`Filed: September 15, 2017
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`___________________
`
`SANDVINE CORPORATION and SANDVINE INCORPORATED ULC,
`
`PETITIONERS,
`
`V.
`
`PACKET INTELLIGENCE, LLC,
`
`PATENT OWNER.
`
`___________________
`
`Case No. IPR2017-00769
`U.S. Patent No. 6,651,099
`___________________
`
`PATENT OWNER’S OPPOSITION TO PETITIONERS’
`REQUEST FOR REHEARING UNDER 37 C.F.R. § 42.71(D)
`
`EX 1049 Page 1
`
`
`
`TABLE OF CONTENTS
`
`III.
`
`I.
`II.
`
`INTRODUCTION ........................................................................................... 1
`THE BOARD DID NOT OVERLOOK OR MISAPPREHEND THE
`ARGUMENTS IN THE PETITION ............................................................... 1
`Hash Table Arguments Were Not Raised In The Petition ............................. 1
`The Board Did Not Ignore Key Evidence ...................................................... 3
`PETITIONERS’ NEW ARGUMENTS DO NOT ESTABLISH THAT
`ENGEL DISCLOSES “CONVERSATIONAL FLOWS” .............................. 7
`The Operation Of Engel ................................................................................. 7
`Application Level Dialogs And Hash Tables ................................................. 9
`1. Petitioners Conflate Protocol And Application ............................................ 9
`2. Hash Tables Are Not Conversational Flows ............................................... 10
`3. New Evidence Not Included In the Petition ............................................... 13
`Application-Specific Server Statistics .......................................................... 13
`IV. CONCLUSION ..............................................................................................15
`
`i
`
`EX 1049 Page 2
`
`
`
`
`
`Cases
`
`TABLE OF AUTHORITIES
`
`2Wire, Inc. v. TQ Delta LLC,
`IPR2015-00247, paper 19 (PTAB May 29, 2015) ................................................. 5
`Apple, Inc. v. ContentGuard Holdings, Inc.,
`IPR2015-00357, Paper 9 (PTAB June 29, 2015) ................................................... 5
`C.R. Bard, Inc. v. Medical Components, Inc.,
`IPR2015-01660, Paper 11 (PTAB Sept. 22, 2016) ................................... 6, 13, 15
`Cisco Sys. Inc. v. C-Cation Techs., LLC,
`IPR2014-00454, Pap. 12 (Aug. 29, 2014) ............................................................. 6
`Ericsson Inc. et al. v. Intellectual Ventures II LLC,
`IPR2015-01872, Paper 15 (PTAB April 19, 2016) ............................................... 3
`Fidelity Nat’l Info. Servs., Inc. v. Data Treasury Corp.,
`Case IPR2014-00489, Paper 9 (PTAB Aug. 13, 2014) ................................ 13, 15
`Limelight Networks, Inc. v. Akamai Technologies, Inc.,
`IPR2017-00349, Paper 7 (PTAB May 30, 2017) ................................................... 6
`Sophos Ltd. et al. v. Fortinet, Inc.,
`IPR2015-00910, Paper 10 (PTAB Oct. 26, 2015) ................................................. 2
`Telit Wireless Solutions Inc. et al. v. M2M Solutions LLC,
`IPR2016-00055, Paper 13 (PTAB May 24, 2016) ................................................. 3
`Regulations
`
`37 C.F.R. § 42.6(a)(3) ................................................................................................ 5
`
`
`
`
`
`
`
`
`ii
`
`EX 1049 Page 3
`
`
`
`
`
`
`
`
`
`GLOSSARY OF TERMS
`
`Term
`
`Definition
`
`“Decision”
`
`“Patent Owner”
`
`“Petitioners”
`
`“Petition” or “Pet.”
`
`“Response”
`
`“Request”
`
`Decision Denying Institution of Inter
`Partes Review, 37 C.F.R. §42.108
`dated July 26, 2017. (Paper 8)
`
`Packet Intelligence, LLC
`
`Sandvine Corporation and Sandvine
`Incorporated ULC
`
`Petition for Inter Partes Review of
`Claims 1-10 of U.S. Patent No.
`6,651,099 dated January 25, 2017
`(Paper 2)
`
`Patent Owner’s Preliminary Response
`dated April 28, 2017 (Paper 6)
`
`Request for Rehearing dated August
`25, 2017 (Paper 9)
`
`
`iii
`
`EX 1049 Page 4
`
`
`
`
`
`I.
`
`INTRODUCTION
`
`Petitioners’ Request for Rehearing should be denied. The Board’s Decision
`
`denying institution of inter partes review did not “overlook” or “misapprehend”
`
`arguments as Petitioner argues. To the contrary, the Decision correctly understood
`
`the arguments presented in the Petition. The Petition and the Rehearing Request fails
`
`to show that Engel discloses conversational flow as construed by the Board.
`
`Petitioners’ Request is nothing more than an attempt to use the Board’s Decision as
`
`a roadmap to develop and present new arguments not articulated in the Petition. As
`
`the Board has recognized in other cases, a request for rehearing is not an opportunity
`
`for a party to re-argue its case. Nor is a rehearing request an opportunity to
`
`supplement the record and to raise issues for the first time. Petitioners’ Request
`
`violates all of these principles, fails to show an abuse of discretion by the Board, and
`
`must be denied. Furthermore, even if the Board considers Petitioners’ new
`
`arguments, they do not address the deficiencies identified in the Decision and Patent
`
`Owner’s Preliminary Response.
`
`II. THE BOARD DID NOT OVERLOOK OR MISAPPREHEND THE
`ARGUMENTS IN THE PETITION
` Hash Table Arguments Were Not Raised In The Petition
`The primary focus of Patent Owner’s Response was that Engel does not
`
`disclose “conversational flow.” Petitioners’ Request argues that the Board allegedly
`
`misapprehended or overlooked arguments regarding an “application hash table” in
`
`
`
`1
`
`EX 1049 Page 5
`
`
`
`
`
`connection with (1) Application Level Dialogs and (2) Application-Specific Server
`
`Statistics. Specifically, Petitioners claim “each Application Level Dialog and
`
`Application-Specific Server Statistics records in Engel is part of an application-
`
`specific hash table that only includes dialog or server records for a particular
`
`identified application. These application-specific hash tables are used by
`
`application-specific lookup routines based on an identification of the packet’s
`
`application activity.” Request at 4.
`
`In connection with its arguing about “conversational flow,” the Petition
`
`discusses Application Level Dialogs on pages 19-22. However, the only reference
`
`to “hash table” is on page 20 where the term is part of a function name. Pet. at 20.
`
`Likewise, Application-Specific Server Statistics are discussed on pages 23-25 of the
`
`Petition. Once again, there is only one reference to “hash table” in a function name
`
`on page 25. In seven pages of briefing, there are only two passing references to “hash
`
`table” without any significant argument or discussion.
`
`The Board did not misapprehend or overlook anything because there was
`
`nothing to overlook or misapprehend. A hash table argument could have been raised
`
`and developed in the Petition, but was not. The Board consistently rejects attempts
`
`to introduce new arguments in rehearing requests that were not raised or developed
`
`in the petition. See Sophos Ltd. et al. v. Fortinet, Inc., IPR2015-00910, Paper 10 at
`
`4-5 (PTAB Oct. 26, 2015) (“A request for rehearing is not an opportunity to present
`
`
`
`2
`
`EX 1049 Page 6
`
`
`
`
`
`new arguments or evidence that could have been presented and developed in the
`
`Petition…we could not have overlooked or misapprehended arguments or evidence
`
`not presented and developed by [Petitioner] in the Petition.”); Telit Wireless
`
`Solutions Inc. et al. v. M2M Solutions LLC, IPR2016-00055, Paper 13 at 3, 5 (PTAB
`
`May 24, 2016) (“A request for rehearing is not an opportunity for a party to add new
`
`arguments, or bolster prior arguments that were found unpersuasive.”…“Petitioner
`
`attempts, belatedly, to provide explanation we found lacking in the original
`
`Petition.”); Ericsson Inc. et al. v. Intellectual Ventures II LLC, IPR2015-01872,
`
`Paper 15 at 4 (PTAB April 19, 2016) (“This argument was not presented in the
`
`Petition. A request for rehearing is not an opportunity for a party to introduce new
`
`argument, bolster insufficient argument, or mend gaps in the evidence relied on in
`
`the Petition.”).
`
`
`
`The Board Did Not Ignore Key Evidence
`
`Petitioners fault the Board for not sufficiently crediting Dr. Lin’s declaration
`
`or considering the Source Code Appendix VI (“Appendix VI”). Petitioners are
`
`wrong on both counts.
`
`Starting with Dr. Lin’s declaration, the Decision acknowledges that the Board
`
`read Dr. Lin’s explanation of how Engel’s disclosed system works and specifically
`
`identified paragraphs 51-157, which encompass all of the citations to the Lin
`
`Declaration (Ex. 1006) identified in the Request that Petitioners claim the Board
`
`
`
`3
`
`EX 1049 Page 7
`
`
`
`
`
`overlooked. See Decision at 23, fn. 4. Dr. Lin’s declaration provides his explanation
`
`of the operation of Appendix VI. Id. (citing Ex. 1006 at ¶51). The Board also
`
`observed that Dr. Lin offers no opinions that the Engel’s system (including
`
`Appendix VI) discloses “conversational flows.” Id. Thus, there can be no doubt that
`
`that the Board considered the Lin Declaration.
`
`As for Appendix VI, Petitioners complain that the Board did “not
`
`meaningfully discuss this key evidence” and that the Decision “emphasized only the
`
`limited disclosures of the Engel patent itself.” Request at 11. There is no need to
`
`separately address Appendix VI (or the Lin Declaration) for several reasons.
`
`First, as noted above, the Board considered Dr. Lin’s declaration, which
`
`provides an explaination of the operation of Appendix VI. See Decision at 23, fn. 4.
`
`Thus, the Lin declaration serves as a proxy for the source code in Appendix VI.
`
`Second, the Engel patent explains that Appendix VI implements an
`
`embodiment disclosed in Engel. See Ex. 1007 at 43:25-26 (“Appendix VI contains
`
`microfiche of the source code for an embodiment of the invention.”); 6:1-4
`
`(“Appendix VI is a microfiche appendix presenting source code for the real time
`
`parser, the statistics data structures and the statistics modules.”). Even the Petitioners
`
`acknowledge, “the Engel patent itself is consistent with the source code.”1 Request
`
`
`1 Petitioners’ protests regarding Dr. Almeroth not providing an overview of the
`
`
`
`4
`
`EX 1049 Page 8
`
`
`
`
`
`at 9. Since Appendix VI is merely a source code rendering of the disclosures made
`
`in the patent, there is no need for the Board to separately call out and cite to source
`
`code in its Decision.
`
`Third, while the Petition does reference Appendix VI, such references are
`
`often string citations where Petitioners point to where a single idea is allegedly found
`
`in (1) the Engel patent, (2) the Lin Declaration, and (3) Appendix VI. See, for
`
`example, Pet. at 19-25. In those instances, there is no need for the Board to comment
`
`on the each source of the concept. Other times the Petition includes source code
`
`images but provides little, if any, explanation about the significance of the snippet,
`
`what it meant to convey, or how it is relevant. In those instances, the Petitioners
`
`failed to develop and articulate arguments in the Petition itself, which is a violation
`
`of the Board’s rules. See 37 C.F.R. § 42.6(a)(3); 2Wire, Inc. v. TQ Delta LLC,
`
`IPR2015-00247, paper 19 at 13 (PTAB May 29, 2015) (“we do not consider
`
`information presented in the Declaration but not discussed sufficiently in the
`
`Petition.”); Apple, Inc. v. ContentGuard Holdings, Inc., IPR2015-00357, Paper 9 at
`
`10 (PTAB June 29, 2015) (“Board rules also prohibit incorporation by reference,
`
`
`Appendix VI are undercut by Engel’s admission that Appendix VI is an
`
`implementation of an embodiment of the specification, as well as Petitioners’
`
`acknowledgement that the patent is consistent with the source code.
`
`
`
`5
`
`EX 1049 Page 9
`
`
`
`
`
`such as incorporating over 100 paragraphs of a declaration into a petition.”);
`
`Limelight Networks, Inc. v. Akamai Technologies, Inc., IPR2017-00349, Paper 7 at
`
`11 (PTAB May 30, 2017) (“We agree that the Petition improperly incorporates
`
`Exhibit [] because it includes arguments made only in a supporting document.”).
`
`Appendix VI is approximately 630 pages of source code, and the Lin
`
`Declaration is almost 110 pages (158 paragraphs). Petitioners bear the burden of
`
`articulating their arguments in the Petition itself, as opposed to requiring the Board
`
`to scour the record on behalf of Petitioners. See Cisco Sys. Inc. v. C-Cation Techs.,
`
`LLC, IPR2014-00454, Pap. 12 at 9 (Aug. 29, 2014) (“Further, the Petition includes
`
`citations to the Declaration to support conclusory statements for which the Petition
`
`does not otherwise provide an argument or explanation….This practice of citing the
`
`Declaration to support conclusory statements that are not otherwise supported in the
`
`Petition also amounts to incorporation by reference.”); 10 (“‘A brief must make all
`
`arguments accessible to the judges, rather than ask them to play archeologist with
`
`the record’ Accordingly, we do not consider arguments not made in the Petition.”);
`
`C.R. Bard, Inc. v. Medical Components, Inc., IPR2015-01660, Paper 11 at 8 (PTAB
`
`Sept. 22, 2016) (“Arguments and information that are not presented and developed
`
`in the Petition, and instead are incorporated by reference to Mr. Tallarida’s
`
`declaration, are not entitled to consideration.”). Petitioners made deliberate decisions
`
`about what arguments and evidence to present in the Petition and must live with the
`
`
`
`6
`
`EX 1049 Page 10
`
`
`
`
`
`consequences of those decisions.
`
`III. PETITIONERS’ NEW ARGUMENTS DO NOT ESTABLISH THAT
`ENGEL DISCLOSES “CONVERSATIONAL FLOWS”
`
`The Board construed “conversational flow” consistent with the disclosure in
`
`the specification as “the sequence of packets that are exchanged in any direction as
`
`a result of an activity (for instance, the running of an application on a server as
`
`requested by a client), where some conversational flows involve more than one
`
`connection, and some even involve more than one exchange of packets between a
`
`client and server.” Decision at 9. The Request suggests that application hash tables
`
`disclose conversational flows. However, Petitioners do not attempt to show how
`
`their new theory satisfies the Board’s construction. Indeed, the term “conversational
`
`flow” barely appears in the Request and when it does, it is usually in a quote from
`
`the Decision, rather than any analysis.
`
` The Operation Of Engel
`
`As a reminder, Engel is fundamentally concerned with tracking statistical
`
`information to assist searching for actual or potential network problems. Decision at
`
`17. The Petition explains that Engel discloses dialogs, which are “[the exchange of]
`
`messages and the associated meaning and state that is inherent in any particular
`
`exchange at any layer.” Pet. at 20 (citing Ex. 1007 at 9:24-27) (emphasis added).
`
`The Petition goes on to state “Engel specifically discloses creating and maintaining
`
`dialogs describing the data link layer, network layer, transport layer, and application
`
`
`
`7
`
`EX 1049 Page 11
`
`
`
`
`
`layer protocols utilized in a given message exchange, each dialog storing statistical
`
`information regarding the nature of the communication at the associated protocol
`
`layer.” Pet. at 20.
`
`The Board examined Engel, especially its disclosure of “dialog” which
`
`discloses that at each OSI level, there is an exchange of messages and the associated
`
`meaning and state that is inherent in any particular exchange at any layer and each
`
`message is viewed as belonging to multiple dialogs. Decision at 19-20 (citing Ex.
`
`1007 at 9:9-43). The Board recognized that “Engel monitors communications
`
`exchanged between the nodes at a particular layer, and tracks statistics for all
`
`communications at that layer (to assist in diagnosing network problems and
`
`improving network performance).” Decision at 20.
`
`Engel essentially puts all of the information related to a given OSI layer into
`
`a bucket for each layer. Therefore, all Layer 7 data is in one bucket, all Layer 4 data
`
`is one bucket, etc. See Response at 50 (“Engel would bucket the information from
`
`each stream per OSI layer…”); 40 (citing Ex. 1007 at 11:32-34 (“Which layers are
`
`to have statistics stored for them is determined by a parse control record that is stored
`
`in STATS.”)); see also Decision at 21 (image representing Engel’s dialogs v.
`
`conversational flows). The Request does not dispute the fundamental operation of
`
`Engel. The Request’s argument is based on an “application-specific hash table that
`
`only includes dialog or server records for a particular identified application.”
`
`
`
`8
`
`EX 1049 Page 12
`
`
`
`
`
`Request at 4. But, as explained below, the Request fails to establish – nor can it –
`
`that Engel discloses a conversational flow, especially in light of Engel’s explanation
`
`that dialogs are separate. Ex. 1007 at 9:58-60; Response at 33.
`
` Application Level Dialogs And Hash Tables
`
`The Decision notes that Petitioners’ argument is “conversational flows exist
`
`in Engel simply because communications exist at the application layer and because
`
`those communications result from some application activity.” Decision at 22. The
`
`Board noted that Engel does not disclose, nor does the Board point to anything
`
`indicating Engel links communications by application (as opposed to by layer and
`
`client-server pair). Decision at 22 (emphasis added).
`
`1.
`
`Petitioners Conflate Protocol And Application
`
`It is important to note that Petitioners appear to conflate the terms
`
`“application” and “protocol” in the Request. A “protocol” is an established rule for
`
`formatting data. See Response at 4. An “application” is a software program that runs
`
`on a computer, for example, a web browser, word processor, Skype, etc. See also
`
`Ex. 1006 at ¶37 (the “application layer is concerned with the application itself.
`
`Examples of application layer protocols include HTTP (for web browsing), SMTP
`
`(for emails), and FTP (for file transfers).”). There can be, and generally are, multiple
`
`software programs that utilize a given protocol.
`
`The Decision was based on Petitioners’ failure “[to] point to any disclosure in
`
`
`
`9
`
`EX 1049 Page 13
`
`
`
`
`
`Engel indicating that its disclosed system relates information from one packet to
`
`another as pertaining to a specific application activity.” Decision at 20. Based on
`
`that criticism, the strategy for the Request was to use the word “application” as much
`
`as possible. However, while that may provide some superficial appeal, it is important
`
`to keep in mind that protocol, application (as used in the OSI model) and application
`
`(a software program) are distinct concepts that are not interchangeable.
`
`2. Hash Tables Are Not Conversational Flows
`
`Petitioners’ rehearing argument is that Application Level Dialogs (and
`
`Application-Specific Server Statistics) records in Engel are part of “an “application-
`
`specific hash table that only includes dialog or server records for a particular
`
`identified application.” Request at 4. Petitioners contend that Engel discloses data
`
`structures in the form of hash tables that are populated with data for only one
`
`protocol type (for example, NFS or FTP). Petitioners consistently refer to these as
`
`“application-specific hash tables.” However, that name is not accurate. Rather, the
`
`tables are populated by protocol-specific information. The term “application”
`
`appears to come from the common name for OSI Layer 7 (the “application” layer).
`
`Indeed, the Request repeatedly states that Engel supports protocols such as FTP,
`
`SMTP, and Telnet. See Request at 6; see also Ex. 1007 at 8:1-20 (identifying various
`
`protocols).
`
`Petitioners argue that such tables “include[] only dialog records for the
`
`
`
`10
`
`EX 1049 Page 14
`
`
`
`
`
`specific” protocol. That would mean that Engel would keep FTP records in one table,
`
`NSF protocol records in another table, Telnet records in another table, TCP records
`
`in a further table, etc. Nevertheless, this still does not rise to the level of identifying
`
`a conversational flow. For example, assume User A requests uses FTP Program 1 to
`
`requests a File X from Server S. That will be one entry in the table. If User A
`
`requests the same file ten times from the same server throughout the day, there will
`
`be ten records in the table. Petitioners provide no explanation of how Engel would
`
`distinguish between
`
`the
`
`ten separate
`
`instances. The Request cites
`
`to a
`
`stats_lookup_dialog that can be used to find a dialog between two IP addresses.
`
`Request at 7. However, using the prior example, the routine would return ten results
`
`with no way to distinguish between them.
`
`Further, consider if User A uses FTP Program 1 to get a file from Server S
`
`and then uses FTP Program 2 to get a file from Server S. In this hypothetical there
`
`are two distinct software programs both retrieving the same file, from the same
`
`server, using the same protocol. There would be two entries in the Petitioners’ hash
`
`table. The Request does not indicate how these distinct instances would be treated.
`
`Furthermore, Engel’s dialogs are very different from conversational flows as
`
`discussed in the patent and the Decision. See Decision at 16-25. Petitioners’ new
`
`arguments do not address this fundamental problem. At best, Petitioners now argue
`
`that not all OSI Layer 7 data is in a single bucket, but several smaller sub-buckets
`
`
`
`11
`
`EX 1049 Page 15
`
`
`
`
`
`that are segregated by protocol. Importantly, Petitioners provide no explanation for
`
`how specific instances are linked together/related. Simply grouping by protocol is
`
`not sufficient. For example, returning to the Skype example referenced in the
`
`Decision on page 17, a single Skype instance can spawn multiple connections
`
`utilizing different protocols (one for audio and one for video). Petitioners’ hash
`
`tables would apparently put the audio protocol information in an appropriate hash
`
`table and the video information in a different table. There is no explanation of how
`
`Engel would recognize these are being related to the same application.
`
`Engel (and the STATS database in particular) are not designed to track
`
`conversational flows. Engel is concerned with tracking statistics to “assist in
`
`diagnosing network problems and improving network performance.” See Decision
`
`at 20; see also Ex. 1007 at 14:43-44 (Engel explains that “STATS defines the
`
`database and it contains subroutines for updating the statistics which it keeps.”);
`
`4:50-51 (“FIGS. 7a-c show the STATS data structures which store performance
`
`statistics relating to the data link layer.”); 12:13-14 (“STATS 36 is also responsible
`
`for tracking events of interest in the form of various statistical reductions”; 14:28-
`
`33 (one of the functions of STATS is “to define statistics records”). The Board
`
`observed that “[m]onitoring statistics is not the same as monitoring a conversational
`
`flow” so it is not surprising that Engel, which is geared towards collecting network
`
`statistics, does not disclosure a mechanism for identifying conversational flows.
`
`
`
`12
`
`EX 1049 Page 16
`
`
`
`
`
`Decision at 17.
`
`3.
`
`New Evidence Not Included In the Petition
`
`The Request includes new argument and evidence not contained in the
`
`Petition in violation of the Board’s rules. See, e.g., Fidelity Nat’l Info. Servs., Inc. v.
`
`Data Treasury Corp., Case IPR2014-00489, Paper 9 at 9–11 (PTAB Aug. 13, 2014)
`
`(declining to consider information presented in a supporting declaration, but not
`
`discussed in the petition). Specifically, the Request pastes excerpts from Dr. Lin’s
`
`declaration and Appendix VI that were not in the Petition. See Request at 7 (block
`
`quote), 10 (block quote); C.R. Bard, Inc. v. Medical Components, Inc., IPR2015-
`
`01660, Paper 11 at 8 (PTAB Sept. 22, 2016) (“Petitioner’s attempt in its Rehearing
`
`Request to rely on paragraph 165 of Mr. Tallarida’s declaration to proffer a new
`
`argument not made in the Petition is impermissible for an additional reason—it
`
`constitutes incorporation by reference, which our rules prohibit.”).
`
` Application-Specific Server Statistics
`
`As an initial matter, the Request incorporates the same arguments from the
`
`Application Level Dialogs in Section III.A of the Request. See Request at 12, 13
`
`(“and like the application-specific dialog records….”). Patent Owner, therefore, also
`
`incorporates the arguments made above in response to Petitions new arguments
`
`concerning application level dialogs.
`
`The only argument that appears to differ in any meaningful respect from the
`
`
`
`13
`
`EX 1049 Page 17
`
`
`
`
`
`dialog records argument concerns the “dialogQ.” The Petition argued that Engel
`
`discloses conversational flows via application-specific server statistics, specifically
`
`“tracking statistics for a given application and a specific server and all of its clients.”
`
`Pet. at 23. Petitioners argued that Engel discloses “storing statistics for each server
`
`participating in communications for a particular application program (e.g. NFS,
`
`Telnet, FTP, SMTP, Netware, etc.).” Pet. at 24. Their argument suffers from the
`
`same problems addresses above. First, application as used by Petitioners actually
`
`references to a protocol, not a software application. Second, storing statistics about
`
`a protocol is not equivalent to a conversational flow. The Board’s construction
`
`includes a “sequence of packets that are exchanged in any direction as a result of an
`
`activity…” Decision at 10. Merely storing statistics does not meet this requirement,
`
`and the Board correctly rejected this argument. Decision at 25 (“Keeping statistics
`
`relating to separate dialogs does not extend to linking unique dialogs, let alone
`
`linking them based on a specific application.”).
`
`The Request offers no direct challenge to the Board’s conclusions (very little
`
`ink is devoted to any substantive arguments). At most, the Request appears to argue
`
`that Engel can determine if there are statistics for a particular server, and perhaps
`
`even for a specific protocol. The Request states that a “dialogQ” links “all
`
`application-specific dialog records for the same application” [i.e., protocol] “in
`
`which the server has participated.” Request at 14. But, no explanation is provided
`
`
`
`14
`
`EX 1049 Page 18
`
`
`
`
`
`on how that information is distilled so specific connections between the server and
`
`a specific user are related based on a specific user’s application activity. At most,
`
`the Request seems to assert that statistics for a server for a particular protocol can be
`
`derived. That falls far short of a conversational flow.
`
`More importantly, nothing in the Petition addresses the severe shortcomings
`
`highlighted in the Decision.
`
`Finally, as noted in connection with prior arguments, the Request’s section on
`
`Application-Specific Server Statistics again includes new argument and evidence
`
`not contained in the Petition in violation of the Board’s rules. See, e.g., Fidelity,
`
`IPR2014-00489, Paper 9 at 9–11. Specifically, the Request pastes excerpts from Dr.
`
`Lin’s declaration and Appendix VI that were not in the Petition. See Request at 14
`
`(block quote); C.R. Bard, IPR2015-01660, Paper 11 at 8.
`
`IV. CONCLUSION
`
`Petitioners’ Request is improper because it fails to identify the issues the
`
`Board has misapprehended or overlooked in denying institution. Moreover, it fails
`
`to show that the Board’s decision not to institute was an abuse of discretion. For all
`
`the foregoing reasons, Petitioners’ Request for rehearing should be denied.
`
`
`
`
`
`15
`
`EX 1049 Page 19
`
`
`
`September 15, 2017
`
`
`
`
`
`
`Respectfully Submitted,
`
`/Steven W. Hartsell/
`Steven W. Hartsell (Reg. No. 58,788)
`SKIERMONT DERBY LLP
`2200 Ross Ave., Ste. 4800W
`Dallas, Texas 75201
`P: 214-978-6600/F: 214-978-6601
`Lead Counsel for Patent Owner
`
`Alexander E. Gasser (Reg. No. 48,760)
`Paul J. Skiermont (pro hac vice
`application to be submitted)
`Sadaf R. Abdullah (pro hac vice
`application to be submitted)
`SKIERMONT DERBY LLP
`2200 Ross Ave., Ste. 4800W
`Dallas, Texas 75201
`P: 214-978-6600/F: 214-978-6621
`Back-Up Counsel for Patent Owner
`
`
`
`16
`
`EX 1049 Page 20
`
`
`
`
`
`CERTIFICATE OF SERVICE
`
`Pursuant to 37 C.F.R. § 42.6(e), I certify that I caused to be served on the
`
`counsel for Patent Owner a true and correct copy of the foregoing Patent Owner’s
`
`Preliminary Response Under 35 U.S.C. § 313 and 37 C.F.R. § 42.107, by electronic
`
`means on September 15, 2017 at the following addresses of record:
`
`Eric A. Buresh (Reg. No. 50,394)
`ERISE IP, P.A.
`6201 College Blvd., Suite 300
`Overland Park, Kansas 66211
`Telephone: (913) 777-5600
`Facsimile: (913) 777-5601
`eric.buresh@eriseip.com
`Lead Counsel for Petitioners
`
`Mark C. Lang (Reg. No. 55,356)
`ERISE IP, P.A.
`6201 College Blvd., Suite 300
`Overland Park, Kansas 66211
`Telephone: (913) 777-5600
`Facsimile: (913) 777-5601
`mark.lang@eriseip.com
`Back-Up Counsel for Petitioners
`
`Kathleen D. Fitterling (Reg. No. 62,950)
`ERISE IP, P.A.
`6201 College Blvd., Suite 300
`Overland Park, Kansas 66211
`Telephone: (913) 777-5600
`Facsimile: (913) 777-5601
`kathleen.fitterling@eriseip.com
`Back-Up Counsel for Petitioners
`
`Abran J. Kean (Reg. No. 58,540)
`ERISE IP, P.A.
`5600 Greenwood Plaza Blvd., Suite 200
`Greenwood Village, Colorado 80111
`Telephone: (913) 777-5600
`Facsimile: (913) 777-5601
`abran.kean@eriseip.com
`Back-Up Counsel for Petitioners
`
`Dated: September 15, 2017
`
`
`
`
`
`
`Respectfully Submitted,
`
`/Steven W. Hartsell/
`Steven W. Hartsell (Reg. No. 58,788)
`
`Lead Counsel for Patent Owner
`
`
`
`
`
`
`
`
`
`EX 1049 Page 21
`
`