throbber

`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`__________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`___________________
`
`CISCO SYSTEMS, INC.,
`Petitioner,
`
`v.
`
`FINJAN, INC.,
`Patent Owner.
`____________________
`
`Case IPR2018-00391
`Patent 7,647,633
`
`__________________________________________________________
`
`PATENT OWNER’S RESPONSE
`
`
`
`
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`TABLE OF CONTENTS
`
`Page
`
`PATENT OWNER’S EXHIBIT LIST .................................................................... i 
`
`I.

`
`II.

`
`Introduction ...................................................................................................... 1 
`
`Facts ................................................................................................................. 2 
`
`A.
`
`  Overview of ‘633 Patent ....................................................................... 2 
`
`B.
`

`
`Overview of Hanson .............................................................................. 4 
`
`
`
`  Claims at Issue ................................................................................................. 8 III.
`
`IV.
`
`  Claim Construction .......................................................................................... 8 
`
`A.
`

`
`B.
`

`
`“downloadable-information” (all challenged claims) ......................... 10 
`
`“information re-communicator” and “information monitor”
`(claims 2, 3, and 14) ............................................................................ 11 
`
`Petitioner Did Not Provide A Proper Obviousness Analysis ........................ 15 
`
`  Petitioner Has Waived Rebuttal to Arguments Presented in the
`Preliminary Response .................................................................................... 17 
`
`V.
`

`
`VI.
`
`
`
`  The Board Should Accord Dr. Clark’s Declaration No Weight.................... 20 VII.
`
`
`
`  The Challenged Claims Are Patentable ......................................................... 22 VIII.
`
`A.
`
`  Hanson in View of Hypponen Fails to Render Obvious Claims
`1–4, 8, and 11-14 ................................................................................. 22 
`
`1. 
`
`2. 
`
`Hanson in View of Hypponen Does Not Disclose
`“receiving[…] downloadable-information” .............................. 22 
`
`Hanson in View of Hypponen Does Not Disclose an
`“information re-communicator,” an “information
`monitor,” or “means for receiving downloadable-
`information” .............................................................................. 25 
`
`- i -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`B.
`

`
`Hanson Does Not Render Claim 14 Invalid as Unpatentable or
`Anticipated .......................................................................................... 26 
`
`1. 
`
`Hanson Does Not Disclose “causing mobile protection
`code to be executed by the mobile code executor at a
`downloadable-information destination such that one or
`more operations of the executable code at the destination,
`if attempted, will be processed by the mobile protection
`code” ......................................................................................... 26 
`
`a.  Petitioner’s Argument That Hanson Does Not
`Disclose Modifying the Executable Code is
`Conclusory and Unsubstantiated .............................. 26 
`
`b.  Hanson is Not Enabled ............................................. 29 
`
`c.  To the Extent That Hanson is Comprehensible,
`it Teaches Modifying the Executable Code ............. 30 
`
`2. 
`
`Hanson Does Not Disclose “providing a system, wherein
`the system comprises distinct software modules, and
`wherein the distinct software modules comprise an
`information re-communicator and a mobile code
`executor” ................................................................................... 34 
`
`IX.
`
`  Secondary Considerations ............................................................................. 36 
`
`A.
`

`
`B.
`

`
`C.
`

`
`Commercial Success and Licensing .................................................... 39 
`
`Industry Praise ..................................................................................... 45 
`
`Long Felt Need and Recognition of a Problem ................................... 45 
`
`X.
`

`
`CONCLUSION .............................................................................................. 46 
`
`
`
`
`
`- ii -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Federal Cases
`ActiveVideo Networks, Inc. v. Verizon Commc’ns, Inc.,
`694 F.3d 1312 (Fed. Cir. 2012) .......................................................................... 22
`
`Apple Inc. v. Int’l Trade Comm'n,
`725 F.3d 1356 (Fed. Cir. 2013) .......................................................................... 36
`
`Beckman Instruments, Inc. v. LKB Produkter AB
`892 F.2d 1547 (Fed. Cir. 1989) .......................................................................... 30
`
`In re Cuozzo Speed Techs., LLC,
`793 F.3d 1268 (Fed. Cir. 2015) ............................................................................ 8
`
`In re Cyclobenzaprine Hydrochloride Extended–Release Capsule
`Patent Litig.,
`676 F.3d 1063 (Fed. Cir. 2012) .............................................................. 38, 45, 46
`
`Demaco Corp. v. F. Von Langsdorff Licensing Ltd.,
`851 F.2d 1387 (Fed. Cir. 1988) .......................................................................... 40
`
`GrafTech Int’l Holdings, Inc. v. Laird Techs., Inc.,
`652 Fed. Appx. 973 (Fed. Cir. 2016) .................................................................. 39
`
`Graham v. John Deere Co.,
`383 U.S. 1 (1966) .......................................................................................... 17, 36
`
`Institut Pasteur & Universite Pierre Et Marie Curie v. Focarino,
`738 F.3d 1337 (Fed. Cir. 2013) .......................................................................... 39
`
`Intelligent Bio-Sys., Inc. v. Illumina Cambridge,
`821 F.3d 1359 (Fed. Cir. 2016) .................................................................... 18, 19
`
`Kinetic Techs., Inc. v. Skyworks Solutions, Inc.,
`IPR2014-00529, Decision Denying Institution, Paper 8 (P.T.A.B.
`Sept. 23, 2014) .................................................................................................... 27
`
`In re Kumar,
`418 F.3d 1361 (Fed. Cir. 2005) .......................................................................... 30
`
`- i -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`Leo Pharm. Prods., Ltd. v. Rea,
`726 F.3d 1346 (Fed. Cir. 2013) .............................................................. 37, 38, 39
`
`Minnesota Mining & Mfg. Co. v. Johnson & Johnson Orthopaedics, Inc.,
`976 F.2d 1559 (Fed. Cir. 1992) .......................................................................... 44
`
`Ortho-McNeil Pharm., Inc. v. Mylan Labs., Inc.,
`520 F.3d 1358 (Fed. Cir. 2008) .......................................................................... 37
`
`Orthopedic Equip. Co. v. All Orthopedic Appliances, Inc.,
`707 F.2d 1376 (Fed. Cir. 1983) .......................................................................... 46
`
`Palo Alto Networks, Inc. v. Finjan, Inc.,
`IPR2015-01974, Final Written Decision, Paper 49 (P.T.A.B. Mar.
`16, 2017) ............................................................................................................. 26
`
`Plantronics, Inc. v. Aliph, Inc.,
`724 F.3d 1343 (Fed. Cir. 2013) .................................................................... 37, 38
`
`Rambus Inc. v. Rea,
`731 F.3d 1248 (Fed. Cir. 2013) .......................................................................... 38
`
`Ruiz v. A.B. Chance Co.,
`234 F.3d 654 (Fed. Cir. 2000) ............................................................................ 36
`
`SAS Institute, Inc. v. Complementsoft, LLC,
`825 F.3d 1341 (Fed. Cir. 2016) .......................................................................... 10
`
`to SAS Inst., Inc. v. Iancu,
`138 S. Ct. 1348 (2018) .................................................................................... 1, 22
`
`Trivascular, Inc., v. Samuels,
`812 F.3d 1056 (Fed. Cir. 2016) .................................................................... 18, 19
`
`TRW Automotive US LLC v. Magna Elecs. Inc.,
`IPR2014-00257, Decision on Petitioner’s Request for Rehearing,
`Paper 18 (P.T.A.B. Aug. 28, 2014) .................................................................... 16
`
`Volkswagen Group of Am., Inc., v. Emerachem Holdings, LLC,
`IPR2014-01558, Final Written Decision, Paper 59 (P.T.A.B. Jan.
`22, 2016) ............................................................................................................. 16
`
`- ii -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`Federal Statutes
`
`35 U.S.C. § 103(a) ................................................................................................... 26
`
`Regulations
`
`37 C.F.R. § 42.6(a)(ii) .............................................................................................. 47
`
`37 C.F.R. § 42.22(a)(2) ............................................................................................ 21
`
`37 C.F.R. § 42.23(b) .......................................................................................... 17, 19
`
`37 C.F.R. § 42.24 ..................................................................................................... 47
`
`37 C.F.R. § 42.65(a) ........................................................................................... 21, 28
`
`37 C.F.R. § 42.71(d) ................................................................................................ 17
`
`37 C.F.R. § 42.100(b) ................................................................................................ 8
`
`37 C.F.R. § 42.108(c) ............................................................................................... 17
`
`37 C.F.R. § 42.120 ............................................................................................. 18, 19
`
`77 Fed. Reg. 48756 at 48766 (Aug. 14, 2012) ........................................................... 8
`
`
`
`- iii -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`PATENT OWNER’S EXHIBIT LIST
`
`
`
`Description
`
`Exhibit-2001 Decision on Appeal, Ex Parte FINJAN, INC., Appeal 2016-
`004279, Reexamination Control No. 90/013,016, dated June 29,
`2016.
`
`Exhibit-2002 Final Written Decision, Palo Alto Networks, Inc. v. Finjan, Inc.,
`Case No. IPR2015-01974, Paper 49, filed March 16, 2017.
`
`Exhibit-2003 Decision – Partial Institution of Inter Partes Review – Palo Alto
`Networks, Inc. v. Finjan, Inc., Case No. IPR2015-01974, Paper 7,
`filed March 29, 2016.
`
`Exhibit-2004 U.S. Patent No. 5,983,348 (“Ji”).
`
`Exhibit-2005 Eva Chen “Poison Java” IEEE Spectrum (1999).
`
`Exhibit-2006
`
`Insik Shin, et al., “Java Bytecode Modification and Applet
`Security” (1998).
`
`Exhibit-2007 Declaration of James Hannah in Support of Patent Owner’s
`Preliminary Response, Cisco Systems, Inc. v. Finjan, Inc.,
`IPR2018-00391.
`
`Declaration of Dr. Nenad Medvidovic.
`
`Exhibit-2008
`
`Exhibit-2009 JavaTM 2: The Complete Reference, Third Ed., 1999 (excerpts).
`
`Exhibit-2010 Just Java, 1996 (excerpts).
`
`Exhibit-2011 Deposition Transcript of Dr. Paul Clark.
`
`Exhibit-2012 Declaration of Phil Hartstein.
`(PROTECTIVE ORDER MATERIAL)
`
`- i -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`
`Description
`
`Exhibit-2013 Finjan Holdings, Inc. Form 8-K, dated September 24, 2014.
`
`Exhibit-2014 Finjan Holdings, Inc. Form 8-K, dated April 7, 2015
`
`Exhibit-2015 Finjan Holdings, Inc. Form 8-K, dated May 14, 2015
`
`Exhibit-2016 Finjan Holdings, Inc. Form 8-K, dated November 15, 2015
`
`Exhibit-2017 Finjan Holdings, Inc. Form 8-K, dated December 30, 2015
`
`Exhibit-2018 Finjan Holdings, Inc. Form 8-K, dated May 20, 2016
`
`Exhibit-2019 Finjan Holdings, Inc. Form 8-K, dated March 15, 2018
`
`Exhibit-2020 Gartner report – Magic Quadrant for Secure Email Gateways,
`dated July 2, 2013
`
`Exhibit-2021 Gartner report – Magic Quadrant for Secure Email Gateways,
`dated June 29, 2015
`
`Exhibit-2022 Gartner report – Magic Quadrant for Endpoint Protection
`Platforms, dated January 24, 2018
`
`Exhibit-2023  Proofpoint, Inc. Form 10-K, for fiscal year ended December 31,
`2014
`
`Exhibit-2024 Proofpoint, Inc. Form 10-K, for fiscal year ended December 31,
`2015
`
`Exhibit-2025 Press Release – Proofpoint Announces Fourth Quarter and Full
`Year 2015 Financial Results, dated January 28, 2016
`
`Exhibit-2026 Proposed Protective Order
`
`Exhibit-2027 RESERVED
`
`Exhibit-2028 RESERVED
`
`Exhibit-2029 RESERVED
`
`- ii -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`
`Description
`
`Exhibit-2030 Finjan, Inc. v. Websense, Inc., Case No. 13-cv-04398 (N.D. Cal.),
`Appendix B (‘633 Patent Claim Chart) to Plaintiff Finjan, Inc.’s
`Disclosure of Asserted Claims and Infringement Contentions,
`dated February 28, 2014
`
`Exhibit-2031 Websense, Inc. brochure - Triton APX (2015)
`
`Exhibit-2032 RESERVED
`
`Exhibit-2033 RESERVED
`
`Exhibit-2034 RESERVED
`
`Exhibit-2035 Websense, Inc. Revenue and Financial Data, available at
`http://www.hoovers.com/company-
`information/cs/revenuefinancial.websense_inc.89ee9262879a5b6
`5.html
`
`- iii -
`
`

`

`
`I.
`
`INTRODUCTION
`
`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`On December 22, 2017, Cisco Systems, Inc., (“Petitioner” or “Cisco”) filed
`
`a Petition for inter partes review of claims 1–4, 8, and 11–14 of U.S. Patent No.
`
`7,647,633 (Ex. 1001, the “‘633 Patent”). Despite finding that Petitioner did not
`
`raise a reasonable likelihood of success with respect to claims 1–4, 8, or 11–13, the
`
`Board nevertheless instituted trial on all challenged claims pursuant to SAS Inst.,
`
`Inc. v. Iancu, 138 S. Ct. 1348, 1355 (2018). Patent Owner, Finjan, Inc., (“Patent
`
`Owner” or “Finjan”) respectfully submits that Petitioner’s proposed grounds fail
`
`because it has no evidence to supports its positions and its arguments are contrary
`
`to the plain language of the claims of the challenged claims..
`
`Petitioner lacks evidence to support its assertion that “Hanson describes and
`
`POSA would have understood that the security program is attached (tagged) to the
`
`data packets (executable code) as a separate object that does not modify the data
`
`packets (executable code).” See Ex. 1003 (“Clark Decl.”) at 64, n.5. In fact,
`
`Patent Owner’s expert Dr. Medvidovic shows that even granting Dr. Clark’s
`
`baseless suppositions regarding what a POSITA would understand Hanson to
`
`teach, that POSITA would still understand Hanson’s technique to involve
`
`modifying the executable code.
`
`Additionally given Hanson’s architecture, which utilizes a revers proxy
`
`server to protect servers that respond to access requests, Petitioner’s grounds fail
`
`- 1 -
`
`

`

`because Hanson does not disclose receiving downloadable-information or the
`
`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`claimed information re-communicator. A further result of Hanson’s disclosed
`
`architecture is that Hanson fails disclose providing a system including an
`
`information re-communicator and a mobile code executor.
`
`For the foregoing reasons, and those that follow, the patentability of claims
`
`1–4, 8, and 11–14 should be affirmed.
`
`
`II.
`
`FACTS
`
`A.
`
` Overview of ‘633 Patent
`
`The ’633 Patent claims priority to a number of patents and patent
`
`applications, including U.S. Provisional Patent Application No. 60/205,591 and
`
`U.S. Patents Nos.7,058,822 (“the ‘822 Patent”), 6,804,780 (“the ‘780 Patent”),
`
`6,092,194 (Ex. 1013, “the ‘194 Patent”), 6,480,962 (“the ‘962 Patent”), and
`
`6,167,520 with an earliest claimed priority date of January 29, 1997. See ‘633
`
`Patent at 1:7-25.
`
`The ‘633 Patent describes systems and methods for protecting against
`
`malicious executable code. ‘633 Patent at Abstract. In particular, for the
`
`challenged claims, the ‘633 Patent describes a network “re-communicator” that
`
`receives downloadable-information that includes executable code (i.e., is a
`
`“Downloadable”). Id. at 2:39–44. The re-communicator causes mobile protection
`
`code (“MPC”) and the downloadable-information with executable code to be
`
`- 2 -
`
`

`

`transferred to the destination, without modifying the executable code. Id. at 2:66–
`
`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`3:4, 4:11-16, 10:39-45.
`
`As noted in the Background of the Invention Section, the invention disclosed
`
`and claimed in the ‘633 Patent distinguishes itself over the prior art because the
`
`prior art modifies executable code while the ‘633 Patent does not modify
`
`executable code:
`
`To make matters worse, certain classes of viruses are not well
`recognized or understood, let alone protected against. It is observed by
`this inventor, for example, that Downloadable information comprising
`program code can include distributable components (e.g. Java™
`applets and JavaScript scripts, ActiveX™ controls, Visual Basic, add-
`ins and/or others). It can also include, for example, application
`programs, Trojan horses, multiple compressed programs such as zip
`or meta files, among others. U.S. Pat. No. 5,983,348 to Shuang,
`however, teaches a protection system for protecting against only
`distributable components
`including “Java applets or ActiveX
`controls”, and further does so using resource intensive and high
`bandwidth static Downloadable content and operational analysis, and
`modification of the Downloadable component; Shuang further fails to
`detect or protect against additional program code included within a
`tested Downloadable.
`
`Id. at 1:58–2:6.
`
`- 3 -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`B.
`
` Overview of Hanson
`
`Hanson discloses a “Reverse Proxy Server.” Ex. 1004 (“Hanson”) at Title.
`
`“Proxy servers act as relay stations between an internal network and the Internet
`
`for communication requests initiated inside the company’s network….” Id. at 4.
`
`Proxy servers trust all internal computers. Id. But because “[c]omputers on the
`
`Internet at large cannot be trusted without elaborate authentication and
`
`encryption… [t]his poses a major problem to companies on the Internet which,
`
`selectively, want to share internal company resources on the Internet.” Id.; Ex.
`
`2008 (“Medvidovic Decl.”), ¶ 57.
`
`Hanson’s proposed solution to this problem was to provide a reverse proxy
`
`server “for securely accessing servers over an internetwork.” Id. at 5. As Dr.
`
`Clark stated in his deposition, “[a] proxy performs operations on behalf of a
`
`requester, and generally one thinks of proxy servers as servicing clients, but when
`
`they service servers or used access servers, then generally you refer to that as a
`
`reverse proxy.” Ex. 2011 (“Clark Tr.”) at 48:22–49:4. Medvidovic Decl., ¶ 58.
`
`The architecture of Hanson’s reverse proxy server, also referred to as a
`
`bastion server, is illustrated in FIG. 2, reproduced below:
`
`- 4 -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`Hanson at 18; see also Clark Tr. at 11:1–4 (Q. And what is a bastion host designed
`
`to do? A. Protect and enforce the security policy of the domain.”). Medvidovic
`
`
`
`Decl., ¶ 59.
`
`FIG. 2 illustrates a network that includes client 15, firewall 22, which
`
`protects servers 20, and bastion server 18. Hanson at 6. In order for the client to
`
`request resources from servers 20, “the client receives the server name from the
`
`company under confidence prior to execution of any transactions.” Id. at 7. The
`
`client supplies that server name to a DNS server, which “returns the directly
`
`referenced IP address.” Id. The client then sends a data packet, including the
`
`server name, to the IP address, which is actually the IP address for the bastion. Id.
`
`at 8. The bastion then “determines whether a match exists between the server
`
`name and an internal address located in [its] internal address file.” Id. If there is
`
`- 5 -
`
`

`

`no match, the data packet is discarded, but if there is a match, “the received packet
`
`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`is checked against rules contained within [a] rules file.” Id. If the data packet
`
`passes the rule checks, it is delivered to the server. Id. This procedure is
`
`illustrated in FIG. 4.
`
`Hanson at 20; Medvidovic Decl., ¶ 60.
`
`Once the connection is established, the server can send a reply to the client’s
`
`
`
`request:
`
`- 6 -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`
`
`Hanson at 21; Medvidovic Decl., ¶ 61.
`
`Hanson is therefore concerned with protecting servers from requests for
`
`resources issued by computers on the Internet. This technique stands in stark
`
`contrast to the ‘633 Patent, which discusses computers or re-communicators that
`
`analyze downloadable-information and use mobile protection code to protect
`
`computers “from undesirable or otherwise malicious operations of…
`
`‘Downloadables’ or ‘mobile code.’” Medvidovic Decl., ¶ 62 (quoting ‘633 Patent
`
`at Abstract).
`
`- 7 -
`
`

`

` CLAIMS AT ISSUE
`III.
`
`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`This inter partes review proceeding involves claims 1–4, 8, and 11–14 of the
`
`‘633 Patent, of which claims 1, 8, 13, and 14 are independent. Claim 14 is
`
`reproduced below:
`
`14. A computer program product, comprising a computer usable
`medium having a computer readable program code therein, the
`computer readable program code adapted to be executed for computer
`security, the method comprising:
`
`providing a system, wherein the system comprises distinct
`
`software modules, and wherein the distinct software modules
`comprise an information re-communicator and a mobile code
`executor;
`
`receiving, at the information re-communicator, downloadable-
`
`information including executable code; and
`
`causing mobile protection code to be executed by the mobile
`
`code executor at a downloadable-information destination such that
`one or more operations of the executable code at the destination, if
`attempted, will be processed by the mobile protection code.
`
`IV.
`
` CLAIM CONSTRUCTION
`In an inter partes review proceeding, claims are given their broadest
`
`reasonable interpretation (“BRI”) in light of the specification of the patent in which
`
`they appear. 37 C.F.R. § 42.100(b); Office Patent Trial Practice Guide, 77 Fed.
`
`Reg. 48756 at 48766 (Aug. 14, 2012); see also In re Cuozzo Speed Techs., LLC,
`
`- 8 -
`
`

`

`793 F.3d 1268, 1278 (Fed. Cir. 2015) (“We conclude that Congress implicitly
`
`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`approved the broadest reasonable interpretation standard in enacting the AIA.”).
`
`In its Institution Decision, the Board construed a number of claim terms as
`
`shown below:
`
`Term
`
`Construction (structure for means-plus-function claims)
`
`means for receiving
`downloadable-
`information
`means for
`determining whether
`the downloadable-
`information includes
`executable code
`means for causing
`mobile code to be
`communicated to at
`least one
`information-
`destination of the
`downloadable-
`information, if the
`downloadable-
`information is
`determined to
`include executable
`code
`
`“determining
`whether the
`downloadable-
`information includes
`executable code”
`“executable code”
`
`re-communicating device, such as a server or firewall
`
`Protection engine (Fig 3) in a re-communicating device,
`such as a server or firewall; or
`
`Detection engine (Fig. 4) within a protection engine in a
`recommunicating device, such as a server or firewall ”
`Protection engine (Fig 3) in a re-communicating device,
`such as a server or firewall; or
`
`Transfer engine (Fig. 4) within the protection engine in a
`re-communicating device, such as a server or firewall
`
`“distinguishing between two alternative possibilities:
`executable code is included in the downloadable-
`information, and executable code is not included in the
`downloadable-information”
`
`“the executable code whose operations are processed by the
`mobile protection code at the destination is the same as the
`
`- 9 -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`executable code received, i.e., it undergoes no
`modification”
`
`See Institution Decision at 9–10. Because the Board has made its decision
`
`regarding the claim construction positions, Patent Owner applies these
`
`constructions herein without waiving any rights. SAS Institute, Inc. v.
`
`Complementsoft, LLC, 825 F.3d 1341, 1351 (Fed. Cir. 2016) (holding that an
`
`agency may not change theories in midstream without giving reasonable notice of
`
`the change and the opportunity to present argument under the new theory)
`
`(citations omitted).
`
`A.
`
`
`
`“downloadable-information” (all challenged claims)
`
`The term “downloadable-information” means “information which is
`
`downloaded from a source computer which may or may not include executable
`
`code.” See Medvidovic Decl., ¶ 45.
`
`As Petitioner notes, “[a] Downloadable is an executable application
`
`program, which is downloaded from a source computer and run on the destination
`
`computer.” Petition at 9 n.1 (citing Ex. 1007, p. 3, ll. 20-21). The ‘633 Patent
`
`further notes that a Downloadable is downloadable-information “found to include
`
`executable code”:
`
`Thus, for convenience, received information will also be referred to as
`a “potential-Downloadable”, and received information found to
`include executable code will be referred to as a “Downloadable” or
`
`- 10 -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`equivalently as a “detected-Downloadable” (regardless of whether the
`executable code
`includes one or more application programs,
`distributable “components” such as Java, ActiveX, add-in, etc.).
`
`‘633 Patent at 9:18-24; Medvidovic Decl., ¶ 46.
`
`This proposed construction is also fully consistent with the definition that
`
`Dr. Clark provided for this term during his deposition:
`
`Q. So how do you interpret the term “downloadable information”?
`
`A. As it says in paragraph 32 and as we discussed earlier, it explains
`that downloadable
`information
`includes data
`that can be
`downloaded and that may or may not include executable code.
`
`Q. What does the term “download” mean?
`
`A. Generally to retrieve something from a server.
`
`Clark Tr. at 44:20–45:6 (emphasis added); Medvidovic Decl., ¶ 47.
`
`Thus, according to Petitioner’s expert and Dr. Medvidovic, downloadable-
`
`information should be considered “information which is downloaded from a source
`
`computer which may or may not include executable code.”
`
`B.
`
`
`
`“information re-communicator” and “information monitor”
`(claims 2, 3, and 14)
`
`The term “information re-communicator” means “a computing device that
`
`receives downloadable-information from an external network and then sends it on
`
`to its destination.” Medvidovic Decl., ¶ 48.
`
`- 11 -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`Aside from the correction that an information re-communicator in the case
`
`of the ‘633 Patent receives downloadable-information, this is the definition that
`
`Dr. Clark provided for this term during his deposition:
`
`Q. And how does the '633 Patent solve this problem?
`
`A. It describes a system which uses their terminology of a
`recommunicator to attach a mobile protection code module to the code
`if it's executable so that it can be safely run at a destination.
`
`Q. What does the term "recommunicator" mean in the context of the
`'633 Patent?
`
`MR. McPHERSON: Object to form of the question to the extent it
`calls for a legal conclusion.
`
`BY THE WITNESS:
`
`A. I understand from reading the patent that the recommunicator
`receives the downloadable from the external network and then sends
`it on to its destination.
`
`Clark Tr. at 13:3–19 (emphasis added).
`
`Dr. Clark’s definition is consistent with the way that the term “re-
`
`communicator” is used in the ‘633 Patent. For example, as described with respect
`
`to FIG. 1a, subsystems 104–106 are separated via external network 101 from
`
`resource servers 102–103. See ‘633 Patent at 5:63–6:26 and FIG. 1a. The resource
`
`servers “might provide one or more resources including web pages, streaming
`
`media, transaction-facilitating information, program updates or other downloadable
`
`- 12 -
`
`

`

`information….” Id. at 6:2–5. Subsystems 104–106, on the other hand, receive
`
`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`downloadable information through the external network and provide protection
`
`“against potentially harmful or other undesirable (‘malicious’) effects in
`
`conjunction with receiving downloadable information.” Id. at 6:27–33;
`
`Medvidovic Decl., ¶ 49.
`
`Two specific examples of subsystems that receive downloadable information
`
`over an external network include are described with respect to FIGs. 1b and 1c,
`
`reproduced below.
`
`
`
`- 13 -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`
`
`These exemplary subsystems each includes re-communicator that receives and is
`
`“capable of transferring or otherwise ‘re-communicating’ downloadable
`
`information” received over an external network to user devices. ‘633 Patent at
`
`6:54–7:43; Medvidovic Decl., ¶¶ 50–51.
`
`The ‘633 Patent also demonstrates that an “information monitor” is “a
`
`component of an information re-communicator that monitors downloadable-
`
`information from an external network.” In particular, the ‘633 Patent states that an
`
`“information monitor” is part of a “protection engine” that “is operable within one
`
`or more network servers, firewalls or other network connectable information re-
`
`communicating devices”:
`
`A protection engine according to an embodiment of the invention is
`operable within one or more network servers, firewalls or other
`
`- 14 -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`network connectable information re-communicating devices (as are
`referred to herein summarily one or more “servers” or “re-
`communicators”). The protection engine includes an information
`monitor for monitoring information received by the server, and a code
`detection engine for determining whether the received information
`includes executable code.
`
`‘633 Patent at 2:58–66; Medvidovic Decl., ¶ 53.
`
`V.
`
`
`
`PETITIONER DID NOT PROVIDE A PROPER OBVIOUSNESS
`ANALYSIS
`
`On its face, the Petition alleges only obviousness grounds with respect to the
`
`challenged claims:
`
`
`
`Petition at 32. The Petition, however, includes no allegation that Hanson need be
`
`modified by any other reference, or modified using the knowledge of a POSITA, to
`
`reach claim 14 of the ‘633 Patent. See generally Petition at 73–80. This tactic
`
`appears calculated to (1) leave vague the weaknesses of its case and (2) relieve its
`
`burden to demonstrate anticipation. Such tactics are improper in an inter partes
`
`review, and are sufficient grounds for the Board to find that Petitioner has not met
`
`its burden to demonstrate the unpatentability of claim 14:
`
`- 15 -
`
`

`

`Patent Owner’s Response
`IPR2018-00391 (U.S. Patent No. 7,647,633)
`
`
`Whenever a ground based on obviousness is involved, the preferred
`manner of setting out differences is to state “the subject matter of
`claim x differs from the reference in that (1) …, (2) …., and (n) ….”
`Vague statements or hints of differences not only burdens the Board,
`but puts a patent owner at somewhat of a disadvantage with having to
`guess what any differences a petitioner believes may exit [sic].
`Reluctance on the part of counsel to “admit” to and identify a
`difference is hard to understand, given the fact that a difference does
`not mean the subject matter claimed is non-obvious. Dann v.
`Johnston, 425 U.S. 219, 230 (1976) (mere existence of differences
`between the prior art and an invention does not establish the
`invention’s non-obviousness).
`
`*
`
`*
`
`*
`
`*
`
`Petitioner’s failure to clearly identify differences is not consistent
`with 37 C.F.R. § 42.104(b)(4) and 42.104(b)(5), as well as 35 U.S.C.
`§ 312(a)(3), which require
`identifying
`the grounds “with
`particularity.” The Petition must specify where each element of a
`challenged claim is found in the prior art patents or printed
`publications. 37 C.F.R. § 42.104(b)(2).
`
`Volkswagen Group of Am., Inc., v. Emerachem Holdings, LLC, IPR2014-01558,
`
`Final Written Decision, Paper 59 at 40–41 a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket