throbber

`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`__________________________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`__________________________________________
`
`
`
`Wombat Security Technologies, Inc.,
`Petitioner,
`
`v.
`
`PhishMe, Inc.,
`Patent Owner.
`
`____________________________
`
`U.S. PATENT NO. 9,591,017
`PGR2017-00047
`____________________________
`
`
`
`PETITION FOR POST-GRANT REVIEW OF U.S. PATENT 9,591,017
`
`Mail Stop Patent Board
`Patent Trial and Appeal Board
`U.S. Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`
`
`
`
`
`
`

`

`
`I.
`
`II.
`
`TABLE OF CONTENTS
`
`INTRODUCTION ......................................................................................... 1
`
`REQUIREMENTS AND MANDATORY NOTICES .................................. 3
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`Standing ............................................................................................... 3
`
`Real Party-in-Interest .......................................................................... 3
`
`Related Matters .................................................................................... 3
`
`1.
`
`2.
`
`3.
`
`Lawsuits .................................................................................... 3
`
`Post-grant Petitions ................................................................... 4
`
`Patent Family ............................................................................ 4
`
`Lead and Backup Counsel and Service Information ........................... 6
`
`Payment of Fees .................................................................................. 6
`
`III. OVERVIEW OF THE ‘017 PATENT .......................................................... 6
`
`A.
`
`B.
`
`C.
`
`Simulated Phishing Methods Described in the Specification ............. 6
`
`Person Having Ordinary Skill in the Art ............................................. 9
`
`Eligibility for PGR ............................................................................ 10
`
`1.
`
`2.
`
`3.
`
`4.
`
`First Post-AIA Limitation ....................................................... 11
`
`Second Post-AIA Limitation................................................... 14
`
`Related Applications ............................................................... 17
`
`Conclusion .............................................................................. 17
`
`IV. OVERVIEW OF THE CHALLENGE AND THE RELIEF
`REQUESTED .............................................................................................. 17
`
`V.
`
`CLAIM CONSTRUCTION ........................................................................ 19
`
`VI. DETAILED EXPLANATION FOR THE GROUNDS FOR
`UNPATENTABILITY ................................................................................ 23
`
`i
`
`

`

`A. Grounds 1 and 2: Failure to Satisfy the Written Description
`Requirement of § 112(a) ................................................................... 23
`
`1.
`
`2.
`
`Ground 1: Claims 1-6, 8, 11-16 and 18 Should Be
`Canceled Because Specification Does Not Disclose a
`Plug-in That Provides Graphically Displayed
`Confirmatory Feedback .......................................................... 24
`
`Ground 2 - The Specification Does Not Disclose a Plug-
`in That Sends the Identified Email for Analysis or
`Detection After it is Determined Not to be a Known
`Simulated Phishing Attack ...................................................... 27
`
`B.
`
`C.
`
`Ground 3: Claims 21-26 and 28 are Indefinite ................................. 28
`
`Obviousness Grounds 4, 5 and 6 ....................................................... 32
`
`1.
`
`2.
`
`3.
`
`Summary of Relied Upon Prior Art ........................................ 33
`
`Independent Claims ................................................................ 44
`
`Dependent Claims ................................................................... 74
`
`D. Ground 7: The Challenged Claims are Ineligible under § 101 ......... 79
`
`VII. CONCLUSION ............................................................................................ 85
`
`
`
`
`
`
`
`ii
`
`

`

`
`
`TABLE OF AUTHORITIES
`
`Cases
`Alice Corp. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014) ........................................... 80
`
`Allergan, Inc. v. Sandoz Inc., 796 F.3d 1293 (Fed. Cir. 2015) ................................ 23
`
`Ariad Pharm., Inc. v. Eli Lilly and Co., 598 F.3d 1336 (Fed. Cir.
`2010) .................................................................................................... 9, 12, 23, 24
`
`Aristocrat Techs. Austl. Pty Ltd. v. Int'l Game Tech., 521 F.3d 1328
`(Fed. Cir. 2008) ..................................................................................................... 29
`
`Atmel Corp. v. Info. Storage Devices, Inc., 198 F.3d 1374 (Fed. Cir. 1999) .......... 32
`
`Creston Elec., Inc. v. Intuitive Building Controls, Inc., IPR2015-01460,
`Paper 14 (PTAB January 14, 2016) ...................................................................... 40
`
`Cuozzo Speed Techs. LLC v. Lee, 136 S. Ct. 2131 (2016) ...................................... 19
`
`Digitech Image Techs., LLC v. Elecs. For Imaging, Inc., 758 F.3d 1344
`(Fed. Cir. 2014) ..................................................................................................... 81
`
`EON Corp. v. AT&T Mobility LLC, 785 F.3d 616 (Fed. Cir. 2015) ................. 29, 30
`
`Ex Parte Edgar, Appeal 2016-002223, 2017 WL 2493843 (PTAB June 7,
`2017) ..................................................................................................................... 22
`
`FairWarning IP, LLC v. Iatric Sys., Inc., 839 F.3d 1089 (Fed. Cir. 2016) ............. 83
`
`Helsinn Healthcare S.A. v. Teva Pharm. USA, Inc., 855 F.3d 1356 (Fed.
`Cir. 2017) .............................................................................................................. 33
`
`I/P Engine, Inc. v. AOL Inc., 576 Fed. Appx. 982 (Fed. Cir. 2014) ........................ 80
`
`In re Distefano, 808 F.3d 845 (Fed. Cir. 2015) ....................................................... 54
`
`In re Gosteli, 872 F.2d 1008 (Fed. Cir. 1989) ........................................................... 9
`
`iii
`
`

`

`In re Gulack, 703 F.2d 1381 (Fed. Cir. 1983) ......................................................... 54
`
`In re Hall, 781 F.2d 897 (Fed. Cir. 1986) ................................................................ 43
`
`In re TLI Commc’ns LLC Patent Litig., 823 F.3d 607 (Fed. Cir. 2016) ........... 81, 85
`
`In re Translogic Tech. Inc., 504 F.3d 1249 (Fed. Cir. 2007) .................................. 20
`
`Intellectual Ventures I LLC v. Symantec Corp., 838 F.3d 1307 (Fed. Cir.
`2016) ..................................................................................................................... 80
`
`Internet Patents Corp. v. Active Network, Inc., 790 F.3d 1343 (Fed.
`Cir. 2015) .............................................................................................................. 85
`
`IpLearn, LLC v. K12 Inc., 76 F.Supp.3d 525 (D. Del. 2014) .................................. 82
`
`KSR Int’l Co. v. Teleflex Inc., 127 S. Ct. 1727 (2007) ..................................... 56, 67
`
`Lockwood v. American Airlines, 107 F.3d 1565 (Fed. Cir. 1997) .................... 23, 24
`
`Minton v. National Ass’n of Securities Dealers, Inc., 336 F.3d 1373 (Fed.
`Cir. 2003) .............................................................................................................. 33
`
`Multimedia Plus, Inc. v. Playerlync, LLC, 198 F.Supp.3d 264 (S.D.N.Y.
`2016) , aff’d 2017 WL 3498637 (Fed. Cir. Aug. 16, 2017) ................................. 82
`
`Mylan Pharm Inc. v. Yeda Res. & Dev. Co., PGR2016-00010, Paper 9 at
`10 (PTAB Aug. 15, 2016) ..................................................................................... 10
`
`Nike, Inc. v. Adidas AG, 812 F.3d 1326 (Fed. Cir. 2016) ........................................ 67
`
`Noah Sys., Inc. v. Intuit Inc., 675 F.3d 1302 (Fed. Cir. 2012) ................................. 28
`
`PowerOasis, Inc. v. T-Mobile USA, Inc., 522 F.3d 1299 (Fed. Cir. 2008) ............. 10
`
`Robert Bosch, LLC v. Snap-On Inc., 769 F.3d 1094 (Fed. Cir. 2014) ............. 21, 28
`
`Sogue Holdings (Bermuda) Ltd. v. Keyscan, Inc., 2010 WL 2292316
`(N.D. Cal. June 7, 2010) ....................................................................................... 22
`
`Synopsis, Inc. v. Mentor Graphics Corp., 839 F.3d 1138 (Fed. Cir. 2016) ............ 83
`
`iv
`
`

`

`Turbocare Div. of Demag Delaval Turbomachinery Corp. v. General
`Electric Co., 264 F.3d 1111 (Fed. Cir. 2001) ................................................ 23, 24
`
`Williamson v. Citrix Online, LLC, 792 F.3d 1339 (Fed.
`Cir. 2015) ...................................................................................................... passim
`
`Statutes
`35 U.S.C. § 101 ............................................................................................... passim
`
`35 U.S.C. § 102 ............................................................................................... passim
`
`35 U.S.C. § 103 ............................................................................................... passim
`
`35 U.S.C. § 112(a) ........................................................................................... passim
`
`Regulations
`37 C.F.R. § 42.200(b) .............................................................................................. 19
`
`
`
`
`
`
`
`
`
`
`v
`
`

`

`
`
`Exhibit No.
`
`TABLE OF EXHIBITS
`
`Description
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`U.S. Patent 9,591,017
`
`Complaint for Patent Infringement, PhishMe Inc. v. Wombat
`Security Technologies, Inc., June 16, 2017
`
`Complaint for Patent Infringement, PhishMe Inc. v. Wombat
`Security Technologies, Inc., June 1, 2016
`
`First Amended Complaint for Patent Infringement, PhishMe Inc.
`v. Wombat Security Technologies, Inc., July 19, 2016
`
`Second Amended Complaint for Patent Infringement, PhishMe
`Inc. v. Wombat Security Technologies, Inc., September 6, 2016
`
`Consolidation Order, PhishMe Inc. v. Wombat Security
`Technologies, Inc., Case No. 16-403-LPS-CJB and 17-769-LPS-
`CJB, June 28, 2017
`
`Decision Denying Institution of Post-Grant Review, PGR2017-
`00009, Patent No. 9,398,038, Paper 7, June 8, 2017
`
`Petitioner’s Request for Rehearing, PGR2017-00009, Patent No.
`9,398,038, Paper 8, June 20, 2017
`
`Decision Denying Request for Rehearing, PGR2017-00009,
`Patent No. 9,398,038, Paper 9, July 20, 2017
`
`Declaration of Aviel Rubin, Ph.D.
`
`Application Serial No. 13/765,538, filed February 8, 2013
`
`Application Serial No. 13/785,252, filed March 5, 2013
`
`Redline comparison between Application Serial No. 13/785,252
`and Application Serial No. 13/765,538
`
`Cisco IronPort Email Security Plug-in 7.1 Administrator Guide,
`Cisco Systems, Inc., December 6, 2010
`
`vi
`
`

`

`Exhibit No.
`
`Description
`
`1015
`
`1016
`
`1017
`
`1018
`
`1019
`
`1020
`
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`1026
`
`1027
`
`Keno Albrecht, “Mastering Spam: A Multifaceted Approach with
`the Spamato Spam Filter System,” Swiss Federal Institute of
`Technology Zurich, 2006
`
`Fahmida Y. Rashid, “PhishGuru,” PC Mag,
`www.pcmag.com/article2/0,2817,2404750,00.asp, May 25, 2012
`
`Declaration of Kurt Wescoe
`
`Declaration of Ralph Massaro
`
`“Leading Computer Science University Takes Multi-Pronged
`Approach to Combat Phishing; Deploys Wombat Security’s
`Highly Effective Suite of Training and Filtering Products,” March
`10, 2011
`
`“A Multi-Pronged Approach To Combat Phishing,” Wombat
`Security Technology, March 2011
`
`File History of U.S. Patent 9,591,017 (Serial No. 15/138,188)
`from PAIR (without foreign references)
`
`P. Kumaraguru et al., “Lessons From a Real World Evaluation of
`Anti-Phishing Training,” eCrime Researchers Summit, 15-16
`October 2008
`
`P. Kumaraguru, “PhishGuru: A System for Educating Users about
`Semantic Attacks,” Ph.D. Thesis, Carnegie Mellon University,
`April 14, 2009
`
`Declaration of Alan Himler
`
`Declaration of Elizabeth Whittington
`
`Ex parte Schulhauser, Appeal 2013-007847 (PTAB April 28,
`2016)
`
`Redline comparison of claim 11 of U.S. Patent 9,591,017 to claim
`1 of U.S. Patent 9,591,017
`
`vii
`
`

`

`Exhibit No.
`
`Description
`
`1028
`
`1029
`
`1030
`
`1031
`
`1032
`
`Declaration of Steve Hicks
`
`U.S. Pub. No. 2012/0124671 A1 to Fritzson et al.
`
`Application Serial No. 13/763,486, filed February 8, 2013
`
`Application Serial No. 13/763,515, filed February 8, 2013
`
`Redline comparison of claim 21 of U.S. Patent 9,591,017 to claim
`1 of U.S. Patent 9,591,017
`
`viii
`
`

`

`I.
`
`INTRODUCTION
`
`Wombat Security Technologies, Inc. (“Wombat”) requests post-grant review
`
`(PGR) of claims 1-6, 8, 11-16, 18, 21-26 and 28 (“Challenged Claims”) of U.S.
`
`Patent No. 9,591,017 (“the ’017 Patent,” Ex. 1001). The ’017 Patent is assigned to
`
`PhishMe, Inc. (“PhishMe”).
`
`The ’017 Patent relates to simulated phishing campaigns to educate email
`
`recipients about the dangers of phishing attacks. A phishing attack is “a message,
`
`commonly in the form of an e-mail,” from an attacker “directing the individual
`
`[i.e., the recipient] to perform an action, such as opening an e-mail attachment or
`
`following … an embedded link” to a fraudulent, phishing webpage. Ex. 1001, col.
`
`1:30-35. If the recipient opens the attachment or follows the link of an actual
`
`phishing email, harmful results can occur, such as installation of malicious
`
`software on the recipient’s computer. Id., col. 1:38-50.
`
`To “make individuals more knowledgeable about phishing attacks,” the ‘017
`
`Patent proposes an “education process” by which “individuals are subjected to
`
`simulated phishing attacks, which are designed to resemble actual phishing
`
`attacks.” Id., col. 1:59-63. For those email recipients who fall victim to the
`
`simulated attack, training is provided. Id., col. 2:1-2. For those who identify a
`
`known simulated phishing email as a possible phishing attack, feedback is
`
`provided. Id., col 2:4-9.
`
`
`
`

`

`Simulated phishing campaigns existed many years prior to the priority date
`
`for the ‘017 Patent. Researchers at Carnegie Mellon University (CMU) published
`
`about them at least by 2008. Exs. 1022-1023. They called their system
`
`“PhishGuru” and Wombat commercialized it. Ex. 1023 at 66. Wombat’s Anti-
`
`Phishing System, of which PhishGuru was a part, qualifies as prior art and
`
`discloses most of the limitations of the Challenged Claims. It does not disclose an
`
`email client plug-in through which the email recipient can report a received email
`
`as a phishing attack, but such plug-ins were commonplace in the prior art. The
`
`Challenged Claims of the ‘017 Patent, therefore, are obvious.
`
`Additionally, the Challenged Claims are invalid under 35 U.S.C. § 112(a)
`
`for failing to satisfy the written description requirement and the system claims are
`
`indefinite under § 112(b) because they include mean-plus-function claim elements
`
`without reciting sufficient corresponding structure in the specification. Finally, the
`
`Challenged Claims are directed to an abstract education process and are ineligible
`
`under § 101.
`
`Wombat petitions for cancellation of the Challenged Claims under 35 U.S.C.
`
`§§ 101, 103 and § 112.1 This petition is supported by an expert declaration from
`
`Prof. Aviel Rubin of Johns Hopkins University. Ex. 1010.
`
`1 The AIA versions of 35 U.S.C. §§ 102, 103 and 112 apply to the ‘017 Patent. All
`
`references herein to §§ 102, 103 and 112 are to their AIA versions.
`
`2
`
`

`

`II. REQUIREMENTS AND MANDATORY NOTICES
`A.
`Standing
`Wombat certifies that (a) before the date on which this petition is being
`
`filed, neither Wombat nor any real party-in-interest filed a civil action challenging
`
`the validity of a claim of the ’017 Patent; and (b) neither Wombat nor any real
`
`party-in-interest or privy of Wombat is estopped from challenging the claims on
`
`the grounds described herein.
`
`B. Real Party-in-Interest
`The real party-in-interest is Wombat Security Technologies, Inc. Wombat
`
`Security Technologies UK Ltd., a subsidiary of Wombat, can also be considered a
`
`real party-in-interest.
`
`C. Related Matters
`1.
`Lawsuits
`
`PhishMe sued Wombat in the United States District Court of Delaware on
`
`June 16, 2017, styled PhishMe, Inc. v. Wombat Security Technologies, Inc., No.
`
`1:17-cv-00769-LPS-CJB (“the Second Lawsuit”) for infringement of the ‘017
`
`Patent and a related patent, Patent 9,674,221 (“the ‘221 Patent”). Ex. 1002.
`
`On May 31, 2016, PhishMe sued Wombat in the same court, Case No. 1:16-
`
`cv-00403-LPS (“the First Lawsuit”), asserting, U.S. Patent 9,356,948 (“the ‘948
`
`Patent”) a predecessor of the ‘017 and ‘221 Patents. Ex. 1003. On July 19, 2016,
`
`PhishMe amended its complaint in the First Lawsuit to add another predecessor
`
`3
`
`

`

`patent, U.S. Patent 9,398,038 (“the ‘038 Patent”). Ex. 1004. On September 6,
`
`2016, PhishMe dropped the ‘948 Patent from the First Lawsuit. Ex. 1005.
`
`On June 28, 2017, the district court consolidated the First and Second
`
`Lawsuits. Ex. 1006. As of the date of this petition, the court has not ruled on
`
`claim construction or validity regarding any of the patents.
`
`2.
`
`Post-grant Petitions
`
`Wombat requested post-grant review and inter partes review of the ‘038
`
`Patent. The Board denied Wombat’s request for PGR, Ex. 1007, and its request for
`
`rehearing. Ex. 1008-1009. Wombat filed an IPR petition for the ‘038 Patent on
`
`July 18, 2017. The case numbers for the PGR and IPR petitions are PGR2017-
`
`00009 and IPR2017-01813 respectively.
`
`3.
`
`Patent Family
`
`The ‘017 Patent claims priority to several predecessor patents and a couple
`
`applications claim priority to it as shown in the chart below.
`
`4
`
`

`

`Serial No. 13/763,538
`
`Filed Feb. 8, 2013 Now US. Patent 9,253,207
`
`CONTINUATION
`
` Now US. Patent 8,719,940
`
`Serial No. 13/785,252
`F'l dM .5 2013
`1e
`ar
`,
`
`CONTINUATION-IN- ’ ART
`
`Subject of 1st
`Lawsuit
`
`Serial No. 13/918,702
`
`FiledJune 14) 2013 I Subject ofpriorPGR and
`
`.
`
`.
`
`IPR Petltlons CONTINUATION-IN ' ART
`
`Now US. Patent 9,398,038
`
`Serial No. 13/958,480
`
`Filed Aug. 2, 2013
`
`Now US. Patent 9.356,948
`
`CONTINUATION
`
`Serial No. 14/620,245
`
` Now US. Patent 9.325,730
`
`Filed Feb. 12, 2015
`
`CONTINUATION
`
`Subject of 2nd
`Lawsuit
`
`Subject of this PGR Petition
`
`Serial No. 15/138,188
`
`Filed Apr. 25, 2016
`
`I
`
`Now US. Patent 9.591,017
`
`Now US. Patent 9,674,221
`
`Serial No. 15/418,709
`
`Filed Jan. 28, 2017
`
`Relationship unknown
`
`Serial No. 15/583,970
`
`Filed May 1, 2017 Unpublished
`
`5
`
`
`
`

`

`D. Lead and Backup Counsel and Service Information
`
`
`Lead Counsel
`
`
`
`
`Backup Counsel
`
`Mark G. Knedeisen
`Reg. No. 42,747
`mark.knedeisen@klgates.com
`T: 412-355-6342
`Patrick J. McElhinny
`Reg. No. 46,320
`patrick.mcelhinny@klgates.com
`T: 412-355-6334
`Laurén S. Murray
`Reg. No. 67,462
`lauren.murray@klgates.com
`T: 412-355-7471
`
`
`
`All listed counsel are with K&L Gates, LLP, 210 Sixth Avenue, Pittsburgh,
`
`PA 15222. A power of attorney designating the above-identified counsel is being
`
`filed with this petition. Wombat consents to electronic service by email.
`
`Payment of Fees
`
`E.
`Wombat authorizes the Office to charge the required fees for PGR of
`
`twenty-one (21) claims, and any additionally required fees, to Deposit Account No.
`
`02-1818.
`
`III. OVERVIEW OF THE ‘017 PATENT
`A.
`Simulated Phishing Methods Described in the Specification
`The ’017 Patent describes a manner to educate individuals about phishing
`
`attack risks by sending simulated, non-malicious phishing emails to the individuals
`
`and tracking the individuals’ responses. In Figure 1 of the ’017 Patent (below), a
`
`6
`
`

`

`“network device 14” sends simulated phishing emails that “resemble real phishing
`
`attacks” to computing devices 16-20 of the intended recipients (referred to in the
`
`’017 Patent as “users” and “individuals”). Ex. 1001, col. 3:48-53. The simulated
`
`phishing emails include information that can be used later to identify them as
`
`simulated phishing emails, such as a “sender identifier,” a “recipient identifier,” a
`
`subject or time of transmission of the message, or “message headers.” Id., col.
`
`7:45-48. A database 24 stores data (e.g., a log) about the sent simulated phishing
`
`emails. Id., col. 3:60-61; Figs. 1-2.
`
`The individuals’ computers 16, 18, 20 can have an email client “plug-in” so
`
`that when an individual receives a suspected phishing email, the individual can
`
`
`
`7
`
`

`

`activate a “graphical user interface element” of the plug-in to report the received
`
`email as a potential phishing attack. Id., col. 7:17-22. Accordingly, a “network
`
`device” sends the simulated phishing emails, and a recipient thereof (i.e., a “user”
`
`or “individual”) can report a received email as a potential phishing email using the
`
`email client plug-in on the recipient’s computer.
`
`When the individual reports a received email, either the network device 14
`
`or the email client plug-in determines whether the identified email is a known
`
`simulated phishing email. Id., col. 4:39-42 (network device); col. 4:59-col. 5:7
`
`(plug-in); col. 7:42-60 (both). If the identified email is determined to be a known
`
`simulated phishing email, the system provides feedback to the individual
`
`confirming that the email was a simulated phishing email. Id., col. 2:4-9; col.
`
`4:19-26; col. 7:61-col.8:2. The ’017 Patent does not identify the device or
`
`component that provides the feedback, stating only in passive voice that the
`
`confirmatory feedback “may be provided …in the form of an email message, or an
`
`out-of-band message, such as an SMS message or other message.” Id., col. 4:22-
`
`26; col. 7:65-col.8:2.
`
`The network device 14 records in a database 26 the individuals’ responses to
`
`the simulated phishing emails, i.e., whether they reported the email, ignored it, or
`
`fell for it. Id., col. 3:61-63; col. 5:42-56; col. 7: 61-64; Figs. 1, 3. The network
`
`device 14 uses the response data to calculate trustworthiness scores for the
`
`8
`
`

`

`individuals that are indicative of the individuals’ abilities to identify potential
`
`phishing emails. Id., col. 5:57-col.7:5. If the identified email is determined not to
`
`be a known simulated phish, “a computer security expert” or “computer software
`
`configured to detect phishing attacks” can analyze the email to determine if it is a
`
`real phishing attack. Id., col. 2:22-28.
`
`The ‘017 Patent also incorporates two “Related Applications”―Serial Nos.
`
`13/763,486 and 13/763,515 (Exs. 1030-1031)―at col. 1:14-17.
`
`Person Having Ordinary Skill in the Art
`
`B.
`The skill level of a “person having ordinary skill in the art” (“PHOSITA”) to
`
`which the ’017 Patent pertains would have a bachelor’s degree or the equivalent in
`
`computer science (or a related academic field) and at least two to three years of
`
`additional experience in the computer security field, or equivalent work
`
`experience, and would have familiarity with phishing email attacks and spam and
`
`phishing email filters. Ex. 1010, ¶ 44.
`
`“Any person skilled in the art” for the written description and enablement
`
`standards of § 112(a) has the same skill level as a PHOSITA for the obviousness
`
`assessment. See In re Gosteli, 872 F.2d 1008, 1012 (Fed. Cir. 1989); Ariad
`
`Pharm., Inc. v. Eli Lilly and Co., 598 F.3d 1336, 1351 (Fed. Cir. 2010) (en banc).
`
`The relevant time for assessing the validity of the claims of the ’017 Patent
`
`is prior to June 14, 2013 for the reasons described below. All references below to
`
`9
`
`

`

`the knowledge of a PHOSITA pertain to his/her knowledge prior to June 14, 2013
`
`unless otherwise indicated.
`
`C. Eligibility for PGR
`The standard for PGR eligibility is more likely than not that the patent has at
`
`least one claim having an effective filing date on or after March 16, 2013. Mylan
`
`Pharm Inc. v. Yeda Res. & Dev. Co., PGR2016-00010, Paper 9 at 10 (PTAB Aug.
`
`15, 2016). The chart above shows that the lineage of the ‘017 patent includes two
`
`applications filed prior to March 16, 2013―Serial No. 13/763,538 (“the ‘538
`
`Application,” Ex. 1011) and Serial No. 13/785,252 (“the ‘252 Application,” Ex.
`
`1012). Their specifications are virtually identical. Ex. 1013 (redline comparison).
`
`The ‘017 Patent is eligible for PGR because it has at least one claim that is
`
`not entitled to the filing dates of either the ‘538 or ‘252 Applications. Indeed, each
`
`independent claim of the ‘017 Patent includes subject matter that is not disclosed in
`
`either of these pre-March-16-2013 applications. Thus, the claims are not entitled
`
`to a priority date prior to March 16, 2013. PowerOasis, Inc. v. T-Mobile USA, Inc.,
`
`522 F.3d 1299, 1306 (Fed. Cir. 2008) (subject matter disclosed for first time in a
`
`continuation-in-part does not receive benefit of the parent’s filing date).
`
`Presumably for that reason, the Office examined the ‘017 Patent under the first-to-
`
`file AIA provisions, Ex. 1021 at 15, and PhishMe did not object.
`
`The new subject matter in every independent claim is twofold.
`
`10
`
`

`

`1.
`
`First Post-AIA Limitation
`
`The ‘252 or ‘538 Applications do not support the following imitation recited
`
`in claims 1 and 11: “providing a plug-in for an email client at the remote
`
`computing device, the plug-in configurable for executing instructions for … when
`
`the identified email is determined to be a known simulated phishing attack …,
`
`providing a graphically displayed feedback to the individual confirming that the
`
`identified email was a simulated phishing attack….” Claim 21 recites a similar
`
`limitation.
`
`The ‘252 or ‘538 Applications fail to disclose the subject matter of these
`
`limitations because the ‘252 and ‘538 Applications do disclose neither (1)
`
`“graphically displayed” confirmatory feedback when the individual correctly
`
`identifies a simulated phishing email nor (2) a plug-in (for method claims 1-20) or
`
`a remote computing device (for claims 21-30) that provides confirmatory feedback.
`
`Neither the ‘252 nor ‘538 Applications disclose the graphically displayed
`
`confirmatory feedback limitation in haec verba. Ex. 1007 at 11 (“the exact words
`
`used in the feedback limitation may not appear in the ‘252 Application
`
`…”). These applications make general references to “education” and “training”
`
`in two paragraphs,2 but that minimal disclosure insufficiently shows that the
`
`2 The content and numbering of the two paragraphs in the ‘252 and ‘538
`
`Application are the same. Ex. 1013.
`
`11
`
`

`

`inventors possessed the confirmatory feedback limitations. See Ariad, 598 F.3d at
`
`1351 (“the hallmark of written description is disclosure”).
`
`• Paragraph [0005] states that: “In an education process, individuals are
`
`subjected to simulated phishing attacks, which are designed to
`
`resemble actual phishing attacks. In response to a simulated attack, an
`
`individual typically either falls victim to it, ignores the attack,
`
`consciously chooses to not react or additionally reports the attack
`
`too…. For those that fall victim to an attack, training is provided to
`
`decrease the likelihood that they will be deceived by a future
`
`simulated and/or real phishing attack.” (emphasis added); and
`
`• Paragraph [0018] states that “simulated phishing attacks are designed
`
`to resemble real phishing attacks in order to train the users of
`
`computing devices 16, 18 and 20 to better recognize and thwart a real
`
`phishing attack.” (emphasis added).
`
`Neither of these paragraphs demonstrates to a PHOSITA that the inventors
`
`possessed the claimed limitation of a plug-in or a remote computing device
`
`providing “graphically displayed” confirmatory feedback. Both paragraphs are
`
`insufficient because the training could be provided in response to the individual
`
`falling for (or being deceived by) a simulated attack, instead of correctly spotting
`
`one. Ex. 1010, ¶¶ 54-59. Indeed, ¶ [0005] refers exclusively to training provided
`
`12
`
`

`

`to those who fall victim to the simulated attack. Ex. 1007 at 12 (¶ [0005] does not
`
`disclose the claimed confirmatory feedback). Moreover, neither paragraph
`
`mentions that the feedback is provided by an email client plug-in, as required by
`
`claims 1-20, or by a remote computing device, as required by claims 21-
`
`30. Because of this omission, a PHOSITA would conclude that the inventors did
`
`not possess that the plug-in or remote computing device would provide the
`
`confirmatory feedback at the time that the ‘252 and ‘538 Applications were filed.
`
`Ex. 1010, ¶¶ 55-59.
`
`The ‘252 and ‘538 Applications refer to the email client plug-in (Exs. 1012-
`
`1013 at ¶¶ [0022], [0029]), but never mention that the feedback is provided by the
`
`plug-in. And it is not inherent or implicit that the training described in ¶¶ [0005]
`
`and [0018] is provided by a plug-in or the remote computing device since it could
`
`be provided on another computer device. Ex. 1010, ¶¶ 56-58. Indeed, a
`
`PHOSITA would understand the specification as indicating that an external device
`
`provides the feedback, not the plug-in. Id. at ¶ 71.
`
`The insufficient disclosure of the ‘252 and ‘538 Applications with respect to
`
`this limitation extends to the ‘017 Patent itself as described in Ground 1 below at
`
`pp. 24-26, which is incorporated herein by reference.
`
`
`
`
`
`13
`
`

`

`2.
`
`Second Post-AIA Limitation
`
`The ‘252 and ‘538 Application also do not support the limitation recited in
`
`claims 1 and 11 as: “providing a plug-in for an email client at the remote
`
`computing device, the plug-in configurable for executing instructions for … when
`
`the identified email is determined not to be a known simulated phishing attack …,
`
`causing the plugin to send the identified email for analysis or detection of whether
`
`or not the identified email is a phishing attack….” Claim 21 includes a
`
`corresponding limitation.
`
`These limitations require the plug-in to send the identified email for analysis
`
`or detection after it is determined not to be a known simulated phishing attack, but
`
`the ‘252 and ‘538 Applications do not disclose this limitation. Instead, the two
`
`applications disclose that, after the plug-in determines that the identified email is
`
`not a known simulated phishing email, the computing device 18 “could query
`
`network device 14 to determine the trustworthiness level of the individual who
`
`flagged the message….” Ex. 1011-1012 at ¶ [0022]. This teaching does not
`
`disclose sending the identified email for analysis or detection, and a PHOSITA
`
`would not understand from it that the inventors possessed that the plug-in would
`
`send the email for analysis or detection in response to determining that the
`
`identified email is not a known simulated phishing attack. Ex. 1010, ¶¶ 60-62.
`
`14
`
`

`

`In response to receiving the trustworthiness level, the plug-in still does not
`
`send the email for analysis or detection according to the ‘252 and ‘538
`
`Applications. Instead, “computing device 18 could alert network device 14, a
`
`network security appliance…, and/or a security event responder … that a potential
`
`malicious message was able to thwart security measures and that additional
`
`security measures should be taken to ensure that such messages (e.g., messages
`
`from same sender as flagged message) are blocked in the future.” Exs. 1011-1012
`
`at ¶ [0022]. Thus, the two applications disclose blocking the sender of the non-
`
`known-simulated phishing email. This does not require sending the email
`
`anywhere. Instead, just the email’s header, including the sender information, could
`
`be sent to the network security application so that the appliance could update its
`
`filters to block the sender. Ex. 1010, ¶ 63. Consequently, a PHOSITA would not
`
`immediately discern, visualize or recognize that the inventors possessed systems
`
`and methods where the plug-in or remote computing device sends the user-
`
`reported, non-known simulated phishing email for analysis or detection.
`
`The ‘252 and ‘538 Applications disclose the plug-in sending the email to the
`
`network device for analysis or detection, but only in response to the user reporting
`
`an email, Exs. 1011-1012 at ¶ [0029], not in response to the plug-in determining
`
`that the user-reported email is a non-known simulated phishing email. The
`
`network device determines whether the email is a known simulated phishing email
`
`15
`
`

`

`specification only after the plug-in sends the email. Id. at ¶ [0030]. Thus, this
`
`disclosure insufficiently demonstrate

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket