throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`__________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`___________________
`
`PALO ALTO NETWORKS, INC.,
`Petitioner,
`
`v.
`
`FINJAN, INC.,
`Patent Owner.
`
`____________________
`
`Case IPR2015-01974
`Patent 7,647,633
`
`__________________________________________________________
`
`PATENT OWNER’S PRELIMINARY RESPONSE
`UNDER 37 C.F.R. § 42.107
`
`
`
`
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`TABLE OF CONTENTS
`
`Page
`
`I.
`
`II.
`
`INTRODUCTION ........................................................................................... 1
`
`THE ‘633 PATENT ......................................................................................... 4
`
`A. Overview ............................................................................................... 4
`
`B.
`
`Challenged Claims ................................................................................ 7
`
`III. CLAIM CONSTRUCTION .......................................................................... 10
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`“mobile protection code (“MPC”)” (all challenged claims) ............... 10
`
`“information re-communicator” (challenged claims 2, 14, and
`19) ........................................................................................................ 11
`
`“means for receiving downloadable-information” (claim 13) ............ 12
`
`“means for determining whether the downloadable-information
`includes executable code” (claim 13) ................................................. 13
`
`“means for causing mobile protection code to be communicated
`to at least one information-destination of the downloadable-
`information, if the downloadable information is determined to
`include executable code” (claim 13) ................................................... 14
`
`IV. SPECIFIC REASONS WHY THE CITED REFERENCES DO NOT
`INVALIDATE THE CLAIMS, AND WHY INTER PARTES REVIEW
`SHOULD NOT BE INSTITUTED ............................................................... 15
`
`A.
`
`B.
`
`The Board Should Deny the Petition Under 35 U.S.C. § 325(d) ........ 17
`
`The Board Should Deny the Petition Under 37 C.F.R. §§
`42.20(c), 42.22(a)(2), and 42.104(b)(4) .............................................. 24
`
`C. Ground 1: Shin does not Render Obvious Claims 1–4, 6–8, 13,
`14, and 19 ............................................................................................ 28
`
`1.
`
`Petitioner Has Not Demonstrated that Shin Discloses “[a
`content inspection engine communicatively coupled to
`the information monitor for/means for] determining [,by
`
`- i -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`the computer] whether the downloadable-information
`includes executable code” (claims 1, 8, and 13) ....................... 30
`
`2.
`
`Petitioner Has Not Demonstrated that Shin Discloses
`“causing mobile protection code to be executed by the
`mobile code executor at a downloadable-information
`destination such that one or more operations of the
`executable code at the destination, if attempted, will be
`processed by the mobile protection code” (claims 14) ............. 32
`
`D. Ground 2: Poison Java Does Not Anticipate Claim 28 ....................... 34
`
`1.
`
`Petitioner Has Not Demonstrated that Poison Java
`Discloses “receiving a sandboxed package that includes
`mobile protection code (“MPC”) and a Downloadable
`and one or more protection policies at a computer at a
`Downloadable-destination” (claim 28) ..................................... 35
`
`E.
`
`Ground 3: Poison Java in view of Shin does not Render Claim 1
`Obvious ............................................................................................... 38
`
`1.
`
`Petitioner Has Not Demonstrated that Poison Java in
`view of Shin Discloses “determining ,by the computer
`whether the downloadable-information includes
`executable code” (claim 1) ........................................................ 39
`
`F.
`
`Ground 4: Poison Java in view of Brown does not Render
`Claims 14, 19, and 34 Obvious ........................................................... 39
`
`1.
`
`2.
`
`Petitioner Has Not Demonstrated that Poison Java in
`view of Brown Discloses “causing mobile protection
`code to be executed by the mobile code executor at a
`downloadable-information destination such that one or
`more operations of the executable code at the destination,
`if attempted, will be processed by the mobile protection
`code” (claim 14) ........................................................................ 39
`
`Petitioner Has Not Demonstrated that Poison Java in
`view of Shin Discloses “a sandboxed package capable of
`being received an initiated by the mobile code executor
`on the computer, the sandboxed package including a
`Downloadable and mobile protection code (“MPC”) for
`
`- ii -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`causing one or more Downloadable operations to be
`intercepted by the computer and for processing the
`intercepted operations by the computer, if the
`Downloadable attempts to initiation the operations”
`(claim 34) .................................................................................. 40
`
`V.
`
`THE PROPOSED GROUNDS ARE CUMULATIVE ................................. 41
`
`VI. CONCLUSION .............................................................................................. 41
`
`
`
`- iii -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`
`EMC Corp, v. Secure Axcess, LLC,
`Case IPR2014-00475, Paper No. 10 (P.T.A.B. Sep. 9, 2014) ............................ 27
`
`Goertek, Inc. v. Knowles Electronics, Inc.,
`IPR2013-00523, Paper 26 (PTAB May 30, 2014) ............................................. 41
`
`Graham v. John Deere Co.,
`383 U.S. 1 (1966) .......................................................................................... 37, 38
`
`KSR Int'l Co. v. Teleflex Inc.,
`550 U.S. 398 (2007) ............................................................................................ 38
`
`Liberty Mutual Ins. Co. v. Progressive Casualty Inc.,
`CBM2012-00003, Paper No. 7 (PTAB Oct. 25, 2012) ...................................... 41
`
`Prism Pharma Co., v. Choongwae Pharma Corp.,
`Case No. IPR2014-00315, Paper 14 (PTAB July 8, 2014). ............................... 16
`
`Ring & Pinion Service Inc. v. ARB Corp.,
`743 F. 3d 831 (Fed. Cir. 2014) ........................................................................... 12
`
`Ruiz v. A.B. Chance Co.,
`234 F.3d 654 (Fed. Cir. 2000) ............................................................................ 38
`
`In re Suitco Surface, Inc.,
`603 F.3d 1255 (Fed. Cir. 2010) .......................................................................... 12
`
`Travelocity.com L.P. v. Conos Techs., LLC,
`CBM2014-00082, Paper 12 (PTAB Oct. 16, 2014) ............................................. 4
`
`ZTE Corp. v. Contentguard Holdings, Inc.,
`IPR2013-00136, Paper 31 (Nov. 5, 2013) ................................................... 27, 28
`
`Statutes
`
`35 U.S.C. § 102(a) ................................................................................................... 15
`
`35 U.S.C. § 103 ........................................................................................................ 28
`
`- iv -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`35 U.S.C. § 103(a) ................................................................................................... 15
`
`35 U.S.C. § 112(6) ....................................................................................... 12, 13, 14
`
`35 U.S.C. § 112(f) .................................................................................................... 13
`
`35 U.S.C. § 325(d) ............................................................................................passim
`
`Other Authorities
`
`37 C.F.R. §§ 42.20(c), 42.22(a)(2), and 42.104(b)(4) ................................. 16, 25, 27
`
`37 C.F.R § 42.22(a)(2) ............................................................................................. 36
`
`37 C.F.R. § 42.108(c) ................................................................................................. 1
`
`
`
`- v -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`I.
`
`INTRODUCTION
`
`On September 30, 2015, Palo Alto Networks, Inc. (“Petitioner”) submitted a
`
`Petition to institute inter partes review (“IPR”) of U.S. Patent No. 7,647,633 (Ex.
`
`1001, “the ‘633 Patent”), challenging claims 1–4, 6–8, 13, 14, 19, 28, and 34.
`
`Finjan, Inc. (“Patent Owner”) requests that the Board not institute inter partes
`
`review because Petitioner has not demonstrated a reasonable likelihood that it
`
`would prevail in showing unpatentability of any of the challenged claims on the
`
`grounds asserted in its Petition, as required under 37 C.F.R. § 42.108(c).
`
`The ‘633 Patent generally discloses systems and methods for protecting
`
`network-connectable devices from undesirable downloadables. ‘633 Patent at
`
`1:30–33. One set of independent claims requires, inter alia, receiving
`
`downloadable-information, determining whether downloadable-information
`
`includes executable code and, if the downloadable-information is determined to
`
`include executable code, transmitting mobile protection code to an information
`
`destination of the downloadable-information. See ‘633 Patent at independent
`
`claims 1, 8, and 13. Another set of independent claims requires, inter alia, a
`
`sandboxed package including a Downloadable and mobile protection code. See id.
`
`at independent claims 28 and 34. Yet another independent claim requires (1)
`
`receiving, at the information re-communicator, downloadable-information
`
`including executable code and (2) causing mobile protection code to be executed
`
`- 1 -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`by the mobile code executor at a downloadable-information destination such that
`
`one or more operations of the executable code at the destination, if attempted, will
`
`be processed by the mobile protection code. See id. at claim 14.
`
`As a result, Finjan’s approach is able to provide efficient and flexible
`
`protection against malicious operations hidden within apparently inert or otherwise
`
`“friendly” downloadable-information, including web pages, streaming media,
`
`transaction-facilitating information, program updates or other downloadable-
`
`information. See id. at 4:16–27.
`
`The Board has already determined, with respect to U.S. Patent 7,058,822
`
`(“the ‘822 Patent”), of which the ‘633 Patent is a continuation, that the techniques
`
`disclosed in the various references cited in Grounds 1–4 of the Petition do not
`
`disclose Finjan’s approach at least because they do not determine whether
`
`downloadable-information includes executable code or form a sandboxed package
`
`including mobile protection code and the downloadable-information. See Ex. 2002
`
`at 5–7. In reversing an Examiner’s decision regarding the ‘822 Patent, the Board
`
`ruled that applet instrumentation does not disclose the claimed determining of
`
`executable code nor the use of a sandboxed package. See id. (affirming the
`
`patentability of the ‘822 Patent in view of applet instrumentation).
`
`The primary references cited in this Petition (i.e. Shin and Poison Java)
`
`disclose the same functionality the Board rejected, namely applet instrumentation.
`
`- 2 -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`See Ex. 1009 (“Shin”) at Abstract; and Ex. 1004 (“Poison Java”) at 5, col. 3–6,
`
`col. 1. In fact, Poison Java discusses the exact same technology that the Board
`
`distinguished, namely AppletTrap. See Ex. 2005 (demonstrating that Ji U.S. Patent
`
`5,983,348, which issued to Trend Micro, Inc., is directed to its AppletTrap
`
`product). Thus, the Board should deny Grounds 1–4 under 35 U.S.C. § 325(d)
`
`because the Petition inappropriately recycles the same applet instrumentation
`
`arguments already presented to the Board and which the Board already rejected in
`
`the reexamination of the related ‘822 Patent.
`
`Like the ex parte reexamination in which the Board confirmed the
`
`patentability of the ‘822 claims, the instant Petition never identifies how applet
`
`instrumentation references disclose or render obvious each of the claim elements.
`
`Instead, Petitioner attempts to abstract away claim elements by lumping them
`
`together with other distinct claim elements. Indeed, none of the Petition’s grounds
`
`identifies how the prior art discloses determining “whether the downloadable-
`
`information includes executable code,” forms the claimed “sandboxed package
`
`including the MPC and the Downloadable,” or “one or more operations of the
`
`executable code.” At best, both Shin and Poison Java simply modify every applet
`
`encountered into an instrumented applet without making the required executable
`
`code determination, forming the claimed “sandboxed package,” or processing one
`
`or more operations of the executable code at the destination, which was received at
`
`- 3 -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`an information re-communicator. Brown, which is directed towards a Java-
`
`enabled Web browser, does not cure these fatal deficiencies in the primary
`
`references. Ex. 1041 (“Brown”).
`
`Although there are a variety of reasons why the ‘633 Patent is valid over
`
`Petitioner’s asserted prior art references, this Preliminary Response focuses on
`
`only limited reasons why inter partes review should not be instituted. See
`
`Travelocity.com L.P. v. Conos Techs., LLC, CBM2014-00082, Paper 12 at 10
`
`(PTAB Oct. 16, 2014) (“[N]othing may be gleaned from the Patent Owner’s
`
`challenge or failure to challenge the grounds of unpatentability for any particular
`
`reason.”). Patent Owner specifically reserves its right to dispute that Petitioner has
`
`correctly named all real-parties-in-interest in the event that sufficient factual bases
`
`supporting such a challenge surface during the pendency of this proceeding. The
`
`deficiencies of the Petition noted herein, however, are sufficient for the Board to
`
`find that Petitioner has not met its burden to demonstrate a reasonable likelihood
`
`that it would prevail in showing unpatentability of any of the challenged claims.
`
`II. THE ‘633 PATENT
`A. Overview
`Patent Owner’s ‘633 Patent claims priority to a number of patents and patent
`
`applications, including U.S. Provisional Patent Application No. 60/205,591 and
`
`U.S. Patents Nos.7,058,822 (“the ‘822 Patent”), 6,804,780 (“the ‘780 Patent”),
`
`- 4 -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`6,092,194 ( “the ‘194 Patent”), 6,480,962 (“the ‘962 Patent”), and 6,167,520 with
`
`an earliest claimed priority date of January 29, 1997. See Ex. 2003 at 1.
`
`The ‘633 Patent describes systems and methods for protecting against
`
`executable code downloaded from remote sites, such as web servers. ‘633 Patent at
`
`Abstract. In particular, the ‘633 Patent describes a network “re-communicator”
`
`that intercepts downloadable-information and determines whether the
`
`downloadable-information includes executable code (i.e. is a “Downloadable”).
`
`Id. at 2:39–44. For this purpose, the ‘633 Patent further discloses a detection
`
`engine that is able to determine whether the downloadable-information includes
`
`executable code, thus identifying that the downloadable is a “detected-
`
`downloadable.” ‘633 Patent at 12:8–17. If the downloadable-information includes
`
`executable code, in one example, the re-communicator causes the mobile
`
`protection code (“MPC”) to be transferred to the destination. ‘633 Patent at 2:66–
`
`3:4.
`
`The MPC and protection policies can be packaged with the downloadable-
`
`information in a “sandbox.” Id. “The sandboxed package includes mobile
`
`protection code (‘MPC’) for causing one or more predetermined malicious
`
`operations or operation combinations of a Downloadable to be monitored or
`
`otherwise intercepted.” Id. at 3:7–11. When an undesirable operation is
`
`- 5 -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`intercepted, the protection policy causes one or more predetermined operations to
`
`be performed. Id. at 3:11–16.
`
`As noted in the Background of the Invention Section, the invention disclosed
`
`and claimed in the ‘633 Patent provided distinct advantages over the virus
`
`protection paradigms that existed at the time:
`
`To make matters worse, certain classes of viruses are not well
`recognized or understood, let alone protected against. It is observed by
`this inventor, for example, that Downloadable information comprising
`program code can include distributable components (e.g. Java™
`applets and JavaScript scripts, ActiveX™ controls, Visual Basic, add-
`ins and/or others). It can also include, for example, application
`programs, Trojan horses, multiple compressed programs such as zip
`or meta files, among others. U.S. Pat. No. 5,983,348 to Shuang,
`however, teaches a protection system for protecting against only
`distributable components
`including “Java applets or ActiveX
`controls”, and further does so using resource intensive and high
`bandwidth static Downloadable content and operational analysis, and
`modification of the Downloadable component; Shuang further fails to
`detect or protect against additional program code included within a
`tested Downloadable.
`
`- 6 -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`Id. at 1:58–2:6. Notably, the Poison Java article cited against the claims discusses
`
`“InterScan AppletTrap,” which is the product that corresponds to the Shuang (Ji)
`
`patent discussed in this section.1 See Ex. 2005 at 1.
`
`B. Challenged Claims
`Petitioner challenges claims 1, 4–6, 8, 9, 12, 16–20, 22, 24, and 27 of the
`
`‘633 Patent, of which claims 1, 4, 9, 12, and 16 are independent. Claim terms
`
`specifically discussed in this Patent Owner’s Preliminary Response are highlighted
`
`below. Claim 1 recites:
`
`1. A computer processor-based method, comprising:
`
`receiving, by a computer, downloadable-information;
`determining, by the computer, whether the downloadable-
`
`information includes executable code; and
`
`based upon the determination, transmitting from the computer
`mobile protection code to at least one information-destination of the
`downloadable-information,
`if
`the downloadable-information
`is
`determined to include executable code.
`
`‘633 Patent at 20:54–62 (emphasis added). Claim 8 recites:
`
`8. A computer processor-based system for computer security, the
`system comprising
`
`
`1 A feature-by-feature comparison of the description of AppletTrap with U.S.
`
`Patent No. 5,983,348 (“Ji”) (Ex. 2006) is provided below in § IV.A.
`
`- 7 -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`an information monitor for receiving downloadable-information
`
`by a computer;
`a content inspection engine communicatively coupled to the
`
`information monitor for determining, by the computer, whether
`the downloadable-information includes executable code; and
`
`a protection agent engine communicatively coupled to the
`content inspection engine for causing mobile protection code
`(“MPC”) to be communicated by the computer to at least one
`information-destination of
`the downloadable-information,
`if
`the
`downloadable-information is determined to include executable code.
`
`Id. at 21:19–32 (emphasis added). Claim 13 recites:
`
`13. A processor-based system for computer security, the system
`comprising:
`
`means for receiving downloadable-information;
`means
`for determining whether
`the downloadable-
`
`information includes executable code; and
`
`means for causing mobile protection code to be communicated
`to at
`least one
`information-destination of
`the downloadable-
`information, if the downloadable-information is determined to include
`executable code.
`
`Id. at 21:49–57 (emphasis added). Claim 14 recites:
`
`14. A computer program product, comprising a computer usable
`medium having a computer readable program code therein, the
`computer readable program code adapted to be executed for computer
`security, the method comprising:
`
`- 8 -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`providing a system, wherein the system comprises distinct
`
`software modules, and wherein the distinct software modules
`comprise an information re-communicator and a mobile code
`executor;
`re-communicator,
`information
`the
`at
`receiving,
`
`downloadable-information including executable code; and
`causing mobile protection code to be executed by the mobile
`
`code executor at a downloadable-information destination such
`that one or more operations of the executable code at the
`destination, if attempted, will be processed by the mobile
`protection code.
`
`Id. at 21:58–22:5 (emphasis added). Claim 28 recites:
`
`28. A processor-based method, comprising:
`includes mobile
`receiving a sandboxed package that
`
`protection code (“MPC”) and a Downloadable and one or more
`protection policies at a computer at a Downloadable-destination;
`
`causing, by the MPC on the computer, one or more operations
`attempted by the Downloadable to be received by the MPC;
`
`receiving, by the MPC on the computer, an attempted operation
`of the Downloadable; and
`
`initiating, by the MPC on the computer, a protection policy
`corresponding to the attempted operation.
`
`Id. at 22:52–63 (emphasis added). Claim 34 recites:
`
`34. A processor-based system for computer security, the system
`comprising:
`
`- 9 -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`a mobile code executor on a computer for initiating received
`
`mobile code; and
`
`a sandboxed package capable of being received and
`
`initiated by the mobile code executor on the computer, the
`sandboxed package
`including a Downloadable and mobile
`protection code (“MPC”) for causing one or more Downloadable
`operations to be intercepted by the computer and for processing the
`intercepted operations by the computer, if the Downloadable attempts
`to initiate the operations.
`
`Id. at 23:17–28 (emphasis added).
`
`III. CLAIM CONSTRUCTION
`A.
`“mobile protection code (“MPC”)” (all challenged claims)
`Petitioner argues that “mobile protection code” should be construed as “code
`
`that, at runtime, monitors or intercepts actually or potentially malicious code
`
`operations,” because this was supposedly the same construction provided by the
`
`district court’s claim construction order in the Blue Coat Litigation. Petition at 19.
`
`But Petitioner failed to present the whole story by omitting the fact that the same
`
`claim construction order also found “that the MPC does not modify executable
`
`code found in the downloadable-information.” Ex. 1036 at 10. While Patent
`
`Owner advocated against the Court’s construction in the Blue Coat Litigation,
`
`Patent Owner submits that in the interest of accuracy the full description provided
`
`- 10 -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`by the district court’s claim construction should be noted rather than Petitioner’s
`
`partial construction.
`
`“information re-communicator” (challenged claims 2, 14, and 19)
`
`B.
`The term “information re-communicator” means “a device or process that is
`
`capable of receiving and transferring a Downloadable.” This definition is
`
`explicitly provided in the specification of the ‘633 Patent:
`
`In one aspect, embodiments of the invention provide for determining,
`within one or more network “servers” (e.g. fireballs [sic], resources,
`gateways, email relays or other devices/processes that are capable of
`receiving-and-transferring
`a Downloadable) whether
`received
`information includes executable code (and is a “Downloadable”).
`
`‘633 Patent at 2:39–44. As explained in the ‘633 Patent, the term “server” was
`
`specifically designated for convenience as an alternative to the term “re-
`
`communicator” and was meant to encompass “one or more network servers,
`
`firewalls or other network connectable information re-communicating devices:
`
`A protection engine according to an embodiment of the invention is
`operable within one or more network servers, firewalls or other
`network connectable information re-communicating devices (as are
`referred to herein summarily one or more “servers” or “re-
`communicators”).
`
`Id. at 2:58–62.
`
`- 11 -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`Thus, Petitioner’s proposed construction for the term “information re-
`
`communicator” as a “server” (Petition at 20) is incorrect because it fails to consider
`
`the possibility that the information re-communicator is a firewall, resources, email
`
`relay, or any other device or process that is capable of receiving and transferring a
`
`Downloadable. See In re Suitco Surface, Inc., 603 F.3d 1255, 1260 (Fed. Cir.
`
`2010) (“Rather, claims should always be read in light of the specification and
`
`teachings in the underlying patent.”).
`
`“means for receiving downloadable-information” (claim 13)
`
`C.
`Governed by 35 U.S.C. § 112(6), this term has the function: receiving
`
`downloadable-information, and the structure: recommunicating device. See ‘633
`
`Patent at 5:34-37 (providing examples of “information re-communicating devices”
`
`for performing the relevant function of “receiving downloadable-information.”).
`
`In contrast, Petitioner proposes a construction that is contrary to the law.
`
`Petitioner’s construction requires “equivalents known to persons of ordinary skill
`
`at the time the ‘633 Patent was filed.” However, the law provides that equivalents
`
`are determined at the time of issuance. Ring & Pinion Service Inc. v. ARB Corp.,
`
`743 F. 3d 831, 835 (Fed. Cir. 2014). Thus, as a matter of law, Petitioner’s claim
`
`construction arguments fail.
`
`Further, Petitioner’s construction includes the extraneous limitation that the
`
`structure includes equivalents. This limitation is unnecessary as the statute already
`
`- 12 -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`provides that the structure of a means-plus-function claim includes the
`
`“equivalents thereof.” 35 U.S.C. § 112(f). As such, there is no need to include
`
`“equivalents known to persons of ordinary skill in the art” in the construction of
`
`this term.
`
`Lastly, Petitioner’s claim construction excludes examples from the
`
`specification. Specifically, the specification of the ‘633 Patent provides that
`
`servers, firewalls, resources, gateways, email relays or other information re-
`
`communicating devices receive downloadable information. ‘633 Patent at 5:34-39.
`
`In other embodiments, ISP and Internet servers can receive downloadable
`
`information. Id. at 7:8-11 Because Petitioner’s construction excludes these
`
`embodiments, the proper structure for receiving Downloadable-information is a
`
`recommunicating device.
`
`D.
`
`“means for determining whether the downloadable-information
`includes executable code” (claim 13)
`
`Governed by 35 U.S.C. § 112(6), this term has the function: determining
`
`whether the downloadable-information includes executable code, and the structure:
`
`detection engine. See ‘633 Patent at 12:8-26 and Figs. 4 & 5 (describing various
`
`components of “detection engine 402”).
`
`Similar to the means-plus-function term described above, Petitioner
`
`proposes a construction for this term that is contrary to the law and unnecessary.
`
`Petition at 21 (asserting that the “means for determining whether the downloadable
`
`- 13 -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`information includes executable code” recited in claim 13 is “code detection
`
`engine and equivalents known to persons of ordinary skill in the art at the time
`
`the ’633 patent was filed.”) (emphasis added). For the same reasons noted above,
`
`Petitioner’s construction should be rejected because it does not match the legal
`
`standard, and further, is unnecessary and it does not define the appropriate
`
`structure for the function recited.
`
`E.
`
`“means for causing mobile protection code to be communicated to
`at least one information-destination of the downloadable-
`information, if the downloadable information is determined to
`include executable code” (claim 13)
`
`Governed by 35 U.S.C. § 112(6), this term has the function: causing
`
`mobile protection code to be communicated to at least one information destination
`
`of the downloadable information, if the downloadable information is determined to
`
`include executable code, and the structure: recommunicating device. See ‘633
`
`Patent at 5:34-47 (providing examples of “information re-communicating devices”
`
`for performing the relevant function of “causing mobile protection code (‘MPC’)
`
`and downloadable protection policies to be communicated to . . . information
`
`destinations.”).
`
`Similar to the means plus function terms described above, Petitioner
`
`proposes a construction for this term that is contrary to the law and unnecessary.
`
`Petition at 23 (asserting that the “means for causing” recited in claim 13 is
`
`“packaging engine and equivalents known to persons of ordinary skill in the art
`
`- 14 -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`at the time the ’633 patent was filed.”). For the same reasons noted above,
`
`Petitioner’s construction should be rejected because it does not match the legal
`
`standard, and further, is unnecessary and it does not define the appropriate
`
`structure for the function recited.
`
`IV. SPECIFIC REASONS WHY THE CITED REFERENCES DO NOT
`INVALIDATE THE CLAIMS, AND WHY INTER PARTES REVIEW
`SHOULD NOT BE INSTITUTED
`
`Petitioner’s four proposed Grounds rely on three references.
`
`Ground 1 proposes that Insik Shin et al, Java Bytecode Modification and
`
`Applet Security,” Technical Report, Computer Science Department, Stanford
`
`University (Ex. 1009, “Shin”) renders claims 1–4, 6–8, 13, 14, and 19 obvious
`
`under 35 U.S.C. § 103(a).
`
`Ground 2 proposes that Eva Chen, Poison Java, IEEE Spectrum (Ex. 1004,
`
`“Poison Java”) anticipates claim 28 under 35 U.S.C. § 102(a).
`
`Ground 3 proposes that Shin in view of Poison Java renders claim 1 obvious
`
`under 35 U.S.C. § 103(a).
`
`Ground 4 proposes that Poison Java in view of Brown et al., Using Netscape
`
`3 (Ex. 1041, “Brown”) renders claims 14, 19, and 34 obvious under 35 U.S.C.
`
`§ 103(a).
`
`As a threshold matter, the Board should deny Grounds 1–4 under 35 U.S.C.
`
`§ 325(d) because Petitioner simply relies on Shin and Poison Java to recycle
`
`- 15 -
`
`

`
`Patent Owner’s Preliminary Response
`IPR2015-01974 (U.S. Patent No. 7,647,633)
`
`substantially the same art and/or arguments previously presented to the Office.
`
`Patent Owner should not be required to defend a multiplicity of challenges to the
`
`‘633 Patent based on substantially the same prior art and arguments that have
`
`already been presented to and considered by the USPTO. See Prism Pharma Co.,
`
`v. Choongwae Pharma Corp., Case No. IPR2014-00315, Paper 14 at 12–13
`
`(PTAB July 8, 2014).
`
`Furthermore, the Board should deny Grounds 1–4 under 37 C.F.R. §§
`
`42.20(c), 42.22(a)(2), and 42.104(b)(4), because the Petition does not identify how
`
`the references disclose or render obvious each of the claim elements, including the
`
`“downloadable-information” and “executable code” elements recited in claims 1,
`
`8, and 13; the “sandboxed package,” “mobile protection code,” and
`
`“Downloadable” elements recited in claims 29 and 34, and the “one or more
`
`operations of the executable code” element recited in claim 14. Rather, Petitioner
`
`effectively invites the Board to make the required identifications. But it is
`
`Petitioner’s burden to “establish that it is entitled to the requested relief” and to do
`
`so “[t]he petition must specify where each element of the claim is found in the
`
`prior art” and provide “a detailed explanation of the significance of the evidence.”
`
`37 C.F.R. §§ 42.20(c), 42.22(a)(2), and 42.104(b)(4). Because the Petition fails to
`
`even make the threshold identification of claim elements, the Board should decline
`
`to institute a trial.
`
`- 16 -
`
`

`
`Patent Owner’s Preliminary

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket