throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`Commerce Bancshares, Inc., Compass Bank, and First National Bank of Omaha
`Petitioners
`
`v.
`
`Intellectual Ventures II LLC
`Patent Owner
`
`
`
`
`Patent No. 6,715,084
`Filing Date: March 26, 2002
`Issue Date: March 30, 2004
`Title: FIREWALL SYSTEM AND METHOD VIA FEEDBACK FROM BROAD-
`SCOPE MONITORING FOR INTRUSION DETECTION
`
`
`
`
`Inter Partes Review No. Unassigned
`
`
`
`DECLARATION OF DR. GEORGE KESIDIS
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 1
`
`

`

`TABLE OF CONTENTS
`
`INTRODUCTION AND QUALIFICATIONS ............................................... 5
`
`I.
`
`II. MATERIALS CONSIDERED ........................................................................ 7
`
`III. COMPENSATION .......................................................................................... 7
`
`IV. THE ‘084 PATENT ......................................................................................... 8
`
`A. General Background of the Technology of the ‘084 Patent .................... 8
`
`B. The ‘084 Patent ...................................................................................... 11
`
`V. ANTICIPATION AND OBVIOUSNESS STANDARDS ........................... 18
`
`VI. LEVEL OF ORDINARY SKILL IN THE ART ........................................... 20
`
`VII. CLAIM CONSTRUCTION AND THE BROADEST REASONABLE
`
`CONSTRUCTION ........................................................................................ 21
`
`VIII. PRIOR ART REFERENCES ........................................................................ 23
`
`A. Porras, “Live Traffic Analysis of TCP/IP Gateways” ........................... 23
`
`B. U.S. Patent No. 7,237,264 to Graham, et al. (“Graham”) ..................... 26
`
`IX. DETAILED UNPATENTABILITY ANALYSIS ........................................ 28
`
`A. Ground 1: Claims 1-9 and 12-18 are Anticipated by Live Traffic ....... 29
`
`1. Live Traffic Anticipates Claims 1 and 9 of the ‘084 Patent ............. 31
`
`i. Live Traffic discloses all elements of claim 1 .......................... 32
`
`2. Live Traffic Anticipates Claim 2 of the ‘084 Patent ........................ 48
`
`3. Live Traffic Anticipates Claim 3 of the ‘084 Patent ........................ 51
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 2
`
`

`

`4. Live Traffic Anticipates Claims 4 and 12 of the ‘084 Patent ........... 53
`
`5. Live Traffic Anticipates Claims 5 and 13 of the ‘084 Patent ........... 56
`
`6. Live Traffic Anticipates Claims 6 and 14 of the ‘084 Patent ........... 60
`
`7. Live Traffic Anticipates Claim 7 of the ‘084 Patent ........................ 62
`
`8. Live Traffic Anticipates Claims 8 and 18 of the ‘084 Patent ........... 64
`
`9. Live Traffic Anticipates Claim 15 of the ‘084 Patent ...................... 67
`
`10. Live Traffic Anticipates Claim 16 of the ‘084 Patent .................... 69
`
`11. Live Traffic Anticipates Claim 17 of the ‘084 Patent .................... 70
`
`B. Ground 2: Claim 10 is Obvious in View of Live Traffic ..................... 72
`
`C. Ground 3: Claims 1-9 and 12-33 are Rendered Obvious by Live Traffic
`
`in View of Graham ................................................................................. 74
`
`1. Motivation to Combine ..................................................................... 74
`
`2. Claims 1-9 and 12-18 are Rendered Obvious by Live Traffic in
`
`View of Graham............................................................................... 76
`
`3. Claims 19-33 are Rendered Obvious by Live Traffic in View of
`
`Graham .................................................................................................117
`
`i. Live Traffic in View of Graham Renders
`Claim 19 Obvious ...........................................................................117
`
`ii. Live Traffic in View of Graham Renders
`
`Claim 20 Obvious ...........................................................................130
`
`iii. Live Traffic in View of Graham Renders
`
`
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 3
`
`

`

`Claim 21 Obvious ...........................................................................134
`iv. Live Traffic in View of Graham Renders
`Claim 22 Obvious ...........................................................................137
`
`v. Live Traffic in View of Graham Renders
`Claim 23 Obvious ...........................................................................141
`
`vi. Live Traffic in View of Graham Renders
`Claim 24 Obvious ...........................................................................143
`
`vii. Live Traffic in View of Graham Renders
`Claim 25 Obvious ...........................................................................145
`
`viii. Live Traffic in View of Graham Renders
`Claim 26 Obvious ...........................................................................148
`
`ix. Live Traffic in View of Graham Renders
`Claim 27 Obvious ...........................................................................154
`
`x. Live Traffic in View of Graham Renders
`Claim 28 Obvious ...........................................................................157
`
`xi. Live Traffic in View of Graham Renders
`Claim 29 Obvious ...........................................................................159
`
`xii. Live Traffic in View of Graham Renders
`Claim 30 Obvious ...........................................................................162
`
`xiii. Live Traffic in View of Graham Renders
`Claim 31 Obvious ...........................................................................164
`
`xiv. Live Traffic in View of Graham Renders
`Claim 32 Obvious ...........................................................................166
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`xv. Live Traffic in View of Graham Renders
`Claim 33 Obvious ...........................................................................168
`
`
`X. SECONDARY CONSIDERATIONS OF NON-OBVIOUSNESS ............170
`
`XI. CONCLUSION ............................................................................................171
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 4
`
`

`

`I, Dr. George Kesidis, declare as follows:
`
`I.
`
`INTRODUCTION AND QUALIFICATIONS
`
`1.
`
`I am a tenured professor in both the Computer Science & Engineering
`
`and Electrical Engineering departments at Pennsylvania State University. I have
`
`been in this position since 2000. Before accepting the position at Pennsylvania
`
`State University, I was a tenured professor of Electrical and Computer Engineering
`
`at the University of Waterloo from June 1992 to April 2000.
`
`2.
`
`In 1988, I earned my B.A.Sc. from the University of Waterloo in
`
`Electrical Engineering. I then earned my M.S. from the University of California at
`
`Berkeley in Electrical Engineering and Computer Science (EECS). I continued my
`
`education at Berkeley and earned my Ph.D. in 1992 in EECS.
`
`3.
`
`A copy of my Curriculum Vitae is being filed as Exhibit 1007.1 My
`
`CV includes a list of books, papers, and other publications that I have authored or
`
`co-authored, including the short books: “An Introduction to Analysis of
`
`Communication Networks,” published by Wiley-Interscience & IEEE Press in
`
`2007, and “ATM Network Performance,” published by Kluwer Academic
`
`Publishers in 1999. I am an expert in computer/communication networking,
`
`network security, and intrusion detection. During my career, I have taught both
`
`undergraduate and graduate courses in communication networks and security of
`
`1 References to exhibits are to those exhibits being filed with the Petition for Inter
`Partes Review.
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 5
`
`

`

`communication networks. My research has focused on several areas, including
`
`network security, anomaly detection, and traffic engineering.
`
`4.
`
`I have served in a number of capacities on government, academic, and
`
`industry committees that give advice on network communication and security.
`
`While performing these duties, I have read and authored many academic
`
`conference and journal articles and have been awarded research grants on network
`
`security from both government and industry. These grants have supported
`
`graduate students that I have supervised, some of whom now work in the cyber
`
`security industry. I recently (from 2012-2014) served as an Intermittent Expert for
`
`the Secure and Trustworthy Cyberspace Program for the National Science
`
`Foundation, in which role I helped run panels of experts examining research
`
`proposals in the network security area.
`
`5.
`
`I have been asked to consider whether the methods and systems
`
`described in claims 1-10 and 12-33 of U.S. Patent No. 6,715,084 to Aaron et al.
`
`(“the ‘084 patent”) cover any new approaches to network intrusion detection that
`
`were not already known by, or obvious to, those having ordinary skill in the field
`
`before the named inventors on the ‘084 patent conceived and developed the subject
`
`matter of the claims filed in their patent application. I was asked to provide my
`
`opinion as to whether these claims were “anticipated” or “obvious” in light of
`
`certain earlier published papers and patents (“prior art”).
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 6
`
`

`

`II. MATERIALS CONSIDERED
`
`6.
`
`In forming the opinions expressed in this Declaration, I relied upon
`
`my education and experience in the relevant field of the art and have considered
`
`the viewpoint of a person having ordinary skill in the relevant art, as of March 26,
`
`2002.
`
`7.
`
`I have reviewed the specification, claims, and file history of the ‘084
`
`patent. I have also reviewed and understand the following references:
`
`A.
`
`Porras, et al. “Live Traffic Analysis of TCP/IP Gateways”
`(“Live Traffic,” Ex. 1004), which was published at least as
`early as December 12, 1997;
`B. U.S. Patent No. 7,237,264, entitled “System and Method for
`Preventing Network Misuse,” and filed by Robert David
`Graham, et al., on June 4, 2001 (“Graham,” Ex. 1005).
`These references anticipate or render obvious the subject matter
`
`8.
`
`defined in claims 1-10 and 12-33 of the ‘084 patent. These references form the
`
`grounds for challenging the patentability of the ‘084 patent claims set forth in the
`
`corresponding petition for inter partes review.
`
`9.
`
`I reserve the right to supplement my opinions to address any
`
`information obtained, or positions taken, based on any new information that comes
`
`to light throughout the inter partes review proceeding.
`
`III. COMPENSATION
`
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 7
`
`

`

`10.
`
`I am being compensated at my normal consulting rate for my work.
`
`My compensation is not dependent on and in no way affects the substance of my
`
`statements in this Declaration.
`
`11. To the best of my knowledge, I have no financial interest in
`
`Petitioners Compass Bank, Commerce Bancshares, Inc., and First National Bank
`
`of Omaha or with the real parties in interest: Commerce Bancshares, Inc.,
`
`Commerce Bank, BBVA Compass Bancshares, Inc., Compass Bank, First National
`
`Bank of Omaha, and First National of Nebraska, Inc. I have been informed that
`
`Intellectual Ventures II LLC (“IV”) purports to own the ‘084 patent. To the best of
`
`my knowledge, I have no financial interest in IV, and I have had no contact with
`
`IV. To the best of my knowledge, I similarly have no financial interest in the ‘084
`
`patent and have had no contact with the named inventors of the ‘084 patent.
`
`12. As reflected on the first page of the ‘084 patent, the application that
`
`matured into the ‘084 patent was filed on March 26, 2002. The ‘084 patent issued
`
`to Jeffrey A. Aaron and Thomas Anschutz on March 30, 2004.
`
`IV. THE ‘084 PATENT
`
`A. General Background of the Technology of the ‘084 Patent
`
`13. The ‘084 patent discloses a system and method of broad-scope
`
`intrusion detection that monitors and analyzes traffic from multiple hosts at a
`
`“separately maintained data collection and processing center.”
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 8
`
`

`

`14. Before the filing date of the ‘084 patent, end-systems communicating
`
`over the Internet, and the Internet infrastructure itself, had been subjected to many
`
`and various types of attacks. Large-scale network “enterprises” had been set up by
`
`private companies, universities, and government agencies, and their need for
`
`effective security services was already keenly felt, as it was felt in the public
`
`commodity Internet. As new types of attacks were proliferating, approaches were
`
`being proposed to mitigate or prevent them once detected. Security technology
`
`operating in the end-systems (e.g., anti-virus software) and in the network (e.g.,
`
`firewalls) existed and was becoming ubiquitous.
`
`15.
`
` One approach to detecting and preventing attacks on a network is
`
`based on signatures of known malicious activity. Malicious activity could be
`
`anomalies in the network such as intrusions, attempted intrusions, or
`
`reconnaissance activity, such as port scanning, to test the security of a network. A
`
`firewall deployed in the network monitors a packet flow-aggregate and, e.g.,
`
`conducts certain checks to determine whether the packets contain
`
`signatures/patterns of known attack behavior (the patterns are stored in memory
`
`associated with the firewall) and, if attack behavior is thus detected, the packet can
`
`be filtered/dropped by the firewall. Additional responsive behavior, such as
`
`alerting the network’s system or security administrator, may be taken.
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 9
`
`

`

`16.
`
` Some known malicious activity at the time involved the transmission
`
`of viruses and Trojan software (malware). Antivirus software running in the
`
`targeted host was available and could check for receipt of known malware and
`
`attempt to block its execution and remove it from the host. Inherently, network-
`
`deployed defenses examined the activity of a plurality of end-systems (that are
`
`networked together), particularly packet traffic exchanged by them. Ways to deal
`
`with malware and other types of attacks (e.g., denial of service) using network-
`
`deployed devices were investigated to eliminate threats “in flight” before one or
`
`more potentially vulnerable hosts are affected.
`
`17.
`
` Before the filing date of the ‘084 patent, existing approaches to the
`
`significantly more challenging task of quickly detecting new attacks were
`
`developed. Network-based intrusion-detection systems identified merely
`
`suspicious (or “anomalous”) activity and issued alerts. Alerts were correlated and
`
`fused into meta-alerts to increase confidence in determining the existence of a new
`
`attack. Given that a new attack was detected, these systems were often able to
`
`readily determine the target of the attack, e.g., a common application, protocol or
`
`operating system associated with the alerts.
`
`18. When such a target of an emerging threat was identified, e.g., through
`
`an alert or meta-alert, it was natural to focus other parts of the network where the
`
`same target exists. For example, many end-hosts may run the same application, or
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 10
`
`

`

`have the same operating system, or interact with each other according to a given
`
`protocol, i.e., “monocultures.” If one end-host is deemed to be under attack
`
`through an exploited vulnerability associated with some (inter-host) protocol X,
`
`then it is natural to consider other end-hosts also interacting through protocol X for
`
`which the attack has not as yet been detected. Network-based intrusion-detection
`
`systems may quickly react to prevent the spread of the attack by, e.g., instructing
`
`firewalls to filter packets associated with protocol X in areas/domains of the
`
`network in which the network-based intrusion-detection systems operates where
`
`the attack has not yet been detected. The effect may be a temporary quarantine, or
`
`“denial of service” involving protocol X, until an administrator can further
`
`investigate, possibly eventually leading to identification of a precise
`
`signature/pattern of the attack (through more detailed forensics) that is
`
`subsequently deployed in the network firewalls and/or end-host antivirus systems.
`
`B.
`
`The ‘084 Patent
`
`19. The ‘084 patent is titled “Firewall System And Method Via Feedback
`
`From Broad-Scope Monitoring For Intrusion Detection.” Ex. 1001 at Title Page.
`
`Generally, the ‘084 patent discloses a system and method of broad-scope intrusion
`
`detection of “traffic coming into multiple hosts or other customers’ computers or
`
`sites.” Id. at 5:46-48. The ‘084 patent states that a problem with the prior-art
`
`intrusion detection systems was that they were “plagued by false positive events”
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 11
`
`

`

`and were unable to “detect the earliest stages of network attacks.” Id. at 4:51-53.
`
`The reason for this, according to the ‘084 patent, is that the prior art intrusion
`
`detection methods monitored only a single customer’s data and thus lacked the
`
`“capability to perform broad-scope intrusion analysis/detection” on multiple hosts.
`
`Id. at 4:64-67. The alleged advantage of the ‘084 patent’s intrusion detection
`
`system is that it allowed for analysis of additional data entering into multiple hosts
`
`or computers, rather than analyzing traffic entering just one site. This cut down on
`
`false positive events and allowed for “near-real time parameter adjustments for
`
`firewalls.” Id. at 11:63-67. Figure 2 of the ‘084 patent depicts the claimed
`
`invention:
`
`
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 12
`
`

`

`External customer site networks 220, 230, 240, and 250 are coupled to an
`
`intervening network (i.e. the internet) 204 via known firewalls 221, 231, 241, and
`
`251. Id. at 6:50-7:5. The “separately maintained data collection and processing
`
`center,” the heart of the ‘084 patent, is made up of a computer or server 205 and a
`
`firewall 210. Id. at 7:18-20 (highlighted above). Broad-scope intrusion detection
`
`is performed on the various networks 220, 230, 240, and 250, and the data
`
`collection and processing center receives and collects information from these
`
`various network components. Id. at 7:35-43. Thus, “the data collection and
`
`processing center receives all communications (i.e. the data) originating from a
`
`user on the computer network 204 and flowing to host 220 (or vice versa), for
`
`example.” Id. “Certain devices can be used as sensors to sense data traffic and
`
`pass their findings on to the data collection and processing center or other central
`
`processing system.” Id. at 7:44-47.
`
`20. The central processing system of the ‘084 patent monitors the network
`
`traffic from the various network components for anomalies. Id. at 5:57-60.
`
`Detection of an anomaly requires “analyzing a plurality of data packets with
`
`respect to predetermined patterns.” Id. at 6:8-13. The ‘084 patent states that an
`
`“anomaly” can be “an intrusion, or an intrusion attempt or reconnaissance
`
`activity.” Id. at 5:64-65. Because the data collection and processing center is
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 13
`
`

`

`collecting information from multiple hosts, instead of just one host, it is allegedly
`
`better able to predict and detect anomalies in the network. Id. at 8:45-65.
`
`21. After the events are collected and forwarded to a central database, the
`
`central database “uses pattern correlations across multiple customers’ events in
`
`order to better determine the occurrence and sources of suspected intrusion-
`
`oriented activity.” Id. at 8:23-30. Once an intrusion, intrusion attempt, or
`
`reconnaissance activity is detected, the central processing system can alert the
`
`relevant administrators of the hosts or the affected devices on the network that a
`
`certain system is either affected or anticipated to be affected. Id. at 10:15-21.
`
`Additionally, when an intrusion is detected, the broad-scope matching parameters
`
`can be adjusted to deal with the attack. Id. at 8:31-44. The central processing
`
`system can determine that a device is anticipated to be affected by an anomaly by
`
`“polling” the devices on the network in a “predetermined sequential order.” Thus
`
`“an intrusion attempt that is detected at an earlier, already polled sensor, can be
`
`determined, and administrators of other hosts, that have not yet been hit by the
`
`intrusion attempt, can be alerted about the possibility of such an intrusion attempt.”
`
`Id. at 11:3-13 and 13:3-7.
`
`22. The ‘084 patent includes thirty-three claims, thirty-two of which are
`
`being challenged by the Petitioners. A representative independent claim, claim 1,
`
`states:
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 14
`
`

`

`1. A method of alerting at least one device in a networked computer
`system comprising a plurality of devices to an anomaly, at least one of
`the plurality of devices having a firewall, comprising:
`
`[a] detecting an anomaly in the networked computer system using
`network-based intrusion detection techniques comprising analyzing
`data entering into a plurality of hosts, servers, and computer sites in
`the networked computer system;
`
`[b] determining which of the plurality of devices are anticipated to be
`affected by the anomaly by using pattern correlations across the
`plurality of hosts, servers, and computer sites; and
`
`[c] alerting the devices that are anticipated to be affected by the
`anomaly.
`Ex. 1001 at Claim 1.
`
`
`23. Method claims 1 and 9, both independent claims, are substantially
`
`similar with only minor differences.
`
`24. Additionally, claims 4-6 and 8, which depend from claim 1, and
`
`claims 12-14 and 18, which depend from claim 9, are substantially similar,
`
`respectively. The below table compares the claims:
`
`Dependent Claims from Claim 1
`4. The method of claim 1, wherein the
`
`Dependent Claims from Claim 9
`12. The method of claim 9, wherein the
`
`anomaly comprises one of an intrusion
`
`anomaly comprises one of an intrusion
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 15
`
`

`

`and an intrusion attempt.
`
`and an intrusion attempt.
`
`5. The method of claim 1, wherein
`
`13. The method of claim 9, wherein
`
`detecting the anomaly comprises
`
`detecting the anomaly comprises
`
`analyzing a plurality of data packets
`
`analyzing a plurality of data packets
`
`with respect to predetermined patterns.
`
`with respect to predetermined patterns.
`
`6. The method of claim 5, wherein
`
`14. The method of claim 13, wherein
`
`analyzing data packets comprises
`
`analyzing data packets comprises
`
`analyzing data packets that have been
`
`analyzing data packets that have been
`
`received at at least two of the plurality
`
`received at at least two of the plurality
`
`of devices.
`
`of devices including the first device.
`
`8. The method of claim 1, further
`
`18. The method of claim 9, further
`
`comprising adjusting anomaly detection
`
`comprising adjusting anomaly detection
`
`sensitivity and alarm thresholds based
`
`sensitivity and alarm thresholds based
`
`on the detected anomaly.
`
`on the detected anomaly.
`
`
`25.
`
`It is my opinion that all thirty-two challenged claims of the ‘084
`
`patent are unpatentable based on the following grounds:
`
`Ground
`
`1
`
`2
`
`Basis for Rejection
`
`Claims 1-9 and 12-18 are anticipated by Live Traffic.
`
`Claim 10 is rendered obvious by Live Traffic.
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 16
`
`

`

`3
`
`Claims 1-9 and 12-33 are obvious in view of Live Traffic and
`
`Graham.
`
`
`
`26. With respect to Grounds 1 and 2, Live Traffic discloses a distributed
`
`IDS in which a number of surveillance modules are used to analyze network traffic
`
`in several interconnected local network domains (e.g., LANs). These local domain
`
`surveillance modules then forward the results of their analysis to an enterprise-
`
`layer surveillance module that further analyzes the collective analysis results. In
`
`my opinion, Live Traffic discloses every element of claims 1-9 and 12-18 of the
`
`‘084 patent, anticipating such claims. In my opinion, Live Traffic also renders
`
`claim 10 obvious in view of the knowledge of one of ordinary skill in the art at the
`
`time of the alleged invention.
`
`27. With respect to Ground 3, Graham teaches an intrusion detection
`
`system in which a single node may be designated to monitor and control
`
`communications in a local area network (“LAN”). Graham differs from Live
`
`Traffic in that Graham provides additional detail regarding certain aspects of
`
`network-based intrusion detection that are claimed in the ‘084 patent, and is thus
`
`not redundant with Live Traffic.
`
`28. For example, while Live Traffic discloses every element of claims 1-9
`
`and 12-18, Graham provides significant additional detail regarding certain
`
`elements of independent claims 1 and 9, such as how it may be determined that a
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 17
`
`

`

`device is “anticipated to be affected” by an anomaly. As such, Ground 3 is not
`
`redundant with Ground 1. Similarly, with respect to claims 19-33, Graham
`
`expressly discloses or provides significant additional detail regarding certain claim
`
`elements for which Live Traffic contains a more general disclosure (e.g., “a
`
`computer with a firewall coupled to a computer network.”). In my opinion,
`
`because, as further discussed below, a person of ordinary skill in the art would
`
`have been motivated to combine Live Traffic and Graham, Live Traffic and
`
`Graham render claims 1-9 and 12-33 obvious.
`
`V. ANTICIPATION AND OBVIOUSNESS STANDARDS
`
`29.
`
`I have been informed and understand that for the purposes of this
`
`proceeding, prior art to the ‘084 patent includes patents and printed publications in
`
`the relevant art.
`
`30.
`
`I have been informed and understand that a claim is not patentable if it
`
`is anticipated or obvious. In other words, claimed subject matter is only patentable
`
`if it is new and not obvious in light of the work of others that came before—which
`
`is usually reflected in published papers and patents. Anticipation of a claim
`
`requires that every element of a claim be disclosed expressly or inherently in a
`
`single prior art reference. Obviousness of a claim requires that the claim be
`
`obvious from the perspective of a person of ordinary skill in the art at the time the
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 18
`
`

`

`alleged invention was made. I understand that a claim may be obvious from a
`
`combination of two or more prior art references.
`
`31.
`
`I have been informed and understand that certain factors may support
`
`or rebut the obviousness of a claim. Such secondary considerations include,
`
`among other things, commercial success of the patented invention, skepticism of
`
`those having ordinary skill in the art at the time of invention, unexpected results of
`
`the invention, long –felt need in the art that was satisfied by the alleged invention,
`
`and the failure of others to make the alleged invention.
`
`32.
`
`I have been informed and understand that a claim is obvious if it
`
`simply combines old elements with no change to their respective functions, or
`
`alters prior art by mere substitution of one element for another known in the field,
`
`in a manner that yields predictable results.
`
`33.
`
`I have been informed and understand that a person of ordinary skill in
`
`the art is presumed to have knowledge of all of the relevant prior art at the time of
`
`the claimed invention, and that if the available prior art shows each of the elements
`
`of the asserted claims, I should determine whether it then would have been obvious
`
`to combine or coordinate these elements in the same manner as in the claim at
`
`issue.
`
`34.
`
`I have been informed and understand that a patent composed of
`
`several elements is not proved obvious merely by demonstrating that each of its
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 19
`
`

`

`elements was independently known in the art, but that I must determine whether a
`
`person of ordinary skill has simply implemented a predictable (and therefore
`
`obvious) variation of prior art elements or, conversely, whether he or she has made
`
`an improvement that is more than the predictable use of prior art elements
`
`according to their established functions and therefore non-obvious.
`
`35.
`
`I have further been informed and understand that a claimed invention
`
`can be rendered obvious by a combination of multiple references, as long as there
`
`is a reason to combine disclosed in the references or a person of skill in the art
`
`would have otherwise had a motivation to combine those references in solving a
`
`problem addressed by the claimed invention.
`
`VI. LEVEL OF ORDINARY SKILL IN THE ART
`
`36.
`
`I understand that anticipation and obviousness are to be analyzed from
`
`the perspective of one of ordinary skill in the art who would be involved in the
`
`same field as the ‘084 patent.
`
`37. The field of the ‘084 patent is described as “intrusion detection
`
`systems for computer systems and, more particularly, to network-based intrusion
`
`detection systems.” I understand that the application that matured into the ‘084
`
`patent was filed on March 26, 2002, and that it is this time period that is relevant
`
`for assessing the level of ordinary skill in the art.
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 20
`
`

`

`38.
`
`I have been informed that there are many factors relevant to
`
`determining the level of ordinary skill in the pertinent art, including the educational
`
`level of workers in the field at the time of the alleged invention, the sophistication
`
`of the technology, the type of problems encountered in the art, and the prior art
`
`solutions to those problems.
`
`39. Based on these factors, it is my opinion that a person of ordinary skill
`
`in the art at the time of the alleged invention of the ‘084 patent would have had at
`
`least a Bachelor of Science degree in Computer Science or similar degree, and one
`
`to two years of work experience in developing security applications or with
`
`network security.
`
`40. Based on my qualifications, I consider myself qualified to provide
`
`opinions from the perspective of one of ordinary skill in the art for the ‘084 patent.
`
`VII. CLAIM CONSTRUCTION AND THE BROADEST REASONABLE
`CONSTRUCTION
`
`41.
`
`I have been informed and understand that a primary step in
`
`determining patentability is to properly construe the claims to determine claim
`
`scope and meaning.
`
`42.
`
`I have been informed and understand that for purposes of this
`
`proceeding, the claim terms should be given their “broadest reasonable
`
`construction in light of the specification.”
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 21
`
`

`

`43.
`
`I have been informed and understand that the claim terms, unless a
`
`special and particular definition is provided, should be afforded their ordinary and
`
`accustomed meaning that they would have to a person of ordinary skill in the art. I
`
`have thus interpreted the claim terms following these guidelines.
`
`44.
`
`I have reviewed the constructions proposed by Petitioners in the
`
`Petition for inter partes review as well as the constructions adopted by IV in
`
`concurrent litigation. It is my opinion that the claims are invalid under the
`
`construction laid out in the Petition or under any reasonable construction of the
`
`claim terms. The table below represents my understanding of the proper
`
`construction of several of the claim terms when given their “broadest reasonable
`
`construction in light of the specification.”
`
`Term(s)
`
`Broadest Reasonable Construction
`
`an anomaly in the
`
`an irregularity in the network indicative of misuse of
`
`network
`
`network systems or resources
`
`network-based
`
`techniques for detecting an intrusion by analyzing
`
`intrusion detection
`
`network communications
`
`techniques
`
`alerting the
`
`notifying the device, associated firewall, or
`
`device/alerts the
`
`administrator, which are responsible for protecting the
`
`devices
`
`device by responding to identified threats
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1003
`Page 22
`
`

`

`adjusting the
`
`reconfiguring or adjusting pertinent parameters (of the
`
`firewall/controlling the
`
`firewall/of the device)
`
`device
`
`
`VIII. PRIOR ART REFERENCES
`
`45. The following is my understandin

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket