throbber

`
`
`
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`APPLE INC.,
`Petitioner
`
`v.
`
`MPH TECHNOLOGIES OY,
`Patent Owner
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Mail Stop “PATENT BOARD”
`Patent Trial and Appeal Board
`U.S. Patent & Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`
`
`
`
`
`
`
`
`Case IPR2019-00820
`Patent No. 7,937,581
`
`
`
`
`
`DECLARATION OF DAVID GOLDSCHLAG, PH.D., IN SUPPORT OF
`PETITIONER’S REPLY TO THE PATENT OWNER RESPONSE
`
`
`
`
`
`Apple EX1022
`Apple v. MPH
`IPR2019-00820
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`
`TABLE OF CONTENTS
`Introduction ...................................................................................................... 1
`
`Claim Construction .......................................................................................... 2
`
`I.
`
`II.
`
`III. The Combination of Ishiyama and Murakawa Discloses the Claimed
`“Security Gateway.” ........................................................................................ 6
`
`A.
`
`B.
`
`It would have been obvious to a POSA from Ishiyama’s use of
`IPSec for its correspondent host to be a security gateway because
`IPSec only has a finite number of endpoint configurations. ...................... 7
`
`Ishiyama’s use of tunnel mode suggests that its correspondent host
`can be a security gateway. ........................................................................ 12
`
`C. A POSITA Would Have Sought Out References Such as
`Murakawa for its Teaching of a Tunnel Mode Implementation. ............. 15
`
`IV. Nothing in the Prior Art Precludes Ishiyama’s “Correspondent Host”
`from Operating as a “Security Gateway.” ..................................................... 19
`
`V.
`
`VI.
`
`The Combination of Ishiyama and Murakawa Teaches the “Other
`Terminal.” ...................................................................................................... 24
`
`Ishiyama Teaches the Mobile Terminal Transmitting a Message While
`at a Second Address to Change the Definition of a Security
`Association. ................................................................................................... 30
`
`VII. The Combination of Ishiyama and Murakawa Teaches the
`“Request”/“Reply” Messages Being Encrypted. ........................................... 33
`
`VIII. The Combination of Ishiyama, Murakawa, and Ahonen Renders
`Claims 3 and 5 Obvious. ................................................................................ 34
`
`IX. Dependent Claim 7 is Unpatentable. ............................................................. 40
`
`X.
`
`
`
`
`Conclusion ..................................................................................................... 42
`
`- i -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`
`I, David Goldschlag, Ph.D., hereby declare as follows:
`I.
`
`Introduction
`
`1.
`
`
`I am the same David Goldschlag, Ph.D. who submitted a prior
`
`declaration (EX1002) in this matter, which I understand was filed on March 27,
`
`2019. I have been retained on behalf of Apple Inc. (“Petitioner”) for the above-
`
`captioned inter partes review proceeding.
`
`
`
` My background and qualifications were provided in paragraphs 6-12 2.
`
`of my prior declaration, and my CV was provided as EX1016. My statements in
`
`paragraphs 2-5 of my prior declaration regarding my review of U.S. Patent No.
`
`7,937,581 (“the ’581 patent”) and related materials remain unchanged, as do my
`
`understandings of the relevant legal principles stated in paragraphs 13-21.
`
`3.
`
`
`Since my prior declaration, I have reviewed and considered the
`
`following additional materials:
`
`Paper
`
`Description
`
`10
`
`Decision Granting Institution, IPR2019-00820 (“DI”)
`
`23
`
`Exhibit
`
`1021
`
`2009
`
`
`
`Replacement Patent Owner’s Response
`
`Description
`Deposition Transcript of George N. Rouskas, Ph.D., dated
`March 20, 2020.
`
`Declaration of Professor George N. Rouskas, Ph.D.
`
`- 1 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`I have also considered all other materials cited herein. My work on
`
`4.
`
`
`this case is being billed at my normal hourly rate, with reimbursement for actual
`
`expenses. My compensation is not contingent upon the outcome of this inter partes
`
`review proceeding.
`
`II. Claim Construction
`5.
`Dr. Rouskas contends that the term “security gateway” should be
`
`
`construed as a “gateway that provides additional security functionality, such as
`
`firewall functionality.” EX2009, Rouskas Decl., ¶64. Dr. Rouskas further contends
`
`that a “gateway” is “an intermediary system with two or more communication
`
`interfaces that interconnects different networks and can forward packets it receives
`
`from one network on to another network.” Id. I disagree that the term “security
`
`gateway” needs additional construction, and I further disagree with the definition
`
`provided by Dr. Rouskas.
`
`6.
`
`
`Dr. Rouskas appears to propose this construction in an attempt to
`
`distinguish a “security gateway” from a “host.” But as admitted by Dr. Rouskas
`
`and well-known in the art, “[p]ersons of ordinary skill in the art [POSITA]
`
`recognize that devices can perform multiple functions.” Id., ¶69. Dr. Rouskas
`
`further acknowledges that “the same device that otherwise performs a security
`
`gateway function may in some cases be the end destination for traffic…” Id., ¶70.
`
`- 2 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`This understanding is consistent with my own and indicates the artificial
`
`distinction between the words “security gateway” and “host.”
`
`7.
`
`
`I agree with Dr. Rouskas, as he admitted during his deposition, that
`
`the ’810 patent (and therefore the ’581 patent) uses the term “security gateway” in
`
`its common form as well-understood in the art and as described in RFC 2401—the
`
`IPSec specification. EX1021, Rouskas Depo., 165:17-166:5; 168:9-20. There is
`
`thus no dispute that the ’581 patent uses the term “security gateway” in its well-
`
`known and conventional manner. Accordingly, in view of the ’581 patent, a
`
`POSITA would not have needed to construe the term “security gateway” because
`
`the ’581 patent does not use the term in any atypical or special manner.
`
`8.
`
`
`The ’581 patent itself also supports this interpretation. For example,
`
`Dr. Rouskas quotes the following passage from the ’581 patent, which I have
`
`further extended and emphasized below:
`
`Typically, transport mode is used for end-to-end communication
`between two hosts…[T]unnel mode may also be used for end-to-end
`communication between two hosts. Tunnel mode is often used when
`one or both ends of a SA is a security gateway, such as a firewall or
`a router that implements IPSec….The IPSec tunnel mode operates
`e.g. in such a way that if a host on a network generates an IP packet
`with a destination address of another host on another network, the
`packet is routed from the originating host to a security gateway
`(SGW), firewall or other secure router at the boundary of the first
`
`- 3 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`network. The SGW or the like filters all outgoing packets to determine
`the need for IPSec processing. If this packet from the first host to
`another host requires IPSec, the firewall performs IPSec processing
`and encapsulates the packet in an outer IP header….This packet is
`now routed to the other hosts firewall with intermediate routers
`examining only the outer IP header. At the other host firewall, the
`outer IP header is stripped off and the inner packet is delivered to the
`other host.
`
`EX1001, ’581 patent, 3:14-62.
`
`9.
`
`
`A POSITA viewing this description, however, would have understood
`
`that this passage refers to a conventional and well-known security gateway. This
`
`passage does not suggest any special definition or requirements. This passage does
`
`not define or limit the term “security gateway.” In particular, this passage does not
`
`require that the security gateway be an “intermediate system” or that it have “two
`
`or more communication interfaces” or that it “interconnects different networks and
`
`can forward packets.”
`
`
`
` Rather, this passage describes the operation of IPSec in tunnel mode. 10.
`
`A POSITA would have viewed this language as permissive and simply explains
`
`that security gateways “implement IPSec” in a conventional manner. The security
`
`gateway described in the ’581 patent is not required to have firewall functionality
`
`because this passage states that the security can also be a “router.” See id.
`
`- 4 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`
`
` The other portions of the ’581 patent also do not limit the term in this 11.
`
`manner. For example, columns 8 and 9 as well as Figure 1 and Figure 2 of the ’581
`
`patent do not support such a restrictive construction. The words “interface” or
`
`“intermediate system,” in particular, do not appear in these portions. As the ’581
`
`patent explains, Figures 1 and 2 are simply “example[s]” and therefore do not add
`
`explicit requirements to the term “security gateway.” See id., 8:37-40. The ’581
`
`patent also uses permissive language such as “[c]omputer 2 might be a security
`
`gateway” and “the security gateway can be a common security gateway…whereby
`
`there are several computers in the LAN protected by computer 2.” Id., 8:55-60. In
`
`this manner, the security gateway in the ’581 patent is described permissively.
`
`
`
` For example, a POSITA would have understood that computer 2 12.
`
`might be a security gateway or might not. A POSITA would have also understood
`
`that several computers might have been connected to “computer 2” or not. The
`
`’581 patent does not explicitly require a specific configuration in view of this
`
`language. In this manner, the ’581 patent again here does not describe any
`
`requirements or a special definition for “security gateway,” The ’581 patent instead
`
`describes an example that the “security gateway can be a common security
`
`gateway for e.g. a company LAN.” See id., 8:51-60.
`
`
`
` The extrinsic references and prior art documents cited by Dr. Rouskas 13.
`
`also do not support the construction. See EX2009, ¶¶71-90. Rather than supporting
`
`- 5 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`a definition for “security gateway,” Dr. Rouskas cites to these references
`
`attempting to distinguish a “security gateway” from a “host.” This distinction,
`
`however, does not limit the term “security gateway” or change the admission from
`
`Dr. Rouskas that, like the ’810 patent, the ’581 patent uses the term “security
`
`gateway” in a conventional manner—such as under RFC 2401. EX1021, 165:17-
`
`166:5; 168:9-20. For example, RFC 2401 simply states that “[t]he term ‘security
`
`gateway’ is used throughout the IPsec documents to refer to an intermediate
`
`system that implements IPsec protocols. For example, a router or a firewall
`
`implementing IPsec is a security gateway.” EX1011, RFC 2401, 6. The ’581 patent
`
`does not provide any special definition that differs from the well-known security
`
`gateway recited in RFC 2401, and therefore, a construction is not needed.
`
`III. The Combination of Ishiyama and Murakawa Discloses the Claimed
`“Security Gateway.”
`
`14.
`
`
`I understand that Dr. Rouskas contends that the combination of
`
`Ishiyama and Murakawa does not teach the claimed “security gateway” because
`
`Ishiyama uses the term “correspondent host” and this device cannot be the claimed
`
`“security gateway.” See EX2009, ¶¶110-38. I disagree.
`
`
`
` The combination of Ishiyama and Murakawa teaches the claimed 15.
`
`security gateway for multiple reasons. First, Ishiyama’s use of the IPSec protocol
`
`would have made it obvious to a POSITA to use a “security gateway” in view of
`
`Ishiyama’s disclosure of a “correspondent host.” Second, Ishiyama’s disclosure of
`
`- 6 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`IPSec tunnel mode would have even further made it obvious to a POSITA to
`
`modify Ishiyama’s “correspondent host” to be a “security gateway” because tunnel
`
`mode is most often used with security gateways. Third, if a POSITA did not
`
`already know how to implement IPSec tunnel mode, he would have sought out
`
`references such as Murakawa, which teach implementing tunnel mode in a
`
`“security gateway.”
`
`A.
`
`It would have been obvious to a POSA from Ishiyama’s use of
`IPSec for its correspondent host to be a security gateway because
`IPSec only has a finite number of endpoint configurations.
`
`
`
` A POSITA would have understood that IPSec connections only have 16.
`
`three combinations of network devices and only two types of endpoints: a host or a
`
`security gateway. See EX1008, Frankel, FIGs. 1.1(a)-1.1(c); EX1011, 6.
`
`Specifically, RFC 2401 explains that “IPsec can be used to protect one or more
`
`‘paths’ between a pair of hosts, between a pair of security gateways, or between a
`
`security gateway and a host.” EX1011, 6. As explained in my previous declaration,
`
`Frankel depicts these three common scenarios and further illustrates the endpoints
`
`being “host-to-host,” “gateway-to-gateway,” and “host-to-gateway.” EX1002,
`
`Goldschlag Decl., ¶34; EX1008, 3-4.
`
`- 7 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`
`EX1008, FIGs. 1.1(a)-(c).
`
`
`
`
`
` As seen in Figure 1.1(a), “two hosts [are] communicating with each 17.
`
`other.” EX1008, 3. Figure 1.1(b) depicts a “small-scale VPN: two separate
`
`networks, each protected from the outside by a security gateway that screens all
`
`communications to and from its associated network.” Id. Most relevant to the ’581
`
`patent is Figure 1.1(c). In this figure, “a single host [is] communicating with
`
`another host that resides on a network protected by a security gateway. This
`
`- 8 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`commonly occurs when an employee dials into a business network from home or
`
`when on a business trip.” Id.
`
`
`
` As seen from this description as well as from the IPSec specification 18.
`
`(RFC 2401), there are only two choices of endpoints for an IPSec connection: a
`
`host or a security gateway. I understand that Dr. Rouskas does not dispute this
`
`understanding. See EX2009, ¶¶128-31.
`
`
`
` Turning to Ishiyama, in my opinion, a POSITA would have found it 19.
`
`obvious to apply Ishiyama’s teachings to situations where its “correspondent host”
`
`would indeed be a “security gateway.” As previously explained, RFC 2401 and
`
`Frankel all indicate that there are only two choices of endpoints for IPSec
`
`connections: a host or a security gateway. In this respect, using either endpoint
`
`would only depend on the context in which a POSITA was working and would
`
`have been a well-known design choice.
`
`
`
` For example, a common context for using IPSec is a Virtual Private 20.
`
`Network (VPN). RFC 2401 describes this well-known example and provides
`
`context for using IPSec. In particular, RFC 2401 explains that “a company could
`
`create a Virtual Private Network (VPN) using IPsec in security gateways at several
`
`sites… [T]he security gateway might selectively protect traffic to and from other
`
`sites within the organization… A similar argument might apply to use of IPsec
`
`entirely within an organization for a small number of hosts and/or gateways.”
`
`- 9 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`EX1011, 27. In this manner, a POSITA would have known that implementing
`
`IPSec in hosts and gateways would have been merely a design choice depending
`
`on the context.
`
`21.
`
`
`Indeed, both RFC 2401 and the ’581 patent explain that a common
`
`use case for IPSec is in the context of Virtual Private Networks (VPNs). See id.;
`
`EX1001, 1:62-66. In the context of VPNs, a POSITA would have implemented
`
`IPSec functionality in security gateways as explained in RFC 2401. See EX1011,
`
`27. Specifically, a POSITA would have implemented IPSec functionality in a
`
`security gateway to provide protection to a company network.
`
`22.
`
`
`In this context, a POSITA viewing Ishiyama and seeking to
`
`implement Ishiyama’s teachings in the VPN context would have already known
`
`that a security gateway would have been needed. I understand that Dr. Rouskas
`
`explained that at the time of the ’581 patent, using IPSec with VPNs was
`
`ubiquitous. EX1021, 33:13-15. I agree with this assessment. Even when forming
`
`the IPSec standard as explained in RFC 2401, the VPN context was a common use
`
`case. See EX1011, 27. I also understand that Dr. Rouskas explained that “typically,
`
`yes, one end of the VPN is a security gateway.” EX1021, 101:1-4. I agree with this
`
`assessment as well, but would further note that using a VPN almost always uses a
`
`security gateway.
`
`- 10 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`
`
` Again, referring to RFC 2401, the IPSec standard illustrates a 23.
`
`connection between two “simple virtual private networks.” EX1011, 25.
`
`EX1011, 25.
`
`
`
`
`
` Here, “SG1” is a security gateway that provides VPN functionality for 24.
`
`the left-most “Local Intranet” while “SG2” is a security gateway that provides
`
`VPN functionality for the right-most “Local Intranet.” As seen from RFC 2401,
`
`using a VPN to protect a local intranet nearly always uses a security gateway.
`
`
`
` Accordingly, if a POSITA were implementing Ishiyama in the well-25.
`
`known IPSec VPN context, the POSITA would have understood to use a security
`
`gateway. The fact that there are only two types of endpoints in the IPSec and VPN
`
`contexts further illustrates that a POSITA would have found it obvious to
`
`implement Ishiyama’s secure connection to be between a host and a security
`
`gateway. As Frankel explains, a VPN and IPsec connection “commonly occurs
`
`when an employee dials into a business network from home or when on a business
`
`trip.” EX1008, 3. A POSITA implementing Ishiyama in this well-known context
`
`- 11 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`would have thus known and found it obvious to implement Ishiyama’s teachings in
`
`a security gateway.
`
`B.
`
`Ishiyama’s use of tunnel mode suggests that its correspondent
`host can be a security gateway.
`
`26.
`
`
`Ishiyama’s use of tunnel mode would have further suggested the use
`
`of a security gateway. As explained in my previous declaration even the ’581
`
`patent recognized that, “[t]unnel mode is often used when one or both ends of a
`
`SA is a security gateway, such as a firewall or a router that implements IPSec.”
`
`EX1001, 3:22-24 (emphasis added); see also id., 2:8-12, 5:54-57, citing RFC2401:
`
`A tunnel mode SA is essentially an SA applied to an IP tunnel.
`Whenever either end of a security association is a security gateway,
`the SA MUST be tunnel mode. Thus an SA between two security
`gateways is always a tunnel mode SA, as is an SA between a host and
`a security gateway.
`EX1011, 9; EX1002, ¶33.
`
`
`
` Dr. Rouskas also concedes that using tunnel mode with a security 27.
`
`gateway is the most common use case and is most often used when one or both
`
`endpoints of an IPSec connection is a security gateway. EX1021, 109:22-110:10;
`
`113:7-9. I also understand that during his entire career, Dr. Rouskas has never used
`
`tunnel mode between two hosts:
`
`Q: So in all the instances where you personally have used IPSec, you
`have only ever used IPSec tunnel mode with security gateway being
`one of the endpoints. Right?
`
`- 12 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`A: So I have been using IPSec for, you know, more than 20 years. But
`to the best of my recollection that is right, I have only used it when
`one of endpoints is security gateway.
`
`Q: And you have never used IPSec tunnel mode between two hosts, at
`least personally?
`
`A: Personally, I have not used tunnel mode.
`
`EX1021, 111:21-112:9.
`
`
`
` As stated in my previous declaration, I agree that using tunnel mode 28.
`
`with one endpoint being a security gateway is the most often use case. See
`
`EX1002, ¶¶33-36. The ’581 patent confirms this understanding in stating that
`
`“[t]unnel mode is often used when one or both ends of a SA is a security gateway.”
`
`EX1001, 3:22-24. RFC 2401 also states that “[w]henever either end of a security
`
`association is a security gateway, the SA MUST be tunnel mode.” EX1011, 9. In
`
`this manner, while tunnel mode may be used between hosts, a POSITA would have
`
`known that the most common scenario, and often times required scenario, is that
`
`tunnel mode is used with a security gateway.
`
`
`
` Turning to Ishiyama, Ishiyama describes the use of tunnel mode as a 29.
`
`connection between its two devices. I understand that Dr. Rouskas argues that
`
`Ishiyama’s disclosure is related to a host-to-host scenario. EX2009, ¶¶132-33. I
`
`disagree. Ishiyama is not limited to only that scenario. As explained above and in
`
`- 13 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`my previous declaration, Ishiyama’s disclosure of tunnel mode would have
`
`suggested and made it obvious to a POSITA that Ishiyama’s correspondent host
`
`would be a “security gateway” because it is the most common scenario for using
`
`tunnel mode. See EX1002, ¶¶33-36, 61.
`
`30.
`
`
`I understand that Dr. Rouskas argues that Ishiyama’s use of tunnel
`
`mode is limited to host-to-host communications because “Ishiyama seeks to
`
`transmit packets from [an] original home address of the mobile terminal without
`
`revealing that address (Haddr) until the packet reaches its final destination . . .”
`
`EX2009, ¶133. I disagree. While Ishiyama describes the encapsulation of packets,
`
`Ishiyama does not describe a design objective being expressly limited to hiding a
`
`home address. Rather, the portions of Ishiyama cited by Dr. Rouskas reveal that
`
`Ishiyama contemplates the usage of a security gateway with respect to tunnel
`
`mode.
`
`
`
` For example, Ishiyama states: “the IP address (CoA) assigned to the 31.
`
`communication interface 21 will be used as an address (gateway address)
`
`indicating one endpoint (termination endpoint) of the tunnel.” EX1004, Ishiyama,
`
`8:2-4; see also id., 8:43-49, 11:39-47, 12:50-59, 14:11-16. Ishiyama also explains
`
`that as the mobile computer carries out communications using a Care-of address as
`
`a “gateway address,” the mobile computer “transmits an encapsulated packet in
`
`which the outer packet has the source address=‘CoA1’” or “CoA2” if the mobile
`
`- 14 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`computer has moved to a new address. Id., 8:42-65. This description explains that
`
`the outer packet uses an IP address in its IPSec tunnel as a “gateway address.” In
`
`view of this description, a POSITA would have readily understood that Ishiyama
`
`describes an endpoint of its IPSec tunnel as being a gateway or security gateway.
`
`
`
` To further illustrate this understanding, Ishiyama’s mobile computer 32.
`
`also performs an “SA Gateway Update” which includes sending a “[r]equest for
`
`changing the security association to the correspondent [host].” Id., 11:39-40. The
`
`“communication path to the correspondent [node] is secured by utilizing the tunnel
`
`mode of the IPSEC which is the standard protocol. Then, the maintenance of the
`
`session at a time-of moving is guaranteed by enabling the change of the
`
`termination endpoint of the tunnel by [applying] the SA Gateway Update
`
`[operation].” Id., 14:11-16. A POSITA would have understood this operation
`
`demonstrates that the IPsec tunnel is updated at a gateway when the mobile
`
`computer changes addresses and further illustrates that Ishiyama’s host is a
`
`gateway. See EX1002, ¶45.
`
`C. A POSITA Would Have Sought Out References Such as
`Murakawa for its Teaching of a Tunnel Mode Implementation.
`
`
`
` Dr. Rouskas appears to mischaracterize the obviousness combination 33.
`
`of Ishiyama and Murakawa and instead seems to argue that Ishiyama solely does
`
`not teach a security gateway. EX2009, ¶¶113-38. As explained in my previous
`
`declaration and acknowledged by the Board in its Institution Decision, however,
`
`- 15 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`the combination of Ishiyama and Murakawa is the proposed ground of
`
`unpatentability based on obviousness—not Ishiyama alone. See EX1002, ¶¶56-61,
`
`64-69, 83-90; see also DI, 34-35.
`
`
`
` Specifically, I explained that a “POSITA reading Ishiyama would 34.
`
`have understood that Ishiyama renders obvious the claims of the ’581 patent…
`
`Ishiyama’s description of operating the correspondent host in IPSec tunnel mode
`
`implies the security gateway functionality of the correspondent host.” Goldschlag
`
`Dec., ¶56. “If a POSITA reading Ishiyama had not immediately understood the
`
`implications of Ishiyama’s IPSec tunnel mode and the tunneling of messages from
`
`a mobile terminal to an ‘other terminal,’ a POSITA would likely have sought out
`
`other references that describe how to implement tunnel mode. Murakawa provides
`
`this description and further mirrors the understanding of a POSITA.” Id., ¶58.
`
`35.
`
`
`In particular, Murakawa provides details for implementing tunnel
`
`mode in a virtual private network (VPN). Murakawa describes a “Virtual Private
`
`Network (VPN) communication employed for a security gateway…which allow[s]
`
`a personal computer outside a local area network (LAN) to access…a terminal on
`
`the LAN.” EX1005, Murakawa, Abstract. Murakawa also illustrates a prior art
`
`security gateway configuration having a mobile terminal and other terminals in
`
`Figure 5 as annotated below. This configuration allows “VPN communication
`
`employing IPsec.” Id., 1:50-51; see also EX1002, ¶¶59-60.
`
`- 16 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`
`EX1005, FIG. 5 (annotated).
`
`
`
`36.
`
`
`“[S]ecurity gateway 103 includes server terminal 105 and client PCs
`
`106, 107.” EX1005, 1:59-60. “[I]n order to perform the IPsec communication,
`
`VPN 108 is established between PC 101 and security gateway 103.” Id., 1:61-63.
`
`Murakawa further describes the establishment of a “Security Association (SA) that
`
`is a two-way logical connection between the both sides.” Id., 2:33-35.
`
`Additionally, Murakawa explains that “security gateway 103 is [] active in the
`
`tunnel mode…[and] the IPsec operating mode is assumed to be the tunnel mode.”
`
`- 17 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`Id., 2:62-65. In view of this background configuration, Murakawa describes an
`
`invention that “allows an outside terminal to communicate with a terminal on the
`
`LAN, by virtually regarding the outside terminal as another terminal on the LAN.”
`
`Id., 4:13-16.
`
`
`
` As I explained in my previous declaration, a POSITA would have 37.
`
`been motivated to combine Ishiyama and Murakawa to maintain communications
`
`while a mobile host roams to different networks. See EX1002, ¶68. I explained that
`
`“a POSITA would have understood that implementing Ishiyama’s correspondent
`
`host functionality with the security gateway described in Murakawa would be
`
`highly desirable in the telecommunication context. As Ishiyama explains,
`
`implementing its IPsec address updating algorithm allows a mobile terminal and a
`
`security gateway to maintain communication ‘without interrupting the session’
`
`initially established even when the mobile terminal changes to another address.”
`
`Id., ¶¶67-68 (citing Ishiyama, 6:54-60). Specifically, Ishiyama states that its
`
`address-changing techniques would “guarantee [] mobility without interrupting the
`
`session by notifying the changed IPSEC tunnel terminal endpoint… and changing
`
`the tunnel termination address in a security related database.” EX1004, 6:54-60.
`
`38.
`
`
`In this manner, Ishiyama implemented with the teachings of
`
`Murakawa would have provided a way to use the well-known VPN scheme
`
`described in Murakawa to facilitate and maintain communications for mobile
`
`- 18 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`terminals. Murakawa additionally notes that when a mobile terminal attempts to
`
`establish a VPN connection, there is an “inconvenience” and that several “security
`
`problems” arise. EX1005, 3:29-36. Murakawa thus suggests that it would be
`
`desirable to receive improvements for a “VPN communication method in a security
`
`gateway apparatus that connects … between a LAN and a WAN.” Id., 3:66-4:2. A
`
`POSITA would have known how to improve Murakawa’s VPN configuration as
`
`depicted in Figure 5 with the functionality described in Ishiyama to provide
`
`uninterrupted communication session and minimize session interruptions with
`
`networked systems. See EX1002, ¶¶62-69. As I previously explained, this
`
`combination would have been predictable to create a secure connection between a
`
`mobile terminal and a security gateway. See id.
`
`IV. Nothing in the Prior Art Precludes Ishiyama’s “Correspondent Host”
`from Operating as a “Security Gateway.”
`
`39.
`
`
`I understand that Dr. Rouskas makes two arguments arguing that
`
`Ishiyama’s “correspondent host” cannot be a security gateway. First, Dr. Rouskas
`
`contends that Ishiyama’s correspondent host has only a single communication
`
`interface and therefore cannot be a security gateway. EX2009, ¶¶117-19. Second,
`
`Dr. Rouskas contends that Ishiyama’s description of Security Databases and a
`
`“correspondent node” (CN) address teaches the Ishiyama’s correspondent host is
`
`not a security gateway. Id., ¶¶120-23. I disagree with each of these arguments
`
`because (1) Ishiyama refers to its correspondent host as a “gateway;” and (2) the
`
`- 19 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`combination of Ishiyama and Murakawa addresses the explicit scenario where a
`
`security gateway forwards packets to other terminals.
`
`
`
` First, as explained above, Ishiyama refers to its correspondent host as 40.
`
`a “gateway” in several instances. See EX1004, 8:1-6, 8:43-49, 11:39-47, 12:50-59,
`
`14:11-16; see Section III.B. In view of these several descriptions, Ishiyama
`
`describes updating its correspondent host as updating the “SA Gateway” and
`
`further demonstrates that the correspondent host is a security gateway. I understand
`
`that Dr. Rouskas characterizes Ishiyama’s correspondent host as having only a
`
`single interface and therefore it is not a security gateway. EX2009, ¶¶117-19. I
`
`disagree for several reasons. I first disagree with the construction provided by Dr.
`
`Rouskas as I have explained above. See Section II. The ’581 patent does not
`
`provide any special definition for “security gateway” and therefore does not
`
`require multiple interfaces. Rather, as conceded by Dr. Rouskas, the term “security
`
`gateway” in the ’581 patent is used in its conventional and well-known manner.
`
`See Section II; see also EX1021, 165:17-166:5; 168:9-20.
`
`
`
` Second, Dr. Rouskas’s construction does not address the combination 41.
`
`of Ishiyama and Murakawa that I described in my previous declaration. See
`
`EX1002, ¶¶62-69. As previously explained, Ishiyama in view of Murakawa would
`
`have taught that Ishiyama’s correspondent host would have likely operated as a
`
`security gateway because security gateways are commonly used with IPsec. See
`
`- 20 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`Section III.A. Further, the use of tunnel mode would have suggested that an
`
`endpoint of the IPsec tunnel would have likely been a security gateway. See
`
`Section III.B. The IPSec standard as recited in RFC 2401, the ’581 patent, as well
`
`as Dr. Rouskas all acknowledge that tunnel mode is most often used when one of
`
`the endpoints is a security gateway. See id. Thus, the “security gateway” suggested
`
`in Ishiyama would have the same functionality and features proposed by Dr.
`
`Rouskas because both are based on the common usage of the term “security
`
`gateway” as recited in the IPSec standard.
`
`
`
` With respect to Ishiyama’s “security databases,” Dr. Rouskas argues 42.
`
`that this description indicates that the correspondent host is not a security gateway.
`
`EX2009, ¶¶120-23. Dr. Rouskas points to Ishiyama’s description of a destination
`
`address potentially being “CN” in arguing that this description precludes Ishiyama
`
`from operating as a security gateway. Id. Specifically, Dr. Rouskas states that “[i]f
`
`either of MN or CN in Figures 8A-9D was a security gateway, the selectors would
`
`use multiple addresses (e.g., a range, a wildcard, a subnet mask or the like
`
`representing multiple addresses for either CN or MN) for at least one of the IPSec
`
`endpoints.” Id., ¶123. I disagree because Dr. Rouskas incorrectly focuses on
`
`narrow embodiments of Ishiyama. Nothing in Ishiyama limits its configuration
`
`from being applicable to a security gateway. Further, a POSITA would have
`
`- 21 -
`
`

`

`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`understood that Ishiyama’s description suggests the use of a security gateway as I
`
`have previously explained

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket