throbber

`U.S. PATENT AND TRADEMARK OFFICE
`__________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`__________
`
`CISCO SYSTEMS, INC.,
`Petitioner
`
`v.
`
`FINJAN, INC.,
`Patent Owner.
`
`__________
`
`Case IPR2018-00391
`Patent 7,647,633 B2
`
`__________
`
`Record of Oral Hearing
`Held: March 6, 2019
`__________
`
`Before THOMAS L. GIANNETTI, MIRIAM L. QUINN, PATRICK
`M. BOUCHER, Administrative Patent Judges.
`
`
`

`

`APPEARANCES:
`
`ON BEHALF OF THE PETITIONER:
`
`PATRICK D. McPHERSON, ESQ.
`PATRICK MULDOON, ESQ.
`of: Duane Morris LLP
`505 9th Street, Northwest, Suite 1000
`Washington, D.C. 20004-2166
`(202)-776-5214
`pdmcpherson@duanemorris.com
`
`JOSEPH A. POWERS, ESQ.
`of: Duane Morris LLP
` 30 South 17th Street
`Philadelphia, Pennsylvania 19103-4196
`(215)-979-1842
`japowers@duanemorris.com
`
`ON BEHALF OF THE PATENT OWNER:
`
`JAMES HANNAH, ESQ.
`of: Kramer Levin Naftalis & Frankel LLP
`990 Marsh Road
`Menlo Park, California 94025
`(650)-752-1712
`jhannah@kramerlevin.com
`
`JEFFREY H. PRICE
`of: Kramer Levin Naftalis & Frankel LLP
`1177 Avenue of the Americas
`New York, New York 10036
`(212)-715-7502
`jprice@kramerlevin.com
`
`The above-entitled matter came on for hearing on Wednesday, March
`6, 2019, commencing at 1:00 p.m. at the U.S. Patent and Trademark
`Office, 600 Dulany Street, Alexandria, Virginia.
`
`
`
`
`
`2
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`
`Case IPR2018-00391
`Patent 7,647,633 B2
`
`
`P-R-O-C-E-E-D-I-N-G-S
`
`1:02 p.m.
`JUDGE QUINN: Hello, everyone. This is Judge Miriam
`Quinn presiding in the Texas Regional Office in Dallas, Texas. And
`with me today are Judge Patrick Boucher in the Rocky Mountain
`Office in Denver. And in the room with you is Judge Tom Giannetti
`who will be conducting the clock management for us today. This
`case is captioned Cisco Systems versus Finjan. And is IPR 2018-391
`concerning U.S. Patent No. 7, 647, 633.
`Will counsel for petitioner state your appearance for the
`record?
`MR. MCPHERSON: Yes, Your Honor. Patrick
`McPherson from Duane Morris for petitioner, Cisco. With me, I
`have Patrick Muldoon and Joe Powers also with Duane Morris.
`JUDGE QUINN: Thank you. And for patent owner, can
`you please make your appearance for the record?
`MR. HANNAH: Yes, Your Honor. Good
`morning/afternoon, Yours Honors. James Hannah on behalf of
`Finjan. And with me is Jeff Price.
`JUDGE QUINN: Thank you. So we have allotted 45
`minutes per side for the arguments today. Petitioner who bears the
`burden of persuasion -- or proof rather, will begin. You may reserve
`
`
`
`3
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`time for rebuttal. Patent owner will also have an opportunity to
`reserve time for rebuttal. And at this time, we would like to find out
`from petitioner how much would you like to reserve?
`MR. MCPHERSON: Yes, Your Honor. I'd like to reserve
`15 minutes for rebuttal.
`JUDGE QUINN: So that would be 30 minutes for your main
`argument.
`MR. MCPHERSON: Yes, Your Honor.
`JUDGE QUINN: Okay, thank you. Please remember that I
`can see you and Judge Boucher can see you, but we cannot see
`anything you display on the wall. We have your slides that you filed
`-- the demonstrative slides. So if you can please call out by number
`the slides, so that we can follow along with your presentation.
`MR. MCPHERSON: Yes, Your Honor. I'll try to do that.
`And if I forget, please let me know immediately.
`JUDGE QUINN: Okay, will do.
`JUDGE GIANNETTI: You can go ahead, Mr. McPherson.
`MR. MCPHERSON: Okay. Thank you, Judge Giannetti.
`This afternoon or this morning, I'd like to start off with a brief
`overview. So turn to Slide 2 is an overview of the grounds of the
`petitioner. Ground 1 was a one out of three combination of Hanson,
`alone or in view of Hypponen for all challenged claims except Claim
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`
`
`
`4
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`12. And for Claim 12 was a separate ground based upon that same
`combination in view of a further reference to Rule 98. In the
`institution decision, the board found the petitioner met its burden on
`Claim 14. And a preliminary determined that the petitioner did not
`meet its burden for the remaining claims on the board's understanding
`of the record at that time.
`If we go now to Slide 4. Slide 4 shows an overview of the
`invention of the 633 patent with respect to Figure 3. And as a brief
`description of that, if we look at this figure on Slide 4, it shows the
`Figure 3 as annotated in color by the petitioner. And it's Petitioner
`Page 12. Reading from right to left, you'll see in the green arrow
`indicates the received information coming into the firewall. That
`received information is then sent to a server that has a protection
`engine.
`JUDGE QUINN: Counsel, there is some argument in the
`papers about the source of the received information, whether or not it
`can be -- or it has to be from an external network. What are your
`responses to that?
`MR. MCPHERSON: Well I think the limitation you're
`discussing then is the recommunicator where they -- the patent owner
`wants to add the limitation that it has to be from an external network.
`And that language is being imported from an embodiment of the 633
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`
`
`
`5
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`patent. Not all embodiments show where the information is coming
`from. And in certain circumstances for the recommunicator
`limitation, it would not be received from an external network. So
`that limitation of from an external network we believe is just a
`limitation being added to avoid the prior art. And it's a classic case
`of trying to add a limitation from an embodiment showing the 633
`patent. JUDGE QUINN: What specific embodiment can you direct
`us to today that more broadly describes the received information as
`not limited to the source being an external network?
`MR. MCPHERSON: Well just to be clear, the received
`information, the limitation they want to add there is it has to be from a
`source computer. And if you look at Claim -- just to make sure we're
`talking the same -- If you go to Slide -- If you go to Slide 18, these are
`the -- these are the claim limitations proposed by the patent owner in
`the patent owner response. And for downloadable information, they
`don't have the limitation that it needs to be from an external network.
`The requirement they want to add is it's downloaded from a source
`computer. It's only when you talk about the information
`recommunicator that they add the limitation that it's from the -- the
`downloaded information is from an external network.
`JUDGE QUINN: So following this for Claim 1, which does
`not recite the recommunicator, then according to this contention of
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`
`
`
`6
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`where it's coming from, the source computer would be the only
`source. Whereas for other claims that do recite the recommunicator,
`patent owner is complaining that it should come not just from a source
`computer, but also an external network.
`MR. MCPHERSON: I think that's right, ma'am.
`JUDGE QUINN: Okay. So for the external network issue,
`can you point me to an embodiment in which the information is more
`broadly described as coming from something other than an external
`network?
`MR. MCPHERSON: Yes, I think if you look at Figure 1C
`from the 633 patent. Do Your Honors have Figure 1C before you of
`633? In Figure 1C, I think the specification describes that the user
`device shown as 145 can be the server or firewall or recommunicator.
`And that recommunicator can be for communicating between devices
`or between processes. And that would include processes resident on
`the user device such as a web server, which would be your client then.
`But in any event, the user device is not communicating directly with
`an external network. So we're leaving that embodiment that does not
`show a recommunicator receiving downloadable information from an
`external network.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`
`
`
`7
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`JUDGE QUINN: How do you read the user device can be
`our recommunicator because the patent describes the recommunicator
`consistently as a server?
`MR. MCPHERSON: In the specification, it describes the
`user device can be a server or a firewall.
`JUDGE QUINN: Where is that? This is in Column 7, Line
`
`50?
`
`MR. MCPHERSON: Column 7. Yes, Your Honor.
`Column 7, Line 50. "A user device operating as a firewall or
`server." And that meets the definition of a recommunicating device.
`JUDGE QUINN: Okay. But it says for servicing one or
`more further interconnected devices or processes.
`MR. MCPHERSON: Yes. So that could be connected
`through the internal network shown in 1C or it can be between the
`processes residing on that user device.
`JUDGE QUINN: Okay. So you're reading it as saying that
`the user device on Figure 1C would be acting as a server. And then
`other user devices will be connected to that user device acting as a
`server?
`MR. MCPHERSON: Yes. For example in Figure 1C, you
`see a user device could be connected -- user device 145 on the left-
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`
`
`
`8
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`hand side could be connected through the internal network to user
`device on the right-hand side.
`JUDGE QUINN: Okay. Because I thought what that
`paragraph was saying is that instead of using a server, you can use the
`user device to work as a server, instead of the server that is shown on
`Figure 1C.
`MR. MCPHERSON: I think that's correct, but it's a broad
`enough disclosure that the user device can act as a recommunicator
`and have the protection engine in that user device. So that any
`downloadable information sent from the user device on the left-hand
`side through the internal network can be processed by the server of the
`user device on the right-hand side. That's what that paragraph says.
`JUDGE QUINN: All right. So you read it broadly to mean
`one or the other?
`MR. MCPHERSON: Yes, Your Honor.
`JUDGE QUINN: Okay.
`JUDGE BOUCHER: Can I just ask a question about
`downloadable information? If information's being downloaded from
`a server to a client, is there anything about the terminology that
`suggests or requires which of those devices is responsible for
`initiating the download?
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`
`
`
`9
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`MR. MCPHERSON: No, Your Honor. And that's one of
`the issues -- When you talk about, as I understand, the patent owner's
`definition, there are circumstances when they want to say a Java
`applet is an executable download of information. And in other
`circumstances, the Java applet is not an executable and downloadable
`information. And that doesn't seem to make sense to me. When
`you talk about the description that Hanson provides with the examples
`it uses as a Java applet or ActiveX. Then you have the 633 patent,
`which provides the exact same examples. And the patent owner
`wants to argue on the 633, that's a downloadable containing an
`executable. But it's not a downloadable containing an executable
`when you're talking about it with respect to Hanson. That doesn't
`seem to make sense to me.
`And there's some argument where they're talking about, you
`know, whether it's from a source computer or not. Whatever that
`means. Because that's not clear with how that informs the
`infringement analysis or the invalidity analysis of whether it comes
`from a source computer or not. Whether that's the original source, like
`I think what you're asking or some later source that's just transferring
`that applet along the way. It's unclear. And that distinction is not
`made by the 633 patent owner.
`JUDGE BOUCHER: Right. So regardless of whether the
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`
`
`
`10
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`server pushes the information to the client or the client requests
`information from the server, does not impact whether or not the
`information is downloadable information.
`MR. MCPHERSON: I think that's absolutely correct. And
`I think Hanson talks about on processing an applet, whether it's
`coming from the client to the server or the server to the client and
`processing it in the exact same way. It's a bidirectional security
`program.
`JUDGE BOUCHER: Okay, thanks.
`JUDGE QUINN: How about the argument that the
`downloadable information, whatever it may be, it cannot be just a
`simple request or something to that effect?
`MR. MCPHERSON: Well I think the example they use is a
`request. And to the extent that request may or may not include an
`executable code. We did not use a simple request as the example for
`invalidity. We used the example of a reply packet, which can be
`unsolicited. Meaning it's not really a reply packet because it's
`unsolicited. But that can include Java applet or an ActiveX.
`Whether the request packet does or doesn't, we didn't do an analysis of
`that. But we know that if the request was a Java applet or an
`ActiveX, then the bastion server would operate that on the same way
`and uses rules checks, the same way.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`
`
`
`11
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`JUDGE QUINN: So to be clear here, so your assertion of
`Hanson meeting the downloadable information, as recited, is the
`traffic flow from the server 20 within the company back to the client,
`which is outside of the firewall.
`MR. MCPHERSON: Outside of the firewall, but maybe
`still within the company. It doesn't have to be -- It doesn't have to be
`external out of the company either. And Hanson makes that clear as
`well.
`
`JUDGE QUINN: Well I didn't put the line of demarcation as
`the company or not; it's just that what is disclosed is there is a firewall
`and it's on the other side of the firewall.
`MR. MCPHERSON: Yes, Your Honor.
`JUDGE QUINN: Okay.
`JUDGE GIANNETTI: Counsel, I have a general question
`for you and I think this is the thread that runs through this whole case.
`And that is, hasn't the Federal Circuit made it very clear that in
`construing claims, we must look at not only language of the claims,
`but the specification. I’m thinking of cases like Microsoft v.
`Proxyconn, and I'm sure there are others, where the importance of the
`specification in claim construction is stressed. Where do you draw
`the line between following that instruction from the Federal Circuit
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`
`
`
`12
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`and impermissibly importing some limitation from the specification
`into the claim?
`MR. MCPHERSON: Well I mean I think the law is clear
`where it's very clear that the invention must have a limitation that is
`described in the specification, but may not be recited. And the stress
`is on that it was described as the invention -- this is the invention.
`Then the federal circuit in those circumstances decided it may be
`appropriate. Whereas it's described as the invention to import a
`limitation from the specification into the claims. And in this case,
`we just don't have that here. And if you look at the information that
`the patent owner's trying to rely on from their own slides -- for the
`intrinsic information or whether he's going to become a source
`computer. The word source computer is not used in any of the
`intrinsic information they use. It's not included in any of the
`information from extrinsic except the testimony of the expert, which
`is not supported by any factual basis for them. And with respect to
`external network, it's only pulling it from some embodiments that are
`shown in the specification. And what is shown for some
`embodiments in the specification and even here when it shows those
`external, it's from the pictures. And those pictures are all described
`as embodiments.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`
`
`
`13
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`JUDGE GIANNETTI: I think we'll have a chance to revisit
`this issue as we go on.
`MR. MCPHERSON: Okay. Thank you, Your Honor.
`Okay, so going back to Slide 4, I think I was describing that as the
`633 shows the downloadable information going into the protection
`engine. The protection engine is responsible for selecting a mobile
`protection code, which it describes as the mobile protection code as it
`intercepts the malicious operations of the downloadable. It finds the
`downloadable. And that mobile protection code is sent to the client.
`And an embodiment is shown in Figure 3. It shows them as a
`sandbox environment that the mobile protection code and the
`executable are sent to a client together. But other embodiments talk
`about the mobile protection code can be sent in advance of the
`executable. Only to the extent that the mobile protection code
`provides the protection at the time that the executable grows. And
`the 633 patent describes ActiveX and Java applets as examples of
`executables. But it does not provide an example of a mobile
`protection code that you can actually use for a Java applet because it
`talks about it at a high enough level.
`If we turn to Slide 5 now, it shows an overview of Hanson
`using Figure 2 of Hanson. The same convention from right to left.
`There's a green line there and in the Hanson patent, it's been there
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`
`
`
`14
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`referred to as data packets that are to include programs. And it
`provides a specific example of Java applets and ActiveX control.
`And Hanson also says that teaching can be extended to various levels
`of protection and security against the various types of data being
`transmitted. Those would include other types of executables in the
`data packets. And the bastion server distinguishes between
`executables. It has a rules file that we've highlighted in yellow there.
`And those rules file are specific to Java applets and ActiveX controls
`in this embodiments. And the rules include security programs. A
`security program for -- and it's highlighted in yellow is a
`Security.OCX for ActiveX and security classification -- a
`Security.class for Java applets. In order to select the right rules to
`apply, there's no dispute that the server needs to distinguish between
`whether it's an ActiveX or a Java. And it treats the executable the
`same way, whether it's sent from the server to the client or the client
`to the server.
`JUDGE GIANNETTI: But where does Hanson determine --
` I'm going to the language of Claim 1 -- where does Hanson
`determine whether the downloadable information includes executable
`code? Where is that feature in Hanson?
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`
`
`
`15
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`MR. MCPHERSON: That feature would be performed in the
`bastion server. The description of the exact method being used to
`perform that is not described in any detail.
`JUDGE GIANNETTI: So how do we know it's there?
`MR. MCPHERSON: Because Hanson describes that it uses
`a rule set for applets and a rule set for ActiveX.
`JUDGE GIANNETTI: But those are both downloadable --
`those are both executable codes, correct?
`MR. MCPHERSON: Well there's executable code residing
`in the server. Correct.
`JUDGE GIANNETTI: Where does it make the choice
`between something that's executable and something that's not
`executable? Where do you find that in Hanson?
`MR. MCPHERSON: I think that's the determination of
`whether to apply my rules for my ActiveX or my rules for my -- rules
`for my Java applet.
`JUDGE GIANNETTI: But they're both executable.
`MR. MCPHERSON: They're both executable, but the rules -
`- the rules are specific to Item 1.
`JUDGE GIANNETTI: I understand that, but I'm looking for
`something in Hanson where the decision is made whether something
`is executable or not. That's the distinction that I'm looking at. And
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`
`
`
`16
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`that's certainly one, I believe, a reasonable construction of this term.
`MR. MCPHERSON: Right. Under that construction,
`Hanson doesn't show -- if you're looking for a positive step that the
`executable is not included, that would not be disclosed in Hanson.
`And that was the petitioner's alternative argument that if the claim
`limitation is read to be whether or not there are two alternatives, then
`it's a combination of Hanson and Hypponen. And Hypponen does
`disclose expressly whether or not an executable is included. So that's
`what we use that for.
`JUDGE GIANNETTI: Thank you.
`MR. MCPHERSON: And then continuing, if the executable
`code is included --
`JUDGE QUINN: So let me ask you about that alternative.
`Did you argue claim construction of that whether determination in
`your briefs? Because you're taking two different positions as to how
`the prior art might disclose the limitation, but you haven't asserted any
`particular construction of them.
`MR. MCPHERSON: Well we have two arguments. One, if
`it's giving us plain and ordinary meaning. And we can look at Slide -
`- If you look at Slide 10. Slide 10 shows how the petitioner's
`arguments of either construction show the limitations of Claim 1.
`JUDGE QUINN: But you didn't argue this as a claim
`construction argument. You interjected this into your analysis, so. . .
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`
`
`
`17
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`from what I read in the briefs. Did you include anywhere in your
`briefing what your contention is regarding the proper construction of
`the term?
`MR. MCPHERSON: The proper construction is the plain
`and ordinary meaning of the term. That's what we argued. And
`under any reasonable definition of plain and ordinary meaning, our
`petition sets forth a basis for why that claim term would be found.
`JUDGE QUINN: But if you have alternative positions as to
`what the plain and ordinary meaning is and there is a dispute as to
`what it can or can't be?
`MR. MCPHERSON: And for the basis under the plain and
`ordinary meaning or the two alternative meanings, whether or not is
`required. Whether there needs to be a positive step of finding that is
`not there. And we put forth --
`JUDGE QUINN: What is your position -- What is your
`position as to which alternative is correct?
`MR. MCPHERSON: Based upon the claim language and the
`writing in the 633, the plain and ordinary meaning should not include
`the whether or not. Just whether -- where the language says whether
`the downloadable includes an executable, I don't believe the intrinsic
`record supports that it has to have a positive step of not determining
`that. I think the 633 is clear and when you use that language, it
`means likely. But be that as it may, we've put forward in our
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`
`
`
`18
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`petition, both under the plain and ordinary where there wouldn't be a
`suitable alternative. And we also put forward, to the extent the board
`adopts, saying whether or not that would be the combination of
`Hanson and Hypponen together would show the two alternative basis.
`JUDGE QUINN: So do you -- Go ahead.
`JUDGE BOUCHER: I was just going to say I would have to
`look at the reexamination appeal decision more closely. But am I
`correct that the majority in that decision found that the plain and
`ordinary meaning of that term is what you're describing as the two
`alternative possibilities meaning?
`MR. MCPHERSON: Yes, Judge Boucher. That's correct.
`JUDGE BOUCHER: Okay.
`MR. MCPHERSON: And the minority -- the minority in that
`decision took the position that it's not required. But yes, you're
`correct, Your Honor.
`JUDGE BOUCHER: Right. But the majority found that,
`that was in fact the plain and ordinary meaning of the term.
`MR. MCPHERSON: Yes.
`JUDGE BOUCHER: Okay.
`JUDGE QUINN: Well I mean the problem I see here is that
`you have not advanced any claim construction arguments for us to
`determine whether one of the alternatives, according to your
`contentions is proper versus the other. So I mean you're saying that
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`
`
`
`19
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`in your view one of them is more appropriate than the other, but we
`have no briefing on it for this.
`MR. MCPHERSON: My position that I just gave you today
`was my opinion. I don't think the board needs to construe this term.
`Because the petitioner has shown under either construction that the
`prior art discloses that claim term. So the board doesn't need to
`disclose it. And that was our point in our petition that under the
`plain
`and ordinary meaning, as long as it's given a reasonable interpretation,
`then we have put forward two different ways to deal with it. One is
`Hanson alone discloses that when it's determining whether to apply
`the rules checks for an applet or whether to apply the rules checks for
`an ActiveX. That meets the plain language of whether it includes an
`executable, not the two alternative one. And if the construction is
`whether or not the two alternative limitation, then we use the
`combination of Hanson and Hypponen where Hypponen expressly
`says the whether or not. It's based upon the architecture of
`Hypponen of using a file detector and content analysis, which is the
`same architecture used by the 633 patent. So that what's in our
`petition with respect to the invalidity. So the board doesn't need to
`construe that language because the art before does it on the either
`construction.
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`
`
`
`20
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`
`JUDGE QUINN: How do you contend Hypponen discloses
`the two alternatives of executable code found or executable code not
`found?
`MR. MCPHERSON: Well on Slide 10, the language that
`Hypponen uses is Hypponen discloses scanning said file -- that's the
`downloadable file -- to determine whether or not the file contains a
`macro. That's the exact language that the McHardy used in
`determining whether or not. And the architecture that's used and
`disclosed in Hypponen is shown on Slide 14. I'm sorry, it's
`Hypponen -- It's on Slide 15. Hypponen discloses a file type
`detector and a content detector to determine whether or not a
`downloadable includes an executable program. And it's the same
`architecture. It's looking for file type extensions and it's looking for
`content analysis.
`And as our expert explained if we go to Slide 12 -- our expert
`in the petition explained that the file type detector and the content
`detector that are disclosed both in 633 and Hypponen were well
`known. And he provides examples of a file type detector -- and this
`is on Slide 12 -- the Rx PC describes the prior art system that scan
`carded files for viruses. And upon detection of a virus, it deleted the
`file or ignored the virus.
`JUDGE QUINN: Where did you make this argument about
`the whether or not in Hypponen?
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`
`
`
`21
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`MR. MCPHERSON: Under the construction of -- under the
`analysis under Claim 1.
`JUDGE QUINN: Yes, where in the petition? Because I'm
`looking at it and I don't see your citations to this language.
`MR. MCPHERSON: Yes, so on Page 51 of the petition.
`Excuse me. On Page 51 of the petition, the second to last paragraph.
`It says, "A POSA would have understood that Hanson's disclosure of
`applying Java checks and ActiveX checks or other security programs
`includes a determination of whether the data packet is or includes a
`Java applet, ActiveX program, or other executable." It goes on to
`say, "To the extent the patent owner asserts Hanson does not disclose
`this limitation, it would have been obvious to modify the bastion
`server of Hanson to determine whether an executable code, other than
`Java applets and ActiveX was in the data packet using conventional
`prior art techniques in order to extend the capabilities as envisioned
`by Hanson."
`And it goes on to talk about the state of the art section. And
`it goes on that Hypponen describes what was in the state of the art that
`our expert said. And it's the last paragraph on Page 52. For
`example Hypponen describes setting conventional computer virus
`detection software. The first step was to determine which files
`contained executable codes. And it talks about using file extension
`there.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`
`
`
`22
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`JUDGE QUINN: Yes, I've read all of that. And you're
`reading to us the petition. I haven't seen any of the citation that you
`just said on Column 2, Lines 35 through 36. And I've looked
`through your expert’s declaration and it doesn't explain that area
`either. So why are you coming in and relying on that now since you
`didn't rely on that before?
`MR. MCPHERSON: I'm relying on it in response to
`questions that Hypponen -- I think our disclosure of petition shows
`that Hypponen discloses a content detector, a file detector, and our
`expert in our petition in the state of the art describes that those were
`known methods for performing. And so if you look at -- If you look
`at Hanson and you say well Hanson doesn't describe the specific
`methods, which I think Judge Giannetti said. There are no specific
`methods there about how to do it. And a person with skill in the art
`looking at that, would look at what was known at the time of the art.
`And our expert puts forward what was known at the time of the art:
`use a file detector and use a content detector. And then we show that
`in the alternative, you would combine Hanson with Hypponen for that
`exact reason. To use a content detector and to use a file detector.
`That's the same architecture as the 633.
` So if I use a file detector and a content detector as describing
`the prior art, then I will necessarily meet the limitation of whether or
`not a downloadable includes an executable because it's the same
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`
`
`
`23
`
`

`

`Case IPR2018-00391
`Patent 7,647,633 B2
`
`architecture in the 633. And so when challenged and on response
`saying well Hypponen -- I shouldn't say -- the patent owner didn't
`challenge. The board raised the question as to whether Hypponen
`discloses that. And in response to that, we identify that Hypponen is
`much broader than the board read it in its institution decision.
`JUDGE QUINN: But it's got to be more than just “it has to
`follow a content detector” because the 633 patent also describes that
`the content detector and the file detector pass to another component of
`the invention an indicator that tells the system what to do when it does
`not have executable code. And none of that has been shown in
`Hypponen. In fact, how I read your petition here is that in case more
`is needed to be detected, other than Java applets and Active X, then
`Hypponen provides additional types of executables that can be
`detected. But it doesn't say anything about what this does vis-a-vis
`not having an executable code.
`MR. MCPHERSON: I see my time has run out. If I could
`finish the question. I think if it does not have an executable code,
`then it just passes it forward. The way Hanson -- the way Hanson is
`set right now, Hypponen determines whether or not it has a macro.
`If it does not, it doesn't perform any function described there. The
`exclosure is the same as a 633. The 633 doesn't say what happens if
`
`1
`2

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket