throbber
Paper No.____
`Filed: January 20, 2016
`
`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`
`Filed on behalf of: Blue Coat Systems, Inc.
`By: Michael T. Rosato
`
`Andrew S. Brown
`WILSON SONSINI GOODRICH & ROSATI
`
`
`701 Fifth Avenue, Suite 5100
`
`Seattle, WA 98104-7036
`
`Tel.: 206-883-2529
`
`Fax: 206-883-2699
`Email: mrosato@wsgr.com
`
`
`Email: asbrown@wsgr.com
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`_____________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_____________________________
`
`
`
`BLUE COAT SYSTEMS, INC.,
`Petitioner,
`
`v.
`
`FINJAN, INC.,
`Patent Owner.
`_____________________________
`
`IPR2016-00480
`
`Patent No. 7,647,633
`
`_____________________________
`
`PETITION FOR INTER PARTES REVIEW
`PURSUANT TO 37 C.F.R. § 42.100 et seq.
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`
`TABLE OF CONTENTS
`
`Page
`
`I.
`
`INTRODUCTION ....................................................................................... 1
`
`II. MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(A)(1) ....................... 1
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`Real Party-In-Interest Under 37 C.F.R. § 42.8(b)(1) .......................... 1
`
`Related Matters Under 37 C.F.R. § 42.8(b)(2) ................................... 2
`
`Lead and Back-Up Counsel under 37 C.F.R. § 42.8(b)(3) .................. 3
`
`Service Information ........................................................................... 3
`
`Power of Attorney .............................................................................. 3
`
`III.
`
`PAYMENT OF FEES - 37 C.F.R. § 42.103 ................................................. 4
`
`IV. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37
`C.F.R. §§ 42.104 AND 42.108 ..................................................................... 4
`
`A. Grounds for Standing Under 37 C.F.R. § 42.104(a) ........................... 4
`
`B.
`
`Identification of Challenge Under 37 C.F.R. § 42.104(b) and
`Statement of Precise Relief Requested ............................................... 4
`
`C.
`
`Status of the Cited References as Prior Art ........................................ 5
`
`1.
`
`2.
`
`3.
`
`Poison Java is prior art ............................................................. 5
`
`Shin is prior art ........................................................................ 5
`
`Brown is prior art ..................................................................... 6
`
`D.
`
`Threshold Requirement for Inter Partes Review 37 C.F.R. §
`42.108(c)............................................................................................ 7
`
`V.
`
`BACKGROUND OF TECHNOLOGY RELATED TO THE ’633
`PATENT ...................................................................................................... 7
`
`VI. SUMMARY OF THE ’633 PATENT ........................................................ 11
`
`A.
`
`B.
`
`The ’633 Patent ................................................................................ 11
`
`The Prosecution History of the ’633 Patent ...................................... 11
`
`
`
`-i-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`
`C.
`
`D.
`
`The Ex Parte Reexamination History of the ’633 Patent .................. 12
`
`Priority Dates of the Petitioned Claims ............................................ 13
`
`1.
`
`2.
`
`3.
`
`The Priority Claims to the ’667 and ’302 Applications
`and Their Parent Applications Are Improper .......................... 14
`
`Claimset 1 – Claims 1, 2, 3, 8, 13–14, 19, 28, and 34 lack
`written description support until May 17, 2000 ...................... 15
`
`Claimset 2 – Claims 4, 6, and 7 lack written description
`support until May 17, 2001 .................................................... 16
`
`VII. CLAIM CONSTRUCTION UNDER 37 C.F.R. § 42.104(B)(3) ................ 16
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`The Petitioned Claims of the ʼ633 Patent ......................................... 16
`
`“mobile protection code (“MPC”)” (all claims) ............................... 18
`
`“information re-communicator” (claims 2, 14, and 19) .................... 20
`
`“means for receiving downloadable-information” (claim 13) ........... 20
`
`“means for determining whether the downloadable-information
`includes executable code” (claim 13) ............................................... 21
`
`“means for causing mobile protection code to be communicated
`to at least one information-destination of the downloadable-
`information, if the downloadable information is determined to
`include executable code” (claim 13) ................................................ 22
`
`VIII. PERSON HAVING ORDINARY SKILL IN THE ART............................ 23
`
`IX. THE PRIOR ART ...................................................................................... 24
`
`A. Overview of Poison Java.................................................................. 24
`
`B.
`
`C.
`
`D.
`
`Overview of Shin ............................................................................. 25
`
`Overview of Brown ......................................................................... 25
`
`Poison Java, Shin, and Brown Are Analogous Art ........................... 26
`
`X.
`
`THE PETITIONED CLAIMS OF THE ’633 PATENT ARE
`UNPATENTABLE .................................................................................... 26
`
`A. Ground 1 – Shin Renders Claims 1–4, 6–8, 13, 14, and 19
`Obvious under 35 U.S.C. § 103(a) ................................................... 26
`
`
`
`-ii-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`Independent Claim 1 .............................................................. 26
`
`Dependent Claim 2: “The method of claim 1, wherein the
`receiving includes monitoring received information of an
`information re-communicator.” .............................................. 29
`
`Dependent Claim 3: “The method of claim 2, wherein the
`information re-communicator is a network server.” ............... 30
`
`Dependent Claim 4: “The method of claim 1, wherein the
`determining comprises analyzing the downloadable-
`information for an included type indicator indicating an
`executable file type.” ............................................................. 30
`
`Dependent Claim 6: “The method of claim 1, wherein the
`determining comprises analyzing the downloadable-
`information for an included file type indicator and an
`information pattern corresponding to one or more
`information patterns that tend to be included within
`executable code.” ................................................................... 30
`
`Dependent Claim 7: “executable code characteristics” ........... 31
`
`Independent Claim 8 .............................................................. 32
`
`Independent Claim 13 ............................................................ 34
`
`Independent Claim 14 ............................................................ 36
`
`10. Dependent Claim 19: “The method of claim 14, wherein
`the re-communicator is at least one of a firewall and a
`network server.” ..................................................................... 42
`
`B.
`
`C.
`
`Ground 2 – Poison Java Anticipates Claim 28 under 35 U.S.C.
`§ 102(a) ........................................................................................... 42
`
`Ground 3 – Poison Java in view of Shin Renders Claim 1
`Obvious under 35 U.S.C. § 103(a) ................................................... 45
`
`1.
`
`Independent Claim 1 .............................................................. 45
`
`D. Ground 4 – Poison Java in view of Brown Renders Claims 14,
`19, and 34 Obvious under 35 U.S.C. § 103(a) ................................. 48
`
`1.
`
`Independent Claim 14 ............................................................ 48
`
`
`
`-iii-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`
`2.
`
`Dependent Claims 19: “The method of claim 14, wherein
`the re-communicator is at least one of a firewall and a
`network server.” ..................................................................... 52
`
`3.
`
`Independent Claim 34 ............................................................ 52
`
`E.
`
`Secondary Considerations of Non-Obviousness ............................... 54
`
`1.
`
`2.
`
`3.
`
`4.
`
`Licensing ............................................................................... 55
`
`Alleged Copying .................................................................... 56
`
`Alleged Commercial Success ................................................. 56
`
`Alleged Industry Praise .......................................................... 56
`
`XI. CONCLUSION ......................................................................................... 57
`
`
`
`
`
`-iv-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`
`List of Exhibits
`
`
`
`
`
`Description of Document
`
`1002
`1003
`1004
`
`1008
`
`Exhibit
`No.
`1001 U.S. Patent No. 7,647,633 (“Edery et al.”)
`Declaration of Dr. Aviel D. Rubin in support of Petition for Inter
`Partes Review (“Rubin”)
`90/013,016, Final Office Action (“633 Reexam”) (May 22, 2015)
`Eva Chen “Poison Java” IEEE Spectrum (1999)
`2015-09-10 Declaration of Gerard P. Grenier in support of the “Poison
`Java” reference
`1005
`1006 Webpage: Workshop and Miscellaneous Publications, Insik Shin
`1007 Webpage: Filewatcher – 7/27/98
`Ian Welch and Robert Stroud “Kava – A Reflective Java Based on
`Bytecode Rewriting” (January 1999)
`Insik Shin and John C. Mitchell “Java Bytecode Modification and
`Applet Security” (1998)
`1009
`Carey Nachenberg “The Evolving Virus Threat”
`1010
`1011 David M. Chess “Security Issues in Mobile Code Systems” (1998)
`R. Braden and J. Postel “Requirements for Internet Gateways” (June
`1987)
`1012
`International Publication No. WO 98/21683 to (“Touboul”)
`1013
`1014 U.S. Patent No. 6,088,803 (“Tso”)
`1015 U.S. Patent No. 5,889,943 (“Ji”)
`Li Gong et al. “Going Beyond the Sandbox: An Overview of the New
`Security Architecture in the Java Development Kit 1.2” (1997)
`1016
`1017 Webpage: Oracle - Java Security Architect
`Paul Sabanal, Mark Yason, and Mark Vincent “Digging Deep Into the
`Flash Sandboxes” (2012)
`1018
`1019 Webpage: Oracle - Deploying With the Applet Tag
`Yougang Song et al. “BRSS: A Binary Rewriting Security System for
`Mobile Code”
`Yougang Song and Brett D. Fleisch “Utilizing Binary Rewriting for
`Improving End-host Security” IEEE Vol. 18, No. 12 (Dec. 2007)
`Stephen McCamant and Greg Morrisett “Efficient, Verifiable Binary
`Sandboxing for CISC Architecture”
`1022
`1023 Virus Bulletin (March 1991)
`
`1020
`
`1021
`
`-v-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`
`Exhibit
`No.
`
`Description of Document
`
`1024
`
`1025
`
`1026
`1027
`
`1033
`
`1034
`
`1035
`
`1036
`
`Patent Application 11/159,455 Office Action – Non-Final Rejection
`(February 25, 2009)
`Patent Application 11/159,455 – Patent Owner Amendment and
`Response to Office Action Under 37.C.F.R. §1.111 (May 26, 2009)
`Patent Application 11/159,455 - Notice of Allowance and Fee(s) due
`(May 26, 2009)
`90/013,016 Reexam Non-Final Office Action (November 19, 2013)
`90/013,016 Reexam Supplemental Amendment to Correct Priority
`Paragraphs Required by 37 CFR §§ 1.78 (August 25, 2014)
`1028
`90/013,016 Reexam Notice of Appeal (June 22, 2015)
`1029
`Patent Application 11/159,455 Data Sheet
`1030
`1031 U.S. Pat. No. 6,804,780 (“Touboul”)
`1032 U.S. Pat. No. 6,480,962 (“Touboul”)
`Plaintiff Finjan, Inc.’s Reply Claim Construction Brief, Finjan, Inc. v.
`Blue Coat Systems, Inc., 13-cv-3999-BLF (July 7, 2014)
`Joint Post-Hearing Claim Construction Chart, Ex. A, Finjan Software,
`Ltd. v. Secure Computing Corporation, et al. 06-cv-369-GMS
`(October 30, 2007)
`Plaintiff Finjan, Inc.’s Opening Claim Construction Brief, Finjan, Inc.
`v. Websense, Inc., 13-cv-4398-BLF (September 23, 2014)
`Order Construing Claims, Finjan, Inc. v. Blue Coat Systems, Inc., 13-
`cv-3999-BLF (October 20, 2014)
`Plaintiff Finjan, Inc.’s Opening Claim Construction Brief, Finjan, Inc.
`v. Proofpoint, Inc. and Armorize Technologies, Inc., 3:13-cv-5808-
`HSG (May 1, 2015)
`Claim Construction Order, Finjan Software, Ltd. v. Secure Computing
`et al. 06-cv-369-GMS (December 11, 2007)
`Plaintiff Finjan, Inc.’s Opening Claim Construction Brief, Finjan, Inc.
`v. Blue Coat Systems, Inc., 13-cv-3999-BLF (June 16, 2014)
`1039
`Provisional Application No. 60/205,591 (May 17, 2000)
`1040
`1041 Mark Brown “Using Netscape 3” (1996)
`90/013,016 Reexam Response to Non-Final Office Action (February
`19, 2014)
`Finjan Investor Presentation, Q1 (2013)
`Dr. Frederick Cohen “Computer Viruses: Theory and Experiments”
`(1987)
`
`1037
`
`1038
`
`1042
`1043
`
`1044
`
`
`
`-vi-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`
`Exhibit
`No.
`
`Description of Document
`
`1047
`
`1048
`
`1055
`
`1056
`
`Thomas M. Chen and Jean-Marc Robert “The Evolution of Viruses
`and Worms”
`1045
`1046 Virus Bulletin Issue Archive (2015)
`Sandeep Kumar and Eugene H. Spafford “A Generic Virus Scanner in
`C++,” (September 17, 1992)
`Morgan B. Adair “Detecting Viruses in the NetWare Environment”
`(March 1, 1992)
`1049 Virus Bulletin (November 1991)
`1050 Virus Bulletin, (December 1991)
`1051 Webpage: McAfee Antivirus product page
`1052 Webpage: Norton Antivirus product page
`1053 Webpage: Information Security Stack Exchange
`1054 Webpage: W3Schools, JavaScript Tutorial page
`Sarah Gordon and David Chess “Attitude Adjustment: Trojans and
`Malware on the Internet - An Update”
`Andreas Moser et al. “Limits of Static Analysis for Malware
`Detection”
`Ian Goldberg et al. “A Secure Environment for Untrusted Helper
`Applications (Confining the Wily Hacker)” (July 1996)
`1057
`1058 Wayne A. Jansen “Countermeasures for Mobile Agent Security”
`Byron Cook et al. “Proving Program Termination,” Communications
`of the ACM, Vol. 54, No. 5 (May 2011)
`1059
`1060 Webpage: Schneier on Security
`Javier Esparza “Decidability of Model Checking for Infinite-State
`Concurrent Systems”
`Edmund Clarke et al. “Model Checking and State Explosion Problem”
`Drew Dean et al. “Java Security: From HotJava to Netscape and
`Beyond”
`1063
`1064 NSA Defense in Depth
`1065 Dr. Thomas Porter “The Perils of Deep Packed Inspection”
`J. Mark Smith et al. “Protecting a Private Network: The AltaVista
`Firewall” (1997)
`Check Point Firewall-ITM White Paper, Version 3.0 (June 1997)
`Emin Gün Sirer et al. “Design and Implementation of a Distributed
`Virtual Machine for Networked Computers” (December 1999)
`
`1061
`1062
`
`1066
`1067
`
`1068
`
`
`
`-vii-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`
`Exhibit
`No.
`
`Description of Document
`
`1069
`
`1070
`
`1071
`
`Intrusion Detection Systems Group Test (Edition 2) – An NSS Group
`Report
`Dries Vanoverberghe and Frank Piessens “A Caller-Side Inline
`Reference Monitor for an Object-Oriented Intermediate Language”
`(2008)
`Ulfar Erlingsson “The Inlined Reference Monitor Approach to
`Security Policy Enforcement” (January 2004)
`Ari Luotonen and Kevin Altis “World-Wide Web Proxies” (April
`1994)
`James Gosling and Henry McGilton “The JavaTM Language
`Environment: A White Paper” (May 1996)
`1073
`1074 Webpage: “A Simple Guide to HTML”
`David M. Martin Jr. et al. “Blocking Java Applets at the Firewall”
`(1997)
`Eric Perlman and Ian Kallen “Common Internet File Formats”
`“Developing Stored Procedures in Java: An Oracle Technical White
`Paper” (April 1999)
`1077
`Larry L. Peterson et al. “OS Support for General-Purpose Routers”
`1078
`Roel Wieringa “Traceability and Modularity in Software Design”
`1079
`1080 U.S. Patent No. 6,434,499 (“Ulrich”)
`90/013,016 Reexam Renewed Petition to Accept Unintentionally
`Delayed Priority Claim Under 37 C.F.R. § 1.78 (August 25, 2014)
`2015-09-13 Declaration of Peter Kent in support of the “Brown”
`reference
`1082
`1083 U.S. Patent No. 7,058,822 (“Edery”)
`Curriculum Vitae of Dr. Aviel Rubin
`1084
`Provisional Application No. 60/030,639
`1085
`1086 U.S. Patent No. 6,092,194 (“Touboul”)
`1087 U.S. Patent No. 6,167,520 (“Touboul”)
`2014-02-18 Phil Hartstein declaration in 90/013,016 Reexam
`1088
`90/013,017 Reexam Final Rejection (September 8, 2014)
`1089
`1090 Webpage: Finjan Software Company Overview (October 9, 2004)
`Excerpted Markman Hearing Transcript, Finjan, Inc. v. Blue Coat
`Systems, Inc., 13-cv-3999-BLF (August 22, 2014)
`Affidavit of Christopher Butler of the Internet Archive (“Brown”)
`(September 30, 2015)
`
`1072
`
`1075
`1076
`
`1081
`
`1091
`
`1092
`
`
`
`-viii-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`
`Description of Document
`
`Exhibit
`No.
`1093 Affidavit of David Sherfesee of Alexa Internet (May 8, 2007)
`1094 U.S. Application No. 09/861,229 (May 17, 2001)
`1095 Affidavit of Christopher Butler of the Internet Archive (“Shin”)
`Finjan, Inc. v. Blue Coat Systems, Inc., No. 3:13-cv-03999
`1096
`Finjan, Inc. v. Blue Coat Systems, Inc., No. 5:15-cv-03295
`1097
`
`
`
`-ix-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`I.
`
`INTRODUCTION
`
`Blue Coat Systems, Inc. (“Petitioner” or “Blue Coat”) petitions for inter
`
`partes review under 35 U.S.C. §§ 311-319 and 37 C.F.R. § 42 of claims 1–4, 6–8,
`
`13, 14, 19, 28, and 34 (“the Petitioned Claims”) of U.S. Patent No. 7,647,633 (“the
`
`’633 patent”; Ex. 1001). The ’633 patent is directed at protecting computers from
`
`potentially malicious programs in the form of “Downloadables,” such as Java
`
`applets, ActiveX controls, JavaScript script, or other executable code that a user
`
`might download onto her computer from the Internet. The ’633 patent claims
`
`determining whether “downloadable-information” includes potentially malicious
`
`executable code and, if so, causing “mobile protection code” to be communicated
`
`to the downloadable-information’s destination. Some claims recite forming a
`
`sandboxed package that includes the downloadable-information, the mobile
`
`protection code, and pre-determined protection policies. The ’633 patent further
`
`claims the transmission of this sandboxed package to the Downloadable’s
`
`destination, where it may be executed in a sandbox. As explained in greater detail
`
`below, prior art such as Poison Java and Shin anticipate and/or render the claims
`
`obvious.
`
`A previous petition for inter partes review, Palo Alto Networks, Inc. v.
`
`Finjan, Inc., IPR2015-01974, has been filed by Palo Alto Networks, Inc. A motion
`
`for joinder to that petition has been filed concurrent with this Petition.
`
`II. MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(A)(1)
`
`A. Real Party-In-Interest Under 37 C.F.R. § 42.8(b)(1)
`
`
`
`-1-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`
`Blue Coat Systems, Inc. is the real party-in-interest.
`
`B. Related Matters Under 37 C.F.R. § 42.8(b)(2)
`
`Finjan, Inc. (“Patent Owner” or “PO”) asserted the ’633 patent against
`
`Petitioner in Finjan, Inc. v. Blue Coat Sys., Inc., No. 5:13-cv-03999-BLF (N.D.
`
`Cal.), (the “Blue Coat Litigation”), filed July 8, 2013. Finjan also asserted the ’633
`
`patent in the following litigations: Finjan, Inc. v. FireEye, Inc., No. 13-cv-03133-
`
`SBA (N.D. Cal.) (“the FireEye Litigation”); Finjan, Inc. v. Palo Alto Networks,
`
`Inc., No. 3-14-cv-04908 (N.D. Cal.) (“the Palo Alto Networks Litigation”); Finjan,
`
`Inc. v. Websense, Inc., No. 5:13-cv-04398 (N.D. Cal.) (“the Websense I
`
`Litigation”); Finjan, Inc. v. Proofpoint, Inc., No. 13-cv-05808-HSG (N.D. Cal.)
`
`(“the Proofpoint Litigation”); and Finjan, Inc. v. Websense, Inc., No. 5-15-cv-
`
`01353 (N. D. Cal.) (“the Websense II Litigation”).
`
`The ’633 patent is undergoing ex parte reexamination Control No.
`
`90/013,016 (“the ’633 reexam”). All issued claims of the ’633 patent subject to
`
`reexamination— claims 1–7 and 28–33—stand rejected. (Ex. 1003 at 3, 22). The
`
`reexamination is on appeal to the Patent Trial and Appeal Board. The ’633 patent
`
`is currently the subject of an inter partes review petition by Palo Alto Networks,
`
`Inc. (“Palo Alto Networks”): Palo Alto Networks, Inc. v. Finjan, Inc., IPR2015-
`
`01974 (“the Palo Alto Networks IPR”). A motion for joinder with the Palo Alto
`
`Networks IPR has been filed concurrent with this petition.
`
`
`
`-2-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`
`Petitioner also filed two petitions (IPR2016-00478 and IPR2016-00179) for
`
`inter partes review of U.S. Patent No. 6,965,968, which is also assigned to Patent
`
`Owner.
`
`C. Lead and Back-Up Counsel under 37 C.F.R. § 42.8(b)(3)
`
`Lead Counsel
`
`Back-Up Counsel
`
`Michael T. Rosato
`
`Andrew S. Brown
`
`USPTO Reg. No. 52,182
`
`USPTO Reg. No. 74,177
`
`WILSON SONSINI GOODRICH &
`
`WILSON SONSINI GOODRICH &
`
`ROSATI
`
`ROSATI
`
`701 Fifth Avenue
`
`701 Fifth Avenue
`
`Suite 5100
`
`Suite 5100
`
`Seattle, WA 98104-7036
`
`Seattle, WA 98104-7036
`
`Tel.: 206-883-2529
`
`Tel.: 206-883-2584
`
`Fax: 206-883-2699
`
`Fax: 206-883-2699
`
`Email: mrosato@wsgr.com
`
`Email: asbrown@wsgr.com
`
`
`D.
`
`Service Information
`
`Pursuant to 37 C.F.R. § 42.8(b)(4), service information for lead and back-up
`
`counsel is provided above. Blue Coat consents to service by e-mail at the addresses
`
`provided above.
`
`E.
`
`Power of Attorney
`
`Filed concurrently with this petition per 37 C.F.R. § 42.10(b).
`
`
`
`-3-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`III. PAYMENT OF FEES - 37 C.F.R. § 42.103
`
`This Petition is accompanied by a payment of $23,000. 37 C.F.R. § 42.15.
`
`This Petition meets the fee requirements of 35 U.S.C. § 312(a)(1).
`
`IV. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R.
`§§ 42.104 AND 42.108
`
`A. Grounds for Standing Under 37 C.F.R. § 42.104(a)
`
`The undersigned and Blue Coat certify that the ’633 patent is available for
`
`inter partes review and Petitioner is not barred or estopped from requesting an
`
`inter partes review of the challenged claims of the ’633 patent. Petitioner has not
`
`filed a civil action challenging the validity of any claim of the ’633 patent. A
`
`complaint alleging infringement of the ’633 patent was served on Petitioner more
`
`than a year before the date of this Petition; however, a motion to joinder has been
`
`filed to join the Palo Alto Networks IPR not later than 1 month after institution in
`
`accordance with 37 U.S.C. § 315(c). The ’633 patent issued more than nine
`
`months prior to the date of this Petition.
`
`B.
`
`Identification of Challenge Under 37 C.F.R. § 42.104(b) and
`Statement of Precise Relief Requested
`
`Petitioner requests IPR of claims 1–4, 6–8, 13, 14, 19, 28, and 34 of the ’633
`
`patent and that each claim be found unpatentable on the following grounds:
`
`Ground ’633 Claim(s)
`
`Basis for Challenge
`Obvious over Insik Shin & John C. Mitchell, “Java
`
`1.
`
`
`
`1–4, 6–8, 13,
`
`14, and 19
`
`Bytecode Modification and Applet Security,” under 35
`
`U.S.C. § 103(a)
`
`-4-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`
`2.
`
`28
`
`Anticipated by Poison Java under 35 U.S.C. § 102(a)
`
`Obvious over Poison Java in view of Insik Shin & John
`
`3.
`
`1
`
`C. Mitchell, “Java Bytecode Modification and Applet
`
`Security,” under 35 U.S.C. § 103(a)
`
`4.
`
`14, 19, and 34 Obvious over Poison Java in view of Mark W. Brown et
`
`al. “Special Edition Using Netscape 3,” (Que Corp.
`
`1996) under 35 U.S.C. § 103(a)
`
`
`Additional support for each ground appears in the Declaration of Dr. Aviel
`
`Rubin (Ex. 1002, “Rubin”), an expert in the field.
`
`C.
`
`Status of the Cited References as Prior Art
`
`1.
`
`Poison Java is prior art
`
`Poison Java is prior art under 35 U.S.C. § 102(a) or (b) because it was
`
`published by August 31, 1999, in IEEE Spectrum (Ex. 1005), before the May 17,
`
`2000 priority date of Claimset 1 and more than one year before the May 17, 2001
`
`priority date of Claimset 2. (§ VI.D.)
`
`2.
`
`Shin is prior art
`
`Shin is prior art under 35 U.S.C. § 102(b) because it was available to the
`
`public more than one year before May 17, 2000, which is the earliest possible
`
`priority date of the Petitioned Claims. (See § VI.D.) Evidence showing Shin’s
`
`public availability includes a 1998 publication date on the author’s website. (Ex.
`
`1006, listed under “Technical Reports.”) Shin was also publicly available at
`
`another website belonging to the author (Insik Shin) no later than April 18, 1998,
`
`
`
`-5-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`as confirmed by the Internet Archive (Archive.org). (Ex. 1095 at 1, 3-25.) The
`
`Internet Archive’s Web page repository is supplied by Alexa Internet. The
`
`Affidavit of David Sherfesee confirms that the contents of the Archive are from the
`
`publicly available Internet, and that the time/date information associated with the
`
`Archive’s contents is accurate. (Ex. 1093 at 1-5.) Shin was also catalogued by
`
`www.filewatcher.com with a date stamp of July 27, 1998. (Ex. 1007 at 1.) And
`
`Shin was cited with a publication date of 1998 in a paper titled “Kava – A
`
`Reflective Java Based on Bytecode Rewriting” published in January 1999, and
`
`presented at a conference in Denver, Colorado, in November 1999. (See Ex. 1008
`
`at 1, 3, and 14.) Kava conclusively demonstrates that Shin was published and
`
`publicly available to persons of ordinary skill in the art in this country no later than
`
`Kava’s publication date of January 1999—more than one year before May 17,
`
`2000. (Id.)
`
`3.
`
`Brown is prior art
`
`Brown is prior art under 35 U.S.C. § 102(b) because it was published in
`
`1996, which is more than one year before May 17, 2000, the earliest possible
`
`priority date of the Petitioned Claims—as confirmed in the attached declarations
`
`by one of the book’s authors and the Internet Archive. (Ex. 1082; 1092.) The
`
`Internet Archive’s web page repository is supplied by Alexa Internet. The
`
`Affidavit of David Sherfesee confirms that the contents of the Archive are from the
`
`publicly available Internet and that the time/date information associated with
`
`Archive content is accurate. (Ex. 1093.)
`
`
`
`-6-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`
`D. Threshold Requirement for Inter Partes Review 37 C.F.R. §
`42.108(c)
`
`Inter partes review of the Petitioned Claims should be instituted because this
`
`Petition establishes a reasonable likelihood that Petitioner will prevail with respect
`
`to each of the claims challenged. 35 U.S.C. § 314(a).
`
`V. BACKGROUND OF TECHNOLOGY RELATED TO THE ’633
`PATENT
`
`Since at least 1988, antivirus software has served as a barrier between
`
`computer processors and malware, which can steal data, destroy data, and disrupt
`
`operations. (Ex. 1002 at ¶¶ 40-41.) Antivirus software was developed in an era
`
`when malware was passed between computers via floppy disks and other types of
`
`removable data storage media. (Ex. 1002 at ¶ 46.) By the mid-1990s, however, the
`
`widespread adoption of email and Internet browsing made it possible to transmit
`
`malware directly between computers. (Ex. 1002 at ¶¶ 46-47; Ex. 1010 at 1-8.)
`
`This increased the exposure—and the risk of harm—to users’ computers by
`
`malicious software or malware. (Ex. 1002 at ¶¶ 46-47; Ex. 1010 at 1-8.)
`
`The exposure and risk of harm increased even more with the advent of
`
`mobile code in the mid-to-late 1990s. Mobile code, such as Java applets, is
`
`downloaded and executed by the computer (e.g., when loading a webpage in an
`
`Internet browser) without any explicit actions by the user. (Ex. 1002 at ¶ 48; Ex.
`
`1011 at 2.) So when, for example, a Java applet automatically executes, any
`
`instructions within the code are automatically executed as well. (Ex. 1002 at ¶ 48;
`
`Ex. 1011 at 2.) These instructions may include malicious or dangerous “system
`
`
`
`-7-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`calls,” asking the computer processor’s operating system to do things like write to
`
`a file, read from memory, or execute a program. (Ex. 1002 at ¶ 53.)
`
`The increase in connectivity and web browsing, together with the advent of
`
`mobile code in the mid-1990s, exacerbated risks posed by malware and drove the
`
`adoption of a layered approach to computer security. (Ex. 1002 at ¶¶ 49, 63.) In a
`
`layered approach, different layers of a computer network detect and block
`
`malware. (Ex. 1002 at ¶ 63.) If malware slips through one layer, the next layer
`
`may be able to catch it. (Ex. 1002 at ¶¶ 63-64.) Typical layers of protection
`
`include antivirus software that runs on client computers (described above), a
`
`gateway server or firewall that prevents malware and suspicious files from
`
`reaching the client computers, sandboxing techniques that allow client computers
`
`to execute mobile code without allowing the mobile code to make potentially
`
`dangerous system calls, and instrumentation techniques that involved rewriting
`
`potentially malicious or dangerous code. (Ex. 1002 at ¶¶ 49, 52-54, 59, 64-69, and
`
`71.)
`
`Malware-scanning gateways, which can be implemented as firewalls or
`
`servers, are as old as the Internet Protocol, which is the principal protocol for
`
`relaying information via the Internet. (Ex. 1002 at ¶ 65; Ex. 1012 at 1-2; see also
`
`Ex. 1013; Ex. 1014; Ex. 1015.) A malware-scanning gateway sits at the edge of an
`
`intranet, such as a corporate network, and scans traffic entering and leaving the
`
`intranet for malware. (Ex. 1002 at ¶¶ 65-66; see also Ex. 1013; Ex. 1014; Ex.
`
`1015.) By placing malware scanners at all ingress points on the corporate network,
`
`
`
`-8-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`a network administrator can scan received data streams for threats without unduly
`
`affecting traffic within the intranet. (Ex. 1002 at ¶¶ 66, 68.) Gateway scanning
`
`also makes it easier to enforce security policies across the intranet—instead of
`
`maintaining virus scanners at every computer, the network administrator can focus
`
`on maintaining just a few malware-scanning gateways. (Ex. 1002 at ¶ 69.)
`
`Sandboxing was developed in the mid-1990s to mitigate risks associated
`
`with executing untrusted mobile code. (Ex. 1002 at ¶ 53.) (The Java programming
`
`language was designed for sandbox operations from the beginning. (Ex. 1016 at 2,
`
`§ 1.1; Ex. 1017 at 1.)) A sandbox is an execution environment with software-
`
`imposed restrictions that prevent mobile code from damaging the computer that is
`
`executing the mobile code. (Ex. 1002 at ¶ 53.) Executing the mobile code in a
`
`restricted environment makes it possible to identify and evaluate system calls
`
`before allowing them to reach system resources. (Id.) The sandbox denies access
`
`to dangerous system calls, which reduces the danger that the mobile code may
`
`cause the computer to perform an undesired action. (Id.)
`
`There are many techniques for sandboxing mobile code. (Ex. 1002 at ¶ 53;
`
`Ex. 1018 at Abstract, and 6-50, §§ 4-5.) For example, Java applets are executed in
`
`a sandbox by a Java Virtual Machine (JVM), a software simulated processor. (Ex.
`
`1002 at ¶ 54; Ex. 1016 at 2, § 1.1; Ex. 1017 at 1.) When the JVM executes an
`
`applet, it enforces rules to prevent the applet from performing malicious
`
`operations. (Ex. 1002 at ¶ 55; Ex. 1016 at 2, § 1.1; Ex. 1017 at 1.)
`
`
`
`-9-
`
`
`
`

`
`Petition for Inter Partes Review of
`Patent No. 7,647,633
`
`
`Another method for adding a layer of protection known at that time by those
`
`of ordinary skill in the art was code “rewriting” or “instrumentation.” (Ex. 1002 at
`
`¶ 71; Ex. 1020 at 2; Ex. 1021.) Code rewriting or instrumentation involves
`
`inserting extra protection code into the mobile code, e.g., at a server that receives
`
`the mobile code for transmission to a client computer. (Ex. 1002 at ¶ 71; Ex. 1020
`
`at 2; Ex. 1021.) Instrumentation is performed after mobile code is filtered or
`
`scanned but before it is executed in the sandbox. (Ex. 1002 at ¶ 71.)
`
`Instrumentation often involves taking advantage of the fact that mobile code
`
`is usually divided into functions for better organization, code-reuse, and
`
`readability. (Ex. 1002 at ¶¶ 72-73.) Mobile code can be rewritten to provide an
`
`additional layer of security by inserting code right at the very beginning of a
`
`function body. (Id. at ¶¶ 71, 73.) Every time that function is called, the newly
`
`inserted code is executed first. (Id. at ¶ 73.) In some cases, the newly inserted
`
`code provides an additional sandbox layer—that is, it creates a restricted
`
`environment and prevents a function from causing harm, e.g., by terminating
`
`functions with duplicative or harmful system calls. (Id. at ¶ 74; Ex. 1022 at 1-5.)
`
`Antivirus software, malware-scanning gateways, sandboxing, and
`
`instrumentation (code rewriting) have bee

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket