`Patent 8,037,302
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`MPH TECHNOLOGIES OY,
`Patent Owner.
`______________________
`
`Case IPR2019-00821
`Patent 8,037,302
`____________
`
`PATENT OWNER’S PRELIMINARY RESPONSE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`Case IPR2019-00821
`Patent 8,037,302
`
`
`Page
`
`I.
`
`INTRODUCTION ......................................................................................... 1
`
`II.
`
`THE AHONEN PRIMARY REFERENCE AND THE ’302 PATENT
`DISCLOSE FUNDAMENTALLY DIFFERENT ARCHITECTURES .. 2
`
`A. Overview Of The ’302 Patent ............................................................... 2
`
`B.
`
`Overview Of Ahonen ............................................................................ 5
`
`III. CLAIM CONSTRUCTION (ALL CLAIMS, ALL GROUNDS) ............. 7
`
`A.
`
`[First][Second] Secure Connection” Requires
`“Establishing A
`Forming A New Secure Connection ..................................................... 8
`
`B.
`
`Claim 1 Requires That Steps [a], [b], And [c] Be In Recited Order ...13
`
`IV. THE PETITION FAILS TO SHOW A REASONABLE LIKELIHOOD
`THAT THE AHONEN-ISHIYAMA COMBINATIONS RENDER THE
`CLAIMS OBVIOUS (ALL CLAIMS, ALL GROUNDS) .......................18
`
`A. Ahonen Does Not Disclose “Establishing A Second Secure
`Connection” As Recited In Claim 1 ....................................................19
`
`B.
`
`C.
`
`Ahonen Does Not Disclose Performing Steps [a], [b], And [c] Recited
`In Claim 1 In Their Required Order ....................................................26
`
`The Proposed Combination Of Ahonen And Ishiyama Does Not
`Disclose “The First Terminal Checking Whether The Second Secure
`Connection Already Exists” ................................................................30
`
`1.
`
`2.
`
`“Checking Whether The Second Secure Connection Already
`Exists” Is Not Performed By Ahonen’s Alleged “First
`Terminal” As The Claims Require ...........................................31
`
`The Ahonen-Ishiyama Combination Does Not Disclose
`“Checking Whether The Second Secure Connection Already
`Exists” At All ............................................................................40
`
`
`
`i
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`
`V.
`
`INSTITUTION SHOULD BE DENIED UNDER § 314(a) BECAUSE
`THE PETITION IS ENTWINED WITH INAPPROPRIATE AND
`FALSE INEQUITABLE CONDUCT-TYPE ARGUMENTS .................43
`
`A.
`
`B.
`
`C.
`
`The International Search Report Citing Ahonen Was Submitted To
`And Acknowledged By The Examiner ...............................................43
`
`The International Search Report Determined Ahonen Was “Not
`Considered To Be Of Particular Relevance” ......................................46
`
`The Board Should Deny The Petition Because Of Its Inappropriate
`Reliance On Inequitable Conduct-Type Allegations ..........................46
`
`VI. CONCLUSION ............................................................................................51
`
`
`
`
`
`
`
`
`
`
`
`ii
`
`
`
`TABLE OF AUTHORITIES
`
`Case IPR2019-00821
`Patent 8,037,302
`
`
`Page(s)
`
`CASES
`
`Cont’l Circuits LLC v. Intel Corp.,
`915 F.3d 788 (Fed. Cir. 2019) ............................................................................12
`
`Harmonic Inc. v. Avid Tech., Inc.,
`815 F.3d 1356 (Fed. Cir. 2016) ..........................................................................47
`
`MFormation Techs., Inc. v. Research in Motion Ltd.,
`764 F.3d 1392 (Fed. Cir. 2014) ................................................................... 14, 16
`
`
`
`ADMINISTRATIVE DECISIONS
`
`Deeper, UAB v. Vexilar, Inc.,
`IPR2018-01310, Paper 7 (PTAB Jan. 24, 2019) (informative opinion) .............50
`
`Facebook, Inc. v. Sound View Innovations, LLC,
`IPR2017-00998, Paper 13 (PTAB Sept. 5, 2017) ........................................ 50, 51
`
`Hytera Communications Co. Ltd. v. Motorola Solutions, Inc.,
`IPR2017-02183, Paper 47 (PTAB May 13, 2019) .............................................15
`
`Nikon Corp. v. ASML Netherlands B.V.,
`IPR2018-00220, Paper 8 (PTAB June 4, 2018) .......................................... 50, 51
`
`Repro-Med Sys., Inc. v. EMED Techs. Corp.,
`IPR2018-00981, Paper 8 (PTAB Nov. 2, 2018) .......................................... 48, 51
`
`Symantec Corp. v. Finjan, Inc.,
`IPR2015-01895, Paper 7 (PTAB Feb. 26, 2016) ................................... 49, 50, 51
`
`
`
`
`
`
`
`
`
`iii
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`
`STATUTES
`
`35 U.S.C. § 102 ........................................................................................... 47, 48, 49
`
`35 U.S.C. § 103 ........................................................................................... 47, 48, 49
`
`35 U.S.C. § 311(b) ............................................................................................ 47, 49
`
`35 U.S.C. § 314(a) ........................................................................................... passim
`
`35 U.S.C. § 371 ................................................................................................. 44, 45
`
`
`
`REGULATIONS
`
`37 C.F.R § 1.56 ........................................................................................................46
`
`37 C.F.R. § 1.495 .....................................................................................................45
`
`37 C.F.R. § 42.104(b)(4) ..........................................................................................42
`
`83 Fed. Reg. 51,340
`(Oct. 11, 2018) (codified at 37 C.F.R. § 42.100(b)) ............................................. 7
`
`
`
`
`
`
`
`
`
`iv
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`
`EXHIBIT LIST
`
`2001 U.S. Patent App. Pub. 2001/0009025 A1 (“Ahonen U.S. Pat. App. Pub.”).
`
`
`
`v
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`
`I.
`
`INTRODUCTION
`
`The Petition should be denied institution because its obviousness arguments
`
`suffer from at least three clear, and fatal, deficiencies. In particular, Petitioner’s
`
`proposed combinations, all based on Ahonen and Ishiyama, fail to disclose the
`
`claims’ novel method because they neither establish a second secure connection,
`
`nor check whether it already exists, as claimed. Nor do they even perform their
`
`alleged steps [a], [b], and [c] in the order that all claims, and simple logic, require.
`
`Thus, the proposed combinations fail to disclose at least three important limitations
`
`of the ’302 Patent’s claims.
`
`The Petition tries to change the subject, and attribute false merit to its
`
`proposed Ahonen-Ishiyama combinations, by falsely suggesting that Patent Owner
`
`intentionally concealed the existence of Ahonen from the Examiner. But the
`
`Search Report citing Ahonen, and explaining that it was not of particular
`
`relevance, was included in the prosecution history. The Petition’s baseless
`
`insinuation does not detract, and should not distract, from the flimsiness of its
`
`proposed grounds.
`
`Furthermore, by basing the Petition on inequitable conduct-type arguments,
`
`Petitioner asks the Board to go outside its purview as an administrative tribunal of
`
`limited statutory jurisdiction. The PTAB should exercise its discretion under 35
`
`U.S.C. § 314(a) and not institute review based on such an inappropriate Petition.
`
`
`
`1
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`
`For these reasons and more, institution should be denied.1
`
`II. THE AHONEN PRIMARY REFERENCE AND THE ’302 PATENT
`DISCLOSE FUNDAMENTALLY DIFFERENT ARCHITECTURES
`
`It is unsurprising that Ahonen was “not considered to be of particular
`
`relevance” by the International Searching Authority. Id., 0108-0110. Ahonen has a
`
`fundamentally different architecture than the ’302 Patent, as explained below and
`
`in further detail infra §§ IV-V. Consequently, Ahonen has multiple substantive
`
`deficiencies precluding Petitioner from demonstrating a reasonable likelihood of
`
`prevailing with respect to its challenges against any claims of the ’302 Patent.
`
`A. Overview Of The ’302 Patent
`
`Claim 1 of the ’302 Patent, from which the other challenged claims depend,
`
`is directed to a method for ensuring secure forwarding of a message in a
`
`telecommunication network. Ex. 1001 [’302 Patent] 0009, 12:15-43. This includes
`
`steps for establishing and registering secure connections between different
`
`addresses of a “first terminal” and an original address of a “second terminal,”
`
`which are the “Mobile terminal” and “Home Server,” respectively, in Figure 2 of
`
`the Patent, shown below:
`
`
`1 Due to space considerations and because partial institution is not permitted,
`
`this Preliminary Response, unless otherwise noted, only addresses selected
`
`arguments sufficient to dispose of the Petition as a whole.
`
`
`
`2
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`
`
`
`Id., 0003, Fig. 2 (annotated). Figure 2 also depicts the “forwarding” of a message
`
`in a telecommunication network: upon receiving a packet via the secure connection
`
`between the Mobile terminal (first terminal) and Home Server (second terminal),
`
`the Home Server processes the IPSec headers and routes (forwards) the IP packet
`
`to destination computer X. See id., 0007, 8:41-44; 0009, 11:4-7, 11:10-12; see also
`
`id., 0009, 12:65-67 (claim 13).
`
`Claim 1 first requires establishing first and second secure connections
`
`between different addresses of the first terminal and an original address of the
`
`second terminal. Id., 0009, 12:19-25. In the preferred embodiment, “[t]he secure
`
`
`
`3
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`connections are preferably established by forming Security Associations (SAs)
`
`using the IPSec protocols and the message to be forwarded consists of IP packets.”
`
`Id., 0007, 7:39-41. In claim 1, the first secure connection is established as being an
`
`active connection and extending between a first network address of the first
`
`terminal and an original address of the second terminal, and the second secure
`
`connection is established extending between the second network address of the
`
`first terminal and the original network address of the second terminal. Id., 0009,
`
`12:19-25.
`
`Next, when the Mobile terminal (first terminal) moves to a new network, it
`
`obtains a care-of address from the visited network and then checks whether a
`
`secure connection (e.g., an IPSec security association in the preferred embodiment)
`
`already exists between the new address and the Home Server address. Id., 0008,
`
`10:39-43. If an IPSec security association already exists between the new address
`
`of the Mobile terminal and the Home Server, this security association is registered
`
`to be the actual security association used. Id., 0008, 10:51-56.
`
`Significantly, no terminals are required between the Mobile terminal (first
`
`terminal) and the Home Server (second terminal) in the ’302 Patent to manage the
`
`mobility of the Mobile terminal in the invention’s disclosed embodiments. Id.,
`
`0003, Fig. 2. Instead, the Mobile terminal manages its own mobility, including by
`
`
`
`4
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`checking whether a secure connection already exists at its new address after
`
`moving to a new network. Id., 0008, 10:39-43.
`
`B. Overview Of Ahonen
`
`In contrast to the claimed invention of the ’302 Patent, Ahonen employs a
`
`firewall between the mobile terminal (first terminal) and the second terminal to
`
`authorize their communications and manage the mobility of the first terminal.
`
`As Petitioner acknowledges, Ahonen’s system requires three components—
`
`the mobile host (first terminal), a firewall, and a correspondent host (second
`
`terminal)—where the firewall is located between the first and second terminals:
`
`Ex. 1004 [Ahonen] 0003, Fig. 1 (as annotated by Petitioner); Pet., 19. In this three-
`
`component scenario, “SAs [] are established between the mobile host 1 and the
`
`firewall 3, and between mobile host 1 and the correspondent host 4.” Id., 0015,
`
`
`
`
`
`5
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`13:1-3. “Details of the negotiated SAs are held at the firewall in a Security
`
`Association Database (SAD) and at the end of the negotiation process the firewall
`
`3 transfers the SAD from the intranet side interface to the external side interface of
`
`the IPsec protocol stack.” Id., 0015, 13:4-7. Petitioner acknowledges this role of
`
`the firewall in Ahonen, explaining that “[t]he role of ‘firewall 3’ is to ensure the
`
`mobile host is authorized to communicate with the correspondent host. That is, ‘the
`
`mobile host 1 first needs to convince the firewall 3 that subsequently sent messages
`
`originating from the mobile host 3 to the correspondent host 4 should be passed.’”
`
`Pet., 20 (citing Ex. 1004 [Ahonen] 0014, 12:27-29).
`
`Given the significant, central role of the firewall in Ahonen’s architecture,
`
`Ahonen’s Mobile Host (first terminal) cannot and does not manage its own
`
`mobility like the mobile terminal in the ’302 Patent, but instead, must employ the
`
`firewall between itself and the Correspondent Host (second terminal) to do so. In
`
`particular, Ahonen discloses that “once a mobile terminal has moved networks, the
`
`mobile terminal sends a ‘control authorisation [sic] certificate’ to a firewall to
`
`‘remotely ‘activate’ preexisting secure connections.’” Pet., 20 (citing Ex. 1004
`
`[Ahonen] 0016, 14:16-17, 0017, 15:1-17). As Petitioner admits, “Ahonen never
`
`discloses how its mobile host stores the SAs” and “Ahonen does not explicitly
`
`describe how the first terminal knows whether an SA exists to retrieve the SPI and
`
`other parameters from, or which SA to retrieve the parameters from.” Pet., 35. For
`
`
`
`6
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`these reasons, Petitioner correctly concedes, “Ahonen [] does not explicitly
`
`disclose ‘the first terminal checking whether the second secure connection already
`
`exists,’ as recited in independent claim 1 of the ’302 patent.” Pet., 22.
`
`Still other material deficiencies in Ahonen’s disclosure also exist which,
`
`considered alone or in combination with Petitioner’s other references, preclude
`
`Petitioner from demonstrating a reasonable likelihood of prevailing with respect to
`
`any claim of the ’302 Patent. Such deficiencies will be discussed in more detail,
`
`infra § IV, in connection with specific elements of claim 1 of the ’302 Patent.
`
`III. CLAIM CONSTRUCTION (ALL CLAIMS, ALL GROUNDS)
`
`The Petition was filed after November 13, 2018, the date of the Office’s
`
`adoption of the Phillips claim construction standard for IPRs. The claims therefore
`
`must be construed “in accordance with the ordinary and customary meaning of
`
`such claim as understood by one of ordinary skill in the art and the prosecution
`
`history pertaining to the patent,” as required by the Phillips standard. 83 Fed. Reg.
`
`51,340, 51,358 (Oct. 11, 2018) (codified at 37 C.F.R. § 42.100(b)).
`
`As explained below, the claims should be construed under the Phillips
`
`standard to require that: (1) “establishing a [first][second] secure connection”
`
`requires forming a new secure connection; and (2) steps [a], [b], and [c] of claim 1
`
`(and, by dependency, the other challenged claims) must be performed in their
`
`written order. For purposes of determining that institution is unwarranted, no
`
`
`
`7
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`further construction is presently needed beyond their plain and ordinary meaning to
`
`a person of ordinary skill in the art at the time of the invention.
`
`A.
`
`“Establishing A [First][Second] Secure Connection” Requires
`Forming A New Secure Connection
`
`Petitioner argues that “establishing a [first][second] secure connection”
`
`should be construed to include “establishing one or more [first][second] security
`
`associations.” Pet., 15. Petitioner’s proposed construction is deficient and
`
`erroneously broad, because, as relevant here, it fails to take account of the recital
`
`and meaning of the term “establishing,” which, in the context of the ’302 Patent,
`
`means forming, or creating, a new secure connection. Pet., 15-16.2
`
`Petitioner proposes a construction for the term “secure connection” in the
`
`limitation “establishing a [first][second] secure connection,” but does not propose
`
`or address how the term “establishing” should be construed in this limitation. Id.,
`
`15 (“The terms ‘establishing a first secure connection’/ ‘establishing a second
`
`secure connection,’ as recited in claim 1, should be construed to respectively
`
`
`2 Petitioner’s proposed construction would also improperly limit the claimed
`
`“secure connection” to a particular standard of security protocols, namely, the
`
`IPSec protocols, by importing the limitation “security associations.” Claim 1 is not
`
`so limited. This issue is, however, irrelevant for purposes of considering
`
`institution.
`
`
`
`8
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`include ‘establishing one or more first security associations’ and ‘establishing one
`
`or more second security associations.’”). Put another way, Petitioner’s construction
`
`is effectively circular as to the term “establishing,” as it in effect defines the term
`
`“establishing” as “establishing.” The language in question appears in the following
`
`element of claim 1:
`
`a) establishing a first secure connection as being an active
`
`connection and extending between a first network address of the first
`
`terminal and an original network address of the second terminal,
`
`establishing a second secure connection extending between a second
`
`network address of the first terminal and the original network address
`
`of the second terminal,
`
`Ex. 1001 [’302 Patent] 0009, 12:19-25 (emphasis added). In this context,
`
`“establishing” a secure connection means forming/creating a new secure
`
`connection. Tellingly, Petitioner acknowledges as much in its subsequent argument
`
`for its proposed construction, though it fails to expressly include the concept of
`
`forming/creating a new secure connection in its expressly proposed construction.
`
`In particular, Petitioner argues:
`
`“[t]he secure connections are preferably established by forming
`
`Security Associations (SAs) using the IPSec protocols” [Ex. 1001
`
`[’302 Patent]] 7:39-41. In other words, an IPSec connection is created
`
`using one or more security associations. Thus, one establishes one or
`
`
`
`9
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`
`more security associations in order to create a “secure connection”
`
`using the IPSec protocols.
`
`Pet., 16 (emphases added). Relevantly, in addition to those portions of the
`
`specification cited by Petitioner as quoted above, the ’302 Patent specification also
`
`states:
`
`The key exchange being a part of the forming of a secure connection
`
`is performed manually or automatically with IKE or some other
`
`automated key exchange protocol. When a new secure connection is
`
`formed, it is registered for immediate and/or later use. The registration
`
`for later use is made using a connection table, which is maintained by
`
`both hosts participating in the forming of the secure connection.
`
`Id., 0007, 7:41-48 (emphases added).
`
`Thus, in view of the plain meaning of “establishing” and in view of the
`
`claim teachings of the specification as set forth above, “establishing” a secure
`
`connection should be construed to require forming (or creating) a new secure
`
`connection (for example, as in the preferred embodiment, forming Security
`
`Associations through use of manual or automatic key exchange protocol, but not
`
`limited to forming such Security Associations).
`
`That the claimed “establishing a [first][second] secure connection” should be
`
`construed to require forming or creating a new secure connection is further
`
`bolstered by the prosecution history.
`
`
`
`10
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`In particular, in its Appeal Brief filed with the Board before the Examiner
`
`withdrew his rejections, Applicant argued “[i]n the present invention there are, in
`
`general, two different secure connections involved and which secure connection is
`
`used changes when the first terminal moves from one network to another network.”
`
`Ex. 1002 [’302 Prosecution History] 0348. The Applicant then distinguished the
`
`invention from the prior art as follows:
`
`It is important to realize that the problem solved by the present
`
`invention lies in the secure connection itself, i.e. how to handle the
`
`secure connection when a move of the mobile terminal has taken
`
`place. Although Herle discloses some kind of secure connections but
`
`[sic] none of them, not even when combined with the teachings of
`
`Sturniolo, is able to handle a move by a mobile terminal while
`
`maintaining the connection secure, which was the problem to be
`
`solved by the present invention. In the present invention, it is not
`
`necessary [to] use any key exchange after the move by the mobile
`
`terminal since there is no need to setup a new secure connection. It
`
`is merely necessary for the second terminal to register an already
`
`existing secure connection instead.
`
`Ex. 1002 [’302 Prosecution History] 0352-0353 (emphasis added). The Examiner
`
`then withdrew his rejection, issued a notice of allowance, and noted his agreement
`
`with Applicant’s arguments. Id., 0375 (“The arguments presented in the Appeal
`
`Brief filed 4/20/2011 are persuasive.”).
`
`
`
`11
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`As the passage above makes clear, after the mobile terminal moves to a new
`
`address, there is no need to set up or establish a new secure connection (e.g., by
`
`using a key exchange). Instead, as captured by the language of claim 1, the new
`
`first and second secure connections are formed prior to the first terminal moving
`
`and, after the first terminal moves, the second terminal registers the already
`
`established second secure connection as the active connection without having to
`
`reestablish it—i.e., without having to setup a new secure connection. Ex. 1001
`
`[’302 Patent] 0009, 12:15-34.
`
`For all of these reasons, “establishing a [first][second] secure connection” in
`
`claim 1, which occurs prior to the mobile first terminal changing addresses, should
`
`be construed to mean “forming a new [first][second] secure connection.”3
`
`
`
`
`3 For the record, as noted above, though it should not be necessary to reach
`
`the issue to deny institution, another error in Petitioner’s proposed construction of
`
`“establishing a [first][second] secure connection” is that, inter alia, it would
`
`improperly limit the claimed “secure connection” to IPSec protocols of the
`
`preferred embodiment by importing the terms “security associations” when claim 1
`
`is not so limited. Id. Absent a “clear and unmistakable disclaimer,” the preferred
`
`embodiment does not limit the claims, Cont’l Circuits LLC v. Intel Corp., 915 F.3d
`
`788, 796-800 (Fed. Cir. 2019), and the claim language does not limit claim 1’s
`
`
`
`12
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`B. Claim 1 Requires That Steps [a], [b], And [c] Be In Recited Order
`
`The Petition is silent as to whether the steps of claim 1 must occur in order.
`
`Its analysis implicitly assumes that the steps can occur in any order. However,
`
`given the language of claim 1 and the specification, claim 1 should be construed
`
`under Phillips to require that steps [a], [b], and [c] be performed in the order they
`
`are recited.
`
`While method claims are not all construed to require an order of steps, “a
`
`claim requires an ordering of steps when the claim language, as a matter of logic or
`
`grammar, requires that the steps be performed in the order written, or the
`
`
`“secure connections” to security associations established using IPSec protocols.
`
`Claim 3, in contrast, is expressly limited to “establishing the first secure
`
`connection using IPSec protocols.” Ex. 1001 [’302 Patent] 0009, 12:19-25, 12:38-
`
`40; compare Pet., 15 (acknowledging that “[a]n independent claim impliedly
`
`embraces more subject matter than its narrower dependent claim”). The
`
`specification likewise does not limit claim 1’s secure connections to “security
`
`associations” using IPSec protocols, but instead, makes clear that this is merely the
`
`preferred embodiment. Ex. 1001 [’302 Patent] 0007, 7:39-40 (“secure connections
`
`are preferably established by forming Security Associations (SAs) using the IPSec
`
`protocols”); id., 0008, 10:13-15.
`
`
`
`13
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`specification directly or implicitly requires an order of steps.” MFormation Techs.,
`
`Inc. v. Research in Motion Ltd., 764 F.3d 1392, 1398-99 (Fed. Cir. 2014) (internal
`
`quotation marks omitted). Here, both the claim language and the specification
`
`dictate an order-of-steps requirement for claim 1 of the ’302 Patent.
`
`To start, claim 1 of the ’302 Patent expressly recites a specific order of steps
`
`[a], [b], and [c], which, as a matter of logic and grammar from the plain language
`
`of the claims, requires performance in their written order. Claim 1 is set forth
`
`below:
`
`1. A method for ensuring secure forwarding of a message in a
`
`telecommunication network, comprising: providing a first terminal
`
`from which the message is sent and a second terminal to which the
`
`message is sent,
`
`a) establishing a first secure connection as being an active connection
`
`and extending between a first network address of the first terminal and
`
`an original network address of the second terminal, establishing a
`
`second secure connection extending between a second network
`
`address of the first terminal and the original network address of the
`
`second terminal,
`
`b) the first terminal changing from the first network address to the
`
`second network address, the first terminal checking whether the
`
`second secure connection already exists, and
`
`c) when the second secure connection already exists, the second
`
`terminal registering the already established second secure connection
`
`
`
`14
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`
`as being the active connection without having to reestablish the
`
`second secure connection.
`
`Ex. 1001 [’302 Patent] 0009, 12:15-34.
`
`Logically, step [b]’s “checking whether the second secure connection
`
`already exists” occurs after step [a]’s “establishing a second secure connection.”
`
`“Checking” for the recited second secure connection before “establishing” it
`
`would make little sense: there would be nothing to “check” for.
`
`Similarly, step [c] logically occurs after step [b]. Step [c] is prefaced with
`
`“when the second secure connection already exists.” That is the very condition
`
`that the first terminal was “checking” in step [b]. In other words, the condition
`
`precedent in step [c] would be unknown if the “checking” was not performed first
`
`in step [b]. In sum, step [a] must be before [b], and step [b] must be before step
`
`[c], because “the language shows that the results of a step are used in the next
`
`step.” Hytera Communications Co. Ltd. v. Motorola Solutions, Inc., IPR2017-
`
`02183, Paper 47, 11-18 (PTAB May 13, 2019) (finding order-of-steps requirement
`
`even under BRI).
`
`Further support for construing steps [a], [b], and [c] of claim 1 to be
`
`performed in the recited order is found in the fact that step [c] necessarily occurs
`
`after step [a], because step [c] recites “registering the already established second
`
`secure connection … without having to reestablish the second secure connection,”
`
`
`
`15
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`
`which, as a matter of logic and grammar, occurs after “establishing a second
`
`secure connection.” Id.; see MFormation, 764 F.3d at 1399 (finding order-of-steps
`
`requirement based in part on fact that “establishing a connection” sub-step must
`
`logically occur prior to “transmitting” sub-step).
`
`Furthermore, consistent with the logical and grammatical support for
`
`ordering the steps, the steps of claim 1 are expressly enumerated in alphabetical
`
`order as “a) … b) …, and c),” which clearly indicates the inventors’ intent to
`
`order, rather than to not order, the steps. This is yet another reason that the claim
`
`language soundly supports an order-of-steps requirement.
`
`
`
`Performance of steps [a], [b], and [c] in order is also prescribed by the
`
`specification. The Summary of the Invention states:
`
`In the method, one or more secure connections are established
`
`between different addresses of the first terminal and address of the
`
`other terminal, the connections defining at least said addresses of the
`
`two terminals. When the first terminal moves from one address to
`
`another address, a secure connection, whose endpoints are the new
`
`address of the first terminal and the address of the other terminal, is
`
`registered to be at least one of the active connections.
`
`Ex. 1001 [’302 Patent] 0007, 7:13-20. As this passage makes clear, in the
`
`invention, first, “one or more secure connections are established” (step [a]);
`
`second, “the first terminal moves from one address to another address” (step [b]);
`
`
`
`16
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`and third, the secure connection at the new address is “registered to be at least one
`
`of the active connections” (step [c]). This description of this preferred embodiment
`
`is consistent with this order-of-steps requirement, as the claimed steps [a], [b], and
`
`[c] are described in their claimed order, namely, [a] establishing secure
`
`connections, [b] the mobile terminal moving and checking whether a secure
`
`connection exists at the new address, and, [c] if it does, registering that secure
`
`connection for use. Id., 0008, 10:13-56.
`
`Still further support for this order-of-steps requirement is found in the fact
`
`that the goal of the invention, as described in the specification, is served by the
`
`steps being performed in that order. Notably, establishing secure connections
`
`before moving and changing addresses, as required by claim 1, accomplishes the
`
`goal of avoiding the latency problem with standard prior art IPsec, which set up a
`
`new connection after moving. See id., 0005, 4:53-60 (“IPSec does not work well
`
`with mobile devices. For instance, if a mobile terminal moves from one network to
`
`another, an IPSec connection set up is required, typically using the IKE key
`
`exchange protocol. Such a set up is expensive in terms of latency, since IKE may
`
`require several seconds to complete.”).
`
`For all of these reasons, claim 1 should be construed require that steps [a],
`
`[b], and [c] be performed in their written order.
`
`
`
`17
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`As explained below, the constructions above furnish additional reasons why
`
`the Petition should be denied institution. However, as shown infra §§ IV-C and V,
`
`institution should be denied for additional reasons as well, regardless whether the
`
`claim constructions proposed above are adopted.
`
`IV. THE PETITION FAILS TO SHOW A REASONABLE LIKELIHOOD
`THAT THE AHONEN-ISHIYAMA COMBINATIONS RENDER THE
`CLAIMS OBVIOUS (ALL CLAIMS, ALL GROUNDS)
`
`The Petition fails to show a reasonable likelihood of prevailing against
`
`independent claim 1, and therefore, by dependency, claims 2-16.
`
`The International Searching Authority found that Ahonen, Petitioner’s lead
`
`reference, was “not considered to be of particular relevance” to the patentability of
`
`the invention of the ’302 Patent. Ex. 1002 [’302 Prosecution History] 0108-0110.
`
`The International Searching Authority’s determination of no particular relevance is
`
`correct. The following sections further explain why Ahonen, alone or in the
`
`proposed Ishiyama combinations, does not disclose multiple limitations of the
`
`claims, all of which are recited in independent claim 1. If any one of these
`
`limitations has not been shown obvious by the Petition, institution must be denied.4
`
`
`4 Petitioner asserts three references: Ahonen, Ishiyama, and Gupta. The
`
`Petition relies on Gupta only in its Ground 2 arguments directed towards claims 14
`
`
`
`18
`
`
`
`Case IPR2019-00821
`Patent 8,037,302
`
`A. Ahonen Does Not Disclose “Establishing A Second Secure
`Connection” As Recited In Claim 1
`
`Claim 1 requires “establishing a second secure connection extending
`
`between a second network address of the first terminal and the original network
`
`address of the second terminal.” Ex. 1001 [’302 Patent] 0009, 12:22