throbber
Trials@uspto.gov
`Tel: 571-272-7822
`
`Paper 58
`Date: May 11, 2023
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`APPLE INC.,
`Petitioner,
`v.
`MPH TECHNOLOGIES OY,
`Patent Owner.
`
`
`
`IPR2019-00819
`Patent 7,620,810 B2
`__________________________
`
`
`
`
`
`
`
`
`Before KEVIN C. TROCK, JOHN D. HAMANN, and
`STACY B. MARGOLIES, Administrative Patent Judges.
`
`HAMANN, Administrative Patent Judge.
`
`
`
`
`JUDGMENT
`Final Written Decision on Remand
`Determining Challenged Claims 4–6 Not Shown Unpatentable
`35 U.S.C. §§ 144, 318(a)
`
`
`
`
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`
`INTRODUCTION
`I.
`This case returns on remand from the United States Court of Appeals
`
`for the Federal Circuit in Apple Inc. v. MPH Techs. OY, Nos. 2021-1355,
`2021-1356, 2022 WL 4103286 (Fed. Cir. Sept. 8, 2022).1 In our prior Final
`Written Decision in this proceeding, we determined that by a preponderance
`of the evidence Apple Inc. (“Petitioner”) (i) did not prove that claims 1–6 of
`U.S. Patent No. 7,620,810 B2 (Ex. 1001, “the ’810 patent”) are
`unpatentable, and (ii) proved that claim 7 of the ’810 patent is unpatentable.
`Paper 37 (“FWD”), 54–55. On Petitioner’s appeal, the Federal Circuit held
`that we erred in our construction for “encrypted” messages, and as a result,
`vacated our judgment of no unpatentability for claims 1–6 and remanded to
`the Board for further proceedings. Apple, 2022 WL 4103286, at *6, 8.
`
`After the Federal Circuit’s decision, and before the mandate issued,
`Patent Owner filed a statutory disclaimer under 37 C.F.R. § 1.321, which
`states that Patent Owner “hereby disclaims and dedicates to the public the
`entirety of claims 1–3 of the ’810 Patent.” Ex. 3003, 1; Paper 50.
`Accordingly, claims 1–3 are no longer part of this proceeding. And for the
`reasons that follow, we determine that Petitioner does not show by a
`preponderance of the evidence that claims 4–6 are unpatentable.
`
`
`1 The Federal Circuit issued a joint decision, addressing Petitioner’s appeal
`from this proceeding, as well as Petitioner’s appeal from Apple Inc. v. MPH
`Techs. Oy, IPR2019-00820 (“the -820 case”). Apple, 2022 WL 4103286, at
`*1. On remand, we issue separate decisions for these cases for purposes of
`clarity.
`
`2
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`A. Procedural History
`Petitioner filed a Petition requesting inter partes review of claims 1–7
`of the ’810 patent. Paper 2 (“Pet.”). MPH Technologies Oy (“Patent
`Owner”) filed a Preliminary Response. Paper 8.
`We instituted inter partes review of claims 1–7 of the ’810 patent on
`all of the grounds raised in the Petition. Paper 10 (“Dec. on Inst.”), 7, 40.
`As to the Decision on Institution in this proceeding, Patent Owner filed a
`Request for Rehearing, and requested review by the Precedential Opinion
`Panel (“POP”). Paper 13; Ex. 3001. Patent Owner’s request for POP review
`was denied (Paper 16), and we denied Patent Owner’s Request for
`Rehearing (Paper 24).
`Thereafter, Patent Owner filed a Response to the Petition. Paper 23
`(“PO Resp.”). Petitioner filed a Reply to Patent Owner’s Response. Paper
`26 (“Pet. Reply”). Patent Owner filed a Sur-reply to Petitioner’s Reply.
`Paper 29 (“PO Sur-reply”). An oral hearing was held on June 25, 2020. A
`transcript of the oral hearing is included in the record. Paper 36 (“Tr.”).
`
`After the remand, we authorized a simultaneous exchange of
`additional briefing for the parties to address the legal effect of the statutory
`disclaimer. Paper 52, 6. Pursuant to that authorization, Petitioner filed an
`Opening Brief Post-Remand (Paper 54, “Pet. Rem. Open.”), Patent Owner
`filed an Opening Brief (Paper 55, “PO Rem. Open.”), Petitioner filed a
`Response Brief Post-Remand (Paper 57, “Pet. Rem. Resp.”), and Patent
`Owner filed a Response Brief (Paper 56, “PO Rem. Resp.”).
`B. Related Matters
`The parties identify as related matters the following: (i) MPH Techs.
`Oy v. Apple Inc., No. 5:18-cv-05935-PJH (N.D. Cal.); (ii) Apple Inc. v. MPH
`
`3
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`Techs. Oy, IPR2019-00820 (PTAB) (involving related U.S. Patent No.
`7,937,581 B2); (iii) Apple Inc. v. MPH Techs. Oy, Appeal No. 21-1355 (Fed.
`Cir.); (iv) MPH Techs. Oy v. Apple Inc., Appeal No. 21-1390 (Fed. Cir.);
`(v) Ex Parte Reexamination No. 90/015,174, filed Dec. 14, 2022; and
`(vi) Ex Parte Reexamination No. 90/015,175, filed Dec. 14, 2022. Paper 49,
`1–2; Paper 53, 1.
`C. The Challenged Patent
`The ’810 patent relates to “secur[ing] mobile connections in
`telecommunication networks.” Ex. 1001, 1:13–14. In particular, the ’810
`patent describes reducing the handover latency and computational overhead
`for secure connections, such as those employing Internet Protocol (“IP”)
`Security (“IPSec”) with mobile terminals2 (i.e., terminals that can move
`from one network to another). Id. at 1:13–15, 1:57–64, 4:10–31, 6:48–50,
`7:28–42, 10:34–42.
`IPSec comprises a set of rules defined by the Internet Engineering
`Task Force (“IETF”) to “provide[] the capability to secure communications
`between arbitrary hosts,” according to the ’810 patent. Id. at 1:57–64, 2:3,
`2:6–10. The ’810 patent states that these rules describe, inter alia, providing
`“access control based on the distribution of cryptographic keys.” Id. at
`2:11–20. The ’810 patent also describes the concept of a Security
`Association (“SA”), which according to the ’810 patent is “a one-way
`relationship between a sender and a receiver that offers [negotiated] security
`services to the traffic carried on it.” Id. at 2:21–24.
`
`
`2 The ’810 patent discloses that “the term[s] mobility and mobile terminal
`do[] not only mean physical mobility, . . . [but also] mean[] moving from
`one network to another, which can be performed by a physically fixed
`terminal as well.” Ex. 1001, 4:27–31.
`
`4
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`The ’810 patent discloses that IPSec supports two modes of operation
`(i.e., transport mode and tunnel mode). Id. at 3:8–9. “Typically, transport
`mode is used for end-to-end communication between two hosts.” Id. at
`3:10–13. “Tunnel mode . . . is generally used for sending messages through
`more than two components,” such as “when one or both ends of a SA is a
`security gateway, such as a firewall or a router that implements IPSec.” Id.
`at 3:16–21.
`“IPSec is intended to work with static network topolog[ies],”
`according to the ’810 patent. Id. at 4:10–11. For example, IPSec can secure
`communications between hosts across a local area network (“LAN”), as well
`as across a private or public wide area network (“WAN”). Id. at 1:57–59.
`Figure 1, shown below, “illustrates an example of a telecommunication
`network to be used in the invention” of the ’810 patent. Id. at 8:40–41.
`
`
`
`
`Figure 1 depicts an example telecommunication network comprising
`
`“computer 1 . . . and computer 2[,] a destination computer, to which the
`secure messages are sent . . . by means of an IPSec tunnel established
`between computer 1 and computer 2.” Id. at 8:54–58. The ’810 patent adds:
`“Computer 2 [can] be a security gateway for a third computer 3. Then, the
`
`5
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`messages sent from computer 2 to computer 3 are sent in plaintext.” Id. at
`8:53–60.
`
`The ’810 patent discloses that in forming an IPSec tunnel under
`IPSec’s default automated key management protocol (i.e., the Internet Key
`Exchange (“IKE”) protocol), “the tunnel endpoints are fixed and remain
`constant.” Id. at 3:66–4:4, 4:12–17. The ’810 patent adds: “If IPSec is used
`with a mobile host the IKE key exchange will have to be redone from every
`new[ly] visited network. This is problematic, because IKE key exchanges
`involve computationally expensive” calculations and require exchanging
`numerous messages between the endpoints, leading to higher latency. Id. at
`4:15–26.
`
`To address these problems, the ’810 patent discloses avoiding a full
`re-negotiation between the tunnel endpoints, when computer 1 moves
`networks. E.g., id. at 9:33–44 (describing prior art requires a full
`re-negotiation), 9:63–66. More specifically, the ’810 patent discloses
`initially establishing an IPSec tunnel between computer 1 (address A) and
`computer 2 (address X) using IKE, as in the prior art. Id. at 9:48–62, Fig. 5
`(illustrating steps 1a–9a for setting up the tunnel); compare id. at Fig. 5, with
`id. at Fig. 4 (showing the same nine steps as the prior art solution); see also
`id. at 9:12–39 (describing the prior art IKE establishment of the tunnel).
`
`The ’810 patent discloses that, when computer 1 moves from address
`A to address B, computer 1 sends from its new address (address B) to
`computer 2 (address X) at the other end of the established IPSec tunnel, a
`request for computer 2 to register its new address. Id. at 9:63–10:2.
`According to the ’810 patent, this request can be “encrypt[ed] and/or
`
`6
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`authenticat[ed] . . . us[ing] the same IPSec SA [that is used] for protecting
`both data and registration traffic.” Id. at 10:4–8.
`
`The ’810 patent thus discloses that the tunnel’s IPSec SA is carried
`over to the new connection point, and computer 1 can send IPSec-protected
`messages to computer 2 after sending the request, which “essentially makes
`the handover latency zero.” Id. at 10:11–19, 10:34–37. “[T]he exact
`method of signalling is not important[;] the essence is to carry over the
`IPSec SA to the new connection point.” Id. at 10:11–13.
`D. The Challenged Claims
`Petitioner challenged claims 1–7 of the ’810 patent in the Petition.
`Pet. 4. Of these, claims 1–6 are the subject of the remand. Apple, 2022 WL
`4103286, at *8. In light of Patent Owner’s statutory disclaimer (Ex. 3003,
`1), however, only claims 4–6 remain for our consideration. Each of claims
`4–6 depend directly from claim 3, which is the focus of our analysis below.
`We thus reproduce claim 3 below, as well as claim 1 from which it depends
`for context.
`1. A method for ensuring secure forwarding of a message in a
`telecommunication network, having at least one mobile terminal
`and another terminal and a security gateway therebetween, the
`method comprising:
`
`a) establishing a secure connection between a first address
`of the mobile terminal and an address of the security gateway,
`the secure connection defined by at least the addresses of the
`mobile terminal and the security gateway,
`
`b) the mobile terminal changing from the first address to a
`second address,
`
`c) while at the second address, the mobile terminal sending
`a request message to the address of the security gateway to
`request the security gateway to change the secure connection to
`be defined between the second address and the address of the
`security gateway,
`
`7
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`
`in response to the request message from the mobile
`terminal, the security gateway changing an address definition of
`the secure connection from the first address to the second
`address, the mobile terminal sending a secure message in the
`secure connection from the second address of the mobile
`terminal to the other terminal via the security gateway,
`
`the secure connection being established by forming a
`Security Association (SA) using IPSec protocols, and the request
`message and/or a reply message being encrypted and/or
`authenticated by using the same SA already established.
`Ex. 1001, 10:48–11:8.
`3. The method of claim 1 wherein the method further comprises
`the security gateway sending back a reply message to the mobile
`terminal at the second address to confirm the address change.
`Id. at 11:12–15.
`E. Instituted Grounds of Unpatentability
`We instituted trial based on the following grounds of unpatentability,
`
`which are all the grounds of unpatentability raised in the Petition:
`
`References
`Basis3 Challenged Claim(s)
`1.
`Ishiyama,4 Murakawa5
`§ 103(a) 1, 4, 5, 7
`2.
`Ishiyama, Murakawa,
`§ 103(a) 2, 3
`Ahonen6
`Ishiyama, Murakawa,
`Forslöw7
`
`§ 103(a) 6
`
`3.
`
`
`3 The Leahy-Smith America Invents Act (“AIA”) included revisions to
`35 U.S.C. § 103 that became effective on March 16, 2013. Because the ’810
`patent issued from an application filed before March 16, 2013, we apply the
`pre-AIA version of the statutory basis for unpatentability.
`4 US Patent No. 6,904,466 B1 (issued June 7, 2005) (Ex. 1004).
`5 US Patent No. 7,028,337 B2 (issued Apr. 11, 2006) (Ex. 1005).
`6 US Patent No. 6,976,177 B2 (issued Dec. 13, 2005) (Ex. 1006).
`7 US Patent No. 6,954,790 B2 (issued Oct. 11, 2005) (Ex. 1007).
`
`8
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`Pet. 4, 12–69. Petitioner submits in support of its arguments the Declaration
`of David Goldschlag, Ph.D. (Ex. 1002) and an additional Declaration of
`David Goldschlag, Ph.D. (Ex. 1020). Patent Owner submits in support of its
`arguments the Declaration of Professor George N. Rouskas, Ph.D.
`(Ex. 2003).
`F. Prior Final Written Decision
`In our prior Final Written Decision, we disagreed with Petitioner that
`
`Ishiyama taught a “request message . . . being encrypted,” as recited in
`independent claim 1. FWD 16–23; Ex. 1001, 11:6. In particular, we found
`that, as Petitioner admitted, “in Ishiyama the request message’s outer
`packet’s source address is unencrypted,” and “Ishiyama only teaches that the
`encapsulated packet (payload) is encrypted.” FWD 20 (citing Ex. 1004,
`7:56–60; Tr. 27:9–16). We also found that “the outer packet’s source
`address is a part of the request message in Ishiyama.” Id. (citing Ex. 1004,
`Fig. 4, 8:59–65). Thus, we found that these teachings were contrary to “the
`request message . . . being encrypted” because “the plain words of the claim
`state that the message is encrypted—not that a portion of the message is
`encrypted.” Id. In other words, we found that “claim 1 requires that the
`request message (not just a portion thereof) is encrypted, and Petitioner
`fail[ed] to show that Ishiyama’s request message (which includes the
`unencrypted outer packet’s source address) meets this requirement.” Id. at
`21 (citations omitted).
`
`Accordingly, we found that Petitioner did not demonstrate by a
`preponderance of the evidence that claim 1 would have been obvious in
`view of Ishiyama and Murakawa, which is the sole ground challenging claim
`1. FWD 8, 23. Furthermore, we found that the Petition does not present any
`
`9
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`information with respect to claims 2–6—which depend directly or indirectly
`from claim 1—that addresses this deficiency in Ishiyama. Id. at 23, 53–54.
`Thus, we found that Petitioner did not demonstrate by a preponderance of
`the evidence that claims 2–6 would have been obvious in view of the
`asserted unpatentability grounds. Id.
`G. The Federal Circuit’s Decision
`The Federal Circuit held that we construed an encrypted request
`
`message, and erred in doing so. Apple, 2022 WL 4103286, at *4–6. In
`particular, the Federal Circuit held that we “performed a claim construction”
`when we stated that “the plain words of the claim state that the message is
`encrypted—not that a portion of the message is encrypted,” and that “claim
`1 requires that the request message (not just a portion thereof) is encrypted.”
`Id. at *4 (citing FWD 20–21). The Federal Circuit stated that “[i]n doing so,
`the Board ‘establish[ed] the scope and boundaries of the subject matter that
`is patented.’” Id. (citations omitted).
`
`The Federal Circuit, inter alia, addressed the specification of the ’810
`patent and stated that “the specification[] contemplate[s] that ‘encrypted’
`messages can be sent using outer packets with certain unencrypted
`addressing information, contrary to the Board’s construction.” Id. at *6; see
`also id. at *5 (addressing the specification) (citations omitted). The Federal
`Circuit thus held “that the Board adopted an erroneous claim construction of
`‘request message and/or a reply message being encrypted’ within claim 1 of
`the ’810 patent . . . that excludes ‘encrypted’ messages because those
`messages are sent using packets with certain unencrypted addressing
`information.” Id. at *6. The Federal Circuit stated that the ’810 patent
`“contemplate[s] that a message can still be considered ‘encrypted’ if its
`
`10
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`packet has unencrypted ‘outer IP header’ information.” Id. The Federal
`Circuit vacated the portions of our prior Final Written Decision “that rel[ied]
`on that erroneous claim construction and remand[ed] for further
`proceedings.” Id.
`
`In addition, the Federal Circuit noted Patent Owner’s arguments that
`the Federal Circuit could have “nevertheless affirm[ed] the Board’s
`determination as to claims 4–6 of the ’810 patent because [Petitioner] relied
`on Ahonen to meet the intervening limitations in claim 3 and did not include
`Ahonen in its grounds challenging those claims.” Id. at *6 n.4 (citation
`omitted). The Federal Circuit responded to these arguments by stating the
`following:
`The Board did not reach this issue because it found [Petitioner]
`did not demonstrate claim 1 to be unpatentable. [FWD 23, 54].
`Because we vacate the portions of the Board’s decision[] based
`on its construction of an “encrypted” request or reply message in
`claim 1, the Board should decide whether to consider this issue
`on remand.
`
`Id.
`
`LEVEL OF ORDINARY SKILL IN THE ART
`II.
`To determine whether an invention would have been obvious at the
`time it was made, we consider the level of ordinary skill in the pertinent art
`at the time of the invention. Graham v. John Deere Co., 383 U.S. 1,
`17 (1966). In assessing the level of ordinary skill in the art, various factors
`may be considered, including the “type of problems encountered in the art;
`prior art solutions to those problems; rapidity with which innovations are
`made; sophistication of the technology; and educational level of active
`workers in the field.” In re GPAC, Inc., 57 F.3d 1573, 1579 (Fed. Cir. 1995)
`
`11
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`(citing Custom Accessories, Inc. v. Jeffrey-Allan Indus., Inc., 807 F.2d 955,
`962 (Fed. Cir. 1986)). “[O]ne or more factors may predominate.” Id.
`In our Decision on Institution, we adopted Petitioner’s proposed
`definition for one having ordinary skill in the art at the time of the invention
`of the ’810 patent as one who “would have had a B.S. degree in Computer
`Engineering, Electrical Engineering, or an equivalent field, as well as at least
`3–5 years of academic or industry experience in the Internet security
`industry.” Pet. 12 (citing Ex. 1002 ¶¶ 20–21). We maintained this
`definition in our prior Final Written Decision. FWD 9. Patent Owner did
`not dispute our adoption of Petitioner’s definition, nor otherwise address the
`level of ordinary skill at the time of the invention of the ’810 patent. See
`generally PO Resp.
`Petitioner’s definition of the level of skill in the art is consistent with
`the ’810 patent and the asserted prior art, and we maintain Petitioner’s
`definition for purposes of this Final Written Decision. See Okajima v.
`Bourdeau, 261 F.3d 1350, 1355 (Fed. Cir. 2001); GPAC, 57 F.3d at 1579; In
`re Oelrich, 579 F.2d 86, 91 (CCPA 1978). We apply Petitioner’s definition
`in our analysis below.
`III. CLAIM CONSTRUCTION
`Because the Petition was filed after November 13, 2018, we construe
`the challenged claims by applying “the standard used in federal courts, in
`other words, the claim construction standard that would be used to construe
`the claim in a civil action under 35 U.S.C. [§] 282(b), which is articulated in
`Phillips [v. AWH Corp., 415 F.3d 1303 (Fed. Cir. 2005) (en banc)].” See
`Changes to the Claim Construction Standard for Interpreting Claims in Trial
`Proceedings Before the Patent Trial and Appeal Board, 83 Fed. Reg. 51,340,
`
`12
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`51,340, 51,358, 51,343–44 (Oct. 11, 2018) (amending 37 C.F.R. § 42.100(b)
`effective November 13, 2018) (now codified at 37 C.F.R. § 42.100(b)
`(2019)). Under Phillips, the words of a claim are generally given their
`“ordinary and customary meaning,” which is the meaning they would have
`had to a person of ordinary skill in the art at the time of the invention, in
`light of the specification and prosecution history. See Phillips, 415 F.3d at
`1312–13.
`Petitioner does not submit any terms for construction. Pet. 12
`(arguing that “[a]ll claim terms of the ’810 patent should receive their
`ordinary and customary meaning”). Patent Owner submits the term
`“security gateway” for construction, and argues that its meaning is in
`dispute. PO Resp. 11–24. Our below analysis of Petitioner’s unpatentability
`arguments for claims 4–6, however, does not implicate this claim term. See
`supra Section V.C. Thus, we do not provide an express construction for
`“security gateway.” See, e.g., Nidec Motor Corp. v. Zhongshan Broad
`Ocean Motor Co., 868 F.3d 1013, 1017 (Fed. Cir. 2017) (quoting Vivid
`Techs., Inc. v. Am. Sci. & Eng’g, Inc., 200 F.3d 795, 803 (Fed. Cir. 1999))
`(“[W]e need only construe terms ‘that are in controversy, and only to the
`extent necessary to resolve the controversy.’”).
`In addition, we note that the Federal Circuit corrected our construction
`of “the request message and/or a reply message being encrypted,” as recited
`in claim 1 of the ’810 patent. Apple, 2022 WL 4103286, at *4–6; see supra
`Section I.G. This limitation, however, is not implicated in our analysis of
`the parties’ arguments concerning unpatentability of claims 4–6—the claims
`on remand that remain after Patent Owner’s statutory disclaimer.
`
`13
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`
`IV. PRINCIPLES OF LAW
`A claim is unpatentable under 35 U.S.C. § 103(a) if the differences
`between the claimed subject matter and the prior art are such that the subject
`matter, as a whole, would have been obvious at the time of the invention to a
`person having ordinary skill in the art. KSR Int’l Co. v. Teleflex, Inc., 550
`U.S. 398, 406 (2007). The question of obviousness is resolved on the basis
`of underlying factual determinations, including (1) the scope and content of
`the prior art; (2) any differences between the claimed subject matter and the
`prior art; (3) the level of ordinary skill in the art; and (4) objective evidence
`of non-obviousness, if present.8 See Graham, 383 U.S. at 17–18. When
`evaluating a claim for obviousness, we also must “determine whether there
`was an apparent reason to combine the known elements in the fashion
`claimed by the patent at issue.” KSR, 550 U.S. at 418 (citing In re Kahn,
`441 F.3d 977, 988 (Fed. Cir. 2006)).
`V. CHALLENGED CLAIMS 4–6
`Petitioner argues that the combination of Ishiyama and Murakawa
`renders claims 4 and 5 obvious. Pet. 54–59; Pet. Reply 22–25. In addition,
`Petitioner argues that the combination of Ishiyama, Murakawa, and Forslöw
`renders claim 6 obvious. Pet. 66–69; Pet. Reply 22–25. Patent Owner
`disputes that these combinations render these claims obvious, respectively.
`PO Resp. 63–64, 73; PO Sur-reply 24–25.
`For the reasons that we discuss below, we determine that Petitioner
`does not show by a preponderance of the evidence that claims 4–6 would
`have been obvious. We first provide a summary of Ishiyama and
`
`
`8 Patent Owner does not present arguments or evidence of such objective
`evidence of non-obviousness in its Response. See generally PO Resp.
`
`14
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`Murakawa, as their teachings are referenced in our analysis below, followed
`by our analysis.
`A. Summary of Ishiyama
`Ishiyama relates to improving a mobile computer’s “capab[ility] of
`
`carrying out communications while moving among a plurality of inter-
`connected networks.” Ex. 1004, 1:9–11. In furtherance of this mobility,
`Ishiyama discloses having the mobile computer notify its correspondent host
`(i.e., the host at the other end of a communication) of its new address when
`the mobile computer moves networks. E.g., id. at 3:43–67, 6:13–18,
`15:37–16:10. The mobile computer makes this notification by changing the
`source address of an outer packet of an encapsulated packet to the mobile
`computer’s new address before sending the packet to the correspondent host.
`Id. When the correspondent host receives the packet from the mobile
`computer, the correspondent host detects the address change and updates its
`stored information to reflect the new address for the mobile computer. E.g.,
`id. at 3:9–14.
`Figure 4, shown below, is a schematic diagram illustrating a mobile
`computer changing locations in an exemplary configuration of a mobile
`communication system, in accordance with an embodiment of Ishiyama’s
`invention. Id. at 5:5–7, 5:11–13.
`
`15
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`
`
`Figure 4 “shows an exemplary situation in which a packet is
`
`transferred from mobile computer 2 to . . . correspondent host 3 using [an]
`IPSEC tunnel.” Id. at 8:33–35. Initially, mobile computer 2 communicates
`with correspondent host 3 via an IPSec tunnel, with mobile computer 2’s
`address (CoA1) indicating its endpoint of the tunnel. Id. at 8:43–49. In
`other words, “mobile computer 2 transmits an encapsulated packet in which
`the outer packet has the source address=‘CoA1’ and the destination
`address=‘CN.’” Id. at 8:50–54. As shown, when mobile computer 2 moves,
`its address changes from CoA1 to CoA2. Id. at 8:55–58, Fig. 4 (showing
`that mobile computer 2 moves networks). To convey this change, mobile
`computer 2 changes the source address of the outer packet to CoA2 and
`transmits the packet to correspondent host 3 via the IPSec tunnel. Id. at
`8:59–63, Fig. 4. Correspondent host 3 detects this change in mobile
`computer 2’s address, and replaces the CoA1 address with CoA2 in its
`database for the IPSec tunnel. Id. at 8:66–9:4; see also id. at Figs. 9B, 9D
`(showing the update of the address in correspondent host 3’s SA database),
`
`16
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`12:51–59. Ishiyama discloses that the other SA information “remain[s]
`unchanged, so that there is no need to re-negotiate keys for IPS[ec]
`encryption and authentication.” Id. at 9:5–10.
`B. Summary of Murakawa
`Murakawa relates to allowing a PC outside a LAN to be virtually
`
`regarded as a PC on the LAN and communicate with a terminal on the LAN.
`Ex. 1005, 1:16–24, 3:62–65. Specifically, Murakawa discloses allowing an
`outside terminal to communicate (via a WAN, a security gateway, and a
`LAN) with a terminal on the LAN. Id. at 1:11–24, 3:61–4:16.
`
`Petitioner’s annotated version of Murakawa’s Figure 5, which
`illustrates a “prior art typical network system,” id. at 4:32–33, is shown
`below.
`
`
`Murakawa’s Figure 5 above shows a “prior art typical network
`
`system” and is further annotated by Petitioner to add labels for a mobile
`terminal, security gateway, and other terminals. Pet. 28. According to
`Murakawa, Figure 5 “is a block diagram of a typical network system
`
`17
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`including a WAN.” Ex. 1005, 1:51–53. As shown in Figure 5, the network
`system includes “PC 101 [(labeled by Petitioner as ‘Mobile Terminal’)],
`which is located outside . . . LAN [104 and] establish[es] a dialup
`connection to the provider, WAN 102, and security gateway 103 [(labeled
`by Petitioner as ‘Security Gateway’)] that connects WAN 102 and LAN
`104.” Id. at 1:54–58. In addition, “LAN 104[,] being subjected to security
`gateway 103[,] includes . . . client PCs 106, 107” (labeled by Petitioner as
`“Other Terminals”). Id. at 1:59–60. Also shown is virtual private network
`(“VPN”) 108, which is established between PC 101 and security gateway
`103 to perform IPSec communication. Id. at 1:61–63. Murakawa discloses
`that this network system ensures safe communications between PC 101 and
`the terminals on LAN 104. Id. at 2:1–4.
`C. Our Analysis
`Claims 4–6 depend directly from claim 3. Ex. 1001, 11:16–24. Claim
`
`3 recites “[t]he method of claim 1 wherein the method further comprises the
`security gateway sending back a reply message to the mobile terminal at the
`second address to confirm the address change.” Ex. 1001, 11:11–14
`(emphasis added). The Petition does not address claim 3’s reply message in
`its showings for claims 4–6. See Pet. 54–59, 66–69. Nor does the Petition
`allege that (i) the combination of Ishiyama and Murakawa, or (ii) the
`combination of Ishiyama, Murakawa, and Forslöw, renders claim 3
`unpatentable. Id. at 4. Instead, the Petition challenges claim 3 based on
`another ground (Ishiyama, Murakawa, and Ahonen), and relies on Ahonen to
`teach claim 3’s reply message. Id. at 59–66. The Petition does not contend,
`however, that claims 4–6 are obvious over any combination that includes
`Ahonen. Id. at 4.
`
`18
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`
`We already addressed the above scenario in IPR2021-00820, where
`Petitioner relied on Ahonen to teach the same limitation as recited in claim
`3, but failed to include Ahonen in another ground challenging dependent
`claims that incorporated this limitation. -820 case, Paper 37 (Final Written
`Decision) at 49–55. We determined that Petitioner did not meet its burden
`to show unpatentability for this scenario. Id. The Federal Circuit upheld
`this determination from the -820 case:
`[W]e agree the Board properly declined to consider Ahonen in
`Grounds 1 and 3 of the [-820] IPR. Apple only raised Ahonen in
`Ground 2, which challenged claims 3 and 5 of the ’581 patent.
`Even though claims 6–8 depend from claim 5, Apple did not
`include Ahonen in Grounds 1 and 3 challenging those claims, nor
`did it address or reference Ahonen in its substantive analysis.
`The Board did not err by declining to consider arguments that
`Apple did not make.
`Apple, 2022 WL 4103286, at *7 (citations omitted); see also id. at *8 (“We
`affirm the Board’s patentability determination that Apple failed to meet its
`burden as to claims 6–8 of the ’581 patent.”).
`
`In addition, the Federal Circuit noted that we “should decide whether
`to consider this issue on remand” for claims 4–6 in this case. Id. at *6–8 &
`*6 n.4; see also id. *6 n.4 (noting that “[t]he Board did not reach this issue
`because it found [Petitioner] did not demonstrate claim 1 to be
`unpatentable”) (citation omitted).
`
`We now consider this issue as it is dispositive of whether Petitioner
`shows that claims 4–6 of the ’810 patent are unpatentable. The parties’
`arguments here are substantively the same as in the -820 case for this
`scenario. Compare Pet. 54–59, 66–69; Pet. Reply 22–25; PO Resp. 63–64,
`73; and PO Sur-reply 24–25, with -820 case, Paper 2, 50–54; Paper 23, 63–
`64; Paper 26, 22–26; and Paper 29, 25–26. And our reasoning that
`
`19
`
`

`

`IPR2019-00819
`Patent 7,620,810 B2
`Petitioner does not show by a preponderance of the evidence that claims 4–6
`would have been obvious is the same reasoning that we provided in the -820
`case for this scenario. Compare infra, with -820 case, Paper 37, 49–55. We
`address the parties’ arguments below, mirroring how we did so for the -820
`case.
` We agree with Patent Owner that “Petitioner’s assertion that claims
`4–5 are unpatentable under [Ishiyama and Murakawa] . . . fails because it
`does not account for the limitations of intervening claim 3.” PO Resp. 64
`(citing Pet. 54–59). We likewise agree with Patent Owner that Petitioner’s
`Ishiyama, Murakawa, and Forslöw asserted ground “fails to address that
`claim 6 also depends on claim 3.” Id. at 73 (citing Pet. 66–69). Moreover,
`we disagree with Petitioner that Patent Owner makes a “form-over-substance
`argument” and “improperly tak[es] too stringent of a reading of the
`Petition.” Pet. Reply 22–23.
`
`The Petition guides the proceeding. See Koninklijke Philips N.V. v.
`Google LLC, 948 F.3d 1330, 1335–36 (Fed. Cir. 2020). The Federal Circuit
`explained that “Congress chose to structure a process in which it’s the
`petitioner . . . who gets to define the contours of the proceeding,” and that
`“the statute envisions that a petitioner will seek an inter partes review of a
`particular kind—one guided by a petition describing ‘each claim challenged’
`and ‘the grounds on which the challenge to each claim is based.’” Id. at
`1335 (quoting SAS Inst. Inc. v. Iancu, 138 S. Ct. 1348, 1355 (2018) (quoting
`35 U.S.C. § 312(a)(3))) (e

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket