throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`
`APPLE INC.,
`Petitioner
`
`v.
`
`MPH TECHNOLOGIES OY,
`Patent Owner
`____________________
`
`Case IPR2019-00819
`U.S. Patent No. 7,620,810
`____________________
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW OF
`U.S. PATENT NO. 7,620,810
`
`
`
`
`
`
`
`
`
`Mail Stop PATENT BOARD
`Patent Trial and Appeal Board
`U.S. Patent & Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`
`
`
`
`
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 1
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`
`TABLE OF CONTENTS
`
`V. 
`
`3. 
`
`4. 
`
`5. 
`
`6. 
`
`
`Introduction ..................................................................................................... 1 
`I. 
`II.  Mandatory Notices (37 C.F.R. § 42.8) ........................................................... 2 
`III.  Grounds for Standing (37 C.F.R. § 42.104(a)) ............................................... 3 
`IV. 
`Identification of Challenge (37 C.F.R. § 42.104(b)) ...................................... 4 
`A. 
`Statutory Grounds for the Challenge ..................................................... 4 
`B. 
`Citation of Prior Art .............................................................................. 4 
`The ’810 Patent ............................................................................................... 5 
`A.  Overview of the ’810 Patent .................................................................. 5 
`1. 
`The ’810 Patent Admitted Prior Art. ......................................... 8 
`2. 
`The
`Examiner Misapplied References During
`Prosecution in View of the Admitted Prior Art. ........................ 9 
`Level of Ordinary Skill in the Art ....................................................... 12 
`B. 
`Claim Construction ............................................................................. 12 
`C. 
`VI.  Grounds of Unpatentability .......................................................................... 12 
`A.  Ground 1: Claims 1, 4-5, and 7 are Obvious over Ishiyama and
`Murakawa. ........................................................................................... 12 
`1. 
`Overview of U.S. Patent 6,904,466 (Ishiyama) ....................... 13 
`2. 
`The Examiner Incorrectly Applied Ishiyama During
`Prosecution. .............................................................................. 18 
`Overview of the Combination of Ishiyama and U.S.
`Patent 7,028,337 (Murakawa) .................................................. 21 
`The Combination of Ishiyama and Murakawa Renders
`Claim 1 Obvious. ..................................................................... 24 
`The Combination of Ishiyama and Murakawa Renders
`Claim 7 Obvious. ..................................................................... 47 
`The Combination of Ishiyama and Murakawa Renders
`Claim 4 Obvious. ..................................................................... 54 
`The Combination of Ishiyama and Murakawa Renders
`Claim 5 Obvious. ..................................................................... 59 
`
`7. 
`
`
`
`- i -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 2
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`B. 
`
`C. 
`
`2. 
`
`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`Ground 2: Claims 2 and 3 are Obvious over Ishiyama,
`Murakawa, and Ahonen. ..................................................................... 59 
`1. 
`Overview of the Combination of Ishiyama, Murakawa,
`and U.S. Patent No. 6,976,177 (Ahonen) ................................ 59 
`The Combination of Ishiyama, Murakawa, and Ahonen
`Renders Claims 2 and 3 Obvious. ............................................ 63 
`Ground 3: Claim 6 is Obvious over Ishiyama, Murakawa, and
`Forslöw. ............................................................................................... 66 
`VII.  Conclusion .................................................................................................... 70 
`
`
`
`
`
`
`
`
`- ii -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 3
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`
`EXHIBIT LIST
`
`Apple (EX)
`Exhibit # Description
`U.S. Patent No. 7,620,810 (“’810 patent”).
`1001
`Declaration of Dr. David Goldschlag in Support of Petition for
`Inter Partes Review of U.S. Patent No. 7,620,810 (“Goldschlag
`Decl.”).
`Prosecution History of U.S. Patent No. 7,620,810 (“Prosecution
`History”).
`U.S. Patent No. 6,904,466 to Ishiyama et al. (“Ishiyama”).
`U.S. Patent No. 7,028,337 to Murakawa (“Murakawa”).
`U.S. Patent No. 6,976,177 to Ahonen (“Ahonen”).
`U.S. Patent No. 6,954,790 to Forslöw (“Forslöw”).
`
`1002
`
`1003
`
`1004
`1005
`1006
`1007
`1008
`
`Demystifying the IPsec Puzzle, Sheila Franklel, Published 2001.
`IP Security - The Internet Protocol Journal – Volume 3, No. 1,
`William Stallings, Published March 2000.
`Mobility-aware IPsec ESP tunnels, Francis Dupont, IETF Draft
`Posted February 22, 2001. https://tools.ietf.org/html/draft-dupont-
`movesptun-00 (“Dupont”).
`RFC2401 - S. Kent, and R. Atkinson, Security Architecture for the
`Internet Protocol, RFC2401, November 1998.
`https://tools.ietf.org/html/rfc2401.html (“RFC2401”).
`RFC793 – Information Science Institute, Transmission Control
`Protocol, September 1981 (“RFC793”).
`U.S. Patent No. 7,079,499 to Akhtar et al. (“Akhtar”).
`U.S. Patent No. 7,174,018 to Patil et al. (“Patil”).
`U.S. Patent No. 6,418,130 to Cheng et al. (“Cheng”).
`Curriculum Vitae of Dr. David Goldschlag.
`Declaration of Sandy Ginoza for IETF (Regarding RFC2401 and
`RFC793).
`Declaration of Alexa Morris for IETF (Regarding “Mobility-aware
`IPsec ESP tunnels” by Dupont)
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`1014
`1015
`1016
`
`1017
`
`1018
`
`
`
`- iii -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 4
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`
`I.
`
`Introduction
`Apple Inc. petitions for inter partes review of claims 1-7 of United States
`
`Patent No. 7,620,810 (“’810 patent”) to Vaarala et al., titled “Method and Network
`
`for Ensuring Secure Forwarding of Messages.” Ex. 1001, ’810 patent. The Petition
`
`demonstrates that all 7 claims of the ’810 patent are unpatentable.
`
`The ’810 patent allegedly solved Internet Protocol Security (“IPSec”)
`
`operability problems for mobile devices. As will be further clarified below, it does
`
`not. Rather, IPSec problems were well-known and solved long before the earliest
`
`priority date of the ’810 patent. See, e.g., Ex. 1008, Frankel, 3, 129-132; Ex. 1010,
`
`Dupont, 1; Ex. 1002, Goldschlag Decl., ¶¶29-46. IPSec refers to a set of protocols
`
`developed in the early 1990s that provides for the establishment and maintenance
`
`of secure communication channels between devices. IPSec was not developed for
`
`mobile devices and operability problems arose when attempts were made to apply
`
`IPSec to mobile devices. Specifically, as mobile devices roam between networks,
`
`their IP addresses change. See Goldschlag Decl., ¶¶29-46. This presented a
`
`problem for IPSec because it relies on fixed IP addresses for the endpoints of a
`
`connection. Id. Because of this IPSec limitation, a mobile device needed to
`
`renegotiate its connection as it traveled between networks and obtained new IP
`
`addresses, which was inefficient and resulted in connection issues. Id.
`
`
`
`- 1 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 5
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`The ’810 patent allegedly solves this problem by having a mobile device
`
`send a message to the other end of a secure connection to update the mobile
`
`device’s address when the address changes. Not only is this solution trivial, but it
`
`was also explicitly disclosed by U.S. Patent No. 6,904,466 (“Ishiyama”) prior to
`
`the earliest priority date of the ’810 patent. Additionally, U.S. Patent Nos.
`
`7,028,337 (“Murakawa”), 6,976,177 (“Ahonen”), and 6,954,790 (“Forslöw”)
`
`explain other well-known and simple elements of the claims that would have been
`
`known to a person of ordinary skill in the art (“POSITA”), such as connecting the
`
`mobile device to another device via a security gateway, sending a reply message,
`
`and connecting two mobile devices.
`
`Accordingly, there is at least a reasonable likelihood that at least one claim
`
`of the ’810 patent is unpatentable, as shown herein. As such, Petitioner respectfully
`
`requests that the Board Institute trial on the grounds set forth herein and ultimately
`
`determine that all claims of the ’810 patent are invalid.
`
`II. Mandatory Notices (37 C.F.R. § 42.8)
`Real Party In Interest: The real party-in-interest of the Petition is Apple
`
`Inc. (“Apple”).
`
`Related Matters: Pursuant to 37 C.F.R. § 42.8(b)(2), the ’810 patent is
`
`involved in the following proceeding that may affect or be affected by a decision in
`
`this proceeding: MPH Technologies Oy v. Apple Inc., Case No. 5:18-cv-05935-
`
`
`
`- 2 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 6
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`PJH (N.D. Cal.), filed September 27, 2018. U.S. Patent No. 7,937,581 (“’581
`
`patent”), issued May 3, 2011, claims the benefit of the ’810 patent. A Petition for
`
`inter partes review has been filed against the ’581 patent and the corresponding
`
`proceeding may be affected by the decision in this proceeding.
`
`Lead and Backup Counsel: Pursuant to 37 C.F.R. § 42.8(b)(3) and
`
`42,10(a), Petitioner appoints Michael D. Specht (Reg. No. 54,463) as its lead
`
`counsel and Daniel S. Block (Reg. No. 68,395) and Timothy L. Tang (Reg. No.
`
`75,187) as its back-up counsel, all at the address: STERNE, KESSLER,
`
`GOLDSTEIN & FOX, 1100 New York Avenue, N.W., Washington, D.C., 20005,
`
`phone number (202) 371-2600 and facsimile (202) 371-2540.
`
`Service Information: Petitioner consents to electronic service by email at
`
`the
`
`email
`
`addresses: MSPECHT-ptab@sternekessler.com, DBLOCK-
`
`ptab@sternekessler.com,
`
`TTang-ptab@sternekessler.com,
`
`and
`
`PTAB@sternekessler.com.
`
`III. Grounds for Standing (37 C.F.R. § 42.104(a))
`The undersigned and Apple certify that the ’810 patent is available for inter
`
`partes review. Pursuant to 37 C.F.R. § 42.104(a), Petitioner certifies that the ’810
`
`patent is available for inter partes review and that Petitioner is not barred or
`
`estopped from requesting an inter partes review challenging the claims of the ’810
`
`patent on the grounds identified herein.
`
`
`
`- 3 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 7
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`IV.
`
`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`Identification of Challenge (37 C.F.R. § 42.104(b))
`A.
`Petitioner requests review of claims 1-7 on the following grounds:
`
`Statutory Grounds for the Challenge
`
`Ground 1: Claims 1, 4-5, and 7 are unpatentable under 35 U.S.C. § 103 as
`
`obvious over U.S. Patent No. 6,904,466 to Ishiyama, et al. and U.S. Patent No.
`
`7,028,337 to Murakawa.
`
`Ground 2: Claims 2 and 3 are unpatentable under 35 U.S.C. § 103 as
`
`obvious over Ishiyama, Murakawa, and U.S. Patent No. 6,976,177 to Ahonen.
`
` Ground 3: Claim 6 is unpatentable under 35 U.S.C. § 103 as obvious over
`
`Ishiyama, Murakawa, and U.S. Patent No. 6,954,790 to Forslöw.
`
`B. Citation of Prior Art
`The PCT application corresponding to the ’810 patent entered the U.S.
`
`national phase on September 27, 2002 as U.S. Application No. 10/490,932. The
`
`PCT application claims priority to a foreign application having a priority date of
`
`September 28, 2001. The following prior art documents applied on the grounds of
`
`unpatentability were published and/or filed prior to the ’810 patent’s earliest
`
`priority date of September 28, 2001.
`
`Petitioner cites to the following prior art references:
`
`U.S. Patent No. 6,904,466 to Ishiyama, et al. (Ex. 1004) is prior art under at
`
`least pre-AIA 35 U.S.C. § 102(e) because it was filed on May 19, 2000, more than
`
`one year before the earliest possible priority date of the ’810 patent.
`
`
`
`- 4 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 8
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`U.S. Patent No. 7,028,337 to Murakawa (Ex. 1005) is prior art under at least
`
`pre-AIA 35 U.S.C. §§ 102(a), 102(b), and 102(e) because it was filed on December
`
`1, 2000 and published September 6, 2001, both dates being before the earliest
`
`priority date of the ’810 patent.
`
`U.S. Patent No. 6,976,177 to Ahonen (Ex. 1006) is prior art under at least
`
`pre-AIA 35 U.S.C. §§ 102(a), 102(b), and 102(e) because it was filed on January
`
`18, 2001 and published on July 19, 2001, both dates being before the earliest
`
`priority date of the ’810 patent.
`
`U.S. Patent No. 6,954,790 to Forslöw (Ex. 1007) is prior art under at least
`
`pre-AIA 35 U.S.C. §102(e) because it was filed on December 5, 2000, more than
`
`one year before the PCT priority date of the ’810 patent.
`
`V. The ’810 Patent
`A. Overview of the ’810 Patent
`The ’810 patent generally relates to using IPSec with mobile hosts. ’810
`
`patent, Abstract, 7:1-6. “The IP Security protocols (IPSec) provides the capability
`
`to secure communications between arbitrary hosts” using negotiated encryption
`
`keys. Id., 1:57-58. These encryption keys are typically negotiated in an automated
`
`fashion using a protocol known as “Internet Key Exchange” or IKE. Id., 4:3-5.
`
`One limitation of IPSec, according to the ’810 patent, is that it is intended to
`
`work in situations where hosts have fixed IP addresses. Id., 4:9-13. This is because
`
`
`
`- 5 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 9
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`the negotiated encryption keys for the IPSec connection are stored in a structure
`
`referred to as a “security association (SA)” and the “SAs are bound to static
`
`addresses.” See id., 4:47-58. This creates a problem for mobile hosts, according to
`
`the ’810 patent, because the mobile host will change IP addresses when it moves
`
`between networks. Id., 4:12-15. And as a result of this change in address “the IKE
`
`key exchange will have to be redone [for] every new visited network” Id., 4:15-18.
`
`“This is problematic, because IKE key exchanges involve computationally
`
`expensive…calculations.” Id., 4:17-20. Further, re-establishing an IPSec SA may
`
`result in an interruption of service due to the many messages required for a full re-
`
`negotiation of the SA. See id., 9:40-46.
`
`The ’810 patent aims to solve these alleged problems by simply updating the
`
`SA with the new address when the mobile terminal changes addresses.
`
`Specifically, according to the ’810 patent, a “first terminal” may have a secure
`
`connection with another terminal. Id., Abstract. “When the first terminal moves
`
`from the first address to the second address, the connection is changed to be
`
`between the second address and [] the other terminal by means of a request from
`
`the first terminal….” Id.
`
`The ’810 patent also describes an embodiment of this communication
`
`process using a “security gateway.” See id., 8:53-64. Figure 1 as annotated below
`
`depicts this embodiment. “Computer 1 may be a client computer and computer 2 a
`
`
`
`- 6 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 10
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`destination computer, to which the secure messages are sent….” Id., 8:54-58.
`
`“Computer 2 might be a security gateway for a third computer 3.” Id., 8:58-59.
`
`“The security gateway can be a common security gateway for e.g., a company
`
`LAN, whereby there are several computers in the LAN protected by computer 2.”
`
`Id., 8:60-63.
`
`’810 patent, FIG. 1 (annotated).
`
`
`
`The ’810 patent explains that “an IPSec tunnel [is] established between
`
`computer 1 and computer 2.” Id., 8:57-58. The IPSec tunnel represents a secure
`
`standard protocol connection more thoroughly discussed in the “Technical
`
`Background” section of the ’810 patent. When computer 1 changes to a new
`
`address, computer 1 sends a message with the new address to computer 2, and
`
`computer 2 updates the definition of the IPSec tunnel. See id., 7:29-37, 8:60-9:7,
`
`
`
`- 7 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 11
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`9:14-19, 9:63-10:2. It is this update message that the ’810 patent alleges is its
`
`inventive concept. See id., 7:33-40.
`
`The ’810 Patent Admitted Prior Art.
`
`1.
`The ’810 patent includes a lengthy Technical Background section that
`
`admits a number of aspects of the alleged invention of the ’810 patent were known.
`
`For example, the ’810 patent explains the Internet Protocol Security (“IPsec”) was
`
`a well-known standard framework that “provides the capability to secure
`
`communications between arbitrary hosts, e.g., across a LAN, across private and
`
`public wide area networks (WANs)….” ’810 patent, 1:57-59. IPSec could be used
`
`in a number of ways, “such as for building secure virtual private networks, to gain
`
`a secure access to a company network, or to secure communication with other
`
`organisations, ensuring authentication and confidentiality and providing a key
`
`exchange mechanism.” Id., 1:61-64.
`
`Importantly, the ’810 patent also admits that the IPsec standard “support[s]
`
`two modes…transport and tunnel mode.” Id., 3:8-9. “Typically, transport mode is
`
`used for end-to-end communication between two hosts.” Id., 3:12-13 (emphasis
`
`added). In contrast, “[t]unnel mode is often used when one or both ends of a SA is
`
`a security gateway, such as a firewall or a router that implements IPSec.”1
`
`1 ’810 patent, 3:19-21 (emphasis added); see also id., 2:6-10, 5:59-62 (citing
`
`Ex. 1011, RFC2401, 9 (“A tunnel mode SA is essentially an SA applied to an IP
`
`
`
`- 8 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 12
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`The Examiner Misapplied References During Prosecution
`in View of the Admitted Prior Art.
`
`2.
`
`The Examiner considered several references during prosecution, but
`
`appeared to misunderstand the fundamentals of the underlying IPSec technology,
`
`as well as the admitted prior art underlying the subject matter of the ’810 patent.
`
`Initially, the Examiner rejected the claims over U.S. 6,587,680 to Ala-
`
`Laurila et al. Ex. 1003, Prosecution History, 0119-0124. This forced the Applicant
`
`to amend the claims, adding the limitation of a mobile terminal moving from a first
`
`address to a second address and sending a request to an “other terminal” to change
`
`the address definition of the secure connection. Id., 0129-0138. The Applicant then
`
`argued that Ala-Laurila failed to teach the added limitations because Ala-Laurila’s
`
`mobile device would never send a request to the host the Examiner alleged was the
`
`“other terminal.” Id., 0134-0136. Ultimately, the Examiner agreed and issued
`
`several rejections before issuing a rejection including the combination of Ala-
`
`Laurila and Ishiyama. Id., 0214-0220.
`
`In response to this rejection, the Applicant amended the claims to add a
`
`“security gateway” between the mobile terminal and other terminal and to require
`
`
`tunnel. Whenever either end of a security association is a security gateway, the SA
`
`MUST be tunnel mode. Thus an SA between two security gateways is always a
`
`tunnel mode SA, as is an SA between a host and a security gateway.”)).
`
`
`
`- 9 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 13
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`that the mobile device send a “request” to change the address to a security
`
`gateway, instead of the “other terminal.” Id., 0227-0239. The Applicant further
`
`argued that “Ishiyama merely teaches an updating of the mobile computer address
`
`and there is no teaching or suggestion of the correspondent being a security
`
`gateway for another computer.” Id., 0232-0233. Subsequently, the Examiner issued
`
`two new rejections with entirely different references.2 And the Applicant continued
`
`to argue that these new references failed to disclose a security gateway updating
`
`the mobile computer’s address definition of a secure connection, similarly to its
`
`arguments for Ishiyama. Ultimately, because of these arguments the Examiner
`
`allowed the claims.3
`
`But had the Examiner properly understood the underlying IPSec technology,
`
`the Examiner would never have had needed any new references after applying
`
`Ishiyama, as the Examiner should have determined that it was well understood to
`
`POSITAs that the “correspondent node” described in Ishiyama represents an
`
`
`2 See Prosecution History, 0243-0250 (Examiner citing to Ahonen and Luo),
`
`0270-276 (Examiner citing to Ahonen and Inoue).
`
`3 The Examiner never stated his reasons for allowance, instead stating: “No
`
`reason for allowance is needed as the record is clear….” Prosecution History,
`
`0319.
`
`
`
`- 10 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 14
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`endpoint of an IPSec tunnel. See Goldschlag Decl., ¶¶33-36; see also Ex. 1004,
`
`Ishiyama, FIG. 4, 12:15-25. Further, Ishiyama explicitly states that “the tunnel
`
`mode of the IPSEC [standard] will be utilized for communications between the
`
`moving mobile computer 2 and the correspondent host 3.” Ishiyama, 7:45-49.
`
`Indeed, as was well known to POSITAs at the time, and admitted in the Technical
`
`Background of the ’810 patent, “[t]unnel mode is often used when one or both ends
`
`of a SA is a security gateway.”4 In view of this understanding, a POSITA would
`
`have understood that the “correspondent node” in Ishiyama would be a security
`
`gateway communicating with “mobile computer 2” via the established IPSec
`
`tunnel. The Examiner, however, did not consider this when applying Ishiyama in
`
`the Office Action. Instead, the Examiner allowed the claims in view of two other
`
`references and the Applicant’s arguments that the two other references did not
`
`recite “the security gateway changing an address definition of the secure
`
`connection from the first address to the second address” where “the address
`
`
`4 ’810 patent, 3:19-21 (emphasis added); see also id., 2:6-10, 5:59-62 (citing
`
`RFC2401, 9 (“A tunnel mode SA is essentially an SA applied to an IP tunnel.
`
`Whenever either end of a security association is a security gateway, the SA MUST
`
`be tunnel mode. Thus an SA between two security gateways is always a tunnel
`
`mode SA, as is an SA between a host and a security gateway.”)).
`
`
`
`- 11 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 15
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`definition of the same secure connection is changed from the first address to the
`
`second address.” Prosecution History, 0290 (emphasis in the original).
`
`Level of Ordinary Skill in the Art
`
`B.
`A person having ordinary skill in the art (“POSITA”) would have had a B.S.
`
`degree in Computer Engineering, Electrical Engineering, or an equivalent field, as
`
`well as at least 3-5 years of academic or industry experience in the Internet security
`
`industry. Goldschlag Decl., ¶¶20-21.
`
`C. Claim Construction
`In an inter partes review, claims are “construed using the same claim
`
`construction standard that would be used to construe the claim in a civil action
`
`under 35 U.S.C. 282(b).” 37 C.F.R. §42.100(b). Claims must be given their
`
`ordinary and customary meaning as understood by one of ordinary skill in the art at
`
`the time of the invention in light of the specification and the prosecution history
`
`pertaining to the patent. Id.; Phillips v. AWH Corp., 415 F.3d 1303, 1312-1313
`
`(Fed. Cir. 2015) (en banc); see also 83 Fed. Reg. 51,340. All claim terms of the
`
`’810 patent should receive their ordinary and customary meaning.
`
`VI. Grounds of Unpatentability
`A. Ground 1: Claims 1, 4-5, and 7 are Obvious over Ishiyama and
`Murakawa.
`
`Ishiyama discloses each and every limitation of claims 1, 4-5, and 7.
`
`Ishiyama does not, however, expressly state that an “other terminal” receives a
`
`
`
`- 12 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 16
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`message beyond a security gateway. While this limitation would be obvious in
`
`view of the disclosed system in Ishiyama as well as the admitted prior art in the
`
`Technical Background of the ’810 patent, Murakawa expressly discloses the “other
`
`terminal” and the routing of message from the mobile terminal to the other
`
`terminal via the security gateway. As explained in further detail below, it would
`
`have been obvious to a POSITA at the time of filing the ’810 patent to combine
`
`Ishiyama and Murakawa.
`
`1. Overview of U.S. Patent 6,904,466 (Ishiyama)
`Similar to the ’810 patent, Ishiyama describes a “mobile communication
`
`scheme capable of easily changing a connected location of a mobile computer….”
`
`Ishiyama, 2:43-44. Just like the ’810 patent, Ishiyama accomplishes this goal by
`
`updating an address corresponding to the mobile computer while “the [other]
`
`security association information…remain[s] unchanged, so that there is no need to
`
`re-negotiate keys for IPSEC encryption and authentication….” Id., 9:5-8. In this
`
`manner, Ishiyama describes the same alleged solution as the ’810 patent with the
`
`same effect as the ’810 patent—avoiding the re-establishment of IPSec SAs. See
`
`’810 patent, 9:12-15, 9:40-43, 10:20-23.
`
`Specifically, Ishiyama explains that a secure connection is established
`
`between a mobile computer (i.e., a mobile terminal) and a correspondent node (i.e.,
`
`a security gateway): “the mobile computer 2 carries out communications here by
`
`
`
`- 13 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 17
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`using this acquired Care-of address (CoA1) as an address (gateway address)
`
`indicating one endpoint of the tunnel according to the tunnel mode IPSEC
`
`communications.” Ishiyama, 8:42-47. A POSITA would have understood that the
`
`“correspondent node” is a “security gateway” because IPSec tunnel mode is used.
`
`See Goldschlag Decl., ¶¶33-36.
`
`Next, just like in the ’810 patent, the mobile computer moves across
`
`networks, and its address changes. See Ishiyama, 8:55-57. And when the address of
`
`the mobile computer changes, just like the ’810 patent, Ishiyama discloses that the
`
`mobile computer sends an update message: “[the mobile computer] notif[ies] a
`
`change of the current location address of the mobile computer from the mobile
`
`computer to [a] correspondent computer by setting a new current location address
`
`as the source address….” Id., 2:63-66. The correspondent computer then
`
`“updat[es] the current location address used as a termination endpoint address of
`
`the tunnel…at the correspondent computer into the new current location address,
`
`when the change of the current location address to the new current location address
`
`is notified from the mobile computer.” Id., 3:9-3:14. Thus, “[w]hen the mobile
`
`computer moves, the Care-of address is changed so that the termination endpoint
`
`of the IPSEC tunnel also changes, but it is possible to guarantee the mobility
`
`without interrupting the session by notifying the changed IPSEC tunnel terminal
`
`endpoint to the IPSEC module of the correspondent and changing the tunnel
`
`
`
`- 14 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 18
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`termination address in a security related database.” Id., 6:54-58 (emphasis
`
`added).
`
`Figure 2 and Figure 4 further depict this operation.
`
`Ishiyama, FIG. 2 (annotated).
`
`
`
`As seen in Figure 2, “a mobile computer 2 that belongs to the home network
`
`1a has moved to another network 1b…and carries out communications with a
`
`correspondent host 3…that is located in the network 1c.” Id., 7:33-39. In the
`
`annotated Figure 2 above, the dashed red box represents the mobile terminal at a
`
`first address corresponding to network 1a while the solid red box represents the
`
`mobile terminal at a second address corresponding to network 1b. Figure 2
`
`illustrates the movement of the mobile terminal. “In this embodiment, the tunnel
`
`
`
`- 15 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 19
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`mode of the IPSEC will be utilized for communications between the moving
`
`mobile computer 2 and the correspondent host 3.” Id., 7:45-48.
`
`Ishiyama, FIG. 4 (annotated).
`
`
`
`“FIG. 4 shows an exemplary situation in which a packet is transferred from
`
`the mobile computer 2 to the correspondent host 3 using the IPSEC tunnel.” Id.,
`
`8:33-35. The mobile computer may first be communicating with the correspondent
`
`host using “[c]are-of address (CoA1) as an address (gateway address) indicating
`
`one endpoint of
`
`the
`
`tunnel according
`
`to
`
`the
`
`tunnel mode
`
`IPSEC
`
`communications….” Id., 8:42-46. The mobile computer may then move to another
`
`network as annotated in Figure 4 above by the movement of the mobile terminal
`
`from the dashed red box to the solid red box.“[W]hen the mobile computer 2
`
`
`
`- 16 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 20
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`moves further[,] the Care-of address is changed from ‘CoA1’ to ‘CoA2’….” Id.,
`
`8:55-57. “[T]he mobile computer 2 changes the source address of the outer packet
`
`of the encapsulated packet to be transmitted to the IPSEC tunnel by the mobile
`
`computer 2 into ‘CoA2’ at a timing when the Care-of address is changed to
`
`‘CoA2.’ As a result, as shown in Figure 4, the encapsulated packet in which the
`
`outer packet has the source address =‘CoA2’ will be transferred.” Id., 8:59-65.
`
`“The correspondent host 3…then replace[s] the destination gateway address
`
`‘CoA1’ used so far in this session by a new one ‘CoA2’ by referring to the IPSEC
`
`security association (security related information) database (see FIG. 9B and FIG.
`
`9D).” Id., 8:66-9:4. “[M]obile computer 2 carries out the SA Gateway Update with
`
`respect to this correspondent host ‘CN’…. As a result, the contents of the
`
`corresponding security association SAC1 of FIG. 9B at the correspondent host
`
`‘CN’ is updated as shown in FIG. 9D.” Id., 12:51-59.
`
`
`
`- 17 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 21
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`
`
`
`
`
`Ishiyama, FIGs. 9B and 9D (annotated).
`
`“As a result of these operations, at the correspondent [node] currently
`
`communicating with the mobile computer 2, the endpoint of the IPSEC tunnel is
`
`changed from ‘CoA1’ to ‘CoA2’ as the destination of all the security associations
`
`is changed to the current CoA ‘CoA2’. Id., 12:66-13:3. In view of the CoA
`
`updating, “the security association information other than the gateway address will
`
`remain unchanged, so that there is no need to re-negotiate keys for IPSEC
`
`encryption and authentication….” Id., 9:5-8.
`
`2.
`
`The Examiner Incorrectly Applied Ishiyama During
`Prosecution.
`
`Ishiyama was considered during prosecution by the Examiner, but only as a
`
`secondary reference. Moreover, the Examiner did not properly apply Ishiyama’s
`
`
`
`- 18 -
`
`MPH Technologies Oy, Exhibit 2003
`Page 2003 - 22
`IPR2019-00820, Apple Inc. v. MPH Technologies Oy
`
`

`

`Petition for Inter Partes Review of
`U.S. Pat. No. 7,620,810
`t

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket