throbber

`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`APPLE INC.,
`Petitioner
`
`v.
`
`MPH TECHNOLOGIES OY,
`Patent Owner
`____________________
`Case IPR2019-00823
`U.S. Patent No. 9,712,494
`____________________
`
`
`PETITIONER’S REPLY TO PATENT OWNER’S RESPONSE
`UNDER 37 C.F.R. § 42.23
`
`
`
`
`
`
`
`
`Mail Stop PATENT BOARD
`Patent Trial and Appeal Board
`U.S. Patent & Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`
`
`
`
`
`
`

`

`TABLE OF CONTENTS
`
`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`
`Introduction ...................................................................................................... 1
`Claim Construction .......................................................................................... 1
`A. The Board should reject MPH’s improper construction of “mobile
`computer.” .................................................................................................. 1
`1. The ’494 patent does not does not address any capability of “a static
`secure connection” in its explanation of a “mobile computer.” ............ 3
`2. MPH and its expert Dr. Rouskas ignore that the ’494 patent uses the
`terms “mobile terminal” and “mobile host” in conjunction with
`computers that establish a “static secure connection.” ......................... 5
`B. MPH does not dispute that the prior art discloses a “unique identity,” and
`therefore this term need not be expressly construed. ................................. 8
`C. The term “substitute” does not need to be expressly construed. ................ 8
` Ground 1: The combination of RFC3104 and Grabelsky renders obvious
`claims 1-5 and 8-11. ........................................................................................ 8
`A. RFC3104 discloses a “mobile computer,” as recited in claim 1. ............... 8
`1. RFC3104 teaches the use of a laptop (i.e., “mobile computer”) that
`moves physical locations and changes networks. ................................. 9
`2. MPH’s arguments that a laptop cannot change addresses during the
`course of an ongoing RSIP connection are irrelevant. ........................ 11
`B. The combination of RFC3104 and Grabelsky teaches a “translation table
`[that] includes two partitions,” as recited in claim 4. ............................... 14
`C. The combination of RFC3104 and Grabelsky teaches that “the
`intermediate computer is configured to modify the translation table entry
`address fields in response to a signaling message sent from the mobile
`computer,” as recited in claim 9. .............................................................. 19
`D. The combination of RFC3104 and Grabelsky teaches that “the source
`address of the forwarded message is the same as the first network
`address,” as recited in claim 11. ............................................................... 22
`E. The combination of RFC3104 and Grabelsky renders obvious claims 2, 3,
`5, 8, and 10. .............................................................................................. 26
` Ground 2: The combination of RFC3104, Grabelsky, and Wagner renders
`obvious claims 6 and 7. ................................................................................. 26
`Conclusion ..................................................................................................... 27
`
`- i -
`
`
`
`
`
`
`
`
`
`
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`
`UPDATED EXHIBIT LIST
`
`Description
`U.S. Patent No. 9,712,494 B2 to Vaarala et al., issued Jul. 18, 2017
`(“the ’494 patent”)
`
`Declaration of David Goldschlag, Ph.D. (“Goldschlag Decl.”)
`
`Prosecution History of U.S. Patent No. 9,712,494 B2 (“Prosecution
`History”)
`
`RFC3104 - RSIP Support for End-to-end IPsec, The Internet Society
`(Oct. 2001) (“RFC3104”)
`
`Prosecution History of U.S. Patent No. 8,346,949 B2 (“’949 Patent
`Prosecution History”)
`
`U.S. Patent No. 7,032,242 B1 to Grabelsky et al., issued Apr. 18,
`2006 (“Grabelsky”)
`
`Wagner et al., Analysis of the SSL 3.0 Protocol, USENIX (Nov.
`1996) (“Wagner”)
`
`Declaration of Ms. Sandy Ginoza (“Ginoza Decl.”)
`
`Declaration of James L. Mullins Ph.D. (“Mullins Decl.”)
`
`Curriculum Vitae of James L. Mullins
`
`S. Frankel, “Demystifying the IPsec Puzzle,” Artech House, Inc.,
`2001 (“Frankel”)
`
`RSIP Support for End-to-end IPsec (RFC 3104), IETF Data Tracker
`(2000) (“IETF Data Tracker”)
`
`RFC2026 - The Internet Standards Process -- Revision 3 (Oct. 1996)
`(“RFC2026”)
`
`RFC2246 - The TLS Protocol Version 1.0 (Jan. 1999) (“RFC2246”)
`
`- ii -
`
`Exhibit No.
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`1009
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`
`
`
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`
`Description
`RFC2401 - Security Architecture for the Internet Protocol (Nov.
`1998) (“RFC2401”)
`
`RFC2402 - IP Authentication Header (Nov. 1998) (“RFC2402”)
`
`RFC2406 - IP Encapsulating Security Payload (ESP) (Nov. 1998)
`(“RFC2406”)
`
`RFC2409 - The Internet Key Exchange (IKE) (Nov. 1998)
`(“RFC2409”)
`
`RFC3102 - Realm Specific IP: Framework (Oct. 2001)
`(“RFC3102”)
`
`Zhang et al., “A Multu-Layer IPsec Protocol,” (Aug. 2000)
`(“Zhang”)
`
`Curriculum Vitae of David Goldschlag, Ph.D. (“Goldschlag CV”)
`
`Declaration of David Goldschlag, Ph.D., in Support of Petitioner’s
`Reply to Patent Owner’s Response (“Second Goldschlag Decl.”)
`
`Transcript of the Deposition of George N. Rouskas, Ph.D., May 7,
`2020 (“Rouskas Dep.”)
`
`Transcript of the Deposition of Michael S. Borella, Ph.D., May 18,
`2020 (“Borella Dep.”)
`
`Merriam-Webster’s Collegiate Dictionary, Eleventh Edition (2003)
`(“Merriam-Webster’s Dictionary”)
`
`Exhibit No.
`
`1015
`
`1016
`
`1017
`
`1018
`
`1019
`
`1020
`
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`
`
`
`
`- iii -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`
`
`
`Introduction
`Patent Owner (“MPH”) presents a single argument in support of the
`
`patentability of the ’494 patent’s independent claim: that the prior art does not
`
`teach a “mobile computer,” as recited in claim 1 of the ’494 patent. This argument
`
`is premised on an improper and overly narrow construction of the term “mobile
`
`computer” which attempts to import numerous additional requirements into this
`
`basic term. The Board properly rejected similar attempts by MPH at the institution
`
`stage, and should continue to do so. A “mobile computer” is taught by RFC3104
`
`under any reasonable interpretation of the term, and thus, the Board should find
`
`independent claim 1 unpatentable.
`
`MPH’s arguments against the dependent claims fare no better. Again, MPH
`
`attempts to import requirements into the claims that do not exist and
`
`mischaracterizes the Petition’s arguments. For the reasons specified in the Petition
`
`and below, the Board should find the dependent claims unpatentable over the cited
`
`prior art.
`
` Claim Construction
`A. The Board should reject MPH’s improper construction of “mobile
`computer.”
`“mobile computer”
`MPH’s
`“a computer that moves from one network to another as
`Proposed
`opposed to a computer that is only capable of a static secure
`connection”
`Construction
`
`
`
`- 1 -
`
`

`

`Apple’s
`Proposed
`Construction
`
`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`To the extent the Board determines this term needs to be
`construed:
`
`“a computer that is capable of moving between networks or
`physical locations”
`
`MPH proposes that the term “mobile computer” should be construed as “a
`
`computer that moves from one network to another as opposed to a computer that is
`
`only capable of a static secure connection.” POR, 10. While MPH contends that its
`
`construction “has been revised based on the Board’s guidance” in the institution
`
`decision, this construction imports essentially the same additional requirements
`
`into the claims that the Board already rejected at institution, namely that the
`
`“mobile computer” must be able to move while maintaining its secure connection.
`
`See DI, 10-11. Indeed, MPH similarly asserted in its POPR that “the claims should
`
`be construed to distinguish the claimed ‘mobile computer’ from a computer that is
`
`only capable of static connections.” POPR, 4. MPH’s expert also could not explain
`
`any substantive difference between MPH’s proposed construction prior to
`
`institution and its newly proposed construction aside from using different
`
`language. EX1023, Rouskas Dep., 11:16-19, 15:3-17:3. This overly-narrow
`
`construction is improper and should again be rejected. Superguide Corp. v.
`
`DirecTV Enters., Inc., 358 F.3d 870, 875 (Fed. Cir. 2004); E-Pass Techs., Inc. v.
`
`3Com Corp., 343 F.3d 1364, 1369 (Fed. Cir. 2003) (“[A]n inherent tension exists
`
`as to whether a statement is a clear lexicographic definition or a description of a
`
`
`
`- 2 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`preferred embodiment. The problem is to interpret claims ‘in view of the
`
`specification’ without unnecessarily importing limitations from the specification
`
`into the claims.”).
`
`1.
`
`The ’494 patent does not does not address any capability of
`“a static secure connection” in its explanation of a “mobile
`computer.”
`To support its proposed construction, MPH first points to the ’494 patent’s
`
`use of the terms “mobility” and “mobile terminal”:
`
`In this text, the term mobility and mobile terminal does not only mean
`physical mobility, instead the term mobility is in the first hand meant
`moving from one network to another, which can be performed by a
`physically fixed terminal as well.
`
`EX1001, 4:34-38. As Apple’s expert, Dr. Goldschlag, explains, this language is
`
`extremely broad. EX1022, Second Goldschlag Decl., ¶¶7-9. Consistent with
`
`Apple’s proposed construction (to the extent this term needs to be expressly
`
`construed), this passage states that these terms “not only mean physical mobility,”
`
`but also can describe a terminal (e.g., computer) that “move[s] from one network
`
`to another.” Id. Importantly, this is the complete extent of the meaning assigned to
`
`the terms “mobility” and “mobile terminal” in the ’494 patent. Id. And, as MPH’s
`
`expert Dr. Rouskas explains, the ’494 patent uses the terms “mobile terminal,”
`
`“mobile host,” and “mobile computer” to mean the same thing. EX1023, 163:10-
`
`164:15.
`
`
`
`- 3 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`MPH’s expert Dr. Rouskas also agreed with this interpretation in cross-
`
`examination, clarifying his understanding of the terms “mobile terminal” and
`
`“mobility” in this passage:
`
`Q. Okay. So I'll ask again, do you have an understanding of what the
`term “does not only mean,” how that affects, if at all, the
`interpretation of that sentence?
`. . .
`A. Right. So a physical mobility, that could be moving let’s say my
`laptop from one desk to another in the same room.
`Q. Right. So I guess what I'm asking is, wouldn’t you interpret what it
`says here to say the term “mobility” means not only that you can move
`it from, you know, one place in your room to the other, but it also
`means that moving from one network to another?
`. . .
`A. Well, yes, [t]hat’s what I understand what that sentence means,
`that mobility also means moving from one network to another.
`
`EX1023, 159:13-160:10 (emphasis added). Thus, even MPH’s own expert agreed
`
`with the ’494 patent’s broad use of the terms “mobility” and “mobile terminal,”
`
`which, on their own, do not suggest anything more than moving between networks
`
`and/or physical locations. EX1022, ¶¶10-11. Dr. Rouskas further conceded that he
`
`did not form an opinion on whether his proposed construction required the “mobile
`
`computer” to actually move, or just required the capability of moving—confirming
`
`an even broader understanding of the term. See EX1023, 17:6-20:3.
`
`
`
`- 4 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`Even more, MPH relied on a second expert, the first-named author of
`
`RFC3104 (Michael Borella), to opine on alleged issues of mobility in the context
`
`of RFC3104. See generally EX2010. Yet, on cross-examination, Dr. Borella
`
`similarly opined that his complete understanding of the term “mobile computer” in
`
`the context of the ’494 patent is a computer that “moves from one network to
`
`another.” EX1024, Borella Dep., 230:17-20. Hence, all of the parties’ experts agree
`
`that the term “mobile computer” means nothing more than moving (or the
`
`capability of moving) between networks or physical locations. EX1022, ¶12.
`
`2. MPH and its expert Dr. Rouskas ignore that the ’494 patent
`uses the terms “mobile terminal” and “mobile host” in
`conjunction with computers that establish a “static secure
`connection.”
`MPH further cites to other portions of the ’494 patent to support its proposed
`
`construction of “mobile computer,” attempting to differentiate the term from “a
`
`computer that is only capable of a static secure connection.” POR, 12-16; EX2002,
`
`¶83. These passages of the ’494 patent use the terms “mobile terminal” and
`
`“mobile host,” and as discussed above, MPH’s expert Dr. Rouskas explains that
`
`the ’494 patent uses the terms “mobile terminal,” “mobile host,” and “mobile
`
`computer” to mean the same thing. EX1023, 163:10-164:15. But both MPH and its
`
`expert Dr. Rouskas ignore that the terms “mobile terminal” and “mobile host” in
`
`these passages refer to computers that only establish a “static secure connection”—
`
`
`
`- 5 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`directly contradicting MPH’s proposed construction that requires a “mobile
`
`computer” to maintain a secure connection when moving.
`
`For example, MPH cites to the ’494 patent at 4:60-64, which states,
`
`“Standard IPSec does not work well in the scenario. Since IPSec connections are
`
`bound to fixed addresses, the mobile terminal must establish a new IPSec
`
`connection from each point of attachment.” POR, 14 (citing EX1001, 4:60-64
`
`(emphasis added)). As Apple’s expert explains, this passage plainly uses the term
`
`“mobile terminal” in conjunction with a computer establishing a static IPSec
`
`connection each time the computer connects to a network. EX1022, ¶¶13-14.
`
`MPH cites also to the ’494 patent at 4:15-27, which states that “IPSec is
`
`intended to work with static network topology, where hosts are fixed to certain
`
`subnetworks . . . . If IPSec is used with a mobile host, the IKE key exchange will
`
`have to be redone from every new visited network.” POR, 13 (citing EX1001, 4:15-
`
`27 (emphasis added)). Again, this passage plainly uses the term “mobile host” in
`
`conjunction with a computer reestablishing static IPSec connections when moving
`
`rather than maintaining them. EX1022, ¶15.
`
`During cross-examination, Dr. Rouskas was asked about these passages in
`
`relation to his and MPH’s proposed construction of “mobile computer.” EX1023,
`
`164:16-178:12. Although Dr. Rouskas asserted that he “considered the entire
`
`specification” when forming his construction of “mobile computer,” id., 173:8-18,
`
`
`
`- 6 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`Dr. Rouskas repeatedly asserted that he had not formed an opinion on what the
`
`terms “mobile terminal” and “mobile host” mean as they are used in these passages
`
`of the ’494 patent, id., 174:4-177:4. For example, when asked, “Do you have an
`
`opinion on what the terms ‘mobile terminal’ and ‘mobile host’ mean as those terms
`
`are used in the background sections of the ’494 and the ’502 patents?” Dr. Rouskas
`
`responded, “I did not form an opinions [sic] on this -- on the terms.” Id., 175:12-
`
`176:1. Thus, MPH’s expert merely chose to characterize portions of the ’494
`
`patent specification in a way that suited MPH’s interests, rather than to properly
`
`consider the specification as a whole. And, again, MPH and its expert specifically
`
`cited to these portions of the ’494 patent specification to support its proposed
`
`construction. POR, 12-16; EX2002, ¶83.
`
`Recognizing Dr. Rouskas’s critical failure to consider the ’494 patent’s
`
`usage of “mobile terminal” and “mobile host” when forming his construction of
`
`“mobile computer,” MPH’s counsel attempted to reverse Dr. Rouskas’s testimony
`
`on redirect. Specifically, counsel for MPH asked Dr. Rouskas whether he meant
`
`“to say that the term ‘mobile computer’ as it’s used in the claims means the same
`
`thing as ‘mobile host’ as it’s discussed in the background of the invention in the
`
`’494 and ’502 patents.” EX1023, 179:18-22. Unsurprisingly, Dr. Rouskas
`
`responded that he “did not mean to say that.” Id., 180:1-2. However, significantly
`
`undermining the credibility of his testimony, Dr. Rouskas admitted that he
`
`
`
`- 7 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`discussed his answers to the questions on redirect with counsel during the break.
`
`Id., 181:9-21. Accordingly, the Board should not give credence to this arranged
`
`testimony.
`
`For these reasons, MPH’s overly-narrow construction of the term “mobile
`
`computer” should once again be rejected. EX1022, ¶16.
`
`B. MPH does not dispute that the prior art discloses a “unique
`identity,” and therefore this term need not be expressly construed.
`There is no dispute that the prior art in this proceeding discloses a “unique
`
`identity,” as recited in the claims. See POR, 20 (“Patent Owner does not dispute
`
`that some form of a unique identity is found in the primary reference.”). Therefore,
`
`the Board need not expressly construe this term for purposes of this proceeding.
`
`C. The term “substitute” does not need to be expressly construed.
`Apple does not believe the term “substitute” needs to be expressly construed
`
`for purposes of this proceeding.
`
` Ground 1: The combination of RFC3104 and Grabelsky renders
`obvious claims 1-5 and 8-11.
`A. RFC3104 discloses a “mobile computer,” as recited in claim 1.
`MPH’s entire argument against claim 1 is premised on its incorrect
`
`construction of the term “mobile computer.” POR, 25-51. As discussed above, this
`
`construction should be rejected. As explained in the Petition and below, the
`
`combination of RFC3104 and Grabelsky teaches a “mobile computer” under any
`
`reasonable interpretation of the term.
`
`
`
`- 8 -
`
`

`

`1.
`
`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`RFC3104 teaches the use of a laptop (i.e., “mobile
`computer”) that moves physical locations and changes
`networks.
`As explained in the Petition, RFC3104 discloses a “Roadwarrior scenario” in
`
`which “a remote user with a laptop gains access to the Internet, perhaps by using
`
`PPP or DHCP. The user wants to access its corporation private network.” EX1004,
`
`16 (emphasis added); Pet., 33-35
`
`RFC3104, 16.
`
`
`
`In this scenario, both parties and their experts agree that a POSITA would
`
`have understood that the laptop moves from one network to another, and is thus a
`
`“mobile computer.” Pet., 20, 33-35 (citing EX1002, ¶¶93-95); POR, 28-29 (citing
`
`EX2002, ¶97) (“[A] POSITA would understand that a businessperson on the road
`
`with a laptop can be expected to connect to different networks from different
`
`places (e.g., hotel, airport, office) . . . .”). Indeed, this is consistent with the
`
`ordinary meaning of the term “road warrior,” i.e., “a person who travels frequently
`
`especially on business.” EX1025, Merriam-Webster’s Collegiate Dictionary, 1077;
`
`
`
`- 9 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`EX1022, ¶19. Further, during cross-examination, MPH’s expert Dr. Rouskas
`
`agreed that RFC3104’s “Roadwarrior scenario does contemplate a scenario where
`
`the laptop would be moved to different locations, and it would reconnect back to
`
`the server” with a different IP address. EX1023, 152:10-153:9 (emphasis added).
`
`And MPH’s other expert, Dr. Borella, conceded that this scenario (i.e., a computer
`
`that disconnects from one network, moves to another network, and then reconnects
`
`using a second network) would meet his definition of “mobile computer.” EX1024,
`
`224:9-225:4. Thus, both parties agree that the laptop used in RFC3104’s
`
`Roadwarrior scenario is “mobile” in that it moves from one network to another.
`
`EX1022, ¶20.
`
`With this understanding, the Petition explains that “a POSITA would have
`
`understood that in the context of the ‘Roadwarrior scenario,’ the computer
`
`connected to the public Internet would be a ‘laptop [i.e., “mobile computer”] [that]
`
`gains access to the Internet.’” Pet., 34 (citing EX1002, ¶95). MPH’s expert Dr.
`
`Borella, a co-author of RFC3104, also agreed that the “Roadwarrior scenario” can
`
`be reversed, meaning “Host Y can initiate the connection instead of Host X.”
`
`EX1024, 248:9-14; EX1004, 16. This testimony renders irrelevant Dr. Borella’s
`
`distinctions with regard to which host in the Roadwarrior scenario is an RSIP client
`
`(see EX2010, ¶60), since the Roadwarrior scenario contemplates both scenarios in
`
`which either host X or host Y plays the role of the RSIP client. EX1022, ¶¶20-24.
`
`
`
`- 10 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`The Roadwarrior’s reversed scenario further aligns precisely with the “core”
`
`diagram of RFC3104 in which the RSIP client initiating the connection is on the
`
`internal private network, and the IPSec peer is connected to the Internet. See Pet.,
`
`33-35 (discussing the Roadwarrior’s reversed scenario).
`
`
`
`EX1004, 2 (annotated); EX1022, ¶23.
`
`Hence, there is no reasonable dispute that RFC3104 contemplates the use of
`
`a “mobile” laptop involved in a secure RSIP connection, as illustrated by
`
`RFC3104’s “Roadwarrior scenario.” EX1022, ¶25.
`
`2. MPH’s arguments that a laptop cannot change addresses
`during the course of an ongoing RSIP connection are
`irrelevant.
`Although MPH devotes 26 pages of argument in its POR to the “mobile
`
`computer” of the claims, MPH’s only objection to the prior art is that “a POSITA
`
`would not understand the laptop [of RFC3104] to be changing addresses during the
`
`course of an ongoing RSIP connection.” POR, 29 (emphasis added). This
`
`
`
`- 11 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`statement, and the remainder of MPH’s analysis, illustrates that MPH is still
`
`asserting that the claimed “mobile computer” must be able to move networks while
`
`maintaining its connection, the same argument that MPH put forth in its Patent
`
`Owner Preliminary Response and the Board previously considered. See DI, 9-11.
`
`As discussed in Section II.A, this attempt to import additional requirements into
`
`the term “mobile computer” is improper and inconsistent with the ’494 patent’s
`
`usage of the term. EX1022, ¶26.
`
`MPH further attempts to support this argument by alleging that the system of
`
`RFC3104 would become “inoperable” if any host changed address. POR, 29-30,
`
`34, 37-38, 45. But MPH misses the point. RFC3104’s laptop “moves” between
`
`networks (e.g., is a “mobile computer”) because it can disconnect from a first
`
`network and then reestablish an RSIP connection at a second network. Indeed,
`
`none of the experts—Dr. Borella, Dr. Rouskas, or Dr. Goldschlag—appear to
`
`dispute that point. EX1022, ¶¶27-28.
`
`Specifically, Dr. Borella admitted that a computer that connects from one
`
`network, disconnects, and reconnects to another network is a “mobile computer”:
`
`A. Okay so if I can reiterate this in my own words you would like to
`know whether the definition of mobile computer in paragraph 42 of
`my declaration includes a network -- excuse me -- includes a
`computer that disconnects from one network, moves to another
`
`
`
`- 12 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`network, and then reconnects using that network, that second network.
`Is that fair?
`MR. BLOCK: Yeah. That’s fair.
`A. Okay. Perhaps I’m over thinking this I haven’t specifically
`considered that scenario. But you do -- you are telling me that this
`hypothetical computer is moving from one network to another.
`MR. BLOCK: Yeah. That is correct.
`A. All right. In that case, in that case it falls within the definition I
`have provided here.
`
`EX1024, 224:9-225:4 (emphasis added); see also EX1023, 152:10-153:9 (MPH’s
`
`expert Dr. Rouskas testifying that such a scenario is contemplated by RFC3104).
`
`In other words, Dr. Borella conceded during cross-examination that a
`
`computer does not need to maintain a connection during its move to be considered
`
`a “mobile computer” within the context of the ’494 patent. Rather, the simple fact
`
`that the computer “move[s] from one network to another” makes the computer fall
`
`within Dr. Borella’s applied definition of “mobile computer,” as conceded by Dr.
`
`Borella. EX1024, 224:20-225:4; EX1022, ¶29. And, as discussed above, there is no
`
`dispute that RFC3104’s disclosed laptop computer would move from one network
`
`to another, reconnecting from different points of attachment with different IP
`
`addresses. See EX1023, 153:1-9. Therefore, Dr. Borella’s declaration testimony
`
`regarding alleged mobility issues of RFC3104 are immaterial to the requirements
`
`of the “mobile computer” in the challenged claims. See EX2010, ¶¶44-63.
`
`
`
`- 13 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`Accordingly, RFC3104 teaches a “mobile computer” within the context of
`
`the ’494 patent claims, consistent with the usage of the term in the ’494 patent
`
`specification.
`
`B.
`
`The combination of RFC3104 and Grabelsky teaches a
`“translation table [that] includes two partitions,” as recited in
`claim 4.
`MPH alleges that “[t]he Petition and Dr. Goldschlag’s testimony fail to
`
`articulate where the claimed two-partition translation table, and its recited details,
`
`are found in RFC3104 and Grabelsky.” POR, 61. But MPH mischaracterizes the
`
`Petition. In particular, the Petition explains that “Grabelsky discloses a table for
`
`mapping SPI values to a local destination address, as illustrated in Figure 21.” Pet.,
`
`45 (emphasis added).
`
`EX1006, Grabelsky, FIG. 21.
`
`
`
`The Petition further explains that “RFC3104 already discloses a ‘mapping’
`
`of the ‘minimum tuple of demultiplexing fields’ to a destination (e.g., the
`
`
`
`- 14 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`destination address of RSIP client X).” Pet., 46 (citing EX1004, 5; EX1002, ¶118)
`
`(emphasis added). Thus, “RFC3104 explicitly discloses a mapping, and Grabelsky
`
`supplies an efficient mapping technique in the form of a translation table.” Pet., 46;
`
`EX1022, ¶32.
`
`To implement such a mapping using a translation table as in Grabelsky, the
`
`Petition further provides that “[a] POSITA would have understood that this table
`
`would include two partitions, including: (1) values of the ‘demultiplexing fields’
`
`used in the packet sent from host Y to RSIP server N; and (2) the value of the
`
`destination address of the IPSec SA.” Pet., 53 (citing EX1002, ¶130). Indeed, this
`
`corresponds to the exact mapping described by RFC3104. EX1004, 5; EX1022,
`
`¶33. Thus, MPH’s argument that the Petition’s explanation “is not linked to
`
`supporting evidence,” POR, 61, ignores the explicit teachings of both RFC3104
`
`and Grabelsky.
`
`MPH’s only remaining dispute with respect to claim 4 is that the claim
`
`requires “that the second partition has more than one field.” POR, 59-61 (emphasis
`
`added). But MPH misinterprets the claim requirements, which do not recite “a
`
`plurality” of information fields. As Apple’s expert explains, a POSITA would have
`
`understood the language “the second partition containing information fields
`
`related to the connection over which the forwarded encrypted data payload is sent
`
`to the destination address” to simply refer to the type of fields that make up the
`
`
`
`- 15 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`second partition, not the number of fields that must be present. EX1022, ¶34. In
`
`other words, the information contained in the second partition must merely relate
`
`to “the connection over which the forwarded encrypted data payload is sent to the
`
`destination address.” Id. This is also consistent with the description in the ’494
`
`patent with respect to FIG. 3, in which the second partition relates to “the network
`
`connection between the intermediate computer and the second computer.”
`
`EX1001, 11:45-47.
`
`In any event, the Petition and Apple’s expert explain that “a POSITA would
`
`have been motivated to include more than the destination address of the IPSec SA
`
`in the second partition, for example also including the other ‘demultiplexing
`
`fields’ (i.e., the SPI and protocol) so that values of the first partition could simply
`
`be substituted with values of the second partition in the data packet sent from
`
`server N to host X.” Pet., 54 (citing EX1002, ¶132). Moreover, RFC3104 suggests
`
`a multitude of other fields that a POSITA would naturally have included in the
`
`second partition in addition to those examples provided in the Petition. EX1022,
`
`¶35.
`
`In particular, as discussed in the Petition, RFC3104 discloses an
`
`“ASSIGN_REQUEST_RSIPSEC message [that] is used by an RSIP client to
`
`request IPsec parameter assignments,” including fields such as “an IP address and
`
`SPIs.” Pet., 57 (citing EX1004, 7); EX1022, ¶36. In addition to IP addresses and
`
`
`
`- 16 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`SPI values, the complete list of parameters of the ASSIGN_REQUEST_RSIPSEC
`
`message are illustrated below:
`
`EX1004, 8.
`
`
`
`As MPH’s expert explains, “[t]he ASSIGN_REQUEST_RSIPSEC message
`
`is sent by Host X to request a binding such that Server N allocates resources for
`
`Host X to subsequently establish an IPSec secure connection.” EX2002, ¶110. The
`
`parameters of this binding are stored at RSIP server N and associated “with an
`
`RSIP host.” EX2004, RFC3103, 5 (defining “Binding” as “[a]n association of
`
`some combination of a local address, one or more local ports, a remote address,
`
`and a remote port with an RSIP host.”); EX1023, 107:6-10 (“[S]o the binding
`
`associates that particular tuple of resources with the host.”). RFC3103 further
`
`explains that “[t]his binding enables the RSIP gateway to correctly de-multiplex
`
`and forward inbound traffic generated by Y for X.” EX2004, 6. In other words, this
`
`
`
`- 17 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`binding forms the “mapping” to which RFC3104 refers when demultiplexing
`
`“IPsec packets from Y destined for X.” See EX1004, 5; EX1022, ¶37; Pet., 37-38.
`
`As disclosed in RFC3104, this binding includes numerous parameters
`
`associated with the RSIP client X (i.e., the client requesting parameter
`
`assignments), such as, for example, a “Lease Time” parameter. EX1004, 8. As
`
`RFC3103 explains, “[a] lease time is associated with each bind,” and “[t]he lease
`
`time parameter specifies the length, in seconds, of an RSIP host registration or
`
`parameter binding.” EX2004, 6, 13. Further, RFC3103 provides that a lease time
`
`“must be provided for every assignment” as part of the RSIP connection setup, and
`
`thus each binding would have an associated lease time. EX2004, 22; EX1022, ¶38.
`
`Thus, the “Lease Time” parameter is related to “the connection over which the
`
`forwarded encrypted data payload is sent to the destination address,” in other
`
`words the connection between RSIP client X and RSIP server N. EX1022, ¶38.
`
`And, since this binding is stored at the RSIP server N, a POSITA would
`
`have recognized that it would be logical to store the parameters of this binding
`
`together, especially those parameters specified on a per-binding bases such as
`
`“lease time.” For example, in the combination of RFC3104 and Grabelsky, these
`
`parameters could be stored in the translation table. Id., ¶39. In this case, it would
`
`have been obvious to include the assigned parameters in the table’s “second
`
`partition” so that the parameters could easily be retrieved based on RFC3104’s
`
`
`
`- 18 -
`
`

`

`Case IPR2019-00823
`U.S. Pat. No. 9,712,494
`“minimum tuple of demultiplexing fields.” EX1022, ¶39; EX1004, 5. Therefore,
`
`even if claim 4 were interpreted to require more than one field in each table
`
`partition, the combination of RFC3104 and Grabelsky teaches numerous fields that
`
`would be included. EX1022, ¶39.
`
`C. The combination of RFC3104 and Grabelsky teaches that “the
`intermediate computer is configured to modify the translation
`table entry address fields in response to a signaling message sent
`from the mobile computer,” as recited in claim 9.
`As an initial matter, as explained in the petition, a POSITA would have
`
`understood that “either RFC3104’s host Y or X could be (and often would be) a
`
`‘mobile computer,’ and that naturally, as a consequence of the host Y or X being a
`
`mobile computer, their address would change due to mobility of such a computer.”
`
`Pet., 33 (citing EX1002, ¶91). As discussed above, this is evidenced at least by
`
`RFC3104’s disclosure of a laptop in the “Roadwarrior” scenario, which all pa

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket