throbber
Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`MPH TECHNOLOGIES OY,
`
`Patent Owner.
`
`____________
`
`Case IPR2019-00822
`Patent 8,346,949
`
`____________
`
`PATENT OWNER’S PRELIMINARY RESPONSE
`
`
`
`
`
`
`
`
`
`

`

`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`
`
`
`TABLE OF CONTENTS
`
`I. 
`INTRODUCTION ........................................................................................... 1 
`DISCLAIMER ................................................................................................. 4 
`II. 
`III.  CLAIM CONSTRUCTION ............................................................................ 4 
`A. 
`The “Unique Identity” Limitations ....................................................... 7 
`B. 
`The “Substituting” Limitations ........................................................... 20 
`IV.  THE PETITION FAILS TO SHOW A REASONABLE LIKELIHOOD
`THAT THE RFC3104-GRABELSKY COMBINATIONS RENDER THE
`CLAIMS OBVIOUS (ALL CLAIMS, ALL GROUNDS) ........................... 24 
`A. 
`“First Unique Identity,” “Second Unique Identity” (All Claims) ....... 25 
`B. 
`“Performing a Translation by Using the First Unique Identity to Find
`a Second Destination Address to the Second Computer” (All Claims). .
`
` ............................................................................................................ 34 
`“Substituting” Limitations (All Claims) ............................................. 41 
`1.  Adding An Outer IP Header Is Not “Substituting” As Claimed. ... 42 
`2.  No Motivation Is Shown To Replace The Outermost IP Header. .. 52 
`CONCLUSION .............................................................................................. 59 
`
`
`V. 
`
`C. 
`
`
`
`i
`
`
`
`

`

`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`TABLE OF AUTHORITIES
`
`COURT DECISIONS 
`
`Arendi S.A.R.L. v. Apple Inc.,
`832 F.3d 1355 (Fed. Cir. 2016) ..................................................................... 50, 51
`Aristocrat Techs. Australia Pty Ltd. v. Int’l Game Tech.,
`709 F.3d 1348 (Fed. Cir. 2013) ............................................................................ 10
`Becton, Dickinson & Co. v. Tyco Healthcare Grp., LP,
`616 F.3d 1249 (Fed. Cir. 2010) ................................................................. 8, 10, 14
`Diebold Nixdorf, Inc. v. Int’l Trade Comm’n,
`899 F.3d 1291 (Fed. Cir. 2018) ............................................................... 38, 47, 53
`DSS Tech. Mgmt. Inc. v. Apple Inc.,
`885 F.3d 1367 (Fed. Cir. 2018) ......................................................... 39, 49, 50, 51
`Epistar Corp. v. ITC,
`566 F.3d 1321 (Fed. Cir. 2009) ................................................................. 8, 11, 14
`Harmonic Inc. v. Avid Tech., Inc.,
`815 F.3d 1356 (Fed. Cir. 2016) ............................................................................ 36
`HTC Corp. v. Cellular Commc’ns Equip., LLC,
`701 Fed. Appx. 978 (Fed. Cir. 2017) ..................................................................... 8
`
`In re Magnum Oil Tools Int’l, Ltd.,
`829 F.3d 1364 (Fed. Cir. 2016) ............................................................................ 36
`In re Schreiber,
`128 F.3d 1473 (Fed. Cir. 1997) ............................................................................ 40
`K/S Himpp v. Hear-Wear Techs., LLC,
`751 F.3d 1362 (Fed Cir. 2014) ............................................................................. 48
`Mformation Techs., Inc. v. Research in Motion Ltd.,
`764 F.3d 1392 (Fed. Cir. 2014) ......................................................... 10, 14, 15, 16
`
`
`
`ii
`
`

`

`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`PAR Pharm. v. TWi Pharms., Inc.,
`773 F.3d 1186 (Fed. Cir. 2014) ............................................................................ 39
`Personalweb Techs., LLC v. Apple, Inc.,
`917 F.3d 1376 (Fed. Cir. 2019) ............................................................................ 40
`Polaris Indus., Inc. v. Arctic Cat, Inc.,
`882 F.3d 1056 (Fed. Cir. 2018) ............................................................................ 52
`Primos, Inc. v. Hunter’s Specialties, Inc.,
`451 F.3d 841 (Fed. Cir. 2006) ................................................................................ 8
`Trintec Indus., Inc. v. Top- U.S.A. Corp.,
`295 F.3d 1292 (Fed. Cir. 2002) ............................................................................ 39
`Vectra Fitness, Inc. v. TNWK Corp.,
`162 F.3d 1379 (Fed. Cir. 1998) .............................................................................. 4
`Vivid Techs., Inc. v. Am. Science & Eng’g, Inc.,
`200 F.3d 795 (Fed. Cir. 1999) ................................................................................ 5
`AGENCY DECISIONS 
`
`Am. Honda Motor Co. v. Blitzsafe Tex., LLC,
`IPR2016-01473, Paper 9 (PTAB Jan. 24, 2017) ..................................... 37, 47, 53
`Apple Inc. v. Papst Licensing GmbH & Co.,
`IPR2016-01863, Paper 35 (PTAB Apr. 13, 2018) .................................. 38, 47, 53
`
`Ericsson Inc. v. Intellectual Ventures I LLC,
`IPR2015-01367, Paper 6 (Dec. 9 2015) ............................................................... 42
`Hopkins Mfg. Corp. v. Cequent Performance Prods., Inc.,
`IPR2015-00613, Paper 9 (PTAB Aug. 7, 2015) ....................................... 9, 11, 30
`Kinetic Techs., Inc. v. Skyworks Sols., Inc.,
`IPR2014-00529, Paper 8 (PTAB Sept. 23, 2014) ................................... 37, 47, 53
`Lenroc Co. v. Enviro Tech Chem. Servs., Inc.,
`IPR2014-00382, Paper 12 (PTAB Jul. 24, 2014) .................................................. 5
`
`
`
`iii
`
`

`

`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`Unified Patent Inc. v. Plectrum LLC,
`IPR2017-01430, Paper 30 (PTAB Nov. 13, 2018) .............................................. 47
`Unified Patents Inc. v. Societa Italiana Per Lo Sviluppo Dell’Elettronica S.P.A.,
`IPR2017-00565, Paper 13 (PTAB June 15, 2017) .................................. 38, 47, 53
`Whole Space Indus. Ltd., v. Zipshade Indus. (B.V.I.) Corp.,
`IPR2015-00488, Paper 14 (PTAB July 24, 2015) ............................................... 43
`STATUTES 
`
`35 U.S.C. § 253 .......................................................................................................... 4
`RULES AND RULEMAKING 
`
`37 C.F.R. § 42.100 ..................................................................................................... 5
`37 C.F.R. § 42.107 ..................................................................................................... 4
`37 C.F.R. § 42.108 ..................................................................................................... 1
`37 C.F.R. § 42.65 ........................................................................................ 38, 47, 53
`77 Fed. Reg. 48,680, 48,689 (Aug. 14, 2012) ........................................................... 4
`83 Fed. Reg. 51,340, 51,358 (Oct. 11, 2018) ............................................................. 5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`iv
`
`

`

`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`EXHIBIT LIST
`
`2001
`
`2002
`
`2003
`
`2004
`
`2005
`
`2006
`
`2007
`
`Disclaimer in Patent Under 37 CFR 1.321(a), U.S. Pat.
`No. 8,346,949, cl. 27 (10/500,930 Jul. 15, 2019)
`
`Substitute, Merriam-Webster Dictionary (Online ed.) (accessed
`June 20, 2019) (available at https://www.merriam-
`webster.com/dictionary/substitute)
`
`Substitute, Am. Heritage College Dictionary (3d ed. 1997)
`
`RFC1853 - IP in IP Tunneling (dated Oct. 1995)
`
`RFC2784 - Generic Routing Encapsulation (dated Mar. 2000)
`
`RFC2661 - Layer Two Tunneling Protocol “L2TP” (dated Aug.
`1999)
`
`Declaration of Ashley LaValley
`
`
`
`v
`
`

`

`
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`
`
`I.
`
`INTRODUCTION
`Patent Owner MPH Technologies Oy (“Patent Owner”) submits this
`
`Preliminary Response to the Petition for Inter Partes Review filed by petitioner
`
`Apple Inc. (“Petitioner”) seeking inter partes review of claims 1-7, 9, 11-14, 20-
`
`21, and 27-29 of U.S. Patent No. 8,346,949 (Exhibit 1001) (“the ’949 Patent”).
`
`Patent Owner respectfully requests that the Board deny the Petition, because it fails
`
`to demonstrate a reasonable likelihood that at least one claim is unpatentable under
`
`the proposed grounds, as required by 37 C.F.R. § 42.108(c).
`
`The Petition asserts that claim 1 is obvious over a combination of RFC3104
`
`and Grabelsky. Contrary to the Petition’s argument, however, RFC3104 and
`
`Grabelsky teach methods that are significantly different from the claimed invention
`
`and are missing numerous limitations of the ’949 Patent’s claims. These missing
`
`limitations of claim 1 apply by dependency to all remaining challenged claims.1
`
`The Petition fails to show a reasonable likelihood that RFC3104 and Grabelsky, as
`
`combined, render the claims obvious for at least three reasons.
`
`
`
`1 Claim 27 has been disclaimed. Ex. 2001.
`
`
`
`1
`
`

`

`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`First, the Petition fails to establish a reasonable likelihood that RFC3104 and
`
`Grabelsky teach the “destination address” and “unique identity” limitations
`
`required by all claims. The Petition’s argument that these limitations are met relies
`
`upon an erroneously broad interpretation of the claim that would allow the
`
`“destination address” to be the same as, or a component of, the claimed “unique
`
`identity.” Under basic claim construction principles, however, the intrinsic
`
`evidence requires these two elements of the challenged claims to be separate and
`
`distinct. Infra § IV-A.
`
`Second, even if every “destination address” and “unique identity” limitations
`
`were met, the Petition would still fail to establish a reasonable likelihood that
`
`RFC3104 and Grabelsky disclose “performing a translation by using the first
`
`unique identity to find a second destination address to the second computer” as
`
`required by all claims. The Petition’s argument that this limitation is met relies on
`
`unsupported opinion testimony to fill this gap. In fact, however, this limitation is
`
`simply missing. No amount of conclusory testimony can change that. Infra § IV-B.
`
`Third, the Petition also fails to establish any reasonable likelihood that
`
`RFC3104 and Grabelsky teach “substituting the first destination address with the
`
`second destination address[] to the second computer” and “substituting, at the
`
`intermediate computer, the first unique identity with a second unique identity of
`
`
`
`2
`
`

`

`the secure connection” as all claims require. Instead of substituting such supposed
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`addresses or identities, RFC3104 and Grabelsky teach, at most, only adding
`
`something new on top of the original purported “destination address and unique
`
`address” without replacing, changing or modifying the purported “destination
`
`address and unique identity” that are already there. And the Petition demonstrates
`
`no motivation to modify the references to add such a substitution. Infra § IV-C.
`
`While the deficiencies mentioned above are each sufficient to foreclose
`
`institution, they are merely examples of the Petition’s recurrent reliance on
`
`conclusory attorney arguments to fill in the limitations missing from the proposed
`
`combinations. The accompanying opinion testimony essentially does no more than
`
`copy those arguments without adding objective support. The testimony, therefore,
`
`lends no material support to bridge the gaps in Petitioner’s references and grounds.
`
`Institution of inter partes review should be denied.2
`
`
`
`2 Because partial institution is not permitted, this Preliminary Response only
`
`addresses selected arguments sufficient to dispose of the Petition as a whole. For
`
`example, the Petition relies on a third reference, Wagner, in one additional
`
`combination as to one additional limitation of dependent claim 3. Pet., 66-70. The
`
`Petition relies solely upon RFC3104 and Grabelsky for all other limitations of all
`
`
`
`3
`
`

`

`DISCLAIMER
`Patent Owner has filed a statutory disclaimer under 35 U.S.C. § 253(a) of
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`II.
`
`claim 27 of the ’949 patent in compliance with 37 C.F.R. 1.321(a). See Ex. 2001
`
`[Disclaimer]; 77 Fed. Reg. 48,680, 48,689 (Aug. 14, 2012) (codified at 37 C.F.R.
`
`§ 42.107(e)). The result of the disclaimer is that the ’949 Patent “is treated as
`
`though the disclaimed clai[m] never existed.” Vectra Fitness, Inc. v. TNWK Corp.,
`
`162 F.3d 1379, 1383 (Fed. Cir. 1998). “No inter partes review will be instituted
`
`based on disclaimed claims.” 37 C.F.R. § 42.107(e). Therefore, no inter partes
`
`review may be instituted based on disclaimed claim 27.
`
`As shown below, the Petition fails to show any reasonable likelihood of
`
`prevailing against claim 1. With the disclaimer of claim 27, all other remaining
`
`challenged claims (2–7, 9, 11–14, 20, 21, 28, and 29) depend from claim 1.
`
`III.
`
`CLAIM CONSTRUCTION
`The Petition was filed after November 13, 2018, the date of the Office’s
`
`adoption of the Phillips claim construction standard for IPRs. The claims therefore
`
`must be construed “in accordance with the ordinary and customary meaning of
`
`
`
`remaining challenged claims, including that claim. Pet., 20-64. Therefore, this
`
`preliminary response does not address Wagner.
`
`
`
`4
`
`

`

`such claim as understood by one of ordinary skill in the art and the prosecution
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`history pertaining to the patent.” 83 Fed. Reg. 51,340, 51,358 (Oct. 11, 2018)
`
`(codified at 37 C.F.R. § 42.100(b)).
`
`The Petition proposes claim constructions for the “secure connection” and
`
`“unique identity” limitations of every challenged claim. Pet., 17-19; Ex. 1001
`
`[’949 Patent], cl. 1. Yet, the Petition fails to demonstrate any reasonable likelihood
`
`that Petitioner’s proposed claim construction positions are correct. Although the
`
`burden of identifying how the claims are to be construed falls on Petitioner, and
`
`not Patent Owner, we point out in this preliminary response that the Petition’s
`
`obviousness arguments rely on constructions that cannot be supported. Because
`
`the Petition’s arguments depend on these unsupportable constructions, resolution
`
`of that issue resolves this case against institution. See Lenroc Co. v. Enviro Tech
`
`Chem. Servs., Inc., IPR2014-00382, Paper 12, 15-16 (PTAB Jul. 24, 2014)
`
`(denying institution based on patent owner’s correct proposed construction of the
`
`claims, which resolved issue on which every ground depended).
`
`Specifically, Petitioner’s proposed construction of “unique identity,” Pet. 19,
`
`is erroneous and suffers from multiple deficiencies. At this stage, however, “to
`
`resolve the controversy” against institution, Vivid Techs., Inc. v. Am. Science &
`
`Eng’g, Inc., 200 F.3d 795, 803 (Fed. Cir. 1999), it is necessary only to show that
`
`
`
`5
`
`

`

`Petitioner’s construction must be rejected to the extent it allows the “[first/second]
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`unique identity” to include the “[first/second] destination address.” Under a correct
`
`construction, the “destination address” must be separate and distinct from the
`
`“unique identity,” not merely a component thereof. Infra § III-A.3 The Petition’s
`
`reliance on this unsupportably broad interpretation of the claims is sufficient by
`
`itself to require denial of institution. Infra § IV-A; see also id. § IV-B.
`
`Furthermore, the proposed grounds also inherently require that the
`
`“substituting” limitations encompass adding a new destination address and unique
`
`identity without replacing, changing, or modifying the one that is already there.
`
`Under any correct construction, however, the claims require replacing, changing,
`
`or modifying the first address and unique identity, not merely adding a second
`
`address or unique identity. Infra § III-B. For this additional, independent reason,
`
`the proposed grounds must be rejected and institution denied. Infra § IV-C.
`
`These points are discussed in further detail below.
`
`
`
`3 Patent Owner also disagrees with, among others, Petitioner’s construction
`
`of “secure connection,” Pet. 17, but the Board need not reach that issue to deny
`
`institution.
`
`
`
`6
`
`

`

`For purposes of determining that institution is unwarranted, no further
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`construction is presently needed beyond the plain and ordinary meaning to a
`
`person of ordinary skill in the art at the time of the invention.
`
`A. The “Unique Identity” Limitations
`The “first unique identity” and “second unique identity” recited in the claims
`
`should be construed to be separate and distinct from the “first destination address”
`
`and “second destination address,” respectively.
`
`Claim 1 recites, in part, “forming a secure message, in the first computer, by
`
`giving the secure message a first unique identity and a first destination address to
`
`the intermediate computer.” Ex. 1001 [’949 Patent], cl. 1 (emphasis added). Claim
`
`1 further recites that, upon receiving and translating the message, the intermediate
`
`computer separately substitutes each of the first unique identity and the first
`
`destination address for the second unique identity and the second destination
`
`address, respectively:
`
`the intermediate computer substituting the first destination address with
`the second destination[] address of the secure connection,
`
`[and] substituting, at the intermediate computer, the first unique
`identity with a second unique identity of the secure connection.
`
`Id. Accordingly, the secure message recited in claim 1 must include both a first
`
`unique identity and a first destination address.
`
`
`7
`
`

`

` There is a “strong” and “clear implication” that when two structures are
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`separately named in a claim “the named entities are not one and the same
`
`structure.” HTC Corp. v. Cellular Commc’ns Equip., LLC, 701 Fed. Appx. 978,
`
`982 (Fed. Cir. 2017) (affirming PTAB’s finding that two separate steps of
`
`challenged claim must be performed by separate components); Becton, Dickinson
`
`& Co. v. Tyco Healthcare Grp., LP, 616 F.3d 1249, 1254 (Fed. Cir. 2010) (“Where
`
`a claim lists elements separately, ‘the clear implication of the claim language’ is
`
`that those elements are ‘distinct component[s]’ of the patented invention.”)
`
`(internal citations omitted); see also, e.g., Epistar Corp. v. ITC, 566 F.3d 1321,
`
`1335 (Fed. Cir. 2009) (“The claims and specification of the patent consistently
`
`treat these two structures as separate and distinct elements. . . . [W]here two steps
`
`(or structures) are entirely different concepts and procedures and identified as
`
`separate steps in the claims, no skilled artisan could reasonably construe them as a
`
`single element.”) (patent number, internal quotation marks, and record citations
`
`omitted); Primos, Inc. v. Hunter’s Specialties, Inc., 451 F.3d 841, 848 (Fed. Cir.
`
`2006) (“[T]he terms ‘engaging’ and ‘sealing’ are both expressly recited in the
`
`claim and therefore ‘engaging’ cannot mean the same thing as ‘sealing’ . . . .”).
`
`The Director has routinely relied on this claim construction principle to deny
`
`institution. See, e.g., Hopkins Mfg. Corp. v. Cequent Performance Prods., Inc.,
`
`
`
`8
`
`

`

`IPR2015-00613, Paper 9, 12 (PTAB Aug. 7, 2015) (“We determine, for purposes
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`of this Decision, based on the Specification of the ‘780 patent, that claims 1 and 8
`
`of the ‘780 patent in fact require that the deceleration signal and inclination signal
`
`are separate and distinct.”) (denying institution).
`
`As shown above, the claims recite giving a message both the “first unique
`
`identity” and the “first destination address,” but recites them separately.
`
`Therefore, the plain language of the challenged claims clearly supports that the
`
`first unique identity is separate and distinct from the first destination address, and
`
`the second unique identity is separate and distinct from the second destination
`
`address.
`
`The claimed method also requires that the intermediate computer perform
`
`two separate acts of substitution: (1) substituting the first destination address with
`
`the second destination address and (2) substituting the first unique identity with a
`
`second unique identity. This is even stronger evidence that the destination address
`
`and unique identity must be separate components. If not, it would be unnecessary
`
`to separately claim that the intermediate computer substitutes (1) the destination
`
`address and (2) the unique identity.
`
`In fact, if the destination address were the same as or a part of the unique
`
`identity, then logically the intermediate computer would necessarily substitute the
`
`
`
`9
`
`

`

`unique identity when it substituted the destination address because it would follow
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`that changing the destination address would change the unique identity. In other
`
`words, the two substitution steps would be collapsed into a single act, i.e.,
`
`substitution of the destination address would also be substitution of the unique
`
`identity.
`
`And, this would render the element of “substituting … the first unique
`
`identity with a second unique identity” superfluous. Rendering this claim language
`
`superfluous in this manner is improper. See, e.g., Aristocrat Techs. Australia Pty
`
`Ltd. v. Int’l Game Tech., 709 F.3d 1348, 1355-1358 (Fed. Cir. 2013) (declining to
`
`adopt proposed construction because it would render another step of method claim
`
`superfluous); Mformation Techs., Inc. v. Research in Motion Ltd., 764 F.3d 1392,
`
`1399 (Fed. Cir. 2014) (“We are persuaded by Blackberry’s argument that the
`
`separate sub-step for establishing a connection would become ‘superfluous’ if we
`
`concluded that a connection did not have to be established (completed) before
`
`transmission. That is because, under such construction of the claim, establishing a
`
`connection is necessarily encompassed in transmitting a command.”).
`
`Moreover, consistent with the plain language of the claims, the specification
`
`of the ’949 Patent abundantly confirms that the unique identity and destination
`
`address are separate and distinct. See Becton, Dickinson, 616 F.3d at 1254-1255
`
`
`
`10
`
`

`

`(citing specification as “confirm[ing]” that separately recited elements are in fact
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`separate structures); Epistar, 566 F.3d at 1335 (relying on specification to construe
`
`separately recited elements as separate structures); Hopkins, IPR2015-00613,
`
`Paper 9, 12 (same). There is not a single embodiment in the ’949 Patent in which
`
`the destination address is any part of the “unique identity,” or vice versa. In every
`
`instance where they are described in the specification, they are identified,
`
`described, and treated as separate and distinct elements.
`
` In the Abstract of the ‘949 Patent, for example, the unique identity and
`
`destination address are presented as separate elements, as are the two distinct steps
`
`of substituting the destination addresses and the unique identities:
`
`In the first computer, a secure message is then formed by giving the
`message a unique identity and a destination address. The message is
`sent from the first computer to the intermediate computer after which
`the destination address and the unique identity are used to find an
`address to the second computer. The current destination address is
`substituted with the found address to the second computer, and the
`unique identity is substituted with another unique identity.
`
`Ex. 1001 [’949 Patent], Abstract; see also id., 6:33-42.
`
`In an embodiment that utilizes IPSec protocols, the unique identity is one or
`
`more Secure Parameter Index (SPI) values. Ex. 1001 [’949 Patent], 7:5-7 (“The
`
`unique identity is one or more SPI values”). The message sent from the first
`
`
`11
`
`

`

`computer includes the address of the intermediate computer (the first destination
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`address) in an outer IP header and, separately, an SPI value that serves as the
`
`unique identity. Id., 6:67-7:7 (“the message contains … message data, an inner IP
`
`header containing actual sender and receiver addresses, an outer IP header
`
`containing the addresses of the first computer and the intermediate computer, a
`
`unique identity, and other security parameters”) (emphases added).
`
`After the message is received by the intermediate computer, the intermediate
`
`computer in the embodiment uses a translation table, as shown in Figure 3, to
`
`determine how to modify the unique identity (the SPI value) separate from the
`
`outer IP addresses:
`
`Ex. 1001 [’949 Patent], Fig. 3.
`
`Figure 3 shows that the translation table of this preferred embodiment stores
`
`the unique identities (which in this embodiment are SPI values, as noted above)
`
`separately from the destination addresses. As shown, the table is divided into two
`
`
`
`
`
`12
`
`

`

`partitions. The left side (identified by the prefix “c-”) refers to the network
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`connection between the first computer and the intermediate computer, while the
`
`right side (identified by the prefix “s-”) refers to the connection between the
`
`intermediate computer and the second computer. Id., 11:25-31. The postfix number
`
`refers to the host in question, e.g., 1 denotes the first computer, 2 denotes the
`
`intermediate computer, and 3 denotes the second computer. Id.
`
`The specification further explains that once the translations are complete, the
`
`intermediate computer in that preferred embodiment separately substitutes (1) the
`
`outer address of the intermediate computer with the address of the second
`
`computer and (2) the incoming SPI value with a new SPI value:
`
`[S]ince the intermediate computer does not have the cryptographic keys
`to undo the IPSec processing done by the mobile terminal, it cannot
`decrypt any encrypted portions of the packet but is able to use the outer
`IP addresses and the incoming SPI value to determine how to modify
`the outer address and the SPI to suite the second computer, which is the
`next destination. SPI is now changed to 0x56785678 in the
`intermediate computer and the address is changed to the address of
`the second computer. This is done by means of the IPSec translation
`table of FIG. 3.
`
`…
`
`
`
`13
`
`

`

`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`The new outer source address s-addr-2 (212.90.65.1) is substituted for
`the outer source address c-addr-1 (195.1.2.3), and the new outer
`destination address [(the second destination address)] s-addr-3
`(103.6.5.4) is substituted for the outer destination address c-addr-2
`(212.90.65.1) [(the first destination address)]. The new SPI value [(the
`second unique identity)], s-SPI-3 (0x56785678), is substituted for the
`SPI value c-SPI-2 (0x12341234) [(the first unique identity)]. If more
`than one SPI values are used, all the SPI values are substituted
`similarly.
`
`Ex. 1001 [’949 Patent], 11:55-12:8 (emphasis added).
`
`Not once does the Specification provide an embodiment where the
`
`destination address is the same as, or a component of, the “unique identity.” See
`
`Becton, Dickinson, 616 F.3d at 1254-1255 (finding embodiments in specification
`
`further supported that separate claim terms must be construed as separate
`
`structures). Instead, “[t]he claims and specification of the patent consistently treat
`
`these two structures as separate and distinct elements,” thereby supporting their
`
`construction as separate and distinct limitations. Epistar, 566 F.3d at 1335.
`
`A pertinent case is Mformation Technologies, in which the Federal Circuit,
`
`applying the above principles under the Phillips claim construction standard,
`
`construed a method claim to require two steps to be “distinct” from each other, and
`
`rejected a broader construction that would have allowed one of the steps to be
`
`
`
`14
`
`

`

`“inherently part of” the other step. The claim in Mformation Technologies recited
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`the step and sub-steps of
`
`. . . delivering the command from the mailbox at the
`server to the wireless device by
`establishing a connection between the wireless device
`and the server,
`transmitting the contents of the mailbox from the server
`to the wireless device, and
`accepting the contents of the mailbox at the wireless
`device . . . .
`
`Mformation Techs., 764 F.3d at 1394 (emphases added). One party argued that the
`
`claim should be construed so that the “establishing a connection” and
`
`“transmitting” steps did not have to be “temporally distinct” from one another. Id.
`
`at 1399.
`
`The Federal Circuit rejected this proposed construction. It held that under a
`
`correct construction, the “establishing a connection” and “transmitting” sub-steps
`
`had to be “temporally distinct,” without overlap between them. Id. The Court
`
`determined that “if the ‘establishing a connection’ sub-step were not temporally
`
`distinct from the transmitting sub-step (and prior to it), there would be no reason to
`
`specify a separate sub-step for establishing a connection at all, as it is inherently
`
`part of transmitting a command.” Id. (emphasis added). Furthermore, the Court
`
`
`
`15
`
`

`

`explained that the patent’s specification confirmed the narrower construction
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`because “the only description of the ‘establishing a connection’ sub-step” in the
`
`specification described the transmitting step as not occurring until the establishing
`
`step was completed, and was, therefore, “consistent” with construing the claim to
`
`require the two steps to be entirely distinct. Id.
`
`For similar reasons, claim 1 of the ’949 patent should be construed under
`
`Phillips to require the “intermediate computer substituting the first destination
`
`address with the second destination address” and “substituting, at the intermediate
`
`computer, the first unique identity with [the] second unique identity” steps to be
`
`distinct from one another. First, as in Mformation Technologies, there would be no
`
`reason to specify a separate step for substituting the first destination address if the
`
`destination address were merely part of the unique identity. Id. at 1399. Indeed,
`
`the Petition’s proposed mapping would make the separately recited step of “the
`
`intermediate computer substituting the first destination address” literally
`
`superfluous, because the purported “destination address” in the proposed
`
`combination would be part of the purported “unique identity,” as explained below.
`
`Moreover, as shown above, just as in Mformation Technologies, the
`
`description of these steps in the specification is exclusively consistent with the two
`
`steps being distinct, and inconsistent with the two steps overlapping or one step
`
`
`
`16
`
`

`

`being a part of the other step. Id.; Ex. 1001 [’949 Pat.], Abstract, FIG. 3, 6:33-42,
`
`Case IPR2019-00822
`U.S. Pat. No. 8,346,949
`
`
`6:67:7:7, 11:25-31, 11:55-12:8.
`
`Thus, claim 1 should similarly be construed so that the step of intermediate
`
`computer substituting the first destination address with the second destination
`
`address cannot be merely part of the step of substituting the first unique identity
`
`with the second unique identity at the intermediate computer.
`
`The requirement that the unique identity and destination address must be
`
`separate and distinct undermines the unpatentability arguments in the Petition.
`
`Although Petitioner does not explicitly argue that it is necessary that, for claim
`
`construction purposes, the “destination address” may be the same as or a
`
`component of the “unique identity,” its obviousness arguments depend on this
`
`being true. Infra § IV-A. In its claim construction section, the Petition contends
`
`that “the ’949 patent does not further restrict in any way the parameters that may
`
`be included in the recited ‘unique identity’”—thereby taking the position that one
`
`of the parameters included in the unique identity could also be the destination
`
`address. Pet., 19. Petitioner fails to cite any support for this claim construction
`
`positi

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket