42-45; see also Fig.1 below;
`
`Ex.1003, ¶¶24-25. The server determines whether network traffic “is attempting to
`
`take advantage of a particular known vulnerability.” Ex.1001, 4:9-11, 4:21-29. If
`
`so, the server “selects one or more remediation techniques” for the particular
`
`vulnerability. Ex.1001, 4:62-64; Ex.1003, ¶¶25-26.
`
`
`
`8
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`
`Ex.1001, FIG. 1
`
`
`
`V.
`
`PROSECUTION HISTORY
`
`In response to an Office action, the Applicant amended the independent
`
`claims to include recitation of “utilizing one or more network monitors” and
`
`“based on a packet analysis,” in order to overcome a rejection under 35 U.S.C.
`
`§ 101 and argued against a § 103 rejection. Ex.1002, 527-83. In the Notice of
`
`Allowance, the Examiner explained that the prior arts fail to teach “identifying an
`
`
`
`9
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`occurrence, determining that at least one vulnerability is susceptible to being taken
`
`advantage by the occurrence and selectively utilizing diverse mitigation actions
`
`including a firewall.” Ex.1002, 598.
`
`VI. EFFECTIVE PRIORITY DATE OF THE ’063 PATENT
`
`The earliest claimed priority date is July 1, 2003. Ex.1001. In prosecution,
`
`the Applicant alleged a reduction to practice on September 27, 2002. Ex.1002,
`
`289-90. This petition cites prior art predating September 27, 2002, so Petitioner has
`
`not undertaken a priority date analysis. Petitioner does not waive any right or
`
`opportunity it may have to dispute the priority date of the ’063 patent in this or
`
`another forum where the issue is relevant.
`
`VII. LEVEL OF ORDINARY SKILL IN THE ART
`
`A Person of Ordinary Skill in The Art (“POSITA”) in July 2003 would have
`
`had a working knowledge of the network communications art that is pertinent to
`
`the ’063 Patent, including network security. A POSITA would have had a
`
`bachelor’s degree in computer science, computer engineering, or an equivalent,
`
`and two years of professional experience relating to network communications.
`
`Lack of professional experience can be remedied by additional education, and vice
`
`versa. Ex.1003, ¶¶17-19.
`
`VIII. CLAIM CONSTRUCTION
`
`Claims are construed according to the “Phillips standard,” as set forth in
`
`
`
`10
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`Phillips v. AWH Corp., 415 F.3d 1303 (Fed. Cir. 2005) (en banc). See 83 Fed. Reg.
`
`51341 (Oct. 11, 2018). Petitioner believes that, for purposes of this proceeding and
`
`the analysis presented herein, no claim term requires express construction.1 Nidec
`
`Motor Corp. v. Zhongshan Broad Ocean Motor Co., 868 F.3d 1013, 1017 (Fed.
`
`Cir. 2017); see also Ex.1003, ¶28.
`
`IX. RELIEF REQUESTED AND REASONS THEREFORE
`
`Petitioner asks that the Board institute a trial for inter partes review and
`
`cancel the Challenged Claims in view of the analysis below.
`
`X.
`
`IDENTIFICATION OF HOW THE CLAIMS ARE UNPATENTABLE
`
`A. Challenged claims
`
`Petitioner challenges claims 10, 11, 39 and 58. At least claims 11, 12 and 16,
`
`which depend from claim 10, are asserted against Petitioner in copending
`
`
`1 The Patent Trial and Appeal Board previously construed certain claim terms in
`
`the related U.S. 8,984,644 in a prior IPR (applying the broadest reasonable
`
`interpretation). See Ex.1012. Petitioner was not a party to that case, and the case
`
`therefore involved different points of dispute from this IPR proceeding. Petitioner
`
`reserves its rights to: (1) respond to assertions by Patent Owner that any claim term
`
`requires construction for the purposes of this IPR proceeding; and (2) seek
`
`construction of any claim term in other forums as appropriate.
`
`
`
`11
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`litigation. Ex.1017, 37-53. Infringement contentions have not been served in that
`
`case. Thus, a finding that the Challenged Claims are unpatentable in this
`
`proceeding will reduce the number of possible claims for trial regarding the ’063
`
`patent in the copending litigation, and substantially reduce the time and expense of
`
`that litigation for all parties for any other claims that are asserted with overlapping
`
`subject matter.
`
`B.
`
`Statutory grounds for challenges
`
`Grounds
`#1
`#2
`
`Basis
`Claims
`10, 11, 39, 58 35 U.S.C. § 103 over U.S. 7,359,962 (W-L)
`10, 11, 39, 58 35 U.S.C. § 103 over U.S. 2003/0004689 (Gupta)
`and U.S. 7,237,264 (Graham)
`
`
`
`U.S. 7,359,962 to Willebeek-LeMair (Ex. 1005, “W-L”) was filed on April
`
`30, 2002, making W-L prior art under 35 U.S.C. § 102(e) (pre-AIA) and under 35
`
`U.S.C. § 102(a) (post-AIA).
`
`U.S. 2003/0004689 to Gupta (Ex. 1006, “Gupta)” was filed June 13, 2002,
`
`and published January 2, 2003, making Gupta prior art under 35 U.S.C. §§ 102(a)
`
`and (e) (pre-AIA) and under 35 U.S.C. § 102(a) (post-AIA).
`
`U.S. 7,237,264 to Graham (Ex. 1007, “Graham”) was filed on June 4, 2001,
`
`making Graham prior art under 35 U.S.C. § 102(e) (pre-AIA) and under 35 U.S.C.
`
`§ 102(a) (post-AIA).
`
`
`
`12
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`Petitioner’s obviousness grounds rely on the combined teachings of the
`
`
`
`references and not on a physical incorporation of elements. See In re Mouttet, 686
`
`F.3d 1322, 1332 (Fed. Cir. 2012); Ex.1003, ¶154.
`
`Petitioner and Dr. Reddy cite to additional prior art as evidence of the
`
`background knowledge of a POSITA and to provide contemporaneous context to
`
`support assertions regarding what a POSITA would have understood from the prior
`
`art in the grounds. See Yeda Research v. Mylan Pharm. Inc., 906 F.3d 1031, 1041-
`
`1042 (Fed. Cir. 2018) (affirming the use of “supporting evidence relied upon to
`
`support the challenge”); 37 C.F.R. § 42.104(b); see also K/S HIMPP v. Hear-Wear
`
`Techs., LLC, 751 F.3d 1362, 1365-66 (Fed. Cir. 2014); Arendi S.A.R.L. v. Apple
`
`Inc., 832 F.3d 1355, 1363 (Fed. Cir. 2016).
`
`C. Ground 1
`Summary of W-L
`1.
`
`Like the ’063 patent, W-L “relates to network security.” Ex.1005, 1:7-10.
`
`W-L describes integrating “the functionalities performed by a firewall, IDS
`
`[intrusion detection system] and VAS [vulnerability assessment scanner] for
`
`network security into one system.” Ex.1005, 3:14-18. W-L’s unified system 10 is
`
`illustrated in Figure 1, and an “exemplary integrated architecture” of W-L’s unified
`
`system 10 is illustrated in Figure 2, Ex. 1005, 4:37-39. W-L’s unified system 10
`
`includes “an enterprise resource database” with data identifying potential
`
`
`
`13
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`“vulnerabilities associated with” hosts in the network. Ex.1005, 5:9-15. A
`
`“signature database” stores “detection signatures,” which include “security rules,
`
`policies and algorithms” to “mitigate or avert network damage from detected
`
`vulnerabilities.” Ex.1005, 5:20-24; Ex.1003, ¶¶32-35; see also Figure 1:
`
`Ex.1005, FIG. 1.
`
`
`As shown in Figure 2, reproduced below, the system 10 includes an “agent
`
`
`
`126 that functions to configure, tune and monitor the operation of the intrusion
`
`detector functionality 116 and the firewalling functionality 118.” Ex.1005, 9:36-41.
`
`
`
`14
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`
`Ex.1005, FIG. 2.
`
`
`
`
`Claim 10
`
`2.
`[10.0] A non-transitory computer-readable media storing instructions that, when
`executed by one or more processors, cause the one or more processors to:
`
`W-L teaches using an appliance with “underlying hardware, operating
`
`system [software],” and other facilities to execute a security application. Ex.1005,
`
`16:1-5; Ex.1003, ¶41. The appliance includes “a security application functionality
`
`512 that… is implemented as the unified network defense system 10 shown in
`
`FIGS. 1 and 2.” Ex.1005, 16:11-15; Fig.6. W-L’s “security application
`
`functionality 512” includes “the processes and functions necessary to have the
`
`
`
`15
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`platform 510 function as a network security appliance 500.”2 Ex.1005, 16:15-19;
`
`Ex. 1003, ¶42.
`
`non-transitory
`computer
`readable media
`storing
`instructions
`executed by
`one or more
`processors
`
`Ex.1005, FIG. 6 (annotated); Ex.1003, ¶42.
`
`
`
`
`
`
`2 This petition’s analysis of network defense system 10 applies to security
`
`application functionality 512. W-L explains that “security application
`
`functionality 512 [of Figure 6] … is implemented as the unified network defense
`
`system 10 shown in FIGS. 1 and 2.” Ex.1005, 16:11-15.
`
`
`
`16
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`It would have been obvious to a POSITA that W-L’s platform 510, which
`
`
`
`includes the necessary operating system and underlying hardware, would include
`
`one or more processors to execute the security application functionality 512. See
`
`Ex.1005, 16:2-5; Ex.1018, 4:20-43 (multiprocessor systems and processing units
`
`were known); Ex.1003, ¶43. Further, it would have been obvious that the security
`
`application functionality 512, embodied and executed on the platform 510, would
`
`have been in a non-transitory computer readable medium of the platform 510, since
`
`it was well-known to store executable applications in that way. See Ex.1018,
`
`Abstract; Ex.1003, ¶¶44-45.
`
`[10.1] receive first vulnerability information from at least one first data storage
`that is generated utilizing second vulnerability information from at least one
`second data storage that is used to identify a plurality of potential vulnerabilities;
`
`Claim element [10.1] is rendered obvious in two different ways: (1) by the
`
`embodiment illustrated in Figure 2 of W-L along with the associated description;
`
`and (2) by the embodiment illustrated in Figure 1 of W-L along with the associated
`
`description. Figure 2 of W-L is addressed first, followed by Figure 1. Ex.1003,
`
`¶46.
`
`W-L’s Figure 2 and associated discussion renders obvious [10.1]
`
`First, W-L’s threat aggregation functionality 128 and the information it
`
`stores is an example of “at least one second data storage that is used to identify a
`
`plurality of potential vulnerabilities.” Ex.1003, ¶47.
`
`
`
`17
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`The “threat aggregation functionality 128 stores threat information 130
`
`
`
`(for example worm, virus, trojan, DoS, Access, Failure, Reconnaissance, other
`
`suspicious traffic, and the like) collected from around the world.” Ex.1005, 10:36-
`
`40. This “threat information” is “analyzed and utilized by the network
`
`administrator 142 to design the detection signatures 132,” (see Ex.1005, 10:40-42),
`
`and therefore is an example of “second vulnerability information” stored by “threat
`
`aggregation functionality 128” (“at least one second data storage”). Ex.1003, ¶48.
`
`The “detection signatures 132,” also stored by the threat aggregation
`
`functionality 128, include “security rules, policies and algorithms… that can be
`
`used by the system 10 to mitigate or avert network damage from the collected
`
`threats (see, also, signatures 22 and database 20 of FIG. 1)” and are another
`
`example of “second vulnerability information.” Ex.1005, 10:42-46; Ex.1003, ¶¶49-
`
`51.
`
`
`
`18
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`
`Second
`data
`storage
`
`Ex.1005, FIG. 2 (annotated); Ex.1003, ¶49.
`
`
`
`The threat information 130 and detection signatures 132 are stored in the
`
`threat aggregation functionality 128, and each is “used to identify a plurality of
`
`potential vulnerabilities.” “Before the detection signature 132… is installed in the
`
`intrusion detector functionality 116 and/or firewalling functionality 118, the agent
`
`126 may first query 134 the network discovery functionality 112” and evaluate
`
`“for the purpose of determining whether the detection signature 132 is relevant to
`
`the particular network 14 being protected.” Ex.1005, 11:11-29. It would have been
`
`obvious to a POSITA that the information stored in the threat aggregation
`
`functionality 128 identifies potential vulnerabilities, since it is unknown whether
`
`
`
`19
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`the detection signature 132 (by extension also the threat information 130) pertains
`
`to a vulnerability that is present in the network before evaluation. Ex.1003, ¶50.
`
`Second, W-L teaches security management agent 126 generating first
`
`vulnerability information by utilizing the second vulnerability information from the
`
`threat aggregation functionality 128 (“second data storage”). Ex.1003, ¶53.
`
`The security management agent 126 generates tailored detection signatures
`
`to particular threats in the network based on information received from the threat
`
`aggregation functionality. Ex.1005, 9:37-48. The “agent 126 confers with the
`
`network discovery functionality 112 to ensure that the detection signatures… are
`
`tailored to the collected enterprise (i.e., network 14) specific data.” Ex.1005,
`
`10:5-9. The agent considers “the enterprise specific data… so that the signature…
`
`is designed in a way that minimizes the likelihood that false positive alarms
`
`will be generated.” Ex.1005, 10:9-14; Ex.1003, ¶54.
`
`These tailored signatures render obvious “first vulnerability information.”
`
`The tailored signatures are “generated utilizing second vulnerability information”
`
`because they are tailored to the enterprise specific data. It would have further been
`
`obvious that the tailored signatures would have been stored by the agent 126 at
`
`least temporarily (a “first data storage”). Ex.1003, ¶55. For example, W-L’s agent
`
`126 evaluates enterprise specific data “for the purpose of determining whether the
`
`detection signature 132 is relevant.” Ex.1005, 11:11-29. It would have been
`
`
`
`20
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`obvious for agent 126 to retain (and thus store) detection signatures that are
`
`determined relevant. Ex.1003, ¶55; see also Ex.1005, 13:8-11, 13:27-35 (agent 126
`
`tailoring a signature database 132).
`
`Further, W-L’s platform 510 includes the “underlying hardware” necessary
`
`to perform its operations in support of the “security application functionality 512,”
`
`including the agent 126. Ex.1005, 16:2-5, 16:11-14. It would have therefore been
`
`obvious that the platform 510’s “underlying hardware” would include a data
`
`storage to store the detection signatures while and after evaluating their relevance
`
`and tailoring them to enterprise specific data. Ex.1003, ¶56. Thus, W-L teaches a
`
`“first data storage” for the “first vulnerability information” that is “generated
`
`utilizing second vulnerability information.” See Ex.1005, FIGs. 2, 6:
`
`
`
`21
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`First data
`storage
`
`Ex.1005, FIGs. 2 and 6 (annotated); Ex.1003, ¶56.
`
`
`
`
`
`
`
`22
`
`
`
`
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`Third, W-L teaches receiving detection signatures (“receiving first
`
`
`
`vulnerability information”) from the storage of platform 510 supporting agent 126
`
`(“first data storage”). Ex.1003, ¶59.
`
`The intrusion detector functionality, alone or together with firewalling
`
`functionality, receives the tailored signatures from the agent 126. After tailoring
`
`the detection signatures at agent 126 (based on enterprise data), the tailored
`
`detection signatures are “supplied to the intrusion detector functionality 116 and/or
`
`firewalling functionality 118 to effectuate the tuning of the system 10 against a
`
`certain perceived threat by filtering of the packets (traffic).” Ex.1005, 11:1-10; see
`
`also 11:11-29. The receipt of the tailored signature at either the intrusion detector
`
`functionality 116 or the firewalling functionality 118 renders obvious receiving
`
`“first vulnerability information” (tailored signatures) from a “first data storage”
`
`(storage of platform 510 executing the agent 126).
`
`
`
`23
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`First data
`storage
`
`Second
`data
`storage
`
`Receiving first
`vulnerability
`information from
`first data storage
`
`Ex.1005, FIGs. 2 and 6 (annotated); Ex.1003, ¶61.
`
`
`
`
`
`24
`
`
`
`
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`Therefore, W-L’s system 10 of Figure 2 (together with associated Figure 6)
`
`
`
`and associated discussion renders obvious [10.1]. Ex.1003, ¶46.
`
`W-L’s system 10 of Figure 1 and associated discussion renders obvious [10.1].
`
`
`
`First, W-L’s entity 26 and the information it stores is an example of “at
`
`least one second data storage that is used to identify a plurality of potential
`
`vulnerabilities.” Ex.1003, ¶¶51-52.
`
`W-L teaches that the entity 26 can be an entity “in the business of signature
`
`creation,” operating “to collect threat information (for example, worm, virus,
`
`trojan, DoS, Access, Failure, Reconnaissance, other suspicious traffic, and the like)
`
`from around the world.” Ex.1005, 5:29-33. The entity 26 analyzes the information
`
`and designs detection signatures 22 that can be supplied to database 20. Ex.1005,
`
`5:24-36 (signatures obtained from multiple possible external sources). These
`
`signatures 22 from entity 26 have been created with respect to “potential
`
`vulnerabilities” (before being stored in database 20) because they have not yet
`
`taken into account the “detected vulnerabilities” of the network 14. Therefore, it
`
`was obvious to a POSITA that the system 10 would obtain those signatures from a
`
`data storage (at entity 26) storing “a plurality of potential vulnerabilities”:
`
`
`
`25
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`
`Second
`data
`storage
`
`Ex.1005, FIG. 1 (annotated); Ex.1003, ¶¶51-52.
`
`
`
`Second, W-L teaches generating first vulnerability information by utilizing
`
`the second vulnerability information from the second data storage, with respect to
`
`database 20. Ex.1003, ¶57.
`
`W-L further teaches generating the first vulnerability information with the
`
`database 20. The signature database 20 “stores detection signatures 22… that are
`
`designed to mitigate or avert network damage from detected vulnerabilities.”
`
`Ex.1005, 5:20-24. The signatures 22 thus stored in the database 20 “may be
`
`obtained from any one of a number of well-known sources, including… a[n] entity
`
`26.” Ex.1005, 5:24-36; Ex.1003, ¶57.
`
`
`
`26
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`It would have been obvious that a detection signature 22 in database 20,
`
`
`
`designed to mitigate damage from “detected vulnerabilities” from signatures
`
`obtained from entity 26, is an example of “first vulnerability information… that is
`
`generated utilizing second vulnerability information.” The signatures 22 in
`
`database 20 are limited to those for “detected vulnerabilities,” not just any “threat
`
`information… from around the world.” Ex.1005, 5:20-36. Thus, W-L teaches a
`
`“first data storage” for the “first vulnerability information” that is “generated
`
`utilizing second vulnerability information.”
`
`First data
`storage
`
`Ex.1005, FIG. 1 (annotated); Ex.1003, ¶58.
`
`
`
`Third, W-L teaches receiving detection signatures (“first vulnerability
`
`
`
`27
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`information”) from the database 20 (“first data storage”). Ex.1003, ¶59.
`
`The agent 28 of FIG. 1 receives detection signatures 22 from database 20.
`
`“The inspection operation performed by the inspection agent 28 next involves
`
`comparing 40 the extracted packet features against the detection signatures 22
`
`obtained from the signature database 20.” Ex.1005, 5:50-53; 6:5-7 (apply
`
`signatures as they are obtained); Ex.1003, ¶62. As another example, the agent 28
`
`instantiates detection signatures 22 at the “comparison functionality 40 and/or the
`
`sentry’s comparison functionality 44.” Ex.1005, 8:7-11. The signatures are
`
`downloaded to one or both of the agent 28 and “entrance sentry 42” to compare
`
`against traffic. Ex.1005, 6:50-53 (signatures obtained from database), 6:54-58
`
`(signatures downloaded to entrance sentry 42 via agent 28 or from database 20).
`
`Receipt of the signatures at either the agent 28 or the entrance sentry 42 from the
`
`database 20 (either directly or indirectly), renders obvious receiving “first
`
`vulnerability information” (signatures 22) from a “first data storage” (database
`
`20).
`
`
`
`28
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`
`First data
`storage
`
`Receiving
`first
`vulnerability
`information
`from first
`data storage
`
`Second
`data
`storage
`
`Ex.1005, FIG. 1 (annotated); Ex.1003, ¶¶63-64.
`
`
`
`Therefore, W-L’s system 10 of Figure 1 and associated discussion renders
`
`obvious [10.1]. Ex.1003, ¶¶46, 65.
`
`[10.2] said first vulnerability information generated utilizing the second
`vulnerability information, by:
`
`As already explained at [10.1], W-L renders obvious “first vulnerability
`
`information… that is generated utilizing second vulnerability information.”
`
`Ex.1003, ¶66.
`
`[10.3] identifying at least one configuration associated with a plurality of devices
`including a first device, a second device, and a third device, and
`
`
`
`29
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`First, W-L teaches checking the conditions of the network (obtained from
`
`
`
`the enterprise specific data). See [10.1] above. Referring to FIG. 2, when tuning a
`
`signature, “the detection signatures… are tailored to the collected enterprise (i.e.,
`
`network 14) specific data.” Ex.1005, 10:3-9. The agent 126 considers “the
`
`enterprise specific data… when issuing a detection signature so that the
`
`signature… is designed in a way that minimizes the likelihood that false positive
`
`alarms will be generated.” Ex.1005, 10:9-19; Ex.1003, ¶68. A POSITA would
`
`have recognized that an obvious example of a false positive alarm would be an
`
`alarm based on a signature that corresponds to a vulnerability that does not apply
`
`to any machine in the network. Ex.1003, ¶68.
`
`W-L further discloses checking the conditions of the network includes
`
`determining an operating system configuration of machines in the network. See
`
`Ex.1005, 12:44-61 (“identifying the machines of the network using Microsoft IIS
`
`web servers and/or Microsoft operating systems”); Ex.1003, ¶69.
`
`The embodiments of FIG. 1 also check a configuration of the network. The
`
`system 10 obtains specifically those signatures “that are designed to mitigate or
`
`avert network damage from detected vulnerabilities.” Ex.1005, 5:20-24. Such
`
`“detected vulnerabilities” include the enterprise specific data. See, e.g., Ex.1005,
`
`5:9-15 (enterprise specific data), 5:15-19 (vulnerability assessments to obtain
`
`enterprise specific data). And it would have been obvious for the enterprise
`
`
`
`30
`
`

`

`IPR2022-00259 Petition
`Inter Partes Review of 10,609,063 (Claims 10, 11, 39, 58)
`
`
`specific data to include operating system configuration information since it is a
`
`well-known type of information about the enterprise and, as noted above, is
`
`relevant to tailoring detection signatures to a particular enterprise’s network.
`
`Ex.1003, ¶70.
`
`Second, W-L teaches identifying the configuration as associated with a
`
`plurality of devices. The agent 126 identifies whether the operating sys

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket