throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`APPLE INC.,
`Petitioner
`
`v.
`
`MPH TECHNOLOGIES OY,
`Patent Owner
`____________________
`Case IPR2019-00824
`U.S. Patent No. 9,712,502
`____________________
`
`
`PETITIONER’S REPLY TO PATENT OWNER’S RESPONSE
`UNDER 37 C.F.R. § 42.23
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Mail Stop PATENT BOARD
`Patent Trial and Appeal Board
`U.S. Patent & Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`
`
`

`

`TABLE OF CONTENTS
`
`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`
`
`
`
`
`
`
`Introduction ................................................................................................ 1
`Claim Construction ..................................................................................... 1
`A. The Board should reject MPH’s improper construction of “mobile
`computer.” .................................................................................................. 1
`1. The ’502 patent does not does not address any capability of “a static
`secure connection” in its explanation of a “mobile computer.” ............ 3
`2. MPH and its expert Dr. Rouskas ignore that the ’502 patent uses the
`terms “mobile terminal” and “mobile host” in conjunction with
`computers that establish a “static secure connection.” ......................... 5
`B. MPH does not dispute that the prior art discloses a “unique identity,” and
`therefore this term need not be expressly construed. ................................. 8
`C. MPH does not dispute that the prior art discloses a “secure connection,”
`and therefore this term need not be expressly construed. .......................... 8
`Ground 1: The combination of RFC3104 and Grabelsky renders obvious
`
`claims 1-9. .................................................................................................................. 9
`A. RFC3104 discloses a “mobile computer,” as recited in claim 1. ............... 9
`1. RFC3104 teaches the use of a laptop (i.e., “mobile computer”) that
`moves physical locations and changes networks. ................................. 9
`2. MPH’s arguments that a laptop cannot change addresses during the
`course of an ongoing RSIP connection are irrelevant. ........................ 12
`B. The combination of RFC3104 and Grabelsky teaches that “the computer
`is configured to send a signaling message to the intermediate computer
`when the computer changes its address such that the intermediate
`computer can know that the address of the computer is changed,” as
`recited in claim 7. ..................................................................................... 14
`C. The combination of RFC3104 and Grabelsky teaches that “the computer
`is configured to send the signaling message encrypted,” as recited in
`claim 8. ..................................................................................................... 18
`D. The combination of RFC3104 and Grabelsky renders obvious claims 2-6
`and 9. ........................................................................................................ 21
`Ground 2: The combination of RFC3104, Grabelsky, and Wagner renders
`
`obvious claim 10. ..................................................................................................... 22
`Conclusion ................................................................................................ 23
`
`
`
`
`- i -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`
`UPDATED EXHIBIT LIST
`
`Description
`U.S. Patent No. 9,712,502 B2 to Vaarala et al., issued Jul. 18, 2017
`(“the ’502 patent”)
`
`Declaration of David Goldschlag, Ph.D. (“Goldschlag Decl.”)
`
`Prosecution History of U.S. Patent No. 9,712,502 B2 (“’502 Patent
`Prosecution History”)
`
`RFC3104 - RSIP Support for End-to-end IPsec, The Internet
`Society (Oct. 2001) (“RFC3104”)
`
`Prosecution History of U.S. Patent No. 8,346,949 B2 (“’949 Patent
`Prosecution History”)
`
`U.S. Patent No. 7,032,242 B1 to Grabelsky et al., issued Apr. 18,
`2006 (“Grabelsky”)
`
`Wagner et al., Analysis of the SSL 3.0 Protocol, USENIX (Nov.
`1996) (“Wagner”)
`
`Declaration of Ms. Sandy Ginoza (“Ginoza Decl.”)
`
`Declaration of James L. Mullins Ph.D. (“Mullins Decl.”)
`
`Curriculum Vitae of James L. Mullins
`
`S. Frankel, “Demystifying the IPsec Puzzle,” Artech House, Inc.,
`2001 (“Frankel”)
`
`RSIP Support for End-to-end IPsec (RFC3104), IETF Data Tracker
`(2000) (“IETF Data Tracker”)
`
`RFC2026 - The Internet Standards Process -- Revision 3 (Oct.
`1996) (“RFC2026”)
`
`RFC2246 - The TLS Protocol Version 1.0 (Jan. 1999)
`(“RFC2246”)
`
`- ii -
`
`Exhibit No.
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`1009
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`
`
`
`
`

`

`Exhibit No.
`
`1015
`
`1016
`
`1017
`
`1018
`
`1019
`
`1020
`
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`1026
`
`1027
`
`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`
`Description
`RFC2401 - Security Architecture for the Internet Protocol (Nov.
`1998) (“RFC2401”)
`
`RFC2402 - IP Authentication Header (Nov. 1998) (“RFC2402”)
`
`RFC2406 - IP Encapsulating Security Payload (ESP) (Nov. 1998)
`(“RFC2406”)
`
`RFC2409 - The Internet Key Exchange (IKE) (Nov. 1998)
`(“RFC2409”)
`
`RFC3102 - Realm Specific IP: Framework (Oct. 2001)
`(“RFC3102”)
`
`Zhang et al., “A Multi-Layer IPsec Protocol,” (Aug. 2000)
`(“Zhang”)
`
`Curriculum Vitae of David Goldschlag, Ph.D. (“Goldschlag CV”)
`
`Declaration of David Goldschlag, Ph.D., in Support of Petitioner’s
`Reply to Patent Owner’s Response (“Second Goldschlag Decl.”)
`
`Transcript of the Deposition of George N. Rouskas, Ph.D., May 7,
`2020 (“Rouskas Dep.”)
`
`Transcript of the Deposition of Michael S. Borella, Ph.D., May 18,
`2020 (“Borella Dep.”)
`
`Merriam-Webster’s Collegiate Dictionary, Eleventh Edition (2003)
`(“Merriam-Webster’s Dictionary”)
`
`Myerson, Judith M., “Identifying enterprise network
`vulnerabilities,” International Journal of Network Management 12,
`135-144 (2002) (“Myerson”)
`
`Kohout, Jiri, “Why is Data Encryption Necessary Even in Private
`Networks?” TeskaLabs, available at https://teskalabs.com/blog/
`seacat-encryption (“Kohout”)
`
`
`
`- iii -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`
`
`
`Introduction
`Patent Owner (“MPH”) presents a single argument in support of the
`
`patentability of the ’502 patent’s independent claim: that the prior art does not
`
`teach a “mobile computer,” as recited in claim 1 of the ’502 patent. This argument
`
`is premised on an improper and overly narrow construction of the term “mobile
`
`computer,” which attempts to import numerous additional requirements into this
`
`basic term. The Board properly rejected similar attempts by MPH at the institution
`
`stage, and should continue to do so. A “mobile computer” is taught by RFC3104
`
`under any reasonable interpretation of the term, and thus, the Board should find
`
`independent claim 1 unpatentable.
`
`MPH’s arguments against the dependent claims fare no better. Again, MPH
`
`attempts to import requirements into the claims that do not exist and
`
`mischaracterizes the Petition’s arguments. For the reasons specified in the Petition
`
`and below, the Board should find the dependent claims unpatentable over the cited
`
`prior art.
`
` Claim Construction
`A. The Board should reject MPH’s improper construction of “mobile
`computer.”
`“mobile computer”
`MPH’s
`“a computer that moves from one network to another as
`Proposed
`opposed to a computer that is only capable of a static secure
`connection”
`Construction
`
`
`
`- 1 -
`
`

`

`Apple’s
`Proposed
`Construction
`
`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`To the extent the Board determines this term needs to be
`construed:
`
`“a computer that is capable of moving between networks or
`physical locations”
`
`MPH proposes that the term “mobile computer” should be construed as “a
`
`computer that moves from one network to another as opposed to a computer that is
`
`only capable of a static secure connection.” POR, 11. While MPH contends that its
`
`construction “has been revised based on the Board’s guidance” in the institution
`
`decision, this construction imports essentially the same additional requirements
`
`into the claims that the Board already rejected at institution, namely that the
`
`“mobile computer” must be able to move while maintaining its secure connection.
`
`See DI, 11. Indeed, MPH similarly asserted in its POPR that “the claims should be
`
`construed to distinguish the claimed ‘mobile computer’ from a computer that is
`
`only capable of static connections.” POPR, 4. MPH’s expert also could not explain
`
`any substantive difference between MPH’s proposed construction prior to
`
`institution and its newly proposed construction aside from using different
`
`language. EX1023, Rouskas Dep., 11:16-19, 15:3-17:3. This overly-narrow
`
`construction is improper and should again be rejected. Superguide Corp. v.
`
`DirecTV Enters., Inc., 358 F.3d 870, 875 (Fed. Cir. 2004); E-Pass Techs., Inc. v.
`
`3Com Corp., 343 F.3d 1364, 1369 (Fed. Cir. 2003) (“Interpretation of descriptive
`
`statements in a patent’s written description is a difficult task, as an inherent tension
`
`
`
`- 2 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`exists as to whether a statement is a clear lexicographic definition or a description
`
`of a preferred embodiment. The problem is to interpret claims ‘in view of the
`
`specification’ without unnecessarily importing limitations from the specification
`
`into the claims.”).
`
`1.
`
`The ’502 patent does not does not address any capability of
`“a static secure connection” in its explanation of a “mobile
`computer.”
`To support its proposed construction, MPH first points to the ’502 patent’s
`
`use of the terms “mobility” and “mobile terminal”:
`
`In this text, the term mobility and mobile terminal does not only mean
`physical mobility, instead the term mobility is in the first hand meant
`moving from one network to another, which can be performed by a
`physically fixed terminal as well.
`
`EX2002, 4:35-39; POR, 13. As Apple’s expert, Dr. Goldschlag, explains, this
`
`language is extremely broad. EX1022, Second Goldschlag Decl., ¶¶7-9. Consistent
`
`with Apple’s proposed construction (to the extent this term needs to be expressly
`
`construed), this passage states that these terms “not only mean physical mobility,”
`
`but also can describe a terminal (e.g., computer) that “move[s] from one network
`
`to another.” Id. Importantly, this is the complete extent of the meaning assigned to
`
`the terms “mobility” and “mobile terminal” in the ’502 patent. Id. And, as MPH’s
`
`expert Dr. Rouskas explains, the ’502 patent uses the terms “mobile terminal,”
`
`
`
`- 3 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`“mobile host,” and “mobile computer” to mean the same thing. EX1023, 163:10-
`
`164:15.
`
`MPH’s expert Dr. Rouskas also agreed with this interpretation in cross-
`
`examination, clarifying his understanding of the terms “mobile terminal” and
`
`“mobility” in this passage:
`
`Q. Okay. So I'll ask again, do you have an understanding of what the
`term “does not only mean,” how that affects, if at all, the
`interpretation of that sentence?
`. . .
`A. Right. So a physical mobility, that could be moving let’s say my
`laptop from one desk to another in the same room.
`Q. Right. So I guess what I'm asking is, wouldn’t you interpret what it
`says here to say the term “mobility” means not only that you can move
`it from, you know, one place in your room to the other, but it also
`means that moving from one network to another?
`. . .
`A. Well, yes, [t]hat’s what I understand what that sentence means,
`that mobility also means moving from one network to another.
`
`EX1023, 159:13-160:10 (emphasis added). Thus, even MPH’s own expert
`
`agreed with the ’502 patent’s broad use of the terms “mobility” and “mobile
`
`terminal,” which, on their own, do not suggest anything more than moving
`
`between networks and/or physical locations. EX1022, ¶¶10-11. Dr. Rouskas
`
`further conceded that he did not form an opinion on whether his proposed
`
`
`
`- 4 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`construction required the “mobile computer” to actually move, or just required the
`
`capability of moving—confirming an even broader understanding of the term. See
`
`EX1023, 17:6-20:3.
`
`Even more, MPH relied on a second expert, the first-named author of
`
`RFC3104 (Michael Borella), to opine on alleged issues of mobility in the context
`
`of RFC3104. See generally EX2010. Yet, on cross-examination, Dr. Borella
`
`similarly opined that his complete understanding of the term “mobile computer” in
`
`the context of the ’502 patent is a computer that “moves from one network to
`
`another.” EX1024, Borella Dep., 230:17-20. Hence, all of the parties’ experts agree
`
`that the term “mobile computer” means nothing more than moving (or the
`
`capability of moving) between networks or physical locations. EX1022, ¶12.
`
`2. MPH and its expert Dr. Rouskas ignore that the ’502 patent
`uses the terms “mobile terminal” and “mobile host” in
`conjunction with computers that establish a “static secure
`connection.”
`MPH further cites to other portions of the ’502 patent to support its proposed
`
`construction of “mobile computer,” attempting to differentiate the term from “a
`
`computer that is only capable of a static secure connection.” POR, 13-17; EX2003,
`
`¶77. These passages of the ’502 patent use the terms “mobile terminal” and
`
`“mobile host,” and as discussed above, MPH’s expert Dr. Rouskas explains that
`
`the ’502 patent uses the terms “mobile terminal,” “mobile host,” and “mobile
`
`computer” to mean the same thing. EX1023, 163:10-164:15. But both MPH and its
`
`
`
`- 5 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`expert Dr. Rouskas ignore that the terms “mobile terminal” and “mobile host” in
`
`these passages refer to computers that only establish a “static secure connection”—
`
`directly contradicting MPH’s proposed construction that requires a “mobile
`
`computer” to maintain a secure connection when moving.
`
`For example, MPH cites to the ’502 patent at 4:61-64, which states,
`
`“Standard IPSec does not work well in the scenario. Since IPSec connections are
`
`bound to fixed addresses, the mobile terminal must establish a new IPSec
`
`connection from each point of attachment.” POR, 15 (citing EX2002, 4:61-64
`
`(emphasis added)). As Apple’s expert explains, this passage plainly uses the term
`
`“mobile terminal” in conjunction with a computer establishing a static IPSec
`
`connection each time the computer connects to a network. EX1022, ¶¶13-14.
`
`MPH cites also to the ’502 patent at 4:17-28, which states that “IPSec is
`
`intended to work with static network topology, where hosts are fixed to certain
`
`subnetworks . . . . If IPSec is used with a mobile host, the IKE key exchange will
`
`have to be redone from every new visited network.” POR, 14 (citing EX2002, 4:17-
`
`28 (emphasis added)). Again, this passage plainly uses the term “mobile host” in
`
`conjunction with a computer reestablishing static IPSec connections when moving
`
`rather than maintaining them. EX1022, ¶15.
`
`During cross-examination, Dr. Rouskas was asked about these passages in
`
`relation to his and MPH’s proposed construction of “mobile computer.” EX1023,
`
`
`
`- 6 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`164:16-178:12. Although Dr. Rouskas asserted that he “considered the entire
`
`specification” when forming his construction of “mobile computer,” id., 173:8-18,
`
`Dr. Rouskas repeatedly asserted that he had not formed an opinion on what the
`
`terms “mobile terminal” and “mobile host” mean as they are used in these passages
`
`of the ’502 patent, id., 174:4-177:4. For example, when asked, “Do you have an
`
`opinion on what the terms ‘mobile terminal’ and ‘mobile host’ mean as those terms
`
`are used in the background sections of the ’494 [(U.S. Patent No. 9,712,494)] and
`
`the ’502 patents?” Dr. Rouskas responded, “I did not form an opinions [sic] on this
`
`-- on the terms.” Id., 175:12-176:1. Thus, MPH’s expert merely chose to
`
`characterize portions of the ’502 patent specification in a way that suited MPH’s
`
`interests, rather than to properly consider the specification as a whole. And, again,
`
`MPH and its expert specifically cited to these portions of the ’502 patent
`
`specification to support its proposed construction. POR, 13-17; EX2003, ¶77.
`
`Recognizing Dr. Rouskas’s critical failure to consider the ’502 patent’s
`
`usage of “mobile terminal” and “mobile host” when forming his construction of
`
`“mobile computer,” MPH’s counsel attempted to reverse Dr. Rouskas’s testimony
`
`on redirect. Specifically, counsel for MPH asked Dr. Rouskas whether he meant
`
`“to say that the term ‘mobile computer’ as it’s used in the claims means the same
`
`thing as ‘mobile host’ as it’s discussed in the background of the invention in the
`
`’494 and ’502 patents.” EX1023, 179:18-22. Unsurprisingly, Dr. Rouskas
`
`
`
`- 7 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`responded that he “did not mean to say that.” Id., 180:1-2. However, significantly
`
`undermining the credibility of his testimony, Dr. Rouskas admitted that he
`
`discussed his answers to the questions on redirect with counsel during the break.
`
`Id., 181:9-21. Accordingly, the Board should not give credence to this arranged
`
`testimony.
`
`For these reasons, MPH’s overly-narrow construction of the term “mobile
`
`computer” should once again be rejected.
`
`B. MPH does not dispute that the prior art discloses a “unique
`identity,” and therefore this term need not be expressly construed.
`There is no dispute that the prior art in this proceeding discloses a “unique
`
`identity,” as recited in the claims. See POR, 18 (“Patent Owner does not dispute
`
`that some form of a unique identity is found in the primary reference.”). Therefore,
`
`the Board need not expressly construe this term for purposes of this proceeding.
`
`C. MPH does not dispute that the prior art discloses a “secure
`connection,” and therefore this term need not be expressly
`construed.
`There is no dispute that the prior art teaches a “secure connection,” as
`
`recited in the claims. POR, 23 (“Patent Owner does not dispute that the primary
`
`reference involves a secure connection.”). Therefore, the Board need not expressly
`
`construe this term for the purposes of this proceeding.
`
`
`
`- 8 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
` Ground 1: The combination of RFC3104 and Grabelsky renders
`obvious claims 1-9.
`A. RFC3104 discloses a “mobile computer,” as recited in claim 1.
`MPH’s entire argument against claim 1 is premised on its incorrect
`
`construction of the term “mobile computer.” POR, 27-54. As discussed above, this
`
`construction should be rejected. As explained in the Petition and below, the
`
`combination of RFC3104 and Grabelsky teaches a “mobile computer” under any
`
`reasonable interpretation of the term.
`
`1.
`
`RFC3104 teaches the use of a laptop (i.e., “mobile
`computer”) that moves physical locations and changes
`networks.
`As explained in the Petition, RFC3104 discloses a “Roadwarrior scenario” in
`
`which “a remote user with a laptop gains access to the Internet, perhaps by using
`
`PPP or DHCP. The user wants to access its corporation private network.” EX1004,
`
`16 (emphasis added); Pet., 32.
`
`RFC3104, 16.
`
`
`
`
`
`- 9 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`In this scenario, both parties and their experts agree that a POSITA would
`
`have understood that the laptop moves from one network to another, and is thus a
`
`“mobile computer.” Pet., 21-22, 32-34 (citing EX1002, ¶¶92-94); POR, 30-31
`
`(citing EX2003, ¶105) (“[A] POSITA would understand that a businessperson on
`
`the road with a laptop can be expected to connect to different networks from
`
`different places (e.g., hotel, airport, office) . . . .”). Indeed, this is consistent with
`
`the ordinary meaning of the term “road warrior,” i.e., “a person who travels
`
`frequently esp[ecially] on business.” EX1025, Merriam-Webster’s Dictionary,
`
`1077; EX1022, ¶19. Further, during cross-examination, MPH’s expert Dr. Rouskas
`
`agreed that RFC3104’s “Roadwarrior scenario does contemplate a scenario where
`
`the laptop would be moved to different locations, and it would reconnect back to
`
`the server” with a different IP address. EX1023, 152:10-153:9 (emphasis added).
`
`And MPH’s other expert, Dr. Borella, conceded that this scenario (i.e., a computer
`
`that disconnects from one network, moves to another network, and then reconnects
`
`using a second network) would meet his definition of “mobile computer.” EX1024,
`
`224:9-225:4. Thus, both parties agree that the laptop used in RFC3104’s
`
`Roadwarrior scenario is “mobile” in that it moves from one network to another.
`
`EX1022, ¶20.
`
`With this understanding, the Petition explains that “a POSITA would have
`
`understood that in the context of the ‘Roadwarrior scenario,’ the computer
`
`
`
`- 10 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`connected to the public Internet would be a ‘laptop [i.e., “mobile computer”] [that]
`
`gains access to the Internet.’” Pet., 33 (citing EX1002, ¶94). MPH’s expert Dr.
`
`Borella, a co-author of RFC3104, also agreed that the “Roadwarrior scenario” can
`
`be reversed, meaning “Host Y can initiate the connection instead of Host X.”
`
`EX1024, 248:9-14; EX1004, 16. This testimony renders irrelevant Dr. Borella’s
`
`distinctions with regard to which host in the Roadwarrior scenario is an RSIP
`
`client, see EX2010, ¶60, since the Roadwarrior scenario contemplates both
`
`scenarios in which either host X or host Y plays the role of the RSIP client.
`
`EX1022, ¶¶20-24. The Roadwarrior’s reversed scenario further aligns precisely
`
`with the “core” diagram of RFC3104 in which the RSIP client initiating the
`
`connection is on the internal private network, and the IPSec peer is connected to
`
`the Internet. See Pet., 32-34 (discussing the Roadwarrior’s reversed scenario).
`
`EX1004, 2 (annotated); EX1022, ¶23.
`
`
`
`
`
`- 11 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`Hence, there is no reasonable dispute that RFC3104 contemplates the use of
`
`a “mobile” laptop involved in a secure RSIP connection, as illustrated by
`
`RFC3104’s “Roadwarrior scenario.” EX1022, ¶25.
`
`2. MPH’s arguments that a laptop cannot change addresses
`during the course of an ongoing RSIP connection are
`irrelevant.
`Although MPH devotes 26 pages of argument in its POR to the “mobile
`
`computer” of the claims, MPH’s only objection to the prior art is that “a POSITA
`
`would not understand the laptop [of RFC3104] to be changing addresses during the
`
`course of an ongoing RSIP end-to-end connection.” POR, 31 (emphasis added).
`
`This statement, and the remainder of MPH’s analysis, illustrates that MPH is still
`
`asserting that the claimed “mobile computer” must be able to move networks while
`
`maintaining its connection, the same argument that MPH put forth in its Patent
`
`Owner Preliminary Response and the Board previously considered. See DI, 9-12.
`
`As discussed in Section II.A, this attempt to import additional requirements into
`
`the term “mobile computer” is improper and inconsistent with the ’502 patent’s
`
`usage of the term. EX1022, ¶26.
`
`MPH further attempts to support this argument by alleging that the system of
`
`RFC3104 would become “inoperable” if any host changed address. POR, 31-32,
`
`36, 39-40, 47. But MPH misses the point. RFC3104’s laptop “moves” between
`
`networks (e.g., is a “mobile computer”) because it can disconnect from a first
`
`
`
`- 12 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`network and then reestablish an RSIP connection at a second network. Indeed,
`
`none of the experts—Dr. Borella, Dr. Rouskas, or Dr. Goldschlag—appear to
`
`dispute that point. EX1022, ¶¶27-28.
`
`Specifically, Dr. Borella admitted that a computer that connects from one
`
`network, disconnects, and reconnects to another network is a “mobile computer”:
`
`A. Okay so if I can reiterate this in my own words you would like to
`know whether the definition of mobile computer in paragraph 42 of
`my declaration includes a network -- excuse me -- includes a
`computer that disconnects from one network, moves to another
`network, and then reconnects using that network, that second network.
`Is that fair?
`MR. BLOCK: Yeah. That’s fair.
`A. Okay. Perhaps I’m over thinking this I haven’t specifically
`considered that scenario. But you do -- you are telling me that this
`hypothetical computer is moving from one network to another.
`MR. BLOCK: Yeah. That is correct.
`A. All right. In that case, in that case it falls within the definition I
`have provided here.
`
`EX1024, 224:9-225:4 (emphasis added); see also EX1023, 152:10-153:9 (MPH’s
`
`expert Dr. Rouskas testifying that such a scenario is contemplated by RFC3104).
`
`In other words, Dr. Borella conceded during cross-examination that a
`
`computer does not need to maintain a connection during its move to be considered
`
`a “mobile computer” within the context of the ’502 patent. Rather, the simple fact
`
`
`
`- 13 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`that the computer “move[s] from one network to another” makes the computer fall
`
`within Dr. Borella’s applied definition of “mobile computer,” as conceded by Dr.
`
`Borella. EX1024, 224:20-225:4; EX1022, ¶29. And, as discussed above, there is no
`
`dispute that RFC3104’s disclosed laptop computer would move from one network
`
`to another, reconnecting from different points of attachment with different IP
`
`addresses. See EX1023, 153:1-9. Therefore, Dr. Borella’s declaration testimony
`
`regarding alleged mobility issues of RFC3104 are immaterial to the requirements
`
`of the “mobile computer” in the challenged claims. See EX2010, ¶¶44-63.
`
`Accordingly, RFC3104 teaches a “mobile computer” within the context of
`
`the ’502 patent claims, consistent with the usage of the term in the ’502 patent
`
`specification.
`
`B.
`
`The combination of RFC3104 and Grabelsky teaches that “the
`computer is configured to send a signaling message to the
`intermediate computer when the computer changes its address
`such that the intermediate computer can know that the address of
`the computer is changed,” as recited in claim 7.
`As an initial matter, as explained in the petition, a POSITA would have
`
`understood that “either RFC3104’s host Y or X could be (and often would be) a
`
`mobile computer, and that naturally, as a consequence of the host Y or X being a
`
`mobile computer, their address would change due to mobility of such a computer.”
`
`Pet., 32 (citing EX1002, ¶92). As discussed above, this is evidenced at least by
`
`RFC3104’s disclosure of a laptop in the “Roadwarrior” scenario, which all parties
`
`
`
`- 14 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`agree would be expected to move between networks and physical locations. Pet.,
`
`21-22, 32-34 (citing EX1002, ¶¶92-94); POR, 30-31 (citing EX2003, ¶105) (“[A]
`
`POSITA would understand that a businessperson on the road with a laptop can be
`
`expected to connect to different networks from different places (e.g., hotel, airport,
`
`office) . . . .”).
`
`Thus, MPH’s arguments that hosts X and Y cannot change address during an
`
`RSIP session are immaterial because this is not a requirement of the claims. Claim
`
`7 merely requires a “signaling message” to be sent “to the intermediate computer
`
`when the computer changes its address.” EX1022, ¶¶31-32. For example, MPH’s
`
`expert Dr. Borella explains that in the context of RFC3104, it is “possible for RSIP
`
`Client X to connect to RSIP Server N with one address, then at some later point
`
`connect to RSIP Server N using a different address.” EX1024, 243:8-21. In this
`
`case, for the moving computer (i.e., “mobile computer”) to reestablish its secure
`
`connection with its peer, an “ASSIGN_REQUEST_RSIPSEC” message would be
`
`sent to RSIP server N to create a binding for the secure connection. Pet., 52-53;
`
`EX1022, ¶32.
`
`MPH’s remaining dispute appears to center on whether the
`
`“ASSIGN_REQUEST_RSIPSEC” message in RFC3104 is used to “signal address
`
`changes of Host X or Host Y.” POR, 56. In particular, MPH’s expert alleges that
`
`“the address field parameters in the ASSIGN_REQUEST_RSIPSEC message are
`
`
`
`- 15 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`used to communicate address information about Server N and message recipient Y,
`
`not information on the address of Host X.” EX2003, ¶145 (emphasis added).
`
`In other words, MPH argues that the ASSIGN_REQUEST_RSIPSEC
`
`message itself does not include the new address of the computer that moved.
`
`EX1022, ¶34. However, this misses the point. MPH concedes that, at a minimum,
`
`the IP packet containing the ASSIGN_REQUEST_RSIPSEC message does
`
`include the address of host X, the moving host. Specifically, Dr. Borella, co-author
`
`of RFC3104, concedes this point:
`
`Q. But the ASSIGN_REQUEST_RSIPSEC message is included in an
`IP packet, right?
`A. Yes.
`Q. And that IP packet would, in fact, provide the address Xa [of]
`RSIP host X, right?
`A. Yes.
`
`EX1024, 247:11-248:1.
`
`Further, neither of the parties dispute that RSIP server N needs to obtain the
`
`address of RSIP client X as part of establishing an RSIP session. EX1022, ¶35. For
`
`example, MPH’s expert Dr. Rouskas explained that the binding created as a result
`
`of the ASSIGN_REQUEST_RSIPSEC message would include the new IP address
`
`of the “mobile” RSIP client, though Dr. Rouskas did not explain how that IP
`
`address is obtained. EX1023, 107:11-15. MPH’s other expert, Dr. Borella, also
`
`
`
`- 16 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`plead ignorance regarding where RSIP server N obtains the new IP address of
`
`RSIP client X. EX1024, 247:17-248:1 (“Q. And you don’t have an opinion on
`
`whether or not that address provided in the source address of the
`
`ASSIGN_REQUEST_RSIPSEC message is what Server N uses to determine the
`
`address of Host X, right? A. Again, that is an implementation detail and I haven’t
`
`formed an opinion of that.”) (emphasis added).
`
`But, as Apple’s expert explains, given that address of host X has to be
`
`obtained from somewhere, the most logical place to obtain that address is from the
`
`IP packet containing the ASSIGN_REQUEST_RSIPSEC message. EX1022, ¶35.
`
`Indeed, as explained above, Dr. Borella explains that this is possible and would
`
`simply be an “implementation detail.” EX1024, 241:6-12. Then, following receipt
`
`of the new ASSIGN_REQUEST_RSIPSEC message, the Petition explains that
`
`“the RSIP server N can create a mapping of the assigned parameters to the address
`
`of the RSIP client.” Pet., 52. Therefore, this IP packet containing the
`
`ASSIGN_REQUEST_RSIPSEC message acts as “a signaling message [sent] to
`
`the intermediate computer when the computer changes its address such that the
`
`intermediate computer can know that the address of the computer is changed,” as
`
`required by claim 7. Id., 51-53.
`
`
`
`- 17 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`C. The combination of RFC3104 and Grabelsky teaches that “the
`computer is configured to send the signaling message encrypted,”
`as recited in claim 8.
`As explained in the Petition, “a POSITA would have been motivated to
`
`ensure that every transmission is secured either by authentication or encryption.”
`
`Pet., 53-54; EX1002, ¶134. MPH argues three points with respect to this claim.
`
`These arguments overstate the complexity of encrypting messages, which was well
`
`known and ubiquitous in computer networking at the time of the ’502 patent.
`
`EX1022, ¶36.
`
`First, MPH alleges that “because ‘the ARR
`
`(ASSIGN_REQUEST_RSIPSEC)] message would be sent from X at Xa to Na at
`
`Server N within a private network space,’ a POSITA would see ‘no need to encrypt
`
`the message’ and would understand that doing so would introduce ‘unnecessary
`
`complexity and processing overhead.’” POR, 58 (citing EX2003, ¶149). But
`
`RFC3104’s use of “a private address space” in its discussion is merely provided as
`
`an example. RSIP does not require or even expect address space A to always refer
`
`to a private address space: “For example, A could be a private address space, and
`
`B the public address space of the general Internet.” EX1004, 3; EX1022, ¶37.
`
`Indeed, RFC3104 provides the example “Roadwarrior scenario” in which the RSIP
`
`client X connects to RSIP server N over the “public Internet.” EX1004, 16;
`
`EX1022, ¶37. Additionally, as Dr. Goldschlag explains, private networks are also
`
`
`
`- 18 -
`
`

`

`Case IPR2019-00824
`U.S. Pat. No. 9,712,502
`subject to attack, and thus message encryption produces higher security. EX1022,
`
`¶38.
`
`Second, MPH alleges that “the ‘ARR message is simply a signal used to
`
`“request IPSec parameter assignments”’ (quoting Ex. 1

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket