throbber
Case 2:14-cv-00252-JRG Document 89 Filed 01/26/15 Page 1 of 38 PageID #: 3451
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`
`











`
`
`
`Civil Action No. 2:14-cv-252-JRG
`
`
`Jury Trial Requested
`
`Plaintiff,
`
`
`
`v.
`
`
`PACKET INTELLIGENCE LLC,
`
`
`
`
`
`CISCO SYSTEMS, INC.,
`
`
`
`
`
`Defendant.
`
`PACKET INTELLIGENCE LLC’S
`OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`
`
`
`
`
`EX 1078 Page 1
`
`

`

`Case 2:14-cv-00252-JRG Document 89 Filed 01/26/15 Page 2 of 38 PageID #: 3452
`
`
`
`
`
`TABLE OF CONTENTS
`
`I.
`
`Introduction and Overview of Patented Technology .......................................................... 1
`
`II. Legal Principles of Claim Construction .............................................................................. 1
`
`III. Terms for Construction Without MPF Proposals ............................................................... 1
`
`A.
`
`“conversational flow” and “conversational flow sequence” (Ex. L, Terms 5, 6) ......... 1
`
`B.
`
`“child protocol” (Ex. L, Term 4) .................................................................................. 3
`
`C.
`
`“parser record” (Ex. L, Term 15) ................................................................................. 5
`
`D.
`
`“flow entry” (Ex. L, Term 7) ........................................................................................ 7
`
`E.
`
`“none or more” (Ex. L, Term 13) ............................................................................... 10
`
`IV. Terms for Construction With MPF Proposals .................................................................. 11
`
`A.
`
`“parser subsystem” (Ex. L, Term 16) ......................................................................... 12
`
`B.
`
`“analyzer subsystem” (Ex. L, Term 3) ....................................................................... 15
`
`C.
`
`“lookup engine” (Ex. L, Term 11) .............................................................................. 18
`
`D.
`
`“flow insertion engine” (Ex. L, Term 8) .................................................................... 20
`
`E.
`
`F.
`
`“protocol/state identification mechanism” (Ex. L, Term 18) ..................................... 22
`
`“mechanism of building a hash” (Ex. L, Term 12) .................................................... 24
`
`V. Cisco’s Additional Terms Proposed for Construction ...................................................... 25
`
`A.
`
`“packet monitor” (Ex. L, Term 14) ............................................................................ 26
`
`B.
`
`C.
`
`D.
`
`E.
`
`“A method of examining packets passing through a connection point on a
`computer network” (Ex. L, Term 2) ...................................................................... 28
`
`“A method for analyzing a flow of packets passing through a connection point on
`a computer network” (Ex. L, Term 1) ................................................................... 28
`
`“performing one or more parsing/extraction operations on the packet to create a
`parser record comprising a function of selected portions of the packet” (Ex.
`L, Term 17) ........................................................................................................... 28
`
`“looking up a flow-entry database comprising none or more flow-entries for
`previously encountered conversational flows, the looking up using at least
`some of the selected packet portions and determining if the packet is of an
`
`i
`
`EX 1078 Page 2
`
`

`

`Case 2:14-cv-00252-JRG Document 89 Filed 01/26/15 Page 3 of 38 PageID #: 3453
`
`
`
`
`
`
`
`
`
`existing flow” / looking up a flow-entry database for containing one or more
`flow-entries for previously encountered conversational flows, the looking up
`to determine if the received packet is of an existing flow” (Ex. L, Terms 9,
`10) ......................................................................................................................... 30
`
`VI. Conclusion ........................................................................................................................ 30
`
`
`
`ii
`
`EX 1078 Page 3
`
`

`

`Case 2:14-cv-00252-JRG Document 89 Filed 01/26/15 Page 4 of 38 PageID #: 3454
`
`
`
`Cases
`
`TABLE OF AUTHORITIES
`
`Allen Eng’g v. Bartell Indus.,
` 299 F.3d 1336 (Fed. Cir. 2002) ............................................................................................... 26
`
`Altiris, Inc. v. Symantec Corp.,
` 318 F.3d 1363 (Fed. Cir. 2003) ......................................................................................... 26, 28
`
`Apex Inc. v. Raritan Comp., Inc.,
` 325 F.3d 1364 (Fed. Cir. 2003) ............................................................................................... 12
`
`Apple Inc. v. Motorola, Inc.,
` 757 F.3d 1286 (Fed. Cir. 2014) ................................................................................... 11, 12, 14
`
`Aspex Eyewear, Inc. v. Marchon Eyewear, Inc.,
` 672 F.3d 1335 (Fed. Cir. 2012) ................................................................................................. 7
`
`Cardiac Pacemakers, Inc. v. St. Jude Med., Inc.,
` 381 F.3d 1371 (Fed. Cir. 2004) ......................................................................................... 29, 30
`
`CollegeNet, Inc. v. ApplyYourself, Inc.,
` 418 F.3d 1225 (Fed. Cir. 2005) ................................................................................................. 9
`
`Finisar Corp. v. DirecTV Grp., Inc.,
` 523 F.3d 1323 (Fed. Cir. 2008) ............................................................................................... 14
`
`Intervet Inc. v. Merial Ltd.,
` 617 F.3d 1282 (Fed. Cir. 2010) ................................................................................................. 2
`
`Libel-Flarsheim Co. v. Medrad, Inc.,
` 358 F.3d 898 (Fed. Cir. 2004) ................................................................................................... 9
`
`Lighting World, Inc. v. Birchwood Lighting, Inc.,
` 382 F.3d 1354 (Fed. Cir. 2004) ............................................................................. 11, 12, 14, 22
`
`Masco Corp. v. United States,
` 303 F.3d 1316 (Fed. Cir. 2002) ......................................................................................... 29, 30
`
`Micro Chem., Inc. v. Great Plains Chem. Co.,
` 194 F.3d 1250 (Fed. Cir. 1999) ......................................................................................... 15, 22
`
`Mobilemedia Ideas LLC v. HTC Corp.,
` No. 2:10-cv-112 (E.D. Tex. Dec. 12, 2012) .............................................................................. 1
`
`Nautilus, Inc. v. Biosig Instruments, Inc.,
` 134 S. Ct. 2120 (2014) ............................................................................................................. 10
`
`
`
`iii
`
`EX 1078 Page 4
`
`

`

`Case 2:14-cv-00252-JRG Document 89 Filed 01/26/15 Page 5 of 38 PageID #: 3455
`
`
`
`Ne. Univ. v. Google, Inc.,
` 2010 U.S. Dist. LEXIS 118977 (E.D. Tex. Nov. 9, 2010) ...................................................... 25
`
`Personalized Media Communs., LLC v. ITC,
` 161 F.3d 696 (Fed. Cir. 1998) ........................................................................................... 13, 25
`
`Phillips v. AWH Corp.,
` 415 F.3d 1303 (Fed. Cir. 2005) (en banc) ......................................................................... 1, 7, 9
`
`SciMed Life Sys. v. Advanced Cardiovascular Sys.,
` 242 F.3d 1337 (Fed. Cir. 2001) ................................................................................................. 6
`
`Teleflex, Inc. v. Ficosa N. Am. Corp.,
` 299 F.3d 1313 (Fed. Cir. 2002) ............................................................................................... 26
`
`Teva Pharm. USA, Inc. v. Sandoz, Inc.,
` No. 13-854 (S. Ct. Jan. 20, 2015) .............................................................................................. 1
`
`Toro Co. v. Textron, Inc.,
` 502 F. Supp. 2d 904 (D. Minn. 2007) ................................................................................ 15, 22
`
`Typhoon Touch Techs., Inc. v. Dell, Inc.,
` 659 F.3d 1376 (Fed. Cir. 2011) ............................................................................................... 14
`
`Vitronics Corp. v. Conceptronic,
` 90 F.3d 1576 (Fed. Cir. 1996) ................................................................................................... 9
`
`Widevine Techs., Inc. v. Verimatrix, Inc.,
` 2009 U.S. Dist. LEXIS 102768 (E.D. Tex. Nov. 4, 2009) ...................................................... 17
`
`Williamson v. Citrix Online, LLC,
` 770 F.3d 1371 (Fed. Cir. 2014) ........................................................................................ passim
`
`Young v. Lumenis, Inc.,
` 492 F.3d 1336 (Fed. Cir. 2007) ............................................................................................... 10
`
`Statutes
`
`35 U.S.C. § 112(f) ......................................................................................................................... 11
`
`
`
`
`
`
`
`iv
`
`EX 1078 Page 5
`
`

`

`Case 2:14-cv-00252-JRG Document 89 Filed 01/26/15 Page 6 of 38 PageID #: 3456
`
`
`
`I. INTRODUCTION AND OVERVIEW OF PATENTED TECHNOLOGY
`
`The instant case involves five related patents: U.S. Patent Nos. 6,651,099 (“the ‘099
`
`Patent”) (attached as Ex. A); 6,665,725 (“the ‘725 Patent”) (attached as Ex. B); 6,771,646 (“the
`
`‘646 Patent”) (attached as Ex. C); 6,839,751 (“the ‘751 Patent”) (attached as Ex. D); and
`
`6,954,789 (“the ‘789 Patent”) (attached as Ex. E) (collectively “the Patents-in-Suit”).1 Each of
`
`the patents claims priority to and incorporates by reference Provisional Application No.
`
`60/141,903 (“Provisional”), and thus the Provisional forms part of the intrinsic evidence. The
`
`Patents-in-Suit are generally directed to classifying and monitoring network traffic. Traffic
`
`classification involves detecting the underlying protocols being used as well as the applications
`
`or user activity responsible for generating the network traffic. Traffic monitoring involves
`
`tracking the state of the underlying protocols along with relevant network traffic statistics. Such
`
`classification and monitoring provide network administrators with detailed information about
`
`their networks that can be used to diagnose network problems, control bandwidth allocation, and
`
`ensure an appropriate quality of service for users.
`
`II. LEGAL PRINCIPLES OF CLAIM CONSTRUCTION
`
`This Court is very familiar with the general tenets of claim construction, which we do not
`
`repeat here. See Mobilemedia Ideas LLC v. HTC Corp., No. 2:10-cv-112, at 7-13 (E.D. Tex. Dec.
`
`12, 2012); Phillips v. AWH Corp., 415 F.3d 1303 (Fed. Cir. 2005) (en banc); Teva Pharm. USA,
`
`Inc. v. Sandoz, Inc., No. 13-854, slip op. at 7 (S. Ct. Jan. 20, 2015) (claim construction may
`
`involve subsidiary fact-findings based on extrinsic evidence).
`
`III. TERMS FOR CONSTRUCTION WITHOUT MPF PROPOSALS2
`
`A. “conversational flow” and “conversational flow sequence” (Ex. L, Terms 5, 6)
`
`Packet’s Proposal
`that are
`sequence of packets
`“the
`exchanged in any direction as a result of an
`
`Cisco’s Proposal
`“the sequence of packets that are exchanged in any
`direction as a result of an application program
`
`
`1 The specifications of the Patents-in-Suit are similar. Generally throughout this brief, the patent
`that includes the claims at issue for a given term is cited.
`2 Exhibit L includes a table with the parties’ claim construction positions for all disputed terms.
`Exhibit K includes a list of agreed constructions.
`
`
`
`
`
`- 1 -
`
`
`
`EX 1078 Page 6
`
`

`

`Case 2:14-cv-00252-JRG Document 89 Filed 01/26/15 Page 7 of 38 PageID #: 3457
`
`
`
`that may
`application program activity
`involve more than one connection and
`more than one exchange of packets related
`to a particular application program”
`
`
`activity and are recognized as belonging to the
`same flow, even if they involve more than one
`connection and more than one exchange of packets
`related to a particular application program”
`
`Coined terms like conversational flow “are best understood by reference to the
`
`specification.” Intervet Inc. v. Merial Ltd., 617 F.3d 1282, 1287 (Fed. Cir. 2010). The
`
`specification defines “conversational flow” as:
`
`Some prior art packet monitors classify packets into connection flows. The term
`“connection flow” is commonly used to describe all the packets involved with a
`single connection. A conversational flow, on the other hand, is the sequence of
`packets that are exchanged in any direction as a result of an activity—for
`instance, the running of an application on a server as requested by a client. It is
`desirable to be able to identify and classify conversational flows rather than only
`connection flows. The reason for this is that some conversational flows involve
`more than one connection, and some even involve more than one exchange of
`packets between a client and server. This is particularly true when using
`client/server protocols such as RPC, DCOMP, and SAP, which enable a service to
`be set up or defined prior to any use of that service.
`
`‘099 Patent at 2:34-48 (emphases added); ‘789 Patent at 2:42-56; see also Provisional at 3:3-12
`
`(including a nearly identical statement). The parties’ proposals generally incorporate the
`
`language emphasized above. Cisco, however, adds to this definitional statement the limitation
`
`“and are recognized as belonging to the same flow.” The sole dispute is whether Cisco’s
`
`additional requirement should be incorporated into the construction of this term. It should not.
`
`It is not disputed that a conversational flow includes a “sequence of packets that are
`
`exchanged in any direction as a result of an application program activity.” To further require that
`
`the sequence of packets “[is] recognized as belonging to the same flow,” as Cisco proposes, is
`
`almost nonsensical. There are three potential interpretations of the “flow” recited in Cisco’s
`
`proposed construction, and in each instance, the resulting construction should be rejected. The
`
`three possible interpretations are that the “flow” is (1) a conversational flow; (2) a connection
`
`flow; or (3) some other flow.
`
`If the recited flow is a “conversational flow”, the proposed construction reads as follows:
`
`the sequence of packets that are exchanged in any direction as a result of an
`application program activity and are recognized as belonging to the same
`
`
`
`
`
`- 2 -
`
`
`
`EX 1078 Page 7
`
`

`

`Case 2:14-cv-00252-JRG Document 89 Filed 01/26/15 Page 8 of 38 PageID #: 3458
`
`
`
`[conversational flow], even if they involve more than one connection and more
`than one exchange of packets related to a particular application program
`
`This interpretation of Cisco’s construction creates a metaphysical quandary—to constitute a
`
`“conversational flow,” the exchange of packets must be recognized as belonging to that same
`
`“conversational flow.” Contrary to Cisco’s construction, a conversational flow exists without
`
`regard to whether it is “recognized” as such. This interpretation of Cisco’s construction requires
`
`that a conversational flow be recognized as being a conversational flow before it actually is a
`
`conversational flow, a logical impossibility. Such a construction is nonsensical and cannot
`
`possibly be correct.
`
`The recited flow in Cisco’s proposal cannot be a “connection flow” either because both
`
`parties’ proposed constructions and the definition in the specification provide that a
`
`“conversational flow” may include one or more connections. The specification states that “[t]he
`
`term ‘connection flow’ is commonly used to describe all the packets involved with a single
`
`connection.” ‘099 Patent at 2:35-37 (emphasis added). Thus, a conversational flow involving
`
`more than one connection, or “connection flow,” would be impossible under Cisco’s proposal if
`
`the recited flow is a “connection flow.” This interpretation cannot stand either because it is
`
`inconsistent with the specification’s definition of “conversational flow,” which states that “some
`
`conversational flows involve more than one connection.”
`
`Finally, the recited flow in Cisco’s proposal might suggest some undefined other flow,
`
`but that construction has no support in the specification. The specification discloses
`
`“conversational flows” and “connection flows,” both of which have been addressed. Further,
`
`leaving Cisco’s proposal as-is—i.e., not clarifying the meaning of the recited “flow”—creates an
`
`ambiguous construction, which should be rejected.
`
`For these reasons, Cisco’s proposal to include the additional limitation “and are
`
`recognized as belonging to the same flow” should be rejected.
`
`B. “child protocol” (Ex. L, Term 4)
`
`Cisco’s Proposal
`Packet’s Proposal
`“a protocol that is encapsulated within another “protocol from a higher protocol stack
`
`
`
`
`
`- 3 -
`
`
`
`EX 1078 Page 8
`
`

`

`Case 2:14-cv-00252-JRG Document 89 Filed 01/26/15 Page 9 of 38 PageID #: 3459
`
`
`
`protocol”
`
`
`layer”
`
`The specification discusses child protocols in the context of encapsulation, layers, and
`
`protocol stacks. Encapsulation indicates that the child protocol message (or a portion of that
`
`message) is included within the parent protocol message. See, e.g., ‘725 Patent at 6:62-7:5.
`
`Protocol layer refers to the conceptualization of network communications as layered, i.e., data
`
`from one protocol is encapsulated within another. See, e.g., id. at 6:32-54 (discussing the ISO
`
`protocol layer model as an example). There can be many layers in a communication; thus, the
`
`data being communicated may be encapsulated many times over. Finally, protocol stack refers to
`
`the “stack” of protocol layers in use. See id. Packet’s proposed construction accurately tracks the
`
`claim requirements, whereas Cisco’s proposed construction imports requirements not present in
`
`the claims.
`
`Cisco’s proposal is improper because it imports a “higher protocol stack layer” limitation
`
`that is not required in the claims. More specifically, Cisco’s proposal imposes a particular
`
`layering constraint on the child protocols that is not required by the claims. In particular, Claim
`
`31 of the ‘789 Patent recites “children protocols,” which is a plural form of “child protocol.” But
`
`neither this Claim nor Claim 19 on which it depends, reference protocol layering at all. Thus,
`
`Cisco’s proposed construction would improperly import the layering requirement into these ‘789
`
`Patent Claims. See ‘789 Patent at 37:61-38:6.
`
`Other asserted claims include a layering requirement, but do not specify a layering
`
`requirement for the “child protocol.” The relevant ‘725 Patent claims—1, 10, and 17—each
`
`include the following requirements:
`
`(b) receiving a set of protocol descriptions for a plurality of protocols that
`conform to a layered model, a protocol description for a particular protocol at a
`particular layer level including:
`
`(i) if there is at least one child protocol of the protocol at the particular layer level,
`the one or more child protocols of the particular protocol at the particular layer
`level, the packet including for any particular child protocol of the particular
`protocol at the particular layer level information at one or more locations in the
`packet related to the particular child protocol,
`
`(ii) the one or more locations in the packet where information is stored related to
`
`
`
`
`
`- 4 -
`
`
`
`EX 1078 Page 9
`
`

`

`Case 2:14-cv-00252-JRG Document 89 Filed 01/26/15 Page 10 of 38 PageID #: 3460
`
`
`
`any child protocol of the particular protocol, and
`
`‘725 Patent at 95:6-21, 96:28-42, 98:5-19 (emphases added). The claims require that the plurality
`
`of protocols described “conform to a layered model.” They further require that each protocol
`
`description correspond to a particular protocol at a particular protocol layer level. Finally, each
`
`protocol description includes information about potential child protocols—namely, (1)
`
`identification of the child protocols for a particular protocol being described; and (2) the location
`
`(e.g., index) of information within a packet that is related to a child protocol of the particular
`
`protocol being described. See id. While the claims require that the protocols conform to a layered
`
`model, the claims do not require that the child protocol conform to a layered model. Rather, the
`
`protocol description identifies the location within the packet where information related to the
`
`child protocols can be found. See also ‘725 Patent at 4:2-6 (the protocol description for a
`
`particular protocol at a particular layer level includes child protocols, and for those child
`
`protocols, the protocol description identifies where in the packet the information for that child
`
`protocol may be found). Cisco’s proposal imposes a layering limitation for the child protocols
`
`that is not present in these claims.
`
`Cisco’s proposed construction should also be rejected because it is ambiguous. The term
`
`“higher” is a comparative term when discussing a layering model, yet Cisco’s proposal provides
`
`no basis for determining if a protocol stack layer is higher or lower, nor does Cisco provide a
`
`reference point for this comparison.
`
`A protocol that is encapsulated within another protocol is “located” within that protocol.
`
`Packet’s proposed construction aligns with the relevant claim language of the ‘725 Patent and
`
`how one of skill in the art would interpret “child protocol” in light of the specification.
`
`C. “parser record” (Ex. L, Term 15)
`
`Packet’s Proposal
`No construction necessary
`
`Cisco’s Proposal
`“a record that includes a signature, the hash, and at least parts of
`the packet payload”
`
`
`
`
`
`
`
`The meaning of “parser record” is clear to one of skill in the art when read within the
`
`- 5 -
`
`
`
`EX 1078 Page 10
`
`

`

`Case 2:14-cv-00252-JRG Document 89 Filed 01/26/15 Page 11 of 38 PageID #: 3461
`
`
`
`context of the claims. Cisco’s construction is wrong for at least three reasons. First, Cisco
`
`commits the “cardinal sin” of claim construction by importing limitations into the claims;
`
`namely, “a signature, the hash, and at least parts of the packet payload.” See SciMed Life Sys. v.
`
`Advanced Cardiovascular Sys., 242 F.3d 1337, 1340 (Fed. Cir. 2001). Second, Cisco erroneously
`
`limits the claims to a preferred embodiment. And Third, Cisco’s construction violates the
`
`doctrine of claim differentiation.
`
`Claim 7 of the ‘646 Patent recites: “a parser subsystem . . . configured to extract selected
`
`portions of the accepted packet and to output a parser record containing the selected portions.”
`
`‘646 Patent at 38:3-6. The claim requires that the “parser record” includes “selected portions.” It
`
`does not, however, dictate the inclusion of a signature or hash, as Cisco proposes. Further, it does
`
`not require that the “selected portions” are from a packet payload. In some instances, for
`
`example, the selected portions may originate from the header information in the packet. See, e.g.,
`
`‘646 Patent at 13:25-31 (“The protocol table includes the parameters needed by the pattern
`
`analysis and recognition process 304 (implemented by PRE 1006) to evaluate the header
`
`information in the packet that is associated with that protocol, and parameters needed by
`
`extraction process 306 (implemented by slicer 1007) to process the packet header.”). Claim 16,
`
`similarly, does not require that a “parser record” includes a hash, signature, or parts of the packet
`
`payload: “performing one or more parsing/extraction operations on the packet to create a parser
`
`record comprising a function of the selected portions of the packet.” ‘646 Patent at 39:15-17.
`
`Finally, claims 1, 17, 19, 42, and 44 of the ‘789 Patent all include the term “parser record”;
`
`however, none of these claims requires that the parser record include the hash, signature, or
`
`payload portions as proposed by Cisco.
`
`Cisco identifies the following specification passage as supporting its proposed
`
`construction:
`
`In one embodiment, the parser passes data from the packet—a parser record—
`that includes the signature (i.e., selected portions of the packet), the hash, and the
`packet itself to allow for any state processing that requires further data from the
`packet. An improved embodiment of the parser subsystem might generate a parser
`record that has some predefined structure and that includes the signature, the hash,
`
`
`
`
`
`- 6 -
`
`
`
`EX 1078 Page 11
`
`

`

`Case 2:14-cv-00252-JRG Document 89 Filed 01/26/15 Page 12 of 38 PageID #: 3462
`
`
`
`some flags related to some of the fields in the parser record, and parts of the
`packet's payload that the parser subsystem has determined might be required for
`further processing, e.g., for state processing.
`
`‘646 Patent at 9:29-39 (emphasis added). The passage describes three things that a parser record
`
`may contain in “one embodiment”—“the signature (i.e., selected portions of the packet), the
`
`hash, and the packet itself.” The claim limitation at issue expressly recites one of these items:
`
`“selected portions of the accepted packet.” Despite the clear intent of the drafter to incorporate
`
`only one requirement, Cisco’s proposed construction incorporates all three. Cisco’s proposed
`
`construction is a classic example of improperly importing a limitation into the claims. See
`
`SciMed Life Sys., 242 F.3d at 1340.
`
`Further, Cisco violates the doctrine of claim differentiation which counsels that “the
`
`presence of a dependent claim that adds a particular limitation gives rise to a presumption that
`
`the limitation in question is not present in the independent claim.” Aspex Eyewear, Inc. v.
`
`Marchon Eyewear, Inc., 672 F.3d 1335, 1348 (Fed. Cir. 2012) (quoting Phillips, 415 F.3d at
`
`1315). Dependent claims of the ‘646 Patent include limitations requiring that a hash or signature
`
`be included in the claimed “parser record.” Claim 9 of the ‘646 Patent requires a hash in the
`
`parser record: “A monitor according to claim 7, further including a mechanism for building a
`
`hash from the selected portions, wherein the hash is included in the input for a particular packet
`
`to the lookup engine . . . .” ‘646 Patent at 38:40-43 (emphasis added). Claim 18 of the ‘646
`
`Patent requires that the “parser record” include a signature: “wherein the function of the selected
`
`portions of the packet forms a signature that includes the selected packet portions . . . .” ‘646
`
`Patent at 40:8-11. Because these limitations are present in dependent claims, it is presumed that
`
`they are not present in the independent claims. Accordingly, Cisco’s proposed construction
`
`requiring that “parser record” include a “hash” and “signature” should be rejected.
`
`Because Cisco’s construction violates all of these doctrines of claim construction, it
`
`cannot possibly be correct and should be rejected.
`
`D. “flow entry” (Ex. L, Term 7)
`
`Packet’s Proposal
`
`Cisco’s Proposal
`
`
`
`
`
`- 7 -
`
`
`
`EX 1078 Page 12
`
`

`

`Case 2:14-cv-00252-JRG Document 89 Filed 01/26/15 Page 13 of 38 PageID #: 3463
`
`
`
`No construction necessary
`
`
`“a database record that completely describes a conversational flow
`and includes the unique flow-signature, state information, extracted
`information from the packet for updating flows, and one or more
`statistical measures about the conversational flow”
`
`The claims of each Patent-in-Suit generally recite that flow-entries are maintained in a
`
`database for conversational flows. See ‘099 Patent Claim 1 (“flow-entries for conversational
`
`flows”); ‘725 Patent Claim 15 (“flow-entry for each previously encountered conversational
`
`flow”); ‘646 Patent Claim 1 (“flow-entries for previously encountered conversational flows”);
`
`‘751 Patent Claim 1 (same); ‘789 Patent Claim 1 (same). Based on the claim language, one of
`
`ordinary skill in the art would understand that a “flow entry” is simply an entry related to a flow.
`
`Thus, no construction is necessary. Cisco’s construction, instead of being a serious attempt to
`
`construe “flow entry,” is a transparent attempt to use the term as a vehicle to import numerous
`
`limitations into the claims.
`
`Certain claims require that a “flow entry” include “identifying information.” See, e.g.,
`
`‘725 Patent, Claim 15 (flow-entry “include[s] identifying information for future packets to be
`
`identified with the new flow-entry”); ‘789 Patent, Claim 1 (same); ‘646 Patent, Claim 2
`
`(“wherein each flow-entry is identified by identifying information stored in the flow-entry”).
`
`Other claims require that the flow-entry include “statistical measures.” See, e.g., ‘099 Patent,
`
`Claim 9 (“wherein one or more statistical measures about a flow are stored in each flow-entry”);
`
`‘751 Patent, Claim 1 (“including storing one or more statistical measures kept in the flow-
`
`entry”); ‘789 Patent, Claim 4 (“wherein updating includes storing one or more statistical
`
`measures stored in the flow-entry of the existing flow”). And at least one claim requires that a
`
`“signature” be stored in the claimed “flow-entry.” See ‘646 Patent, Claim 18 (“wherein the
`
`identifying information stored in the new or updated flow-entry is a signature for identifying
`
`future packets”).
`
`As indicated by the many claims cited above, the patentee dictated the contents of a flow-
`
`entry in certain claims and not in others. When a claim does not include such requirements, the
`
`patentee presumably did not intend to so limit the contents of a “flow-entry.” See Phillips, 415
`
`
`
`
`
`- 8 -
`
`
`
`EX 1078 Page 13
`
`

`

`Case 2:14-cv-00252-JRG Document 89 Filed 01/26/15 Page 14 of 38 PageID #: 3464
`
`
`
`F.3d at 1312 (“[W]e look to the words of the claims themselves . . . to define the scope of the
`
`patented invention.” (quoting Vitronics Corp. v. Conceptronic, 90 F.3d 1576, 1586 (Fed. Cir.
`
`1996))). The claims themselves are clear regarding whether a claimed “flow-entry” contains
`
`specific information. Accordingly, “flow-entry” should not be limited to include the specific
`
`elements recited in Cisco’s proposal: “unique flow-signature, state information, extracted
`
`information from the packet for updating flows, and one or more statistical measures about the
`
`conversational flow.”
`
`Additionally, many of Cisco’s proposed limitations violate the doctrine of claim
`
`differentiation. For instance, dependent claim 2 of the ‘099 Patent requires that the “flow-entry
`
`includes the state of the flow.” However, independent claim 1 has no such requirement.
`
`Likewise, dependent claim 9 of the ‘099 Patent requires “statistical measures”; however, claim 1
`
`does not. Finally, dependent claim 18 of the ‘646 Patent requires “a signature,” but independent
`
`claim 16 does not. Limitations present in dependent claims should not be imported into the
`
`underlying independent claims. See Phillips, 415 F.3d at 1314-15 (“[T]he presence of a
`
`dependent claim that adds a particular limitation gives rise to a presumption that the limitation in
`
`question is not present in the independent claim.” (citing Libel-Flarsheim Co. v. Medrad, Inc.,
`
`358 F.3d 898, 910 (Fed. Cir. 2004))).
`
`Cisco’s proposal should also be rejected because it imports limitations from the preferred
`
`embodiment into the claims. Figure 3 of the Patents-in-Suit discloses an embodiment of the
`
`claimed invention. See ‘099 Patent at 7:47-50. Cisco’s proposed construction is taken, almost
`
`verbatim, from a description of this embodiment. See id. at 14:14-18 (“The flow-entry database
`
`324 stores flow-entries that include the unique flow-signature, state information, and extracted
`
`information from the packet for updating flows, and one or more statistical [sic] about the flow.
`
`Each entry completely describes a flow.”). It is improper to import limitations of a disclosed
`
`embodiment into the claims. See CollegeNet, Inc. v. ApplyYourself, Inc., 418 F.3d 1225, 1231
`
`(Fed. Cir. 2005) (“[T]his court will not at any time import limitations from the specification into
`
`the claims.”). Accordingly, Cisco’s proposed construction should be rejected.
`
`
`
`
`
`- 9 -
`
`
`
`EX 1078 Page 14
`
`

`

`Case 2:14-cv-00252-JRG Document 89 Filed 01/26/15 Page 15 of 38 PageID #: 3465
`
`
`
`E. “none or more” (Ex. L, Term 13)
`
`Packet’s Proposal
`No construction necessary
`
`Alternative: “may include one or more”
`
`
`Cisco’s Proposal
`
`Indefinite
`
`Packet proposes that no construction is necessary, while Cisco argues that this term is
`
`indefinite. The patent statute’s definiteness provision requires “that a patent’s

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket