throbber
Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 1 of 18
`
`Brian A.E. Smith (SBN 188147)
`Alden KW Lee (SBN 257973)
`Jeffrey D. Chen (SBN 267837)
`Joseph J. Fraresso (SBN 289228)
`BARTZO ZANKEL BUNZEL & MILLER
`One Embarcadero Center, Suite 800
`San Francisco, CA 94111
`Telephone: (415) 956-1900
`bsmith@bzbm.com
`alee@bzbm.com
`jchen@bzbm.com
`jfraresso@bzbm.com
`
`Attorneys for Plaintiff
`Packet Intelligence LLC
`
`[Additional counsel listed on signature page]
`
`UNITED STATES DISTRICT COURT
`NORTHERN DISTRICT OF CALIFORNIA
`SAN FRANCISCO DIVISION
`
`PACKET INTELLIGENCE LLC,
`
`Case No. 3:19-cv-04741-WHO
`
`Plaintiff,
`
` v.
`
`JUNIPER NETWORKS, INC.,
`
`Defendant.
`
`PLAINTIFF PACKET INTELLIGENCE
`LLC’S REPLY CONSTRUCTION BRIEF
`
`DEMAND FOR JURY TRIAL
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
` CASE NO. 3:19-CV-04741-WHO
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 1 of 18
`
`

`

`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 2 of 18
`
`
`
`Table of Contents
`
`
`I.
`
`INTRODUCTION .................................................................................................................... 1
`
`II.
`
`DISPUTED TERMS FOR CONSTRUCTION .............................................................................. 2
`
`A. “conversational flow” / “conversational flow-sequence” ........................................... 2
`
`B. “flow-entry database” .................................................................................................. 5
`
`C. “the flow” / “new flow” / “existing flow” ................................................................... 7
`
`D. “base protocol” ............................................................................................................ 8
`
`E. “slicer” ......................................................................................................................... 9
`
`F. “a protocol/state identification mechanism coupled to the state patterns/operations
`memory and to the lookup engine, the protocol/state identification engine configured
`to determine the protocol and state of the conversational flow of the packet” .......... 10
`
`G. “claim preambles” ..................................................................................................... 12
`
`III. CONCLUSION ...................................................................................................................... 14
`
`
`
`
`
`
`
`i
`
`
`
`
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 2 of 18
`
`

`

`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 3 of 18
`
`
`
`Cases
`
`Table of Authorities
`
`Allen Eng’g Corp. v. Bartell Indus., Inc.,
`299 F.3d 1336 (Fed. Cir. 2002) .................................................................................................. 13
`
`Amgen, Inc. v. F. Hoffmann-LaRoche Ltd.,
`494 F. Supp. 2d 54 (D. Mass. 2007) ............................................................................................ 7
`
`Applied Materials, Inc. v. Advanced Semiconductor Materials America, Inc.,
`98 F.3d 1563 (Fed. Cir. 1996) .............................................................................................. 12, 14
`
`Aspex Eyewear, Inc. v. Marchon Eyewear, Inc.,
`672 F.3d 1335 (Fed. Cir. 2012) .................................................................................................. 13
`
`Catalina Mktg. Int’l, Inc. v. Coolsav-ings.com, Inc.,
`289 F.3d 801 (Fed. Cir. 2002) .................................................................................................... 14
`
`Cochlear Bone Anchored Sols. AB v. Oticon Med. AB,
`958 F.3d 1348 (Fed. Cir. 2020) ............................................................................................ 12, 13
`
`Deere & Co. v. Bush Hog, LLC,
`703 F.3d 1349 (Fed. Cir. 2012) ............................................................................................ 12, 14
`
`Innova/Pure Water, Inc. v. Safari Water Filtration Sys., Inc.,
`381 F.3d 1111 (Fed. Cir. 2004) ............................................................................................ 13, 14
`
`Key Pharm. v. Hercon Labs. Corp.,
`161 F.3d 709 (Fed. Cir. 1998) ...................................................................................................... 7
`
`Markman v. Westview Instruments, Inc.,
`517 U.S. 370 (1996) ................................................................................................................. 1, 6
`
`Packet Intelligence LLC v. NetScout Sys., Inc.,
`No. 2019-2041 (Fed. Cir. July 14, 2020) ............................................................................. 1, 6, 7
`
`Pass & Seymour, Inc. v. Hubbell Inc.,
`2011 U.S. Dist. LEXIS 1135 (N.D.N.Y. Jan 5, 2011) ................................................................. 7
`
`Rambus Inc. v. Hynix Semiconductor Inc.,
`569 F. Supp. 2d 946 (N.D. Cal. 2008) ......................................................................................... 7
`
`Rowe v. Dror,
`112 F.3d 473 (Fed. Cir. 1997) .................................................................................................... 14
`
`TomTom, Inc. v. Adolph,
`790 F.3d 1315 (Fed. Cir. 2015) .................................................................................................. 13
`
`U.S. Surgical Corp. v. Ethicon, Inc.,
`103 F.3d 1554 (Fed. Cir. 1997) .................................................................................................... 8
`
`
`
`
`
`
`
`ii
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 3 of 18
`
`

`

`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 4 of 18
`
`
`
`I.
`
`INTRODUCTION
`
`Last week, the Federal Circuit issued its opinion in Packet Intelligence LLC v. NetScout
`
`Systems, Inc., et al., No. 2019-2041 (Fed. Cir. July 14, 2020), addressing these disputed terms. The
`
`Court: (1) affirmed the jury verdict of willful infringement; (2) affirmed the validity of the asserted
`
`claims under §§ 101, 102(a), and 102(f); and (3) affirmed all damages-related findings other than
`
`pre-suit damages.
`
`The Court described the inventions of the patents-in-suit1 as follows:
`
`[The asserted patents] teach a method for monitoring packets exchanged over a
`computer network. A stream of packets between two computers is called a
`connection flow. ’789 patent col. 2 ll. 43–45. Monitoring connection flows cannot
`account for disjointed sequences of the same flow in a network. Id. col. 3 ll. 56–59.
`The specifications explain that it is more useful to identify and classify
`“conversational flows,” defined as “the sequence of packets that are exchanged in
`any direction as a result of an activity.” Id. col. 2 ll. 45–47. Conversational flows
`provide application-specific views of network traffic and can be used to generate
`helpful analytics to understand network load and usage. See ’751 patent col. 3 l. 2–
`col. 4 l. 11.
`
`Packet Intelligence LLC v. NetScout Sys., Inc., No. 2019-2041, slip op. at 3 (Fed. Cir. July 14,
`
`2020) [hereinafter NetScout Appeal]. In affirming the infringement verdict, the Court addressed the
`
`following term from representative claim 19 of the ’789 Patent: “a memory for storing a database
`
`comprising none or more flow-entries for previously encountered conversational flows, each flow-
`
`entry identified by identifying information stored in the flow entry.” See id. at 8. The Court held
`
`that “the claims do not require the joining of connection flows into conversational flows.” Id. As
`
`detailed below, in so holding, the Court rejected Juniper’s positions for the “flow-entry database”
`
`terms as well as the “flow/existing flow/new flow” terms. The Federal Circuit’s holding is binding
`
`in this proceeding. Markman v. Westview Instruments, Inc., 517 U.S. 370, 390-91 (1996)
`
`(“[T]reating interpretive issues as purely legal will promote (though it will not guarantee)
`
`intrajurisdictional certainty through the application of stare decisis . . . .”).
`
`
`
`
`1 The NetScout appeal related to the ’725, ’751, and ’789 Patents. However, the parties in this case
`have not disputed that like terms across the patents warrant like constructions. Thus, the Federal
`Circuit’s analysis is binding as to terms at issue in this case.
`1
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 4 of 18
`
`

`

`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 5 of 18
`
`II. DISPUTED TERMS FOR CONSTRUCTION
`
`A.
`
`“conversational flow” / “conversational flow-sequence”
`
`Claim Term
`
`“conversational flow”/
`“conversational flow-
`sequence”
`
`’099 claims 1, 5
`’725 claims 10, 17
`’646 claims 1, 7, 16;
`’751 claims 1, 17;
`’789 claims 1, 19, 44
`
`Juniper’s Construction
`
` “The sequence of packets that
`are exchanged in any direction
`as a result of specific software
`program activity, where such
`packets
`form
`multiple
`connection
`flows
`that are
`linked based on that activity”
`
`Packet Intelligence’s
`Construction
`the sequence of packets that
`are exchanged in any direction
`as a result of an activity—for
`instance, the running of an
`application on a server as
`requested by a client—and
`where some conversational
`flows involved more than one
`connection, and some even
`involve more
`than
`one
`exchange of packets between a
`client and server
`
`
`
`
`
`Juniper argues the “Court should construe this term to differentiate ‘conversational flows’
`
`from ‘only connection flows.’” ECF No. 62 at 3 (“Response”). But as Packet Intelligence explained
`
`in its opening brief, the patent specification defines both terms. Juniper refuses to accept that “the
`
`sequence of packets that are exchanged in any direction as a result of an activity” might include
`
`only a single connection. ECF No. 57 at 9 (“Opening”). This is analogous to the idea that while
`
`most English words consist of multiple letters, that does not prohibit some letters—alone—from
`
`being identified as a word as well, for example: “A” and “I.” Juniper cannot rewrite the
`
`specification definitions to its liking. The Court should adopt the express specification definition,
`
`which another district court and the PTAB have already adopted.
`
`
`
`2
`
`
`
`
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 5 of 18
`
`

`

`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 6 of 18
`
`
`
`Juniper and its expert concede the difference between “connection flows” and
`
`“conversational flows.” Connection flows are defined by a 5-tuple of information: “the IP source
`
`address, IP destination address, source port number, destination port number, and an identifier of
`
`the transport protocol in use . . . .” ECF No. 54-3 (Dr. Steven Bellovin Decl.) ¶ 60. As Dr. Bellovin
`
`admits, “these five datagram control fields are commonly referred to as the 5-tuple, or flow ID, and
`
`are used to identify datagrams within a single end-to-end communication session since the
`
`beginning of the internet.” Id. (emphasis added). Thus, referring to Dr. Bellovin’s graphic, a
`
`connection flow can be discerned from the 5-tuple information detailed above, which can be
`
`obtained from the Network (IP) and Transport (TCP) layer headers:
`
`Id. at ¶ 64. This information, however, is insufficient to determine the activity to which the
`
`connection corresponds, and relatedly, whether the underlying activity is completed via only a
`
`single connection or whether the underlying activity requires multiple connections.
`
`Determining the underlying activity is protocol dependent, and often requires information
`
`from the Application Layer illustrated above. See id. at ¶ 61 (“The application layer defines the
`
`transmission structure known as a ‘message.’ Again, an application layer message typically
`
`comprises a header and payload. The header in an application layer message can be application
`
`protocol specific.”) (emphasis added). This application specific information is accounted for in the
`
`claims, for example, by the “parsing/extraction operations memory configured to store a database
`
`
`of parsing/extraction operations that includes information describing how to determine at least one
`
`of the protocols used in a packet from data in the packet.” ECF No. 57-2 (’099 Pat") at 35:9-13.
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`3
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 6 of 18
`
`

`

`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 7 of 18
`
`
`
`Additionally, the state patterns/operations memory includes application and protocol specific
`
`information used to discern the “activity” to which a given flow relates: “a state patterns/operations
`
`memory configured to store a set of predefined state transition patterns and state operations such
`
`that traversing a particular transition pattern as a result of a particular conversational flow-sequence
`
`of packets indicates that the particular conversational flow-sequence is associated with the
`
`operation of a particular application program.” Id. at 35:31-37. Juniper’s insistence that a
`
`recognized “activity” must include more that one connection flow is without basis. The
`
`specification says “some,” not “all.” See id. at 2:42-45 (“[S]ome conversational flows involve more
`
`than one connection, and some even involve more than one exchange of packets between a client
`
`and server.”).
`
`Juniper’s evidence from other proceedings (e.g., PTAB and trial) is both incomplete and
`
`misleading. For instance, Packet Intelligence argued to the PTAB that Engel failed to disclose
`
`“conversational flows” because it lacked the ability to relate independent connection flows. See
`
`ECF No. 62-2 (IPR2017-00769 Patent Owner’s Prelim. Rsp.) at 41-42 (“[T]he conversational flows
`
`of the ’099 patent are concerned with analyzing the content of each packet (if necessary, up to layer
`
`7) and determining if that packet is related to other packets. In other words, the conversational flows
`
`claimed require processing the information in each packet column (i.e., across OSI levels within a
`
`packet) and determining if a given packet is related to existing flows.” (emphasis added)). The
`
`monitor of the asserted patents has the ability to recognize related connection flows—it never states
`
`that every conversational flow must include multiple connection flows. See ECF No. 57-2 (’099
`
`Pat.) at 3:48-51 (“What distinguishes this invention from prior art network monitors is that it has
`
`the ability to recognize disjointed flows as belonging to the same conversational flow.” (emphasis
`
`added)).
`
`Dr. Almeroth’s trial testimony about infringement is both incomplete and irrelevant to claim
`
`construction. His testimony hinged on specific infringement examples showing the flow records of
`
`the accused products, which included enough information to relate one or more connection flows
`
`to the extent that they related to the same user activity. ECF No. 72 (Trial Tr., Nov. 8, 2017) at
`
`105:25-106:2 (“It, again, is the user activity. It’s a result of an activity running an application on
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`4
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 7 of 18
`
`

`

`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 8 of 18
`
`
`
`a server, something like Facebook.” (emphasis added)). Similarly, the inventor testimony at trial
`
`(which is also irrelevant to claim construction) regarded specific examples portrayed in trial
`
`demonstratives. See ECF No. 244 (Trial Tr., Oct. 10, 2017) at 55:11 (“Using this example that you
`
`have here, what was the problem . . . .”); id. at 57:8-9 (“And the conversational flow, as we see in
`
`this picture . . . .” (emphasis added)). Mr. Maixner’s testimony reflected that the “conversational
`
`flow” was an abstraction that gave them the ability to recognize disjointed, but related, connection
`
`flows. See ECF No. 245 (Trial Tr., Oct. 10, 2017) at 15:24-25 (“[W]e were able to abstract that as
`
`conversational flow.”). Juniper takes these statements out of context in its attempt to directly
`
`contradict the definitions in the specification.
`
`B.
`
`“flow-entry database”
`
`Packet Intelligence’s
`Construction
`PI proposes to construe
`“flow-entry database” as “a
`database configured to store
`entries, where each entry
`describes a flow”
`
`Juniper’s Construction
`
`“database having a separate
`entry for each encountered
`conversational flow”
`
`Claim Term
`
`“flow-entry database
`including a plurality of
`flow-entries for
`conversational flows
`encountered by the
`monitor” / “database
`comprising flow-entries for
`previously encountered
`conversational flows” /
`“database of one or more
`flow-entries for any
`previously encountered
`conversational flows” /
`“flow-entry database
`[comprising none / for
`containing one] or more
`flow-entries for previously
`encountered conversational
`flows” / “database
`[comprising none / for
`containing one] or more
`flow-entries for previously
`encountered conversational
`flows”
`
`’099 claim 1;
`’646 claims 1, 7, 16;
`’751 claims 1, 17, 19;
`’789 claims 1, 44
`
`
`
`5
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 8 of 18
`
`

`

`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 9 of 18
`
`
`
`Juniper alleges that “one skilled in the art would understand that the ‘flow-entry database’
`
`terms require a ‘database having a separate entry for each encountered conversational flow . . . .”
`
`Response at 14. The Federal Circuit has now resolved this dispute, agreeing with Packet
`
`Intelligence’s position.
`
`In the NetScout appeal, NetScout argued that “a memory for storing a database comprising
`
`none or more flow-entries for previously encountered conversational flows” required a database of
`
`already correlated flow entries—i.e., the database cannot contain connection flow entries. See
`
`NetScout Appeal, No. 2019-2041, slip op. at 7-8 (“NetScout argues that the limitation requires
`
`correlating connection flows
`
`into conversational flows.”). This served as NetScout’s
`
`noninfringement position because its accused products maintain information about connection
`
`flows. See id. at 8 (“In NetScout’s view, the record establishes that the accused products track
`
`connection flows but never join them together.”). Packet Intelligence responded to “NetScout’s
`
`claim construction argument, [stating] . . . that the claims do not require joining flows into a single
`
`conversational flow.” Id. The Federal Circuit agreed with Packet Intelligence and rejected
`
`NetScout’s proposed claim construction:
`
`We first agree with Packet Intelligence that the claims do not require the joining of
`connection flows into conversational flows. The term “conversational flow”
`appears in claim 19’s memory limitation: “a memory for storing a database
`comprising none or more flow-entries for previously encountered conversational
`flows, each flow-entry identified by identifying information stored in the flow
`entry.” ’789 patent col. 36 ll. 45–48. Contrary to NetScout’s argument, however, a
`limitation requiring memory for storing flow entries for previously encountered
`conversational flows does not require the added action of correlating connection
`flow entries into conversational flows.
`
`Id. (emphases added).
`
`The Federal Circuit has squarely addressed the claim construction proposed by Juniper, and
`
`it rejected that proposed construction. And neither party has alleged that the flow-entry database
`
`limitations should be construed differently across the patents. Thus, the Federal Circuit’s holding
`
`in the NetScout appeal is binding in this proceeding. See Markman, 517 U.S. at 390–91 (“[T]reating
`
`interpretive issues as purely legal will promote (though it will not guarantee) intrajurisdictional
`
`
`certainty through the application of stare decisis . . . .”). The Federal Circuit has “recognize[d] the
`
`national stare decisis effect that [its] decisions on claim construction have.” Key Pharm. v. Hercon
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`6
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 9 of 18
`
`

`

`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 10 of 18
`
`
`
`Labs. Corp., 161 F.3d 709, 716 (Fed. Cir. 1998); see also Rambus Inc. v. Hynix Semiconductor
`
`Inc., 569 F. Supp. 2d 946, 963–64 (N.D. Cal. 2008) (“A district court must apply the Federal
`
`Circuit’s claim construction even where a non-party to the initial litigation would like to present
`
`new arguments.”); Amgen, Inc. v. F. Hoffmann-LaRoche Ltd., 494 F. Supp. 2d 54, 60–61 (D. Mass.
`
`2007) (holding when the Federal Circuit has already construed claims, that Court’s construction is
`
`binding and district courts may not modify its holding); Pass & Seymour, Inc. v. Hubbell Inc., No.
`
`5:07-CV-945 (NAM/DEP), 2011 U.S. Dist. LEXIS 1135, at *4 (N.D.N.Y. Jan. 5, 2011) (“[D]istrict
`
`courts are bound to apply the Federal Circuit’s claim constructions, even as against non-parties to
`
`the initial litigation.”). For these reasons, the Court should adopt Packet Intelligence’s proposed
`
`construction.
`
`C.
`
`“the flow” / “new flow” / “existing flow”
`
`PI’s Construction
`No construction necessary
`
`Juniper’s Construction
`“the conversational flow” /
`“existing conversational
`flow” / “new conversational
`flow”
`
`Claim Term
`“the flow” / “new flow” /
`“existing flow”
`
`’099 claims 1, 2
`’725 claims 16
`’646 claims 1, 7, 16;
`’751 claims 1, 5, 10, 15, 17;
`’789 claims 1, 13, 14, 16, 19,
`44
`
`The Federal Circuit resolved this dispute when it addressed the flow-entry database terms.
`
`See supra Section II.B. As detailed above, the Federal Circuit held that the claimed “memory
`
`storing a flow-entry database” need not include already correlated connection flow entries. See
`
`NetScout Appeal, No. 2019-2041, slip op. at 8 (“[A] limitation requiring memory for storing flow
`
`entries for previously encountered conversational flows does not require the added action of
`
`correlating connection flow entries into conversational flows.” (emphasis omitted)). Juniper’s
`
`proposed construction is inconsistent with the Federal Circuit’s holding.
`
`Relying on Claim 19 of the ’789 Patent, as the Federal Circuit did, illustrates the issue. First,
`
`the claim includes “a memory for storing a database comprising none or more flow-entries for
`
`
`previously encountered conversational flows . . . .” ECF No. 63-6 [hereinafter ’789 Patent] at
`
`36:45-47. Then, it requires “a lookup engine . . . to lookup whether the particular packet . . . has a
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`7
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 10 of 18
`
`

`

`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 11 of 18
`
`
`
`matching flow-entry, the looking up using at least some of the selected packet portions and
`
`determining if the packet is of an existing flow . . . .” Id. at 36:49-55 (emphasis added). Finally, the
`
`claim recites:
`
`a flow insertion engine . . . configured to create a flow-entry in the flow-entry
`database, the flow-entry including identifying information for future packets to be
`identified with the new flow-entry, the lookup engine configured such that if the
`packet is of an existing flow, the monitor classifies the packet as belonging to the
`found existing flow; and if the packet is of a new flow, the flow insertion engine
`stores a new flow-entry for the new flow in the flow-entry database…
`
`Id. at 36:56-65 (emphasis added). Notably, if the packet is of “a new flow,” then a flow entry for
`
`that new flow is stored in the flow-entry database. And the Federal Circuit confirmed that the flow-
`
`entry database can comprise connection flow entries. For this reason, Juniper’s arguments that the
`
`“a new flow” and “an existing flow” terms must specify a “conversational flow” should be rejected.
`
`D.
`
`“base protocol”
`
`Claim Term
`
`“base protocol”
`
`’725 claims 1, 17
`
`
`Packet Intelligence’s
`Construction
`No construction necessary
`
`Juniper’s Construction
`
`“frame transmission protocol,
`such as the data link layer
`protocol”
`
`Defendant contends its proposed construction is permissible because it says its construction
`
`merely provides an example, and “does not limit the meaning of this term.” ECF 62 (Response) at
`
`20. For this reason alone, the Court should reject the construction. See U.S. Surgical Corp. v.
`
`Ethicon, Inc., 103 F.3d 1554, 1568 (Fed. Cir. 1997) (“Claim construction is a matter of resolution
`
`of disputed meanings and technical scope, to clarify and when necessary to explain what the
`
`patentee covered by the claims, for use in the determination of infringement. It is not an obligatory
`
`exercise in redundancy.”).
`
`Here, the claims are readily understandable on their face, because they define the meaning
`
`of a “base protocol”—it is the base (or lowest level) protocol “of the packet.” See, e.g., ECF No.
`
`57-3 (ʼ725 Pat.) at cl. 1(c) (“the set of protocol descriptions based on the base protocol of the
`
`
`packet.” (emphasis added)). Indeed, Defendant says the concepts addressed here are all “well-
`
`known” and “both parties will refer to and explain these well-known models before the jury.” ECF
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`8
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 11 of 18
`
`

`

`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 12 of 18
`
`
`
`No. 62 (Response) at 19-20.
`
`Put simply: Defendant concedes the lack of any disclaimer and both Defendant and its
`
`expert concede the term “base protocol” often refers to layers other than the “data link layer.”
`
`Accepting Defendant’s argument that these concepts are “well-known,” there is no reason to
`
`provide a construction of this term identifying a single example—even if it is an “inclusive”
`
`example as Defendant contends. Any attempt to do so is more likely to lead to gamesmanship than
`
`clarity. Because Defendant identifies no disputed matter of scope or meaning, the Court should
`
`reject Defendant’s proposal.
`
`E.
`
`“slicer”
`
`Claim Term
`
`“slicer”
`
`’789 claims 19
`
`
`Packet Intelligence’s
`Construction
`Component or process that
`performs extraction
`operations on a packet
`
`Juniper’s Construction
`
`No construction necessary
`
`To the extent the Court
`requires a construction,
`Juniper proposes:
`
`“a component that performs
`extraction operations on a
`packet”
`
`Defendant contends requiring that the slicer be a “component” does not limit it to “a
`
`hardware component.” ECF 62 (Response) at 21. Instead, Defendant says, it “could be a discrete
`
`software component.” Id. Defendant’s new inclusion of the word “discrete” here is telling—though
`
`Defendant says it does not intend “component” to refer to hardware (the common meaning of the
`
`term), Defendant still promotes a construction that would limit a “slicer” to an independent,
`
`standalone item.
`
`There is no support to inject such a limitation into the claims. To the contrary—both the
`
`claims and the specification show that the slicer is a component or process that is part of the
`
`extraction engine to enable the system to extract certain portions of a packet. See, e.g., ECF No.
`
`57-6 (ʼ789 Pat.) at 22:30-41 (“the extraction engine (also called a ‘slicer’) … The commands are
`
`
`sent from PRE 1006 to slicer 1007 in the form of extraction instruction pointers which tell the
`
`extraction engine 1007 where to a find the instructions in the extraction operations database
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`9
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 12 of 18
`
`

`

`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 13 of 18
`
`
`
`memory (i.e., slicer instruction database) 1002.”) And Juniper studiously avoids addressing the
`
`specification’s teaching that the entire flow can be implemented on a single piece of hardware. See
`
`id. at 21:35-40 (“the flow of FIG. 3 may alternatively be implemented in software running on
`
`one or more general-purpose processors, or only partly implemented in hardware.”)
`
`(emphasis added)).
`
`The specification also contradicts Defendant’s suggestion that the slicer cannot be
`
`implemented as a process, because it shows the extractor (slicer) receiving instructions to carry out
`
`a process. See id. at 22:42-48 (“Thus, when the PRE 1006 recognizes a protocol it outputs both the
`
`protocol identifier and a process code to the extractor [slicer]. The protocol identifier is added to
`
`the flow signature and the process code is used to fetch the first instruction from

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket