throbber

`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`
`APPLE INC.,
`Petitioner
`
`v.
`
`MPH TECHNOLOGIES OY,
`Patent Owner
`____________________
`
`Case IPR2019-00822
`U.S. Patent No. 8,346,949
`____________________
`
`
`
`
`
`PETITION FOR INTER PARTES REVIEW OF
`U.S. PATENT NO. 8,346,949
`
`
`
`
`
`
`
`
`
`Mail Stop PATENT BOARD
`Patent Trial and Appeal Board
`U.S. Patent & Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`

`

`
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`TABLE OF CONTENTS
`
`
`I.
`
`II.
`
`III.
`
`
` The ’949 Patent ................................................................................................ 8 IV.
`
`Mandatory Notices (37 C.F.R. § 42.8(a)(1) .................................................... 2
`Grounds for Standing (37 C.F.R. § 42.104(a)) ................................................ 3
`Identification of Challenge (37 C.F.R. § 42.104(b)) ....................................... 3
`A. Citation of Prior Art .................................................................................... 3
`B. Statutory Grounds for the Challenge .......................................................... 7
`
`A. Overview of the ’949 Patent ....................................................................... 8
`1. Brief Overview of IPSec and SSL ..................................................... 9
`2. The ’949 patent focused on employing standard IPSec protocols to
`establish a single secure connection. .......................................................12
`3. The Examiner did not consider RFC3104, Grabelsky, or Wagner
`during prosecution. ..................................................................................15
`B. Level of Ordinary Skill in the Art ............................................................17
`C. Claim Construction ...................................................................................17
`1.
`“secure connection” .........................................................................17
`2.
`“unique identity [of the secure connection]” ...................................19
`
`A. Ground 1: Claims 1, 2, 4-7, 9, 11-14, 20-21, and 27-29 are unpatentable
`under 35 U.S.C. § 103 as obvious over RFC3104 and Grabelsky. ..........20
`1. Overview of RFC3104 .....................................................................20
`2. Overview of the Combination of RFC3104 and Grabelsky ............23
`3. The combination of RFC3104 and Grabelsky renders claim 1
`obvious. ...................................................................................................29
`4. The combination of RFC3104 and Grabelsky renders claim 2
`obvious. ...................................................................................................44
`5. The combination of RFC3104 and Grabelsky renders claim 4
`obvious. ...................................................................................................45
`6. The combination of RFC3104 and Grabelsky renders claim 5
`obvious. ...................................................................................................48
`
` Grounds of Unpatentability ...........................................................................20 V.
`
`
`
`- i -
`
`

`

`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`7. The combination of RFC3104 and Grabelsky renders claim 6
`obvious. ...................................................................................................48
`8. The combination of RFC3104 and Grabelsky renders claim 7
`obvious. ...................................................................................................49
`9. The combination of RFC3104 and Grabelsky renders claim 9
`obvious. ...................................................................................................52
`10. The combination of RFC3104 and Grabelsky renders claim 11
`obvious. ...................................................................................................54
`11. The combination of RFC3104 and Grabelsky renders claim 12
`obvious. ...................................................................................................56
`12. The combination of RFC3104 and Grabelsky renders claim 13
`obvious. ...................................................................................................58
`13. The combination of RFC3104 and Grabelsky renders claim 14
`obvious. ...................................................................................................58
`14. The combination of RFC3104 and Grabelsky renders claim 20
`obvious. ...................................................................................................59
`15. The combination of RFC3104 and Grabelsky renders claim 21
`obvious. ...................................................................................................60
`16. The combination of RFC3104 and Grabelsky renders claim 27
`obvious. ...................................................................................................61
`17. The combination of RFC3104 and Grabelsky renders claim 28
`obvious. ...................................................................................................63
`18. The combination of RFC3104 and Grabelsky renders claim 29
`obvious. ...................................................................................................64
`B. Ground 2: Claim 3 is unpatentable under 35 U.S.C. § 103 as obvious over
`RFC3104, Grabelsky, and Wagner. ..........................................................65
`1. Overview of Wagner ........................................................................65
`2. The combination of RFC3104, Grabelsky, and Wagner renders
`claim 3 obvious. ......................................................................................66
`
` Conclusion. ....................................................................................................71 VI.
`
`
`
`
`
`
`
`
`- ii -
`
`

`

`EXHIBIT LIST
`
`Exhibit No.
`
`Description
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`1017
`
`U.S. Patent No. 8,346,949 B2 to Vaarala et al., issued Jan. 1, 2013
`
`Declaration of David Goldschlag, Ph.D. (“Goldschlag Decl.”)
`
`Prosecution History of U.S. Patent No. 8,346,949 B2
`
`RFC3104 - RSIP Support for End-to-end IPsec (Oct. 2001)
`
`U.S. Patent No. 7,032,242 B1 to Grabelsky et al., issued Apr. 18,
`2006
`
`Wagner et al., Analysis of the SSL 3.0 Protocol, USENIX (Nov.
`1996)
`
`Declaration of Ms. Sandy Ginoza
`
`Curriculum Vitae of David Goldschlag, Ph.D.
`
`Declaration of James L. Mullins Ph.D.
`
`Curriculum Vitae of James L. Mullins
`
`S. Frankel, Demystifying the IPsec Puzzle, Artech House, Inc., 2001
`
`RSIP Support for End-to-end IPsec (RFC3104), IETF Data Tracker
`
`RFC2026 - The Internet Standards Process -- Revision 3 (Oct.
`1996)
`
`RFC2246 - The TLS Protocol Version 1.0 (Jan. 1999)
`
`RFC2401 - Security Architecture for the Internet Protocol (Nov.
`1998)
`
`RFC2402 - IP Authentication Header (Nov. 1998)
`
`RFC2406 - IP Encapsulating Security Payload (ESP) (Nov. 1998)
`
`
`
`- iii -
`
`

`

`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`Exhibit No.
`
`Description
`
`1018
`
`1019
`
`1020
`
`RFC2409 - The Internet Key Exchange (IKE) (Nov. 1998)
`
`RFC3102 - Realm Specific IP: Framework (Oct. 2001)
`
`Zhang et al., “A Multu-Layer IPsec Protocol,” (Aug. 2000)
`
`
`
`
`
`
`
`
`
`- iv -
`
`

`

`Apple Inc. petitions for inter partes review of claims 1-7, 9, 11-14, 20-21,
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`and 27-29 of United States Patent No. 8,346,949 to Vaarala et al. (Ex. 1001, “the
`
`’949 patent”), titled “Method and System for Sending a Message Through a Secure
`
`Connection.” The Petition demonstrates that all 29 claims of the ’949 patent are
`
`unpatentable.
`
`The ’949 patent purported to solve issues with Internet Protocol Security
`
`(IPSec) operability for mobile hosts. It did not. Rather, the alleged issues with
`
`IPSec presented by the ’949 patent were well-known and solved long before the
`
`earliest priority date of the ’949 patent. Ex. 1002, Goldschlag Decl., ¶50. In
`
`particular, the ’949 patent alleged that IPSec was designed for static connections,
`
`and therefore when a mobile host moved or changed its network address, IPSec
`
`provided no mechanism to alter parameters of the secure connection. Id.
`
`The ’949 patent alleged to solve these problems by establishing an end-to-
`
`end secure connection between two end hosts via an intermediate computer. But
`
`not only is this solution trivial, it was also explicitly disclosed by RFC3104 and
`
`Ilnicki prior to the earliest priority date of the ’949 patent. Additionally, Grabelsky
`
`and Wagner explain other well-known and simple elements of the claims that
`
`would have been known to a POSITA, such as data packet formats, use of
`
`translation tables, and use of Secure Sockets Layer (SSL).
`
`
`
`- 1 -
`
`

`

`Accordingly, there is at least a reasonable likelihood that at least one claim
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`of the ’949 patent is unpatentable, as shown herein. Therefore, Petitioner
`
`respectfully requests that the Board Institute trial on the grounds set forth herein
`
`and ultimately determine that all claims of the ’949 patent are invalid.
`
` Mandatory Notices (37 C.F.R. § 42.8(a)(1) I.
`
`
`REAL PARTY IN INTEREST: The real party-in-interest of the Petition is
`
`Apple Inc. (“Apple”).
`
`RELATED MATTERS: Pursuant to 37 C.F.R. § 42.8(b)(2), the ’949 patent is
`
`currently being asserted in a district court litigation captioned as MPH
`
`Technologies Oy v. Apple Inc., Case No. 4:18-cv-05935-PJH (N.D. Cal.), filed
`
`September 27, 2018.
`
`Petitioner is concurrently filing Petitions for inter partes review against
`
`related U.S. Patent Nos. 9,762,397 (IPR2019-00825); 9,712,494 (IPR2019-00823);
`
`9,712,502 (IPR2019-00824); and 9,838,362 (IPR2019-00826).
`
`LEAD AND BACKUP COUNSEL: Pursuant to 37 C.F.R. § 42.8(b)(3) and
`
`42,10(a), Petitioner appoints Michael D. Specht (Reg. No. 54,463) as its lead
`
`counsel and Daniel S. Block (Reg. No. 68,395) and Steven M. Pappas (Reg. No.
`
`73,904) as its back-up counsel, all at the address: STERNE, KESSLER, GOLDSTEIN &
`
`FOX, P.L.L.C., 1100 New York Avenue, N.W., Washington, D.C., 20005, phone
`
`number (202) 371-2600 and facsimile (202) 371-2540.
`
`
`
`- 2 -
`
`

`

`Service Information: Petitioner consents to electronic service by email at
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`the email addresses: mspecht-PTAB@sternekessler.com, dblock-
`
`PTAB@sternekessler.com, spappas-PTAB@sternekessler.com, and
`
`PTAB@sternekessler.com.
`
` Grounds for Standing (37 C.F.R. § 42.104(a)) II.
`
`
`The undersigned and Apple certify that the ’949 patent is available for inter
`
`partes review. Pursuant to 37 C.F.R. § 42.104(a), Petitioner certifies that the ’949
`
`patent is available for inter partes review and that Petitioner is not barred or
`
`estopped from requesting an inter partes review challenging the claims of the ’949
`
`patent on the grounds identified herein.
`
`III.
`
`
`Identification of Challenge (37 C.F.R. § 42.104(b))
`A. Citation of Prior Art
`The PCT application corresponding to the ’949 patent was filed on January
`
`21, 2003. The PCT application claims priority to a foreign application filed in
`
`Finland on January 22, 2002.1 Apple cites the following prior art references:
`
`“RFC3104: RSIP Support for End-to-end IPsec,” by Gabriel Montenegro
`
`and Michael Borella (Ex. 1004, “RFC3104”) is prior art under at least pre-AIA 35
`
`
`1 Apple does not acquiesce that the ’949 patent is entitled to a priority date
`
`based on the foreign filed application.
`
`
`
`- 3 -
`
`

`

`U.S.C. §§ 102(a) and 102(b) because it was published at least as of October 2001,
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`more than one year prior to the effective U.S. filing date of the ’949 patent.2 More
`
`specifically, RFC3104 was made publicly available no later than October 2001
`
`such that interested individuals, including POSITAs, could locate and obtain
`
`RFC3104. SeeBlue Calypso, LLC v. Groupon, Inc., 815 F.3d 1331, 1348 (Fed. Cir.
`
`2016). RFC3104 specifically includes this date on its face, as well as every
`
`subsequent page. See RFC3104.
`
`This date of publication is confirmed by Ms. Sandy Ginoza, custodian of
`
`records relating to the RFC Series managed by the Internet Engineering Task Force
`
`(IETF). Ex. 1007, Ginoza Decl., ¶1, 10. Ms. Ginoza is Director of the RFC
`
`Production Center, which is part of the “RFC Editor” function and is responsible
`
`for preparing documents for publication and placing files in an online repository as
`
`part of the authoritative RFC Series. Id., ¶1.
`
`Ms. Ginoza explains that “RFCs are kept in an online repository in the
`
`course of the RFC Editor’s regularly conducted business activity,” and “[i]t is the
`
`
`2 For the purposes of 35 U.S.C § 102(b), the relevant date to establish a
`
`reference as prior art to a patent is the “date of the application for patent in the
`
`United States” (i.e. the effective U.S. filing date), not a patent’s foreign priority
`
`date.
`
`
`
`- 4 -
`
`

`

`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`regular practice of the RFC Editor to make and keep the RFC records.” Id., ¶¶9-10.
`
`Ms. Ginoza further testifies that “[b]ased on the business records for the RFC
`
`Editor and the RFC Editor’s course of conduct in publishing RFCs,” RFC3104 was
`
`published “no later than October 2001.” Id., ¶12. Once published, it was
`
`“reasonably accessible to the public either on the RFC Editor website or via FTP
`
`from a repository.” Id.. For example, Ms. Ginoza testifies that RFC3104 was
`
`“indexed and placed in a public repository.” Id., ¶¶7-8. Thus, Ms. Ginoza confirms
`
`that RFC3104 was made publicly available and accessible no later than October
`
`2001.
`
`Petitioner’s expert, Dr. Goldschlag, additionally states that anyone
`
`interested, including a POSITA, would have had access to, and would have been
`
`able to locate RFC3104 no later than October 2001. Goldschlag Decl., ¶¶6-8.
`
`Indeed, the purpose of publishing RFCs was to publicly solicit input from
`
`POSITAs. Id. And, finally, the IETF data tracker further supports that RFC3104
`
`published as of October 1, 2001. Ex. 1012, 0001, 0003; Goldschlag Decl., ¶6.
`
`Accordingly, RFC3104 was published and available no later than October
`
`2001.
`
`U.S. Patent No. 7,032,242 to Grabelsky et al. (Ex. 1005, “Grabelsky”),
`
`titled “Method and System for Distributed Network Address Translation with
`
`Network Security Features,” is prior art under at least under at least pre-AIA 35
`
`
`
`- 5 -
`
`

`

`U.S.C. § 102(e) because it was filed on March 17, 1999, prior to the earliest
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`possible priority date of the ’949 patent.
`
`“Analysis of the SSL 3.0 Protocol,” by David Wagner and Bruce Schneier
`
`(Ex. 1006, “Wagner”) is prior art under at least pre-AIA 35 U.S.C. §§ 102(a) and
`
`102(b) because it was published more than one year prior to the earliest possible
`
`priority date of the ’949 patent.
`
`A copy of Wagner is submitted with the declaration of Dr. James L. Mullins,
`
`Ph.D, as Attachment 1B. Compare Ex. 1006 with Ex. 1009, Mullins Decl.,
`
`Attachment 1B. Wagner was originally published in the Proceedings of the Second
`
`USENIX Workshop on Electronic Commerce, held in Oakland, California on
`
`November 18-21, 1996, as indicated in the published conference proceedings.
`
`Mullins Decl., ¶¶38-42, Attachment 1A. As Dr. Goldschlag testifies from his
`
`experience, USENIX Workshops such as this were typically open to the interested
`
`public, and Wagner would have been distributed on November 18, 1996, to
`
`attendees of the conference without restriction. Goldschlag Decl., ¶9.
`
`Dr. Mullins testifies that the Second USENIX Workshop on Electronic
`
`Commerce conference proceedings, including Wagner, were received at the
`
`University of Rochester Libraries on May 19, 2000. Mullins Decl., ¶¶39, 43,
`
`Attachment 1A. Dr. Mullins confirms that there is no difference between Ex. 1007
`
`(Wagner) and the same article found in Attachment 1A. Id., ¶42. Dr. Mullins
`
`
`
`- 6 -
`
`

`

`explains that libraries, such as the University of Rochester Libraries, typically
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`make conference proceeding publications available very soon after receipt,
`
`“normally within a few days of receipt or (at most) within a few weeks of receipt.”
`
`Id., ¶¶31, 33. Thus, Wagner was publicly available at least by May 2000.
`
`Dr. Mullins also indicates that Wagner was publicly accessible such that
`
`interested individuals, including POSITAs, could locate and obtain it. Id., ¶¶43-49.
`
`For example, Dr. Mullins explains that the conference proceedings that include
`
`Wagner were indexed, and Wagner could be located at least by conference title and
`
`by subject. Id., ¶¶44-46. Searches for Wagner could be performed anywhere in the
`
`world by accessing, for example, WorldCat or its predecessor, First Search, which
`
`was available before the earliest priority date of the ’949 patent. Id., ¶¶19-20, 26,
`
`44-46. Wagner was also cited by other references prior to the priority date of the
`
`’949 patent, providing additional support for the public availability of Wagner. Id.,
`
`¶¶47-48.
`
`Accordingly, RFC3104 was published and available no later than May 2000.
`
`Statutory Grounds for the Challenge
`
`B.
`Petitioner requests review of claims 1-7, 9, 11-14, 20-21, and 27-29 on the
`
`following two grounds:
`
`Ground 1: Claims 1, 2, 4-7, 9, 11-14, 20-21, and 27-29 are unpatentable
`
`under 35 U.S.C. § 103 as obvious over RFC3104 and Grabelsky; and
`
`
`
`- 7 -
`
`

`

`Ground 2: Claim 3 is unpatentable under 35 U.S.C. § 103 as obvious over
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`RFC3104, Grabelsky, and Wagner.
`
` The ’949 Patent IV.
`
`
`A. Overview of the ’949 Patent
`The ’949 patent is directed to general techniques for “secure forwarding of a
`
`message from a first computer to a second computer.” ’949 patent, Abstract. The
`
`’949 patent includes a lengthy technical background discussing “a need to protect
`
`data and resources from disclosure, to guarantee the authenticity of data, and to
`
`protect systems from network based attacks.” Id., 1:27-29. The ’949 patent
`
`primarily discusses these concerns in terms of a “mobile host,” where the term
`
`“mobile” not only refers to physical mobility, but rather to “moving from one
`
`network to another, which can be performed by a physically fixed terminal as
`
`well.” Id., 4:9-26.
`
`The ’949 patent acknowledges that “IP security protocols (IPSec) provides
`
`the capability to secure communications between arbitrary hosts,” but “[t]he
`
`problem with standard IPSec is [] that it has been designed for static connections.”
`
`Id., 1:43-50, 4:27-28. Thus, when a host is mobile, the patent alleges that IPSec
`
`provides no mechanism to alter parameters of the secure connection. Id., 4:28-31.
`
`Because of this, the patent alleges that existing solutions employing IPSec “either
`
`employ extra tunnelling, causing extra packet size overhead, or use separate
`
`
`
`- 8 -
`
`

`

`tunnels, causing potential security problems in the intermediate host(s) that
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`terminate such tunnels.” Id., 6:10-13. However, numerous solutions already existed
`
`in the prior art that addressed these alleged problems in substantially the same way
`
`as the ’949 patent.
`
`Brief Overview of IPSec and SSL
`
`1.
`The specification of the ’949 patent focuses on implementation of IPSec
`
`protocols to establish secure connections between devices. See, e.g., ’949 patent,
`
`6:64-67. Additionally, dependent claim 3 recites “making use of SSL or TLS
`
`protocols.”3 Id., 22:44-46.
`
`IPSec is a well-known security protocol that “provides the capability to
`
`secure communications between arbitrary hosts, e.g., across a LAN, across private
`
`and public wide area networks (WANs)…” Id., 1:43-45; Goldschlag Decl., ¶35.
`
`“[A]cross the internet IPSec can be used in different ways, such as for building
`
`secure virtual private networks, to gain a secure access to a company network, or
`
`to secure communication with other organisations, ensuring authentication and
`
`confidentiality and providing a key exchange mechanism.” Id.; ’949 patent, 1:46-
`
`50.
`
`
`3 Of note, the ’949 patent does not mention “SSL” or “TLS” outside of claim
`
`3, as discussed further in Ground 2.
`
`
`
`- 9 -
`
`

`

`A key concept of IPSec is a security association (SA), and the ’949 patent
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`explains that “[a] security association is a one-way relationship between a sender
`
`and a receiver that offers security services to the traffic carried on it.” ’949 patent,
`
`2:7-12. “[I]f a secure two way relationship is needed, then two security
`
`associations are required.” Id., 2:11-12. The ’949 patent explains that “[a] security
`
`association is uniquely identified by three parameters. The first one, the Security
`
`Parameters Index (SPI), is a bit string [that] … is carried in AH and ESP headers to
`
`enable the receiving system to select the SA under which a received packet will be
`
`processed. IP destination address is the second parameter, which is the address of
`
`the destination end point of the SA, which may be an end user system or a network
`
`system such as a firewall or a router. The third parameter, the security protocol
`
`identifier indicates whether the association is an AH or ESP security association.”
`
`’949 patent, 2:28-38; Goldschlag Decl., ¶¶37-38.4
`
`Two IPSec security services are typically used, including “an authentication
`
`protocol designated by the header of the protocol, Authentication Header (AH),
`
`and a combined encryption/authentication protocol designated by the format of the
`
`packet for that protocol, Encapsulating Security Payload (ESP).” ’949 patent, 1:64-
`
`2:3; Goldschlag Decl., ¶36. IPSec services further support two modes: “[t]ransport
`
`
`4 Emphasis added unless otherwise indicated in this Petition.
`
`
`
`- 10 -
`
`

`

`mode” and “tunnel mode.” ’949 patent, 3:1-4; Goldschlag Decl., ¶39. “Transport
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`mode provides protection primarily for upper layer protocols and extends to the
`
`payload of an IP packet,” while “[t]unnel mode provides protection to the entire IP
`
`packet.” ’949 patent, 3:3-12. The ’949 patent makes use of these IPSec protocols
`
`and modes in the same way as the prior art. Goldschlag Decl., ¶40.
`
`SSL is a protocol that is “is intended to provide a practical, application-
`
`layer, widely applicable connection-oriented mechanism for Internet client/server
`
`communications security.” Wagner, 0002. Around the time of the ’949 patent, SSL
`
`had “become a de facto standard for cryptographic protection of Web http traffic.”
`
`Id.; Goldschlag Decl., ¶44. SSL and its successor, TLS, are often used as an
`
`alternative to IPSec, although the protocol standards may be used in conjunction
`
`with one another. Goldschlag Decl., ¶44.
`
`“SSL is divided into two layers, with each layer using services provided by a
`
`lower layer and providing functionality to higher layers. The SSL record layer
`
`provides confidentiality, authenticity, and replay protection over a connection-
`
`oriented reliable transport protocol such as TCP. Layered above the record layer is
`
`the SSL handshake protocol, a key-exchange protocol which initializes and
`
`synchronizes cryptographic state at the two endpoints. After the key-exchange
`
`protocol completes, sensitive application data can be sent via the SSL record
`
`layer.” Wagner, 0002; Goldschlag Decl., ¶45.
`
`
`
`- 11 -
`
`

`

`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`The ’949 patent focused on employing standard IPSec
`protocols to establish a single secure connection.
`
`2.
`
`The ’949 patent purports to “develop a method for forwarding secure
`
`messages between two computers, especially, via an intermediate computer.” ’949
`
`patent, 6:17-20. The ’949 patent illustrates an example telecommunication network
`
`in Figure 1:
`
`’949 patent, FIG. 1 (annotated).
`
`
`
`The example network includes “a first computer, here a client computer 1 served
`
`by an intermediate computer, here as a server 2, and a host computer 4, that is
`
`served by the second computer, here a security gateway (SGW) 3.” Id., 9:57-61.
`
`Server 2 acts as the intermediate computer between client computer 1 and security
`
`gateway 3.
`
`
`
`- 12 -
`
`

`

`The ’949 patent describes that “an IPSec connection is formed between the
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`client computer 1 (the first computer) and the security gateway 3 (the second
`
`computer).” Id., 10:32-34. To create the IPSec connection, “a SA [(Security
`
`Association)] (or usually a SA bundle) is formed between the respective computers
`
`with a preceding key exchange. The key exchange between the first and the second
`
`computer can take place manually or it can be performed with an automatic key
`
`exchange protocol such as the IKE [(Internet Key Exchange)] protocol.” Id.,
`
`10:34-39. As described above, the patent explains that an IPSec “security
`
`association is a one-way relationship between a sender and a receiver that offers
`
`security services to the traffic carried on it.” Id., 2:8-10.
`
`Following establishment of an SA, “[m]essages to be sent to the host
`
`terminal 4 from the client computer 1 are first sent to the server 2, wherein an
`
`IPSec translation and an IKE translation takes place. After that the message can be
`
`sent to the security gateway 3, which sends the message further in plain text to the
`
`host terminal 4.” Id., 10:45-49. A message sent to the intermediate computer (e.g.,
`
`server 2) includes “a unique identity and a destination address.” Id., 6:33-35. This
`
`unique identity and destination address “are used to find an address to the second
`
`computer” (e.g., security gateway 3). Id., 6:36-38. When the address of the second
`
`computer is found, the unique identity and current destination address of the
`
`message are substituted with another unique identity and the determined
`
`
`
`- 13 -
`
`

`

`destination address of the second computer. Id., 6:38-41. The message is then
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`forwarded from the intermediate computer (e.g., server 2) to the second computer
`
`(e.g., security gateway 3). Id., 6:41-42.
`
`During prosecution, the Applicant explained that the purported unique
`
`feature of the invention is that “the secure connection is established all the way
`
`between the first computer and the second computer via the intermediate computer
`
`by exchanging keys…” Ex. 1003, Prosecution History, 0237. The Applicant
`
`explained that this allows “a secure message, sent from the first computer to the
`
`intermediate computer, [to] be modified by the intermediate computer so that it can
`
`be forwarded from the intermediate computer to the second computer in the same
`
`secure connection without requiring the cumbersome exchange of additional keys
`
`to set up a new secure connection between the intermediate computer and the
`
`second computer.” Id.
`
`In other words, the Applicant attempted to derive novelty from establishing
`
`a single secure connection between endpoints, rather than establishing separate
`
`secure connections between the intermediate computer and each of the two
`
`endpoints. Indeed, the Examiner allowed the claims of the ’949 patent after the
`
`claims were amended to employ a single “secure connection.” Id., 0081. The
`
`Applicant differentiated the claims from the applied prior art, alleging that the prior
`
`art “merely teaches the use of two tunnels,” and “expressly teaches away from
`
`
`
`- 14 -
`
`

`

`using a single tunnel” between the two endpoints. Id., 0088-0090 (emphasis in
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`original). But, as discussed in the grounds below, the prior art is replete with
`
`examples of this architecture.
`
`3.
`
`The Examiner did not consider RFC3104, Grabelsky, or
`Wagner during prosecution.
`
`In its long prosecution, the ’949 patent was subject to seven different
`
`rejections, two requests for continued examination, and an appeal brief, before a
`
`notice of allowance was eventually received. Ex. 1003, 0106, 0132, 0167, 0208,
`
`0269, 0318, 0358, 0382, 0415, 0463. In fact, more than five and a half years passed
`
`from the first rejection of the ’949 patent in 2008 to issuance in 2013.
`
`The claims of the ’949 patent were first rejected as being anticipated by U.S.
`
`Patent Pub. No. 2001/0047487 to Linnakangas et al. (“Linnakangas”). Id., 0466.
`
`Applicant argued against Linnakangas by amending the claims and emphasizing
`
`that “an important feature of the invention is that a secure message may be sent
`
`from a first computer to a second computer even when there is an intermediate
`
`computer therebetween that is part of the same secure connection.” Id., 0443. The
`
`Examiner, unconvinced, issued a final Action again rejecting the claims as being
`
`anticipated by Linnakangas. Id., 0417.
`
`After a request for continued examination and two more Office Actions
`
`rejecting the claims in view of Linnakangas, Applicant filed a notice of appeal and
`
`
`
`- 15 -
`
`

`

`an appeal brief. In the appeal brief, Applicant continued to argue the “[u]nique
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`features of the present invention are the secure connection is established all the
`
`way between the first computer and the second computer via the intermediate
`
`computer.” Id., 0237. The Examiner eventually reopened prosecution, replacing
`
`Linnakangas with U.S. Patent Pub. No. 2002/0091921 to Kunzinger, which taught
`
`“end to end data sending via an intermediate gateway using secure tunnels.” Id.,
`
`0211.
`
`Two more rejections followed based on Kunzinger. Id., 0106, 0167. The
`
`Examiner was incorrectly persuaded only after Applicant amended the claims to
`
`require “secure forwarding of a message from a first computer to a second
`
`computer using a secure connection via an intermediate computer.” Id., 0081
`
`(underline shows amendment). The patent then issued on January 1, 2013.5
`
`But the ’949 patent should never have issued in view of Applicant’s minor
`
`amendment to the claims. And none of RFC3104, Grabelsky, or Wagner was
`
`considered during prosecution of the ’949 patent. As discussed in detail below, the
`
`
`5 Four years after the patent finally issued, Applicant requested a Certificate
`
`of Correction to correct typographical errors in independent claim 1. Id., 0001-
`
`0008. Those corrections are reflected in this Petition.
`
`
`
`- 16 -
`
`

`

`’949 patent would never have been issued in view of these references had they
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`been in front of the Examiner during prosecution.
`
`Level of Ordinary Skill in the Art
`
`B.
`A person having ordinary skill in the art (POSITA) would have had a
`
`Bachelor’s (B.S.) degree in Computer Science, Computer Engineering, Electrical
`
`Engineering, or an equivalent field, as well as at least 2-5 years of academic or
`
`industry experience in the field of Internet security. Goldschlag Decl., ¶¶31-32.
`
`C. Claim Construction
`In an inter partes review, claims are “construed using the same claim
`
`construction standard that would be used to construe the claim in a civil action
`
`under 35 U.S.C. 282(b).” 37 C.F.R. §42.100(b). Claims must be given their
`
`ordinary and customary meaning as understood by one of ordinary skill in the art at
`
`the time of the invention in light of the specification and the prosecution history
`
`pertaining to the patent. Id.; Phillips v. AWH Corp., 415 F.3d 1303, 1312-1313
`
`(Fed. Cir. 2015) (en banc); see also 83 Fed. Reg. 51340.
`
`“secure connection”
`1.
`Each of claims 1, 15, 27, and 28 recite the term “secure connection.” The
`
`term “secure connection” should be construed to encompass “one or more security
`
`associations.”
`
`
`
`- 17 -
`
`

`

`This is consistent with the use of the term in both the specification and
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`prosecution history. The specification explains that “[t]he IP security protocols
`
`(IPSec) provides the capability to secure communications between arbitrary hosts,
`
`e.g., across a LAN, across private and public wide area networks (WANs) and
`
`across the internet.” ’949 patent, 1:43-46. The specification

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket