throbber
IPR2018-00884
`U.S. Patent 8,539,552
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`
`APPLE INC.
`Petitioner
`
`v.
`
`UNILOC LUXEMBOURG S.A.
`Patent Owner
`____________
`
`
`Case No. IPR2018-00884
`U.S. Patent No. 8,539,552
`____________
`
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 8,539,552
`
`
`
`
`
`
`
`

`

`IPR2018-00884
`U.S. Patent 8,539,552
`
`
`TABLE OF CONTENTS
`
`
`INTRODUCTION ........................................................................................................................................ 1
`I.
`II. SUMMARY OF THE ’552 PATENT ....................................................................................................... 1
`A. DESCRIPTION OF THE ALLEGED INVENTION OF THE ’552 PATENT .......................................................................... 1
`B. SUMMARY OF THE PROSECUTION HISTORY OF THE ’552 PATENT ........................................................................... 4
`C. LEVEL OF A POSITA .............................................................................................................................................................. 5
`III. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R. § 42.104 ............................. 6
`A. GROUNDS FOR STANDING UNDER 37 C.F.R. § 42.104(A)......................................................................................... 6
`B.
`IDENTIFICATION OF CHALLENGED CLAIMS UNDER 37 C.F.R. § 42.104(B) AND RELIEF REQUESTED .......... 6
`C. CLAIM CONSTRUCTION UNDER 37 C.F.R. § 42.104(B)(3) ....................................................................................... 7
`1. Claims 1, 6, 18, and 23: “intercepting” a message ........................................................ 8
`2. Claim 1: “sender device,” “recipient device,” and “device profile” ............................... 9
`IV. THERE IS A REASONABLE LIKELIHOOD THAT THE CHALLENGED CLAIMS OF THE ’552
`PATENT ARE UNPATENTABLE .................................................................................................................. 10
`A. SUMMARY OF KALMANEK (EX1004) .............................................................................................................................10
`B. SHOWING OF ANALOGOUS ART AND PRIOR ART TO THE ’552 PATENT................................................................16
`1. Kalmanek Is Analogous, Prior Art .............................................................................. 16
`2. Shaffer Is Analogous, Prior Art .................................................................................. 17
`3. Strathmeyer Is Analogous, Prior Art ........................................................................... 17
`4. Gleichauf Is Analogous, Prior Art .............................................................................. 18
`C. GROUND 1: KALMANEK IN VIEW OF THE KNOWLEDGE OF A POSITA RENDERS CLAIMS 1-4, 6-10, 12-20,
`AND 22-23 OBVIOUS.....................................................................................................................................................................18
`D. GROUND 2: CLAIMS 5 AND 11 ARE OBVIOUS OVER KALMANEK IN VIEW OF SHAFFER....................................57
`E. GROUND 3: CLAIMS 21, 24, AND 25: OBVIOUS OVER KALMANEK IN VIEW OF STRATHMEYER ....................59
`F. GROUND 4: CLAIM 17 IS OBVIOUS OVER KALMANEK IN VIEW OF GLEICHAUF...................................................64
`V. CONCLUSION .......................................................................................................................................... 67
`VI. MANDATORY NOTICES UNDER 37 C.F.R. § 42.8(A)(1) ................................................................. I
`A. REAL PARTY-IN-INTEREST .................................................................................................................................................... I
`B. RELATED MATTERS ................................................................................................................................................................. I
`C. LEAD AND BACK-UP COUNSEL .............................................................................................................................................. I
`
`
`
`
`
`
`
`
`i
`
`

`

`I.
`
`INTRODUCTION
`
`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`
`Petitioner Apple Inc. (“Apple” or “Petitioner”) requests an Inter Partes
`
`Review (“IPR”) of claims 1-25 (collectively, the “Challenged Claims”) of U.S.
`
`Patent No. 8,539,552 (“the ’552 Patent”). (EX1001).
`
`The ’552 Patent discloses a telephony system in which endpoints request
`
`certain services and features in call signaling messages. To ensure only authorized
`
`services and features are permitted, signaling messages are received and analyzed
`
`by non-endpoint network components to ensure the users have subscribed to the
`
`requested services and features. As demonstrated by Petitioner below, the
`
`purportedly distinguishing feature of the ’552 Patent of intercepting signaling
`
`messages to authorize requested services and features was present in the prior art.
`
`II.
`
`SUMMARY OF THE ’552 PATENT
`A. Description of the Alleged Invention of the ’552 Patent
`The ’552 Patent discloses a telephony network 100, which “support[s]
`
`packet-based telephony and multimedia sessions and services. The network 100
`
`includes a core packet network 102, and two local packet networks 104 and 106, as
`
`well as intelligent end-user clients 104a-d and 106a-e associated with the local
`
`packet networks 104 and 106.” ’552 Patent (EX1001) at 3:48-54, FIG. 1. The ’552
`
`Patent also describes a specific example of the packet-based network, namely IP
`
`
`
` 1
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`network 200, which implements session initiation protocol (SIP) signaling. Id. at
`
`4:46-49.
`
`As explained in the ’552 Patent, intelligent end-user clients can handle
`
`telephony services and features such as signaling and call-control functionality. Id.
`
`at 1:23-25. This leaves “the carriers and service provider network’s responsib[le
`
`for] little more than providing data pipes.” Id. at 1:23-30.
`
`The use of intelligent end-user clients presents the problem, however, that
`
`services “may be signaled, controlled, and/or delivered by intelligent end-user
`
`clients that are not owned or controlled by the network providers, thereby enabling
`
`potential bypassing by the end user of service agreements or other subscription
`
`accounting mechanisms.” Id. at 1:48-55. Thus, the intelligent end-user clients may
`
`bypass authorization by the network and provide a service to a subscriber not
`
`authorized to receive the service. Id. at 2:61–3:7.
`
` To address this problem, the ’552 Patent describes a “policy enforcement
`
`point” within the network, which “control[s] access to, and invocation of, features
`
`and services which may otherwise be delivered to subscribers without the
`
`knowledge or authorization of the network.” Id. at 1:59-60, 3:20-36, 12:50-13:5
`
`(identifying caller ID as a service), 13:6-28 (identifying call waiting and multi-line
`
`service as services), 13:66–14:5 (providing additional listing of services that may
`
`be authorized in a user (subscriber) profile), Abstract. The subscriber is authorized
`
`
`
` 2
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`to receive certain services, which are documented in the subscriber’s profile. Id. at
`
`2:8-14, 7:2-7, 13:36-51.
`
`At call setup, the policy enforcement point receives signaling messages and
`
`analyzes them to identify services requested in the message. Id. at 8:56-58, 11:55-
`
`64 (signaling matched against database to identify requested services). Requested
`
`services are authenticated and network resources are allocated accordingly, as
`
`illustrated in FIG. 3 below:
`
`
`
`See also id. at 8:60–9:8.
`
`Although the policy enforcement point can be a single physical network
`
`component, the ’552 Patent explains that “the term policy enforcement point is a
`
`
`
` 3
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`reference to a logical localization of a set of tasks and functions that may actually
`
`be embodied in one or more physical devices, and/or in a distributed manner.” Id.
`
`at 7:61-65; see also id. at 8:32-37.
`
`Summary of the Prosecution History of the ’552 Patent
`
`B.
`The application that resulted in the ’552 Patent (“the ’552 Patent
`
`Application”) was filed on September 25, 2003. ’552 Patent File History (EX1002)
`
`at 1-2. For purposes of this proceeding, Petitioner applies September 25, 2003 as
`
`the priority date for the Challenged Claims. Id. at 5, 62. The ’552 Patent
`
`Application underwent an extensive prosecution history. Rather than undertake a
`
`review of each Office Action and corresponding response, the below discussion is
`
`most relevant to the Challenged Claims and the proposed grounds of rejection.
`
`In an Office Action dated September 14, 2011, the pending independent
`
`claims were rejected as unpatentable over USPN 7,136,373 to Ma (“Ma”) in view
`
`of USPGPub 2002/0116643 to Raanan (“Raanan”). Id. at 375. Applicant
`
`conducted an interview with the Examiner on November 2, 2011, and the
`
`Examiner Interview Summary details a disagreement on claim language:
`
`The primary subject of the interview was the interpretation of the
`limitation “whether the sender device [or] the intended recipient
`device is authorized [to] invoke the type of service.” The Examiners’
`interpretation of the claim is that only one of the devices . . . needs to
`be checked. However, Applicant argued that both needed to be
`
`
`
` 4
`
`

`

`checked. . . . [I]n the end both parties had to agree to disagree on the
`interpretation of the claim language.
`
`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`
`Id. at 399.
`
`The Applicant’s Amendment responsive to the Office Action further
`
`asserted that the claims require both devices to be authorized. Id. at 419-420;
`
`compare to id. at 357-363 (listing claim amendments prior to 9/14/2011 Office
`
`Action). Applicant agreed that Raanan disclosed determining if the sender was
`
`allowed to request an action or command, but disputed that Raanan taught
`
`determining whether both the sender device and recipient device is authorized. Id.
`
`at 419; see also id. at 420, last paragraph (arguing that Raanan does not teach
`
`determining that “any beneficiary” is authorized to invoke the service). Two
`
`additional Office Actions followed, and with no express resolution of the proper
`
`interpretation of this key claim language, the ’552 Patent was allowed on July 8,
`
`2013. Id. at 522. For purposes of this petition only, Petitioner assumes the claims
`
`require both caller and callee to be authorized for a requested service.
`
`C.
`
`Level of a POSITA
`
`A person having ordinary skill in the art at the time of the ’552 Patent would
`
`have been a person having at least a bachelor’s degree in electrical engineering,
`
`computer science or engineering, or in a related field, with at least 2 years of
`
`industry or research experience with packet-based telecommunications systems.
`
`
`
` 5
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`Additional industry experience or technical training may offset less formal
`
`education, while advanced degrees or additional formal education may offset lesser
`
`levels of industry experience. Rubin Decl. (EX1003) at ¶¶ 31-33.
`
`III. REQUIREMENTS FOR INTER PARTES REVIEW UNDER 37 C.F.R.
`§ 42.104
`A. Grounds for Standing Under 37 C.F.R. § 42.104(a)
`Petitioner certifies that the ’552 Patent is available for IPR and that the
`
`Petitioner is not barred or estopped from requesting IPR challenging the claims of
`
`the ’552 Patent.
`
`B.
`
`Identification of Challenged Claims Under 37 C.F.R. § 42.104(b)
`and Relief Requested
`
`In view of the prior art and evidence presented, claims 1-25 of the ’552
`
`Patent are unpatentable and should be cancelled. 37 C.F.R. § 42.104(b)(1).
`
`Further, based on the prior art references identified below, IPR of the Challenged
`
`Claims should be granted. 37 C.F.R. § 42.104(b)(2).
`
`Proposed Grounds of Unpatentability
`Ground 1: Claims 1-4, 6-10, 12-20, and 22-23 are obvious under
`pre-AIA 35 U.S.C. § 103(a) (“Section 103”) over U.S. Patent No.
`6,324,279 to Kalmanek et al. (“Kalmanek”) in view of the
`knowledge of a Person of Ordinary Skill in the Art (“POSITA”)
`Ground 2: Claims 5 and 11 are obvious under Section 103 over
`Kalmanek in view of the knowledge of a POSITA and in further
`view of U.S. Patent No. 7,023,839 to Shaffer et al. (“Shaffer”)
`
`Exhibits
`
`1004
`
`1004,
`1005
`
`
`
` 6
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`
`Exhibits
`
`Proposed Grounds of Unpatentability
`Ground 3: Claims 21, 24, and 25 are obvious under Section 103
`over Kalmanek in view of the knowledge of a POSITA and in
`further view of U.S. Patent Pub. No. 2001/0026548 to Strathmeyer
`et al. (“Strathmeyer”)
`Ground 4: Claim 17 is obvious under Section 103 over Kalmanek
`in view of the knowledge of a POSITA and in further view of U.S.
`Patent No. 7,412,598 to Gleichauf (“Gleichauf”)
`
`1004,
`1006
`
`1004,
`1007
`
`
`
`Section IV identifies where each element of the Challenged Claims is found
`
`in the prior art. 37 C.F.R. § 42.104(b)(4). The exhibit numbers of the supporting
`
`evidence relied upon to support the challenges are provided above and the
`
`relevance of the evidence to the challenges raised are provided in Section IV. 37
`
`C.F.R. § 42.104(b)(5). Exhibits EX1001–EX1010 are also attached.
`
`C. Claim Construction Under 37 C.F.R. § 42.104(b)(3)
`In this proceeding, claim terms of an unexpired patent should be given their
`
`“broadest reasonable construction in light of the specification.” 37 C.F.R.
`
`§ 42.100(b); Cuozzo Speed Techs., LLC v. Lee, 136 S. Ct. 2131, 2144-46 (2016).
`
`Adherence to the rules of construction is not a waiver of any argument, in any
`
`litigation, that claim terms in the ’552 Patent should not be construed differently or
`
`are otherwise invalid (including under 35 U.S.C. § 112).
`
`
`
` 7
`
`

`

`Claims 1, 6, 18, and 23: “intercepting” a message
`
`1.
`Claims 1, 6, 18, and 23 recite the network entity intercepting a signaling
`
`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`
`message. The ’552 Patent uses the term “intercept” or variants thereof only three
`
`times in the specification:
`
`(1) “[t]he signaling and call control server 112 intercepts call set-up
`
`messages sent between the end-user clients, e.g., intelligent client 104c, and the
`
`core packet network 102 …” ’552 Patent (EX1001) at 3:64-67;
`
`(2) “Initially, signaling and call control messages are received or intercepted
`
`by the policy enforcement point.” Id. at 8:56-58; and
`
`(3) “The policy enforcement point may be a border element between a local
`
`network and a core network, for example, that intercepts all signaling messages
`
`sent in between.” Id. at 8:58-60.
`
`A POSITA would readily understand that intercepting signaling messages,
`
`as described by the ’552 Patent, is used to indicate the signaling is received by a
`
`network entity located between the endpoints of the call (i.e., between the caller
`
`and callee). Rubin Decl. (EX1003) at ¶35. In each Challenged Claim that includes
`
`the term “intercept,” the component that “intercepts” is a “network entity.” See
`
`’552 Patent (EX1001) at Claims 1, 6, 18, and 23. A POSITA would recognize that
`
`any such “network entity” is necessarily located between the endpoints of the call.
`
`
`
` 8
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`Accordingly, Apple submits that the Broadest Reasonable Interpretation (“BRI”)
`
`for “intercepting” means “receiving.”
`
`2.
`
`Claim 1: “sender device,” “recipient device,” and “device
`profile”
`
`Claim 1 recites determining “whether either the sender device or the
`
`intended recipient device is authorized to invoke the type of service indicated in
`
`the signaling message based in part on a device profile.” Dependent claims 2, 4,
`
`and 5 also characterize the invention in terms of services the “sender device” or
`
`“recipient device” are authorized to invoke. But the ’552 Patent describes this
`
`concept exclusively in terms of user profiles that define services the user is
`
`authorized to invoke. See, e.g., id. at 7:3-7 (“[A]uthorization for use of services
`
`could be determined according to a user profile stored in the authentication and
`
`authorization server 210. The user profile might list services and features to
`
`which the user has subscribed.”) (emphasis added). Put simply, there is no
`
`“device profile” described in the ’552 Patent. Instead, there is a user profile for a
`
`user of a particular device. Further, where the ’552 Patent does reference the end
`
`device in the context of the authorization process, it does so only for the common
`
`sense proposition that the user is tied to a device. Id. at 2:21-26 (“The proxy server
`
`may receive a request from the border element for a user profile of at least one of
`
`the end devices, and in response, send the user profile to the at least one of the end
`
`
`
` 9
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`devices. The user profile specifies which services the at least one end device is
`
`authorized to use.”). In sum, the ’552 Patent consistently describes an
`
`authorization process that is (1) based on a user profile and (2) wherein services
`
`authorized for a device are in fact services authorized for the user of that device.
`
`Accordingly, the BRI of a “determin[ing] whether [a] device . . . is authorized to
`
`invoke [a] service . . . based . . . on a device profile” is broad enough to capture the
`
`sole embodiment described in the ’552 Patent—determining whether a user of a
`
`particular device is authorized to invoke a service based on that user’s profile. See
`
`Rubin Decl. (EX1003) at ¶57.
`
`IV. THERE
`IS A REASONABLE LIKELIHOOD THAT THE
`CHALLENGED CLAIMS OF THE
`’552 PATENT ARE
`UNPATENTABLE
`A.
`Kalmanek “relate[s] to call authorization, call signaling, network resource
`
`Summary of Kalmanek (EX1004)
`
`management and end-to-end signaling between communication devices (e.g.,
`
`telephones, personal computers, etc.).” Kalmanek (EX1004) at 3:54-57. As
`
`discussed below, Kalmanek relies on intelligent endpoints and recognizes the same
`
`problem addressed by the ’552 Patent—theft of service and invoking unauthorized
`
`services in a network. Id. at 3:65–4:11. To address these problems while
`
`maintaining certain benefits of intelligent end-user clients, the Kalmanek invention
`
`includes a method of “allocating network resources” and “reserving and
`
`
`
` 10
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`committing network resources based on an authorized quality of service” that relies
`
`on intelligent network components between intelligent endpoints. Id. at 1:26-29;
`
`see also id. at 1:36-39, 9:6-21 (“Quality of service is a measure of communication
`
`service quality during a call, and can include, for example, the bandwidth, delay
`
`and latency associated with the call.”). Kalmanek also teaches authorizing custom
`
`calling services for a call, such as a caller ID. Id. at 6:49-52 (describing gate
`
`controller authorizing services), 46:49-52 (describing signaling architecture for
`
`calls with custom calling features), 56:17-44 (describing call flow for caller ID
`
`service).
`
`Kalmanek describes network 10 having a communications network 100 that
`
`supports Internet Protocol (IP) signaling. Id. at 4:33-56. Kalmanek teaches a gate
`
`controller in communication with a telephone interface unit (TIU) and a network
`
`edge device (NED). Id. The TIUs in Kalmanek may incorporate a broadband
`
`interface and therefore, are also referred to in Kalmanek as BTIs. Id. at 5:41-44.
`
`Further, the network edge devices may be implemented as routers at the network
`
`edge and therefore, are also referred to as edge routers or ERs. Id. at 5:5-8. A
`
`schematic of the Kalmanek network is provided in below FIG. 1:
`
`
`
` 11
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`
`
`
`To begin a call, the originating telephony interface unit (TIUO) associated
`
`with a calling party sends a SETUP message that is received and processed by an
`
`originating gate controller (GCO), which in turn sends the setup message to a
`
`terminating gate controller (GCT) associated with a called party. Id. at 9:40-50,
`
`FIG. 2, Step 210, 13:18-29, FIG. 3, Step 330. Upon the terminating gate controller
`
`(GCT) receiving the SETUP message, a gate for the call is established, utilizing the
`
`terminating NED. Id. at 9:51-57, 13:29-32, 12:11-15 (noting a gate setup message
`
`“is received through a network edge device connecting a trusted network to an
`
`untrusted network”). Establishing the gates at the network edge devices, rather than
`
`at the gate controllers, allows state information for the call to be maintained at a
`
`network entity through which the call is routed, i.e., the NED. Id. at 9:62-66;
`
`EX1003 at ¶50 (explaining that the referenced “network entity through which the
`
`call is routed” at Kalmanek, 9:65-66 is the NED, i.e., the edge router for the
`
`
`
` 12
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`particular domain). Kalmanek further explains that each NED obtains authorization
`
`for a particular quality of service, e.g., bandwidth, from its associated gate
`
`controller and then provides access to the authorized quality of service for the call.
`
`Id. at 5:9-28; see also id. at 27:44-46 (“Resource allocation messages are
`
`exchanged between the BTI and the Edge Router for reservation and release of
`
`network resources.”), FIG. 23 (illustrating a SETUP message proceeding from a
`
`gate controller, through an edge router, and to a BTI (i.e., a broadband TIU)).
`
`When
`
`the SETUP message
`
`is
`
`received by
`
`the TIUT, a setup
`
`acknowledgement (SETUPACK) message is returned to the TIUO. Id. at 13:33-41.
`
`The network resources are reserved, with each TIU sending a reserve message to
`
`its corresponding NED. Id. at 10:6-19. The reserve message is “part of the
`
`reservation process where an allocation of network resources is requested.” Id.
`
`The basic call flow for Kalmanek is shown in the below excerpted FIG. 6:
`
`
`
` 13
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`
`Id. at FIG. 6 (excerpt); see also id. at 48:9–50:4 (describing basic connect call flow
`
`
`
`descriptors).
`
`To summarize this stage in the call process, TIUO (or, as shown in FIG. 6,
`
`BTIO) has sent a connection request, via the first SETUP message shown in FIG. 6,
`
`that is received by its gate controller (GCO). See id. at 21:1–22:67 (describing the
`
`SETUP protocol). The GCO authenticates the user and requested services. See id.
`
`(“The Gate Controller must verify that this caller-id is valid.”); see also id. at
`
`48:36-42 (“GCO authenticates the BTI upon receipt of a SETUP message” and
`
`“also performs service-specific admission control.”). The resources are then
`
`
`
` 14
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`allocated, via GATEALLOC and GATEALLOCACK messages shown in FIG. 6.
`
`See id. at 12:11-17 (noting that state information is contained within a
`
`GATEALLOC message), 33:55–34:36 (describing the gate allocation protocol
`
`between GC and ER). Each gate controller then establishes a gate at its
`
`corresponding NED/ER, via GATESETUP messages. See id. at 34:46–35:38. Each
`
`TIU/BTI has also sent a reserve message to its corresponding NED/ER allocating
`
`the network resources, which includes information on auxiliary services associated
`
`with the call. Rubin Decl. (EX1003) at ¶51 (citing EX1004 at 8:26-28). At this
`
`stage, each NED/ER has obtained the needed authorization information to
`
`implement the call from its corresponding gate controller. Kalmanek (EX1004) at
`
`5:13-22, 27:44-46, 33:56-64 (discussing that the gate controller implements all
`
`allocation policies and uses that information to manage the set of gates
`
`implemented by the edge routers). The NED/ER is now ready to implement the
`
`particular service authorized by the associated gate controller based on gate
`
`information provided by the gate controller. Rubin Decl. (EX1003) at ¶52.
`
`As explained by Kalmanek, the gate controller authorizes requested services
`
`(including quality of service), implements the allocation policy for the services,
`
`and establishes the gates based on the allocated policy, wherein the gates are then
`
`implemented by the edge routers. Kalmanek (EX1004) at 33:55-64, 48:36-42.
`
`Subsequently, end-to-end messages are exchanged between the originating and
`
`
`
` 15
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`terminating TIUs/BTIs. Id. at 11:5-14, FIG. 2, Step 260, 13:50-55, FIG. 3, Step
`
`395.
`
`Once the reserved network resources are committed, each NED can verify
`
`“that the actual quality of service sought by the associated TIU is no greater than
`
`the quality of service reserved during the reservation process.” Id. at 11:43-47; see
`
`also id. at 14:17-27 (explaining that a user only receives authorized quality of
`
`service).
`
`B.
`
`Showing of Analogous Art and Prior Art to the ’552 Patent
`1.
`Kalmanek is a U.S. patent with an issue date of November 27, 2001, and
`
`Kalmanek Is Analogous, Prior Art
`
`therefore, is prior art at least under § 102(b).
`
`Kalmanek is also analogous prior art to the ’552 Patent. Kalmanek is
`
`directed to the same problem as the ’552 Patent, namely theft of service or
`
`providing an unauthorized service in a network. Kalmanek (EX1004) at 3:65–4:11.
`
`Kalmanek is also in the same field as the ’552 Patent, as it is directed to a method
`
`of “allocating network resources,” “reserving and committing network resources
`
`based on an authorized quality of service,” and authorizing custom calling services
`
`for a call, such as a caller ID. Id. at 1:26-29, 1:36-39, 9:6-21, 8:18-25; Rubin Decl.
`
`(EX1003) at ¶¶39-40.
`
`
`
` 16
`
`

`

`Shaffer Is Analogous, Prior Art
`
`2.
`Shaffer is a U.S. patent with a filing date of August 19, 1999, and an issue
`
`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`
`date of April 4, 2006. Shaffer claims priority as a continuation-in-part to USPN
`
`6,757,277. Applying the filing date of August 19, 1999, Shaffer is prior art to the
`
`’552 Patent under at least § 102(e). Should Patent Owner attempt to swear behind
`
`the August 19, 1999, filing date, Apple reserves the right to establish an earlier
`
`priority date for Shaffer based on the parent patent disclosure.
`
`Shaffer is also analogous prior art to the ’552 Patent. Shaffer is in the same
`
`field as the ’552 Patent, as it is directed to a bandwidth adjustment or allocation
`
`server (BWAS) that monitors system bandwidth usage in a packet network. Shaffer
`
`(EX1005) at 1:49-61, 2:49-52; see also Rubin Decl. (EX1003) at ¶¶42-43.
`
`Strathmeyer Is Analogous, Prior Art
`
`3.
`Strathmeyer is a U.S. patent application publication with a publication date
`
`of October 4, 2001, and therefore, is prior art to the ’552 Patent under, at the least,
`
`§ 102(b).
`
`Strathmeyer is also analogous prior art to the ’552 Patent. Strathmeyer is in
`
`the same field as the ’552 Patent, as it is directed to call control and signaling in a
`
`packet switched telephone network. Strathmeyer (EX1006) at ¶¶ 0010-0012; see
`
`also Rubin Decl. (EX1003) at ¶¶45-46.
`
`
`
` 17
`
`

`

`Gleichauf Is Analogous, Prior Art
`
`4.
`Gleichauf is a U.S. patent with a filing date of December 29, 2000 and an
`
`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`
`issue date of August 12, 2008, and therefore, is prior art to the ’552 Patent under at
`
`least § 102(e).
`
`Gleichauf is also analogous prior art to the ’552 Patent. Gleichauf is in the
`
`same field as the ’552 Patent, as it is directed to invoking services such as Caller
`
`ID in a packet switched telephone network. Gleichauf (EX1007) at 1:15-39; see
`
`also Rubin Decl. (EX1003) at ¶¶ 48-49.
`
`C. Ground 1: Kalmanek in View of the Knowledge of a POSITA
`Renders Claims 1-4, 6-10, 12-20, and 22-23 Obvious
`1.
`
`1[Preamble]: “A method for controlling a plurality of
`services
`in packet-based networks,
`the method
`comprising”
`
`Claim 1
`
`
`Kalmanek discloses a method of controlling services provided in a network,
`
`including a packet-based network. Specifically, Kalmanek discloses a method of
`
`using a “gate controller” for controlling services (Kalmanek (EX1004) at 6:49-55)
`
`such as codec specification and caller ID (Id. at 10:13-19, 46:49-52) within “packet
`
`telephony” networks (Id. at 3:40-45).
`
`Kalmanek addresses the problem of theft of service or providing an
`
`unauthorized service: “embodiments of the present invention protect against theft
`
`of service, and minimize the cost and complexity associated with providing
`
`
`
` 18
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`reliable service.” Id. at 4:9-11. To control access to services, such that a subscriber
`
`only receives authorized services, Kalmanek teaches a method wherein “gate
`
`controllers can authenticate signaling messages and authorize requests for service
`
`so that communication services and certain service features are only provided to
`
`authorized subscribers. In other words, upon receiving a setup request message
`
`from a calling party, the gate controller can authenticate the identity of the calling
`
`party and authorize the service sought by the calling party.” Id. at 6:49-55; see also
`
`id. at 1:26-29, 3:54-64 (“Embodiments of the present invention relate to call
`
`authorization, call signaling, network resource management and end-to-end
`
`signaling between communication devices (e.g., telephones, personal computers,
`
`etc.).”).
`
`The Kalmanek method allows for authorization of both the bandwidth and
`
`the custom-calling services accessible during a call. Rubin Decl. (EX1003) at ¶53.
`
`For example, and as discussed in detail below, the system enforces a “quality of
`
`service” for the call, i.e., a particular bandwidth for the call, which is defined by a
`
`selected codec. Kalmanek (EX1004) at 9:6-21, 5:9-22, 10:13-19 (discussing that
`
`the gate controllers authorize a quality of service for a call using authentication
`
`databases and customer profile information)). Additionally, the gate controllers
`
`permit only authorized services, such as caller ID, to be invoked by the subscriber.
`
`Id. at 46:49-52 (Section 8 of Kalmanek detailing the signaling architecture for call
`
`
`
` 19
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
`flows, including custom calling features such as caller ID), 6:49-52 (teaching that
`
`gate controllers authorize requests for service, including communication services
`
`and certain service features), 56:17-44 (discussing that a gate controller checks to
`
`determine if the customer has subscribed to caller ID), 25:37-43 (discussing that
`
`caller ID information is only provided if the customer has subscribed to it).
`
`
`
`Kalmanek teaches that its method is employed in a communication system
`
`including a packet-based network Id. at 3:49-53 (noting “packet telephony” can be
`
`implemented in the present invention); see also id. at 3:40-45. Kalmanek further
`
`teaches that its communication network 100 may be an Internet Protocol (IP)
`
`network, similar to the ’552 Patent. Compare ’552 Patent (EX1001) at 4:46-48
`
`(“FIG. 2 illustrates a specific example of a network 200, similar to that illustrated
`
`in FIG. 1, in which the packet networks are IP networks.”), with Kalmanek
`
`(EX1004) at 4:50-53 (“Communication network 100 can be a network that
`
`supports, for example, Internet Protocol (IP) signaling, IP media transport, and/or
`
`asynchronous transfer mode (ATM) media transport.”).
`
`
`
` 20
`
`

`

`IPR2018-00884
`U.S. Patent No. 8,539,552
`
` Claim 1[A]: “a network entity intercepting a signaling
`message associated with a call between a sender
`device of the message and an intended recipient
`device of the message”
`
`As explained in detail below, Kalmanek teaches a network entity that
`
`intercepts call setup signaling messages between the sender (the caller) and an
`
`intended recipient device (the callee).
`
`Network Entity
`
`Kalmanek teaches a network entity that intercepts signaling messages
`
`between sender and recipient devices. Namely, Kalmanek teaches gate controllers
`
`110 and 111 within network 10, which are in communication with network edge
`
`devices (NEDs) 120 and 121—routers or bridges that connect communication
`
`network 100 to access networks 150 and 151. Kalmanek (EX1004) at 4:33–5:8
`
`(noting NEDs are also referred to as “edge routers”), FIG. 1. The NED provides
`
`access to a particular service based on authorization provided by that NED’s
`
`corresponding gate controller. Id. at 5:9-28, Rubin Decl. (EX1003) at ¶54

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket