throbber
Paper No. 6
`Trials@uspto.gov
`571-272-7822 Entered: May 28, 2019
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`GUEST TEK INTERACTIVE ENTERTAINMENT LTD.,
`Petitioner,
`
`v.
`
`NOMADIX, INC.,
`Patent Owner.
`____________
`
`Case IPR2019-00253
`Patent 8,626,922 B2
`____________
`
`
`
`
`
`Before SALLY C. MEDLEY, DANIEL J. GALLIGAN, and
`JASON W. MELVIN, Administrative Patent Judges.
`
`MEDLEY, Administrative Patent Judge.
`
`
`
`
`DECISION
`Granting Institution of Inter Partes Review
`35 U.S.C. § 314
`
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`I. INTRODUCTION
`Guest Tek Interactive Entertainment Ltd. (“Petitioner”) filed a
`Petition for inter partes review of claims 1 and 9 of U.S. Patent No.
`8,626,922 B2 (Ex. 1001, “the ’922 patent”). Paper 1 (“Pet.”). Nomadix,
`Inc. (“Patent Owner”) filed a Preliminary Response. Paper 5 (“Prelim.
`Resp.”). Institution of an inter partes review is authorized by statute when
`“the information presented in the petition . . . and any response . . . shows
`that there is a reasonable likelihood that the petitioner would prevail with
`respect to at least 1 of the claims challenged in the petition.” 35 U.S.C.
`§ 314(a). Upon consideration of the Petition and Preliminary Response, we
`conclude the information presented shows that there is a reasonable
`likelihood that Petitioner would prevail in establishing the unpatentability of
`claims 1 and 9 of the ’922 patent.
`
`A. Related Matters
`Petitioner indicates that Patent Owner is asserting the ’922 patent
`against Petitioner in claims for a breach of a license agreement in Nomadix,
`Inc. v. Guest Tek Interactive Entertainment Ltd., Case No. 2:16-cv-08033-
`AB-FFM, pending in the United States District Court for the Central District
`of California. Pet. 2–3; see also Paper 3, 1.
`
`B. The ’922 Patent
`The specification of the ’922 patent describes a “method and device
`for dynamic bandwidth management on a per subscriber basis.” Ex. 1001,
`3:32–33. A user/subscriber may set and adjust uplink and downlink
`bandwidths of their network access service. Id. at 3:33–35. “[T]he
`user/subscriber can increase or decrease the bandwidth of the uplink
`connection so that the user/subscriber only purchases the amount of
`
`2
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`bandwidth appropriate for their network activity.” Id. at 3:47–50. Figures 2
`and 3 of the ’922 patent are reproduced below.
`
`
`Figure 2 of the ’922 patent is a block diagram of a communications
`network implementing subscriber bandwidth management within a gateway
`device. Ex. 1001, 4:22–24.
`
`
`
`
`
`3
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`
`
`
`Figure 3 of the ’922 patent is a block diagram of a communications
`network implementing uplink and downlink virtual queues in a gateway
`device. Ex. 1001, 4:26–28.
`As seen from the above figures, a plurality of hosts 14, 14n
`communicate data packets through communication network 10. Id. at 8:60–
`62. Data packets are routed through an access concentrator 16 that
`multiplexes data packets received from the plurality of hosts. Id. at 8:62–64.
`Gateway 12 receives data packets at port 80 and communicates to uplink
`queue 60 via uplink path 64. Id. at 8:64–67. Gateway 12 includes
`bandwidth manager 30, which comprises subscriber selectable bandwidth
`module (SSB module) 32 and traffic shaping module 34. Id. at 8:24–25.
`SSB module 32 “limits the upstream and downstream bandwidths on each
`virtual channel through the gateway device 10 to that which the respective
`user/subscriber selected.” Id. at 8:27–30. SSB module 32 communicates
`
`4
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`with subscriber management interface 50 to retrieve subscriber profiles 52,
`which include user/subscriber selected bandwidth for uplink and downlink
`data transfer. Id. at 8:33–38. SSB module 32 determines whether to
`reschedule delivery of a packet at a later point in time to prevent the
`user/subscriber from achieving a bandwidth greater than that which the
`user/subscriber selected. Id. at 8:38–42. SSB module 32 calculates “the
`appropriate delay, if any, using the size (in bytes) of the current data packet,
`and the size and time of the previous packet delivered from the subscriber.”
`Id. at 8:43–46. If it is determined that a packet should be delayed, SSB
`module 32 places the packet in memory in a virtual queue for later delivery.
`Id. at 8:53–55.
`
`C. Illustrative Claim
`Petitioner challenges independent claims 1 and 9 of the ’922 patent.
`Claim 1 is illustrative and reproduced below.
`1. A system for allowing a user to dynamically control
`an amount of bandwidth available to the user in a network, the
`system comprising:
`a first network interface for communicating over a
`communication link with a user device during a network session;
`a second network interface for communicating with one or
`more computer networks;
`a data storage system including a user profile record
`associated with a user, the user profile record comprising an
`indication of a network communication bandwidth associated
`with the user device; and
`a processor configured to calculate a delay period
`associated with a received packet based on the network
`communication bandwidth associated with the user, and the
`processor further configured to delay transmission of the packet
`based on the delay period to prevent the user device from
`
`5
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`achieving a bandwidth greater than the network communication
`bandwidth associated with the user device.
`Id. at 14:30–49.
`
`D. Asserted Grounds of Unpatentability
`Petitioner asserts that claims 1 and 9 are unpatentable based on the
`following grounds (Pet. 3):
`Basis2
`References1
`§ 103
`Bonomi3 and Borella4
`§ 103
`Chandran5 and Rupp6
`Teraslinna7 and Bonomi § 103
`
`Challenged Claims
`1 and 9
`1 and 9
`1 and 9
`
`II. DISCUSSION
`
`A. Claim Construction
`In an inter partes review for a petition filed before November 13,
`2018, we construe claim terms in an unexpired patent according to their
`
`1 Petitioner refers to the references by patent number, while Patent Owner
`refers to the references by the last name of the first named inventor. We
`adopt Patent Owner’s naming convention.
`2 The Leahy-Smith America Invents Act, Pub. L. No. 112-29, 125 Stat. 284
`(2011) (“AIA”), amended 35 U.S.C. §§ 102 and 103. Because the ’922
`patent has an effective filing date before the effective date of the applicable
`AIA amendments, we refer to the pre-AIA versions of 35 U.S.C. §§ 102 and
`103.
`3 U.S. Patent No. 5,864,540, issued Jan. 26, 1999 (Ex. 1004, “Bonomi”).
`4 U.S. Patent No. 6,587,433 B1, issued July 1, 2003 (Ex. 1006, “Borella”).
`5 U.S. Patent No. 7,392,279 B1, issued June 24, 2008 (Ex. 1005,
`“Chandran”).
`6 Björn Rupp et al., INDEX: A Platform for Determining How People Value
`the Quality of Their Internet Access, In: Proceedings of the Sixth IEEE/IFIP
`International Workshop on Quality of Service 85 (IEEE 1998) (Ex. 1007,
`“Rupp”).
`7 U.S. Patent No. 5,623,492, issued Apr. 22, 1997 (Ex. 1008, “Teraslinna”).
`6
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`broadest reasonable construction in light of the specification of the patent in
`which they appear. 37 C.F.R. § 42.100(b) (2018); see Changes to the Claim
`Construction Standard for Interpreting Claims in Trial Proceedings Before
`the Patent Trial and Appeal Board, 83 Fed. Reg. 51,340 (Oct. 11, 2018)
`(amending 37 C.F.R. § 42.100(b) effective November 13, 2018). Consistent
`with the broadest reasonable construction, claim terms are presumed to have
`their ordinary and customary meaning as understood by a person of ordinary
`skill in the art in the context of the entire patent disclosure. In re Translogic
`Tech., Inc., 504 F.3d 1249, 1257 (Fed. Cir. 2007).
`
`Petitioner proposes constructions for the following claim terms found
`in the challenged claims: “processor” (claim 1); “data storage system”
`(claim 1); and “user profile record” (claim 1). Pet. 9–10. Patent Owner does
`not oppose Petitioner’s proposed constructions. Prelim. Resp. 7.
`For purposes of this decision, we need not expressly construe any
`claim term. See Vivid Techs., Inc. v. Am. Sci. & Eng’g, Inc., 200 F.3d 795,
`803 (Fed. Cir. 1999) (holding that “only those terms need be construed that
`are in controversy, and only to the extent necessary to resolve the
`controversy”); see also Nidec Motor Corp. v. Zhongshan Broad Ocean
`Motor Co., 868 F.3d 1013, 1017 (Fed. Cir. 2017) (citing Vivid Techs. in the
`context of an inter partes review).
`
`B. Principles of Law
`A patent claim is unpatentable under 35 U.S.C. § 103(a) if the
`differences between the claimed subject matter and the prior art are such that
`the subject matter, as a whole, would have been obvious at the time the
`invention was made to a person having ordinary skill in the art to which said
`subject matter pertains. KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 406
`
`7
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`(2007). The question of obviousness is resolved on the basis of underlying
`factual determinations including (1) the scope and content of the prior art;
`(2) any differences between the claimed subject matter and the prior art;
`(3) the level of ordinary skill in the art;8 and (4) when in evidence, objective
`evidence of nonobviousness. Graham v. John Deere Co., 383 U.S. 1, 17–18
`(1966).
`
`C. Asserted Obviousness of Claims 1 and 9 over Bonomi and Borella and
`over Teraslinna and Bonomi
`Petitioner contends claims 1 and 9 are unpatentable under 35 U.S.C.
`§ 103(a) as obvious over (1) Bonomi in view of Borella (Pet. 4, 24–41), and
`(2) Teraslinna in view of Bonomi (Pet. 4, 54–66). In support of its showing,
`Petitioner relies upon the declaration of Dr. Dordal. Id. (citing Ex. 1002).
`
`1. Bonomi
`Bonomi describes a method and system for controlling traffic in a
`communications network. Ex. 1004, 1:6–7. Bonomi further describes that
`for communication networks, a communication path must be established
`within the network between the sender(s) and receiver(s) of information. Id.
`at 1:18–21. Bonomi describes Asynchronous Transfer Mode (ATM) as “a
`connection oriented network technology” that transmits “packets of digital
`
`
`8 Relying on the testimony of Dr. Peter Dordal, Petitioner offers an
`assessment as to the level of skill in the art as of the earliest effective filing
`date on the face of the ’922 patent. Pet. 10 (citing Ex. 1002 ¶ 27). Patent
`Owner does not propose an alternative assessment. See, e.g., Ex. 2001 ¶ 22.
`To the extent necessary, and for purposes of this Decision, we accept the
`assessment offered by Petitioner as it is consistent with the ’922 patent and
`the asserted prior art.
`
`8
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`information called cells.” Id. at 1:36–42. In such a network, a connection is
`formed between transmitters and receivers where each intermediate switch
`in the virtual circuit or channel (VC) is aware of service requirements and
`traffic parameters of the connection such that the quality of service (QOS) of
`the channel can be guaranteed by the network if the connection stays within
`its stated traffic parameters. Id. at 1:43–55. The QOS of a connection in an
`ATM network may be “guaranteed” by “contract” when a connection is
`established through a process of connection admission control (CAC). Id. at
`2:11–14. In particular, “each connection ‘contracts’ to transmit cells to the
`network at a rate ρ (bandwidth descriptor) with burstiness σ (burst
`descriptor) when the connection is established.” Id. at 2:14–17. If there are
`insufficient network resources (e.g., buffer and/or bandwidth) to provide the
`required QOS at the contracted traffic parameters, a connection will not be
`allowed. Id. at 2:17–20. Bonomi describes that it was known to employ
`“leaky bucket traffic shaping” to control traffic for ATM switched networks.
`Id. at 2:38–43. Credit tokens are provided by the traffic shaper at a rate ρ
`that represents sustainable bandwidth for the connection. Id. at 2:44–46.
`These credit tokens accumulate in a “leaky bucket” that holds up to σ credit
`tokens. Id. at 2:50–52. “Each cell arriving at the traffic shaper must claim a
`token to pass through the shaper; if no tokens are available, the cell is
`considered ‘nonconforming’ and is delayed until a token is available when
`the connection conforms to the traffic contract.” Id. at 2:52–56.
`Bonomi’s invention is directed to integration of leaky-bucket traffic
`shaping and rate-based link scheduling. Id. at 4:16–18. Bonomi describes a
`traffic shaper, “optimally suited for, but not limited to, high speed switches
`in an Asynchronous Transfer Mode network.” Id. at 6:36–38. When a cell
`
`9
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`arrives at the traffic shaper, the cell’s conformance time c is computed. Id.
`at 8:1–2. “Conformance time is the time at which an arriving cell conforms
`to the contracted traffic parameters of the connection the cell is coming
`from.” Id. at 8:3–5. “[C]onformance time is determined from the cell’s
`estimated arrival time, X, the contracted traffic parameters for the cell’s
`connection, ρ and σ, and the arrival time of the last cell from the same
`connection.” Id. at 8:18–21. Bonomi describes, with respect to Figure 2:
`If X is less than or equal to t+σ/ρ then the connection is
`complying with the traffic contract and the cell is conforming as
`shown in step 34. In the case of a conforming cell, conformance
`time c equals the current time t. As shown in step 35, if X is
`greater
`than
`t+σ/ρ
`the cell
`is non-conforming and
`the
`conformance time is set to comply with the contracted traffic
`parameters, c=X-σ/ρ.
`
`Id. at 8:32–38. If the arriving packet’s conformance time is equal to or
`before the current time, the packet is placed on the transmission queue for
`sending through the network. Id. at 7:1–10, 8:36–50, 8:63–9:2. If the
`packet is nonconforming, it is placed on a sorting bin queue for a delay
`period based on the calculated conformance time. Id. A sorting bin may
`correspond to a single delay period between conformance time and current
`time. Id. at 14:18–20.
`
`2. Borella
`Borella is directed to a method and system for providing different
`levels or classes of packet delivery service in a packet-based network.
`Ex. 1006, 1:13–15. Users may select a desired class of service according to
`the users’ specific requirements, such as “bandwidth requirements.” Id. at
`2:49–54. The system controls and charges “applications and users fees
`according to the network resources they consume,” which “provides the
`
`10
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`ability to efficiently allocate and utilize network resources.” Id. at 2:55–58.
`“Users may select the quality of service, i.e., amount of bandwidth
`depending on the particular type of application they are running and the cost
`they are willing to pay.” Id. at 12:32–35. Service selection may be
`preselected or provided dynamically during a session. Id. at 12:35–37.
`Selected service class for a user is stored in a user profile record. Id. at 7:1–
`4. The user profile may include user name 410 with an associated user
`identifier 412 and device type 414 such as a personal computer. Id. at 10:3–
`7, Fig. 4.
`
`3. Teraslinna
`Teraslinna is directed to a method and system for managing
`bandwidth resources in a fast packet switching communication network.
`Ex. 1008, [57], 1:9–13. Teraslinna describes a fast packet switch that routes
`packets received from devices, including user devices. Id. at 6:3–44.
`The address of the user’s device, along with the device’s preselected
`bandwidth constraint, are stored in a look-up table. Id. at 6:47–63, 8:26–31,
`17:37–50. The system receives a packet and uses the address in the packet
`header for the user’s device to look up the bandwidth constraint to enforce
`that constraint. Id. at [57], 6:47–63, 8:26–31, 17:37–50, Figs. 3, 12. When
`the fast packet switch receives a packet, a processor (packet profile
`processor 37 of Figure 3), analyzes the source address in the packet to
`determine the subscriber who sent the packet. Id. at 6:24–33, 6:45–49. The
`processor also determines if the received packet causes a violation of the
`pre-selected bandwidth constraint from the look-up table. Id. at 5:16–23,
`6:28–33, 6:50–59. A violation occurs when the user’s bandwidth usage
`exceeds the threshold bandwidth preselected in the user’s traffic contract
`
`11
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`that is stored in the look-up table. Id. at 6:59–63, 15:64–66. If a violation
`occurs, the received packet is discarded, marked with a low priority for loss,
`or placed in a queue for delayed transmission. Id. at 5:20–25, 6:59–63,
`15:60–16:21.
`
`4. Discussion
`a. Bonomi in view of Borella
`Petitioner contends that Bonomi discloses all elements of claims 1
`and 9, except that Bonomi describes controlling or managing network
`bandwidth made available to connections in general as opposed to user
`devices. Pet. 24. Petitioner relies on Borella for its disclosure of user
`devices and a user profile record as recited in claims 1 and 9. Id. at 24, 32–
`35. Petitioner also provides reasons why a person having ordinary skill in
`the art at the time of the invention would have been motivated and had
`reason to combine the teachings of Bonomi and Borella. Id. at 35–41.
`The preamble of claim 1 recites “[a] system for allowing a user to
`dynamically control an amount of bandwidth available to the user in a
`network.” Petitioner argues that Bonomi describes allowing a connection to
`dynamically control an amount of bandwidth in a network. Pet. 25.
`Petitioner contends that Bonomi describes a traffic shaper that controls and
`manages the amount of bandwidth made available to each connection when
`transmitting packets through a network. Id. (citing Ex. 1004, 1:59–63, 2:14–
`20); see, e.g., Ex. 1004, [57], 4:15–21, 6:35–42. Petitioner asserts that
`Bonomi describes delaying transmission of packets that are nonconforming,
`i.e., packets that would require a bandwidth greater than the negotiated
`bandwidth. Pet. 25 (citing Ex. 1004, 8:45–50). Petitioner further contends
`that Bonomi describes controlling and managing network resources
`
`12
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`dynamically. Id. (citing Ex. 1004, 1:33–35, 9:37–40). Petitioner contends
`that although Bonomi describes that a network connection in general
`negotiates, and thus controls, the amount of bandwidth made available to it,
`Bonomi does not expressly describe that a “user” controls the available
`bandwidth as recited in claim 1. Id. at 26.
`Petitioner relies on Borella for describing managing and controlling
`network resources for user devices, including allowing users to select
`bandwidth constraints dynamically and associating bandwidth constraints
`with user devices. Id. at 32. For example, Petitioner contends that Borella
`describes a system for allowing a user to select the quality of service such as
`the amount of bandwidth and that such selection may occur before a network
`session begins or that it may occur dynamically during a session. Id. at 32–
`33 (citing Ex. 1006, 12:32–37, 12:39–14:37, Table D); see, e.g., Ex. 1006,
`12:32–37 (“Users may select the quality of service, i.e., amount of
`bandwidth depending on the particular type of application they are running
`and the cost they are willing to pay. The service selection could be
`pre-selected or it could be provided dynamically during a session.”).
`Claim 1 further recites “a first network interface for communicating
`over a communication link with a user device during a network session.”
`Petitioner contends that Bonomi describes a traffic shaper that includes a
`first network interface, input 1, and that packets sent from transmitting
`devices to a receiving device enter the traffic shaper through input 1. Pet. 26
`(citing Ex. 1004, 1:17–21, 6:55–61, Fig. 1). Petitioner further contends that
`Borella describes communicating over a link with a user device. Id. at 33
`(citing Ex. 1006, 3:22–27, 4:10–13, 12:39–14:37, Table D). For example,
`Borella describes user customer premises equipment 40 and telephony
`
`13
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`device 44 connected via communication line 46 over Public Switched
`Telephone Network (PSTN) 24 via second communication line 23 to
`Remote Access Server (RAS) 22. Ex. 1006, 3:22–27.
`Claim 1 recites “a second network interface for communicating with
`one or more computer networks.” Petitioner contends that Bonomi describes
`a second network interface, output 3, which is connected to a computer
`network. Pet. 27 (citing Ex. 1004, 6:8–11, 6:58–61, Fig. 1).
`Claim 1 recites “a data storage system including a user profile record
`associated with a user, the user profile record comprising an indication of a
`network communication bandwidth associated with the user device.”
`Petitioner contends that Bonomi describes a data storage system, depicted in
`Bonomi Figure 6, showing a connection table 400 that maintains stored
`shaping rate (bandwidth) associated with each connection. Id. at 27–28
`(citing Ex. 1004, 8:9–11, 9:20–24, 11:44–48, 11:53–57, 12:46–47, Fig. 6).
`Petitioner relies on Borella for describing a user profile record associated
`with a user. Id. at 28. Petitioner contends Borella describes that the selected
`class of service for a user, including desired bandwidth, is stored in a user
`profile record. Id. at 33–34 (citing Ex. 1006, 7:1–4, 10:3–13, 12:32–35, Fig.
`4). Petitioner further contends that the desired bandwidth amount selected
`by the user is associated with the user device. Id. at 34 (citing Ex. 1006,
`2:33–36, 2:49–54, 11:24–30).
`Claim 1 recites “a processor configured to calculate a delay period
`associated with a received packet based on the network communication
`bandwidth associated with the user.” Petitioner contends that Bonomi’s
`arithmetic logic unit (ALU) is a processor. Id. at 29 (citing Ex. 1004, 12:38–
`40; Ex. 1002 ¶ 23, App. I; Ex. 1020). Petitioner further contends that
`
`14
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`Bonomi’s ALU (processor) is configured to calculate a delay period
`associated with a received packet based on the network communication
`bandwidth connection. Id. at 29–30 (citing Ex. 1004, 8:30–38, 12:38–40).
`Bonomi describes that the ALU performs the comparison and pointer
`manipulation operations of the described invention. Ex. 1004, 12:38–40.
`Petitioner contends that the comparison operation involves calculating the
`delay period for an arriving packet. Pet. 29. In particular, Petitioner asserts
`that the processor compares the arrival time of each packet (X) to see if it
`complies with traffic contract parameters such as the selected bandwidth, ρ,
`and if it does not, calculates a delay period (based on conformance time
`c=X-σ/ρ). Id. at 29–30 (citing Ex. 1004, 8:30–38; Ex. 1002, App. I). In his
`overview of Bonomi, Dr. Dordal testifies that:
`If the traffic shaper determines that an arriving cell/packet’s
`conformance time is equal to or before the current time, the
`packet is placed on the transmission queue for transmission
`through the network, and will be transmitted without additional
`delay. [Ex. 1004, ] 7:1-10; 8:36-50, 8:63-9:2. If the cell/packet
`is “nonconforming” (i.e., the cell’s conformance time is after the
`current time), the cell is placed on a “sorting bin” queue for a
`delay period based on the calculated conformance time. [Id. at ]
`7:1-10; 8:36-50, 8:63-9:2; claim 13 (“each said sorting bin
`corresponds to a single delay period between said conformance
`time and said current time”). These sorting bins correspond
`approximately to the “timeslots” of the “ring buffer” of the ‘922
`patent; see paragraph 51 below.
`
`Ex. 1002 ¶ 50; see also id. ¶ 51.
`Petitioner asserts that Borella describes that the bandwidth is
`associated with the user. Pet. 34–35. Petitioner explains that Borella
`describes that the quality of service containing the network communication
`bandwidth is selected by the user, stored with user name and device, and
`
`15
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`used to manage resources for packets sent from the user. Id. (citing
`Ex. 1006, 10:5–13).
`Claim 1 further recites that the processor is “further configured to
`delay transmission of the packet based on the delay period to prevent the
`user device from achieving a bandwidth greater than the network
`communication bandwidth associated with the user device.” Petitioner relies
`on the combined teachings of Bonomi and Borella to meet this claim phrase.
`In particular, Petitioner contends that Bonomi’s ALU performs pointer
`manipulation operations such that packets are moved between first in first
`out (FIFO) queues based on whether they are conforming. Id. at 30 (citing
`Ex. 1004, 8:45–54, 12:38–45). Bonomi describes that if a packet is
`nonconforming, the cell is placed in a sorting bin selected based on its
`calculated conformance time, c. Ex. 1004, 8:49–50. Petitioner contends that
`the packet remains in the sorting bin until its conformance time is reached,
`thereby creating a delay period and delaying transmission of the packet
`based on the delay period. Pet. 31 (citing Ex. 1004, 7:1–10, 8:36–50, 8:63–
`9:2, 9:5–8, claim 13 (14:18–20)). Petitioner contends that conformance
`times are based on the contracted bandwidth parameters. Id. (citing
`Ex. 1004, 8:3–5). Petitioner further explains that the delay in transmitting
`packets ensures that the connection bandwidth is less than or equal to the
`contracted bandwidth. Id. at 32 (citing Ex. 1004, 2:17–20, 2:36–40).
`Petitioner relies on Borella for describing a user device as recited in the
`above claim 1 phrase. Id. at 34–35. Petitioner asserts that Borella describes
`a system that implements traffic management for user devices based on
`bandwidths selected by users and associated with user devices. Id. at 34
`(citing Ex. 1006, 2:33–36, 2:49–54, 11:24–30, Table D).
`
`16
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`Petitioner asserts reasons for combining Bonomi and Borella.
`Pet. 35–41. For example, Petitioner contends, with supporting evidence, that
`both Bonomi and Borella involve the same type of networks, including
`ATM networks, and are directed to enforcing bandwidth constraints. Id. at
`36; Ex. 1004, Abstract, 1:6–10; Ex. 1006, 5:17–19, 11:10–15. Petitioner
`further contends that a person having ordinary skill in the art would have
`been motivated to employ user devices as connection endpoints in Bonomi
`because ATM networks were originally developed to accommodate high-
`speed bandwidth requirements of user devices such as computers and mobile
`phones. Pet. 37 (citing Ex. 1002 ¶ 80). Petitioner alleges that a person
`having ordinary skill in the art would have been motivated to implement
`Borella’s technique of storing service classes with desired bandwidths for
`user devices in user profiles so that they may be retrieved later for traffic
`management. Id. at 37–38 (citing Ex. 1002 ¶ 81). Petitioner further alleges
`that modifying Bonomi with Borella would have amounted to a simple
`substitution of one element—functionality that stores a negotiated
`bandwidth constraint with a network connection in general—for another
`known element—functionality that stores a bandwidth class for a network
`endpoint that is a user device in a user profile record. Id. at 38 (citing Ex.
`1002 ¶ 82). Petitioner also asserts the combination would have been
`predictable, along with additional reasons why a person having ordinary skill
`in the art would have been motivated to combine Bonomi and Borella with a
`reasonable expectation of success. Id. at 38–40 (citing Ex. 1002 ¶¶ 83–86).
`Independent claim 9 is similar to claim 1. Petitioner’s showing for
`claim 9 is nearly the same as that for claim 1, while sufficiently accounting
`for differences between claim 9 and claim 1. See Pet. 25–41.
`
`17
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`b. Teraslinna in view of Bonomi
`Petitioner also contends Teraslinna in combination with Bonomi
`would have rendered claims 1 and 9 obvious. Pet. 54–66. Petitioner relies
`on Teraslinna to meet all elements of claims 1 and 9, except for the
`limitations reciting calculating a delay period and delaying transmission of
`the received packet based on the delay period. Id. at 54. For those
`limitations, Petitioner relies on Bonomi.
`For example, Petitioner contends that Teraslinna describes a first
`network interface for communicating over a link with a user device. Id. at
`55–56 (citing Ex. 1008, Fig 5 (switch 70, link 82a, equipment SE 1)).
`Petitioner further contends that Teraslinna describes a second network
`interface for communicating with one or more computer networks. Id. at
`56–57 (citing Ex. 1008, Fig. 5 (switch 72), Fig. 11). Petitioner asserts that
`Teraslinna describes a look-up table that includes a user profile record
`associated with a user that includes an indication of a network
`communication bandwidth associated with the user device. Id. at 57–59
`(citing multiple passages from Ex. 1008). Petitioner further asserts that
`Teraslinna describes a processor, e.g., packet protocol processor 37 of
`Figure 3, that performs packet protocol processing and enforces bandwidth
`constraints (e.g., inhibits the flow of packets) based upon the identities of the
`sources of the received packets and the selected bandwidths for those
`sources. Id. at 59–61 (citing multiple passages from Ex. 1008).
`As it did for the Bonomi and Borella challenge, Petitioner relies on
`Bonomi for describing a processor configured to calculate a delay period and
`delay transmission of a packet based on the delay period as claimed. Id. at
`62–63. Petitioner asserts reasons for combining Teraslinna and Bonomi. Id.
`
`18
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`at 63–66. Petitioner alleges, with supporting evidence, that Teraslinna and
`Bonomi are analogous art (id. at 63), that there was a known design need for
`enforcing bandwidth constraints to avoid network congestion and that there
`were only a finite number of solutions (id. at 64), and that a person having
`ordinary skill in the art would have been motivated to delay transmission of
`packets, as opposed to dropping packets (id. at 64–65).
`Petitioner also asserts that modifying Teraslinna with Bonomi would
`have amounted to a simple substitution of one element—a traffic flow
`processor configured to queue packets for a potentially unlimited amount of
`time until the subscriber no longer exceeds the allotted bandwidth amount—
`for another known element—a processor configured to calculate a specific
`delay period and then delay packet transmission based on the delay period.
`Id. at 65 (citing Ex. 1002 ¶ 105). Petitioner also contends the combination
`would have been predictable, along with additional reasons why a person
`having ordinary skill in the art would have been motivated to combine
`Teraslinna and Bonomi with a reasonable expectation of success. Id. at 65
`(citing Ex. 1002 ¶¶ 105–106).
`Independent claim 9 is similar to claim 1. Petitioner’s showing for
`claim 9 is nearly the same as that for claim 1, while sufficiently accounting
`for differences between claim 9 and claim 1. See Pet. 54–66.
`c. Patent Owner’s Arguments and Analysis
`Patent Owner argues that Dr. Dordal’s declaration is unsworn, not
`made under penalty of perjury, and, therefore, is entitled to no weight.
`Prelim. Resp. 9–10. At this juncture of the proceeding, we decline to give
`little or no weight to Dr. Dordal’s declaration. We authorize Petitioner to
`
`19
`
`

`

`IPR2019-00253
`Patent 8,626,922 B2
`
`file, within ten days of this Decision, a corrected Exhibit 1002 that complies
`with our rules. 37 C.F.R. §§ 1.68, 42.2, 42.53(a).
`Patent Owner argues that for both challenges, Petitioner has failed to
`show that “Bonomi discloses calculating a delay period for a packet.”
`Prelim. Resp. 13. Patent Owner argues that Petitioner’s contention “that the
`act of determining whether X is less than, equal to, or greater than a
`threshold value constitutes calculation of a period of time by which a packet
`will be delayed . . . makes no sense.” I

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket