`
`
`
`NOTE: This disposition is nonprecedential.
`
`United States Court of Appeals
`for the Federal Circuit
`______________________
`
`APPLE INC.,
`Appellant
`
`v.
`
`MPH TECHNOLOGIES OY,
`Appellee
`______________________
`
`2021-1387
`______________________
`
`Appeal from the United States Patent and Trademark
`Office, Patent Trial and Appeal Board in No. IPR2019-
`00821.
`
`______________________
`
`Decided: January 25, 2022
`______________________
`
`SETH W. LLOYD, Morrison & Foerster LLP, Washing-
`ton, DC, argued for appellant. Also represented by BRIAN
`ROBERT MATSUI, JOSEPH R. PALMORE, MICHAEL QIAN;
`RICHARD HUNG, San Francisco, CA; BITA RAHEBI, Los An-
`geles, CA.
`
` BRIAN ERIK HAAN, Lee Sheikh Megley & Haan LLC,
`Chicago, IL, argued for appellee. Also represented by
`ASHLEY E. LAVALLEY, CHRISTOPHER LEE, RICHARD BURNS
`
`
`
`Case: 21-1387 Document: 31 Page: 2 Filed: 01/25/2022
`
`2
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`MEGLEY, JR.; JAMES CARMICHAEL, STEPHEN TERRY
`SCHREINER, Carmichael IP, PLLC, Tysons Corner, VA.
` ______________________
`
`Before LOURIE, HUGHES, and CUNNINGHAM, Circuit
`Judges.
`
`LOURIE, Circuit Judge.
`Apple Inc. (“Apple”) appeals from the final written de-
`cision of the Patent Trial and Appeal Board (the “Board”)
`holding that Apple failed to demonstrate that claims 1–16
`of U.S. Patent 8,037,302 (the “’302 patent”) were unpatent-
`able. See Apple Inc. v. MPH Technologies Oy, No. IPR2019-
`00821, 2020 WL 5900607 (P.T.A.B. Oct. 5, 2020) (“Deci-
`sion”). For the reasons provided below, we affirm.
`BACKGROUND
`MPH Technologies Oy (“MPH”) owns the ’302 patent,
`which relates to providing secure connections in telecom-
`munication networks. The specification explains that IP
`security protocols (“IPSec”) provide the capability to secure
`connections through encryption and authentication. ’302
`patent, col. 1 ll. 38–49. A security association is a relation-
`ship between a sender and receiver that offers security ser-
`vices to the traffic carried on it. Id. at col. 1 ll. 62–67. The
`specification states that IPSec was designed for use with
`hosts that are relatively static. Id. at col. 2 ll. 19–49. IP
`routing for telecommunication is based on fixed IP ad-
`dresses, so IPSec may not work well with mobile devices.
`Id. If a mobile host moves from one network to another, a
`time-consuming IPSec connection set up is required. Id.
`The patent discloses avoiding the need to set up an IPSec
`connection when a mobile terminal changes networks by
`relying on a security association that is already estab-
`lished. See, id., at col. 10 ll. 39–43; col. 10 ll. 51–56.
`Claim 1, the sole independent claim, reads as follows:
`
`
`
`Case: 21-1387 Document: 31 Page: 3 Filed: 01/25/2022
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`3
`
`1. A method for ensuring secure forwarding of a
`message in a telecommunication network, compris-
`ing:
`providing a first terminal from which the message
`is sent and a second terminal to which the message
`is sent,
`a) establishing a first secure connection as
`being an active connection and extending
`between a first network address of the first
`terminal and an original network address
`of the second terminal, establishing a sec-
`ond secure connection extending between a
`second network address of the first termi-
`nal and the original network address of the
`second terminal,
`b) the first terminal changing from the first
`network address to the second network ad-
`dress,
`the first terminal checking whether the
`second secure connection already exists,
`and
`c) when the second secure connection al-
`ready exists, the second terminal register-
`ing the already established second secure
`connection as being the active connection
`without having to reestablish the second
`secure connection.
`’302 patent, col. 12 ll. 15–34 (emphasis added).
`Apple filed a petition for inter partes review of
`claims 1–16 of the ’302 patent. Apple argued that
`claims 1–13 and 16 would have been obvious over Int’l Pa-
`tent Pub. WO 01/54379 A1 (“Ahonen”) in view of U.S. Pa-
`tent 6,904,466 (“Ishiyama”). J.A. 38, 44. Apple also argued
`that claims 14 and 15 would have been obvious over
`
`
`
`Case: 21-1387 Document: 31 Page: 4 Filed: 01/25/2022
`
`4
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`Ahonen and Ishiyama in view of a conference proceeding
`publication titled “Complete Computing” (“Gupta”).1 Id. at
`45.
`The parties initially identified the term “establishing a
`. . . secure connection” for construction. Decision, 2020 WL
`5900607, at *4 (the “establishing limitation”). MPH sug-
`gested that the establishing limitation should be construed
`to require forming or creating a new secure connection, and
`Apple agreed. Id.; J.A. 320. Specifically, Apple stated that
`the parties agreed on the claim construction for the estab-
`lishing limitation but disputed its application to the prior
`art references. J.A. 319–20.
`Although Apple agreed to MPH’s proposal, MPH noted
`the possibility that construction of the establishing limita-
`tion was still in dispute. Specifically, MPH argued that es-
`tablishing a security association does not
`include
`modifying or activating a security association. J.A. 352–
`61. During the hearing on July 17, 2020, the Board asked
`Apple to explain its position regarding construction of the
`establishing limitation. Apple’s counsel reaffirmed its be-
`lief that the plain and ordinary meaning, “forming or cre-
`ating a new secure connection,” should apply. J.A. 416–17.
`The Board thus construed “establishing a . . . secure con-
`nection” as meaning “forming or creating a new secure con-
`nection.” Decision, 2020 WL 5900607, at *4.
`The Board’s determination regarding obviousness
`hinged on whether Ahonen taught the establishing limita-
`tion. Id. at *6, *9. During its analysis, the Board stated
`that the establishing limitation has two requirements:
`“that the secure connection is established (i) as ‘extending
`between a first network address of the first terminal and
`
`
`1 Vipul Gupta, et al., Complete Computing,
`WWCA ’98 Proc. 2D Int’l Conf. on Worldwide Computing
`and Its Applications (Mar. 4–5, 1998).
`
`
`
`Case: 21-1387 Document: 31 Page: 5 Filed: 01/25/2022
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`5
`
`an original network address of the second terminal’ and
`(ii) ‘as being an active connection.’” Id. at *6. “[T]he first
`requirement is met by ‘forming or creating a new secure
`connection’ between the claimed addresses.” Id. For the
`second requirement, the Board analyzed the ’302 patent
`and determined that “the claim language requires that
`when the first secure connection is established, it is regis-
`tered as being an active connection.” Id. The Board con-
`cluded that “a secure connection [is] established as an
`active connection (i.e., being available for immediate use
`when the secure connection is formed) [but] does not re-
`quire immediate use.” Id. at *7.
`The Board agreed with MPH that Ahonen fails to teach
`the establishing limitation. The Board determined that
`“Ahonen fails to teach that the first secure connection is
`registered as being an active connection when the first se-
`cure connection is formed.” Id. at *8. The Board explained
`that Ahonen teaches creating a security association during
`a preparations stage and that a remote mobile user may
`remotely activate the preexisting connection during a re-
`mote control stage. Id. Thus, when the Ahonen secure con-
`nection is formed, it is not active.
`In making this determination, the Board relied in part
`on Ahonen’s teachings about remote control flag operation.
`Ahonen explains that information about each of the secu-
`rity associations can include a remote control flag indicat-
`ing whether the security association has been activated by
`a mobile host from outside the intranet. Id. at *9 (citing
`’302 patent, col. 15 ll. 15–16; col. 15 l. 31–col. 16 l. 2). A re-
`mote control flag is initially set to “Off” during the prepa-
`rations stage and is changed to “On” when remotely
`activated by a mobile user. Id. An “Off” flag means that
`the security association has not been activated by the re-
`mote control function. Id. The flag is set to “On” after the
`firewall receives a valid control authorization certificate
`from the mobile host. Id. (citing ’302 patent, col. 17 ll. 1–
`32).
`
`
`
`Case: 21-1387 Document: 31 Page: 6 Filed: 01/25/2022
`
`6
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`The Board credited MPH’s expert’s opinion, which
`stated that a person of skill in the art would understand
`the establishing limitation “to mean that the first secure
`connection is established as an active connection for imme-
`diate use, as opposed to an inactive connection reserved for
`later use.” Id. at *6. MPH’s expert stated that “the term
`not only requires creating or forming a new secure connec-
`tion, but also creating or forming a new secure connection
`as being an active connection.” Id. The Board found MPH’s
`expert’s opinion “consistent with the plain and ordinary
`meaning of the limitation’s claim language and the ’302 pa-
`tent’s [s]pecification.” Id. at *7. In contrast, the Board
`gave Apple’s expert’s opinion little weight, finding that tes-
`timony “contrary to the plain claim language and the
`[s]pecification’s teachings,” “contrary to Ahonen’s teach-
`ings,” and “without sufficient factual corroboration.” Id.
`at *8, *9.
`The Board concluded that Apple failed to show by a pre-
`ponderance of the evidence that claims 1–16 of the ’302 pa-
`tent are unpatentable. Id. at *9. Apple appealed. We have
`jurisdiction under 28 U.S.C. § 1295(a)(4)(A).
`DISCUSSION
`We review the Board’s legal determinations de novo, In
`re Elsner, 381 F.3d 1125, 1127 (Fed. Cir. 2004), but we re-
`view the Board’s factual findings underlying those deter-
`minations for substantial evidence, In re Gartside, 203 F.3d
`1305, 1316 (Fed. Cir. 2000). A finding is supported by sub-
`stantial evidence if a reasonable mind might accept the ev-
`idence as adequate to support the finding. Consol. Edison
`Co. v. NLRB, 305 U.S. 197, 229 (1938).
`Apple raises two challenges on appeal. First, Apple
`contends that the Board erred in construing the establish-
`ing limitation. Second, Apple argues that the Board’s de-
`termination that Ahonen fails to disclose the establishing
`limitation is unsupported by substantial evidence.
`
`
`
`Case: 21-1387 Document: 31 Page: 7 Filed: 01/25/2022
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`7
`
`I
`We first consider Apple’s claim construction challenge.
`Claim construction is a matter of law that we review de
`novo. See Poly-America, L.P. v. API Indus., Inc., 839 F.3d
`1131, 1135–36 (Fed. Cir. 2016).
`Apple argues that the Board erred in construing the es-
`tablishing limitation. Apple contends that the Board im-
`properly narrowed the establishing limitation by including
`a timing restriction and by excluding embodiments where
`a new connection is created by modifying an existing con-
`nection. Apple argues that the claims do not restrict when
`or how a secure connection becomes active. Apple contends
`that activating a secure connection can take place sepa-
`rately in time from when a connection is first formed and
`that an existing connection can be modified to establish a
`connection as active.
`MPH responds that Apple failed to raise its claim con-
`struction arguments before the Board. MPH contends that
`Apple informed the Board that the only dispute before it
`was the application of the agreed-upon construction to the
`prior art. MPH thus argues that Apple’s failure to raise its
`claim construction arguments before the Board compels a
`finding of forfeiture. See In re Google Tech. Holdings LLC,
`980 F.3d 858, 862–63 (Fed. Cir. 2020) (interpreting the
`U.S.P.T.O.’s waiver argument as a forfeiture argument).
`Additionally, MPH argues that the Board did not impose
`unnecessary restrictions into the establishing limitation.
`MPH contends that the Board properly adopted the parties’
`agreed-upon construction of the establishing limitation,
`analyzed and applied the plain and ordinary meaning of
`the limitation, and found that Ahonen’s remote activation
`of a preexisting and inactive security association does not
`meet the establishing limitation of claim 1.
`We agree with MPH that, contrary to Apple’s position
`on appeal, Apple only disputed the application of the
`agreed construction to the prior art. In its reply brief to
`
`
`
`Case: 21-1387 Document: 31 Page: 8 Filed: 01/25/2022
`
`8
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`MPH’s response, Apple stated that construction of the es-
`tablishing limitation was not at issue–only the factual ap-
`plication of the construction to Ahonen’s teachings. In
`response to questioning at the hearing concerning whether
`claim construction was in dispute, Apple maintained that
`the parties agreed on the construction of the establishing
`limitation and argued only about the application of the con-
`struction to Ahonen. Furthermore, Apple does not argue
`that the Board engaged in sua sponte construction or that
`there are exceptional circumstances that justify departing
`from the forfeiture principle.
`It is clear from the record that Apple chose not to char-
`acterize its dispute concerning the establishing limitation
`as a claim construction issue before the Board. Apple at-
`tempts here, in contrast, to recharacterize that same dis-
`pute as a construction issue deserving of de novo review.
`MPH’s expert’s declaration put Apple on notice that MPH
`was taking the position that a person of skill would under-
`stand the establishing limitation “to mean that the first se-
`cure connection is established as an active connection for
`immediate use, as opposed to an inactive connection re-
`served for later use.” See Decision, 2020 WL 5900607,
`at *6–7; J.A. 2028. With the knowledge of MPH’s position,
`Apple continued to maintain that there was no further dis-
`pute concerning construction of the establishing limitation.
`After the Board agreed with MPH and MPH’s expert, how-
`ever, Apple changed its strategy and characterized the is-
`sue as a claim construction dispute. We do not encourage
`“suggesting or permitting, for strategic reasons, that [the
`Board] pursue a certain course, and later—if the outcome
`is unfavorable—claiming that the course followed was re-
`versible error.” Google, 980 F.3d at 864 (internal quotation
`marks omitted).
`We conclude that Apple forfeited its arguments as to
`the construction of the establishing limitation because Ap-
`ple failed to raise these legal arguments before the Board.
`In the absence of exceptional circumstances, we decline to
`
`
`
`Case: 21-1387 Document: 31 Page: 9 Filed: 01/25/2022
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`9
`
`address the merits of Apple’s proposed constructions. See
`id. at 862–63.
`
`II
`We next consider Apple’s assertion that the Board’s de-
`termination was unsupported by substantial evidence. Ap-
`ple first argues that, under its proposed construction of the
`establishing limitation, the Board’s finding that Ahonen
`fails to disclose the establishing limitation is unsupported
`by substantial evidence. But since we do not consider Ap-
`ple’s new claim construction arguments on appeal, we need
`not consider the merits of arguments that depend on the
`adoption of those constructions.
`Apple also contends that the Board erred by using a
`truncated obviousness analysis. Apple argues that the
`Board merely identified a timing difference between Aho-
`nen and the claims and ended its analysis without consid-
`ering whether that difference was a predictable variation.
`Apple argues that the claims were a trivial variation of the
`prior art, the result of a routine design choice, and a choice
`between two well-known options. Apple states that “a pa-
`tent can be obvious in light of a single prior art reference if
`it would have been obvious to modify that reference to ar-
`rive at the patented invention.” Appellant’s Br. at 38 (cit-
`ing Monsanto Tech. LLC v. E.I. DuPont de Nemours & Co.,
`878 F.3d 1336, 1346 (Fed. Cir. 2018)). MPH counters that
`Apple failed to raise these obviousness theories before the
`Board.
`We agree with MPH. First, Apple’s underdeveloped ar-
`gument that the Board erred by conducting a truncated
`analysis is not persuasive. Apple fails to identify any par-
`ticular error made by the Board in considering the differ-
`ences between the claims and the prior art. The Board
`determined that the claim language “tethers the timing of
`registering the connection as an active connection to when
`the secure connection is formed,” Decision, 2020 WL
`5900607, at *7, and that “Ahonen fails to teach that the
`
`
`
`Case: 21-1387 Document: 31 Page: 10 Filed: 01/25/2022
`
`10
`
`APPLE INC. v. MPH TECHNOLOGIES OY
`
`first secure connection is registered as being an active con-
`nection when the first secure connection is formed,” id. at
`*8. Although Apple argues that the Board did not suffi-
`ciently consider differences between the claims and the
`prior art, Apple’s generalized accusations are not enough
`to identify reversible error. Apple’s disagreement with the
`Board’s interpretation of Ahonen does not amount to a
`demonstration that the Board failed to conduct a proper
`obviousness analysis.
`Second, Apple argues for the first time that it would
`have been trivial to modify Ahonen to incorporate the
`claimed activation timing. Before the Board, Apple argued
`that Ahonen “explicitly teaches” the establishing limita-
`tion. See id. In its petition, Apple stated that “[t]he ’302
`patent presents a trivial solution to [a] problem that was
`already well-known,” but argued that “Ahonen . . . explic-
`itly disclosed this approach.” J.A. 42–43 (emphasis
`added). Apple did not present a single reference obvious-
`ness ground to the Board; thus, Apple’s arguments are un-
`timely. Again, we decline to consider obviousness theories
`that are raised for the first time on appeal.
`CONCLUSION
`We have considered Apple’s remaining arguments, but
`we find them unpersuasive. Accordingly, we affirm the
`Board’s final written decision upholding the patentability
`of the claims of the challenged patent.
`AFFIRMED
`
`