throbber
NO: 443232US
`
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`__________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`__________________
`
`GOOGLE INC.,
`Petitioner,
`
`v.
`
`ROCKSTAR CONSORTIUM US LP,
`Patent Owner.
`__________________
`
`Case IPR2015-_____
`Patent U.S. 6,128,298
`__________________
`
`
`
`
`PETITION FOR INTER PARTES REVIEW OF
`U.S. PATENT NO. 6,128,298
`UNDER 35 U.S.C. § 312 AND 37 C.F.R. § 42.104
`
`
`
`Mail Stop PATENT BOARD
`Patent Trial and Appeal Board
`US Patent and Trademark Office
`PO Box 1450
`Alexandria, Virginia 22313-1450
`
`
`
`
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`TABLE OF CONTENTS
`
`
`
`
`
`
`
`
`
`
`
`
`
` Page
`
`
`
`
`
`
`
`
`
`I.
`
`II.
`
`MANDATORY NOTICES PURSUANT TO 37 C.F.R. § 42.8 ..................... 1
`
`CERTIFICATION OF GROUNDS FOR STANDING .................................. 2
`
`III. OVERVIEW OF CHALLENGE AND RELIEF REQUESTED .................... 2
`
`A.
`
`B.
`
`Prior Art Patents and Printed Publications ............................................ 2
`
`Grounds for Challenge .......................................................................... 5
`
`IV. BACKGROUND OF THE ’298 PATENT ..................................................... 5
`
`A. Overview of the ’298 Patent .................................................................. 5
`
`B.
`
`Prosecution History of the ’298 Patent ................................................. 6
`
`V.
`
`CLAIM CONSTRUCTION ............................................................................ 7
`
`A.
`
`“ignoring” .............................................................................................. 9
`
`VI.
`
`IDENTIFICATION OF HOW CHALLENGED CLAIM 23 IS
`UNPATENTABLE ........................................................................................ 10
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`G.
`
`Claim 23 is anticipated by Kim ........................................................... 10
`
`Claim 23 is rendered obvious by Kim in view of Mayes .................... 16
`
`Claim 23 is rendered obvious by Kim in view of Feigen ................... 21
`
`Claim 23 is rendered obvious by Yeom in view of Mayes
`and Shwed ........................................................................................... 28
`
`Claim 23 is rendered obvious by Yeom in view of Feigen
`and Shwed ........................................................................................... 39
`
`Claim 23 is rendered obvious by Attanasio in view of
`Mayes and Shwed ................................................................................ 45
`
`Claim 23 is rendered obvious by Attanasio in view of
`Feigen and Shwed ............................................................................... 55
`
`VII. CONCLUSION .............................................................................................. 60
`
`
`
`i
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`
`
`TABLE OF AUTHORITIES
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page
`
`
`
`Cases
`
`In re Trans Texas Holdings Corp.,
`
`498 F.3d 1290 (Fed. Cir. 2007) ....................................................................... 8
`
`Phillips v. AWH Corp.,
`
`415 F.3d 1303 (Fed. Cir. 2005) ...................................................................8, 9
`
`Statutes
`
`35 U.S.C. § 102(a) ............................................................................................... 3
`
`35 U.S.C. § 102(b) ........................................................................................... 3, 4
`
`35 U.S.C. § 102(e) ........................................................................................... 3, 4
`
`35 U.S.C. § 314(a) ............................................................................................... 5
`
`35 U.S.C. § 315(a) ............................................................................................... 1
`
`Rules
`
`37 C.F.R. § 42.8 ................................................................................................... 1
`
`37 C.F.R. § 42.22 ................................................................................................. 2
`
`37 C.F.R. § 42.100 ............................................................................................... 7
`
`37 C.F.R. § 42.104 ........................................................................................ 2, 10
`
`
`
`ii
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`I. MANDATORY NOTICES PURSUANT TO 37 C.F.R. § 42.8
`
`Real Party-in-Interest: Google Inc. (“Petitioner”)
`
`Related Matters: U.S. Patent No. 6,128,298 (the “’298 patent”) is asserted in
`
`the following cases: (1) consolidated case Rockstar Consortium US LP et al v.
`
`ASUSTeK Computer, Inc. et al., Consolidated Case No. 2:13-cv-00894 (E.D. Tex.),
`
`which consolidated six different cases filed by Rockstar Consortium US LP; (2)
`
`Arris Group, Inc. et al. v. Constellation Techs. LLC et al., Case No. 14-CV-114 (D.
`
`Del.); (3) Bockstar Techs. LLC v. Cisco Sys. Inc., Case No. 13-CV-2020 (D. Del.).
`
`The ’298 patent is also asserted in Google Inc. v. Rockstar Consortium US LP et
`
`al., Case No. 4:13-cv-05933-CW (N.D. Cal.). In that case, Google requested a
`
`declaration of non-infringement on the ’298 patent; Rockstar counterclaimed for
`
`infringement of the ’298 patent; and Google then pled the affirmative defense of
`
`invalidity with respect to the ’298 Patent. Google’s affirmative defense does not
`
`trigger the statutory bar against filing an inter partes review petition. 35 U.S.C.
`
`§ 315(a)(3). There are no patents or applications that claim the benefit of the filing
`
`date of the ’298 patent.
`
`Petitioner is also filing petitions for inter partes review challenging claims
`
`11–19, 22, and 24–32 of the ’298 patent. Petitioner recommends assigning all
`
`proceedings to the same panel.
`
`Counsel:
`
`Lead Counsel:
`
`Scott A. McKeown (Reg. No. 42,866)
`
`
`
`1
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`Backup Counsel: Greg Gardella (Reg. No. 46,045)
`
`Service Information : Email : CPDocketMcKeown@oblon.com
`
`CPDocketGardella@oblon.com
`
`Post: Oblon Spivak, 1940 Duke St., Alexandria, VA 22314
`
`Telephone: 703-412-6297
`
`Facsimile: 703-413-2220
`
`II. CERTIFICATION OF GROUNDS FOR STANDING
`
`Petitioner certifies pursuant to Rule 42.104(a) that the patent for which
`
`review is sought is available for inter partes review and that Petitioner is not
`
`barred or estopped from requesting an inter partes review challenging the patent
`
`claims on the grounds identified in this Petition.
`
`III. OVERVIEW OF CHALLENGE AND RELIEF REQUESTED
`
`Pursuant to Rules 42.22(a)(1) and 42.104(b)(1)–(2), Petitioner challenges
`
`claim 23 of the ’298 patent. The ’298 patent claims priority to Provisional U.S.
`
`Patent Application No. 60/015,945, which was filed on Apr. 24, 1996 . (Ex. 1501,
`
`the ’298 patent.)
`
`A.
`
`Prior Art Patents and Printed Publications
`
`Petitioner relies upon the following patents and printed publications:
`
`Exhibit 1503 – “IP Address Reuse Through Transparent Port-Address
`
`Translator,” by Il Hwan Kim et al. (“Kim”) was published by The Journal of Korea
`
`Information and Communications Society in December 1995, which is prior to the
`
`
`
`2
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`earliest filing date claimed by the ’298 patent (April 24, 1996). Kim is therefore
`
`available as prior art under at least pre-AIA 35 U.S.C. § 102(a). Kim was not
`
`considered during the original prosecution of the ’298 patent and is not cumulative
`
`of any prior art considered by the examiner(s).
`
`Exhibit 1505 – U.S. Patent No. 5,793,763 to John C. Mayes et al. (“Mayes”)
`
`issued on August 11, 1998, based on Application Serial No. 08/552,807, filed
`
`November 3, 1995, which is prior art to the earliest filing date claimed by the ’298
`
`patent (April 24, 1996). Mayes is therefore available as prior art under at least
`
`pre-AIA 35 U.S.C. § 102(e). Mayes was considered during the original
`
`prosecution of the ’298 patent, but is presented in a new light when considered in
`
`combination with Kim and the expert declaration of Professor Vijay K. Madisetti,
`
`PhD.
`
`Exhibit 1506 – “A Transparent TCP/IP Gateway to Connect Private
`
`Networks to the Internet,” by Heon Yeom et al. (“Yeom”). As shown by the
`
`Declaration of Bob Kummerfeld (Ex. 1528), Yeom was publicly posted to the
`
`Internet on January 30, 1995 and, therefore, was publicly available prior to the
`
`earliest filing date claimed by the ’298 patent (April 24, 1996). See MPEP 2128
`
`II.B (“Prior art disclosures on the Internet or on an on-line database are considered
`
`to be publicly available as of the date the item was publicly posted.”) Yeom is
`
`therefore available as prior art under at least pre-AIA 35 U.S.C. § 102(b). Yeom
`
`
`
`3
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`was not considered during the original prosecution of the ’298 patent and is not
`
`cumulative of any prior art considered by the examiner(s).
`
`Exhibit 1510 – U.S. Patent No. 5,606,668 to Shwed (“Shwed”) issued on
`
`February 25, 1997, based on Application Serial No. 08/168,041, filed December
`
`15, 1993, which is prior to the earliest filing date claimed by the ’298 patent (April
`
`24, 1996). Shwed is therefore available as prior art under pre-AIA 35 U.S.C. §
`
`102(e). Shwed was not considered during the original prosecution of the ’298
`
`patent and is not cumulative of any prior art considered by the examiner(s).
`
`Exhibit 1523 – U.S. Patent No. 5,371,852 to Attanasio et al. (“Attanasio”)
`
`issued on December 6, 1994, which is at least one year prior to the earliest filing
`
`date claimed by the ’298 patent (April 24, 1996). Attanasio is therefore available
`
`as prior art under at least pre-AIA 35 U.S.C. § 102(b). Attanasio was not
`
`considered during the original prosecution of the ’298 patent and is not cumulative
`
`of any prior art considered by the examiner(s).
`
`Exhibit 1524 – U.S. Patent No. 5,699,513 to Feigen et al. (“Feigen”) issued
`
`on December 16, 1997, based on Application Serial No. 08/414,823, filed March
`
`31, 1995, which is prior to the earliest filing date claimed by the ’298 patent (April
`
`24, 1996). Feigen is therefore available as prior art under at least pre-AIA 35
`
`U.S.C. § 102(e). Feigen was not considered during the original prosecution of the
`
`’298 patent and is not cumulative of any prior art considered by the examiner(s).
`
`
`
`4
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`B. Grounds for Challenge
`
`Petitioner requests cancellation of challenged claim 23 under the following
`
`statutory grounds:
`
`i. Claim 23 is anticipated by Kim;
`
`ii. Claim 23 is rendered obvious by Kim in view of Mayes;
`
`iii. Claim 23 is rendered obvious by Kim in view of Feigen;
`
`iv. Claim 23 is rendered obvious by Yeom in view of Mayes and Shwed;
`
`v. Claim 23 is rendered obvious by Yeom in view of Feigen and Shwed;
`
`vi. Claim 23 is rendered obvious by Attanasio in view of Mayes and Shwed; and
`
`vii. Claim 23 is rendered obvious by Attanasio in view of Feigen and Shwed.
`
`Section VI below demonstrates, for each of the statutory grounds, that there
`
`is a reasonable likelihood that Petitioner will prevail. See 35 U.S.C. § 314(a).
`
`Additional explanation and support for each ground of rejection is set forth in the
`
`Expert Declaration of Professor Vijay K. Madisetti, PhD (Exhibit 1509).
`
`IV. BACKGROUND OF THE ’298 PATENT
`
`A. Overview of the ’298 Patent
`
`The ’298 patent is directed to the basic and well-known concept of network
`
`address translation using an IP filter. (Ex. 1501, Abstract.) A source node in the
`
`first network with a private IP address and port (pIP, pPort) sends an outgoing data
`
`packet to an IP address and Port (iIP, iPort) corresponding to a destination node in
`
`
`
`5
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`a second network. (Id. at 5:55–60.) An IP filter intercepts the outgoing data
`
`packet and replaces the source node’s IP address/port number combination with an
`
`IP address and port number of the IP filter (frIP, frPort) before sending the
`
`outgoing data packet to the destination node in the second network. (Id. at 5:65–
`
`6:4.) The IP filter also maintains a translation table, which stores, inter alia, the
`
`source and destination node IP address and port numbers. (Id. at 5:40–50.) The IP
`
`filter uses its own port number (frPort) plus an offset value to establish an index
`
`into the translation table. (Id. at 6:2–4.) When the IP filter receives an incoming
`
`data packet from the second network, the IP filter uses its port number with the
`
`known offset as an index into the translation table. The IP filter replaces the IP
`
`filter’s IP address/port number (frIP, frPort) in the incoming packet with the first
`
`network’s IP address/port number (pIP, pPort), and then routes the packet to the
`
`correct node in the first network. (Id. at 6:5–14.)
`
`B.
`
`Prosecution History of the ’298 Patent
`
`The application that matured into the ’298 patent, U.S. Patent Application
`
`No. 08/842,328 (“the ’328 application”), was filed on April 24, 1997. The ’328
`
`application claims priority to Provisional U.S. Application No. 60/015,945, which
`
`was filed on April 24, 1996.
`
`In a non-final office action mailed on April 27, 1999, the examiner rejected
`
`claims 1-5, 9, 11, 14–18, 22, 24, and 27–31 of the ’328 application over U.S.
`
`
`
`6
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`Patent No. 5,781,550 (“Templin”). (Ex. 1502, pp. 57–64.)
`
`In a response dated July 27, 1999, the applicants submitted a declaration
`
`under Rule 131 “including facts showing a completion of the invention claimed in
`
`the present application before the filing date of the Templin reference (February 2,
`
`1996).” (Ex. 1502, pp. 67–93.)
`
`In a non-final office action dated October 12, 1999, the examiner rejected all
`
`claims 1–5, 9, 11–18, and 22–32 of the ’328 application as being obvious in view
`
`of U.S. Patent No. 5,793,763 (“Mayes”). (Ex. 1502, pp. 96–101.)
`
` In a response dated February 25, 2000, the applicants amended claims 6,
`
`10, 19, and 23 to rewrite them in independent form. Furthermore, applicants
`
`argued that “Mayes does not disclose such a lookup table for stored source
`
`information, indexed by the filter node port number.” (Ex. 1502, pp. 106–15.)
`
`The ’298 patent issued on October 3, 2000.
`
`V. CLAIM CONSTRUCTION
`
`In an inter partes review, claim terms in an unexpired patent are interpreted
`
`according to their broadest reasonable interpretation (“BRI”) in view of the
`
`specification in which they appear. 37 C.F.R. § 42.100(b); Office Patent Trial
`
`Practice Guide, 77 Fed. Reg. 48,756, 48,766 (Aug. 14, 2012). The USPTO uses BRI
`
`because, among other reasons, the patentee has the opportunity to amend its claims in
`
`this proceeding. See, e.g., Office Patent Trial Practice Guide, 77 Fed. Reg. 48,756,
`
`
`
`7
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`48,764 (Aug. 14, 2012) (“Since patent owners have the opportunity to amend their
`
`claims during IPR, PGR, and CBM trials, unlike in district court proceedings, they
`
`are able to resolve ambiguities and overbreadth through this interpretive approach,
`
`producing clear and defensible patents at the lowest cost point in the system.”).
`
`Thus, as required by the applicable rules, this Petition uses the BRI standard. The
`
`BRI of claim terms here may be different from the construction that those same terms
`
`may receive following claim construction proceedings in district court. See, e.g., In
`
`re Trans Texas Holdings Corp., 498 F.3d 1290, 1297 (Fed. Cir. 2007). Thus the
`
`claim constructions presented in this Petition, including where Petitioner does not
`
`propose an express construction, do not necessarily reflect the claim constructions
`
`that Petitioner believes should be adopted by a district court under Phillips v. AWH
`
`Corp., 415 F.3d 1303 (Fed. Cir. 2005). In presenting this Petition, unless otherwise
`
`stated, the grounds set forth herein are based on (1) the proposed claim
`
`construction offered by the Patent Owner in Google Inc. v. Rockstar Consortium
`
`US LP, et al., Case No. 13-5933 (N.D. Cal.) (Ex. 1526), or (2) for terms where
`
`Patent Owner has not explicitly offered a claim construction, on petitioner’s
`
`understanding of Patent Owner’s infringement contentions in Google Inc. v.
`
`Rockstar Consortium US LP, et al., Case No. 13-5933 (N.D. Cal.). (Ex. 1527.) In
`
`presenting the grounds set forth in this Petition, petitioner does not concede that
`
`any claim constructions impliedly or expressly proposed by Patent Owner are
`
`
`
`8
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`appropriate for the district court litigation, where a different legal standard applies
`
`to the construction of the asserted claim terms. Petitioner does not believe that
`
`many of the Patent Owner’s implied or express proposed constructions are
`
`appropriate under Phillips v. AWH Corp., 415 F.3d 1303 (Fed. Cir. 2005). Instead,
`
`petitioner presents these proposed constructions to the Board for consideration in
`
`determining the BRI because Patent Owner considers these constructions correct
`
`under Phillips, and therefore necessarily also considers them within the appropriate
`
`scope of the BRI. Petitioner further submits these constructions under 35 U.S.C. §
`
`301(a)(2), which encourages submission of claim construction materials to prevent
`
`patentees from arguing broad constructions under Phillips while simultaneously
`
`arguing narrow constructions as the BRI.
`
`A.
`
`“ignoring”
`
`Claim 23 recites the “ignoring” term. The specification teaches that packets
`
`are ignored in two situations. First, packets are ignored if they are not TCP, UDP,
`
`or ICMP packets. (Ex. 1501, 2:56–57.) Second, packets are ignored if they “do
`
`not have entries in the lookup table corresponding to the IP filter port.” (Ex. 1501,
`
`3:22–24.) When a packet “does not match the corresponding entries in the table,”
`
`an “unauthorized access is logged and the packet dropped.” (Ex. 1501, 6:21–23.)
`
`Thus, the “ignoring” function of the IP filter is designed to prevent “unauthorized
`
`access” to the private network nodes, thereby enhancing security—the IP filter
`
`
`
`9
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`takes no further action to process a packet because it is not recognized by the IP
`
`filter. (Ex. 1509, ¶ 58.) Accordingly, a person of ordinary skill in the art would
`
`consider the broadest reasonable interpretation in light of the specification and
`
`prosecution history of “ignoring” to be “dropping.” (Id.)
`
`VI.
`
`IDENTIFICATION OF HOW CHALLENGED CLAIM 23 IS
`UNPATENTABLE
`
`Pursuant to Rule 42.104(b)(4)–(5), this section demonstrates that the
`
`challenged claims are unpatentable.
`
`A. Claim 23 is anticipated by Kim
`
`Kim (Ex. 1504)
`“[C]onnections to external networks by multiple local
`nodes by using one global address can be provided by
`translating many local sockets to one global address
`and unused port number.” (Ex. 1504, p. 39.)
`
`See also Madisetti Expert Declaration (Ex. 1509, ¶ 60.)
`
`“From this point on, the sockets in each node will be
`marked as (IP address, TCP port number), and all TCP
`packets will be expressed as (srcIP, srcPORT, dstIP,
`dstPORT).” (Ex. 1504, p. 39.)
`
` A
`
` packet is received with a source address of the
`inner network and a destination address in the
`outer network :
`
`
`(Ex. 1504, p. 44.)
`
`
`
`
`Claim 23.
`[23A] A method of
`operating a filter node
`for interfacing first and
`second data
`communications
`networks, comprising
`the steps of:
`[23B] receiving from
`the first network, an
`outgoing data packet
`having destination
`information, which
`includes a destination
`address and a destination
`port, corresponding to a
`node in the second
`network and having
`source information,
`which includes a source
`address and a source
`port, corresponding to a
`node in the first
`
`
`
`10
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`Claim 23.
`network:
`
`[23C] maintaining the
`source information taken
`from the outgoing data
`packet in correlation
`with a unique value
`representing a port of
`the filter node;
`
`Kim (Ex. 1504)
`“[Y]ou’ll see that the packet going from (S, 1000) to
`(D, 23) is relayed by G, changed to (G, 3000), and then
`sent to (D, 23) and that the packet sent from (D, 23) to
`(G, 3000) is relayed to (S, 1000) by G so that a one-to-
`one connection can be made between S and D.” (Ex.
`1504, p. 40.)
`
`See also Madisetti Expert Declaration (Ex. 1509,
`¶¶ 61–62.)
`“Take a look at Table 1. This table shows the sockets
`(IPaddr, PORT) created from the Node 1 (inner nodes)
`of the stub B class network with the address of
`172.16.0.0 being corresponded with the port number of
`G (Gateway node) with a global address.” (Ex. 1504,
`p. 40.)
`
`
`
`
`
`(Ex. 1504, p. 40.)
`
` A
`
` table entry with source address and port is
`allocated for a packet establishing a new
`connection:
`
`(Ex. 1504, p. 44.)
`
` A
`
` port table maintains the IP address and port of
`inner network nodes correlated with the gateway
`port value:
`
`
`
`11
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`Claim 23.
`
`Kim (Ex. 1504)
`
`
`
`(Ex. 1504, p. 44.)
`
`See also Madisetti Expert Declaration (Ex. 1509, ¶ 62.)
`“The transmitter header of an outbound packet is
`revised from (I. Addr. I. PORT) to (G. Addr. G. PORT)
`in accordance with the port-address translation table
`and then relayed to an external global network. In
`addition, the receiver header of a packet, received by G
`from outside, is revised from (G. Addr. G. PORT) to (I.
`Addr. I. PORT) and delivered to an internal local area
`network.”
`(Ex. 1504, p. 40.)
`The packet’s source IP address and port are
`replaced with a source IP address and port of the
`gateway node:
`
`
`
`
`(Ex. 1504, p. 44.)
`
`See also Madisetti Expert Declaration (Ex. 1509, ¶ 63.)
`“The transmitter header of an outbound packet is
`revised from (I. Addr. I. PORT) to (G. Addr. G. PORT)
`in accordance with the port-address translation table
`and then relayed to an external global network. In
`addition, the receiver header of a packet, received by G
`from outside, is revised from (G. Addr. G. PORT) to (I.
`Addr. I. PORT) and delivered to an internal local area
`
`[23D] replacing in the
`outgoing data packet the
`source address with an
`address of the filter node
`and the source port with
`the filter node port
`value;
`
`[23E] sending to the
`second network the
`outgoing data packet
`having the replaced
`source information,
`whereby that packet is
`routed according to its
`
`
`
`12
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`Claim 23.
`destination information
`to the corresponding
`second network node;
`
`[23F] receiving from
`the second network, an
`incoming data packet
`having the address of the
`filter node as the
`destination address;
`[23G] correlating the
`destination port of the
`destination information
`in the incoming data
`packet to particular
`source information
`being maintained;
`
`Kim (Ex. 1504)
`
`network.”
`(Ex. 1504, p. 40.)
`
`See also Madisetti Expert Declaration (Ex. 1509, ¶ 63–
`64.)
`“The receiver header of a packet, received by G, is
`revised from (G. Addr, G. PORT) to (I. Addr, I. PORT)
`and delivered to an internal area network.” (Ex. 1504,
`p. 40.)
`
`See also Madisetti Expert Declaration (Ex. 1509, ¶ 65.)
`“Take a look at Table 1. This table shows the sockets
`(IPaddr, PORT) created from the Node 1 (inner nodes)
`of the stub B class network with the address of
`172.16.0.0 being corresponded with the port number of
`G (Gateway node) with a global address.” (Ex. 1504,
`p. 40.)
`
`
`
`(Ex. 1504, p. 40.)
`
`The return packet is correlated to an inner node
`address and port:
`
`
`
`(Ex. 1504, p. 44.)
`
`See also Madisetti Expert Declaration (Ex. 1509, ¶ 65.)
`“The receiver header of a packet, received by G, is
`revised from (G. Addr, G. PORT) to (I. Addr, I. PORT)
`and delivered to an internal local area network.” (Ex.
`1504, p. 40.)
`
`The return packet’s destination IP address and port
`are changed to the destination IP address and port
`of the inner node:
`
`[23H] replacing, in the
`incoming data packet,
`the destination
`information with the
`particular source
`information;
`
`
`
`13
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`Claim 23.
`
`Kim (Ex. 1504)
`
`
`
`(Ex. 1504, p. 44.)
`
`See also Madisetti Expert Declaration (Ex. 1509, ¶ 65.)
`“The receiver header of a packet, received by G, is
`revised from (G. Addr, G. PORT) to (I. Addr, I. PORT)
`and delivered to an internal local area network.” (Ex.
`1504, p. 40.)
`
`(Ex. 1504, p. 44.)
`
`The return packet is routed to the inner node:
`
`
`
`[23I] sending to the first
`network the incoming
`data packet having the
`replaced destination
`information, whereby
`that packet is routed
`according to its
`destination information
`to the corresponding
`first network node; and
`
`(Ex. 1504, p. 44.)
`
`
`
`
`
`(Ex. 1504, p. 44.)
`
`See also Madisetti Expert Declaration (Ex. 1509, ¶ 66.)
`“By fundamentally controlling inbound requests, a
`security effect that is provided by the firewall system
`can be obtained.” (Ex. 1504, p. 43.)
`
`Incoming data packets for which no entry exists in
`the table are ignored:
`
`
`[23J] ignoring the
`incoming data packet
`received from the
`second network, if the
`destination port of the
`destination information
`in that data packet can
`not be correlated to the
`maintained source
`information,
`
`(Ex. 1504, p. 44.)
`
`
`14
`
`
`
`
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`Claim 23.
`
`Kim (Ex. 1504)
`See also Madisetti Expert Declaration (Ex. 1509,
`¶¶ 67–69.)
`“Take a look at Table 1. This table shows the sockets
`(IPaddr, PORT) created from the Node 1 (inner nodes)
`of the stub B class network with the address of
`172.16.0.0 being corresponded with the port number of
`G (Gateway node) with a global address.” (Ex. 1504,
`p. 40.)
`
`[23K] wherein
`maintaining the source
`information includes
`storing the source
`information from the
`outgoing data packet as
`an entry in a lookup
`table, and the filter node
`port value correlating to
`the source information
`constitutes an index into
`the table for that entry;
`
`(Ex. 1504, p. 40.)
`
`The destination port is used as an index to search
`the port table:
`
`
`
`
`
`
`
`(Ex. 1504, p. 44.)
`
`See also Madisetti Expert Declaration (Ex. 1509, ¶ 62.)
`“Relaying UDP applications is possible by
`implementing a suitable time based algorithm.” (Ex.
`1504, p. 43.)
`
`See also Madisetti Expert Declaration (Ex. 1509, ¶ 69.)
`
`
`[23L] wherein the
`outgoing and incoming
`data packets include
`packets in accordance
`with a user datagram
`protocol (UDP) over an
`
`
`
`15
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`Claim 23.
`internet protocol (IP);
`and
`[23M] receiving a UDP
`data packet from the
`first network, and
`adding the source
`information and the
`destination information
`from the UDP packet
`together with an interval
`indication for an
`expiration timer as a
`new entry in the lookup
`table.
`
`
`Kim (Ex. 1504)
`
`“Relaying UDP application is possible by
`implementing a suitable time based algorithm.” (Ex.
`1504, p. 43.)
`
`“The current prototype port-address translator uses an
`idle time threshold based algorithm with the threshold
`fixed at 2 minutes.” (Ex. 1504, p. 42.)
`
`See also Madisetti Expert Declaration (Ex. 1509, ¶ 69.)
`
`B. Claim 23 is rendered obvious by Kim in view of Mayes
`
`1. Obviousness Arguments
`
`Claim 23 recites, in relevant part, “ignoring the incoming data packet
`
`received from the second network, if the destination port of the destination
`
`information in that data packet can not be correlated to the maintained source
`
`information . . . .” Claim 23 claims a packet filtering function that was well known
`
`prior to April 1995. In fact, such packet filtering was an important feature of prior
`
`art address translation systems, as shown by the Mayes reference cited in the
`
`prosecution history and described below.
`
`It would have been obvious to a person of ordinary skill in the art at the time
`
`of invention of the ‘298 patent to combine Kim with the teaching of Mayes, which
`
`discloses the packet filtering functionality of claim 16. (Ex. 1509, ¶¶ 74–77.) Like
`
`
`
`16
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`Kim, Mayes describes a system “for translating local IP addresses to globally
`
`unique IP addresses.” (Ex. 1505, Abstract.) Mayes “employs NAT [network
`
`address translation] in conjunction with an adaptive security algorithm to keep
`
`unwanted packets from external sources out of a private network.” (Id. at 2:16–
`
`18.) Mayes teaches a “table of allocated translation slots.” (Id. at 5:5:49–50.)
`
`Each slot tracks an active connection, and includes “the local host’s IP address and
`
`a global IP address selected from the pool of available addresses.” (Id. at 6:20–
`
`22.) In order to evaluate an inbound packet Mayes
`
`determines whether the port and IP source and destination addresses
`of the inbound packet match those of any connection object of the
`static translation slot. If no such match is found, it can again be
`assumed that the internal host did not initiate a connection requesting
`the inbound packet. Thus, if decision step 290 is answered in the
`negative, the process is concluded at 296 with the packet being
`dropped and logged.
`(Id. at 12:32–39.)
`
`Because Mayes and Kim are directed to the very same technology – address
`
`translation enabling communication with private data networks – one of ordinary
`
`skill would have looked to Mayes for beneficial teachings relevant to Kim’s port-
`
`address translator. (Ex. 1509, ¶¶ 74-77.) The motivation for such a combination is
`
`clear and compelling – private network security. Kim itself teaches that the Kim
`
`address-translator has a security function: “[b]y fundamentally controlling
`
`
`
`17
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`inbound requests, a security effect that is provided by the firewall system can be
`
`obtained.” (Ex. 1504, p. 43.) This would have motivated one of skill in the art to
`
`improve upon the system by adding features that enhance security. (Ex. 1509,
`
`¶¶ 75–76.) In fact, Mayes teaches that its packet filtering security features are a
`
`“must have” feature in any NAT system:
`
`To implement a NAT, a translation system must be provided between
`the enterprise private network and the Internet. By virtue of this
`location, the translation must act as a firewall to protect the local
`private network from unwanted Internet packets. In view of this
`requirement, it would be desirable to have a system which employs
`NAT and provides a secure firewall.
`(Ex. 1505, 2:6–12.) In addition, one of skill in the art would recognize the security
`
`benefits of packet filtering based on firewall and security principles that were well
`
`known at the time of alleged conception, including as described in Mayes. (Ex.
`
`1509, ¶¶ 75–76.)
`
`One of ordinary skill would further understand that the inclusion of Mayes’
`
`packet filtering techniques in Kim’s port-address translator would be well within
`
`the technical skill of one of ordinary skill in the art. Kim already includes a table
`
`tracking active connections similar to Mayes’ translation slot table; the addition of
`
`rules for ignoring unwanted packets would be a trivial modification to Kim. (Ex.
`
`1509, ¶ 77.) Such a modification would present no great technical challenges, and
`
`would not negatively impact the functionality of Kim’s port-address translator.
`
`
`
`18
`
`

`
`U.S. Patent 6,128,298
`Petition for Inter Partes Review
`2. Claims Charts
`
`Claim 23.
`[23A] A method of operating a
`filter node for interfacing first and
`second data communications
`networks, comprising the steps of:
`[23B] receiving from the first
`network, an outgoing data packet
`having destination information,
`which includes a destination
`address and a destination port,
`corresponding to a node in the
`second network and having source
`information, which includes a
`source address and a source port,
`corresponding to a node in the
`first network:
`[23C] maintaining the source
`information taken from the
`outgoing data packet in correlation
`with a unique value representing a
`port of the filter node;
`[23D] replacing in the outgoing
`data packet the source address
`with an address of the filter node
`and the source port with the filter
`node port value;
`[23E] sending to the second
`network the outgoing data packet
`having the replaced source
`in

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket