throbber
Case 3:19-cv-02471-WHO Document 68 Filed 07/21/20 Page 1 of 15
`
`Brian A.E. Smith (SBN 188147)
`Alden KW Lee (SBN 257973)
`Jeffrey D. Chen (SBN 267837)
`Joseph J. Fraresso (SBN 289228)
`BARTZO ZANKEL BUNZEL & MILLER
`One Embarcadero Center, Suite 800
`San Francisco, CA 94111
`Telephone: (415) 956-1900
`bsmith@bzbm.com
`alee@bzbm.com
`jchen@bzbm.com
`jfraresso@bzbm.com
`
`Attorneys for Defendant and
`Counterclaimant Packet Intelligence LLC
`
`[Additional counsel listed on signature page]
`
`UNITED STATES DISTRICT COURT
`NORTHERN DISTRICT OF CALIFORNIA
`SAN FRANCISCO DIVISION
`
`PALO ALTO NETWORKS, INC.,
`
`Case No. 3:19-cv-02471-WHO
`
`Plaintiff and Counter-Defendant,
`
`PACKET INTELLIGENCE LLC’S REPLY
`CLAIM CONSTRUCTION BRIEF
`
` v.
`
`PACKET INTELLIGENCE LLC,
`
`Defendant and Counterclaimant.
`
`DEMAND FOR JURY TRIAL
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
` CASE NO. 3:19-CV-02471-WHO
`
`Packet Intelligence LLC Exh 2068
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 1 of 15
`
`

`

`Case 3:19-cv-02471-WHO Document 68 Filed 07/21/20 Page 2 of 15
`
`
`
`Table of Contents
`
`
`I.
`
`INTRODUCTION .................................................................................................................... 1
`
`II.
`
`DISPUTED TERMS FOR CONSTRUCTION .............................................................................. 2
`
`A. “conversational flow(s)”/ “conversational flow-sequence” ........................................ 2
`
`B. “a flow-entry database” terms ..................................................................................... 6
`
`C. “the flow”/ “existing flow” / “new flow” .................................................................... 8
`
`D. “a protocol/state identification mechanism…configured to determine the protocol
`and state of the conversational flow of the packet” .................................................... 9
`
`E. “claim preambles” ..................................................................................................... 11
`
`III. CONCLUSION ...................................................................................................................... 11
`
`
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`i
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-02471-WHO
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2068
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 2 of 15
`
`

`

`Case 3:19-cv-02471-WHO Document 68 Filed 07/21/20 Page 3 of 15
`
`
`
`
`
`Cases
`
`Table of Authorities
`
`
`Amgen, Inc. v. F. Hoffmann-LaRoche Ltd.,
`494 F. Supp. 2d 54 (D. Mass. 2007) ............................................................................................ 7
`
`Key Pharm. v. Hercon Labs. Corp.,
`161 F.3d 709 (Fed. Cir. 1998) ...................................................................................................... 7
`
`Markman v. Westview Instruments, Inc.,
`517 U.S. 370 (1996) ................................................................................................................. 1, 7
`
`Packet Intelligence LLC v. Cisco Sys., Inc.,
`No. 2:14-cv-00252-JRG (E.D. Tex.) ............................................................................................ 2
`
`Packet Intelligence LLC v. Ericsson Inc. et al.,
`No. 2:18-cv-00382 (E.D. Tex.) .................................................................................................... 2
`
`Packet Intelligence LLC v. NetScout Sys., Inc.,
`No. 2019-2041 (Fed. Cir. July 14, 2020) ............................................................................ passim
`
`Pass & Seymour, Inc. v. Hubbell Inc.,
`2011 U.S. Dist. LEXIS 1135 (N.D.N.Y. Jan 5, 2011) ................................................................. 7
`
`Rambus Inc. v. Hynix Semiconductor Inc.,
`569 F. Supp. 2d 946 (N.D. Cal. 2008) ......................................................................................... 7
`
`
`
`
`
`
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`ii
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-02471-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2068
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 3 of 15
`
`

`

`Case 3:19-cv-02471-WHO Document 68 Filed 07/21/20 Page 4 of 15
`
`
`
`I.
`
`INTRODUCTION
`
`Last week, the Federal Circuit issued its opinion in Packet Intelligence LLC v. NetScout
`
`Systems, Inc., et al., No. 2019-2041 (Fed. Cir. July 14, 2020), addressing these disputed terms. The
`
`Court: (1) affirmed the jury verdict of willful infringement; (2) affirmed the validity of the asserted
`
`claims under §§ 101, 102(a), and 102(f); and (3) affirmed all damages-related findings other than
`
`pre-suit damages.
`
`The Court described the inventions of the patents-in-suit1 as follows:
`
`[The asserted patents] teach a method for monitoring packets exchanged over a
`computer network. A stream of packets between two computers is called a
`connection flow. ’789 patent col. 2 ll. 43–45. Monitoring connection flows cannot
`account for disjointed sequences of the same flow in a network. Id. col. 3 ll. 56–59.
`The specifications explain that it is more useful to identify and classify
`“conversational flows,” defined as “the sequence of packets that are exchanged in
`any direction as a result of an activity.” Id. col. 2 ll. 45–47. Conversational flows
`provide application-specific views of network traffic and can be used to generate
`helpful analytics to understand network load and usage. See ’751 patent col. 3 l. 2–
`col. 4 l. 11.
`
`Packet Intelligence LLC v. NetScout Sys., Inc., No. 2019-2041, slip op. at 3 (Fed. Cir. July 14,
`
`2020) [hereinafter NetScout Appeal]. In affirming the infringement verdict, the Court addressed the
`
`following term from representative claim 19 of the ’789 Patent: “a memory for storing a database
`
`comprising none or more flow-entries for previously encountered conversational flows, each flow-
`
`entry identified by identifying information stored in the flow entry.” See id. at 8. The Court held
`
`that “the claims do not require the joining of connection flows into conversational flows.” Id. As
`
`detailed below, in so holding, the Court rejected PAN’s positions for the “flow-entry database”
`
`terms as well as the “flow/existing flow/new flow” terms. The Federal Circuit’s holding is binding
`
`in this proceeding. Markman v. Westview Instruments, Inc., 517 U.S. 370, 390-91 (1996)
`
`(“[T]reating interpretive issues as purely legal will promote (though it will not guarantee)
`
`intrajurisdictional certainty through the application of stare decisis . . . .”).
`
`
`1 The NetScout appeal related to the ’725, ’751, and ’789 Patents. However, the parties in this case
`have not disputed that like terms across the patents warrant like constructions. Thus, the Federal
`Circuit’s analysis is binding as to terms at issue in this case.
`1
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-02471-WHO
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2068
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 4 of 15
`
`

`

`Case 3:19-cv-02471-WHO Document 68 Filed 07/21/20 Page 5 of 15
`
`
`
`II. DISPUTED TERMS FOR CONSTRUCTION
`
`A.
`
`“conversational flow(s)”/ “conversational flow-sequence”
`
`Claim Term
`
`“conversational flow(s)”/
`“conversational flow-
`sequence”
`
`All Asserted Claims
`
`
`Packet Intelligence’s
`Construction
`“the sequence of packets that
`are exchanged in any
`direction as a result of an
`activity—for instance, the
`running of an application on a
`server as requested by a
`client—and where some
`conversational flows involve
`more than one connection,
`and some even involve more
`than one exchange of packets
`between a client and server”
`
`
`Palo Alto Networks’
`Construction
`Indefinite.
`
`Alternatively, “the sequence
`of packets that are exchanged
`in any direction as a result of
`specific software program
`activity (for instance, the
`running of a specific
`videoconference program),
`where such packets form
`multiple connection flows
`that are linked based on that
`activity (for instance, linking
`an audio connection and a
`video connection that result
`from the same
`videoconference).”
`
`PAN first alleges that this coined term is indefinite, relying on allegedly conflicting
`
`arguments made in litigation and IPR proceedings. See ECF No. 67 at 3-13 [hereinafter Response].
`
`But PAN presents its evidence without context and refuses to accept that some conversational flow
`
`exchanges include multiple connections—and some only include a single connection. Packet
`
`Intelligence has consistently argued that the specification defines the scope of both “conversational
`
`flow” and “connection flow.” And the Federal Circuit addressed conversational flows and
`
`connection flows when affirming the jury’s infringement verdict in NetScout.
`
`This term has been discussed and construed in several prior proceedings.2 And in every
`
`proceeding in which it was construed, the construction mirrored that proposed by Packet
`
`Intelligence in this case. That is because “conversational flow” is explicitly defined in the
`
`specification. See NetScout Appeal, No. 2019-2041, slip op. at 3 (“The specifications explain that
`
`
`2 See ECF No. 63 [hereinafter Opening Brief] at 7-8 (detailing prior tribunals that have construed
`“conversational flow”); see also Packet Intelligence LLC v. Cisco Sys., Inc., No. 2:14-cv-00252-
`JRG (E.D. Tex.), ECF Nos. 89, 95, and 96 (claim construction opening brief, response brief, and
`reply brief, respectively); Packet Intelligence LLC v. Ericsson Inc., et al., No. 2:18-cv-00381-JRG
`(E.D. Tex.), ECF Nos. 95, 102, and 104 (claim construction opening brief, response brief, and reply
`brief, respectively).
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`2
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-02471-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2068
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 5 of 15
`
`

`

`Case 3:19-cv-02471-WHO Document 68 Filed 07/21/20 Page 6 of 15
`
`
`
`it is more useful to identify and classify ‘conversational flows,’ defined as ‘the sequence of packets
`
`that are exchanged in any direction as a result of an activity.’” (emphasis added)). And despite this
`
`term being briefed in at least three prior district court cases (plus the co-pending case against
`
`Juniper), no party or court has ever alleged or ruled that the term “conversational flow” is indefinite.
`
`Given the battle-tested history of the patents-in-suit, PAN tries to manufacture inconsistencies by
`
`omitting or distorting the context of the prior proceedings. See Response at 5 (listing five purported
`
`inconsistencies). Packet Intelligence addresses each below.
`
`First, “connection flow” and “conversational flow” are not the same thing. The patent
`
`specification defines each:
`
`The term “connection flow” is commonly used to describe all the packets involved
`with a single connection. A conversational flow, on the other hand, is the sequence
`of packets that are exchanged in any direction as a result of an activity-for instance,
`the running of an application on a server as requested by a client. It is desirable to
`be able to identify and classify conversational flows rather than only connection
`flows. The reason for this is that some conversational flows involve more than one
`connection, and some even involve more than one exchange of packets between a
`client and server.
`
`ECF 63-2 [hereinafter ’099 Patent] at 2:35-45. The two flow types are different because a
`
`“connection flow” is determined by the endpoint addresses of a single connection (i.e., the source
`
`and destination IP addresses and port numbers). This information is gleaned from the IP layer (layer
`
`3) and TCP/UDP layer (layer 4) of a packet. A conversational flow, however, is the sequence of
`
`packets exchanged in any direction as a result of an activity. Monitoring only connection flows
`
`does not require an analysis of the “activity” to which the connection relates. Some activities may
`
`involve a single connection (e.g., sending an email message), while some may involve several
`
`connections (e.g., a skype video/audio call).
`
`Determining the underlying activity is protocol dependent, and often requires information
`
`from the Application Layer (layer 7). See, e.g., ’099 Patent at 14:63-66 (“The state processor 328
`
`analyzes both new and existing flows in order to analyze all levels of the protocol stack, ultimately
`
`classifying the flows by application (level 7 in the ISO model).”). This application-specific
`
`information is accounted for in the claims, for example, by the “parsing/extraction operations
`
`memory configured to store a database of parsing/extraction operations that includes information
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`3
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-02471-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2068
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 6 of 15
`
`

`

`Case 3:19-cv-02471-WHO Document 68 Filed 07/21/20 Page 7 of 15
`
`
`
`describing how to determine at least one of the protocols used in a packet from data in the packet.”
`
`Id. at 35:9-13. Additionally, the state patterns/operations memory includes application and protocol
`
`specific information used to discern the “activity” to which a given flow relates: “a state
`
`patterns/operations memory configured to store a set of predefined state transition patterns and state
`
`operations such that traversing a particular transition pattern as a result of a particular
`
`conversational flow-sequence of packets indicates that the particular conversational flow-sequence
`
`is associated with the operation of a particular application program.” Id. at 35:31-37. Endpoint
`
`addresses, which define a connection flow, are typically insufficient to determine the “activity” to
`
`which a packet (or sequence of packets) relates. See, e.g., id. at 10:8-11:23 (describing packet
`
`analysis at multiple protocol layers to recognize the underlying application and activity).
`
`PAN’s next two points address whether a “conversational flow” requires linking more than
`
`one connection flow. As detailed in Packet Intelligence’s opening brief, and noted above, whether
`
`a conversational flow links more than one connection flow depends on the nature of the activity
`
`involved. Some activities involve a single connection—others involve multiple connections. Packet
`
`Intelligence’s arguments within the IPR context simply explained that the prior art reference
`
`(Engel) did not have the ability to correlate connection flows based on the underlying activity. See
`
`ECF No. 67-6 at 3 (“One of the key novel features of the ’099 patent, and the focus of the arguments
`
`in this preliminary response, is the ability to relate individual packets to one another into
`
`‘conversational flows.’” (emphasis added)). PAN’s highlighted passage on the same page indicates
`
`that packets and connection flows are related “based on specific application activity.” These
`
`arguments are not inconsistent with Packet’s proposed construction, and they do not require that
`
`every conversational flow must include packets from more than one connection.
`
`PAN’s final two points relate to network activity and how that relates to applications and/or
`
`protocols. Within the IPR context, Packet Intelligence explained that simply grouping all packets
`
`of a particular protocol together was different from grouping the packets that result from an activity.
`
`As an example, two different Skype calls would represent two different conversational flow
`
`exchanges. A monitor that simply grouped or related all “Skype” communications would simply
`
`be grouping by protocol, regardless of the number of underlying activities that created the packet
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`4
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-02471-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2068
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 7 of 15
`
`

`

`Case 3:19-cv-02471-WHO Document 68 Filed 07/21/20 Page 8 of 15
`
`
`
`exchanges. PAN takes this discussion out of context to manufacture a purported inconsistency.
`
`Next, PAN briefly addresses dicta from Judge Gilstrap in Sandvine. Judge Gilstrap’s
`
`statement that “this construction requires ‘more than one connection’” (Response at 12) just means
`
`that those words are within the construction: “the sequence of packets that are exchanged in any
`
`direction as a result of an activity—for instance, the running of an application on a server as
`
`requested by a client—and where some conversational flows involve more than one connection,
`
`and some even involve more than one exchange of packets between a client and server.” ECF No.
`
`63-9 at 6 (emphasis added). PAN’s continued assertion that Packet Intelligence has taken
`
`inconsistent positions in litigation and IPRs (see Response at 12) is at best a mischaracterization of
`
`the record. NetScout made similar arguments, and the Federal Circuit discredited them. See
`
`NetScout Appeal, 2019-2041, slip op. at 8 (“Even if NetScout were correct that the claims require
`
`correlating connection flows into conversational flows . . . the FSB contains flow entries and the
`
`information in the flow record can be used to correlate or associate flow entries into conversational
`
`flows.”).
`
`The Court should reject PAN’s argument that “conversational flow” is indefinite. Multiple
`
`forums have addressed this term, and none have suggested that this term is indefinite. On the
`
`contrary, every forum to address this term has adopted a construction that mirror’s Packet
`
`Intelligence’s proposed construction. As detailed in Packet Intelligence’s Opening Brief, the Court
`
`should also reject PAN’s proposed construction—it unnecessarily injects long passages with no
`
`relation to the definitional language of the specification. This Court should adopt Packet’s proposed
`
`construction, which has been adopted by the PTAB as well as district courts.
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`5
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-02471-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2068
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 8 of 15
`
`

`

`Case 3:19-cv-02471-WHO Document 68 Filed 07/21/20 Page 9 of 15
`
`
`
`B.
`
`“a flow-entry database” terms
`
`Claim Term
`
`“a flow-entry database / a
`database…for previously
`encountered conversational
`flows/for conversational
`flows encountered by the
`monitor”
`
`’099 claim 1
`’646 claims 1, 7
`’751 claim 1
`’789 claims 1, 19, 44
`
`
`Palo Alto Networks’
`Construction
`“a flow-entry database / a
`database … for previously
`encountered conversational
`flows / for conversational
`flows encountered by the
`monitor, where each
`conversational flow has a
`separate entry in the flow-
`entry database.”
`
`
`Packet Intelligence’s
`Construction
`PI proposes to construe “flow
`entry database” as “a database
`configured to store entries,
`where each entry describes a
`flow”
`
`No further construction
`necessary beyond that
`proposed for “flow entry
`database.”
`
`
`PAN summarized the dispute for these terms as follows:
`
`Does a “flow entry database . . . for conversational flows” encompass a database of
`only connection flow entries where such entries could be linked into a
`conversational flow, as PI contends; or, does it require that such linkage actually
`occur, so that each conversational flow has a separate entry in the database, as PAN
`contends and as applicants stated during prosecution?
`
`Response at 16-17 (emphasis omitted). The Federal Circuit has now resolved this dispute, agreeing
`
`with Packet Intelligence’s position.
`
`In the NetScout appeal, NetScout argued that “a memory for storing a database comprising
`
`none or more flow-entries for previously encountered conversational flows” required a database of
`
`already correlated flow entries—i.e., the database cannot contain connection flow entries. See
`
`NetScout Appeal, No. 2019-2041, slip op. at 7-8 (“NetScout argues that the limitation requires
`
`correlating connection flows
`
`into conversational flows.”). This served as NetScout’s
`
`noninfringement position because its accused products maintain information about connection
`
`flows. See id. at 8 (“In NetScout’s view, the record establishes that the accused products track
`
`connection flows but never join them together.”). Packet Intelligence responded to “NetScout’s
`
`claim construction argument, [stating] . . . that the claims do not require joining flows into a single
`
`conversational flow.” Id. The Federal Circuit agreed with Packet Intelligence and rejected
`
`NetScout’s proposed claim construction:
`
`We first agree with Packet Intelligence that the claims do not require the joining of
`connection flows into conversational flows. The term “conversational flow”
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`6
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-02471-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2068
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 9 of 15
`
`

`

`Case 3:19-cv-02471-WHO Document 68 Filed 07/21/20 Page 10 of 15
`
`
`
`appears in claim 19’s memory limitation: “a memory for storing a database
`comprising none or more flow-entries for previously encountered conversational
`flows, each flow-entry identified by identifying information stored in the flow
`entry.” ’789 patent col. 36 ll. 45–48. Contrary to NetScout’s argument, however, a
`limitation requiring memory for storing flow entries for previously encountered
`conversational flows does not require the added action of correlating connection
`flow entries into conversational flows.
`
`Id. (emphases added).
`
`The Federal Circuit has squarely addressed the claim construction proposed by PAN, and it
`
`rejected that proposed construction. And neither party has alleged that the flow-entry database
`
`limitations should be construed differently across the patents. Thus, the Federal Circuit’s holding
`
`in the NetScout appeal is binding in this proceeding. See Markman, 517 U.S. at 390–91 (“[T]reating
`
`interpretive issues as purely legal will promote (though it will not guarantee) intrajurisdictional
`
`certainty through the application of stare decisis . . . .”). The Federal Circuit has “recognize[d] the
`
`national stare decisis effect that [its] decisions on claim construction have.” Key Pharm. v. Hercon
`
`Labs. Corp., 161 F.3d 709, 716 (Fed. Cir. 1998); see also Rambus Inc. v. Hynix Semiconductor
`
`Inc., 569 F. Supp. 2d 946, 963–64 (N.D. Cal. 2008) (“A district court must apply the Federal
`
`Circuit’s claim construction even where a non-party to the initial litigation would like to present
`
`new arguments.”); Amgen, Inc. v. F. Hoffmann-LaRoche Ltd., 494 F. Supp. 2d 54, 60–61 (D. Mass.
`
`2007) (holding when the Federal Circuit has already construed claims, that Court’s construction is
`
`binding and district courts may not modify its holding); Pass & Seymour, Inc. v. Hubbell Inc., No.
`
`5:07-CV-945 (NAM/DEP), 2011 U.S. Dist. LEXIS 1135, at *4 (N.D.N.Y. Jan. 5, 2011) (“[D]istrict
`
`courts are bound to apply the Federal Circuit’s claim constructions, even as against non-parties to
`
`the initial litigation.”). For these reasons, the Court should adopt Packet Intelligence’s proposed
`
`construction.
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`7
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-02471-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2068
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 10 of 15
`
`

`

`Case 3:19-cv-02471-WHO Document 68 Filed 07/21/20 Page 11 of 15
`
`
`
`C.
`
`“the flow”/ “existing flow” / “new flow”
`
`Claim Term
`
`“the flow” / “existing flow” /
`“new flow”
`
`’099 claims 1, 2
`’725 claim 16
`’646 claims 1, 7, 16
`’751 claims 1, 5, 10, 15
`’789 claims 1, 13, 14, 16, 19,
`44
`
`
`Palo Alto Networks’
`Construction
`“the conversational flow” /
`“existing conversational flow”
`/ “new conversational flow”
`
`Packet Intelligence’s
`Construction
`No construction necessary
`
`Alternatively:
`construe
`to
`PI proposed
`“flow” as “a stream of packets
`being exchanged between any
`two addresses in the network”
`
`The Federal Circuit resolved this dispute when it addressed the flow-entry database terms.
`
`See supra Section II.B. As detailed above, the Federal Circuit held that the claimed “memory
`
`storing a flow-entry database” need not include already correlated connection flow entries. See
`
`NetScout Appeal, No. 2019-2041, slip op. at 8 (“[A] limitation requiring memory for storing flow
`
`entries for previously encountered conversational flows does not require the added action of
`
`correlating connection flow entries into conversational flows.” (emphasis omitted)). PAN’s
`
`proposed construction is inconsistent with the Federal Circuit’s holding.
`
`Relying on Claim 19 of the ’789 Patent, as the Federal Circuit did, illustrates the issue. First,
`
`the claim includes “a memory for storing a database comprising none or more flow-entries for
`
`previously encountered conversational flows . . . .” ECF No. 63-6 [hereinafter ’789 Patent] at
`
`36:45-47. Then, it requires “a lookup engine . . . to lookup whether the particular packet . . . has a
`
`matching flow-entry, the looking up using at least some of the selected packet portions and
`
`determining if the packet is of an existing flow . . . .” Id. at 36:49-55 (emphasis added). Finally, the
`
`claim recites:
`
`a flow insertion engine . . . configured to create a flow-entry in the flow-entry
`database, the flow-entry including identifying information for future packets to be
`identified with the new flow-entry, the lookup engine configured such that if the
`packet is of an existing flow, the monitor classifies the packet as belonging to the
`found existing flow; and if the packet is of a new flow, the flow insertion engine
`stores a new flow-entry for the new flow in the flow-entry database…
`
`Id. at 36:56-65 (emphasis added). Notably, if the packet is of “a new flow,” then a flow entry for
`
`that new flow is stored in the flow-entry database. And the Federal Circuit confirmed that the flow-
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`8
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-02471-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2068
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 11 of 15
`
`

`

`Case 3:19-cv-02471-WHO Document 68 Filed 07/21/20 Page 12 of 15
`
`
`
`entry database can comprise connection flow entries. For this reason, PAN’s arguments that the “a
`
`new flow” and “an existing flow” terms must specify a “conversational flow” should be rejected.
`
`D.
`
`“a protocol/state identification mechanism…configured to determine the protocol
`and state of the conversational flow of the packet”
`
`Claim Term
`
`“a protocol/state identification
`mechanism…configured to
`determine the protocol and
`state of the conversational
`flow of the packet”
`
`’099 claim 1
`
`
`Palo Alto Networks’
`Construction
`A means-plus-function term
`governed by 35 U.S.C. §
`112(6).
`
`Function: determine the
`protocol and state of the
`conversational flow of the
`packet.
`
`Structure: Indefinite.
`
`Packet Intelligence’s
`Construction
`Not subject to §112, ¶ 6; No
`construction necessary.
`
`Alternative if §112, ¶ 6:
`
`Function: determine the
`protocol and state of the
`conversational flow of a
`packet
`
`Structure: state processor
`instruction database 326 and
`hardware or processor
`running the algorithm
`described by ’099 Patent at
`14:38-46 and equivalents
`thereof.
`
`
`The claimed “protocol/state identification mechanism” does not recite the word “means.”
`
`As a result, this limitation is entitled to a presumption that § 112, ¶ 6 does not apply. See Opening
`
`Brief at 15-16. To the extent the Court disagrees, the term is not indefinite because the specification
`
`details sufficient structure for one of skill in the art to implement the claimed “protocol/state
`
`identification mechanism.”
`
`Specifically, Packet Intelligence identified the state processor instruction database 326 as
`
`corresponding structure. This database contains the state-based information for each of the
`
`corresponding protocols recognized by the packet monitor.
`
`The other internal data structure that is built by compiler 310 is the set of state
`patterns and processes 326. These are the different states and state transitions that
`occur in different conversational flows, and the state operations that need to be
`performed (e.g., patterns that need to be examined and new signatures that need to
`be built) during any state of a conversational flow to further the task of analyzing
`the conversational flow.
`
`Thus, compiling the PDL files and layer selections provides monitor 300 with the
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`9
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-02471-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2068
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 12 of 15
`
`

`

`Case 3:19-cv-02471-WHO Document 68 Filed 07/21/20 Page 13 of 15
`
`
`
`information it needs to begin processing packets. In an alternate embodiment, the
`contents of one or more of databases 308 and 326 may be manually or otherwise
`generated. Note that in some embodiments the layering selections information is
`inherent rather than explicitly described. For example, since a PDL file for a
`protocol includes the child protocols, the parent protocols also may be determined.
`
`’099 Patent at 12:47-64 (emphases added). The “information [the monitor] needs to begin
`
`processing packets” includes the initial state information for a given protocol. This information is
`
`then maintained and updated for particular flows as packets are processed. See id. at 14:59-62
`
`(“State processor 328 carries out any state operations specified for the state

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket