throbber
Paper No. 12
`Trials@uspto.gov
`571-272-7822
`
`Date Entered: 8 April 2013
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`_____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`WOWZA MEDIA SYSTEMS, LLC
`and COFFEE CUP PARTNERS, INC.
`Petitioner
`
`v.
`
`ADOBE SYSTEMS INCORPORATED
`Patent Owner
`____________
`
`Case IPR2013-00054 (TLG)
`Patent 8,051,287 B2
`____________
`
`Before HOWARD B. BLANKENSHIP, THOMAS L. GIANNETTI, and
`MICHAEL J. FITZPATRICK, Administrative Patent Judges.
`
`BLANKENSHIP, Administrative Patent Judge.
`
`
`DECISION
`DENYING INTER PARTES REVIEW
`37 C.F.R. § 42.108
`
`
`
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 1
`
`

`

`
`
`IPR2013-00054
`Patent 8,051,287 B2
`
`
`
`I. BACKGROUND
`Petitioner requests inter partes review of claims 1-3, 5, 6, 10, 12-14, 16, 17,
`
`21, 23-26, 28, 29, and 33 of the '287 patent under 35 U.S.C. §§ 311 et seq. Patent
`Owner submitted a preliminary response under 37 C.F.R. § 42.107(b) on February
`20, 2013. Paper No. 11. We have jurisdiction under 35 U.S.C. § 314.
`The standard for instituting an inter partes review is set forth in 35 U.S.C.
`
`§ 314(a), which provides as follows:
`
`THRESHOLD -- The Director may not authorize an inter partes review to be
`
`instituted unless the Director determines that the information presented in
`
`the petition filed under section 311 and any response filed under section 313
`
`shows that there is a reasonable likelihood that the petitioner would prevail
`
`with respect to at least 1 of the claims challenged in the petition.
`
`For the reasons that follow, the Board, acting on behalf of the Director,
`
`denies the petition.
`
`A. The '287 Patent (EX 1001)
`The challenged patent relates to establishing an encrypted communication
`session. Figure 1 of the '287 patent is reproduced below.
`
`2
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 2
`
`

`

`Patent 88,051,287 BB2
`
`
`IPR2013-00054
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`FFigure 1 is said to deppict a netwwork enviroonment 1000 that incluudes a servver
`
`a
`
`
`
`
`110 (e.gg., a FLASH® Mediaa Server), ccommunic
`ating over
`
`a networkk 120 with
`ll.
`
`
`
`
`first clieent computter 130 andd a second client commputer 1400. '287 pateent col. 8,
`
`
`
`9-15.
`
`
`
`
`
`
`
`
`HHandshakess 150a andd 150b preccede the seessions 1355 and 145 aand can
`
`as such. IId. at
`
`
`
`
`
`include cryptograpphic informmation thatt client 1300 may not
`recognize
`
`
`
`
`ll. 15-188. Howeveer, the secoond client computer
`
`
`
`140 may innclude a neewer versioon
`
`
`
`
`
`
`
`
`of softwware (e.g., aa newer FLLASH® Pllayer progrram) that ccan start ann encryptedd
`
`
`session 145 with tthe server ccomputer. Id. at ll. 556-59.
`
`
`
`
`3
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 3
`
`

`

`IPR2013-00054
`Patent 8,051,287 B2
`
`
`
`
`
`Each handshake 150a and 150b may include a block of bytes that contain
`random data. Id. at ll. 25-30. In particular, cryptographic information (e.g., for
`use in an encryption key establishment protocol) can be included in a previously
`existing section of the handshake 150 known to contain random bytes, allowing the
`cryptographic information to be “hidden in plain sight” because the cryptographic
`information appears to be random. Reverse engineering attempts (i.e., attempts to
`discover the details of the communication protocol) can thus be handicapped while
`providing interoperability with existing software. Id. at col. 7, l. 67 - col. 8, l. 8;
`col. 9, ll. 23-46.
`
`B. Representative Claim
`Of the challenged claims, claims 1, 10, 12, 21, 23, and 33 are independent.
`For purposes of this decision, claim 1 is representative. Each of the other
`independent claims contains the same or substantially similar limitations to those
`emphasized in claim 1, below. Further, in challenging each of the independent
`claims, Petitioner relies on the same arguments with respect to the limitations in
`controversy as represented by claim 1.
`
`1.
`
`establishing, based at least in part on cryptographic
`
`information in a pre-defined portion of a handshake network
`communication, a communication session to communicate a media
`stream, wherein the pre-defined portion of the handshake network
`communication is reserved for random data;
`
`receiving through the communication session, as part of the
`
`media stream, values of parameters relating to a sub media stream,
`included in a first header portion of a first real-time, priority-based
`network communication;
`
`A method comprising:
`
`4
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 4
`
`

`

`
`
`
`
`IPR2013-00054
`Patent 8,051,287 B2
`
`
`storing the values of the parameters;
`
`
`
`
`obtaining through the communication session, as part of the
`
`media stream, state information included in a control portion of a
`second real-time, priority-based network communication and a data
`payload included in the second network communication;
`
`identifying, from the state information, a purpose of the second
`
`network communication in relation to the media stream, and whether
`a second header portion of the second network communication
`includes one or more new values corresponding to one or more of the
`parameters;
`
`updating, when the second header portion includes the one or
`
`more new values, one or more of the stored values based at least in
`part on the one or more new values; and
`
`processing the data payload based at least in part on the
`
`identified purpose and the stored values of the parameters.
`
`(Emphasis added.)
`
`C. Claim Construction
`As a step in our analysis for determining whether to institute a trial, we
`determine the meaning of the claims. Consistent with the statute and the
`legislative history of the AIA, the Board will construe the claims using the
`broadest reasonable interpretation. See Office Patent Trial Practice Guide, 77 Fed.
`Reg. 48756, 48766 (Aug. 14, 2012); 37 CFR § 100(b). The claim language should
`be read in light of the specification as it would be interpreted by one of ordinary
`skill in the art. In re Am. Acad. of Sci. Tech. Ctr., 367 F.3d 1359, 1364 (Fed. Cir.
`2004). The Office must apply the broadest reasonable meaning to the claim
`
`5
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 5
`
`

`

`
`
`IPR2013-00054
`Patent 8,051,287 B2
`
`
`language, taking into account any definitions presented in the specification. Id.
`(citing In re Bass, 314 F.3d 575, 577 (Fed. Cir. 2002)).
`There is a “heavy presumption” that a claim term carries its ordinary and
`customary meaning. CCS Fitness, Inc. v. Brunswick Corp., 288 F.3d 1359, 1366
`(Fed. Cir. 2002). By “ordinary meaning” we refer to e.g., Biotec Biologische
`Naturverpackungen GmbH & Co. KG v. Biocorp, Inc., 249 F.3d 1341, 1349 (Fed.
`Cir. 2001) (finding no error in non-construction of “melting”); Mentor H/S, Inc. v.
`Med. Device Alliance, Inc., 244 F.3d 1365, 1380 (Fed. Cir. 2001) (finding no error
`in court’s refusal to construe “irrigating” and “frictional heat”).
`Petitioner submits proposed constructions for several terms. Pet. 5-6.
`However, of the constructions that are proposed by Petitioner, only the phrase
`“reserved for random data” is material for purposes of this decision. Petitioner
`submits that rather than its plain and ordinary meaning, “reserved for random data”
`is to be construed as “[r]eserved for data produced in a manner where there was an
`equal or approximately equal probability for each possible value.” However,
`Petitioner provides no reasoning or evidence in support of why the phrase should
`not be interpreted in accordance with its ordinary meaning. Accordingly, we do
`not adopt Petitioner’s special meaning for the claim phrase “reserved for random
`data.”
`A claim term that is more pertinent to the issues raised in the Petition and
`Preliminary Response than those raised by Petitioner is the word “pre-defined” as
`used in representative claim 1. The '287 patent does not set forth or otherwise
`indicate any special meaning for the term “pre-defined.” The dictionary definition
`of the transitive verb “predefine” is “to define or determine in advance.”
`Webster’s Third New International Dictionary, Unabridged (1993). We conclude
`that this comports with the plain and ordinary meaning, and therefore interpret a
`
`6
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 6
`
`

`

`
`
`IPR2013-00054
`Patent 8,051,287 B2
`
`
`“pre-defined” portion of the handshake network communication as a portion of the
`handshake network communication that is defined or determined in advance.
`
`D. Related Proceedings
`According to Petitioner, the '287 patent is the subject of a patent
`infringement lawsuit brought by the assignee (Patent Owner) Adobe Systems Inc.,
`against Wowza, captioned Adobe Systems Incorporated v. Wowza Media Systems,
`LLC, United States District Court, Northern District of California, Case No. CV
`11-02243. Pet. 1.
`
`E. Prior Art
`
`Petitioner cites the following prior art:
`Sep. 18, 2007
`
`
`Edelman
`
`
`US 7,272,658 B1
`Apr. 29, 1980
`
`
`Hellman
`
`
`US 4,200,770
`Jun. 16, 2005
`
`Bousis
`
`
`US 2005/0129243 A1
`
`Camp
`
`
`US 2007/0076877 A1 Apr. 5, 2007
`Milan Toth, “Low level AS3 – Establishing an RTMP connection
`
` with Socket and ByteArray,” available at http://www.actionscript.org/
`resources/articles/630/1/Low-level-AS3---Establishing-an-RTMP-
`connection-with-Socket-and-ByteArray/Page1.html, June 2007 (“Toth”).
`
`
`Simon Horman, “SSL and TLS An Overview of a Secure Communication
`
`Protocol,” Security Mini-Conf at Linux.Conf.AU, pp.1-23, Apr.2005 (“Horman”).
`
`
`1. Edelman (Ex. 1006)
`
`According to the face of the Edelman patent, the patent is assigned to Patent
`Owner Adobe Systems Incorporated. Edelman is directed to a real-time priority-
`
`7
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 7
`
`

`

`
`
`IPR2013-00054
`Patent 8,051,287 B2
`
`
`based communication system for communicating media streams comprised of
`multiple media message sub-streams. Edelman col. 3, ll. 6-9.
`
`2. Toth (Ex. 1008)
`
`Toth describes reverse engineering an RTMP (Real-Time Messaging
`Protocol) communication by capturing and analyzing data between a client and
`server, for the purpose of establishing a connection to an RTMP server with a fake
`agent and referrer. Toth 1. The first part of the handshake is determined to be a
`0x03 byte followed by 1536 random bytes. Id. at 3.
`
`3. Hellman (Ex. 1010)
`
`Hellman describes that a generated secure cipher key may be used to
`encipher and decipher messages transmitted over an insecure communication
`channel. Hellman col. 2, ll. 14-22.
`
`4. Horman (Ex. 1011 )
`Horman describes the SSL (Secure Sockets Layer) protocol that makes use
`of asymmetric encryption for verification and when negotiating a secret key that
`will be used for symmetric encryption of bulk data transfers. Horman 1 (§ 1.1.1).
`Horman further describes that in the SSL protocol an RSA1 client key exchange
`message consists of the handshake header followed by an encoded pre-master
`secret that is encrypted using the server’s key as sent in the server certificate
`message. Id. at 12.
`The unnumbered Figure at page 12 of Horman is reproduced below.
`
`
`1 RSA was a well-known Asymmetric Encryption algorithm. Id.
`8
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 8
`
`

`

`Patent 88,051,287 BB2
`
`
`IPR2013-00054
`
`
`
`
`
`
`
`
`TThe Figure depicts ann RSA Clieent Key Exxchange Meessage thatt consists oof a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`handshaake headerr, 0x00, 0x002, randomm padding,, 0x00, “cliient versio
`n,” and
`
`“randomm.”
`
`maximumm version
`
`
`
`
`
`TThe pre-maaster secrett from the cclient conssists of the
`
`
`
`
`
`(highestt version nnumber) suppported byy the clientt followed
`
`by 46 randdom bytes
`
`
`
`generateed by a cryyptographic random nnumber geenerator.2 TThe “combbined” 48
`
`
`
`
`
`
`
`
`bytes prrovide the client’s inpput into thee master seecret from
`
` session keeys
`
`which the
`
`
`
`
`will be derived. IdId. The (enncrypted) ppre-master
`
`
`
`secret is ppadded to thhe length oof
`Id.
`
`
`
`
`an RSAA key by randomly geenerating ppad bytes.
`
`
`
`2 There
`e ation of thebyte indica to a two-bhich refers Horman, whis a minorr error in H
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`maximuum versionn supportedd by the cliient “followwed by” 488 random bbytes. Thiis
`
`
`
`
`
`numberr 48 appearrs to be inccorrect. Acccording too Petitione
`
`
`r’s Exhibitt 1012, Alaan
`
`
`
`
`
`
`
`
`O. Freieer, The SSLL Protocol Version 3.0, Transpoort Layer SSecurity WWorking Grroup
`
`
`
`
`
`
`
`(1996), the client generates aa 48-byte ppre-masterr secret fromm the newwest versionn
`
`
`
`
`
`
`supported by the cclient and 446 (not 48)) securely--generated
`
`
`random byytes. Freieer
`28-29.
`
`9
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 9
`
`

`

`
`
`
`
`IPR2013-00054
`Patent 8,051,287 B2
`
`
`5. Bousis (Ex. 1014)
`Bousis describes that an encrypted data-encryption key can be hidden in the
`random header of a message exchanged between two parties. Bousis Abstract;
`¶ [0005]. The random material will be replaced by consecutive bytes from the
`encrypted random key. ¶ [0021]; Fig. 4.
`
`6. Camp (Ex. 1015)
`Camp describes (¶ [0056]) that when secure data communication is desired
`between two terminals, one terminal may generate a keypad by obtaining a random
`data sequence from a local noise source. The random data sequence constitutes a
`shared secret known to both terminals, which may be used as the keypad for
`encrypting and decrypting messages sent between the terminals. ¶ [0053].
`An n-bit key sequence K may be extracted from the L-bit random data
`sequence S (the keypad) as a secret key for encrypting and decrypting transmitted
`data. ¶ [0069]. A secure, key-encrypted channel can thus be established.
`¶ [0013].
`
`F. Proposed Grounds of Unpatentability
`Petitioner alleges that each of the challenged claims is obvious under
`§ 103(a) over the combination of Edelman, Toth, and Hellman, Bousis, Horman, or
`Camp. Pet. 5.
`Petitioner also alleges that the claims are obvious over various other
`combinations of references in the alternative, but does not provide support in the
`Petition for the allegations by applying the combinations as proposed to any of the
`claims as is required by our rules. For example, Petitioner alleges that “[e]ach of
`
`10
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 10
`
`

`

`
`
`IPR2013-00054
`Patent 8,051,287 B2
`
`
`the challenged claims is obvious under § 103(a) over Edelman in view of Toth and
`further in view of either Hellman or Horman, and further in view of either Bousis
`or Camp and further in view of any of Cole, Giffin, Lucena, Rowland, and Zander.
`Pet. 5.
`Each Petition must contain “a detailed explanation of the significance of the
`evidence including material facts. . . .” 37 C.F.R. § 42.22(a)(2). However, this
`Petition does not explain how the references to be applied in the alternative might
`remedy deficiencies in the other references, nor applies the references as proposed
`to be combined in the alternative against any specific claim. In short, Petitioner’s
`alternative allegations fail to “specify where each element of the claim is found . .
`. .” 37 C.F.R. § 42.104(b)(4). “The Board may exclude or give no weight to the
`evidence where a party has failed to state its relevance or to identify specific
`portions of the evidence that support the challenge.” Id. § 42.104(b)(5).
`Of the above-mentioned references, Petitioner cites Raike (Ex. 1016) as a
`“Cryptography Reference[]” and the following references (Ex. 1017-1021) as
`“Information Hiding References”: Cole, Giffin, Lucena, Rowland, and Zander.
`Pet. 30; 45-46. As Petitioner provides insufficient analysis of these references as
`applied to the specific limitations of the claims, we do not consider these
`references further. See discussion supra; 37 C.F.R. §§ 42.104(b)(4), (b)(5).
`
`
`II. ANALYSIS
`
`A. The Petition
`Initially, we note that the Petition’s claim chart, to the extent directed to the
`first step of representative claim 1, which represents the material not taught by
`Edelman alone, simply refers to “Section VIII.A.” Pet. 46. Section VIII.A spans
`over 16 pages of the Petition. This is significant because this portion of the claim
`
`11
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 11
`
`

`

`
`
`IPR2013-00054
`Patent 8,051,287 B2
`
`
`contains the recitation “cryptographic information in a predefined portion of a
`handshake network” challenged by the Patent Owner in responding to the Petition.
`Prelim. Resp. 14-25. In that 16-page section, Petitioner offers four different
`references to be combined in the alternative with Edelman and Toth -- Hellman,
`Horman, Bousis, and Camp. However, that discussion referenced by the claim
`chart, while lengthy, provides little or no guidance as to where the challenged
`recitation is found in these references.
`The Petition’s claim chart also refers to the entire Sherman Declaration (Ex.
`1002; Declaration of Dr. Alan T. Sherman) in general. The Declaration is 100
`pages in length and appears, for the most part, simply to track and repeat the
`arguments for unpatentability presented in the Petition. The lengthy Sherman
`Declaration is therefore no more helpful that the Petition in determining where the
`challenged recitation is found in the references. Thus, as the Petition refers only to
`the Declaration in general, and not to any specific testimony set forth in the
`Declaration that may relate to specific claim limitations, we have not found the
`Declaration helpful as support for Petitioner’s assertions. See Pet. 35, 38, 41, 44
`(referring to Sherman Decl. § III.B, entitled “Guidance from KSR”). Cf. 37 C.F.R.
`§ 42.104(b)(4); 37 C.F.R. § 42.65(a).
`
`B. Difference Between the Challenged Claims and the Teachings of Edelman
`
`and Toth
`
`
`Petitioner submits that there is only one difference between the existing
`RTMP protocol and the challenged claims:
`The only difference between the invention claimed in the ’287
`patent and Adobe’s preexisting RTMP communications, as set forth in
`Toth and Edelman, is the requirement that cryptographic information
`be inserted in the random data section of the existing RTMP
`
`12
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 12
`
`

`

`IPR2013-00054
`Patent 8,051,287 B2
`
`
`
`
`
`handshake (or some other preexisting portion of a network handshake
`communication reserved for random data) and that that information be
`used for encrypting and decrypting the communication.
`
`Pet 9-10 (emphasis added).
`Patent Owner in the Preliminary Response does not challenge the substance
`of Petitioner’s statement. For purposes of this decision we will presume, therefore,
`that the difference between representative claim 1 and the other challenged claims
`and the combined teachings of Edelman and Toth is substantially as set forth by
`Petitioner.
`Consistently throughout, the Petition refers to the claims as calling for
`placing the cryptographic information in a “preexisting” portion of the handshake
`communication. See, e.g., Pet. at each of pages 9, 19, and 31-45. The Petition
`refers to the “pre-defined” portion of the communication only when directly
`quoting the claims. See Pet. 46-58 (claim chart). We observe, however, that the
`claims uniformly call for placing cryptographic information in a “pre-defined”
`portion of a handshake network communication, rather than a “preexisting” portion
`as indicated by Petitioner. We do not accept this substitution by Petitioner, as it
`affects the meaning of the claim. “Preexist” is a transitive verb that means “to
`exist before (something) >>monuments that preexist written history<<.” Webster’s
`Third New International Dictionary, Unabridged (1993). As we have noted supra
`(§ I.C), the ordinary meaning of a “pre-defined” portion of a handshake network
`communication is a portion of the communication that is defined or determined in
`advance. Petitioner’s substitution, which we reject, would thus render the claims
`broader in scope when compared to their scope under a proper interpretation of the
`recited claim language.
`
`
`13
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 13
`
`

`

`
`
`IPR2013-00054
`Patent 8,051,287 B2
`
`
`C. Obviousness of the Challenged Claims over Edelman, Toth, and Hellman
`With respect to Hellman, Petitioner cites column 2 of the reference, with its
`description of generating a secure cipher key that is used to encipher and decipher
`messages transmitted over an insecure communication channel. Pet. 33-34; see
`also Hellman, § I.E.3 supra. Petitioner concludes that it would have been obvious,
`in light of Hellman, to “establish an encrypted RTMP session by inserting
`cryptographic information in the preexisting random data section of the RTMP
`handshake. . . .” Pet. 34.
` Petitioner continues, citing the Supreme Court’s decision in KSR:
`Combining the RTMP References and Hellman “only unites old
`elements with no change in their respective functions”; is just a
`“combination of familiar elements according to known methods [with]
`no more than predictable results”; “simply arranges old elements with
`each performing the same function it had been known to perform
`before” and “yields no more than one would expect.” KSR [KSR Int’l
`Co. v. Teleflex, Inc., 550 U.S. 398 (2007)], 550 U.S. at 416-17. Also,
`design incentives and other market forces would prompt this
`predictable variation of RTMP. See id. at 417. Also, the teachings of
`the references described above, as well as design considerations and
`the demands known in the marketplace would prompt a person of
`ordinary skill to modify RTMP, as set forth in the RTMP References,
`when combined with Hellman in the fashion claimed. Doing so
`would have eliminated the need for additional handshake messages —
`which slow the process and expend processing power — and would
`have the additional benefit of obfuscating the cryptographic
`information, all of which were known design objectives and goals for
`computer systems and encryption systems.
`
`
`Pet. 34-35.
` We do not agree with Petitioner’s obviousness analysis based on KSR. In
`our view, Petitioner has failed to establish certain prerequisites for demonstrating
`
`14
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 14
`
`

`

`
`
`IPR2013-00054
`Patent 8,051,287 B2
`
`
`prima facie obviousness under KSR. As noted by the Federal Circuit, KSR does
`not authorize conclusory results.
`Although the obviousness analysis should “take account of the
`inferences and creative steps that a person of ordinary skill in the art
`would employ,” the Supreme Court emphasized that this evidentiary
`flexibility does not relax the requirement that, “[t]o facilitate review,
`this analysis should be made explicit.” Id. [KSR] at 418, 127 S.Ct.
`1727 (citing [In re] Kahn, 441 F.3d [977] at 988 (“[R]ejections on
`obviousness grounds cannot be sustained by mere conclusory
`statements; instead, there must be some articulated reasoning with
`some rational underpinning to support the legal conclusion of
`obviousness.”)).
`
`Perfect Web Technologies, Inc. v. InfoUSA, Inc., 587 F.3d 1324, 1330 (Fed. Cir.
`2009). Following the same approach that was rejected by KSR, Petitioner’s
`challenge of the claims over Edelman, Toth, and Horman provides mere
`conclusory statements in support of the legal conclusion of obviousness. Petitioner
`does not identify any teaching in the applied prior art of establishing an encrypted
`RTMP session by inserting cryptographic information in a preexisting random data
`section of the RTMP handshake. Further, Petitioner offers no convincing
`rationale, in light of the teachings of the prior art, with respect to why one of
`ordinary skill in the art would have chosen to establish an encrypted RTMP session
`by inserting cryptographic information in a pre-defined portion of the RTMP
`handshake reserved for random data. As required by 37 C.F.R. § 42.104(b)(4), a
`Petition must specify where each element of a challenged claim is found in the
`prior art patents or printed publications. See discussion supra. Petitioner has
`failed to do so.
`
`
`15
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 15
`
`

`

`
`
`IPR2013-00054
`Patent 8,051,287 B2
`
`
`D. Obviousness of the Challenged Claims over Edelman, Toth, and Horman
`Petitioner submits that Horman teaches “inserting cryptographic information
`into network communications in a preexisting portion of the communication
`containing random data. . . .” Pet. 35 (emphasis added). In particular, Petitioner
`points to Horman’s disclosure of an RSA Client Key Exchange Message (Horman,
`§ I.E.4 supra). Pet. 36-37. “[D]uring the Client Key Exchange step of the
`SSL/TLS handshake process, cryptographic information is inserted into a
`preexisting field of the handshake communication that is padded with random
`PKCS padding. . . .” Id. at 36.
`Petitioner notes, correctly, that in Horman the “pre-master secret is used to
`generate a cryptographic key.” Pet. 37. From the description in Horman of
`inserting cryptographic information “into a preexisting field” of a handshake
`communication that is padded with random data, Petitioner concludes that it would
`have been obvious, in light of Horman, to “establish an encrypted RTMP session
`by inserting cryptographic information in the preexisting random data section of
`the RTMP handshake. . . .” Id. Petitioner relies on KSR as support for obviousness
`insofar as KSR discusses uniting old elements with no change in respective
`functions, combining familiar elements according to known methods with
`predictable results, and design incentives and other market forces. Id. at 38.
`However, KSR is not apposite, because Petitioner does not identify any
`teaching in Horman or any of the other applied prior art of establishing an
`encrypted RTMP session by inserting cryptographic information in a preexisting
`random data section of the RTMP handshake. Further, Petitioner does not identify
`the “preexisting field” in Horman into which cryptographic information is alleged
`to be inserted.
`
`16
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 16
`
`

`

`IPR2013-00054
`Patent 8,051,287 B2
`
`
`
`
`
`We have reviewed Horman and Petitioner has not identified any suggestion
`in the reference of inserting cryptographic information into a pre-defined (as
`opposed to preexisting) random data field. Horman describes inserting
`cryptographic information -- a pre-master secret that consists of an encrypted
`version of the client version and randomly generated bytes -- into the fields
`reserved for the cryptographic information, labeled “client version” and “random.”
`See Horman; § I.E.4 supra. But this is not a pre-defined random data field
`because it does not contain random data. Harmon does describe that randomly
`generated pad bytes (“random pad. . .”) are added to the message to render the
`Exchange Message the proper length of the RSA key. However, this “padding” of
`the message length is not the same as inserting cryptographic information in a pre-
`defined portion of the communication containing random data, as the claims
`require.
`Further, Petitioner offers no convincing rationale, in light of the teachings of
`the prior art, with respect to why one of ordinary skill in the art would have chosen
`to establish an encrypted RTMP session by inserting cryptographic information in
`a pre-defined portion of the RTMP handshake that is reserved for random data.
`The Petition must specify where each element of a challenged claim is found
`in the prior art patents or printed publications. Petitioner has failed to do so. 37
`C.F.R. § 42.104(b)(2).
`
`E. Obviousness of the Challenged Claims over Edelman, Toth, and Bousis
`Bousis describes that an encrypted data-encryption key can be hidden in the
`random header of a message exchanged between two parties. Bousis Abstract;
`¶ [0005]. However, the term “header” in Bousis does not refer to a conventional
`message header. As pointed out by Patent Owner, Bousis teaches that “the header
`
`17
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 17
`
`

`

`
`
`IPR2013-00054
`Patent 8,051,287 B2
`
`
`principle should not be construed to represent a header according to some pre-
`existent standard for transmission or storage. In this context, the header simply
`means some part ‘at or near the beginning of the data exchange’.” ¶ [0005].
`As shown in Figure 3, Bousis describes writing data that is encrypted with a
`randomly generated key into a file, encrypting the randomly generated key with a
`shared secret key, hiding the encrypted random key in the encrypted data file, and
`finally transferring all the data for retrieval and decryption using the shared secret
`key and the retrieved random key. Bousis ¶¶ [0018]-[0019]. The encrypted data
`and the encrypted random key may thus be placed into the same file. ¶ [0020]. A
`number (Nh) of bytes of random material may be placed at the beginning of the
`file, appending Nd bytes of encrypted data after the Nh bytes. Id.; Fig. 4.
`Bousis also describes hiding the encrypted key. A shared function F that is
`known by both the transmitting and receiving systems can be used to return a
`selection Nr bytes from the Nh bytes3 of random material. For each of the returned
`bytes, the random material will be replaced by consecutive bytes from the
`encrypted random key. Bousis ¶ [0021]; Fig. 4. By distributing the bytes of the
`encrypted random key over a pool of random material, and appending to this the
`encrypted material itself, a cryptanalyst cannot know which bytes in the
`transmitted data belong to the random material, to the encrypted data, and to the
`encrypted random key. ¶ [0028].
`As recognized by Petitioner (Pet. 39), however, Bousis does not disclose
`inserting cryptographic information in a preexisting handshake communication.
`Petitioner asserts that in light of Bousis, it would have been obvious to “establish
`an encrypted RTMP session by inserting cryptographic information in the
`
`
`3 Bousis contains a typographical error in paragraph [0021], where “Nb” should be
`“Nh.”
`
`18
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 18
`
`

`

`IPR2013-00054
`Patent 8,051,287 B2
`
`
`
`preexisting random data section of the RTMP handshake. . . .” Id. at 40. Petitioner
`once again relies on KSR, for substantially the same principles as previously. See
`supra. But Petitioner does not identify any teaching or suggestion in Edelman,
`Toth, or Bousis with respect to establishing an encrypted RTMP session, much less
`establishing such a session by inserting cryptographic information in a pre-defined
`portion of an RTMP handshake that is reserved for random data.
`Further, Petitioner offers no convincing rationale, in light of the teachings of
`the prior art, with respect to why one of ordinary skill in the art would have chosen
`to establish an encrypted RTMP session by inserting cryptographic information
`specifically in a pre-defined portion of the handshake that is reserved for random
`data. Accordingly, we find insufficient support for the Petitioner’s conclusion that
`“a person of ordinary skill would have known that inserting cryptographic
`information in a handshake is simply a predictable combination” of Edelman, Toth,
`and Bousis. Pet. 39.
`
`F. Obviousness of the Challenged Claims over Edelman, Toth, and Camp
`Petitioner cites portions of Camp (see Camp, § I.E.6 supra), and concludes,
`without explanation, that it would have been obvious in light of Camp to establish
`an encrypted RTMP session by inserting cryptographic information in the
`preexisting random data section of the RTMP handshake. Pet. 43. Petitioner also
`cites KSR. Id. at 43-44.
`But as noted supra, Petitioner does not identify any teaching in Edelman,
`Toth, or Camp of establishing an encrypted RTMP session by inserting
`cryptographic information in a preexisting random data section of the RTMP
`handshake. Further, as noted supra, Petitioner offers no convincing rationale, in
`light of the teachings of the prior art, with respect to why one of ordinary skill in
`
`19
`
`
`Invensys Ex. 2012
`Micro Motion v. Invensys IPR 2014-00393, page 19
`
`

`

`IPR2013-00054
`Patent 8

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket