throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________________
`
`LENOVO (UNITED STATES) INC.,
`Petitioner,
`
`v.
`
`INTELLECTUAL VENTURES, II LLC,
`Patent Owner,
`
`____________________
`
`IPR2024-00124
`U.S. Pat. No. 7,325,140 B2
`____________________
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 7,325,140 B2
`
`1605282440
`
`

`

`TABLE OF CONTENTS
`
`4.
`
`5.
`
`6.
`
`Page
`INTRODUCTION .......................................................................................... 1
`I.
`STATEMENT OF PRECISE RELIEF REQUESTED .................................. 1
`II.
`III. THE 140 PATENT ......................................................................................... 2
`A. Overview of the 140 Patent .................................................................. 2
`B. Overview of the 140 Patent’s File History ........................................... 3
`C.
`Priority Date of the 140 Patent ............................................................. 5
`D.
`Person of Ordinary Skill in the Art ...................................................... 7
`E.
`Claim Construction Under 37 C.F.R. § 42.104(b)(3) .......................... 8
`1.
`“said managed network element” (claim 1) ............................... 9
`2. Means-Plus-Function Terms (claims 1, 11, 13, 14 and 16) ....... 9
`3.
`Limitation [1.b]: “an out of band access connection
`means” ...................................................................................... 10
`a.
`Function: ........................................................................ 10
`b.
`Structure: ........................................................................ 10
`Limitation [1.c]: “virtual management interface
`connection means” ................................................................... 10
`a.
`Function: ........................................................................ 10
`b.
`Structure: ........................................................................ 11
`Claim 11: “protection means” .................................................. 11
`a.
`Function ......................................................................... 11
`b.
`Structure ......................................................................... 11
`Claim 13: “monitoring means for monitoring the status of
`at least one computer network component” ............................. 11
`a.
`Function ......................................................................... 11
`b.
`Structure ......................................................................... 12
`Limitation [14.b]: “a monitoring means for monitoring
`the status of the network power supply”. ................................. 12
`a.
`Function: ........................................................................ 12
`
`7.
`
`1605282440
`
`i
`
`

`

`8.
`
`9.
`
`Structure: ........................................................................ 12
`b.
`Limitation [14.c] “reporting means for reporting the
`status of the network power supply” ........................................ 12
`a.
`Function: ........................................................................ 12
`b.
`Structure: ........................................................................ 13
`Claim 16: “means for monitoring connection attempts
`made through the management access controller.” ................. 13
`a.
`Function: ........................................................................ 13
`b.
`Structure: ........................................................................ 13
`IV. OVERVIEW OF THE PRIOR ART REFERENCES .................................. 13
`A.
`EX1005 - Neufeld .............................................................................. 13
`B.
`EX1020 - IPMI ................................................................................... 17
`C.
`PRIOR ART STATUS ....................................................................... 19
`1.
`Patents ...................................................................................... 19
`2.
`Patent Publications ................................................................... 19
`3.
`Non-Patent Publications ........................................................... 20
`V. GROUND 1: NEUFELD RENDERS OBVIOUS CLAIMS 1-4, 6, 7,
`10, 11, 13, AND 16 ....................................................................................... 21
`A.
`Claim 1 ............................................................................................... 21
`1.
`[1.pre] ....................................................................................... 21
`2.
`[1.a] .......................................................................................... 25
`3.
`[1.b] .......................................................................................... 28
`4.
`[1.c] .......................................................................................... 32
`Claim 2 ............................................................................................... 34
`Claim 3 ............................................................................................... 36
`Claim 4 ............................................................................................... 37
`Claim 6 ............................................................................................... 38
`Claim 7 ............................................................................................... 39
`Claim 10 ............................................................................................. 40
`Claim 11 ............................................................................................. 40
`ii
`
`B.
`C.
`D.
`E.
`F.
`G.
`H.
`
`1605282440
`
`

`

`Claim 13 ............................................................................................. 41
`I.
`Claim 16 ............................................................................................. 42
`J.
`VI. GROUND 2: NEUFELD IN VIEW OF SYVANNE RENDERS
`OBVIOUS CLAIMS 11 AND 12 ................................................................. 43
`VII. GROUND 3: NEUFELD IN VIEW OF FOWLER RENDERS
`OBVIOUS CLAIM 14 .................................................................................. 46
`A.
`Limitation [14.a] ................................................................................. 47
`B.
`Limitation [14.b] ................................................................................ 48
`C.
`Limitation [14.c] ................................................................................. 49
`VIII. GROUND 4: NEUFELD IN VIEW OF FOWLER RENDER
`OBVIOUS CLAIM 13 .................................................................................. 51
`IX. GROUND 5: IPMI IN COMBINATION WITH LAWRENCE
`RENDERS OBVIOUS CLAIMS 1-3, 6, 7, 10 AND 11 .............................. 52
`A.
`Introduction ........................................................................................ 52
`B.
`Claim 1 ............................................................................................... 55
`1.
`Limitation [1.pre] ..................................................................... 55
`2.
`Limitation [1.a] ........................................................................ 59
`3.
`Limitation [1.b] ........................................................................ 61
`4.
`Limitation [1.c] ........................................................................ 64
`Claim 2 ............................................................................................... 66
`C.
`Claim 3 ............................................................................................... 68
`D.
`Claim 6 ............................................................................................... 69
`E.
`Claim 7 ............................................................................................... 71
`F.
`Claim 10 ............................................................................................. 71
`G.
`Claim 11 ............................................................................................. 72
`H.
`X. GROUND 6: IPMI AND LAWRENCE IN COMBINATION WITH
`LEEDY RENDER OBVIOUS CLAIM 4 .................................................... 73
`XI. GROUND 7: IPMI AND LAWRENCE IN COMBINATION WITH
`SYVANNE RENDER OBVIOUS CLAIMS 11 AND 12 ........................... 75
`XII. GROUND 8: IPMI AND LAWRENCE IN COMBINATION WITH
`FOWLER RENDER OBVIOUS CLAIMS 13 AND 14 .............................. 76
`
`1605282440
`
`iii
`
`

`

`A.
`
`Claim 14 ............................................................................................. 77
`1.
`Limitation [14.a] ...................................................................... 77
`2.
`Limitation [14.b] ...................................................................... 78
`3.
`Limitation [14.c] ...................................................................... 79
`Claim 13 ............................................................................................. 80
`B.
`XIII. GROUND 9: IPMI IN COMBINATION WITH LAWRENCE AND
`RFC1492 RENDERS OBVIOUS CLAIM 16 .............................................. 80
`A.
`Claim 16 ............................................................................................. 80
`XIV. DISCRETIONARY DENIAL IS NOT WARRANTED .............................. 81
`A.
`35 U.S.C. § 314(a) Analysis ............................................................... 81
`B.
`35 U.S.C. § 325(d) Analysis .............................................................. 82
`XV. COMPLIANCE WITH FORMAL REQUIREMENTS ............................... 82
`A. Mandatory Notices Under 37 C.F.R. §§ 42.8(b)(1)-(4) ..................... 82
`1.
`Real Party-In-Interest ............................................................... 82
`2.
`Related Matters ........................................................................ 83
`3.
`Lead and Backup Counsel ....................................................... 83
`4.
`Service Information.................................................................. 83
`Proof of Service on the Patent Owner ................................................ 83
`B.
`Power of Attorney .............................................................................. 84
`C.
`Standing .............................................................................................. 84
`D.
`Fees ..................................................................................................... 84
`E.
`XVI. PRESERVATION OF RIGHTS ................................................................... 84
`XVII. CONCLUSION ............................................................................................. 84
`
`1605282440
`
`iv
`
`

`

`INDEX OF EXHIBITS
`
`Exhibit No. Description
`1001
`U.S. Patent No. 8,474,016
`1002
`U.S. Patent No. 7,325,140
`1003
`Declaration of Dr. Sigurd Meldal for IPR2024-00109
`1004
`File History for U.S. Pat. App. No. 10/969,561
`1005
`U.S. Pat. Pub. No. 2003/0226015 (“Neufeld”)
`1006
`U.S. Pat. No. 7,085,385 (“Frantz”)
`1007
`U.S. Patent Publication No. 2003/0097503 (“Huckins”)
`1008
`“PCI-to-PCI Bridge Architecture Specification”, Rev. 1.1 (“PCI
`Bridge Spec”)
`“Datasheet PCF8584 I2C-bus controller” (“PCF8584”)
`U.S. Pat. App. No. 09/438,253 downloaded from USPTO
`website (“Emerson”)
`U.S. Patent No. 6,219,708 (“Martenson”)
`U.S. Patent No. 5,651,137 (“MacWilliams”)
`“RFC1492: An Access Control Protocol, Sometimes called
`TACACS” (“RFC1492”)
`“RFC2865: Remote Authentication Dial In User Service
`(RADIUS)” (“RFC2865”)
`U.S. Patent No. 7,260,555 (“Rossman”)
`U.S. Patent Publication No. 2003/0097590 (“Syvanne”)
`U.S. Patent No. 7,383,577 (“Hrastar”)
`“RFC1157: A Simple Management Network Management
`Protocol (SNMP)” (“RFC1157”)
`Microsoft Computer Dictionary (5th ed. 2002)
`“IPMI – Intelligent Platform Management Interface Specification
`V1.5” (Rev. 1.1 dated 2/20/2002) (“IPMI”)
`“RFC3414: User-based Security Model (USM) for version 3 of
`the Simple Network Management Protocol (SNMPv3)”
`(“RFC3414”)
`“IP Filter Based Firewalls HOWTO” (“IPFILTER”)
`“IPMI – Intelligent Platform Management Interface Specification
`V2.0” (Draft dated 9/15/2003) (“IPMIv2.0”)
`Reserved
`U.S. Patent No. 7,055,148 (“Marsh”)
`Reserved
`U.S. Patent No. 6,286,074
`
`1009
`1010
`
`1011
`1012
`1013
`
`1014
`
`1015
`1016
`1017
`1018
`
`1019
`1020
`
`1021
`
`1022
`1023
`
`1024
`1025
`1026
`1027
`
`1605282440
`
`v
`
`

`

`Exhibit No. Description
`1028
`U.S. Patent No. 6,973,517
`1029
`U.S. Patent No. 6,189,096
`1030
`U.S. Patent No. 7,469,298
`1031
`U.S. Patent No. 6,272,537
`1032
`IETF Bibtex listing for RFC 3414
`1033
`IETF Bibtex listing for RFC 1157
`1034
`IETF Bibtex listing for RFC 2865
`1035
`IETF Bibtex listing for RFC 1492
`1036
`U.S. Patent No. 7,496,950
`1037
`“DSP0114 Alert Standard Format (ASF) Specification
`(“DSP0114”)
`U.S. Patent No. 7,263,716
`Declaration of Nathaniel E. Frank-White
`WO 01/31849 A1 (“Fowler”)
`Reserved
`District Court Claim Construction Order dated 5/28/24
`U.S. Patent No. 7,269,639 (“Lawrence”)
`U.S. Patent No. 8,605,624 (“Desai”)
`WO 2004/015764 (“Leedy”)
`Declaration of Dr. Sigurd Meldal for IPR2024-00124
`U.S. Patent Application No. 10/461,827
`
`1038
`1039
`1040
`1041
`1042
`1043
`1044
`1045
`1046
`1047
`
`1605282440
`
`vi
`
`

`

`CLAIMS
`[1.pre] A remote device management communication system for securely
`controlling access to management applications and communications to and from
`said management applications on network devices in a distributed computer
`network that includes one or more network services, one or more secure
`management access controllers, and one or more managed network devices, the
`remote device management system comprising:
`[1.a] at least one secure management access controller connected to one or more
`data bus of said managed network device for the communication of device
`management data;
`[1.b] an out-of-band access connection means for connecting said one or more
`network services or remote users with said secure management access controller
`for management of said network device; and
`[1.c] at least one virtual management interface connection means for connecting
`said one or more network services or remote users with said secure management
`access controller; wherein said virtual management interface connection means
`provides logical separation of management data from user data and utilizes user
`interfaces of said managed network element for connecting said one or more
`network services or remote users with said secure management access controller.
`[2] The system of claim 1 wherein the at least one secure management access
`controller includes a flash chip, non-volatile random access memory and random
`access memory.
`[3] The system of claim 1 wherein the at least one secure management access
`controller is embedded in the network device to be managed.
`[4] The system of claim 1 wherein the at least one secure management access
`controller accesses a flash chip, non-volatile random access memory and random
`access memory embedded in a main processor on the network device.
`[5] The system of claim 1 wherein the network device includes a card reader and
`the at least one secure management access controller is embedded in a card
`capable of being read by the card reader.
`[6] The system of claim 1 wherein the out-of-band access connection means
`comprises: a communication system; and a secure management access controller
`interface device.
`[7] The system of claim 6 wherein the communication system is selected from
`the group consisting of a Public Switched Telephone Network, a broadband
`connection and a Virtual Private Network and the interface device is selected
`
`1605282440
`
`vii
`
`

`

`CLAIMS
`from the group consisting of an analog modem, a broadband modem, an Ethernet
`interface, a cellular interface and a card slot for accepting interface cards.
`[8] The system of claim 1 wherein the at least one network communication
`means is selected from the group consisting of a local area network, a serial
`interface and a network connection.
`[9] The system of claim 1 wherein the at least one network communication
`means supports at least one protocol selected from the group consisting of
`Transmission Control Protocol/Internet Protocol, Simple Network Management
`Protocol, Telnet, Trivial File Transfer Protocol, File Transfer Protocol, Hypertext
`Transfer Protocol, Hypertext Transfer Protocol over Secure Socket Layer and
`Secure Shell.
`[10] The system of claim 1 wherein user and management communications are
`transmitted to the at least one secure management access controller and the at
`least one controller further comprises a virtual management interface for
`separating the user communications from the management communications.
`[11] The system of claim 10 wherein the virtual management interface includes a
`protection means for protecting the management data.
`[12] The system of claim 10 wherein the virtual management interface includes a
`secure transmission tunnel to protect management communications and a
`firewall to protect the at least one management access controller from
`unauthorized access.
`[13] The system of claim 1 wherein the at least one the management access
`controller includes a monitoring means for monitoring the status of at least one
`computer network component and a network interface for reporting a status of
`the at least one computer network component to a network management station.
`[14.a] The system of claim 1 further comprising: a network power supply;
`[14.b] a monitoring means for monitoring the status of the network power
`supply; and
`[14.c] a reporting means for reporting the status of the network power supply.
`]15] The system of claim 1 further comprising an independent power supply for
`supplying power to the management access controller.
`[16] The system of claim 1 further comprising a means for monitoring
`connection attempts made through the management access controller.
`
`1605282440
`
`viii
`
`

`

`I.
`
`INTRODUCTION
`
`U.S. Patent No. 7,325,140 (“the 140 patent,” EX1002) should never have
`
`been allowed by the examiner. The independent claim of the 140 patent is directed
`
`to the concept of providing in-band and out-of-band connections to a secure
`
`management access controller on a network device in order to allow an
`
`administrator to manage the network device remotely. These concepts were all
`
`well-known in the art as the 140 patent acknowledges. EX1002, 2:1-3:67.
`
`Allowance of the 140 patent was obtained by amending the independent claim to
`
`include low-level implementation details including a requirement for bus-based
`
`communication of management data, and a virtual management interface
`
`connection that logically separates management data from user data for the in-band
`
`connection. These implementation details were also well-known; the prior art
`
`patents and documents discussed herein disclose all of these concepts. The
`
`challenged claims of the 140 Patent should be found unpatentable in view of this
`
`prior art, which was not considered by the examiner.
`
`II.
`
`STATEMENT OF PRECISE RELIEF REQUESTED
`
`In accordance with 35 U.S.C. § 311, Petitioner requests cancelation of
`
`claims 1-4, 6, 7, 10-14 and 16 of the 140 patent in view of the following grounds:
`
`Ground
`1
`
`Claims
`1-4, 6, 7, 10, 11,
`13 and 16
`
`Basis
`§103
`
`1605282440
`
`Prior Art
`
`Neufeld
`
`1
`
`

`

`Ground
`2
`3
`4
`5
`6
`7
`8
`9
`
`Basis
`Claims
`§103
`11, 12
`§103
`14
`§103
`13
`1-3, 6, 7, 10, 11 §103
`4
`§103
`11, 12
`§103
`13, 14
`§103
`16
`§103
`
`Prior Art
`Neufeld and Syvanne
`Neufeld and Fowler
`Neufeld and Fowler
`IPMI and Lawrence
`IPMI, Lawrence and Leedy
`IPMI, Lawrence, and Syvanne
`IPMI, Lawrence and Fowler
`IPMI, Lawrence and RFC1492
`
`III. THE 140 PATENT
`
`A.
`
`Overview of the 140 Patent
`
`The 140 patent was filed on October 20, 2004, and issued on January 29,
`
`2008. The 140 patent relates to remote management of network devices, e.g.,
`
`routers, in a secure manner. EX1002, 1:19-45 and 2:1-7. The 140 patent discloses
`
`including in a managed network device a “remote management access controller,”
`
`which is referred to as a “SMACC” (“Secure Management Access Control for
`
`Computer Chipset”) in some embodiments, that can be accessed by a remote
`
`administrator at a remote management center for the exchange of management
`
`communications to manage the network device. EX1002, 5:47-6:2. The 140 patent
`
`also discloses separating user traffic from device management traffic, logically
`
`and/or physically, both in the managed network device and while the management
`
`communications are in transit to the remote management access controller.
`
`EX1002, 4:12-14; 6:5-8. The remote management access controller has two types
`2
`
`1605282440
`
`

`

`of connections over which management communications can be exchanged with
`
`the remote management center: an in-band connection and an out-of-band
`
`connection. EX1002, 6:12-24; 11:60-12:4. On the in-band connection,
`
`management traffic is commingled with user traffic and a Virtual Management
`
`Interface (VMI) employs virtual private network (VPN) technology to provide
`
`logical separation of the management traffic from user data traffic. 6:24-33; 12:4-
`
`21. The out-of-band connection includes a SMACC Network Enabled
`
`Management Interface, which provides a dedicated, physically separate interface
`
`for the management network connection. EX1002, 12:22-36.
`
`B.
`
`Overview of the 140 Patent’s File History
`
`The examiner rejected independent claims over prior art referred to as
`
`Nessett. EX1004, 88 (11/2/06 Rejection at 2). In response, the applicant amended
`
`the claims substantially by introducing new limitations requiring a (1) “controller
`
`connected to one or more data bus for the communication of device management
`
`data” (emphasis added) (2) “an out-of-band access . . . for management of said
`
`network,” and (3) “virtual management interface connection means” that connects
`
`to the secure management access controller and provides logical separation of
`
`management data from user data. EX1004, 104 (4/3/07 Response at 2). The
`
`applicant asserted that the data bus-based connection between a secure
`
`management access controller and a network device was supported by ¶¶ 0019 and
`
`1605282440
`
`3
`
`

`

`0056 and Figure 28 in the specification of the 140 patent application. EX1004, 108
`
`(4/3/07 Response at 6). Although not explicitly stated, the “data bus-based
`
`connection between the secure management access controller is presumably the
`
`“SMACCI Bus” in Figure 28 below, which connects the SMACC Processor to the
`
`network device via the Bus Controller and the System PCI Bus.
`
`The applicant argued that Nessett does not teach or suggest a data bus
`
`connection between a secure management access controller and the managed
`
`device, or the communication of device management data over such a connection,
`
`1605282440
`
`4
`
`

`

`as recited by the amended independent claims. EX1004, 108 (4/3/07 Response at
`
`6). Independent claim 1 and all dependent claims 2-16 were allowed in response to
`
`these amendments and arguments. EX1004, 141 (9/6/07 NOA at 2).
`
`C.
`
`Priority Date of the 140 Patent
`
`The 140 patent is not entitled to any priority date earlier than 10/21/2003,
`
`which is the filing date of Provisional App. No. 60/512,777 to which the 140 patent
`
`claims priority. EX1002, 1.
`
`The 140 patent also claims priority as a continuation-in-part of U.S. Pat.
`
`App. No. 10/461,827 (the “827 application”) filed 6/13/2003 (EX1047). However,
`
`no claim of the 140 patent is entitled to that priority. The claims of the 140 patent
`
`all require “at least one secure management access controller connected to one or
`
`more data bus of said managed network device for the communication of device
`
`management data.” EX1002, 22:40-44 (the “Bus Limitation”). The 140 patent
`
`illustrates a direct connection between a SMACC and both a system bus and a
`
`CPU bus of a network device as shown in, for example, Fig. 1 below.
`
`1605282440
`
`5
`
`

`

`In view of this disclosure in Fig. 1, the scope of the Bus Limitation of claim 1 is
`
`broad enough to include direct connections of the SMACC to at least two busses of
`
`the managed network device regardless of whether the Bus Limitation is limited to
`
`direct connections to the busses.
`
`The 827 application, however, fails to disclose any direct connection of a
`
`“secure management access controller” to any bus of a managed network device,
`
`let alone a direct connection to two data busses of a managed network device as
`
`would be required to support the full scope of the Bus Limitation. In fact, the 827
`
`application does not even mention the word “bus.” EX1047, passim. This is not
`
`1605282440
`
`6
`
`

`

`surprising because the 827 application is primarily directed toward a stand-alone
`
`“secure remote management appliance” without any direct connection to a bus of a
`
`network device. EX1047, ¶[36]. This is in direct contrast to the 140 patent, which
`
`is primarily directed toward the embedded SMACC concept illustrated above in
`
`Fig. 1 of the 140 patent. While the 827 application indicates in ¶[36] that the
`
`disclosure is not limited to the “preferred exemplary embodiment” of a stand-alone
`
`device, the 827 application does not provide any detail about how other
`
`embodiments would be implemented other than to state that the features of the
`
`“preferred exemplary device . . . also can be combined with other hardware and
`
`software features such as being integrated with a modem or with the console of a
`
`device.” EX1047, ¶[36]. That disclosure does not provide written description
`
`support or enablement for the full scope of the Bus Limitation which includes an
`
`embedded SMACC directly connected to two busses of a managed network device
`
`as discussed above. Accordingly, no claim of the 140 patent – all of which include
`
`the Bus Limitation – is entitled to priority to the 827 application.
`
`D.
`
`Person of Ordinary Skill in the Art
`
`A person of ordinary skill in the art (“POSITA”) at the time of the alleged
`
`invention of the 140 patent would have had a Bachelors’ degree in electrical or
`
`computer engineering or a comparable field of study, plus approximately two to
`
`three years of professional experience in the field of computer and/or network
`
`1605282440
`
`7
`
`

`

`design and security or other relevant industry experience. Additional graduate
`
`education could substitute for professional experience, and significant experience
`
`in the field could substitute for formal education. EX1046, ¶54.
`
`E.
`
`Claim Construction Under 37 C.F.R. § 42.104(b)(3)
`
`The Challenged Claims are interpreted using the same claim construction
`
`standard that is used to construe the claim in a civil action in federal district court.
`
`37 C.F.R. § 42.100(b). Certain claim terms below have been construed in
`
`accordance with the district court’s claim construction (EX1042) in the Related
`
`Litigation (defined below in Section XIV.A). All terms of 140 patent not
`
`specifically addressed below should be construed according to their plain and
`
`ordinary meanings.
`
`Petitioner does not contend that its proposed constructions are complete
`
`constructions of these limitations or the claims for any other purpose, including for
`
`issues that have been raised in the related litigation. Because the prior art asserted
`
`herein discloses the preferred embodiment within the indisputable scope of the
`
`claims, the Board need not construe the outer bounds of the claims as part of these
`
`proceedings. The district court may have to address outer bounds of the claims in
`
`addressing infringement. See, e.g., Nidec Motor Corp. v. Zhongshan Broad Ocean
`
`Motor Co., 868 F.3d 1013, 1017 (Fed. Cir. 2017) (citing Vivid Techs., Inc. v. Am.
`
`Sci. & Eng’g, Inc., 200 F.3d 795, 803 (Fed. Cir. 1999)) (providing that only those
`
`1605282440
`
`8
`
`

`

`terms that are in controversy need be construed, and only to the extent necessary to
`
`resolve the controversy).
`
`1.
`
`“said managed network element” (claim 1)
`
`For the purposes of this IPR, this term should be construed to mean “said
`
`managed network device.” EX1046, ¶58.1
`
`2. Means-Plus-Function Terms (claims 1, 11, 13, 14 and 16)
`
`For the purposes of this IPR, Petitioner adopts the district court’s
`
`construction of the following means-plus-function terms in the Related Litigation.
`
`The scope of a means-plus-function claim term is limited to the structures,
`
`materials and acts that perform the identical claimed function or functions and that
`
`are identical or equivalent to those disclosed in the specification.
`
`1 Petitioner may take the position in the parallel district court case that the lack of
`
`antecedent basis renders this term indefinite. The construction provided in this
`
`Petition satisfies Petitioner’s obligation under 47 C.F.R. § 42.100(b)(3). IPR2022-
`
`00980, Paper 14, 11-12 (PTAB, 12/5/22) (“[N]or are we persuaded that
`
`Petitioner’s position that this term is indefinite . . . in a parallel district court
`
`proceeding, is fatal to its Petition.”).
`
`1605282440
`
`9
`
`

`

`3.
`
`Limitation [1.b]: “an out of band access connection means”
`
`a.
`
`Function:
`
`As recited in claim 1, the function performed by this claim element is
`
`“connecting said one or more network services or remote users with said secure
`
`management access controller for management of said network device”. EX1042,
`
`2.
`
`b.
`
`Structure:
`
`As determined by the district court in the Related Litigation, the
`
`corresponding structure is one or more of the following networks: a Public
`
`Switched Telephone Network (PSTN) (2:45-57, 3:2-4, 12:37-61), an Integrated
`
`Services Digital Network (ISDN) (2:45-57), a cellular network (6:14-21, 7:60-62,
`
`12:37-61), an Ethernet network (12:37-61), a wireless network, and/or a Digital
`
`Subscriber Line (DSL) (12:37-61, 15:55-60), where the one or more networks use
`
`one or more of the following protocols: SNMP, TFTP, FTP, DNS, SysLog, Telnet,
`
`SSH, HTTP, HTTPs, point to point IP, and/or XML (8:30-38). EX1042, 2-3.
`
`4.
`
`Limitation [1.c]: “virtual management interface connection
`means”
`
`a.
`
`Function:
`
`As recited in claim 1, the functions performed by this claim element are (i)
`
`“connecting said one or more network services or remote users with said secure
`
`management access controller”; (ii) “provides logical separation of management
`
`1605282440
`
`10
`
`

`

`data from user data,” and (iii) “utilizes user interfaces of said managed network
`
`element for connecting said one or more network services or remote users with
`
`said secure management access controller.” EX1042, 3.
`
`b.
`
`Structure:
`
`As determined by the district court in the Related Litigation, the
`
`corresponding structure is a virtual private network (VPN) (6:22-44, 6:63-7:5,
`
`12:5-21). EX1042, 3.
`
`5.
`
`Claim 11: “protection means”
`
`a.
`
`Function
`
`As recited in claim 11, the function performed by this claim element is
`
`“protecting the management data.” EX1042, 4.
`
`b.
`
`Structure
`
`The corresponding structures include a firewall (EX1002, 3:49-60), a virtual
`
`private network (VPN) (EX1002, 3:49-60), or a combination of a firewall, VPN,
`
`and authentication and authorization applications (EX1002, 6:22-7:6). EX1042, 4.
`
`6.
`
`Claim 13: “monitoring means for monitoring the status of
`at least one computer network component”
`
`a.
`
`Function
`
`As recited in claim 13, the function performed by this claim element is
`
`“monitoring the status of at least one computer network component.” EX1042, 5.
`
`1605282440
`
`11
`
`

`

`b.
`
`Structure
`
`The corresponding structure a processor performing an algorithm to monitor
`
`network components for loss of connectivity by testing the network connection
`
`(7:25-44, 17:50-18:4, 18:20-32, 21:13-65, FIGS. 15-16), or an uninterruptable
`
`power supply (UPS) that monitors network components for loss of external power
`
`(11:25-46, 18:33-51, 20:36-47, FIGS. 2 and 17). EX1042, 5.
`
`7.
`
`Limitation [14.b]: “a monitoring means for monitoring the
`status of the network power supply”.
`
`a.
`
`Function:
`
`As recited in claim 14, the function performed by this claim element is
`
`“monitoring the status of the network power supply.” EX1042, 5.
`
`b.
`
`Structure:
`
`The corresponding structure for performing the above-stated function is an
`
`uninterruptable power supply (UPS) that monitors network components for loss of
`
`power (11:25-46, 18:33-51, 20:36-47, FIGS. 2 and 17). EX1042, 5.
`
`8.
`
`Limitation [14.c] “reporting means for reporting the status
`of the network power supply”
`
`a.
`
`Function:
`
`As recited in claim 14, the function performed by this claim element is
`
`“reporting the status of the network power supply.” EX1042, 6.
`
`1605282440
`
`12
`
`

`

`b.
`
`Structure:
`
`The

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket