throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`———————
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`———————
`
`FORCEPOINT LLC,
`Petitioner
`
`
`v.
`
`SECURITY PROFILING, LLC,
`Patent Owner
`
`
`———————
`
`IPR2023-00990
`U.S. Patent No. 10,893,066
`
`PETITION FOR INTER PARTES REVIEW
`UNDER 35 U.S.C. § 312 AND 37 C.F.R. § 42.104
`
`
`
`
`
`
`
`
`
`
`DM2\17991333.1
`
`

`

`
`
` I.
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`
`TABLE OF CONTENTS
`
`INTRODUCTION ................................................................................................. 7
`
`II.
`
`GROUNDS FOR STANDING .............................................................................. 8
`
`III. NOTE ..................................................................................................................... 8
`
`IV. SUMMARY OF THE ’066 PATENT ................................................................... 8
`
`V.
`
`PROSECUTION HISTORY .................................................................................. 9
`
`VI. EFFECTIVE PRIORITY DATE OF THE ’066 PATENT .................................. 10
`
`VII. LEVEL OF ORDINARY SKILL IN THE ART ................................................. 10
`
`VIII. STATE OF THE ART ......................................................................................... 11
`
`A. Network System Security .......................................................................... 11
`
`B.
`
`The Use of Mobile Agents ........................................................................ 13
`
`VIII. CLAIM CONSTRUCTION ................................................................................. 14
`
`IX. RELIEF REQUESTED AND REASONS THEREFORE ................................... 14
`
`X.
`
`IDENTIFICATION OF HOW THE CLAIMS ARE UNPATENTABLE .......... 14
`
`A.
`
`B.
`
`1.
`
`2.
`
`Statutory Grounds for Challenges .............................................................. 14
`
`Ground 1 .................................................................................................... 16
`
`Summary of Gupta ..................................................................................... 16
`
`Summary of Graham ................................................................................. 23
`
`3. Motivation to Modify the Teachings of Gupta with the Teachings of
`Graham ...................................................................................................... 24
`
`DM2\17991333.1
`
`2
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`
`4.
`
`Claim 1 ...................................................................................................... 25
`
`[1.0] A non-transitory computer-readable media storing instructions that,
`when executed by one or more processors, cause the one or more
`processors to: ................................................................................... 25
`
`EX-1006, FIG. 1 (annotated); EX-1003, ¶61 ....................................................... 27
`
`[1.1] receive first vulnerability information from at least one first data
`storage that is generated utilizing second vulnerability information
`from at least one second data storage that is used to identify a
`plurality of potential vulnerabilities; ............................................... 30
`
`EX-1006, FIG. 15 (annotated); EX-1003, ¶71. .................................................... 31
`
`[1.2] said first vulnerability information generated utilizing the second
`vulnerability information, by: ......................................................... 37
`
`[1.3] identifying at least one configuration associated with a plurality of
`devices including a first device, a second device, and a third device,
`and ................................................................................................... 37
`
`[1.4] determining that the plurality of devices is actually vulnerable to at
`least one actual vulnerability based on the identified at least one
`configuration, utilizing the second vulnerability information that is
`used to identify the plurality of potential vulnerabilities; ............... 38
`
`[1.5] identify an occurrence in connection with at least one of the plurality
`of devices; ....................................................................................... 40
`
`[1.6] determine that the at least one actual vulnerability of the at least one
`of the plurality of devices is susceptible to being taken advantage of
`by the occurrence identified in connection with the at least one of
`the plurality of devices, utilizing the first vulnerability information;
`and ................................................................................................... 40
`
`[1.7] cause utilization of different occurrence mitigation actions of diverse
`occurrence mitigation types, including a firewall-based occurrence
`mitigation type and a other occurrence mitigation type, across the
`plurality of devices for occurrence mitigation by preventing
`
`DM2\17991333.1
`
`3
`
`

`

`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`
`advantage being taken of actual vulnerabilities utilizing the
`different occurrence mitigation actions of the diverse occurrence
`mitigation types across the plurality of devices; ............................. 42
`
`[1.8] wherein the at least one configuration involves at least one operating
`system. ............................................................................................. 46
`
`C.
`
`Ground 2 .............................................................................................................. 47
`
`1.
`
`Summary Of Hill ....................................................................................... 47
`
`2. Motivation to Modify the Teachings of Gupta with the Teachings of Hill
` ................................................................................................................... 49
`
`3.
`
`Claim 2 ...................................................................................................... 52
`
`XI. DISCRETIONARY DENIAL IS INAPPROPRIATE ......................................... 80
`
`A. Discretionary denial under 35 U.S.C. § 325(d) is not appropriate ............ 80
`
`B.
`
`Discretionary denial under the Fintiv factors is not appropriate ................ 83
`
`I.
`
`MANDATORY NOTICES .................................................................................. 86
`
`A.
`
`B.
`
`C.
`
`Real party-in-interest ................................................................................. 86
`
`Related matters .......................................................................................... 86
`
`Lead and back-up counsel and service information ................................... 86
`
`XII. CONCLUSION .................................................................................................... 88
`
`CERTIFICATE OF WORD COUNT ............................................................................ 89
`
`CERTIFICATE OF SERVICE ...................................................................................... 90
`
`
`
`
`
`DM2\17991333.1
`
`4
`
`

`

`
`
`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`PETITIONER’S EXHIBIT LIST
`
`EX-1001
`
`U.S. 10,893,066
`
`EX-1002
`
`Prosecution History of U.S. 10,893,066
`
`EX-1003
`
`EX-1004
`EX-1005
`
`EX-1006
`EX-1007
`EX-1008
`
`EX-1009
`EX-1010
`
`EX-1011
`
`Declaration of A.L. Narasimha Reddy, Ph.D. under 37 C.F.R. §
`1.68
`Curriculum Vitae of A.L. Narasimha Reddy, Ph.D.
`U.S. 7,359,962 to Willebeek-LeMair et al.
`
`U.S. Pub. 2003/0004689 to Gupta et al.
`U.S. 7,237,264 to Graham et al.
`Intentionally Left Blank
`
`Intentionally Left Blank
`Intentionally Left Blank
`
`IPR2017-02191, Granting Request for Adverse Judgment, Paper
`18, September 26, 2018
`
`EX-1012
`EX-1013
`
`IPR2017-02192, Final Written Decision, Paper 31, April 8, 2019
`Intentionally Left Blank
`
`EX-1014
`
`IPR2022-00035, Institution Decision, Paper 7,(April 19, 2022)
`
`EX-1015
`
`Intentionally Left Blank.
`
`EX-1016
`EX-1017
`
`U.S. Pat. No. 6,088,804 (Hill)
`Intentionally Left Blank.
`
`EX-1018
`
`Intentionally Left Blank
`
`DM2\17991333.1
`
`5
`
`

`

`
`
`
`
`EX-1019
`
`Intentionally Left Blank
`
`EX- 1020
`
`Intentionally Left Blank
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`
`EX-1021
`
`Applying Mobile Agents to Intrusions Detection and Response
`Jansen, et al, NIST Interim Report (IR) (October 1999) (“Jansen”)
`
`DM2\17991333.1
`
`6
`
`

`

`
`
`I.
`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`
`INTRODUCTION
`
`Forcepoint LLC, (“Petitioner”) respectfully requests that the Board review
`
`and cancel as unpatentable Claims 1 and 2 (hereinafter, the “Challenged Claims”)
`
`of U.S. 10,893,066 (the “’066 Patent,” EX-1001).
`
`The ’066 Patent “relates to … management of security of computing and
`
`network devices” connected in a network. EX-1001, 1:18-20. An examiner
`
`allowed the claims because the prior art allegedly failed to teach “identifying an
`
`occurrence, determining that at least one vulnerability is susceptible to being taken
`
`advantage by the occurrence and selectively utilizing diverse mitigation actions
`
`including a firewall.” EX-1002, 564.
`
`However, the Board previously instituted review of Claim 1 of the ’066
`
`Patent in IPR2022-00035 because Gupta in combination with Graham teaches this
`
`alleged point of novelty by identifying an occurrence of a packet arriving at a
`
`network and determining an associated vulnerability to threats. EX-1014 PP. 37-
`
`38 (“Thus, we determine, based on the current record, Gupta teaches ‘a other
`
`occurrence mitigation type’ and Graham teaches ‘a firewall-based occurrence
`
`mitigation type.’ Moreover, on this record, we determine both Gupta and Graham
`
`teach ‘caus[ing] utilization’ of different occurrence mitigation actions receiving
`
`packets in traffic and inspecting”).
`
`This Petition also challenges Claim 2, which was not previously challenged
`
`DM2\17991333.1
`
`7
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`in IPR2022-00035. Claim 2 depends from Claim 1 and is directed to identifying
`
`occurrences and taking mitigation actions at devices distributed throughout the
`
`network. Claim 2 is obvious over the combination of Gupta and Graham in further
`
`view of Hill which discloses the use of security agents distributed throughout the
`
`network at computer devices for detecting and mitigating security occurrences.
`
`II.
`
`
`GROUNDS FOR STANDING
`
`Petitioner certifies the ’066 Patent is IPR-eligible, and Petitioner is not
`
`barred or estopped from requesting IPR challenging the patent claims. 37 C.F.R.
`
`§ 42.104(a).
`
`
`III. NOTE
`
`Petitioner cites to exhibits’ original page numbers. Emphasis in quoted
`
`material has been added. Claim terms are italicized. Color annotations are added
`
`to the figures.
`
`IV.
`
`
`SUMMARY OF THE ’066 PATENT
`
`The ’066 Patent “relates to…management of security of computing and
`
`network devices.” EX-1001, 1:23-25. The ’066 Patent is part of a family of patents
`
`and applications, including two patents that had claims cancelled in IPRs. See
`
`generally EX-1011, 1012.
`
`A “security server 135” collects operating system and other configuration
`
`data about devices in the network. EX-1001, 2:30-38, 43-45; see also Fig.1 below.
`
`DM2\17991333.1
`
`8
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`The server determines whether network traffic “is attempting to take advantage of a
`
`particular known vulnerability.” EX-1001, 4:9-11, 4:21-29. If so, the server
`
`“selects one or more remediation techniques” for the particular vulnerability. EX-
`
`1001, 4:62-64; EX-1003, ¶¶25-27.
`
`
`
`
`V.
`
`
`
`
`EX-1001, Fig. 1
`
`PROSECUTION HISTORY
`
`The Applicant amended the independent claim for clarification, in order to
`
`overcome a rejection under 35 U.S.C. § 101. EX-1002, 538-55. The examiner
`
`DM2\17991333.1
`
`9
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`indicated the allowablity of Claim 1 (Claim 54 during prosecution) explaining that
`
`the prior art fails to teach “identifying an occurrence, determining that at least one
`
`vulnerability is susceptible to being taken advantage by the occurrence and
`
`selectively utilizing diverse mitigation actions including a firewall.” EX-1002,
`
`564.
`
`The Applicant subsequently filed an RCE with multiple IDS filings and an
`
`amendment cancelling all dependent claims and substituting new claims dependent
`
`from Claim 1, including Claim 2. The examiner issued a Notice of Allowance
`
`identifying the same reason for the allowance of Claim 1 and did not identify any
`
`independent reason for the allowance of the newly added dependent claims stating
`
`only that they were “allowed by virtue of their dependency.” EX-1002 790.
`
`VI. EFFECTIVE PRIORITY DATE OF THE ’066 PATENT
`
`The earliest claimed priority date is July 1, 2003. EX-1001. In prosecution,
`
`the Applicant alleged a reduction to practice on October 15, 2002. EX-1002, 281-
`
`82. This petition cites prior art predating October 15, 2002. Petitioner does not
`
`waive any right or opportunity it may have to dispute the priority date of the ’066
`
`Patent in this or another forum where the issue is relevant.
`
`VII. LEVEL OF ORDINARY SKILL IN THE ART
`
`A Person of Ordinary Skill in The Art (“POSITA”) in July 2003 would have
`
`
`
`had a working knowledge of the network communications art that is pertinent to
`
`DM2\17991333.1
`
`10
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`the ’066 Patent, including network security. A POSITA would have had a
`
`bachelor’s degree in computer science, computer engineering, or an equivalent,
`
`and two years of professional experience relating to network communications.
`
`Lack of professional experience can be remedied by additional education, and vice
`
`versa. EX-1003, ¶¶17-19.
`
`VIII. STATE OF THE ART
`
`The following section describes the state of the art for network security
`
`systems as of July 2003. The prior art references, and the discussions of what was
`
`known to a POSA, provide the factual support for the general description of the
`
`state of the art at the time of the invention, provide contemporaneous context to
`
`support assertions regarding what a POSITA would have understood from the prior
`
`art in the grounds and provide the motivation to modify or combine the references.
`
`Accordingly, these references should be considered by the Board. See Yeda
`
`Research v. Mylan Pharm. Inc., 906 F.3d 1031, 1041- 1042 (Fed. Cir. 2018)
`
`(affirming the use of “supporting evidence relied upon to support the challenge”);
`
`37 C.F.R. § 42.104(b); see also K/S HIMPP v. Hear-Wear Techs., LLC, 751 F.3d
`
`1362, 1365-66 (Fed. Cir. 2014); Arendi S.A.R.L. v. Apple Inc., 832 F.3d 1355, 1363
`
`(Fed. Cir. 2016).
`
`A. Network System Security
`
`
`
`By July 2003 it was known that network security included “the
`
`DM2\17991333.1
`
`11
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`functionalities performed by a firewall, IDS [intrusion detection system] and
`
`[vulnerability assessment scanner] for network security into one system.” EX-
`
`1005 3:14-18. Such a unified system 10 is illustrated in Figure 1. EX-1005 4:37-
`
`39. It includes “an enterprise resource database” with data identifying potential
`
`“vulnerabilities associated with” hosts in the network. EX-1005 5:9-15. A
`
`“signature database” stores “detection signatures,” which include “security rules,
`
`policies and algorithms” to “mitigate or avert network damage from detected
`
`vulnerabilities.” EX-1005, 5:20-24; EX-1003, ¶¶29.
`
`
`
`As shown in Figure 2, reproduced below, the system 10 includes an “agent
`
`DM2\17991333.1
`
`12
`
`
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`126 that functions to configure, tune and monitor the operation of the intrusion
`
`detector functionality 116 and the firewalling functionality 118.” EX-1005 9:36-41:
`
`EX-1003, ¶30.
`
`
`
`B. The Use of Mobile Agents
`
`
`By July 2003, intrusion detection systems had adopted the use of mobile
`
`agents. A mobile agent is a software agent that is distributed at each host to
`
`provide intrusion detection and automatic response. EX-1021 pp. 2, 7-8. A POSA
`
`understood that the use of mobile agents in an architecture for highly distributed
`
`intrusion detection systems provided several advantages over centralized intrusion
`
`detection systems including overcoming network latency, reducing network load,
`
`executing asynchronously and autonomously, adapting dynamically, operating in
`
`heterogeneous environments, and having robust and fault-tolerant behavior. EX-
`
`DM2\17991333.1
`
`13
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`1021 pp. 10-14. In addition, a layered approach in which a hierarchical IDS where
`
`a mobile agent backs each node up and restores any lost functionality provides
`
`redundancy for the security of the network. EX-1021 p. 21; EX-1003 ¶31
`
`VIII. CLAIM CONSTRUCTION
`
`Petitioner believes that, for purposes of this proceeding and the analysis
`
`presented herein, the terms should be given their plain and ordinary meaning. In
`
`IPR2022-00035, the Board construed “instructions that…cause the one or more
`
`processors to… cause utilization of different occurrence mitigation actions of diverse
`
`occurrence mitigation types, including a firewall-based occurrence mitigation type
`
`and a other occurrence mitigation type, across the plurality of devices as recited in
`
`Claim 1, includes network defense systems which provide firewall functionality. We
`
`do not exclude those other mitigation types that may be separate from a vulnerable or
`
`attacked device.” EX-1014 p. 20. Petitioner agrees that this construction is within
`
`the plain and ordinary meaning of the recited limitation.
`
`IX. RELIEF REQUESTED AND REASONS THEREFORE
`
`Petitioner asks that the Board institute a trial for inter partes review and
`
`cancel the Challenged Claims in view of the analysis below.
`
`X.
`
`
`
`IDENTIFICATION OF HOW THE CLAIMS ARE UNPATENTABLE
`
`Statutory Grounds for Challenges
`
`A.
`
`Grounds
`
`Claims
`
`Basis
`
`References
`
`DM2\17991333.1
`
`14
`
`

`

`
`
`
`
`1
`2
`
`1
`2
`
`§103
`§103
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`Gupta in view of Graham
`Gupta in view of Graham in
`view of Hill
`
`U.S. Pat. Publication No. 2003/0004689 titled “Hierarchy-Based Method and
`
`Apparatus for Detecting Attacks on a Computer System” published on January 2,
`
`2003 based on Application No. 10/172,764 filed June 13, 2002 (“Gupta”)(EX-1006).
`
`Gupta is prior art under 35 U.S.C. §§ 102(a) and (e) (pre-AIA) and was not cited by
`
`the examiner during prosecution.
`
`U.S. Pat. No. 7,237,264 titled “System and Method for Preventing Network
`
`Misuse” issued on June 26, 2007 based on Application No. 09/874,574 filed June 4,
`
`2001 (“Graham”)(EX-1007). Graham is prior art under 35 U.S.C. § 102(e) (pre-
`
`AIA) and was not cited by the examiner during prosecution.
`
`U.S. Pat. No. 6,088,804 titled “Adaptive System and Method for
`
`Responding to Computer Network Security Attacks” issued on Jul, 11, 2000 from
`
`Application No. 09/006,056 filed January 12, 1998 (“(Hill”)(EX-1016). Hill is
`
`prior art under 35 U.S.C. § 102(a) (pre-AIA) and was not cited by the examiner
`
`during prosecution.
`
`Petitioner’s obviousness grounds rely on the combined teachings of the
`
`references and not on a physical incorporation of elements. See In re Mouttet, 686
`
`F.3d 1322, 1332 (Fed. Cir. 2012); EX-1003, ¶116.
`
`DM2\17991333.1
`
`15
`
`

`

`
`
`
`
`
`
`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`
`B. Ground 1
`
`Summary of Gupta
`
`1.
`Gupta discloses a security system that determines actual vulnerabilities,
`
`detects occurrences in network traffic that may take advantage of those
`
`vulnerabilities, and provides that multiple options for mitigation of those
`
`occurrences, including dropping TCP connections, are provided. EX-1006, [0151],
`
`[0154], [0164]-[0165]; EX-1003, ¶¶36-48.
`
`Gupta describes “provisioning a computer against computer attacks” by
`
`“constructing a hierarchy characterizing different computer attacks and counter
`
`measures, and traversing this hierarchy to identify computer attacks and counter
`
`measures relevant to a target platform.” EX-1006 [0008], Abstract; EX-1003,
`
`¶¶36-39. Gupta explains that its system provides “security operations” via network
`
`security sensors 22 in a computer network 20 incorporating network security
`
`devices and processes associated with the invention. The combination of the
`
`sensor 22 (green), redundant sensor 24, and sensor management system 26 (pink)
`
`is referred to as a local sensor security module 27. As shown in FIG. 1, local
`
`sensor security modules 27 may be distributed throughout a network. In this
`
`example, a local sensor (green) in a local sensor security module 27-0 is positioned
`
`between the enterprise network 30 (blue) and a protected server 32 (red). EX-
`
`1006. [0030],[0032]; EX-1003, ¶39.
`
`DM2\17991333.1
`
`16
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`
`EX-1006 Fig. 1
`
`The update server 38 (purple) is used to coordinate the delivery of signature
`
`and software updates to the local sensor security modules 27. EX-1006 [0034].
`
`
`
`DM2\17991333.1
`
`17
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`The update server 38 is notifies users of new software or network intrusion
`
`signature updates and provides them for download to the sensors. The sensor 22
`
`performs signature matching against network traffic and generates responses in
`
`case of intrusions. A sensor 22 accepts configuration and control messages and
`
`sends intrusion alerts and/or events to the sensor management system 26. EX-1006
`
`[0138] ; EX-1003, ¶40.
`
`As shown in FIG. 2, network security sensors include a “memory 50, which
`
`includes primary and/or secondary memory” and “memory 50 stores a set of
`
`executable programs utilized to implement functions of the invention.” EX-1006
`
`[0036],[0037] ; EX-1003, ¶41.
`
`DM2\17991333.1
`
`18
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`
`
`
`EX-1006 FIG. 2.
`
`Further, “memory 50 also stores a classification and pattern-matching
`
`module 68” which “has an associated set of intrusion signatures 70” (EX-1006
`
`DM2\17991333.1
`
`19
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`[0042]) and those intrusion signatures 70 are stored in an “attack file” which
`
`“specifies attacks and counter measures.” EX-1006 [0151] ; EX-1003, ¶42.
`
`As illustrated in FIG. 17, the attack file is generated by the hierarchical
`
`categorization module in the update server, which initially constructs a hierarchy
`
`characterizing different computer attacks and countermeasures (block 160) ; EX-
`
`1003, ¶43.
`
`
`
`DM2\17991333.1
`
`20
`
`

`

`
`
`EX-1006 FIG. 17.
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`
`The hierarchy is then traversed to identify computer attacks and
`
`countermeasures relevant to the target platform (block 162). Detection and
`
`protection measures for the target platform are then collected (block 164). This
`
`can result in an attack file 149 and a sensor is then supplied, through a download,
`
`with the protective software (e.g., the attack file) for the target platform (block
`
`166). EX-1006 [0164] ; EX-1003, ¶44.
`
`To detect an attack the sensor uses, a “signature processing system . . .
`
`look[s] for signatures that are specific combinations of patterns (e.g., numerical
`
`field values, string matches, and the like) existing in monitored network traffic.”
`
`EX-1006 [0083]. When an attack is found, “response processor 54 . . . attempts to
`
`prevent the attack. Short-term responses include terminating TCP connections.
`
`Long-term responses include packet logging for further analysis to improve
`
`detection and response.” EX-1006 [0087]; EX-1003, ¶45.
`
`As shown in FIG. 13, the sensor management system 26 includes a virtual
`
`intrusion detection system (VIDS) provisioning module 110 and a real-time
`
`signature update module 112; EX-1003, ¶46.
`
`DM2\17991333.1
`
`21
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`
`
`
`This realtime signature update module coordinates the delivery of intrusion
`
`signatures 70 to sensors 22. This module is responsive to control signals from the
`
`update server 38. EX-1006 [0132] ; EX-1003, ¶47.
`
`The VIDS provisioning module operates in conjunction with a sensor 22 and
`
`the update server 38. As previously discussed, the sensor 22 performs signature
`
`matchings against network traffic and generates responses in case of intrusions. A
`
`DM2\17991333.1
`
`22
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`sensor 22 accepts configuration and control messages and sends intrusion alerts
`
`and/or events to the sensor management system 26. Since each VIDS can
`
`customize the response in the face of an intrusion, a sensor must be able to
`
`generate VIDS specific responses. In addition, the sensor 22 labels all alerts and
`
`events sent to the sensor management system 34 with VIDS identifiers so that the
`
`sensor management system 34 does not have to spend extra computer resources in
`
`filtering VIDS events. EX-1006 [0138] ; EX-1003, ¶48.
`
`
`
`Summary of Graham
`
`2.
`Graham is directed to “analyzing and preventing unauthorized use of data
`
`network resources” by “evaluat[ing] potential network misuse signatures” to make
`
`a “misuse determination.” EX-1007 1:7-10, 2:51-56. For example, “several
`
`successive transmissions of an invalid user ID or password from a suspect node to
`
`a target may indicate that an unauthorized user is attempting to gain access to [a]
`
`target.” EX-1007 4:40-43. Graham describes identifying potential vulnerability
`
`information and deriving actual vulnerability data from it, by correlating “target
`
`fingerprint data … with the context-based and/or state-based data signature (as
`
`indicated at 255) to determine whether the target is actually vulnerable to the
`
`suspicious data signature.” EX-1007, 7:14-19. Graham also discloses using
`
`firewall-based mitigation actions to prevent an attack from taking advantage of an
`
`actual vulnerability, including taking “certain precautionary measures” such as
`
`DM2\17991333.1
`
`23
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`attempting “to block incoming data transmissions from the suspect node (e.g., by
`
`commanding the firewall to do so).” EX-1007, 7:58-67; EX-1003, ¶¶49-50.
`
`Graham further discloses that a factor considered by the system is “the
`
`target’s response to the detected data signature to further evaluate the probability
`
`of network misuse.” EX-1007 8:3-5. Thus, Graham teaches occurrence mitigation
`
`actions, one of which is a firewall-based occurrence mitigation type –– the firewall
`
`blocking incoming data transmission from a suspect node.” EX-1007 7:65-67;
`
`EX-1003, ¶50.
`
`3. Motivation to Modify the Teachings of Gupta with the
`Teachings of Graham
`
`A POSITA would have been motivated to modify the teachings of Gupta
`
`
`
`with the teachings of Graham because both Gupta and Graham are directed to
`
`identifying vulnerabilities and applying corrective actions to protect against
`
`identified vulnerabilities. More specifically, Gupta discloses a security system that
`
`identifies devices with actual vulnerabilities, determines attacks directed to the
`
`identified devices, and presents options to a user for mitigating the attacks. EX-
`
`1006, [0151], [0154], [0164]-[0165]. Graham discloses a security system that
`
`identifies attacks against vulnerable systems and takes precautionary measures
`
`including blocking data transmissions with a firewall. EX-1007, 7:58-67. EX-
`
`1003, ¶¶ 51-55.
`
`Gupta does not expressly recite that it uses firewall functionality, but a
`
`DM2\17991333.1
`
`24
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`POSITA understood that firewall functionality was a well-known mitigation
`
`technology for preventing attacks, as discussed in the State of the Art section. EX
`
`1005 9:36-41. Thus, a POSITA would have been motivated to modify the
`
`teachings of Gupta to implement the additional corrective actions disclosed in
`
`Graham of using a firewall for any identified vulnerabilities by combining the
`
`teachings according to known methods to yield predictable results. KSR Int’l Co.
`
`v. Teleflex, Inc., 550 U.S. 398, 416 (2007). In other words, such a combination is
`
`merely applying a known technique (implementing firewall functionality for
`
`identified vulnerabilities) to a known method (identifying vulnerabilities) with the
`
`predictable outcome of identifying and implementing corrective action for the
`
`identified vulnerabilities. KSR, 550 U.S. at 417. The combination also merely
`
`represents using a known technique (firewall functionality) to improve a similar
`
`system (Gupta’s network of devices) in the same way (“preventing unauthorized
`
`use of data network resources,” EX-1007, 1:7-10). KSR, 550 U.S. at 417; EX-1003,
`
`¶54.
`
`
`
`
`
`Claim 1
`
`4.
`[1.0] A non-transitory computer-readable media storing instructions that, when
`executed by one or more processors, cause the one or more processors to:
`
`Gupta discloses several examples of a non-transitory computer-readable
`
`media that stores instructions. For example, Gupta’s FIG. 1 depicts a local
`
`security module 27 which includes a sensor 22 and a sensor management system
`
`DM2\17991333.1
`
`25
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`26, and a global sensor management system 34, all of which are connected to an
`
`update server 38, each of which include processors executing instructions stored on
`
`non-transitory computer readable media. EX-1006, FIG. 1, [0032]-[0033]. Gupta
`
`further discloses that the update server 38 includes “standard computer
`
`components” including a CPU 140 and a “memory 146” storing “a set of
`
`executable programs to implement the functions of the update server.” EX-1006,
`
`[0150] ; EX-1003, ¶¶56-68
`
`DM2\17991333.1
`
`26
`
`

`

`
`
`
`
`
`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`
`
`
`EX-1006, FIG. 1 (annotated); EX-1003, ¶61
`
`Gupta further discloses instructions stored at the update server 38 are
`
`DM2\17991333.1
`
`27
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`downloaded to the local security module 27 and global sensor management system
`
`34. For example, Gupta discloses the update server 38 “coordinate[s] the
`
`delivery” of “software updates to the local sensor security module 27.” EX-1006
`
`[0034] ; EX-1003, ¶63.
`
`Gupta further discloses the update server is “used to notify customers of new
`
`software,” and “provides the software images and signature files for download.”
`
`EX-1006 [0138]. It is well known in the art that computing devices can download
`
`and install software from a software update server (a “download server downloads
`
`updating files to the client” computer and the “desired revised software product is
`
`then installed on the client computer”). EX-1014, Abstract; EX-1003, ¶64.
`
`Therefore, a POSITA would understand that Gupta’s update server 38 stores
`
`software (instructions) that is downloadable by local security module 27 and global
`
`management system 34. EX-1003, ¶65.
`
`Gupta further discloses executing the instructions downloaded from update
`
`server 38 by “processor[s] 40_1 through 40_N,” CPU 100 of the sensor
`
`management system 26, and CPU 120 of the global management system 34. EX-
`
`1006, [0036], [0129], [0133]. As illustrated in FIG. 2, the processors 40 are
`
`connected to the memory 50 (storing the downloaded software from update server
`
`38) via a system bus, and therefore the executable programs in memory 50 are
`
`executed by “one or more processors” 40. EX-1006, [0036]-[0037]. E X- 1 0 0 3 ,
`
`DM2\17991333.1
`
`28
`
`

`

`
`
`¶ 6 6 .
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`
`
`
`Similarly, as illustrated in FIG. 13, Gupta discloses the “sensor management
`
`system 26” is in the “form of a general-purpose computer, including a central
`
`processing unit 100” and a “memory 106” storing “a set of executable programs
`
`utilized to implement features of the invention,” which are connected via a “system
`
`bus 104.” EX-1006, [0129]-[0130]. Likewise, as illustrated in FIG. 14, the
`
`DM2\17991333.1
`
`29
`
`

`

`
`
`IPR2023-00990 Petition
`Inter Partes Review of 10,893,066
`“global sensor management system 34” is also “in the form of a general-purpose
`
`computer, including a central processing unit 120” and a “memory 126.” EX-
`
`1006, [0133]-[0134]

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket