throbber
Case 3:19-cv-04741-WHO Document 57 Filed 06/04/20 Page 1 of 25
`
`
`
`Brian A.E. Smith (SBN 188147)
`Alden KW Lee (SBN 257973)
`Jeffrey D. Chen (SBN 267837)
`Joseph J. Fraresso (SBN 289228)
`BARTZO ZANKEL BUNZEL & MILLER
`One Embarcadero Center, Suite 800
`San Francisco, CA 94111
`Telephone: (415) 956-1900
`bsmith@bzbm.com
`alee@bzbm.com
`jchen@bzbm.com
`jfraresso@bzbm.com
`
`Attorneys for Defendant and
`Counterclaimant Packet Intelligence LLC
`
`[Additional counsel listed on signature page]
`
`
`UNITED STATES DISTRICT COURT
`NORTHERN DISTRICT OF CALIFORNIA
`SAN FRANCISCO DIVISION
`PACKET INTELLIGENCE LLC,
` Case No. 3:19-cv-04741-WHO
`
`
`PLAINTIFF PACKET INTELLIGENCE
`
`Plaintiff,
`LLC’S OPENING CLAIM
`
`CONSTRUCTION BRIEF
` v.
`
`
`
`JUNIPER NETWORKS, INC.,
`
`
`DEMAND FOR JURY TRIAL
`
`Defendant.
`
`
`
`
`
`
`
`
`
`PI’S OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2069
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 1 of 25
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`Case 3:19-cv-04741-WHO Document 57 Filed 06/04/20 Page 2 of 25
`
`Table of Contents
`
`INTRODUCTION ................................................................................................. 1
`I.
`BACKGROUND .................................................................................................. 1
`II.
`III. LEGAL STANDARDS .......................................................................................... 5
`IV. DISPUTED TERMS FOR CONSTRUCTION .......................................................... 6
`
`A. “conversational flow” / “conversational flow-sequence” ............................ 6
`
`1. The Specification Expressly Defines “Conversational Flow” ........... 6
`
`2. Defendant’s Arguments Fail to Negate the Express Definition of a
`“Conversational Flow” ................................................................................. 8
`
`B. “flow-entry database” .......................................................................................... 10
`
`C. “the flow” / “new flow” / “existing flow” ...................................................... 13
`
`D. “base protocol” ..................................................................................................... 15
`
`E. “slicer” ..................................................................................................................... 16
`
`F. “a protocol/state identification mechanism coupled to the state
`patterns/operations memory and to the lookup engine, the protocol/state
`identification engine configured to determine the protocol and state of
`the conversational flow of the packet” ............................................................. 17
`
`G. “claim preambles” ................................................................................................ 19
`
`V.
`
`CONCLUSION .................................................................................................. 20
`
`PI’S OPENING CLAIM CONSTRUCTION BRIEF
`
` CASE NO. 3:19-CV-04741-WHO
`
`i
`
`Packet Intelligence LLC Exh 2069
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 2 of 25
`
`

`

`Case 3:19-cv-04741-WHO Document 57 Filed 06/04/20 Page 3 of 25
`
`
`
`Table of Authorities
`
`Cases
`3M Innovative Props. Co. v. Tredegar Corp.
` 725 F.3d 1315 (Fed. Cir. 2013) ............................................................................................. 9, 10
`Allen Eng’g Corp. v. Bartell Indus., Inc.,
`299 F.3d 1336 (Fed. Cir. 2002) .................................................................................................. 19
`Applied Materials, Inc. v. Advanced Semiconductor Materials America, Inc.,
`98 F.3d 1563 (Fed. Cir. 1996) .................................................................................................... 20
`Aspex Eyewear, Inc. v. Marchon Eyewear, Inc.,
`672 F.3d 1335 (Fed. Cir. 2012) .................................................................................................. 19
`Cochlear Bone Anchored Sols. AB v. Octicon Med. AB,
`958 F. 3d 1348 (Fed. Cir. 2020) ........................................................................................... 19, 20
`Deere & Co. v. Bush Hog, LLC,
`703 F.3d 1349 (Fed. Cir. 2012) .................................................................................................. 20
`Innova/Pure Water, Inc. v. Safari Water Filtration Sys., Inc.,
`381 F.3d 1111 (Fed. Cir. 2004) .................................................................................................. 20
`Intervet Inc. v. Merial Ltd.,
`617 F.3d 1282 (Fed. Cir. 2010) .................................................................................................... 6
`Markman v. Westview Instruments, Inc.,
`517 U.S. 370 (1996) ..................................................................................................................... 5
`O2 Micro Int’l Ltd. v. Beyond Innovation Tech. Co.,
`521 F.3d 1351 (Fed. Cir. 2008) .................................................................................................. 15
`Omega Eng’g, Inc. v. Raytek Corp.
` 334 F.3d 1314 (Fed. Cir. 2003) ................................................................................................... 9
`On-Line Techs., Inc. v. Bodenseewerk Perkin-Elmer GMBH
` 386 F.3d 1133 (Fed. Cir. 2004) ................................................................................................. 12
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ............................................................................... 5, 6
`Renishaw PLC v. Marposs Societa’ per Azioni,
`158 F.3d 1243 (Fed. Cir. 1998) .................................................................................................... 6
`Rowe v. Dror,
`112 F.3d 473 (Fed. Cir. 1997) .................................................................................................... 20
`Sandvine Corp, et al. v. Packet Intelligence, LLC,
`IPR2017-00451, Paper 8 .......................................................................................................... 8, 9
`Sandvine Corp., et al v. Packet Intelligence, LLC,
`IPR2017-00630, Paper 9 .......................................................................................................... 8, 9
`Sandvine Corp., et al. v. Packet Intelligence, LLC,
`
`IPR2017-00450, Paper 8 .......................................................................................................... 8, 9
`Sandvine Corp., et al. v. Packet Intelligence, LLC,
`IPR2017-00629, Paper 8 .......................................................................................................... 8, 9
`ii
`
`PI’S OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2069
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 3 of 25
`
`

`

`Case 3:19-cv-04741-WHO Document 57 Filed 06/04/20 Page 4 of 25
`
`
`
`Sandvine Corp., et al. v. Packet Intelligence, LLC,
`IPR2017-00769, Paper 11 ............................................................................................................ 9
`Sandvine Corp., et al. v. Packet Intelligence, LLC,
`IPR2017-00769, Paper 6 .............................................................................................................. 9
`Sandvine Corp., et al. v. Packet Intelligence, LLC,
`IPR2017-00769, Paper 8 .......................................................................................................... 8, 9
`Sandvine Corp., et al. v. Packet Intelligence, LLC,
`IPR2017-00862, Paper 8 .......................................................................................................... 8, 9
`Teva Pharm. USA, Inc. v. Sandoz, Inc.,
` 135 S. Ct. 831 (2015) .................................................................................................................. 5
`TomTom, Inc. v. Adolph,
`790 F.3d 1315 (Fed. Cir. 2015) .................................................................................................. 19
`U.S. Surgical Corp. v. Ethicon, Inc.,
`103 F.3d 1554 (Fed. Cir. 1997) .................................................................................................. 15
`Vitronics Corp. v. Conceptronic, Inc.,
`90 F.3d 1576 (Fed. Cir. 1996) ...................................................................................................... 6
`
`
`
`
`
`
`
`iii
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`PI’S OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2069
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 4 of 25
`
`

`

`Case 3:19-cv-04741-WHO Document 57 Filed 06/04/20 Page 5 of 25
`
`
`
`I.
`
`INTRODUCTION
`This case involves five related patents: U.S. Patent Nos. 6,651,099 (“the ’099 Patent”)
`(attached as Ex. A); 6,665,725 (“the ’725 Patent”) (attached as Ex. B); 6,771,646 (“the ’646
`Patent”) (attached as Ex. C); 6,839,751 (“the ’751 Patent”) (attached as Ex. D); and 6,954,789 (“the
`’789 Patent”) (attached as Ex. E) (collectively “the Patents-in-Suit”).1 Each of the patents claims
`priority to and incorporates by reference Provisional Application No. 60/141,903 (“Provisional”)
`(attached as Ex. F), and thus the Provisional forms part of the intrinsic evidence.
`The Patents-in-Suit generally address classifying and monitoring network traffic passing
`through one or more nodes or points in the network. Traffic classification involves detecting the
`underlying protocols implemented in the network traffic, as well as the applications or user activity
`responsible for generating the network traffic. Traffic monitoring involves tracking the state of the
`underlying protocols along with relevant network traffic statistics. Such classification and
`monitoring provide network administrators with detailed information about their networks that can
`be used to diagnose network problems, control bandwidth allocation, bill for use of the network,
`and ensure an appropriate quality of service on a per-user granular basis.
`Packet’s proposed constructions adhere to the well–known principles of claim construction
`and stem from the plain and ordinary meaning of the terms at issue, in light of the specification’s
`teachings. Defendant’s proposed constructions, on the other hand, generally seek to import
`extraneous limitations or ignore key disclosures to manufacture non-infringement and invalidity
`positions. Because Packet’s constructions follow the canons of patent law and properly balance
`granting the full scope of Applicants’ invention while ensuring that the public has proper notice of
`the scope of the invention, Packet respectfully requests that the Court adopt its proposed
`constructions for the disputed terms described below and reject Defendant’s proposed
`constructions.
`II. BACKGROUND
`Before discussing the invention, it is useful to understand certain fundamentals regarding
`
`network traffic. The Open Systems Interconnection (“OSI”) model represents the protocol layers
`
`1 The specifications of the Patents-in-Suit are similar. Generally, the patent that includes the claims
`at issue for a given term is cited here.
`
`1
`
`PI’S OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2069
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 5 of 25
`
`

`

`Case 3:19-cv-04741-WHO Document 57 Filed 06/04/20 Page 6 of 25
`
`
`
`often used in network communication. This model (as developed by the International Standards
`Organization) contains the seven layers shown below:
`
`
`See Ex. A (’099 Pat.) at 9:35–50; see also ECF 54-2 (Almeroth Dec.) ¶¶ 38, 49-52 (attached as Ex.
`G).
`
`The Application layer (layer 7) is the highest-level layer while the Physical layer (layer 1)
`is the lowest level layer. See Ex. G ¶¶ 39, 50. These layers provide a model for describing common
`formats used in network communications. Each layer serves a particular purpose within the network
`communication model. The Application layer represents the application protocol used in a network
`communication and is typically the protocol that the user’s application uses to communicate. For
`instance, the Skype application uses its proprietary protocol, along with standard protocols for
`audio and video, if required. Similarly, web browsers use the HTTP protocol.
`The Network layer (layer 3) includes protocols such as the Internet Protocol, also known as
`IP, used to support network routing decisions that guide traffic through the Internet. Id. ¶¶ 44-47.
`The Physical layer (layer 1) includes protocols such as Ethernet, which control the transmission of
`raw data onto the wire. Protocol layering is accomplished by encapsulation, which is taking a
`higher-level protocol message and packaging it up into one or more lower‐level protocol messages.
`Several layers, or protocols, may be involved in a network communication:
`
`
`
`2
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`PI’S OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2069
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 6 of 25
`
`

`

`Case 3:19-cv-04741-WHO Document 57 Filed 06/04/20 Page 7 of 25
`
`
`
`See Ex. G ¶ 53. In forming a network transmission, an application writes a message in an application
`layer protocol, for example, HTTP or Skype protocol; this is OSI layer 7. See Ex. G ¶¶ 53-57.
`Before transmission, and after possible encapsulation in layers 6, 5, and/or 4, the message is broken
`into one or more IP messages (or packets) that are written in the IP protocol at layer 3. Id. Each of
`these IP packets typically includes a header with information specific to the IP protocol, such as
`the source IP address, destination IP address, a checksum (for error detection), and the length of
`the packet. Id. The header is followed by a data portion that includes a fragment (or portion) of the
`higher‐level protocol transmission. For example, the data portion of the message in the illustration
`above may be split into several smaller portions and sent separately, with each of those portions
`including an IP header. Id. At this point, the original message has been fragmented and encapsulated
`into multiple IP messages. Put differently, the layer 7 message is encapsulated into a set of layer 3
`messages. Id.
`Each of these layer 3 IP messages may be further encapsulated into one or more Ethernet
`messages (or packets) during the transmission process, as the message progresses from sender,
`through the Internet, to a recipient. Id. The Ethernet packets will have a header with Ethernet‐
`specific information that is added to the IP packet, while the data portion will contain the pieces of
`data that comprise the IP message. Id. The original message may get encapsulated several times
`during the transmission process. Id. At this point, the Ethernet packets are placed directly on the
`
`wire (e.g., the Ethernet) for transmission. The receiving client or server will receive the Ethernet
`
`PI’S OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`3
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2069
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 7 of 25
`
`

`

`Case 3:19-cv-04741-WHO Document 57 Filed 06/04/20 Page 8 of 25
`
`
`
`messages, and the messages will be unpacked and re‐combined to form the original message—first
`combining the Ethernet messages to create the IP messages. During this process, the headers of the
`Ethernet packets are removed and the data portions are concatenated to form an IP message. Id.
`Then, the IP messages will be combined to create the original message again—now on the receiving
`client or server—which is then processed by the appropriate application on the receiving
`client/server.
`Turning to the inventions disclosed in the Patents-in-Suit, conventional network monitors
`categorize network transmissions into “connection flows.” A connection flow refers to “all the
`packets involved with a single connection.” Ex. A (’099 Pat.) at 2:34-37. A connection is typically
`characterized by a tuple of elements including the (1) source IP address, (2) destination IP address,
`(3) source port, (4) destination port, and (5) transport protocol. Thus, a connection flow correlates
`to source and destination IP address/port pairs used on both ends of the connection. The network
`monitor disclosed in the Patents-in-Suit categorizes network transmissions into “conversational
`flows.” Unlike connection flows, which relate to a negotiated transmission between specific
`addresses on two devices, a conversational flow is the sequence of packets that are exchanged in
`any direction as a result of an activity—for instance, the running of an application on a server as
`requested by a client—which may include multiple connections, transmissions, or exchanges in
`either direction between the participants in the conversation. For example, a Voice Over IP (VOIP)
`call made between two parties using the Skype application may involve multiple connections as
`the VOIP call ensues. The ability to relate together the separate connections for a user activity and
`recognize the underlying application is a focus of the present invention. This allows the owner or
`administrator of the network to make intelligent decisions regarding certain usage of the network,
`while maintaining the quality of the network communications.
`Figure 3 of the Patents-in-Suit provides a high‐level overview of a preferred embodiment
`of the claimed network monitor, which can be implemented with computer hardware and/or
`software. See Ex. A (’099 Pat.) at 11:43-45. The disclosed packet monitor includes two significant
`
`components: (1) Parser 301; and (2) Analyzer 303. See id. at 11:59-65. The Parser maintains a
`database of parsing and extraction operations to be used on packets to extract identifying
`
`PI’S OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`4
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2069
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 8 of 25
`
`

`

`Case 3:19-cv-04741-WHO Document 57 Filed 06/04/20 Page 9 of 25
`
`
`
`information from the packet. See id. at 12:17-22; 12:65-13:20. This data is then passed to the
`Analyzer, which checks if the packet is of a new or existing flow. See id. at 13:54-61. The Analyzer
`maintains state information for each flow, and as new packets for a given flow are received, the
`state is updated accordingly. See id. at 13:37-41. The state information is used to ultimately classify
`or identify the application and/or protocol corresponding to the flow. See id. at 15:30-42. Unlike
`prior art monitors that relied on port numbers to identify application layer protocols, the Patents-
`in-Suit teach a progressive process that uses state operations programmed into the network monitor
`to discover the identity of the application layer protocol. See id. at 15:18-29. The Analyzer is also
`responsible for determining the status of conversational flows and determining when a flow is final.
`See id. at 15:55-65. The Asserted Patents disclose both hardware and software embodiments. See
`id. at 11:43-45.
`In identifying discrete or disjointed connections initiated by the same activity, one benefit
`of the disclosed invention is the ability to identify that seemingly discrete or disjointed connections
`are actually related to the same “conversational flow.” That is, unlike the prior art, the invention
`can parse and analyze the information in packets for classification into a “conversational flow.”
`III. LEGAL STANDARDS
`Courts construe the meaning of disputed claim terms as a matter of law that may contain
`underlying questions of fact. Markman v. Westview Instruments, Inc., 517 U.S. 370, 389-90
`(1996); Teva Pharm. USA, Inc. v. Sandoz, Inc., 135 S. Ct. 831, 839-40 (2015). In determining a
`term’s meaning, “[a] court looks to ‘those sources available to the public that show what a person
`of skill in the art would have understood disputed claim language to mean,’” including “‘the
`words of the claims themselves, the remainder of the specification, the prosecution history, and
`extrinsic evidence….’” Phillips v. AWH Corp., 415 F.3d 1303, 1314 (Fed. Cir. 2005) (en banc).
`The intrinsic evidence (i.e., the claims, the patent specification, and the prosecution
`history, if in evidence) form a hierarchy of interpretive guides. The claims form the first tier of
`the hierarchy and “provide substantial guidance as to the meaning of particular claim terms.”
`
`Phillips, 415 F.3d at 1314-15. The rest of the specification forms the second tier and is “always
`highly relevant to the claim construction analysis. Usually, it is dispositive; it is the single best
`
`PI’S OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`5
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2069
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 9 of 25
`
`

`

`Case 3:19-cv-04741-WHO Document 57 Filed 06/04/20 Page 10 of 25
`
`
`
`guide to the meaning of a disputed term.” Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576,
`1582 (Fed. Cir. 1996). Finally, the prosecution history “provides evidence of how the PTO and
`the inventor understood the patent.” Phillips, 415 F.3d at 1317.
`This hierarchy notwithstanding, “the claim construction inquiry…begins and ends in all
`cases with the actual words of the claim.” Renishaw PLC v. Marposs Societa’ per Azioni, 158
`F.3d 1243, 1248 (Fed. Cir. 1998) (citations omitted). The specification may inform the meaning
`of claim terms, but it does not change those meanings unless the patentee has chosen to be his
`own lexicographer. See Phillips, 415 F.3d at 1321; Vitronics, 90 F.3d at 1582.
`IV. DISPUTED TERMS FOR CONSTRUCTION
`
`A.
`
`“conversational flow” / “conversational flow-sequence”
`
`flow”/
`flow-
`
`Claim Term
`
`“conversational
`“conversational
`sequence”
`
`’099 claims 1, 5
`’725 claims 10, 17
`’646 claims 1, 7, 16;
`’751 claims 1, 17;
`’789 claims 1, 19, 44
`
`Packet Intelligence’s
`Construction
`the sequence of packets that
`are exchanged in any direction
`as a result of an activity—for
`instance, the running of an
`application on a server as
`requested by a client—and
`where some conversational
`flows involved more than one
`connection, and some even
`involve more
`than
`one
`exchange of packets between a
`client and server.
`
`Juniper’s Construction
`
` “The sequence of packets that
`are exchanged in any direction
`as a result of specific software
`program activity, where such
`packets
`form
`multiple
`connection
`flows
`that are
`linked based on that activity”
`
`Packet’s proposed construction tracks the definitional language from the specification and
`tracks prior constructions adopted by both a United States District Court and, separately, the Patent
`Trial and Appeals Board. None of the evidence cited by Defendant warrants varying from the
`specification’s express definition and decisions confirming this construction.
`1. The Specification Expressly Defines “Conversational Flow”
`
`First, Packet’s proposed construction tracks the definitional language from the
`
`specification. Coined terms like conversational flow “are best understood by reference to the
`specification.” Intervet Inc. v. Merial Ltd., 617 F.3d 1282, 1287 (Fed. Cir. 2010). The specification
`
`defines “conversational flow” as:
`Some prior art packet monitors classify packets into connection flows. The term
`“connection flow” is commonly used to describe all the packets involved with a
`6
`
`PI’S OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2069
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 10 of 25
`
`

`

`Case 3:19-cv-04741-WHO Document 57 Filed 06/04/20 Page 11 of 25
`
`
`
`single connection. A conversational flow, on the other hand, is the sequence of
`packets that are exchanged in any direction as a result of an activity—for instance,
`the running of an application on a server as requested by a client. It is desirable to
`be able to identify and classify conversational flows rather than only connection
`flows. The reason for this is that some conversational flows involve more than one
`connection, and some even involve more than one exchange of packets between a
`client and server. This is particularly true when using client/server protocols such
`as RPC, DCOMP, and SAP, which enable a service to be set up or defined prior to
`any use of that service.
`
`Ex. A (’099 Pat.) at 2:34-48 (emphases added); Ex. E (’789 Pat.) at 2:42-56; see also Ex. F
`(Provisional) at 3:3-12 (including a nearly identical statement). Both parties’ proposals incorporate
`much of the underlined language above.
`An initial dispute regards the notion of “activity” as recited in the specification’s definition
`of conversational flow. Packet’s proposal tracks the language in the specification. Defendant’s
`proposal, however, seeks to replace the exemplary definition of “activity” (e.g., “for instance, the
`running of an application on a server as requested by a client”) with “specific software program
`activity.” The specification does not use this language, and there is no reason to deviate from the
`specification’s exemplary definition of “activity,” which is embedded within its express definition
`of “conversational flow.”
`The core dispute regards whether a “conversational flow” always requires multiple
`connection flows. For the reasons below, it does not. The parties agree that a conversational flow
`includes packets exchanged in any direction as the result of an activity. This captures the nature of
`conversational flows. An activity could involve only a single connection. But often, application
`activity involves multiple connections and exchanges of packets. See, e.g., Ex. A (’099 Pat.) at
`2:49-3:6 (describing the multiple connections involved in an SAP print service activity). Thus, for
`a packet monitor to be capable of recognizing the claimed “conversational flows,” it must be
`capable of recognizing the times when application activities involve multiple connections or
`exchanges of packets. That is precisely what Packet has proposed, and the definition is directly
`from the specification.
`
`Second, each tribunal to have considered the proper construction for “conversational flow”
`has accepted Packet’s proposed construction, which stems from the specification’s explicit
`definition. For example, in Packet Intelligence LLC v. NetScout Sys., Inc., after first challenging
`the same construction on similar bases as those presented by Defendant here, the NetScout
`
`defendant eventually agreed to Packet’s construction. No. 2:16-cv-230-JRG (E.D. Tex.), Dkt. No.
`
`PI’S OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`7
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2069
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 11 of 25
`
`

`

`Case 3:19-cv-04741-WHO Document 57 Filed 06/04/20 Page 12 of 25
`
`
`
`66 (attached as Ex. H). As a result, the Court adopted the same construction Packet proposes here.
`Id.
`And a panel of three Patent Trial and Appeal Board administrative patent judges considered
`
`and approved Packet’s construction in six separate IPR proceedings under the “broadest reasonable
`interpretation” standard. See Sandvine Corp., et al. v. Packet Intelligence, LLC, IPR2017-00450,
`Paper 8 at 7-10; IPR2017-00451, Paper 8 at 7-10; IPR2017-00629, Paper 8 at 7-9; Ex. J (IPR2017-
`00630) Paper 9 at 7-9; IPR2017-00769, Paper 8 at 8-10; Ex. I (IPR2017-00862) Paper 8 at 7-10
`(all PTAB July 26, 2017). Two different APJs authored opinions endorsing Packet’s construction
`because of the express definition in the patent. In IPR2017-00862, the PTAB panel opinion written
`by Administrative Patent Judge Mercader explained the following about Packet’s proposed
`construction of “conversational flow”:
`we observe that the specification of the ’099 patent explicitly supports this
`construction. See Ex. 1003, 2:34–45. Accordingly, for purposes of this Decision,
`we agree that Patent Owner’s proposed construction, which mirrors the definition
`in the specification, is the broadest reasonable construction consistent with the
`specification.
`
`IPR2017-00862, Paper 8 at 9-10 (attached as Ex. I) (emphasis added). Similarly, in IPR2017-
`00630, the PTAB panel opinion written by Administrative Patent Judge Fink embraced Packet’s
`proposed construction. IPR2017-00630, Paper 9 at 9 (attached as Ex. J) (“We agree with Patent
`Owner that the term ‘conversational flow’ is expressly defined in the excerpt of the patent quoted
`above.” (emphasis added)). The other IPR decisions mirror the reasoning in these opinions. See
`citations supra.
`In sum: no matter the standard used, every tribunal to consider this issue agreed that the
`term “conversational flow” is expressly defined in the specification, as Packet contends.
`2. Defendant’s Arguments Fail to Negate the Express Definition of a “Conversational
`Flow”
`
`On the other hand, Defendant provides testimony from its expert, Dr. Bellovin suggesting
`
`that the Court should redefine the term “conversational flows” to require that “conversational
`flows” be “linked” only by “specific software program activity.” See, e.g., ECF 54-3 ¶ 89
`(“…where such packets form multiple connection flows that are linked based on that [specific
`software program] activity.”).
`
`To support his position, Dr. Bellovin identifies an IPR in which Packet distinguished the
`claims over the prior art. Id. ¶¶ 86-92. But those passages address the fact that the prior art in the
`IPRs was “not concerned” with applications (or activities) at all, and instead simply blindly
`8
`
`PI’S OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2069
`Juniper Networks, Inc

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket