throbber
Paper No. 10
`Filed: September 15, 2017
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`___________________
`
`SANDVINE CORPORATION and SANDVINE INCORPORATED ULC,
`
`PETITIONERS,
`
`V.
`
`PACKET INTELLIGENCE, LLC,
`
`PATENT OWNER.
`
`___________________
`
`Case No. IPR2017-00769
`U.S. Patent No. 6,651,099
`___________________
`
`PATENT OWNER’S OPPOSITION TO PETITIONERS’
`REQUEST FOR REHEARING UNDER 37 C.F.R. § 42.71(D)
`
`EX 1049 Page 1
`
`

`

`TABLE OF CONTENTS
`
`III.
`
`I.
`II.
`
`INTRODUCTION ........................................................................................... 1
`THE BOARD DID NOT OVERLOOK OR MISAPPREHEND THE
`ARGUMENTS IN THE PETITION ............................................................... 1
`Hash Table Arguments Were Not Raised In The Petition ............................. 1
`The Board Did Not Ignore Key Evidence ...................................................... 3
`PETITIONERS’ NEW ARGUMENTS DO NOT ESTABLISH THAT
`ENGEL DISCLOSES “CONVERSATIONAL FLOWS” .............................. 7
`The Operation Of Engel ................................................................................. 7
`Application Level Dialogs And Hash Tables ................................................. 9
`1. Petitioners Conflate Protocol And Application ............................................ 9
`2. Hash Tables Are Not Conversational Flows ............................................... 10
`3. New Evidence Not Included In the Petition ............................................... 13
`Application-Specific Server Statistics .......................................................... 13
`IV. CONCLUSION ..............................................................................................15
`
`i
`
`EX 1049 Page 2
`
`

`

`
`
`Cases
`
`TABLE OF AUTHORITIES
`
`2Wire, Inc. v. TQ Delta LLC,
`IPR2015-00247, paper 19 (PTAB May 29, 2015) ................................................. 5
`Apple, Inc. v. ContentGuard Holdings, Inc.,
`IPR2015-00357, Paper 9 (PTAB June 29, 2015) ................................................... 5
`C.R. Bard, Inc. v. Medical Components, Inc.,
`IPR2015-01660, Paper 11 (PTAB Sept. 22, 2016) ................................... 6, 13, 15
`Cisco Sys. Inc. v. C-Cation Techs., LLC,
`IPR2014-00454, Pap. 12 (Aug. 29, 2014) ............................................................. 6
`Ericsson Inc. et al. v. Intellectual Ventures II LLC,
`IPR2015-01872, Paper 15 (PTAB April 19, 2016) ............................................... 3
`Fidelity Nat’l Info. Servs., Inc. v. Data Treasury Corp.,
`Case IPR2014-00489, Paper 9 (PTAB Aug. 13, 2014) ................................ 13, 15
`Limelight Networks, Inc. v. Akamai Technologies, Inc.,
`IPR2017-00349, Paper 7 (PTAB May 30, 2017) ................................................... 6
`Sophos Ltd. et al. v. Fortinet, Inc.,
`IPR2015-00910, Paper 10 (PTAB Oct. 26, 2015) ................................................. 2
`Telit Wireless Solutions Inc. et al. v. M2M Solutions LLC,
`IPR2016-00055, Paper 13 (PTAB May 24, 2016) ................................................. 3
`Regulations
`
`37 C.F.R. § 42.6(a)(3) ................................................................................................ 5
`
`
`
`
`
`
`
`
`ii
`
`EX 1049 Page 3
`
`

`

`
`
`
`
`
`
`GLOSSARY OF TERMS
`
`Term
`
`Definition
`
`“Decision”
`
`“Patent Owner”
`
`“Petitioners”
`
`“Petition” or “Pet.”
`
`“Response”
`
`“Request”
`
`Decision Denying Institution of Inter
`Partes Review, 37 C.F.R. §42.108
`dated July 26, 2017. (Paper 8)
`
`Packet Intelligence, LLC
`
`Sandvine Corporation and Sandvine
`Incorporated ULC
`
`Petition for Inter Partes Review of
`Claims 1-10 of U.S. Patent No.
`6,651,099 dated January 25, 2017
`(Paper 2)
`
`Patent Owner’s Preliminary Response
`dated April 28, 2017 (Paper 6)
`
`Request for Rehearing dated August
`25, 2017 (Paper 9)
`
`
`iii
`
`EX 1049 Page 4
`
`

`

`
`
`I.
`
`INTRODUCTION
`
`Petitioners’ Request for Rehearing should be denied. The Board’s Decision
`
`denying institution of inter partes review did not “overlook” or “misapprehend”
`
`arguments as Petitioner argues. To the contrary, the Decision correctly understood
`
`the arguments presented in the Petition. The Petition and the Rehearing Request fails
`
`to show that Engel discloses conversational flow as construed by the Board.
`
`Petitioners’ Request is nothing more than an attempt to use the Board’s Decision as
`
`a roadmap to develop and present new arguments not articulated in the Petition. As
`
`the Board has recognized in other cases, a request for rehearing is not an opportunity
`
`for a party to re-argue its case. Nor is a rehearing request an opportunity to
`
`supplement the record and to raise issues for the first time. Petitioners’ Request
`
`violates all of these principles, fails to show an abuse of discretion by the Board, and
`
`must be denied. Furthermore, even if the Board considers Petitioners’ new
`
`arguments, they do not address the deficiencies identified in the Decision and Patent
`
`Owner’s Preliminary Response.
`
`II. THE BOARD DID NOT OVERLOOK OR MISAPPREHEND THE
`ARGUMENTS IN THE PETITION
` Hash Table Arguments Were Not Raised In The Petition
`The primary focus of Patent Owner’s Response was that Engel does not
`
`disclose “conversational flow.” Petitioners’ Request argues that the Board allegedly
`
`misapprehended or overlooked arguments regarding an “application hash table” in
`
`
`
`1
`
`EX 1049 Page 5
`
`

`

`
`
`connection with (1) Application Level Dialogs and (2) Application-Specific Server
`
`Statistics. Specifically, Petitioners claim “each Application Level Dialog and
`
`Application-Specific Server Statistics records in Engel is part of an application-
`
`specific hash table that only includes dialog or server records for a particular
`
`identified application. These application-specific hash tables are used by
`
`application-specific lookup routines based on an identification of the packet’s
`
`application activity.” Request at 4.
`
`In connection with its arguing about “conversational flow,” the Petition
`
`discusses Application Level Dialogs on pages 19-22. However, the only reference
`
`to “hash table” is on page 20 where the term is part of a function name. Pet. at 20.
`
`Likewise, Application-Specific Server Statistics are discussed on pages 23-25 of the
`
`Petition. Once again, there is only one reference to “hash table” in a function name
`
`on page 25. In seven pages of briefing, there are only two passing references to “hash
`
`table” without any significant argument or discussion.
`
`The Board did not misapprehend or overlook anything because there was
`
`nothing to overlook or misapprehend. A hash table argument could have been raised
`
`and developed in the Petition, but was not. The Board consistently rejects attempts
`
`to introduce new arguments in rehearing requests that were not raised or developed
`
`in the petition. See Sophos Ltd. et al. v. Fortinet, Inc., IPR2015-00910, Paper 10 at
`
`4-5 (PTAB Oct. 26, 2015) (“A request for rehearing is not an opportunity to present
`
`
`
`2
`
`EX 1049 Page 6
`
`

`

`
`
`new arguments or evidence that could have been presented and developed in the
`
`Petition…we could not have overlooked or misapprehended arguments or evidence
`
`not presented and developed by [Petitioner] in the Petition.”); Telit Wireless
`
`Solutions Inc. et al. v. M2M Solutions LLC, IPR2016-00055, Paper 13 at 3, 5 (PTAB
`
`May 24, 2016) (“A request for rehearing is not an opportunity for a party to add new
`
`arguments, or bolster prior arguments that were found unpersuasive.”…“Petitioner
`
`attempts, belatedly, to provide explanation we found lacking in the original
`
`Petition.”); Ericsson Inc. et al. v. Intellectual Ventures II LLC, IPR2015-01872,
`
`Paper 15 at 4 (PTAB April 19, 2016) (“This argument was not presented in the
`
`Petition. A request for rehearing is not an opportunity for a party to introduce new
`
`argument, bolster insufficient argument, or mend gaps in the evidence relied on in
`
`the Petition.”).
`
`
`
`The Board Did Not Ignore Key Evidence
`
`Petitioners fault the Board for not sufficiently crediting Dr. Lin’s declaration
`
`or considering the Source Code Appendix VI (“Appendix VI”). Petitioners are
`
`wrong on both counts.
`
`Starting with Dr. Lin’s declaration, the Decision acknowledges that the Board
`
`read Dr. Lin’s explanation of how Engel’s disclosed system works and specifically
`
`identified paragraphs 51-157, which encompass all of the citations to the Lin
`
`Declaration (Ex. 1006) identified in the Request that Petitioners claim the Board
`
`
`
`3
`
`EX 1049 Page 7
`
`

`

`
`
`overlooked. See Decision at 23, fn. 4. Dr. Lin’s declaration provides his explanation
`
`of the operation of Appendix VI. Id. (citing Ex. 1006 at ¶51). The Board also
`
`observed that Dr. Lin offers no opinions that the Engel’s system (including
`
`Appendix VI) discloses “conversational flows.” Id. Thus, there can be no doubt that
`
`that the Board considered the Lin Declaration.
`
`As for Appendix VI, Petitioners complain that the Board did “not
`
`meaningfully discuss this key evidence” and that the Decision “emphasized only the
`
`limited disclosures of the Engel patent itself.” Request at 11. There is no need to
`
`separately address Appendix VI (or the Lin Declaration) for several reasons.
`
`First, as noted above, the Board considered Dr. Lin’s declaration, which
`
`provides an explaination of the operation of Appendix VI. See Decision at 23, fn. 4.
`
`Thus, the Lin declaration serves as a proxy for the source code in Appendix VI.
`
`Second, the Engel patent explains that Appendix VI implements an
`
`embodiment disclosed in Engel. See Ex. 1007 at 43:25-26 (“Appendix VI contains
`
`microfiche of the source code for an embodiment of the invention.”); 6:1-4
`
`(“Appendix VI is a microfiche appendix presenting source code for the real time
`
`parser, the statistics data structures and the statistics modules.”). Even the Petitioners
`
`acknowledge, “the Engel patent itself is consistent with the source code.”1 Request
`
`
`1 Petitioners’ protests regarding Dr. Almeroth not providing an overview of the
`
`
`
`4
`
`EX 1049 Page 8
`
`

`

`
`
`at 9. Since Appendix VI is merely a source code rendering of the disclosures made
`
`in the patent, there is no need for the Board to separately call out and cite to source
`
`code in its Decision.
`
`Third, while the Petition does reference Appendix VI, such references are
`
`often string citations where Petitioners point to where a single idea is allegedly found
`
`in (1) the Engel patent, (2) the Lin Declaration, and (3) Appendix VI. See, for
`
`example, Pet. at 19-25. In those instances, there is no need for the Board to comment
`
`on the each source of the concept. Other times the Petition includes source code
`
`images but provides little, if any, explanation about the significance of the snippet,
`
`what it meant to convey, or how it is relevant. In those instances, the Petitioners
`
`failed to develop and articulate arguments in the Petition itself, which is a violation
`
`of the Board’s rules. See 37 C.F.R. § 42.6(a)(3); 2Wire, Inc. v. TQ Delta LLC,
`
`IPR2015-00247, paper 19 at 13 (PTAB May 29, 2015) (“we do not consider
`
`information presented in the Declaration but not discussed sufficiently in the
`
`Petition.”); Apple, Inc. v. ContentGuard Holdings, Inc., IPR2015-00357, Paper 9 at
`
`10 (PTAB June 29, 2015) (“Board rules also prohibit incorporation by reference,
`
`
`Appendix VI are undercut by Engel’s admission that Appendix VI is an
`
`implementation of an embodiment of the specification, as well as Petitioners’
`
`acknowledgement that the patent is consistent with the source code.
`
`
`
`5
`
`EX 1049 Page 9
`
`

`

`
`
`such as incorporating over 100 paragraphs of a declaration into a petition.”);
`
`Limelight Networks, Inc. v. Akamai Technologies, Inc., IPR2017-00349, Paper 7 at
`
`11 (PTAB May 30, 2017) (“We agree that the Petition improperly incorporates
`
`Exhibit [] because it includes arguments made only in a supporting document.”).
`
`Appendix VI is approximately 630 pages of source code, and the Lin
`
`Declaration is almost 110 pages (158 paragraphs). Petitioners bear the burden of
`
`articulating their arguments in the Petition itself, as opposed to requiring the Board
`
`to scour the record on behalf of Petitioners. See Cisco Sys. Inc. v. C-Cation Techs.,
`
`LLC, IPR2014-00454, Pap. 12 at 9 (Aug. 29, 2014) (“Further, the Petition includes
`
`citations to the Declaration to support conclusory statements for which the Petition
`
`does not otherwise provide an argument or explanation….This practice of citing the
`
`Declaration to support conclusory statements that are not otherwise supported in the
`
`Petition also amounts to incorporation by reference.”); 10 (“‘A brief must make all
`
`arguments accessible to the judges, rather than ask them to play archeologist with
`
`the record’ Accordingly, we do not consider arguments not made in the Petition.”);
`
`C.R. Bard, Inc. v. Medical Components, Inc., IPR2015-01660, Paper 11 at 8 (PTAB
`
`Sept. 22, 2016) (“Arguments and information that are not presented and developed
`
`in the Petition, and instead are incorporated by reference to Mr. Tallarida’s
`
`declaration, are not entitled to consideration.”). Petitioners made deliberate decisions
`
`about what arguments and evidence to present in the Petition and must live with the
`
`
`
`6
`
`EX 1049 Page 10
`
`

`

`
`
`consequences of those decisions.
`
`III. PETITIONERS’ NEW ARGUMENTS DO NOT ESTABLISH THAT
`ENGEL DISCLOSES “CONVERSATIONAL FLOWS”
`
`The Board construed “conversational flow” consistent with the disclosure in
`
`the specification as “the sequence of packets that are exchanged in any direction as
`
`a result of an activity (for instance, the running of an application on a server as
`
`requested by a client), where some conversational flows involve more than one
`
`connection, and some even involve more than one exchange of packets between a
`
`client and server.” Decision at 9. The Request suggests that application hash tables
`
`disclose conversational flows. However, Petitioners do not attempt to show how
`
`their new theory satisfies the Board’s construction. Indeed, the term “conversational
`
`flow” barely appears in the Request and when it does, it is usually in a quote from
`
`the Decision, rather than any analysis.
`
` The Operation Of Engel
`
`As a reminder, Engel is fundamentally concerned with tracking statistical
`
`information to assist searching for actual or potential network problems. Decision at
`
`17. The Petition explains that Engel discloses dialogs, which are “[the exchange of]
`
`messages and the associated meaning and state that is inherent in any particular
`
`exchange at any layer.” Pet. at 20 (citing Ex. 1007 at 9:24-27) (emphasis added).
`
`The Petition goes on to state “Engel specifically discloses creating and maintaining
`
`dialogs describing the data link layer, network layer, transport layer, and application
`
`
`
`7
`
`EX 1049 Page 11
`
`

`

`
`
`layer protocols utilized in a given message exchange, each dialog storing statistical
`
`information regarding the nature of the communication at the associated protocol
`
`layer.” Pet. at 20.
`
`The Board examined Engel, especially its disclosure of “dialog” which
`
`discloses that at each OSI level, there is an exchange of messages and the associated
`
`meaning and state that is inherent in any particular exchange at any layer and each
`
`message is viewed as belonging to multiple dialogs. Decision at 19-20 (citing Ex.
`
`1007 at 9:9-43). The Board recognized that “Engel monitors communications
`
`exchanged between the nodes at a particular layer, and tracks statistics for all
`
`communications at that layer (to assist in diagnosing network problems and
`
`improving network performance).” Decision at 20.
`
`Engel essentially puts all of the information related to a given OSI layer into
`
`a bucket for each layer. Therefore, all Layer 7 data is in one bucket, all Layer 4 data
`
`is one bucket, etc. See Response at 50 (“Engel would bucket the information from
`
`each stream per OSI layer…”); 40 (citing Ex. 1007 at 11:32-34 (“Which layers are
`
`to have statistics stored for them is determined by a parse control record that is stored
`
`in STATS.”)); see also Decision at 21 (image representing Engel’s dialogs v.
`
`conversational flows). The Request does not dispute the fundamental operation of
`
`Engel. The Request’s argument is based on an “application-specific hash table that
`
`only includes dialog or server records for a particular identified application.”
`
`
`
`8
`
`EX 1049 Page 12
`
`

`

`
`
`Request at 4. But, as explained below, the Request fails to establish – nor can it –
`
`that Engel discloses a conversational flow, especially in light of Engel’s explanation
`
`that dialogs are separate. Ex. 1007 at 9:58-60; Response at 33.
`
` Application Level Dialogs And Hash Tables
`
`The Decision notes that Petitioners’ argument is “conversational flows exist
`
`in Engel simply because communications exist at the application layer and because
`
`those communications result from some application activity.” Decision at 22. The
`
`Board noted that Engel does not disclose, nor does the Board point to anything
`
`indicating Engel links communications by application (as opposed to by layer and
`
`client-server pair). Decision at 22 (emphasis added).
`
`1.
`
`Petitioners Conflate Protocol And Application
`
`It is important to note that Petitioners appear to conflate the terms
`
`“application” and “protocol” in the Request. A “protocol” is an established rule for
`
`formatting data. See Response at 4. An “application” is a software program that runs
`
`on a computer, for example, a web browser, word processor, Skype, etc. See also
`
`Ex. 1006 at ¶37 (the “application layer is concerned with the application itself.
`
`Examples of application layer protocols include HTTP (for web browsing), SMTP
`
`(for emails), and FTP (for file transfers).”). There can be, and generally are, multiple
`
`software programs that utilize a given protocol.
`
`The Decision was based on Petitioners’ failure “[to] point to any disclosure in
`
`
`
`9
`
`EX 1049 Page 13
`
`

`

`
`
`Engel indicating that its disclosed system relates information from one packet to
`
`another as pertaining to a specific application activity.” Decision at 20. Based on
`
`that criticism, the strategy for the Request was to use the word “application” as much
`
`as possible. However, while that may provide some superficial appeal, it is important
`
`to keep in mind that protocol, application (as used in the OSI model) and application
`
`(a software program) are distinct concepts that are not interchangeable.
`
`2. Hash Tables Are Not Conversational Flows
`
`Petitioners’ rehearing argument is that Application Level Dialogs (and
`
`Application-Specific Server Statistics) records in Engel are part of “an “application-
`
`specific hash table that only includes dialog or server records for a particular
`
`identified application.” Request at 4. Petitioners contend that Engel discloses data
`
`structures in the form of hash tables that are populated with data for only one
`
`protocol type (for example, NFS or FTP). Petitioners consistently refer to these as
`
`“application-specific hash tables.” However, that name is not accurate. Rather, the
`
`tables are populated by protocol-specific information. The term “application”
`
`appears to come from the common name for OSI Layer 7 (the “application” layer).
`
`Indeed, the Request repeatedly states that Engel supports protocols such as FTP,
`
`SMTP, and Telnet. See Request at 6; see also Ex. 1007 at 8:1-20 (identifying various
`
`protocols).
`
`Petitioners argue that such tables “include[] only dialog records for the
`
`
`
`10
`
`EX 1049 Page 14
`
`

`

`
`
`specific” protocol. That would mean that Engel would keep FTP records in one table,
`
`NSF protocol records in another table, Telnet records in another table, TCP records
`
`in a further table, etc. Nevertheless, this still does not rise to the level of identifying
`
`a conversational flow. For example, assume User A requests uses FTP Program 1 to
`
`requests a File X from Server S. That will be one entry in the table. If User A
`
`requests the same file ten times from the same server throughout the day, there will
`
`be ten records in the table. Petitioners provide no explanation of how Engel would
`
`distinguish between
`
`the
`
`ten separate
`
`instances. The Request cites
`
`to a
`
`stats_lookup_dialog that can be used to find a dialog between two IP addresses.
`
`Request at 7. However, using the prior example, the routine would return ten results
`
`with no way to distinguish between them.
`
`Further, consider if User A uses FTP Program 1 to get a file from Server S
`
`and then uses FTP Program 2 to get a file from Server S. In this hypothetical there
`
`are two distinct software programs both retrieving the same file, from the same
`
`server, using the same protocol. There would be two entries in the Petitioners’ hash
`
`table. The Request does not indicate how these distinct instances would be treated.
`
`Furthermore, Engel’s dialogs are very different from conversational flows as
`
`discussed in the patent and the Decision. See Decision at 16-25. Petitioners’ new
`
`arguments do not address this fundamental problem. At best, Petitioners now argue
`
`that not all OSI Layer 7 data is in a single bucket, but several smaller sub-buckets
`
`
`
`11
`
`EX 1049 Page 15
`
`

`

`
`
`that are segregated by protocol. Importantly, Petitioners provide no explanation for
`
`how specific instances are linked together/related. Simply grouping by protocol is
`
`not sufficient. For example, returning to the Skype example referenced in the
`
`Decision on page 17, a single Skype instance can spawn multiple connections
`
`utilizing different protocols (one for audio and one for video). Petitioners’ hash
`
`tables would apparently put the audio protocol information in an appropriate hash
`
`table and the video information in a different table. There is no explanation of how
`
`Engel would recognize these are being related to the same application.
`
`Engel (and the STATS database in particular) are not designed to track
`
`conversational flows. Engel is concerned with tracking statistics to “assist in
`
`diagnosing network problems and improving network performance.” See Decision
`
`at 20; see also Ex. 1007 at 14:43-44 (Engel explains that “STATS defines the
`
`database and it contains subroutines for updating the statistics which it keeps.”);
`
`4:50-51 (“FIGS. 7a-c show the STATS data structures which store performance
`
`statistics relating to the data link layer.”); 12:13-14 (“STATS 36 is also responsible
`
`for tracking events of interest in the form of various statistical reductions”; 14:28-
`
`33 (one of the functions of STATS is “to define statistics records”). The Board
`
`observed that “[m]onitoring statistics is not the same as monitoring a conversational
`
`flow” so it is not surprising that Engel, which is geared towards collecting network
`
`statistics, does not disclosure a mechanism for identifying conversational flows.
`
`
`
`12
`
`EX 1049 Page 16
`
`

`

`
`
`Decision at 17.
`
`3.
`
`New Evidence Not Included In the Petition
`
`The Request includes new argument and evidence not contained in the
`
`Petition in violation of the Board’s rules. See, e.g., Fidelity Nat’l Info. Servs., Inc. v.
`
`Data Treasury Corp., Case IPR2014-00489, Paper 9 at 9–11 (PTAB Aug. 13, 2014)
`
`(declining to consider information presented in a supporting declaration, but not
`
`discussed in the petition). Specifically, the Request pastes excerpts from Dr. Lin’s
`
`declaration and Appendix VI that were not in the Petition. See Request at 7 (block
`
`quote), 10 (block quote); C.R. Bard, Inc. v. Medical Components, Inc., IPR2015-
`
`01660, Paper 11 at 8 (PTAB Sept. 22, 2016) (“Petitioner’s attempt in its Rehearing
`
`Request to rely on paragraph 165 of Mr. Tallarida’s declaration to proffer a new
`
`argument not made in the Petition is impermissible for an additional reason—it
`
`constitutes incorporation by reference, which our rules prohibit.”).
`
` Application-Specific Server Statistics
`
`As an initial matter, the Request incorporates the same arguments from the
`
`Application Level Dialogs in Section III.A of the Request. See Request at 12, 13
`
`(“and like the application-specific dialog records….”). Patent Owner, therefore, also
`
`incorporates the arguments made above in response to Petitions new arguments
`
`concerning application level dialogs.
`
`The only argument that appears to differ in any meaningful respect from the
`
`
`
`13
`
`EX 1049 Page 17
`
`

`

`
`
`dialog records argument concerns the “dialogQ.” The Petition argued that Engel
`
`discloses conversational flows via application-specific server statistics, specifically
`
`“tracking statistics for a given application and a specific server and all of its clients.”
`
`Pet. at 23. Petitioners argued that Engel discloses “storing statistics for each server
`
`participating in communications for a particular application program (e.g. NFS,
`
`Telnet, FTP, SMTP, Netware, etc.).” Pet. at 24. Their argument suffers from the
`
`same problems addresses above. First, application as used by Petitioners actually
`
`references to a protocol, not a software application. Second, storing statistics about
`
`a protocol is not equivalent to a conversational flow. The Board’s construction
`
`includes a “sequence of packets that are exchanged in any direction as a result of an
`
`activity…” Decision at 10. Merely storing statistics does not meet this requirement,
`
`and the Board correctly rejected this argument. Decision at 25 (“Keeping statistics
`
`relating to separate dialogs does not extend to linking unique dialogs, let alone
`
`linking them based on a specific application.”).
`
`The Request offers no direct challenge to the Board’s conclusions (very little
`
`ink is devoted to any substantive arguments). At most, the Request appears to argue
`
`that Engel can determine if there are statistics for a particular server, and perhaps
`
`even for a specific protocol. The Request states that a “dialogQ” links “all
`
`application-specific dialog records for the same application” [i.e., protocol] “in
`
`which the server has participated.” Request at 14. But, no explanation is provided
`
`
`
`14
`
`EX 1049 Page 18
`
`

`

`
`
`on how that information is distilled so specific connections between the server and
`
`a specific user are related based on a specific user’s application activity. At most,
`
`the Request seems to assert that statistics for a server for a particular protocol can be
`
`derived. That falls far short of a conversational flow.
`
`More importantly, nothing in the Petition addresses the severe shortcomings
`
`highlighted in the Decision.
`
`Finally, as noted in connection with prior arguments, the Request’s section on
`
`Application-Specific Server Statistics again includes new argument and evidence
`
`not contained in the Petition in violation of the Board’s rules. See, e.g., Fidelity,
`
`IPR2014-00489, Paper 9 at 9–11. Specifically, the Request pastes excerpts from Dr.
`
`Lin’s declaration and Appendix VI that were not in the Petition. See Request at 14
`
`(block quote); C.R. Bard, IPR2015-01660, Paper 11 at 8.
`
`IV. CONCLUSION
`
`Petitioners’ Request is improper because it fails to identify the issues the
`
`Board has misapprehended or overlooked in denying institution. Moreover, it fails
`
`to show that the Board’s decision not to institute was an abuse of discretion. For all
`
`the foregoing reasons, Petitioners’ Request for rehearing should be denied.
`
`
`
`
`
`15
`
`EX 1049 Page 19
`
`

`

`September 15, 2017
`
`
`
`
`
`
`Respectfully Submitted,
`
`/Steven W. Hartsell/
`Steven W. Hartsell (Reg. No. 58,788)
`SKIERMONT DERBY LLP
`2200 Ross Ave., Ste. 4800W
`Dallas, Texas 75201
`P: 214-978-6600/F: 214-978-6601
`Lead Counsel for Patent Owner
`
`Alexander E. Gasser (Reg. No. 48,760)
`Paul J. Skiermont (pro hac vice
`application to be submitted)
`Sadaf R. Abdullah (pro hac vice
`application to be submitted)
`SKIERMONT DERBY LLP
`2200 Ross Ave., Ste. 4800W
`Dallas, Texas 75201
`P: 214-978-6600/F: 214-978-6621
`Back-Up Counsel for Patent Owner
`
`
`
`16
`
`EX 1049 Page 20
`
`

`

`
`
`CERTIFICATE OF SERVICE
`
`Pursuant to 37 C.F.R. § 42.6(e), I certify that I caused to be served on the
`
`counsel for Patent Owner a true and correct copy of the foregoing Patent Owner’s
`
`Preliminary Response Under 35 U.S.C. § 313 and 37 C.F.R. § 42.107, by electronic
`
`means on September 15, 2017 at the following addresses of record:
`
`Eric A. Buresh (Reg. No. 50,394)
`ERISE IP, P.A.
`6201 College Blvd., Suite 300
`Overland Park, Kansas 66211
`Telephone: (913) 777-5600
`Facsimile: (913) 777-5601
`eric.buresh@eriseip.com
`Lead Counsel for Petitioners
`
`Mark C. Lang (Reg. No. 55,356)
`ERISE IP, P.A.
`6201 College Blvd., Suite 300
`Overland Park, Kansas 66211
`Telephone: (913) 777-5600
`Facsimile: (913) 777-5601
`mark.lang@eriseip.com
`Back-Up Counsel for Petitioners
`
`Kathleen D. Fitterling (Reg. No. 62,950)
`ERISE IP, P.A.
`6201 College Blvd., Suite 300
`Overland Park, Kansas 66211
`Telephone: (913) 777-5600
`Facsimile: (913) 777-5601
`kathleen.fitterling@eriseip.com
`Back-Up Counsel for Petitioners
`
`Abran J. Kean (Reg. No. 58,540)
`ERISE IP, P.A.
`5600 Greenwood Plaza Blvd., Suite 200
`Greenwood Village, Colorado 80111
`Telephone: (913) 777-5600
`Facsimile: (913) 777-5601
`abran.kean@eriseip.com
`Back-Up Counsel for Petitioners
`
`Dated: September 15, 2017
`
`
`
`
`
`
`Respectfully Submitted,
`
`/Steven W. Hartsell/
`Steven W. Hartsell (Reg. No. 58,788)
`
`Lead Counsel for Patent Owner
`
`
`
`
`
`
`
`
`
`EX 1049 Page 21
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket