throbber
Case IPR2019-00821
`Patent 8,037,302
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`MPH TECHNOLOGIES OY,
`Patent Owner.
`______________________
`
`Case IPR2019-00821
`Patent 8,037,302
`____________
`
`PATENT OWNER’S PRELIMINARY RESPONSE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`TABLE OF CONTENTS
`
`Case IPR2019-00821
`Patent 8,037,302
`
`
`Page
`
`I.
`
`INTRODUCTION ......................................................................................... 1
`
`II.
`
`THE AHONEN PRIMARY REFERENCE AND THE ’302 PATENT
`DISCLOSE FUNDAMENTALLY DIFFERENT ARCHITECTURES .. 2
`
`A. Overview Of The ’302 Patent ............................................................... 2
`
`B.
`
`Overview Of Ahonen ............................................................................ 5
`
`III. CLAIM CONSTRUCTION (ALL CLAIMS, ALL GROUNDS) ............. 7
`
`A.
`
`[First][Second] Secure Connection” Requires
`“Establishing A
`Forming A New Secure Connection ..................................................... 8
`
`B.
`
`Claim 1 Requires That Steps [a], [b], And [c] Be In Recited Order ...13
`
`IV. THE PETITION FAILS TO SHOW A REASONABLE LIKELIHOOD
`THAT THE AHONEN-ISHIYAMA COMBINATIONS RENDER THE
`CLAIMS OBVIOUS (ALL CLAIMS, ALL GROUNDS) .......................18
`
`A. Ahonen Does Not Disclose “Establishing A Second Secure
`Connection” As Recited In Claim 1 ....................................................19
`
`B.
`
`C.
`
`Ahonen Does Not Disclose Performing Steps [a], [b], And [c] Recited
`In Claim 1 In Their Required Order ....................................................26
`
`The Proposed Combination Of Ahonen And Ishiyama Does Not
`Disclose “The First Terminal Checking Whether The Second Secure
`Connection Already Exists” ................................................................30
`
`1.
`
`2.
`
`“Checking Whether The Second Secure Connection Already
`Exists” Is Not Performed By Ahonen’s Alleged “First
`Terminal” As The Claims Require ...........................................31
`
`The Ahonen-Ishiyama Combination Does Not Disclose
`“Checking Whether The Second Secure Connection Already
`Exists” At All ............................................................................40
`
`
`
`i
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`
`V.
`
`INSTITUTION SHOULD BE DENIED UNDER § 314(a) BECAUSE
`THE PETITION IS ENTWINED WITH INAPPROPRIATE AND
`FALSE INEQUITABLE CONDUCT-TYPE ARGUMENTS .................43
`
`A.
`
`B.
`
`C.
`
`The International Search Report Citing Ahonen Was Submitted To
`And Acknowledged By The Examiner ...............................................43
`
`The International Search Report Determined Ahonen Was “Not
`Considered To Be Of Particular Relevance” ......................................46
`
`The Board Should Deny The Petition Because Of Its Inappropriate
`Reliance On Inequitable Conduct-Type Allegations ..........................46
`
`VI. CONCLUSION ............................................................................................51
`
`
`
`
`
`
`
`
`
`
`
`ii
`
`

`

`TABLE OF AUTHORITIES
`
`Case IPR2019-00821
`Patent 8,037,302
`
`
`Page(s)
`
`CASES
`
`Cont’l Circuits LLC v. Intel Corp.,
`915 F.3d 788 (Fed. Cir. 2019) ............................................................................12
`
`Harmonic Inc. v. Avid Tech., Inc.,
`815 F.3d 1356 (Fed. Cir. 2016) ..........................................................................47
`
`MFormation Techs., Inc. v. Research in Motion Ltd.,
`764 F.3d 1392 (Fed. Cir. 2014) ................................................................... 14, 16
`
`
`
`ADMINISTRATIVE DECISIONS
`
`Deeper, UAB v. Vexilar, Inc.,
`IPR2018-01310, Paper 7 (PTAB Jan. 24, 2019) (informative opinion) .............50
`
`Facebook, Inc. v. Sound View Innovations, LLC,
`IPR2017-00998, Paper 13 (PTAB Sept. 5, 2017) ........................................ 50, 51
`
`Hytera Communications Co. Ltd. v. Motorola Solutions, Inc.,
`IPR2017-02183, Paper 47 (PTAB May 13, 2019) .............................................15
`
`Nikon Corp. v. ASML Netherlands B.V.,
`IPR2018-00220, Paper 8 (PTAB June 4, 2018) .......................................... 50, 51
`
`Repro-Med Sys., Inc. v. EMED Techs. Corp.,
`IPR2018-00981, Paper 8 (PTAB Nov. 2, 2018) .......................................... 48, 51
`
`Symantec Corp. v. Finjan, Inc.,
`IPR2015-01895, Paper 7 (PTAB Feb. 26, 2016) ................................... 49, 50, 51
`
`
`
`
`
`
`
`
`
`iii
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`
`STATUTES
`
`35 U.S.C. § 102 ........................................................................................... 47, 48, 49
`
`35 U.S.C. § 103 ........................................................................................... 47, 48, 49
`
`35 U.S.C. § 311(b) ............................................................................................ 47, 49
`
`35 U.S.C. § 314(a) ........................................................................................... passim
`
`35 U.S.C. § 371 ................................................................................................. 44, 45
`
`
`
`REGULATIONS
`
`37 C.F.R § 1.56 ........................................................................................................46
`
`37 C.F.R. § 1.495 .....................................................................................................45
`
`37 C.F.R. § 42.104(b)(4) ..........................................................................................42
`
`83 Fed. Reg. 51,340
`(Oct. 11, 2018) (codified at 37 C.F.R. § 42.100(b)) ............................................. 7
`
`
`
`
`
`
`
`
`
`iv
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`
`EXHIBIT LIST
`
`2001 U.S. Patent App. Pub. 2001/0009025 A1 (“Ahonen U.S. Pat. App. Pub.”).
`
`
`
`v
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`
`I.
`
`INTRODUCTION
`
`The Petition should be denied institution because its obviousness arguments
`
`suffer from at least three clear, and fatal, deficiencies. In particular, Petitioner’s
`
`proposed combinations, all based on Ahonen and Ishiyama, fail to disclose the
`
`claims’ novel method because they neither establish a second secure connection,
`
`nor check whether it already exists, as claimed. Nor do they even perform their
`
`alleged steps [a], [b], and [c] in the order that all claims, and simple logic, require.
`
`Thus, the proposed combinations fail to disclose at least three important limitations
`
`of the ’302 Patent’s claims.
`
`The Petition tries to change the subject, and attribute false merit to its
`
`proposed Ahonen-Ishiyama combinations, by falsely suggesting that Patent Owner
`
`intentionally concealed the existence of Ahonen from the Examiner. But the
`
`Search Report citing Ahonen, and explaining that it was not of particular
`
`relevance, was included in the prosecution history. The Petition’s baseless
`
`insinuation does not detract, and should not distract, from the flimsiness of its
`
`proposed grounds.
`
`Furthermore, by basing the Petition on inequitable conduct-type arguments,
`
`Petitioner asks the Board to go outside its purview as an administrative tribunal of
`
`limited statutory jurisdiction. The PTAB should exercise its discretion under 35
`
`U.S.C. § 314(a) and not institute review based on such an inappropriate Petition.
`
`
`
`1
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`
`For these reasons and more, institution should be denied.1
`
`II. THE AHONEN PRIMARY REFERENCE AND THE ’302 PATENT
`DISCLOSE FUNDAMENTALLY DIFFERENT ARCHITECTURES
`
`It is unsurprising that Ahonen was “not considered to be of particular
`
`relevance” by the International Searching Authority. Id., 0108-0110. Ahonen has a
`
`fundamentally different architecture than the ’302 Patent, as explained below and
`
`in further detail infra §§ IV-V. Consequently, Ahonen has multiple substantive
`
`deficiencies precluding Petitioner from demonstrating a reasonable likelihood of
`
`prevailing with respect to its challenges against any claims of the ’302 Patent.
`
`A. Overview Of The ’302 Patent
`
`Claim 1 of the ’302 Patent, from which the other challenged claims depend,
`
`is directed to a method for ensuring secure forwarding of a message in a
`
`telecommunication network. Ex. 1001 [’302 Patent] 0009, 12:15-43. This includes
`
`steps for establishing and registering secure connections between different
`
`addresses of a “first terminal” and an original address of a “second terminal,”
`
`which are the “Mobile terminal” and “Home Server,” respectively, in Figure 2 of
`
`the Patent, shown below:
`
`
`1 Due to space considerations and because partial institution is not permitted,
`
`this Preliminary Response, unless otherwise noted, only addresses selected
`
`arguments sufficient to dispose of the Petition as a whole.
`
`
`
`2
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`
`
`
`Id., 0003, Fig. 2 (annotated). Figure 2 also depicts the “forwarding” of a message
`
`in a telecommunication network: upon receiving a packet via the secure connection
`
`between the Mobile terminal (first terminal) and Home Server (second terminal),
`
`the Home Server processes the IPSec headers and routes (forwards) the IP packet
`
`to destination computer X. See id., 0007, 8:41-44; 0009, 11:4-7, 11:10-12; see also
`
`id., 0009, 12:65-67 (claim 13).
`
`Claim 1 first requires establishing first and second secure connections
`
`between different addresses of the first terminal and an original address of the
`
`second terminal. Id., 0009, 12:19-25. In the preferred embodiment, “[t]he secure
`
`
`
`3
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`connections are preferably established by forming Security Associations (SAs)
`
`using the IPSec protocols and the message to be forwarded consists of IP packets.”
`
`Id., 0007, 7:39-41. In claim 1, the first secure connection is established as being an
`
`active connection and extending between a first network address of the first
`
`terminal and an original address of the second terminal, and the second secure
`
`connection is established extending between the second network address of the
`
`first terminal and the original network address of the second terminal. Id., 0009,
`
`12:19-25.
`
`Next, when the Mobile terminal (first terminal) moves to a new network, it
`
`obtains a care-of address from the visited network and then checks whether a
`
`secure connection (e.g., an IPSec security association in the preferred embodiment)
`
`already exists between the new address and the Home Server address. Id., 0008,
`
`10:39-43. If an IPSec security association already exists between the new address
`
`of the Mobile terminal and the Home Server, this security association is registered
`
`to be the actual security association used. Id., 0008, 10:51-56.
`
`Significantly, no terminals are required between the Mobile terminal (first
`
`terminal) and the Home Server (second terminal) in the ’302 Patent to manage the
`
`mobility of the Mobile terminal in the invention’s disclosed embodiments. Id.,
`
`0003, Fig. 2. Instead, the Mobile terminal manages its own mobility, including by
`
`
`
`4
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`checking whether a secure connection already exists at its new address after
`
`moving to a new network. Id., 0008, 10:39-43.
`
`B. Overview Of Ahonen
`
`In contrast to the claimed invention of the ’302 Patent, Ahonen employs a
`
`firewall between the mobile terminal (first terminal) and the second terminal to
`
`authorize their communications and manage the mobility of the first terminal.
`
`As Petitioner acknowledges, Ahonen’s system requires three components—
`
`the mobile host (first terminal), a firewall, and a correspondent host (second
`
`terminal)—where the firewall is located between the first and second terminals:
`
`Ex. 1004 [Ahonen] 0003, Fig. 1 (as annotated by Petitioner); Pet., 19. In this three-
`
`component scenario, “SAs [] are established between the mobile host 1 and the
`
`firewall 3, and between mobile host 1 and the correspondent host 4.” Id., 0015,
`
`
`
`
`
`5
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`13:1-3. “Details of the negotiated SAs are held at the firewall in a Security
`
`Association Database (SAD) and at the end of the negotiation process the firewall
`
`3 transfers the SAD from the intranet side interface to the external side interface of
`
`the IPsec protocol stack.” Id., 0015, 13:4-7. Petitioner acknowledges this role of
`
`the firewall in Ahonen, explaining that “[t]he role of ‘firewall 3’ is to ensure the
`
`mobile host is authorized to communicate with the correspondent host. That is, ‘the
`
`mobile host 1 first needs to convince the firewall 3 that subsequently sent messages
`
`originating from the mobile host 3 to the correspondent host 4 should be passed.’”
`
`Pet., 20 (citing Ex. 1004 [Ahonen] 0014, 12:27-29).
`
`Given the significant, central role of the firewall in Ahonen’s architecture,
`
`Ahonen’s Mobile Host (first terminal) cannot and does not manage its own
`
`mobility like the mobile terminal in the ’302 Patent, but instead, must employ the
`
`firewall between itself and the Correspondent Host (second terminal) to do so. In
`
`particular, Ahonen discloses that “once a mobile terminal has moved networks, the
`
`mobile terminal sends a ‘control authorisation [sic] certificate’ to a firewall to
`
`‘remotely ‘activate’ preexisting secure connections.’” Pet., 20 (citing Ex. 1004
`
`[Ahonen] 0016, 14:16-17, 0017, 15:1-17). As Petitioner admits, “Ahonen never
`
`discloses how its mobile host stores the SAs” and “Ahonen does not explicitly
`
`describe how the first terminal knows whether an SA exists to retrieve the SPI and
`
`other parameters from, or which SA to retrieve the parameters from.” Pet., 35. For
`
`
`
`6
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`these reasons, Petitioner correctly concedes, “Ahonen [] does not explicitly
`
`disclose ‘the first terminal checking whether the second secure connection already
`
`exists,’ as recited in independent claim 1 of the ’302 patent.” Pet., 22.
`
`Still other material deficiencies in Ahonen’s disclosure also exist which,
`
`considered alone or in combination with Petitioner’s other references, preclude
`
`Petitioner from demonstrating a reasonable likelihood of prevailing with respect to
`
`any claim of the ’302 Patent. Such deficiencies will be discussed in more detail,
`
`infra § IV, in connection with specific elements of claim 1 of the ’302 Patent.
`
`III. CLAIM CONSTRUCTION (ALL CLAIMS, ALL GROUNDS)
`
`The Petition was filed after November 13, 2018, the date of the Office’s
`
`adoption of the Phillips claim construction standard for IPRs. The claims therefore
`
`must be construed “in accordance with the ordinary and customary meaning of
`
`such claim as understood by one of ordinary skill in the art and the prosecution
`
`history pertaining to the patent,” as required by the Phillips standard. 83 Fed. Reg.
`
`51,340, 51,358 (Oct. 11, 2018) (codified at 37 C.F.R. § 42.100(b)).
`
`As explained below, the claims should be construed under the Phillips
`
`standard to require that: (1) “establishing a [first][second] secure connection”
`
`requires forming a new secure connection; and (2) steps [a], [b], and [c] of claim 1
`
`(and, by dependency, the other challenged claims) must be performed in their
`
`written order. For purposes of determining that institution is unwarranted, no
`
`
`
`7
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`further construction is presently needed beyond their plain and ordinary meaning to
`
`a person of ordinary skill in the art at the time of the invention.
`
`A.
`
`“Establishing A [First][Second] Secure Connection” Requires
`Forming A New Secure Connection
`
`Petitioner argues that “establishing a [first][second] secure connection”
`
`should be construed to include “establishing one or more [first][second] security
`
`associations.” Pet., 15. Petitioner’s proposed construction is deficient and
`
`erroneously broad, because, as relevant here, it fails to take account of the recital
`
`and meaning of the term “establishing,” which, in the context of the ’302 Patent,
`
`means forming, or creating, a new secure connection. Pet., 15-16.2
`
`Petitioner proposes a construction for the term “secure connection” in the
`
`limitation “establishing a [first][second] secure connection,” but does not propose
`
`or address how the term “establishing” should be construed in this limitation. Id.,
`
`15 (“The terms ‘establishing a first secure connection’/ ‘establishing a second
`
`secure connection,’ as recited in claim 1, should be construed to respectively
`
`
`2 Petitioner’s proposed construction would also improperly limit the claimed
`
`“secure connection” to a particular standard of security protocols, namely, the
`
`IPSec protocols, by importing the limitation “security associations.” Claim 1 is not
`
`so limited. This issue is, however, irrelevant for purposes of considering
`
`institution.
`
`
`
`8
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`include ‘establishing one or more first security associations’ and ‘establishing one
`
`or more second security associations.’”). Put another way, Petitioner’s construction
`
`is effectively circular as to the term “establishing,” as it in effect defines the term
`
`“establishing” as “establishing.” The language in question appears in the following
`
`element of claim 1:
`
`a) establishing a first secure connection as being an active
`
`connection and extending between a first network address of the first
`
`terminal and an original network address of the second terminal,
`
`establishing a second secure connection extending between a second
`
`network address of the first terminal and the original network address
`
`of the second terminal,
`
`Ex. 1001 [’302 Patent] 0009, 12:19-25 (emphasis added). In this context,
`
`“establishing” a secure connection means forming/creating a new secure
`
`connection. Tellingly, Petitioner acknowledges as much in its subsequent argument
`
`for its proposed construction, though it fails to expressly include the concept of
`
`forming/creating a new secure connection in its expressly proposed construction.
`
`In particular, Petitioner argues:
`
`“[t]he secure connections are preferably established by forming
`
`Security Associations (SAs) using the IPSec protocols” [Ex. 1001
`
`[’302 Patent]] 7:39-41. In other words, an IPSec connection is created
`
`using one or more security associations. Thus, one establishes one or
`
`
`
`9
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`
`more security associations in order to create a “secure connection”
`
`using the IPSec protocols.
`
`Pet., 16 (emphases added). Relevantly, in addition to those portions of the
`
`specification cited by Petitioner as quoted above, the ’302 Patent specification also
`
`states:
`
`The key exchange being a part of the forming of a secure connection
`
`is performed manually or automatically with IKE or some other
`
`automated key exchange protocol. When a new secure connection is
`
`formed, it is registered for immediate and/or later use. The registration
`
`for later use is made using a connection table, which is maintained by
`
`both hosts participating in the forming of the secure connection.
`
`Id., 0007, 7:41-48 (emphases added).
`
`Thus, in view of the plain meaning of “establishing” and in view of the
`
`claim teachings of the specification as set forth above, “establishing” a secure
`
`connection should be construed to require forming (or creating) a new secure
`
`connection (for example, as in the preferred embodiment, forming Security
`
`Associations through use of manual or automatic key exchange protocol, but not
`
`limited to forming such Security Associations).
`
`That the claimed “establishing a [first][second] secure connection” should be
`
`construed to require forming or creating a new secure connection is further
`
`bolstered by the prosecution history.
`
`
`
`10
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`In particular, in its Appeal Brief filed with the Board before the Examiner
`
`withdrew his rejections, Applicant argued “[i]n the present invention there are, in
`
`general, two different secure connections involved and which secure connection is
`
`used changes when the first terminal moves from one network to another network.”
`
`Ex. 1002 [’302 Prosecution History] 0348. The Applicant then distinguished the
`
`invention from the prior art as follows:
`
`It is important to realize that the problem solved by the present
`
`invention lies in the secure connection itself, i.e. how to handle the
`
`secure connection when a move of the mobile terminal has taken
`
`place. Although Herle discloses some kind of secure connections but
`
`[sic] none of them, not even when combined with the teachings of
`
`Sturniolo, is able to handle a move by a mobile terminal while
`
`maintaining the connection secure, which was the problem to be
`
`solved by the present invention. In the present invention, it is not
`
`necessary [to] use any key exchange after the move by the mobile
`
`terminal since there is no need to setup a new secure connection. It
`
`is merely necessary for the second terminal to register an already
`
`existing secure connection instead.
`
`Ex. 1002 [’302 Prosecution History] 0352-0353 (emphasis added). The Examiner
`
`then withdrew his rejection, issued a notice of allowance, and noted his agreement
`
`with Applicant’s arguments. Id., 0375 (“The arguments presented in the Appeal
`
`Brief filed 4/20/2011 are persuasive.”).
`
`
`
`11
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`As the passage above makes clear, after the mobile terminal moves to a new
`
`address, there is no need to set up or establish a new secure connection (e.g., by
`
`using a key exchange). Instead, as captured by the language of claim 1, the new
`
`first and second secure connections are formed prior to the first terminal moving
`
`and, after the first terminal moves, the second terminal registers the already
`
`established second secure connection as the active connection without having to
`
`reestablish it—i.e., without having to setup a new secure connection. Ex. 1001
`
`[’302 Patent] 0009, 12:15-34.
`
`For all of these reasons, “establishing a [first][second] secure connection” in
`
`claim 1, which occurs prior to the mobile first terminal changing addresses, should
`
`be construed to mean “forming a new [first][second] secure connection.”3
`
`
`
`
`3 For the record, as noted above, though it should not be necessary to reach
`
`the issue to deny institution, another error in Petitioner’s proposed construction of
`
`“establishing a [first][second] secure connection” is that, inter alia, it would
`
`improperly limit the claimed “secure connection” to IPSec protocols of the
`
`preferred embodiment by importing the terms “security associations” when claim 1
`
`is not so limited. Id. Absent a “clear and unmistakable disclaimer,” the preferred
`
`embodiment does not limit the claims, Cont’l Circuits LLC v. Intel Corp., 915 F.3d
`
`788, 796-800 (Fed. Cir. 2019), and the claim language does not limit claim 1’s
`
`
`
`12
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`B. Claim 1 Requires That Steps [a], [b], And [c] Be In Recited Order
`
`The Petition is silent as to whether the steps of claim 1 must occur in order.
`
`Its analysis implicitly assumes that the steps can occur in any order. However,
`
`given the language of claim 1 and the specification, claim 1 should be construed
`
`under Phillips to require that steps [a], [b], and [c] be performed in the order they
`
`are recited.
`
`While method claims are not all construed to require an order of steps, “a
`
`claim requires an ordering of steps when the claim language, as a matter of logic or
`
`grammar, requires that the steps be performed in the order written, or the
`
`
`“secure connections” to security associations established using IPSec protocols.
`
`Claim 3, in contrast, is expressly limited to “establishing the first secure
`
`connection using IPSec protocols.” Ex. 1001 [’302 Patent] 0009, 12:19-25, 12:38-
`
`40; compare Pet., 15 (acknowledging that “[a]n independent claim impliedly
`
`embraces more subject matter than its narrower dependent claim”). The
`
`specification likewise does not limit claim 1’s secure connections to “security
`
`associations” using IPSec protocols, but instead, makes clear that this is merely the
`
`preferred embodiment. Ex. 1001 [’302 Patent] 0007, 7:39-40 (“secure connections
`
`are preferably established by forming Security Associations (SAs) using the IPSec
`
`protocols”); id., 0008, 10:13-15.
`
`
`
`13
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`specification directly or implicitly requires an order of steps.” MFormation Techs.,
`
`Inc. v. Research in Motion Ltd., 764 F.3d 1392, 1398-99 (Fed. Cir. 2014) (internal
`
`quotation marks omitted). Here, both the claim language and the specification
`
`dictate an order-of-steps requirement for claim 1 of the ’302 Patent.
`
`To start, claim 1 of the ’302 Patent expressly recites a specific order of steps
`
`[a], [b], and [c], which, as a matter of logic and grammar from the plain language
`
`of the claims, requires performance in their written order. Claim 1 is set forth
`
`below:
`
`1. A method for ensuring secure forwarding of a message in a
`
`telecommunication network, comprising: providing a first terminal
`
`from which the message is sent and a second terminal to which the
`
`message is sent,
`
`a) establishing a first secure connection as being an active connection
`
`and extending between a first network address of the first terminal and
`
`an original network address of the second terminal, establishing a
`
`second secure connection extending between a second network
`
`address of the first terminal and the original network address of the
`
`second terminal,
`
`b) the first terminal changing from the first network address to the
`
`second network address, the first terminal checking whether the
`
`second secure connection already exists, and
`
`c) when the second secure connection already exists, the second
`
`terminal registering the already established second secure connection
`
`
`
`14
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`
`as being the active connection without having to reestablish the
`
`second secure connection.
`
`Ex. 1001 [’302 Patent] 0009, 12:15-34.
`
`Logically, step [b]’s “checking whether the second secure connection
`
`already exists” occurs after step [a]’s “establishing a second secure connection.”
`
`“Checking” for the recited second secure connection before “establishing” it
`
`would make little sense: there would be nothing to “check” for.
`
`Similarly, step [c] logically occurs after step [b]. Step [c] is prefaced with
`
`“when the second secure connection already exists.” That is the very condition
`
`that the first terminal was “checking” in step [b]. In other words, the condition
`
`precedent in step [c] would be unknown if the “checking” was not performed first
`
`in step [b]. In sum, step [a] must be before [b], and step [b] must be before step
`
`[c], because “the language shows that the results of a step are used in the next
`
`step.” Hytera Communications Co. Ltd. v. Motorola Solutions, Inc., IPR2017-
`
`02183, Paper 47, 11-18 (PTAB May 13, 2019) (finding order-of-steps requirement
`
`even under BRI).
`
`Further support for construing steps [a], [b], and [c] of claim 1 to be
`
`performed in the recited order is found in the fact that step [c] necessarily occurs
`
`after step [a], because step [c] recites “registering the already established second
`
`secure connection … without having to reestablish the second secure connection,”
`
`
`
`15
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`
`which, as a matter of logic and grammar, occurs after “establishing a second
`
`secure connection.” Id.; see MFormation, 764 F.3d at 1399 (finding order-of-steps
`
`requirement based in part on fact that “establishing a connection” sub-step must
`
`logically occur prior to “transmitting” sub-step).
`
`Furthermore, consistent with the logical and grammatical support for
`
`ordering the steps, the steps of claim 1 are expressly enumerated in alphabetical
`
`order as “a) … b) …, and c),” which clearly indicates the inventors’ intent to
`
`order, rather than to not order, the steps. This is yet another reason that the claim
`
`language soundly supports an order-of-steps requirement.
`
`
`
`Performance of steps [a], [b], and [c] in order is also prescribed by the
`
`specification. The Summary of the Invention states:
`
`In the method, one or more secure connections are established
`
`between different addresses of the first terminal and address of the
`
`other terminal, the connections defining at least said addresses of the
`
`two terminals. When the first terminal moves from one address to
`
`another address, a secure connection, whose endpoints are the new
`
`address of the first terminal and the address of the other terminal, is
`
`registered to be at least one of the active connections.
`
`Ex. 1001 [’302 Patent] 0007, 7:13-20. As this passage makes clear, in the
`
`invention, first, “one or more secure connections are established” (step [a]);
`
`second, “the first terminal moves from one address to another address” (step [b]);
`
`
`
`16
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`and third, the secure connection at the new address is “registered to be at least one
`
`of the active connections” (step [c]). This description of this preferred embodiment
`
`is consistent with this order-of-steps requirement, as the claimed steps [a], [b], and
`
`[c] are described in their claimed order, namely, [a] establishing secure
`
`connections, [b] the mobile terminal moving and checking whether a secure
`
`connection exists at the new address, and, [c] if it does, registering that secure
`
`connection for use. Id., 0008, 10:13-56.
`
`Still further support for this order-of-steps requirement is found in the fact
`
`that the goal of the invention, as described in the specification, is served by the
`
`steps being performed in that order. Notably, establishing secure connections
`
`before moving and changing addresses, as required by claim 1, accomplishes the
`
`goal of avoiding the latency problem with standard prior art IPsec, which set up a
`
`new connection after moving. See id., 0005, 4:53-60 (“IPSec does not work well
`
`with mobile devices. For instance, if a mobile terminal moves from one network to
`
`another, an IPSec connection set up is required, typically using the IKE key
`
`exchange protocol. Such a set up is expensive in terms of latency, since IKE may
`
`require several seconds to complete.”).
`
`For all of these reasons, claim 1 should be construed require that steps [a],
`
`[b], and [c] be performed in their written order.
`
`
`
`17
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`As explained below, the constructions above furnish additional reasons why
`
`the Petition should be denied institution. However, as shown infra §§ IV-C and V,
`
`institution should be denied for additional reasons as well, regardless whether the
`
`claim constructions proposed above are adopted.
`
`IV. THE PETITION FAILS TO SHOW A REASONABLE LIKELIHOOD
`THAT THE AHONEN-ISHIYAMA COMBINATIONS RENDER THE
`CLAIMS OBVIOUS (ALL CLAIMS, ALL GROUNDS)
`
`The Petition fails to show a reasonable likelihood of prevailing against
`
`independent claim 1, and therefore, by dependency, claims 2-16.
`
`The International Searching Authority found that Ahonen, Petitioner’s lead
`
`reference, was “not considered to be of particular relevance” to the patentability of
`
`the invention of the ’302 Patent. Ex. 1002 [’302 Prosecution History] 0108-0110.
`
`The International Searching Authority’s determination of no particular relevance is
`
`correct. The following sections further explain why Ahonen, alone or in the
`
`proposed Ishiyama combinations, does not disclose multiple limitations of the
`
`claims, all of which are recited in independent claim 1. If any one of these
`
`limitations has not been shown obvious by the Petition, institution must be denied.4
`
`
`4 Petitioner asserts three references: Ahonen, Ishiyama, and Gupta. The
`
`Petition relies on Gupta only in its Ground 2 arguments directed towards claims 14
`
`
`
`18
`
`

`

`Case IPR2019-00821
`Patent 8,037,302
`
`A. Ahonen Does Not Disclose “Establishing A Second Secure
`Connection” As Recited In Claim 1
`
`Claim 1 requires “establishing a second secure connection extending
`
`between a second network address of the first terminal and the original network
`
`address of the second terminal.” Ex. 1001 [’302 Patent] 0009, 12:22

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket