throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`APPLE INC.,
`Petitioner
`
`v.
`
`MPH TECHNOLOGIES OY,
`Patent Owner
`____________________
`Case IPR2019-00820
`U.S. Patent No. 7,937,581
`____________________
`
`
`PETITIONER’S REPLY TO PATENT OWNER’S RESPONSE
`UNDER 37 C.F.R. § 42.23
`
`
`
`
`
`
`
`
`
`
`
`Mail Stop PATENT BOARD
`Patent Trial and Appeal Board
`U.S. Patent & Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`
`
`
`
`
`
`

`

`
`Introduction ..................................................................................................... 1
`I.
`The Board Should Reject MPH’s Improper Claim Construction .................. 1
`II.
`III. The Combination of Ishiyama and Murakawa Discloses the Claimed
`“Security Gateway” ........................................................................................ 5
`A.
`It would have been obvious to a POSA from Ishiyama’s use of
`IPSec for its correspondent host to be a security gateway because
`IPSec only has a finite number of endpoint configurations. ................. 5
`A POSA would have understood that Ishiyama’s use of tunnel
`mode suggests that its correspondent host would be a security
`gateway. ................................................................................................. 7
`A POSA would have sought out references such as Murakawa
`for its teaching of tunnel mode implementation ................................... 9
`IV. Nothing in the Prior Art Precludes Ishiyama’s “Correspondent Host”
`from Operating as a “Security Gateway” ..................................................... 10
`The Combination of Ishiyama and Murakawa Teaches the “Other
`Terminal” ...................................................................................................... 14
`Ishiyama Teaches the Mobile Terminal Transmitting a Message While
`at a Second Address to Change the Definition of a Security Association
` ...................................................................................................................... 17
`VII. The Combination of
`Ishiyama and Murakawa Teaches
`the
`“Request”/“Reply” Messages Being Encrypted as Recited in Claim 4. ...... 18
`VIII. The Combination of Ishiyama, Murakawa, and Ahonen Renders Claims
`3 and 5 Obvious ............................................................................................ 19
`IX. Dependent Claims 6-8 are Unpatentable as Stated in Ground 2 of the
`Petition .......................................................................................................... 22
`Conclusion .................................................................................................... 27
`
`B.
`
`C.
`
`V.
`
`VI.
`
`X.
`
`
`TABLE OF CONTENTS
`
`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`
`
`
`
`
`
`
`- i -
`
`

`

`PETITIONER’S EXHIBIT LIST
`
`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`
`1002
`
`1003
`1004
`1005
`1006
`1007
`1008
`
`1009
`
`1010
`
`Apple (EX)
`Exhibit # Description
`U.S. Patent No. 7,937,581 to Vaarala et al. (“’581 patent”)
`1001
`Declaration of Dr. David Goldschlag in Support of Petition for
`Inter Partes Review of U.S. Patent No. 7,937,581 (“Goldschlag
`Decl.”)
`Prosecution History of U.S. Patent No. 7,937,581 (“Prosecution
`History”)
`U.S. Patent No. 6,904,466 to Ishiyama, et al. (“Ishiyama”)
`U.S. Patent No. 7,028,337 to Murakawa (“Murakawa”)
`U.S. Patent No. 6,976,177 to Ahonen (“Ahonen”)
`U.S. Patent No. 6,954,790 to Forslöw (“Forslöw”)
`S. Frankel, Demystifying the IPsec Puzzle, Artech House, Inc.,
`2001 (“Frankel”)
`W. Stallings, IP Security - The Internet Protocol Journal – Volume
`3, No. 1, March 2000 (“Stallings”)
`Mobility-aware IPsec ESP tunnels, Francis Dupont, IETF Draft
`Posted February 22, 2001 (“Dupont”)
`RFC2401 - S. Kent, and R. Atkinson, Security Architecture for the
`Internet Protocol, RFC2401, The Internet Society, November 1998
`(“RFC 2401”)
`RFC793 - Transmission Control Protocol, Darpa Internet Program
`Protocol Specification, September 1981 (“RFC 793”)
`U.S. Patent No. 7,079,499 to Akhtar et al. (“Akhtar”)
`U.S. Patent No. 7,174,018 to Patil et al. (“Patil”)
`U.S. Patent No. 6,418,130 to Cheng et al. (“Cheng”)
`Curriculum Vitae of Dr. David Goldschlag
`Declaration of Sandy Ginoza for IETF (Regarding RFC2401 and
`RFC793) (“Ginoza Decl.”)
`Declaration of Alexa Morris for IETF (Regarding “Mobility-aware
`IPsec ESP tunnels” by Dupont) (“Morris Decl.”)
`U.S. Patent No. 7,620,810 to Vaarala et al. (“Vaarala”)
`
`1011
`
`1012
`1013
`1014
`1015
`1016
`1017
`
`1018
`1019
`
`
`
`- ii -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`
`Apple (EX)
`Exhibit # Description
`Prosecution History of U.S. Patent No. 7,620,810 (“’810
`1020
`Prosecution History”)
`Transcript of the Deposition of Dr. George N. Rouskas, March 20,
`2020 (“Rouskas Depo.”)
`Declaration of Dr. David Goldschlag in Support of Petitioner’s
`Reply to Patent Owner’s Response (“Second Goldschlag Decl.”)
`
`1021
`
`1022
`
`
`
`- iii -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`
`I.
`
`Introduction
`The Board should find unpatentable all claims of the ’581 patent because
`
`Apple has shown that the prior art renders all claims invalid. MPH raises no new
`
`arguments in its Patent Owner Response (POR), but rather repeats the unavailing
`
`arguments made in its Patent Owner Preliminary Response (POPR). The Board
`
`should again reject those arguments as it did in the Institution Decision.
`
`Essentially, MPH makes one argument as to why the combination of Ishiyama and
`
`Murakawa does not render obvious the claims of the ’581 patent—that Ishiyama’s
`
`“correspondent host” is not a “security gateway.” See POR, 27-45. But the Board
`
`should reject this argument because it is based on an improper and unnecessary
`
`claim construction, mischaracterizes Apple’s contentions, and ignores the
`
`teachings of Ishiyama and Murakawa.
`
`II. The Board Should Reject MPH’s Improper Claim Construction
`
`Disputed Constructions
`Security gateway: Plain and ordinary meaning.
`Apple
`
`MPH
`
`
`
`Security gateway: “gateway that provides additional security
`functionality, such as firewall functionality.” POR, 11.
`
`Gateway: “an intermediary system with two or more communication
`interfaces that interconnects different networks and can forward
`packets it receives from one network on to another network.” POR,
`11.
`
`
`
`- 1 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`The Board should reject MPH’s construction for “security gateway” because
`
`it impermissibly imports limitations from the specification, and there is simply no
`
`need to construe this term. MPH’s construction inappropriately asks the Board to
`
`find that a “security gateway” is not a “host”—presumably, to undermine Apple’s
`
`obviousness position with respect to the term “security gateway.” See POR, 10-24.
`
`But this highlights MPH’s fundamental misunderstanding of Apple’s contentions.
`
`Apple does not contend that all embodiments of Ishiyama’s “correspondent host”
`
`are “security gateways.” Rather, a POSA would have understood that Ishiyama
`
`suggests that its “correspondent host” would instead be a “security gateway.”1
`
`Thus, it is unnecessary to construe “security gateway,” as proposed by MPH. See
`
`EX1022, Second Goldschlag Decl., ¶¶5-6.
`
`There is also no need to construe “security gateway” because there is no
`
`dispute between the parties that “security gateway” functionality was well-known,
`
`especially in the context of IPSec. See EX1022, ¶7. Further, there is no evidence to
`
`support MPH’s arguments that the ’581 patent uses the term in a special way. Id.
`
`Indeed, Dr. Rouskas admitted during his deposition that the ’810 patent (the parent
`
`
`1 There is also no dispute between the parties that the “same system” can act
`
`as a host and a security gateway at the same time. See POR, 16, n.1 (citing
`
`EX2009, ¶70).
`
`
`
`- 2 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`of the ’581 patent having the same specification) uses the term “security gateway”
`
`in its common form as well-understood in the art and as described in the IPSec
`
`specification, RFC 2401. EX1021, Rouskas Depo., 165:17-166:5; 168:9-20.
`
`MPH’s intrinsic evidence also fails. See EX1022, ¶8. MPH contends that the
`
`term “gateway” should be construed as “an intermediary system with two or more
`
`communication interfaces that interconnects different networks and can forward
`
`packets it receives from one network on to another network” and that a “security
`
`gateway” is a “gateway that provides additional security functionality, such as
`
`firewall functionality.” POR, 11. MPH’s primary intrinsic support for these
`
`definitions appears to be the following quote:
`
`Tunnel mode is often used when one or both ends of a SA is a security
`gateway, such as a firewall or a router that implements IPSec . . . . The
`IPSec tunnel mode operates e.g. in such a way that if a host on a
`network generates an IP packet with a destination address of another
`host on another network, the packet is routed from the originating host
`to a security gateway (SGW), firewall or other secure router at the
`boundary of the first network.
`See EX1001, ’581 patent, 3:15-62 (emphasis added).
`
`But this passage simply describes how IPSec tunnel mode operates, not what
`
`a security gateway is. See EX1022, ¶¶9-10. If anything, this passage undercuts
`
`MPH’s construction. MPH suggests that a “security gateway” must have “security
`
`functionality, such as firewall functionality.” POR, 11. But this passage explains
`
`
`
`- 3 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`security gateways simply “implement[] IPSec,” and need not have firewall
`
`functionality because the security gateway can be “a router.” EX1001, 3:15-62.
`
`MPH also cites column 8, lines 55-63, and FIGs. 1-2 for its construction.
`
`But MPH’s reliance on these passages fairs no better because the words “interface”
`
`or “intermediate system” do not appear here either. FIGs. 1-2 are explicitly labeled
`
`as non-limiting “example[s].” Id., 8:36-40. And importantly, these passages use
`
`non-limiting phraseology like “Computer 2 might be a security gateway” and “the
`
`security gateway can be a common security gateway . . . whereby there are several
`
`computers in the LAN protected by computer 2.” Id., 8:51-63. The ’581 patent
`
`does not present any special definition for “security gateway,” instead simply
`
`stating that the “security gateway can be a common security gateway for e.g. a
`
`company LAN.” See id. None of these passages even begin to suggest or require
`
`that a “security gateway” must have at least two interfaces and be an “intermediate
`
`system.” See EX1022, ¶¶11-12.
`
`Next, MPH turns to the prosecution history and various extrinsic references.
`
`See POR, 14-24. But neither the prosecution history nor the extrinsic references
`
`provide a definition of a “security gateway” that requires numerous interfaces, and
`
`MPH does not assert that they do. See EX1022, ¶13. Instead, MPH primarily relies
`
`on the prosecution history and extrinsic references to support its theory that a
`
`
`
`- 4 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`“security gateway” is allegedly not a “host.” Thus, the Board should decline to
`
`construe “security gateway” as proposed by MPH.
`
`III. The Combination of Ishiyama and Murakawa Discloses the Claimed
`“Security Gateway”
`MPH argues that the combination of Ishiyama and Murakawa does not
`
`disclose the claimed “security gateway” based on the assumption that Ishiyama’s
`
`“correspondent host” allegedly is not and cannot be the claimed “security
`
`gateway.” See POR, 27-45. MPH mischaracterizes Apple’s position. Apple
`
`contends that: (1) Ishiyama’s use of IPSec and disclosure of a “correspondent host”
`
`would have made it obvious to a POSA to use a “security gateway;” (2) Ishiyama’s
`
`disclosure of IPSec tunnel mode—most often used with “security gateways”—
`
`would have made it all the more obvious to a POSA to modify Ishiyama’s
`
`“correspondent host” to be a “security gateway;” and (3) if a POSA had not
`
`already known how to implement IPSec tunnel mode, he would have sought out
`
`how to do so, and Murakawa teaches implementing tunnel mode in a “security
`
`gateway.” EX1022, ¶¶14-15.
`
`A.
`
`It would have been obvious to a POSA from Ishiyama’s use of
`IPSec for its correspondent host to be a security gateway because
`IPSec only has a finite number of endpoint configurations.
`MPH cites multiple publications to argue that “hosts” are different from
`
`“security gateways.” See POR, 31-34. But MPH overlooks the fact that these
`
`publications demonstrate that there are only three combinations of network devices
`
`
`
`- 5 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`in the IPSec context. See POR, 31-34; see also EX1022, ¶¶16-18. Specifically, as
`
`Dr. Goldschlag, Frankel, and RFC 2401 all confirm, the endpoint of an IPSec
`
`connection can only ever be a host or a security gateway. See EX1022, ¶¶16-18;
`
`EX1008, Frankel, FIGs. 1.1(a)-1.1(c); EX1011, RFC 2401, 6 (“IPsec can be used
`
`to protect one or more ‘paths’ between a pair of hosts, between a pair of security
`
`gateways, or between a security gateway and a host.”). MPH does not dispute this.
`
`See POR, 37-41; EX2009, Rouskas Decl., ¶¶126-31.
`
`A POSA would have found it obvious for Ishiyama’s “correspondent host”
`
`to be a “security gateway” because Ishiyama’s secure connections are explicitly
`
`directed to IPSec, and there are only two endpoint choices: hosts or security
`
`gateways. See EX1022, ¶19; EX1004, Ishiyama, 7:46-49; EX1011, 6. Using a
`
`security gateway would have merely been an obvious design choice. EX1022, ¶19.
`
`But as explained by Dr. Goldschlag, a POSA would have indeed been motivated to
`
`use a “security gateway” in Ishiyama because, as acknowledged by the ’581 patent,
`
`a very common use case for IPSec is “virtual private networks.” EX1001, 1:62-66;
`
`see also EX1022, ¶¶20-25. And a POSA looking to use Ishiyama’s teachings in the
`
`context of a VPN would have understood that a “security gateway” would almost
`
`certainly be needed. EX1022, ¶¶20-25. In fact, both experts agree that using IPSec
`
`with VPNs was “ubiquitous” at the time of the ’581 patent. EX1021, 33:13-15; see
`
`also EX1022, ¶22. And Dr. Rouskas even concedes that “typically…one end of [a]
`
`
`
`- 6 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`VPN is a security gateway,” although Dr. Goldschlag explains that VPNs almost
`
`always use a “security gateway.” EX1021, 101:1-4 (emphasis added); see also
`
`EX1022, ¶¶20-25.
`
`The fact there are only two choices of endpoints in IPSec demonstrates the
`
`“finite number of identified, predictable solutions” that would lead to a
`
`determination of obviousness under KSR. See KSR Int’l Co. v. Teleflex Inc., 550
`
`U.S. 398, 421 (2007). And under well-settled Federal Circuit precedent, having a
`
`“discrete number of possible design options” illustrates that using one of the
`
`possible design options would have been obvious. See Geo. M. Martin Co. v.
`
`Alliance Mach. Sys. Int’l LLC, 618 F.3d 1294, 1302 (Fed. Cir. 2010).
`
`Thus, because only two endpoint options were available to a POSA for
`
`implementing IPSec connections, a POSA would have found it obvious to
`
`configure Ishiyama’s secure connection to be between a host and a security
`
`gateway. See EX1022, ¶¶16-19.
`
`B. A POSA would have understood that Ishiyama’s use of tunnel
`mode suggests that its correspondent host would be a security
`gateway.
`Ishiyama’s disclosure of IPSec “tunnel mode” would have further suggested
`
`to a POSA that Ishiyama’s “correspondent host” would be a “security gateway.”
`
`MPH, Dr. Rouskas, and the ’581 patent all concede that “although tunnel mode
`
`may also be used for end-to-end communication between two hosts[,] [t]unnel
`
`
`
`- 7 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`mode is often used when one or both ends of a SA is a security gateway, such as a
`
`firewall or a router that implements IPSec.” EX1001, 3:19-30 (emphasis added);
`
`EX2009, ¶¶66, 128-29. Indeed, Dr. Rouskas concedes he has never once used
`
`IPSec tunnel mode between two hosts in his entire career despite extensive IPSec
`
`use:
`
`Q: So in all the instances where you personally have used IPSec,
`you have only ever used IPSec tunnel mode with security gateway
`being one of the endpoints. Right?
`A: So I have been using IPSec for, you know, more than 20 years.
`But to the best of my recollection that is right, I have only used it when
`one of endpoints is security gateway.
`EX1021, 111:21-112:9.
`
`Dr. Rouskas further admits that “IPSec tunnel mode [is] more often [used]
`
`when one endpoint is a security gateway.” Id., 113:7-9. And as explained by the
`
`IPSec standard, “[w]henever either end of a security association is a security
`
`gateway, the SA MUST be tunnel mode.” EX1011, 9. Thus, the most common
`
`scenario of tunnel mode is with a security gateway. See EX1022, ¶¶26-28.
`
`Nevertheless, MPH argues that Ishiyama is only a host-to-host scenario. See
`
`POR, 37-43; EX2009, ¶¶128-33. But MPH misses the point. Ishiyama’s disclosure
`
`of tunnel mode would have suggested to a POSA that Ishiyama’s correspondent
`
`host would be a “security gateway” for the reasons noted above. See EX1022,
`
`¶¶26-30. And MPH is wrong that Ishiyama’s tunnel mode is limited to host-host
`
`
`
`- 8 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`communications because of an alleged desire in Ishiyama to not “reveal” the
`
`“original home address” of the mobile terminal. POR, 41-42. Notably, MPH does
`
`not provide any citation to Ishiyama for this proposition, instead relying solely on
`
`expert testimony. See id. But Dr. Rouskas just repeats the same conclusory
`
`statements. See id. (citing EX2009, ¶133).
`
`Moreover, MPH overlooks an important teaching of Ishiyama. Regarding
`
`tunnel mode, Ishiyama acknowledges that one if its endpoints is a gateway: “the IP
`
`address (CoA) assigned to the communication interface 21 will be used as an
`
`address (gateway address) indicating one endpoint (termination endpoint) of the
`
`tunnel.” EX1004, 8:1-6 (emphasis added); see also EX1004, 8:43-49, 11:39-47,
`
`12:50-59, 14:11-16; see also EX1022, ¶¶31-32.
`
`Thus, Ishiyama not only suggests using a “security gateway” because it
`
`discloses using IPSec tunnel mode, but also explicitly states that its host is a
`
`gateway.
`
`C. A POSA would have sought out references such as Murakawa for
`its teaching of tunnel mode implementation
`MPH argues that a POSA would not have been motivated to combine
`
`Ishiyama and Murakawa. But MPH’s argument mischaracterizes Ishiyama and
`
`attempts to categorize the Petition’s position as an “inherency theory.” See POR,
`
`37-42. As the Board acknowledged, the Petition’s ground is based on
`
`obviousness—not anticipation. See Pet., 17-26, 35-40; see also Decision on
`
`
`
`- 9 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`Institution (DI), 34-35; see also EX1002, Goldschlag Decl., ¶¶56-61, 64-68, 84-90.
`
`Specifically, the Petition explains that Ishiyama’s tunnel mode would suggest that
`
`the correspondent host would be a security gateway based on obviousness
`
`principles. See Pet., 17-18, 20, 22-23, 25-26, 36-37; DI, 34-35. But Ishiyama’s
`
`description of tunnel mode is terse, and thus if a POSA had not understood how to
`
`implement tunnel mode with Ishiyama’s teachings, he would have sought out
`
`references such as Murakawa that explain how tunnel mode is implemented. See
`
`Pet., 17-26, 35-40; EX1022, ¶¶33-38.
`
`The Board correctly noted that the Petition relies on Murakawa for the
`
`explicit teaching of the “security gateway” and “other terminal.” DI, 38-39. And as
`
`the Petition explains, a POSA would have been motivated to combine Ishiyama
`
`with Murakawa to facilitate network communications with a mobile terminal. See
`
`Pet., 17-20, 37-40 (citing EX1004, 6:56-57).
`
`Thus, the Petition explains how Ishiyama and Murakawa would be
`
`combined in a predictable manner such that a secure connection would be created
`
`between a mobile terminal and a security gateway.
`
`IV. Nothing in the Prior Art Precludes Ishiyama’s “Correspondent Host”
`from Operating as a “Security Gateway”
`MPH argues that Ishiyama’s “correspondent host” cannot be a “security
`
`gateway” because Ishiyama’s correspondent host allegedly only has a single
`
`interface. POR, 30-34. MPH also contends that Ishiyama’s description of Security
`
`
`
`- 10 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`Databases and Correspondent Node (CN) addresses precludes its correspondent
`
`host from being a gateway. See id., 34-37. Both of these theories are wrong
`
`because they overlook that: (1) Ishiyama explicitly refers to its correspondent host
`
`as a “gateway”; and (2) the proposed combination addresses any alleged
`
`deficiencies of Ishiyama’s correspondent host. See EX1022, ¶¶39-47.
`
`First, Ishiyama repeatedly refers to its correspondent host as a “gateway.”
`
`And because there is no dispute that Ishiyama’s correspondent host implements
`
`IPSec—security functionality—it is thus a “security gateway.” For example,
`
`Ishiyama refers to its tunnel mode IPSec communication addresses as “gateway
`
`addresses.” EX1004, 8:1-6. These gateway addresses indicate “one endpoint
`
`(termination endpoint) of the tunnel.” Id., 8:1-6. Ishiyama also describes “CoA
`
`updating,” where the “correspondent host 3” updates a “gateway address” when a
`
`mobile terminal moves to another network. Id., 8:66-9:10. Further, Ishiyama
`
`explicitly refers to this process as a “SA Gateway Update,” where the mobile
`
`device transmits a “[r]equest for changing the security association to the
`
`correspondent.” Id., 11:39-47. Ishiyama also describes an embodiment where the
`
`“SA Gateway Update” includes updating the contents “at the correspondent host
`
`‘CN’” to update the SA. Id., 12:50-59. Thus, Ishiyama repeatedly refers to
`
`updating the correspondent host as updating the “SA Gateway,” further
`
`
`
`- 11 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`demonstrating that it would have been obvious to a POSA for the correspondent
`
`host to be a security gateway.
`
`Second, MPH’s argument that Ishiyama’s correspondent host only has a
`
`single interface is wrong. As an initial matter, this argument relies on MPH’s
`
`improper construction for “security gateway,” explained above. More importantly,
`
`MPH’s argument overlooks Apple’s proposed combination.
`
`Apple contends an obvious implementation of Ishiyama’s correspondent
`
`host would have been a “security gateway” because “security gateways” are
`
`commonly used with IPSec, and in fact usually used with IPSec tunnel mode. See
`
`EX1001, 3:19-30; EX1011, 9; EX1022, ¶¶26-28, 41. MPH does not suggest that its
`
`construction for “security gateway” is some special meaning dictated by the ’581
`
`patent. In fact, MPH suggests that its construction of “security gateway” is
`
`allegedly consistent with its common use in the art, including the IPSec standard.
`
`See POR, 15-33; EX2009, ¶¶71-90; see also EX2009, ¶¶84-89 (citing EX1011 (the
`
`IPSec standard)). This same IPSec standard, including its descriptions of “security
`
`gateways,” would have caused a POSA to understand that Ishiyama suggests the
`
`use of “security gateways.” Thus, the “security gateway” suggested by Ishiyama
`
`would have the same features and functionality of “security gateway” proposed by
`
`Dr. Rouskas and MPH—because they are both based on the same description of
`
`“security gateways” in the IPSec standard.
`
`
`
`- 12 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`Finally, MPH’s arguments regarding Ishiyama’s “Security Databases” again
`
`focuses on an incorrect understanding of Apple’s combination. MPH argues that
`
`Ishiyama’s description of security policy databases allegedly proves that the
`
`correspondent host is not a security gateway. POR, 35-37. MPH similarly argues
`
`that Ishiyama’s description of a destination address potentially being “CN”
`
`precludes Ishiyama from operating as a security gateway. See id., 34-37. These
`
`arguments, however, incorrectly focus on narrow embodiments and fail to
`
`recognize how a POSA would have understood Ishiyama’s teachings as used in a
`
`security gateway. See EX1022, ¶¶42-47.
`
`Specifically, while Ishiyama describes a “security policy database (SPD)”
`
`and a “security association database (SAD),” nothing precludes these elements
`
`from being used in a common security gateway configuration, such as described by
`
`Murakawa. See Section III.C. In fact, the IPSec standard, as acknowledged by Dr.
`
`Rouskas, requires the use of these components to implement IPSec. See EX1011,
`
`13; see also EX1021, 89:8-15 (“A: An SAD database is required under RFC 2401.
`
`Q: Are there any other databases that RFC 2401 requires . . . ? A: Yes; it’s the
`
`security policy database [SPD].”). Security gateways are also required to have at
`
`least “one pair of SADs and one pair of SPDs.” EX1011, 13.
`
`Further, Ishiyama’s description of a destination address potentially being
`
`“CN” is just one possible implementation and does not preclude Ishiyama’s
`
`
`
`- 13 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`correspondent host from operating as a security gateway or being combined with
`
`Murakawa. See EX1022, ¶¶44-47. Indeed, this was acknowledged by the Board.
`
`DI, 36. And as admitted by Dr. Rouskas and MPH, it was well-known that devices
`
`could operate as both hosts and security gateways. See POR, 16, n.1 (citing
`
`EX2009, ¶70.).
`
`Regardless, the Board has already considered this argument and indicated
`
`that “Patent Owner does not identify any portion of Ishiyama that sufficiently
`
`criticizes, discredits, or otherwise discourages having Ishiyama’s correspondent
`
`host be a security gateway.” DI, 37. MPH still has not done so. Thus, nothing in
`
`Ishiyama or the prior art precludes the functionality described in Ishiyama from
`
`being implemented in a “security gateway.”
`
`V. The Combination of Ishiyama and Murakawa Teaches the “Other
`Terminal”
`MPH argues that the Petition does not explain how the combination of
`
`Ishiyama and Murakawa would operate with the “other terminal,” and thus does
`
`not teach the “other terminal.” See POR, 45-54. But this is simply incorrect. The
`
`Petition explicitly presents how Ishiyama and Murakawa would be combined and
`
`teach the “other terminal.” See Pet., 26-40.
`
`The Petition explains that Ishiyama teaches a mobile terminal moving from a
`
`first address to a second address. See id., 26-30. Ishiyama further teaches that the
`
`mobile terminal transmits a message to change the security association definition
`
`
`
`- 14 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`from CoA1 to CoA2. See id., 31-34. These operations would have been performed
`
`at a security gateway, such as the security gateway described by Murakawa. See
`
`id., 24-26. Both systems apply the IPSec tunnel mode protocol, and a POSA would
`
`have easily implemented Ishiyama’s address changing functionality with
`
`Murakawa’s security gateway. See, e.g., Pet., 39-40; see also EX1002, ¶87-90.
`
`Messages would then be communicated between the mobile terminal and
`
`“other terminals” via the security gateway, as depicted in FIG. 5 of Murakawa,
`
`consistent with IPsec tunnel mode operation with security gateways. See, e.g., Pet.,
`
`39-40; see also EX1002, ¶86-90. Indeed, as Dr. Rouskas explained, when IPSec
`
`tunnel mode is used with security gateways, it is for the explicit purpose of
`
`tunneling packets to “other terminals.” See EX1021, 122:7-18 (“Yes, typically that
`
`is what happens. Packets [are] IPSec process[ed] at the gateway, and then
`
`forwarded to another host.”). Murakawa confirms this by describing the presence
`
`of “other terminals” and that a security gateway would forward messages from the
`
`mobile terminal to these other terminals. See Pet., 37-40. Thus, the combination of
`
`Ishiyama and Murakawa teaches the “other terminals.”
`
`Mischaracterizing this combination, MPH alleges that “[i]ncorporating
`
`Murakawa’s security gateway 103 into Ishiyama does not fill in the missing
`
`limitation of the ‘other terminal’ because no host computer has been incorporated
`
`from Murakawa.” POR, 49. But MPH ignores Murakawa’s clear disclosure of
`
`
`
`- 15 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`communication between a security gateway and an “other terminal.” See EX1005,
`
`FIG. 5.
`
`EX1005, FIG. 5 (annotated).
`
`
`
`MPH also argues that “the security gateway 103 and computer 106
`
`illustrated in Murakawa’s FIG. 5 could not be combined into [Ishiyama’s] address
`
`changing system . . . .” POR, 53. But the Petition does not present this
`
`combination. Rather, the Petition and Dr. Goldschlag explain that Ishiyama’s
`
`address changing functionality would have been incorporated into security
`
`
`
`- 16 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`gateways (which provide communications between different terminals) such as the
`
`one depicted in Murakawa. See Pet., 39-40; see EX1022, ¶¶48-56.
`
`MPH never addresses this combination. MPH instead invents a different
`
`combination and argues that “Ishiyama’s security policy databases (Figures 8A-
`
`8B) and the security association databases (Figures 9A-9D) would not operate if
`
`the components of Murakawa were inserted in place of Ishiyama’s correspondent
`
`host.” POR, 53. This statement mischaracterizes the combination and ignores the
`
`combinability of security gateways with other devices, e.g., databases. See
`
`EX1022, ¶56. Ishiyama’s description of SPDs and SADs does not preclude the
`
`operation of a security gateway also implementing these components. See id.
`
`Indeed, the IPSec standard requires SPDs and SADs for any device implementing
`
`IPSec. See EX1011, 13; see EX1022, ¶56. Thus, nothing in Ishiyama or Murakawa
`
`precludes this combination, and this combination teaches the “other terminal.”
`
`VI.
`
`Ishiyama Teaches the Mobile Terminal Transmitting a Message While
`at a Second Address to Change the Definition of a Security Association
`As the Petition explains, Ishiyama describes a mobile computer changing
`
`from address CoA1 to CoA2. See Pet., 30. The mobile computer then performs a
`
`“SA Gateway Update” operation, including a request to change the security
`
`association and the endpoint of the IPSEC tunnel. See id., 31-33. As seen from
`
`FIGs. 9B and 9D of Ishiyama, database entries for the security association are then
`
`updated to reflect the address change. See Pet., 33-34; EX1022, ¶¶57-59.
`
`
`
`- 17 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`MPH argues that this change would occur at a “host,” not a “security
`
`gateway.” POR, 54-55. But as correctly acknowledged by the Board, the update
`
`being performed by a host is merely one embodiment of Ishiyama. See DI, 36. This
`
`description shows that Ishiyama teaches the movement of a mobile terminal, the
`
`transmission of a request to update the endpoint of an IPSEC tunnel, and that
`
`updating occurring at the other endpoint of the IPSEC tunnel. See Pet., 31-34.
`
`Murakawa provides the explicit recitation of a security gateway being this other
`
`endpoint, thus rendering these claim elements obvious. See id., 18-20.
`
`VII. The Combination of Ishiyama and Murakawa Teaches the
`“Request”/“Reply” Messages Being Encrypted as Recited in Claim 4.
`Regarding claim 4, MPH argues that the request message transmitted by
`
`Ishiyama’s mobile terminal is not encrypted because “Ishiyama does not specify a
`
`format for the SA gateway update signal in step (5)” and alleges that this signal
`
`would not be encrypted. See POR, 62. But MPH mischaracterizes the teachings of
`
`Ishiyama, and is contradicted by their own expert.
`
`Ishiyama explains that “[i]n the tunnel mode IPSEC communications, the
`
`packet encapsulation and the encryption/decryption of the inner packet are carried
`
`out and the IPSEC module 22 [of mobile unit 2] has functions for realizing such
`
`encapsulation and encryption/decryption processing.” EX1004, 7:56-60. The
`
`mobile unit then uses this IPSEC module to transmit an “encapsulated packet” via
`
`the IPSEC tunnel to update the address at the other endpoint. Id., 8:55-9:10. By
`
`
`
`- 18 -
`
`

`

`Case IPR2019-00820
`U.S. Pat. No. 7,937,581
`using IPSec to perform the update, the packet and the request message are
`
`encrypted. See EX1022, ¶¶60-62; see also EX1011, 4 at § 2.1, 6-7 at §§ 3.1-3.2.
`
`Dr. Rouskas even confirmed this during his deposition. EX1021, 175:19-176:2
`
`(“So, yes, the payload of that packet is encrypted.”).
`
`VIII. The Combination of Ishiyama, Murakawa, and Ahonen Renders Claims
`3 and 5 Obvious
`The Petition recites tw

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket