throbber
Paper 26
`Trials@uspto.gov
`Date: November 4, 2020
`Tel: 571-272-7822
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`APPLE INC.,
`Petitioner,
`v.
`MPH TECHNOLOGIES OY,
`Patent Owner.
`
`
`
`IPR2019-00823
`Patent 9,712,494 B2
`__________________________
`
`
`
`
`
`
`
`
`Before SALLY C. MEDLEY, KAMRAN JIVANI, and
`JOHN D. HAMANN, Administrative Patent Judges.
`
`HAMANN, Administrative Patent Judge.
`
`
`
`
`JUDGMENT
`Final Written Decision
`Determining Some Challenged Claims Unpatentable
`35 U.S.C. § 318(a)
`
`
`
`
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`INTRODUCTION
`I.
`In this inter partes review, instituted pursuant to 35 U.S.C. § 314,
`Apple Inc. (“Petitioner”) challenges the patentability of claims 1–11 (“the
`challenged claims”) of U.S. Patent No. 9,712,494 B2 (Ex. 1001, “the ’494
`patent”), owned by MPH Technologies Oy (“Patent Owner”). We have
`jurisdiction under 35 U.S.C § 6. This Final Written Decision is entered
`pursuant to 35 U.S.C. § 318(a) and 37 C.F.R. § 42.73.
`For the reasons discussed herein, we determine that Petitioner has
`shown by a preponderance of the evidence that claims 1, 3, 5–8, and 10 are
`unpatentable, but Petitioner has not shown by a preponderance of the
`evidence that claims 2, 4, 9, and 11 are unpatentable.
`II. BACKGROUND
`
`A. Procedural History
`Petitioner filed a Petition requesting inter partes review of the
`challenged claims of the ’494 patent. Paper 2 (“Pet.”). The Petition is
`supported by the Declaration of David Goldschlag, Ph.D. (Ex. 1002). Patent
`Owner filed a Preliminary Response. Paper 6 (“Prelim. Resp.”).
`We instituted inter partes review of all of the challenged claims of the
`’494 patent on all of the grounds raised in the Petition. Paper 7 (“Dec. on
`Inst.”), 6–7, 44. Patent Owner filed a Response to the Petition. Paper 14
`(“PO Resp.”). The Response is supported by the Declaration of Professor
`George N. Rouskas, Ph.D. (Ex. 2002) and the Declaration of Michael S.
`Borella (Ex. 2010). Petitioner filed a Reply to Patent Owner’s Response.
`Paper 17 (“Pet. Reply”). The Reply is supported by an additional
`Declaration of David Goldschlag, Ph.D. (Ex. 1022). Patent Owner filed a
`Sur-Reply to Petitioner’s Reply. Paper 24 (“PO Sur-Reply”).
`
`2
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`An oral hearing was held on August 11, 2020. A transcript of the oral
`hearing is included in the record. Paper 25 (“Tr.”).
`
`B. Related Matter
`The parties identify MPH Techs. Oy v. Apple Inc., Case No. 4:18-cv-
`05935-PJH (N.D. Cal.), as a matter that may affect or would be affected by a
`decision in this proceeding. Pet. 2; Paper 4, 1. The parties also identify as
`related matters the following inter partes reviews: IPR2019-00822,
`IPR2019-00824, IPR2019-00825, and IPR2019-00826, which involve the
`parties and patents related to the ’494 patent. Pet. 2; Paper 4, 1.
`
`C. The Challenged Patent (Ex. 1001)
`The ’494 patent relates to the “secure forwarding of a message from a
`first computer to a second computer via an intermediate computer in a
`telecommunication network.” Ex. 1001, 6:38–41. According to the ’494
`patent, “[a]n essential idea of [its] invention is to use the standard [Internet
`Protocol (‘IP’) Security (‘IPSec’)] protocol . . . between the intermediate
`computer and the second computer and an ‘enhanced IPSec protocol’
`between the first computer and the intermediate computer.” Id. at 7:38–41,
`1:54. More specifically, the ’494 patent states that “[t]he advantage of [its]
`invention is that [a] logical IPSec connection shared by the first and the
`second computer can be enhanced by the first and the intermediate computer
`without involvement of the second computer.” Id. at 10:38–41. The ’494
`patent adds: “[i]n particular[,] the so-called ‘ingress filtering’ performed by
`some routers [(e.g., the second computer)] does not pose any problems when
`translations of addresses are used.” Id. at 10:41–44.
`
`3
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`
`Figure 1, shown below, “illustrates an example of a
`telecommunication network of the invention” of the ’494 patent. Id. at
`9:55–56.
`
`
`
`Figure 1 shows an example of a telecommunication network in
`
`accordance with the invention of the ’494 patent. Id. at 10:4–5. As
`illustrated, the network comprises: (i) a first computer (client computer 1)
`that is served by (ii) an intermediate computer (server 2), and (iii) host
`computer 4 that is served by (iv) a second computer (security gateway 3).
`Id. at 10:4–9. Security gateway 3 “supports the standard IPSec protocol,”
`while client computer 1 and server 2 support an enhanced IPSec protocol.
`Id. at 10:9–12. The ’494 patent discloses that the first computer (i.e., client
`computer 1) in Figure 1 is a mobile terminal. Id. at 11:5–7, 11:13–14.
`
`“In the example of F[igure] 1, an IPSec connection is formed between
`. . . client computer 1 (the first computer) and . . . security gateway 3 (the
`second computer).” Id. at 10:46–48. The ’494 patent discloses that
`
`4
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`“[m]essages to be sent to . . . host terminal 4 from . . . client computer 1 are
`first sent to . . . server 2, wherein an IPSec translation[, inter alia,] . . . takes
`place.” Id. at 10:60–62. Put differently, “[w]hen the intermediate computer
`receives the packet sent . . ., it performs an address and [Security Parameters
`Index (‘SPI’)] translation, ensuring that the security gateway (host 3 of
`F[igure] 1) can accept the packet.” Id. at 12:1–4, 2:40–41. The ’494 patent
`states that “translation[s can be] . . . performed[, for example,] by means of a
`translation table stored at the intermediate computer[,with t]he outer IP
`header address fields and/or the SPI-values [being] changed by the
`intermediate computer so that the message can be forwarded to the second
`computer.” Id. at 7:46–50.
`
`According to the ’494 patent, “[m]ost of the packet is secured using
`IPSec, . . . [but] the intermediate computer . . . is able to use the outer IP
`addresses and the incoming SPI value to determine how to modify the outer
`address and the SPI to suite the second computer, which is the next
`destination.” Id. at 12:1–11. “[T]he confidentiality of the packets is not
`compromised, . . . [because t]he intermediate computer does not know the
`cryptographic keys used to encrypt and/or authenticate the packets, and can
`thus not reveal their contents,” according to the ’494 patent. Id. at 10:26–37.
`After translation, “the message can be sent to . . . security gateway 3, which
`sends the message further in plain text to . . . host terminal 4.” Id. at 10:60–
`64.
`
`5
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`D. The Challenged Claims
`Petitioner challenges claims 1–11 of the ’494 patent, of which claim 1
`is the sole independent claim. Claim 1 is illustrative of the challenged
`claims and is reproduced below:
`1.
`An intermediate computer for secure forwarding of
`messages in a telecommunication network, comprising:
`
`an intermediate computer configured to connect to a
`telecommunication network;
`
`the intermediate computer configured to be assigned with
`a first network address in the telecommunication network;
`
`the intermediate computer configured to receive from a
`mobile computer a secure message sent to the first network
`address having an encrypted data payload of a message and a
`unique identity, the data payload encrypted with a cryptographic
`key derived from a key exchange protocol;
`
`the intermediate computer configured to read the unique
`identity from the secure message sent to the first network
`address; and
`to access a
`
`the intermediate computer configured
`translation table, to find a destination address from the translation
`table using the unique identity, and
`
`to securely forward the encrypted data payload to the
`destination address using a network address of the intermediate
`computer as a source address of a forwarded message containing
`the encrypted data payload wherein the intermediate computer
`does not have the cryptographic key to decrypt the encrypted data
`payload.
`
`Ex. 1001, 22:40–65.
`
`6
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`E. Instituted Grounds of Unpatentability
`We instituted trial based on the following grounds of unpatentability,
`
`which are all the grounds of unpatentability raised in the Petition:
`
`References
`35 U.S.C. §1 Challenged Claims
`1. Request for Comments
`103(a)
`1–5, 8–11
`3104 (“RFC3104”), 2
`Grabelsky3
`2. RFC3104, Grabelsky,
`Wagner4
`
`103(a)
`
`6, 7
`
`
`Pet. 7–8, 20–64.
`
`III. LEVEL OF ORDINARY SKILL IN THE ART
`To determine whether an invention would have been obvious at the
`time it was made, we consider the level of ordinary skill in the pertinent art
`at the time of the invention. Graham v. John Deere Co., 383 U.S. 1,
`17 (1966). In assessing the level of ordinary skill in the art, various factors
`may be considered, including the “type of problems encountered in the art;
`prior art solutions to those problems; rapidity with which innovations are
`made; sophistication of the technology; and educational level of active
`workers in the field.” In re GPAC, Inc., 57 F.3d 1573, 1579 (Fed. Cir. 1995)
`
`
`1 The Leahy-Smith America Invents Act (“AIA”) included revisions to 35
`U.S.C. § 103 that became effective on March 16, 2013. Because the ’494
`patent issued from an application having an effective filing date before
`March 16, 2013, we apply the pre-AIA version of the statutory basis for
`unpatentability.
`2 G. Montenegro & M. Borella, RSIP Support for End-to-end IPsec, Request
`for Comments 3104, The Internet Society (Oct. 2001) (“RFC3104”) (Ex.
`1004).
`3 U.S. Patent No. 7,032,242 B1 (issued Apr. 18, 2006) (Ex. 1006).
`4 David Wagner & Bruce Schneier, Analysis of the SSL 3.0 Protocol, Proc.
`2d USENIX Workshop on Elec. Com. (Nov. 1996) (“Wagner”) (Ex. 1007).
`
`7
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`(citing Custom Accessories, Inc. v. Jeffrey-Allan Indus., Inc., 807 F.2d 955,
`962 (Fed. Cir. 1986)). “[O]ne or more factors may predominate.” Id.
`In our Decision on Institution, we adopted Petitioner’s proposed
`definition for one having ordinary skill in the art at the time of the invention
`of the ’494 patent as one who would have had “a Bachelor’s (B.S.) degree in
`Computer Science, Computer Engineering, Electrical Engineering, or an
`equivalent field, as well as at least 2–5 years of academic or industry
`experience in the field of Internet security.” Dec. on Inst. 7–8 (citing
`Pet. 17; Ex. 1002 ¶¶ 31–32). Patent Owner does not dispute our adoption of
`Petitioner’s definition, nor otherwise address the level of ordinary skill at the
`time of the invention of the ’494 patent. See generally PO Resp.; see also
`Ex. 2002 ¶ 22.
`Because Petitioner’s definition of the level of skill in the art is
`consistent with the ’494 patent and the asserted prior art, we maintain
`Petitioner’s definition for purposes of this Final Written Decision. See
`Okajima v. Bourdeau, 261 F.3d 1350, 1355 (Fed. Cir. 2001); GPAC, 57 F.3d
`at 1579; In re Oelrich, 579 F.2d 86, 91 (CCPA 1978). We apply Petitioner’s
`definition in our analysis below.
`
`IV. CLAIM CONSTRUCTION
`Because the Petition was filed after November 13, 2018, we construe
`the challenged claims by applying “the standard used in federal courts, in
`other words, the claim construction standard that would be used to construe
`the claim in a civil action under 35 U.S.C. [§] 282(b), which is articulated in
`Phillips [v. AWH Corp., 415 F.3d 1303 (Fed. Cir. 2005) (en banc)].” See
`Changes to the Claim Construction Standard for Interpreting Claims in Trial
`Proceedings Before the Patent Trial and Appeal Board, 83 Fed. Reg. 51,340,
`
`8
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`51,340, 51,358 (Oct. 11, 2018) (amending 37 C.F.R. § 42.100(b) effective
`November 13, 2018) (now codified at 37 C.F.R. § 42.100(b) (2019)). Under
`Phillips, the words of a claim are generally given their “ordinary and
`customary meaning,” which is the meaning they would have to a person of
`ordinary skill in the art at the time of the invention, in light of the
`specification and prosecution history. See Phillips, 415 F.3d at 1312–13.
`Petitioner identifies for construction the term “unique identity,” as
`recited in claim 1. Pet. 18–20. Patent Owner identifies for construction the
`term (i) “mobile computer,” as recited in claim 1; and (ii) “substitute,” as
`recited in dependent claim 2. PO Resp. 10–20. We address these three
`terms below.
`
`A. Unique Identity
`In the Petition, Petitioner argues that “unique identity” means “one or
`more parameters that uniquely identify a secure connection.” Pet. 18. In our
`Decision on Institution, “we concluded that no express claim construction of
`the term ‘unique identity’ [wa]s necessary” because in its Preliminary
`Response “Patent Owner d[id] not argue that RFC3104 or Grabelsky fails to
`disclose this term and, therefore, this term is not in controversy.” Dec. on
`Inst. 9 (citations omitted). In the subsequent papers, the parties confirm
`“that there is no reason to construe this term” because “Patent Owner does
`not dispute that some form of a unique identity is found in the primary
`reference.” PO Resp. 20; see also Pet. Reply 8 (agreeing that this term need
`not be construed). Accordingly, we find that no express construction of
`“unique identity” is needed. Nidec Motor Corp. v. Zhongshan Broad Ocean
`Motor Co., 868 F.3d 1013, 1017 (Fed. Cir. 2017) (quoting Vivid Techs., Inc.
`v. Am. Sci. & Eng’g, Inc., 200 F.3d 795, 803 (Fed. Cir. 1999)) (“[W]e need
`
`9
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`only construe terms ‘that are in controversy, and only to the extent necessary
`to resolve the controversy.’”).
`
`B. Mobile Computer
`Patent Owner argues that “the term ‘mobile computer’ in the claims
`means ‘a computer that moves from one network to another as opposed to a
`computer that is only capable of a static secure connection.’” PO Resp. 10.
`Patent Owner adds that a “mobile computer must be moving between
`networks,” and that “[m]erely being capable of moving is insufficient.” PO
`Sur-Reply 5. Petitioner argues that “[t]o the extent the Board determines
`this term needs to be construed” it means “a computer that is capable of
`moving between networks or physical locations.” Pet. Reply 2.
`We address the parties’ arguments below as they relate to (i) the claim
`language, (ii) the ’494 patent’s Specification, and (iv) the extrinsic evidence.
`
`1. Claim Language
`a. Claim 1’s Language
`Patent Owner argues that claim 1 recites a “‘mobile computer’ in a
`specific context.” PO Sur-Reply 4. To that end, Patent Owner argues that
`claim 1 recites:
`“An intermediate computer for secure forwarding of messages in
`a telecommunication network” including:
`• “the intermediate computer configured to receive from a
`mobile computer a secure message sent to the first network
`address”
`• “the intermediate computer configured to read the unique
`identity from the secure message sent to the first network
`address [from the mobile computer] . . . and to securely
`forward . . . [a] . . . message containing the encrypted data
`payload.”
`
`10
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`PO Resp. 10–11 (quoting Ex. 1001, 22:40–65) (emphasis added). In its Sur-
`Reply, Patent Owner quotes additional language recited in claim 1, namely
`that:
`
`the “mobile computer” sends a “secure message . . . to the first
`network address having an encrypted data payload of a message
`and a unique identity, the data payload encrypted with a
`cryptographic key derived from a key exchange protocol,” where
`an intermediate computer assigned with the first network address
`in a telecommunications network “securely forward[s] the
`encrypted data payload to the destination address using a
`network address of the intermediate computer as a source address
`of a forwarded message containing the encrypted data payload.”
`PO Sur-Reply 4–5 (quoting Ex. 1001, 22:40–65). Patent Owner argues that
`“[i]t is not enough that the computer be capable of moving between
`networks in some other context at some other time,” and that “[t]he mobile
`computer must be moving between networks in the recited context” of claim
`1. Id. at 5.
`
`We disagree with Patent Owner that the language of claim 1 supports
`its proposed construction. Nothing in claim 1 relates to a mobile computer
`moving between networks. Ex. 1001, 22:40–65. Rather, claim 1 focuses on
`the operations of “[a]n intermediate computer for secure forwarding of
`messages in a telecommunication network.” Id. at 22:40–41 (reciting claim
`1’s preamble). Each of claim 1’s limitations begins with “the intermediate
`computer configured to,” followed by specific operations (i.e., “connect,”
`“be assigned,” “receive,” “read,” and “access and securely forward”). Id. at
`22:42–65. Moreover, “mobile computer” is recited only once in claim 1,
`and in context, is merely the device from which the intermediate computer
`receives a secure message. Id.
`
`11
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`b. Claim 9’s Language
`Claim 9 depends from claim 1, and recites “wherein the intermediate
`
`computer is configured to modify the translation table entry address fields in
`response to a signaling message sent from the mobile computer when the
`mobile computer changes its address such that the intermediate computer
`can know that the address of the mobile computer is changed.” Ex. 1001,
`24:7–13 (emphasis added). In our Decision on Institution, we noted that
`in its Preliminary Response, Patent Owner did not address the impact, if any,
`of dependent claim 9’s claim language on the construction Patent Owner
`proposed for this term at that time. Dec. on Inst. 11. Thereafter, in its
`Response, Patent Owner addresses claim 9 with respect to its new proposed
`construction for this term. PO Resp. 11–12.
`
`Patent Owner argues that “[c]laim 9 is consistent with [its] proposed
`construction.” Id. at 11. In particular, Patent Owner argues that “[c]laim 9
`recites a very specific configuration of the intermediate computer to modify
`the recited translation table entry address fields in response to a signaling
`message sent from the mobile computer to provide its new IP address when
`it has changed networks.” Id. According to Patent Owner, one of ordinary
`skill in the art also “would readily recognize that there are other ways by
`which mobility could be provided in claim 1 using different operations
`different from those in claim 9.” Id.
`
`We disagree with Patent Owner that claim 9 is consistent with its
`proposed construction for this term. Rather, claim 9 adds additional
`functionality to the intermediate computer (i.e., “modify the translation
`table”) for use “in response to a signaling message sent from the mobile
`computer when the mobile computer changes its address.” Ex. 1001, 24:7–
`
`12
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`13 (emphasis added). In other words, claim 9 adds functionality to claim 1
`for “when” the mobile computer changes addresses (in other words, moves
`from one network to another). Id. Rather than supporting Patent Owner’s
`proposed construction, the language of claim 9 supports Petitioner’s
`proposed construction that a mobile computer “is capable of moving
`between networks” because claim 9’s additional functionality at least
`suggests that this functionality (including mobile computer movement) is not
`present in claim 1, which is broader than dependent claim 9. See Phillips,
`415 F.3d at 1315 (“[T]he presence of a dependent claim that adds a
`particular limitation gives rise to a presumption that the limitation in
`question is not present in the independent claim.”); Liebel-Flarsheim Co. v.
`Medrad, Inc., 358 F.3d 898, 910 (Fed. Cir. 2004) (“[W]here the limitation
`that is sought to be ‘read into’ an independent claim already appears in a
`dependent claim, the doctrine of claim differentiation is at its strongest.”)
`(citation omitted). Moreover, we do not find that Patent Owner’s arguments,
`which we discuss below, concerning the Specification’s disclosure overcome
`this presumption.
`
`2. Specification
`a. Patent Owner’s Arguments
`Patent Owner argues that the ’494 patent’s Specification “describes
`‘mobility’ in the background section” in a way that “is consistent with the
`understanding that a ‘mobile computer’ at least moves from one network to
`another.” PO Resp. 12 (citing Ex. 1001, 4:34–38). More specifically, Patent
`Owner argues that the Specification states that “[i]n this text, the term
`mobility and mobile terminal does not only mean physical mobility, instead
`the term mobility is in the first hand meant moving from one network to
`
`13
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`another, which can be performed by a physically fixed terminal as well.” Id.
`(quoting Ex. 1001, 4:34–38); PO Sur-Reply 3. Patent Owner argues that the
`plain import of this sentence “is that a requirement of mobility is that the
`computer is ‘moving from one network to another.’” PO Sur-Reply 3.
`In addition, Patent Owner argues that “the Background of the
`Invention [section of the ’494 patent] criticizes systems where the host
`computer is only capable of a static or fixed connection.” PO Resp. 13
`(citing Ex. 1001, 4:15–27, 4:42–45). Put differently, Patent Owner argues
`that “[t]he background section of the [’]494 [p]atent consistently disparages
`secure connection systems where the computer is not moving from one
`network to another and instead are capable of only static secure
`connections.” PO Sur-Reply 3–4 (citing PO Resp. 12–14 (citing Ex. 2002
`¶ 83; Ex. 1001, 4:15–27, 4:42–45, 4:60–64)); see also PO Resp. 12–14
`(citing same). Patent Owner argues that “[t]hus, the mobile computer is
`explicitly described as one that is not fixed to a static secure connection (its
`home address) but is instead moving between networks.” PO Sur-Reply 4.
`Patent Owner argues that this is confirmed by the ’494 patent’s disclosure
`that “[t]he mobile terminal is mobile in the sense that it changes its network
`point of attachment frequently.” Id. (quoting Ex. 1001, 4:50–51).
`In addition, Patent Owner argues that “the Detailed Description of the
`invention [section] describes mobile computers as being devices that are not
`limited to a static or fixed connection.” PO Resp. 14. In support of this
`argument, Patent Owner block quotes from the Detailed Description section
`of the ’494 patent, without further explanation. Id. at 14–16 (quoting Ex.
`1001, 7:56–8:10, 11:5–29). The quoted passages generally disclose, inter
`alia, that a first computer (e.g., a mobile computer) can send a signal (e.g., a
`
`14
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`registration request) to an intermediate computer so that address fields in a
`translation table can be modified to account for the change of addresses for
`enabling mobility. Id. Patent Owner then argues that “[t]hus, the mobile
`computer 1 in Figure 1 of the patent is described as maintaining an IPSec
`connection through second computer 3 because the mobile computer is not
`restricted to a static or fixed address.” Id. at 16 (annotating Ex. 1001, Fig. 1)
`(emphasis added). Similarly, Patent Owner argued, during the oral hearing,
`that a computer “is functioning as a mobile computer insofar [as] it is
`moving from one network to another and maintaining, the key is
`that it’s maintaining the same secure connection” — “it’s moved from one
`network to another and ha[s] a different address, but it doesn’t have to
`establish a new secure connection.” Tr. 49:14–19 (emphasis added).
`In addition, Patent Owner argues that its proposed construction is
`consistent with the ’494 “patent’s stated purpose: to securely forward a
`secure message when a computer is mobile, rather than merely when it is
`fixed to a certain network.” PO Sur-Reply 5 (citing Ex. 1001, 4:17–38,
`7:56–61).
`Lastly, Patent Owner discounts Petitioner’s reliance on the
`background section’s discussion of a mobile terminal and a mobile host
`allegedly forming static secure connections, and instead Patent Owner
`argues that its proposed construction “is informed by fundamental aspects of
`the [S]pecification,” namely (i) that “the background section of the [’]494
`[p]atent consistently disparages secure connections where the mobile device
`is confined to a static secure connection,” and (ii) “the detailed description
`section of the [’]494 [p]atent consistently describes a mobile computer as
`
`15
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`moving from one network to another and thereby is not limited to a static
`secure connection.” Id. at 6.
`
`b. Petitioner’s Arguments
`Petitioner argues that Patent Owner’s proposed construction is “an
`improper and overly narrow construction of the term ‘mobile computer’
`which attempts to import numerous additional requirements into this basic
`term.” Pet. Reply 1. More specifically, Petitioner argues that Patent
`Owner’s proposed construction “imports essentially the same additional
`requirements into the claims that the Board already rejected at institution,
`namely that the ‘mobile computer’ must be able to move while maintaining
`its secure connection.” Id. at 2 (citing Dec. on Inst. 10–11).
`Petitioner also argues that the Specification refers to “mobile
`terminal” and “mobile host” as “computers that only establish a ‘static
`secure connection.’” Id. at 5. For example, Petitioner argues that the
`Specification discloses that because “IPSec connections are bound to fixed
`addresses, the mobile terminal must establish a new IPSec connection from
`each point of attachment.” Id. at 6 (citing PO Resp. 14 (quoting Ex. 1001,
`4:60–64)) (emphasis omitted). For another example, Petitioner argues that
`the Specification states that “IPSec is intended to work with static network
`topology, where hosts are fixed to certain subnetworks,” and “[i]f IPSec is
`used with a mobile host, the IKE key exchange will have to be redone from
`every new visited network.” Id. (citing PO Resp. 13 (quoting Ex. 1001,
`4:16–18, 4:21–23)). Petitioner argues that “this passage plainly uses the
`term ‘mobile host’ in conjunction with a computer reestablishing static
`IPSec connections when moving rather than maintaining them.” Id. (citation
`omitted).
`
`16
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`c. Our Analysis
`We disagree with Patent Owner that the cited portions of the
`Specification support its proposed construction for this term. First, we find
`that Patent Owner conflates “mobility” with “mobile computer.”5 The
`Specification states that “the term mobility . . . meant moving from one
`network to another,” rather than the term “mobile computer” having this
`meaning. Ex. 1001, 4:34–38 (emphasis added). Moreover, the Specification
`uses the term “mobility” as a capability or condition. For example, the
`Specification uses the term “mobility” as follows: (i) certain “protocols are
`not well suited to mobility”; (ii) “[t]he intermediate host might be a Mobile
`IP home agent, that provides mobility for the connection between the mobile
`terminal and the home agent . . . .”; (iii) a disclosed “method solves the
`mobility problem, at the cost of adding extra headers to packets”; and
`(iv) “[o]ne example of a change in the [security association (‘SA’)] between
`the first computer and the intermediate computer is the change of addresses
`for enabling mobility.” Ex. 1001, 5:7–8, 5:17–21, 5:33–34, 7:56–58
`(emphases added). In other words, mobility is a capability a mobile
`computer has, rather than being synonymous with mobile computer. As
`such, these passages from the Specification support Petitioner’s construction
`
`
`5 Patent Owner likewise argues that we concluded in our Decision on
`Institution that a “‘mobile computer’ must at least be ‘moving from one
`network to another.’” PO Sur-Reply 2 (quoting Dec. on Inst. 10). This is
`incorrect. Instead, we found “that the ’494 patent teaches that mobility
`‘mean[s] moving from one network to another.’” Dec. on Inst. 10 (quoting
`Ex. 1001, 4:34–37) (emphasis added). We also expressly stated that we did
`not reach “whether ‘a computer that is capable of moving from one network
`to another’ differs from the plain meaning of ‘mobile computer,’ as this
`[wa]s not in controversy” at the institution stage. Id.
`
`17
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`that a mobile computer is “a computer that is capable of moving between
`networks,” rather than Patent Owner’s construction requiring that a “mobile
`computer must be moving between networks.”
`Second, we are not persuaded by Patent Owner’s arguments that the
`’494 patent’s background section criticizes and disparages systems where
`the host computers are only capable of a static or fixed connection. PO
`Resp. 13–14. These host computers are not mobile computers, but rather
`“are fixed to certain subnetworks.” Ex. 1001, 4:16–18. Put differently, for
`these hosts “when an IPSec tunnel has been formed by using Internet Key
`Exchange (IKE) protocol, the tunnel endpoints are fixed and remain
`constant.” Id. at 4:18–21. In contrast, a mobile computer has the capability
`to move between networks (i.e., can change its network point of attachment
`frequently). See Ex. 1001, 4:50–53 (“The mobile terminal is mobile in the
`sense that it changes its network point of attachment frequently.”). The
`Specification makes clear that a mobile computer is capable of moving
`between networks (as opposed to requiring such movement), even if it
`would have to “establish a new IPSec connection from each point of
`attachment,” or put differently, “the IKE key exchange will have to be
`redone from every new visited network.” Ex. 1001, 4:21–23, 4:60–63.
`Hence, Patent Owner’s construction also is incorrect to the extent that the
`latter portion (i.e., “as opposed to a computer that is only capable of a static
`secure connection”) would exclude a mobile computer from establishing a
`secure connection (static or otherwise) from each point of attachment.
`Ex. 1001, 4:50–53, 4:60–63.
`Third, we find that Patent Owner’s proposed construction is
`unworkable as to when such alleged movement needs to have occurred.
`
`18
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`Patent Owner agrees that “[c]ertainly the computer is at times going to be
`connected to a given network because it establishes a secure connection with
`a given network.” Tr. 49:12–14. Despite this, Patent Owner argues that the
`proper construction for this term requires that a mobile computer must be
`moving between networks. E.g., id. at 49:14–16. However, whether or not
`the mobile computer has changed its point of attachment and established a
`new IPSec connection before sending a secure message to the intermediate
`computer is immaterial to claim 1’s limitations. Ex. 1001, 4:15–27, 4:60–
`64, 22:40–65. Again, the mobile computer in claim 1 simply sends a secure
`message to the intermediate computer from a point of attachment to the
`network — no movement is required. Id. at 22:40–65. Claim 1 is focused
`on the operations of the intermediate computer, and in particular, that the
`immediate computer uses, inter alia, a translation table and unique identity
`to forward a secure message without the intermediate computer having the
`cryptographic key to decrypt the encrypted data payload. Id.
`Fourth, we are not persuaded by Patent Owner’s argument that its
`proposed construction is consistent with the ’494 patent’s “stated purpose.”
`PO Sur-Reply 4. The portions of the Specification that Patent Owner cites
`do not purport any “stated purpose,” but rather relate to additional
`functionality to handle, inter alia, addressing when a mobile computer
`moves networks. Ex. 1001, 4:17–38, 7:56–61. This functionality is
`implicated in claim 9, but not claim 1. Compare id. at 22:40–65, with id. at
`24:7–13; see also Helmsderfer v. Bobrick Washroom Equip., Inc., 527 F.3d
`1379, 1383 (Fed. Cir. 2008) (“It is often the case that different claims are
`directed to and cover different disclosed embodiments.”). We also note that
`the ’494 patent’s Abstract does not relate to mobility, but instead relates to
`
`19
`
`

`

`IPR2019-00823
`Patent 9,712,494 B2
`the subject matter of claim 1, including that an intermediate computer uses a
`message’s destination address and a unique identity to find an address to a
`second computer, and substitutes these values with the found address and
`another unique identity

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket