throbber
Trials@uspto.gov
`571-272-7822
`
`
`Paper 8
`Entered: July 26, 2017
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`SANDVINE CORPORATION and SANDVINE INCORPORATED ULC,
`Petitioner,
`
`v.
`
`PACKET INTELLIGENCE, LLC,
`Patent Owner.
`____________
`
`Case IPR2017-00769
`Patent 6,651,099 B1
`____________
`
`
`Before ELENI MANTIS MERCADER, JUSTIN T. ARBES, and
`WILLIAM M. FINK, Administrative Patent Judges.
`
`MANTIS MERCADER, Administrative Patent Judge.
`
`
`
`
`DECISION
`Denying Institution of Inter Partes Review
`37 C.F.R. § 42.108
`
`
`
`
`
`
`
`NOAC Ex. 1051 Page 1
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`
`I. INTRODUCTION
`Petitioner filed a Petition for inter partes review of claims 1–10 of
`U.S. Patent No. 6,651,099 B1 (Ex. 1003, “the ’099 patent”). Paper 1
`(“Pet.”). Patent Owner filed a Preliminary Response. Paper 6 (“Prelim.
`Resp.”). By statute, institution of an inter partes review may not be
`authorized “unless . . . the information presented in the petition . . . and any
`response . . . shows that there is a reasonable likelihood that the petitioner
`would prevail with respect to at least 1 of the claims challenged in the
`petition.” 35 U.S.C. § 314(a); see also 37 C.F.R. § 42.108.
`Upon consideration of the Petition and the Preliminary Response, we
`are not persuaded Petitioner demonstrated a reasonable likelihood of
`prevailing in establishing unpatentability of at least one claim of the ’099
`patent. Accordingly, we do not institute an inter partes review.
`A. Related Matters
`Patent Owner submits that the ’099 patent is the subject of a patent
`
`infringement lawsuit in the United States District Court for the Eastern
`District of Texas: (1) Packet Intelligence, LLC v. Sandvine Corp., Case No.
`2:16-cv-00147, which was consolidated for pretrial matters (except venue)
`with co-pending Packet Intelligence, LLC v. NetScout Systems, Inc., Case
`No. 2:16-cv-00230. Paper 5. Petitioner also filed petitions for inter partes
`review of United States Patent Nos. 6,839,751 B1 (IPR2017-00451);
`6,771,646 B1 (IPR2017-00450); 6,954,789 B2 (IPR2017-00629 and
`IPR2017-00630); and 6,665,725 B1 (IPR2017-00862 and IPR2017-00863).
`Id.
`
`
`
`2
`
`NOAC Ex. 1051 Page 2
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`
`B. The ’099 Patent
`The ’099 patent relates to examining packets passing through a
`connection point on a computer network to determine whether a packet is of
`an existing conversational flow. Ex. 1003, Abstract. Figure 3 of the ’099
`patent is reproduced below.
`
`
`
`Figure 3 above shows network packet monitor 300. Id. at 11:43–45.
`Parser 301 parses and extracts selected portions of packet 302 to
`generate an identifying signature and analyzer 303 analyzes the packet. See
`id. at 11:59–65. Compiler 310 provides protocol specific information to
`parser 301 and analyzer 303. Id. at 11:66–12:1. For each protocol there are
`several fields that are known, such as the destination (recipient) and the
`source (sender). Id. at 12:5–8. These are used by monitor 300 to identify
`
`3
`
`NOAC Ex. 1051 Page 3
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`the flow. Id. Parser 301 uses pattern recognition process 304 carried out by
`the pattern analysis and recognition (PAR) engine to parse packet 302 and
`determine the protocol types and associated headers for each protocol layer
`that exists in packet 302 by using parsing-pattern-structures supplied from
`parsing/extraction database 308. Id. at 12:12–22, 12:65–13:2.
`Extraction process 306, implemented by an extracting and information
`identifying (EII) engine in parser 301, extracts characteristic portions
`(signature information) from packet 302 using extraction masks supplied
`from the extraction-operations database (e.g., parsing/extraction database
`308) to identify information from the packet. Id. at 12:12–22, 13:14–25.
`This is required to recognize the packet as part of a flow. Id. at 13:14–25.
`The extracted information is put in a sequence that is processed in block 312
`to build a unique flow signature (also called a “key”) for the flow depending
`on the protocols used in the packet. Id. The flow signature depends on the
`protocols used in the packet and may include source and destination
`addresses. Id. at 13:23–29. Building a hash of the signature using a hash
`function allows for efficient searching. Id. at 13:30–36.
`A parser record that includes the signature, the hash, and the packet
`itself, is passed on to lookup process 314 carried out by the lookup engine
`(LUE) to determine whether the particular packet belongs to a known flow
`as indicated by the presence of a flow-entry matching the flow in a database
`of known flows 324. Id. at 13:54–61, 14:3–13.
`Flow-entry database 324 “stores flow-entries that include the unique
`flow-signature, state information, extracted information from the packet for
`updating flows,” and statistics about the flow. Id. at 14:14–18. If there is no
`flow-entry matching the signature (e.g., the signature is for a new flow), then
`
`4
`
`NOAC Ex. 1051 Page 4
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`protocol and state identification process 318 determines the state and
`protocol. Id. at 14:39–42. Process 318 determines the protocols and where
`in the state sequence for the protocol the packet belongs by making
`reference to database 326 of state patterns and processes. Id. at 14:41–46. If
`the packet is found to have matching flow-entry in database 324 (e.g., in the
`cache) then process 320 determines, from the looked-up flow entry, if more
`classification by state processing of the flow signature is necessary. Id. at
`14:49–53. If no further processing is needed, then process 322 updates the
`flow entry in flow-entry database 324. Id. at 14:53–54. If state processing is
`required, then state processor 328 carries out any state operations according
`to state instructions from state pattern and processes database 326. Id. at
`14:58–62.
`State processor 328 analyzes both new and existing flows in order to
`analyze all levels of the protocol stack, ultimately classifying flows by
`application (level 7 in the ISO model). Id. at 14:63–66. This is done by
`processing from state-to-state based on predefined state transition rules and
`state operations specified in state processor instruction database 326. Id. at
`14:66–15:1. By maintaining a state of flows, network traffic monitor 300
`provides for a single packet protocol recognition of flows and multiple-
`packet recognition of flows. Id. at 15:18–22. Process 334 finalizes the
`classification of the conversational flow. Id. at 15:39–41.
`C. Illustrative Claim
`Claim 1 of the challenged claims of the ’099 patent is independent.
`Claim 1 is illustrative of the claimed subject matter:
`1. A packet monitor for examining packets passing
`through a connection point on a computer network in real-time,
`the packets provided to the packet monitor via a packet
`
`5
`
`NOAC Ex. 1051 Page 5
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`
`acquisition device connected to the connection point, the packet
`monitor comprising:
`(a) a packet-buffer memory configured to accept a packet
`from the packet acquisition device;
`(b) a parsing/extraction operations memory configured to
`store a database of parsing/extraction operations that includes
`information describing how to determine at least one of the
`protocols used in a packet from data in the packet;
`(c) a parser subsystem coupled to the packet buffer and to
`the pattern/extraction operations memory, the parser subsystem
`configured to examine the packet accepted by the buffer, extract
`selected portions of the accepted packet, and form a function of
`the selected portions sufficient to identify that the accepted
`packet is part of a conversational flow-sequence;
`(d) a memory storing a flow-entry database including a
`plurality of flow-entries for conversational flows encountered by
`the monitor;
`(e) a lookup engine connected to the parser subsystem and
`to the flow-entry database, and configured to determine using at
`least some of the selected portions of the accepted packet if there
`is an entry in the flow-entry database for the conversational flow
`sequence of the accepted packet;
`(f) a state patterns/operations memory configured to store
`a set of predefined state transition patterns and state operations
`such that traversing a particular transition pattern as a result of a
`particular conversational flow-sequence of packets indicates that
`the particular conversational flow-sequence is associated with
`the operation of a particular application program, visiting each
`state in a traversal including carrying out none or more
`predefined state operations;
`(g) a protocol/state identification mechanism coupled to
`the state patterns/operations memory and to the lookup engine,
`the protocol/state identification engine configured to determine
`the protocol and state of the conversational flow of the packet;
`and
`
`6
`
`NOAC Ex. 1051 Page 6
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`
`(h) a state processor coupled to the flow-entry database,
`the protocol/state identification engine, and to the state
`patterns/operations memory, the state processor, configured to
`carry out any state operations specified
`in
`the state
`patterns/operations memory for the protocol and state of the flow
`of the packet,
`the carrying out of the state operations furthering the
`process of identifying which application program is associated
`with the conversational flow-sequence of the packet, the state
`processor progressing through a series of states and state
`operations until there are no more state operations to perform for
`the accepted packet, in which case the state processor updates the
`flow-entry, or until a final state is reached that indicates that no
`more analysis of the flow is required, in which case the result of
`the analysis is announced.
`Ex. 1003, 35:2–62.
`
`D. References
`Petitioner relies on the following references. Pet. 1–2.
`Reference Title
`Date
`Engel
`US 6,115,393
`Sep. 5, 2000
`(filed June 21,
`1995)
`Jan. 30, 2001
`(filed June 27,
`1997)
`Aug. 11, 1998
`
`July 30, 1985 Ex. 1034
`
`Ex. No.
`Ex. 1007
`
`Ex. 1010
`
`Ex. 1012
`
`US 6,182,146 B1
`
`US 5,793,954
`
`US 4,532,606
`
`Graham-
`Cumming
`Baker
`
`Phelps
`
`
`E. Asserted Grounds of Unpatentability
`Petitioner contends that claims 1–10 of the ’099 patent are
`
`unpatentable based on the following grounds:
`
`7
`
`NOAC Ex. 1051 Page 7
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`
`References
`Engel, Baker, and Graham-
`Cumming
`Engel, Baker, Graham-Cumming,
`and Phelps
`
`Basis
`§ 103(a)
`
`Challenged Claims
`1–5, 9, and 10
`
`§ 103(a)
`
`6–8
`
`
`Pet. 1–2. Petitioner also relies on the declaration of Bill Lin, Ph.D. (Ex.
`1006) for support. Id. at 2.
`
`II. ANALYSIS
`A. Claim Construction
`In an inter partes review, claim terms in an unexpired patent are given
`their “broadest reasonable construction in light of the specification of the
`patent in which they appear.” 37 C.F.R. § 42.100(b). Under the broadest
`reasonable construction standard, claim terms are given their ordinary and
`customary meaning, as would be understood by one of ordinary skill in the
`art in the context of the entire disclosure. In re Translogic Tech., Inc., 504
`F.3d 1249, 1257 (Fed. Cir. 2007). Only terms in controversy need to be
`construed, and only to the extent necessary to resolve the controversy. Vivid
`Techs., Inc. v. Am. Sci. & Eng’g, Inc., 200 F.3d 795, 803 (Fed. Cir. 1999).
`Petitioner provides proposed constructions of the claim terms
`“conversational flow,” “state of the flow,” and “state operations” (in claims
`1–10). Pet. 2–8. Patent Owner provides proposed constructions of the same
`claim terms. Prelim. Resp. 22–29. Other than the term “conversational
`flow,” discussed below, we determine that no claim term requires express
`construction to resolve the issues before us.
`
`Petitioner contends that the broadest reasonable interpretation of the
`term “conversational flow,” in view of the intrinsic record, is “the sequence
`
`8
`
`NOAC Ex. 1051 Page 8
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`of packets that are exchanged in any direction as a result of an activity,”
`where a “conversational flow” is distinguished from a “connection flow” in
`that some of the conversational flows “involve more than one connection” or
`“involve more than one exchange of packets between a client and server.”
`Pet. 3–4 (citing Ex. 1003, 2:34–45). Petitioner acknowledges that the
`claimed systems and methods “require more than identifying and classifying
`‘only connection flows,’ as repeatedly stated throughout the intrinsic
`record.” Id. at 3 (emphasis added).
`
`Patent Owner contends the term “conversational flow” is expressly
`defined in the ’099 patent as
`the sequence of packets that are exchanged in any direction as a
`result of an activity—for instance, the running of an application
`on a server as requested by a client—and where some
`conversational flows involve more than one connection, and
`some even involve more than one exchange of packets between
`a client and server.
`
`Prelim. Resp. 11–12 (citing Ex. 1003, 2:34–45), 24 (citing Ex. 2001 ¶¶ 26–
`31).
`Patent Owner notes one aspect that “distinguishes this invention from
`
`prior art network monitors is that it has the ability to recognize disjointed
`flows as belonging to the same conversational flow.” Id. at 12 (citing Ex.
`1003, 3:48–51). According to Patent Owner, conversational flows are
`established, in part, by the invention’s “capabil[ity] of examining up to
`whatever level is sufficient to uniquely identify to a required level, even all
`of the way to the application level (in the [Open Systems Interconnection
`(OSI)] model).” Id. at 12; Ex. 1003, 4:13–16.
`
`9
`
`NOAC Ex. 1051 Page 9
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`In the first place, we observe that both parties agree that
`
`“conversational flow” is defined as “the sequence of packets that are
`exchanged in any direction as a result of an activity” and that
`“conversational flow” is distinguished from the prior art “connection flow”
`in that some conversational flows “involve more than one connection, and
`some even involve more than one exchange of packets between a client and
`server.” Furthermore, we observe that the specification of the ’099 patent
`explicitly supports this construction. See Ex. 1003, 2:34–45. Accordingly,
`for purposes of this Decision, we agree that Patent Owner’s proposed
`construction, which mirrors the definition in the specification, is the broadest
`reasonable construction consistent with the specification. Therefore, we
`interpret “conversational flow” to mean the sequence of packets that are
`exchanged in any direction as a result of an activity (for instance, the
`running of an application on a server as requested by a client), where some
`conversational flows involve more than one connection, and some even
`involve more than one exchange of packets between a client and server.1
`
`B. Asserted Obviousness Over Engel, Baker and Graham-Cumming:
`Claims 1–5, 9, and 10
`1. Engel (Ex. 1007)
`Engel is directed to monitoring communications “in a network of
`nodes, each communication being effected by a transmission of one or more
`packets among two or more communicating nodes, and each communication
`complying with a predefined communication protocol selected from among
`
`
`1 We also agree with the parties that “conversational-flow sequence” in the
`claims is used interchangeably with “conversational flow,” and means the
`same. See Pet. 3; Prelim. Resp. 22–24.
`
`10
`
`NOAC Ex. 1051 Page 10
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`protocols available in the network.” Ex. 1007, Abstract. “The contents of
`packets are detected passively and in real time, [and] communication
`information associated with multiple protocols is derived from the packet
`contents.” Id. Such communication information “is associated with
`multiple layers of at least one of the protocols.” Id. at 2:27–30. Network
`monitor 10 captures and analyzes all packets in a segment and extracts all
`items of interest from the frames. Id. at 6:58–61. A Real Time Parser (RTP)
`performs protocol parsing with appropriate parsing routines. Id. at 19:53–
`67, 21:15–30.
`Figure 4 of Engel is reproduced below.
`
`
`Figure 4 “illustrates the different layers of a communication between
`two nodes.” Id. at 4:45–46. In Figure 4, “Nodes A and B are exchanging
`packets and are engaged in multiple dialogs.” Id. at 9:31–33. A dialog is a
`communication at any layer between a sender and a receiver, which is
`composed of one or more packets being transmitted between them and often
`involves exchanges in both directions. Id. at 9:19–27. Layer 1 in Node A
`has a dialog with Layer 1 in Node B. Id. at 9:33–34. This is a data link
`layer and the nature of the dialog deals with the message length, number of
`
`11
`
`NOAC Ex. 1051 Page 11
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`messages, errors, and the guarantee of the delivery. Id. at 9:34–37.
`Simultaneously, Layer n of Node A is having a dialog with Layer n of node
`B. Id. at 9:37–39. This is an application layer dialog, which deals with
`virtual terminal connections and response rates. Id. at 9:39–41. All of the
`other layers (2 through n-1) are also having simultaneous dialogs. Id. at
`9:41–43.
`
`A dialog record is kept which contains the addresses of both ends of
`the dialog concatenated together to form a single address wherein the first
`and second addresses within the single address are designated as nodes 1
`and 2, respectively. Id. at 18:63–19:2.
`2. Baker (Ex. 1012)
`Figure 1 of Baker is reproduced below.
`
`
`
`
`Figure 1 shows database of protocol description files 22 used by
`
`network device control logic 16 to retrieve network frames based on
`extracted field values and filtering criteria contained in protocol description
`files 22. Ex. 1012, 5:56–67.
`
`12
`
`NOAC Ex. 1051 Page 12
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`Baker’s protocol description file includes a protocol control record
`
`that defines the overall structure of a network protocol and references other
`information relating to the network protocol. Id. at 7:9–15. Each protocol
`description file includes a total bit length of the protocol header, a number of
`fields required to describe the header, and field records, each describing a
`protocol header field, including a byte offset from the start of the protocol
`header and, if appropriate, an associated lookup structure for determining the
`next protocol control record to use. Id. at 7:9–12:3, Tables 1 and 2.
`
`Upon initialization of the system, the protocol and associated control
`record information is extracted from all protocol description files and a
`“ProtocolList” is constructed. Id. at 12:7–15. The ProtocolList is a sorted
`vector of all protocol records. Id. Each protocol description control record
`and all associated records are shown in Tables 1–11 as they appear when
`resident in memory. Id. at 11:18–25.
`3. Graham-Cumming (Ex. 1010)
`Figure 3 of Graham-Cumming is reproduced below.
`
`
`
`13
`
`NOAC Ex. 1051 Page 13
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`
`
`Figure 3 shows a functional model of identifying applications and
`
`network protocols from raw packet data. Ex. 1010, 5:14–16. Figure 3
`includes packet analysis module 100, application identifier module 102, and
`application-port mapping table 104. Id. at 5:16–19. “[A]pplication-port
`mapping table 104 stores associations between application identifiers and
`port numbers.” Id. at 5:23–24. “[A]pplication identifier module 102
`attempts to match portions of the packet data, including the payload or
`header, with defined patterns or attributes for each of a plurality of different
`applications.” Id. at 6:22–25. “Each application may have one or more such
`sequences which uniquely identifies it.” Id. at 6:29–31.
`4. Level of Ordinary Skill in the Art
`Section 103(a) forbids issuance of a patent when “the differences
`between the subject matter sought to be patented and the prior art
`are such that the subject matter as a whole would have been
`obvious at the time the invention was made to a person having
`ordinary skill in the art to which said subject matter pertains.”
`KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 406 (2007) (quoting 35 U.S.C.
`
`14
`
`NOAC Ex. 1051 Page 14
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`§ 103(a)). Petitioner argues that a person of ordinary skill in the art at the
`time of the ’099 patent would have had
`at least a bachelor’s degree, or equivalent, in electrical
`engineering, computer engineering, computer science, or a
`related field or an equivalent number of years of working
`experience, and one to two years of experience in networking
`environments, including at least some experience with network
`traffic monitors, analyzers, and/or firewalls or other intrusion
`detection systems.
`Pet. 2 (citing Ex. 1006 ¶¶ 20–22). Patent Owner argues that a person of
`ordinary skill in the art would have had “the equivalent of a four-year degree
`from an accredited institution (usually denoted as a B.S. degree) in computer
`science, computer engineering or the equivalent and experience with, or
`exposure to, packet analysis techniques,” as well as “approximately 1–2
`years of professional experience with packet network communication
`protocols.” Prelim. Resp. 22 (citing Ex. 2001 ¶ 24). The parties’ proposed
`definitions are very similar. For example, experience with “network traffic
`monitors [and] analyzers” in “networking environments” (Petitioner’s
`proposed definition) likely would include experience with “packet network
`communication protocols” and “packet analysis techniques” (Patent Owner’s
`proposed definition). Based on this record, including our review of the
`’099 patent and the types of problems and solutions described in the
`’099 patent and cited prior art, we conclude that a person of ordinary skill in
`the art would have had a bachelor’s degree in electrical engineering,
`computer engineering, computer science, or a related field (or its
`equivalent), and one to two years of experience working in networking
`environments, including at least some experience with network traffic
`
`15
`
`NOAC Ex. 1051 Page 15
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`monitors and/or analyzers.2 We apply this level of ordinary skill in the art
`for purposes of this Decision.
`5. Analysis of Claim 1
`Petitioner relies on Engel as allegedly teaching the majority of the
`limitations of independent claim 1, and relies on Baker and Graham-
`Cumming for certain limitations. Pet. 11–52. Claim 1 requires, inter alia, a
`“parser subsystem configured to examine the packet accepted by the buffer,
`extract selected portions of the accepted packet, and form a function of the
`selected portions sufficient to identify that the accepted packet is part of a
`conversational flow-sequence,” “the carrying out of the state operations
`furthering the process of identifying which application program is
`associated with the conversational flow-sequence of the packet,” and
`“a memory storing a flow-entry database including a plurality of
`flow-entries for conversational flows encountered by the monitor” (emphasis
`added).
`Petitioner argues that two different aspects of Engel constitute
`“conversational flows”: “Application Level Dialogs” and
`“Application-Specific Server Statistics.” Pet. 18–19. At the outset, we note
`that Petitioner’s arguments are premised on its position that related
`U.S. Patent No. 6,839,751 B1 (Ex. 1002, “the ’751 patent”) “provides
`conversational flow examples where flows are determined and metrics
`reported ‘for a given application and either a specific Client-Server Pair or a
`
`
`2 We do not include in the definition experience with “firewalls or other
`intrusion detection systems,” as Petitioner proposes, because the relevant art
`is network monitoring and analysis. See, e.g., Ex. 1003, 1:40–43.
`
`
`16
`
`NOAC Ex. 1051 Page 16
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`specific Server and all of its clients.’”3 Pet. 18 (quoting Ex. 1002, 34:58–
`60). As Patent Owner points out, however, the cited portion of the
`’751 patent relates to tracking various statistics and does not mention
`conversational flows. See Prelim. Resp. 46–47; see Ex. 1002, 31:52–49:60
`(describing “how the monitor of the invention can be used to monitor the
`Quality of Service (QOS) by providing QOS Metrics”). The specific
`language quoted by Petitioner pertains to one such metric, “CSTraffic,”
`which “contains information about the volume of traffic measured for a
`given application and either a specific Client-Server Pair or a specific Server
`and all of its clients.” Ex. 1002, 34:55–60. However, we do not see how
`this language supports Petitioner’s position. Monitoring statistics is not the
`same as monitoring a conversational flow, which necessarily identifies a
`“sequence of packets,” under our interpretation. See supra Section II.A. In
`other words, tracking statistics for a given application between a particular
`client and server, or between a particular server and all of its clients, is not
`sufficient in and of itself; a conversational flow identifies a sequence of
`packets exchanged between two nodes as a result of specific activity (e.g., a
`“sequence of packets that are exchanged in any direction as a result of an
`activity”).
`We now turn to Petitioner’s two arguments as to how Engel allegedly
`
`
`3 The ’099 patent states that the application that issued as the ’751 patent is
`incorporated by reference. Ex. 1003, 1:21–27. Also, the ’099 and ’751
`patents were filed on the same date (June 30, 2000) and both claim the
`benefit of U.S. Provisional Patent Application No. 60/141,903. The ’099
`and ’751 patents have some of the same disclosure in their written
`descriptions.
`
`
`17
`
`NOAC Ex. 1051 Page 17
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`teaches conversational flows. First, Petitioner contends that Engel teaches
`“Application Level Dialogs.” Pet. 19–22. Petitioner argues that Engel
`“considers the nature of the communication (e.g., the application program
`being invoked) in addition to the Client-Server Pair involved in the
`communication in identifying an application level dialog, rendering such
`dialog a conversational flow within the meaning of the ‘099 Patent.” Id. at
`19 (citing Ex. 1007, 9:27–10:3). Petitioner relies on Engel’s definition of
`“dialog” as “the exchange of messages and the associated meaning and state
`that is inherent in any particular exchange at any layer.” Id. at 19–20 (citing
`Ex. 1007, 9:25–27). According to Petitioner, Engel discloses “creating and
`maintaining dialogs” and associated statistics at different layers. Id. at 20
`(citing Ex. 1007, 9:27–10:3). In particular, Petitioner asserts that the dialog
`at the application level “is an exchange of one or more packets in any
`direction between two nodes as a result of an activity (e.g., [a Network File
`System (NFS)] mount request).” Id. (citing Ex. 1007, 9:58–10:3). Petitioner
`concludes that tracking an application-level dialog constitutes tracking a
`conversational flow. Id.
`
`Petitioner further relies on Dr. Lin’s testimony to assert that, to the
`extent that conversational flows require the tracking of multiple connections,
`“Engel’s application level lookup_dialog routines search for existing dialogs
`based on application and the client-server IP address pair of the
`communication.” Pet. 21 (citing Ex. 1006 ¶ 89). Petitioner further
`contends, based on Dr. Lin’s testimony, that “Engel’s deallocation routines
`deallocate dialog records when the period of inactivity for a dialog address
`pair (measured from the last time an application-specific packet (e.g., NFS)
`between the IP address pair of the dialog was seen) has exceeded a defined
`
`18
`
`NOAC Ex. 1051 Page 18
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`application-specific threshold.” Id. (citing Ex. 1007, 17:2–16; Ex. 1006
`¶¶ 109–110).
`Patent Owner responds that Engel’s dialogs are different from
`conversational flows because they are merely “collections of statistics for
`each OSI layer across packets (regardless of application origin)” and do not
`relate packets that are the result of an application activity. Prelim. Resp. 45–
`46 (citing Ex. 1007, 4:23–32; Ex. 2001 ¶¶ 78–79). For example, noting
`Petitioner’s statement that “[e]ach application level dialog tracks all
`application activity between the client-server pair occurring on any
`connections until the dialog data structures are deallocated for reuse,” Patent
`Owner contends that relating all application activity between a client and
`server is insufficient because a conversational flow requires relating flows
`for specific application activities. Id. at 49–50 (citing Ex. 2001 ¶¶ 80–81).
`We agree with Patent Owner.
`Engel explains that a “dialog” is
`a concept which provides a useful way of conceptualizing,
`organizing and displaying information about the performance of
`a network—for any protocol and for any layer of the multi-level
`protocol stack.
`As noted above, the basic unit of information in
`communication is a packet. A packet conveys meaning between
`the sender and the receiver and is part of a larger framework of
`packet exchanges. The larger exchange is called a dialog within
`the context of this document.
` That is, a dialog is a
`communication between a sender and a receiver, which is
`composed of one or more packets being transmitted between the
`two. There can be multiple senders and receivers which can
`change roles. In fact, most dialogs involve exchanges in both
`directions.
`Stated another way, a dialog is the exchange of messages
`and the associated meaning and state that is inherent in any
`
`19
`
`NOAC Ex. 1051 Page 19
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`
`particular exchange at any layer. It refers to the exchange
`between the peer entities (hardware or software) in any
`communication. In those situations where there is a layering of
`protocols, any particular message exchange could be viewed as
`belonging to multiple dialogs. For example, in FIG. 4 Nodes A
`and B are exchanging packets and are engaged in multiple
`dialogs. Layer 1 in Node A has a dialog with Layer 1 in Node
`B. For this example, one could state that this is the data link layer
`and the nature of the dialog deals with the message length,
`number of messages, errors and perhaps the guarantee of the
`delivery. Simultaneously, Layer n of Node A is having a dialog
`with Layer n of node B. For the sake of the example, one could
`state that this is an application layer dialog which deals with
`virtual terminal connections and response rates. One can also
`assume that all of the other layers (2 through n-1) are also having
`simultaneous dialogs.
`Ex. 1007, 9:9–43 (emphases added).
`As shown in Figure 4 (reproduced supra Section II.B.1), Nodes A and
`
`B engage in a dialog at each layer (e.g., the application layer). Thus, Engel
`monitors communications exchanged between the nodes at a particular layer,
`and tracks statistics for all communications at that layer (to assist in
`diagnosing network problems and improving network performance). See,
`e.g., id. at 4:24–32 (Engel “organizes and presents network performance
`statistics in terms of dialogs which are occurring at any desired level of the
`communication”). Petitioner, however, does not point to any disclosure in
`Engel indicating that its disclosed system relates information from one
`packet to another as pertaining to a specific application activity. In other
`words, in Engel there is exchange of packets in the application layer
`constituting a dialog (see, e.g., id. at 9:39–43) and collection of respective
`statistics for that dialog (see, e.g., id. at 4:24–32). However, even if
`application activity causes the dialog to be created, Petitioner does not direct
`
`20
`
`NOAC Ex. 1051 Page 20
`
`

`

`IPR2017-00769
`Patent 6,651,099 B1
`
`us to teachings or disclosure of identifying a sequence of packets as being
`part of a specific application activity. Moreover, Patent Owner notes that in
`Engel “[k]eeping statistics for protocol layers may be temporarily suspended
`when parsing and statistics gathering

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket