`
`Brian A.E. Smith (SBN 188147)
`Alden KW Lee (SBN 257973)
`Jeffrey D. Chen (SBN 267837)
`Joseph J. Fraresso (SBN 289228)
`BARTZO ZANKEL BUNZEL & MILLER
`One Embarcadero Center, Suite 800
`San Francisco, CA 94111
`Telephone: (415) 956-1900
`bsmith@bzbm.com
`alee@bzbm.com
`jchen@bzbm.com
`jfraresso@bzbm.com
`
`Attorneys for Plaintiff
`Packet Intelligence LLC
`
`[Additional counsel listed on signature page]
`
`UNITED STATES DISTRICT COURT
`NORTHERN DISTRICT OF CALIFORNIA
`SAN FRANCISCO DIVISION
`
`PACKET INTELLIGENCE LLC,
`
`Case No. 3:19-cv-04741-WHO
`
`Plaintiff,
`
` v.
`
`JUNIPER NETWORKS, INC.,
`
`Defendant.
`
`PLAINTIFF PACKET INTELLIGENCE
`LLC’S REPLY CONSTRUCTION BRIEF
`
`DEMAND FOR JURY TRIAL
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
` CASE NO. 3:19-CV-04741-WHO
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 1 of 18
`
`
`
`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 2 of 18
`
`
`
`Table of Contents
`
`
`I.
`
`INTRODUCTION .................................................................................................................... 1
`
`II.
`
`DISPUTED TERMS FOR CONSTRUCTION .............................................................................. 2
`
`A. “conversational flow” / “conversational flow-sequence” ........................................... 2
`
`B. “flow-entry database” .................................................................................................. 5
`
`C. “the flow” / “new flow” / “existing flow” ................................................................... 7
`
`D. “base protocol” ............................................................................................................ 8
`
`E. “slicer” ......................................................................................................................... 9
`
`F. “a protocol/state identification mechanism coupled to the state patterns/operations
`memory and to the lookup engine, the protocol/state identification engine configured
`to determine the protocol and state of the conversational flow of the packet” .......... 10
`
`G. “claim preambles” ..................................................................................................... 12
`
`III. CONCLUSION ...................................................................................................................... 14
`
`
`
`
`
`
`
`i
`
`
`
`
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 2 of 18
`
`
`
`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 3 of 18
`
`
`
`Cases
`
`Table of Authorities
`
`Allen Eng’g Corp. v. Bartell Indus., Inc.,
`299 F.3d 1336 (Fed. Cir. 2002) .................................................................................................. 13
`
`Amgen, Inc. v. F. Hoffmann-LaRoche Ltd.,
`494 F. Supp. 2d 54 (D. Mass. 2007) ............................................................................................ 7
`
`Applied Materials, Inc. v. Advanced Semiconductor Materials America, Inc.,
`98 F.3d 1563 (Fed. Cir. 1996) .............................................................................................. 12, 14
`
`Aspex Eyewear, Inc. v. Marchon Eyewear, Inc.,
`672 F.3d 1335 (Fed. Cir. 2012) .................................................................................................. 13
`
`Catalina Mktg. Int’l, Inc. v. Coolsav-ings.com, Inc.,
`289 F.3d 801 (Fed. Cir. 2002) .................................................................................................... 14
`
`Cochlear Bone Anchored Sols. AB v. Oticon Med. AB,
`958 F.3d 1348 (Fed. Cir. 2020) ............................................................................................ 12, 13
`
`Deere & Co. v. Bush Hog, LLC,
`703 F.3d 1349 (Fed. Cir. 2012) ............................................................................................ 12, 14
`
`Innova/Pure Water, Inc. v. Safari Water Filtration Sys., Inc.,
`381 F.3d 1111 (Fed. Cir. 2004) ............................................................................................ 13, 14
`
`Key Pharm. v. Hercon Labs. Corp.,
`161 F.3d 709 (Fed. Cir. 1998) ...................................................................................................... 7
`
`Markman v. Westview Instruments, Inc.,
`517 U.S. 370 (1996) ................................................................................................................. 1, 6
`
`Packet Intelligence LLC v. NetScout Sys., Inc.,
`No. 2019-2041 (Fed. Cir. July 14, 2020) ............................................................................. 1, 6, 7
`
`Pass & Seymour, Inc. v. Hubbell Inc.,
`2011 U.S. Dist. LEXIS 1135 (N.D.N.Y. Jan 5, 2011) ................................................................. 7
`
`Rambus Inc. v. Hynix Semiconductor Inc.,
`569 F. Supp. 2d 946 (N.D. Cal. 2008) ......................................................................................... 7
`
`Rowe v. Dror,
`112 F.3d 473 (Fed. Cir. 1997) .................................................................................................... 14
`
`TomTom, Inc. v. Adolph,
`790 F.3d 1315 (Fed. Cir. 2015) .................................................................................................. 13
`
`U.S. Surgical Corp. v. Ethicon, Inc.,
`103 F.3d 1554 (Fed. Cir. 1997) .................................................................................................... 8
`
`
`
`
`
`
`
`ii
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 3 of 18
`
`
`
`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 4 of 18
`
`
`
`I.
`
`INTRODUCTION
`
`Last week, the Federal Circuit issued its opinion in Packet Intelligence LLC v. NetScout
`
`Systems, Inc., et al., No. 2019-2041 (Fed. Cir. July 14, 2020), addressing these disputed terms. The
`
`Court: (1) affirmed the jury verdict of willful infringement; (2) affirmed the validity of the asserted
`
`claims under §§ 101, 102(a), and 102(f); and (3) affirmed all damages-related findings other than
`
`pre-suit damages.
`
`The Court described the inventions of the patents-in-suit1 as follows:
`
`[The asserted patents] teach a method for monitoring packets exchanged over a
`computer network. A stream of packets between two computers is called a
`connection flow. ’789 patent col. 2 ll. 43–45. Monitoring connection flows cannot
`account for disjointed sequences of the same flow in a network. Id. col. 3 ll. 56–59.
`The specifications explain that it is more useful to identify and classify
`“conversational flows,” defined as “the sequence of packets that are exchanged in
`any direction as a result of an activity.” Id. col. 2 ll. 45–47. Conversational flows
`provide application-specific views of network traffic and can be used to generate
`helpful analytics to understand network load and usage. See ’751 patent col. 3 l. 2–
`col. 4 l. 11.
`
`Packet Intelligence LLC v. NetScout Sys., Inc., No. 2019-2041, slip op. at 3 (Fed. Cir. July 14,
`
`2020) [hereinafter NetScout Appeal]. In affirming the infringement verdict, the Court addressed the
`
`following term from representative claim 19 of the ’789 Patent: “a memory for storing a database
`
`comprising none or more flow-entries for previously encountered conversational flows, each flow-
`
`entry identified by identifying information stored in the flow entry.” See id. at 8. The Court held
`
`that “the claims do not require the joining of connection flows into conversational flows.” Id. As
`
`detailed below, in so holding, the Court rejected Juniper’s positions for the “flow-entry database”
`
`terms as well as the “flow/existing flow/new flow” terms. The Federal Circuit’s holding is binding
`
`in this proceeding. Markman v. Westview Instruments, Inc., 517 U.S. 370, 390-91 (1996)
`
`(“[T]reating interpretive issues as purely legal will promote (though it will not guarantee)
`
`intrajurisdictional certainty through the application of stare decisis . . . .”).
`
`
`
`
`1 The NetScout appeal related to the ’725, ’751, and ’789 Patents. However, the parties in this case
`have not disputed that like terms across the patents warrant like constructions. Thus, the Federal
`Circuit’s analysis is binding as to terms at issue in this case.
`1
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 4 of 18
`
`
`
`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 5 of 18
`
`II. DISPUTED TERMS FOR CONSTRUCTION
`
`A.
`
`“conversational flow” / “conversational flow-sequence”
`
`Claim Term
`
`“conversational flow”/
`“conversational flow-
`sequence”
`
`’099 claims 1, 5
`’725 claims 10, 17
`’646 claims 1, 7, 16;
`’751 claims 1, 17;
`’789 claims 1, 19, 44
`
`Juniper’s Construction
`
` “The sequence of packets that
`are exchanged in any direction
`as a result of specific software
`program activity, where such
`packets
`form
`multiple
`connection
`flows
`that are
`linked based on that activity”
`
`Packet Intelligence’s
`Construction
`the sequence of packets that
`are exchanged in any direction
`as a result of an activity—for
`instance, the running of an
`application on a server as
`requested by a client—and
`where some conversational
`flows involved more than one
`connection, and some even
`involve more
`than
`one
`exchange of packets between a
`client and server
`
`
`
`
`
`Juniper argues the “Court should construe this term to differentiate ‘conversational flows’
`
`from ‘only connection flows.’” ECF No. 62 at 3 (“Response”). But as Packet Intelligence explained
`
`in its opening brief, the patent specification defines both terms. Juniper refuses to accept that “the
`
`sequence of packets that are exchanged in any direction as a result of an activity” might include
`
`only a single connection. ECF No. 57 at 9 (“Opening”). This is analogous to the idea that while
`
`most English words consist of multiple letters, that does not prohibit some letters—alone—from
`
`being identified as a word as well, for example: “A” and “I.” Juniper cannot rewrite the
`
`specification definitions to its liking. The Court should adopt the express specification definition,
`
`which another district court and the PTAB have already adopted.
`
`
`
`2
`
`
`
`
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 5 of 18
`
`
`
`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 6 of 18
`
`
`
`Juniper and its expert concede the difference between “connection flows” and
`
`“conversational flows.” Connection flows are defined by a 5-tuple of information: “the IP source
`
`address, IP destination address, source port number, destination port number, and an identifier of
`
`the transport protocol in use . . . .” ECF No. 54-3 (Dr. Steven Bellovin Decl.) ¶ 60. As Dr. Bellovin
`
`admits, “these five datagram control fields are commonly referred to as the 5-tuple, or flow ID, and
`
`are used to identify datagrams within a single end-to-end communication session since the
`
`beginning of the internet.” Id. (emphasis added). Thus, referring to Dr. Bellovin’s graphic, a
`
`connection flow can be discerned from the 5-tuple information detailed above, which can be
`
`obtained from the Network (IP) and Transport (TCP) layer headers:
`
`Id. at ¶ 64. This information, however, is insufficient to determine the activity to which the
`
`connection corresponds, and relatedly, whether the underlying activity is completed via only a
`
`single connection or whether the underlying activity requires multiple connections.
`
`Determining the underlying activity is protocol dependent, and often requires information
`
`from the Application Layer illustrated above. See id. at ¶ 61 (“The application layer defines the
`
`transmission structure known as a ‘message.’ Again, an application layer message typically
`
`comprises a header and payload. The header in an application layer message can be application
`
`protocol specific.”) (emphasis added). This application specific information is accounted for in the
`
`claims, for example, by the “parsing/extraction operations memory configured to store a database
`
`
`of parsing/extraction operations that includes information describing how to determine at least one
`
`of the protocols used in a packet from data in the packet.” ECF No. 57-2 (’099 Pat") at 35:9-13.
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`3
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 6 of 18
`
`
`
`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 7 of 18
`
`
`
`Additionally, the state patterns/operations memory includes application and protocol specific
`
`information used to discern the “activity” to which a given flow relates: “a state patterns/operations
`
`memory configured to store a set of predefined state transition patterns and state operations such
`
`that traversing a particular transition pattern as a result of a particular conversational flow-sequence
`
`of packets indicates that the particular conversational flow-sequence is associated with the
`
`operation of a particular application program.” Id. at 35:31-37. Juniper’s insistence that a
`
`recognized “activity” must include more that one connection flow is without basis. The
`
`specification says “some,” not “all.” See id. at 2:42-45 (“[S]ome conversational flows involve more
`
`than one connection, and some even involve more than one exchange of packets between a client
`
`and server.”).
`
`Juniper’s evidence from other proceedings (e.g., PTAB and trial) is both incomplete and
`
`misleading. For instance, Packet Intelligence argued to the PTAB that Engel failed to disclose
`
`“conversational flows” because it lacked the ability to relate independent connection flows. See
`
`ECF No. 62-2 (IPR2017-00769 Patent Owner’s Prelim. Rsp.) at 41-42 (“[T]he conversational flows
`
`of the ’099 patent are concerned with analyzing the content of each packet (if necessary, up to layer
`
`7) and determining if that packet is related to other packets. In other words, the conversational flows
`
`claimed require processing the information in each packet column (i.e., across OSI levels within a
`
`packet) and determining if a given packet is related to existing flows.” (emphasis added)). The
`
`monitor of the asserted patents has the ability to recognize related connection flows—it never states
`
`that every conversational flow must include multiple connection flows. See ECF No. 57-2 (’099
`
`Pat.) at 3:48-51 (“What distinguishes this invention from prior art network monitors is that it has
`
`the ability to recognize disjointed flows as belonging to the same conversational flow.” (emphasis
`
`added)).
`
`Dr. Almeroth’s trial testimony about infringement is both incomplete and irrelevant to claim
`
`construction. His testimony hinged on specific infringement examples showing the flow records of
`
`the accused products, which included enough information to relate one or more connection flows
`
`to the extent that they related to the same user activity. ECF No. 72 (Trial Tr., Nov. 8, 2017) at
`
`105:25-106:2 (“It, again, is the user activity. It’s a result of an activity running an application on
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`4
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 7 of 18
`
`
`
`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 8 of 18
`
`
`
`a server, something like Facebook.” (emphasis added)). Similarly, the inventor testimony at trial
`
`(which is also irrelevant to claim construction) regarded specific examples portrayed in trial
`
`demonstratives. See ECF No. 244 (Trial Tr., Oct. 10, 2017) at 55:11 (“Using this example that you
`
`have here, what was the problem . . . .”); id. at 57:8-9 (“And the conversational flow, as we see in
`
`this picture . . . .” (emphasis added)). Mr. Maixner’s testimony reflected that the “conversational
`
`flow” was an abstraction that gave them the ability to recognize disjointed, but related, connection
`
`flows. See ECF No. 245 (Trial Tr., Oct. 10, 2017) at 15:24-25 (“[W]e were able to abstract that as
`
`conversational flow.”). Juniper takes these statements out of context in its attempt to directly
`
`contradict the definitions in the specification.
`
`B.
`
`“flow-entry database”
`
`Packet Intelligence’s
`Construction
`PI proposes to construe
`“flow-entry database” as “a
`database configured to store
`entries, where each entry
`describes a flow”
`
`Juniper’s Construction
`
`“database having a separate
`entry for each encountered
`conversational flow”
`
`Claim Term
`
`“flow-entry database
`including a plurality of
`flow-entries for
`conversational flows
`encountered by the
`monitor” / “database
`comprising flow-entries for
`previously encountered
`conversational flows” /
`“database of one or more
`flow-entries for any
`previously encountered
`conversational flows” /
`“flow-entry database
`[comprising none / for
`containing one] or more
`flow-entries for previously
`encountered conversational
`flows” / “database
`[comprising none / for
`containing one] or more
`flow-entries for previously
`encountered conversational
`flows”
`
`’099 claim 1;
`’646 claims 1, 7, 16;
`’751 claims 1, 17, 19;
`’789 claims 1, 44
`
`
`
`5
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 8 of 18
`
`
`
`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 9 of 18
`
`
`
`Juniper alleges that “one skilled in the art would understand that the ‘flow-entry database’
`
`terms require a ‘database having a separate entry for each encountered conversational flow . . . .”
`
`Response at 14. The Federal Circuit has now resolved this dispute, agreeing with Packet
`
`Intelligence’s position.
`
`In the NetScout appeal, NetScout argued that “a memory for storing a database comprising
`
`none or more flow-entries for previously encountered conversational flows” required a database of
`
`already correlated flow entries—i.e., the database cannot contain connection flow entries. See
`
`NetScout Appeal, No. 2019-2041, slip op. at 7-8 (“NetScout argues that the limitation requires
`
`correlating connection flows
`
`into conversational flows.”). This served as NetScout’s
`
`noninfringement position because its accused products maintain information about connection
`
`flows. See id. at 8 (“In NetScout’s view, the record establishes that the accused products track
`
`connection flows but never join them together.”). Packet Intelligence responded to “NetScout’s
`
`claim construction argument, [stating] . . . that the claims do not require joining flows into a single
`
`conversational flow.” Id. The Federal Circuit agreed with Packet Intelligence and rejected
`
`NetScout’s proposed claim construction:
`
`We first agree with Packet Intelligence that the claims do not require the joining of
`connection flows into conversational flows. The term “conversational flow”
`appears in claim 19’s memory limitation: “a memory for storing a database
`comprising none or more flow-entries for previously encountered conversational
`flows, each flow-entry identified by identifying information stored in the flow
`entry.” ’789 patent col. 36 ll. 45–48. Contrary to NetScout’s argument, however, a
`limitation requiring memory for storing flow entries for previously encountered
`conversational flows does not require the added action of correlating connection
`flow entries into conversational flows.
`
`Id. (emphases added).
`
`The Federal Circuit has squarely addressed the claim construction proposed by Juniper, and
`
`it rejected that proposed construction. And neither party has alleged that the flow-entry database
`
`limitations should be construed differently across the patents. Thus, the Federal Circuit’s holding
`
`in the NetScout appeal is binding in this proceeding. See Markman, 517 U.S. at 390–91 (“[T]reating
`
`interpretive issues as purely legal will promote (though it will not guarantee) intrajurisdictional
`
`
`certainty through the application of stare decisis . . . .”). The Federal Circuit has “recognize[d] the
`
`national stare decisis effect that [its] decisions on claim construction have.” Key Pharm. v. Hercon
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`6
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 9 of 18
`
`
`
`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 10 of 18
`
`
`
`Labs. Corp., 161 F.3d 709, 716 (Fed. Cir. 1998); see also Rambus Inc. v. Hynix Semiconductor
`
`Inc., 569 F. Supp. 2d 946, 963–64 (N.D. Cal. 2008) (“A district court must apply the Federal
`
`Circuit’s claim construction even where a non-party to the initial litigation would like to present
`
`new arguments.”); Amgen, Inc. v. F. Hoffmann-LaRoche Ltd., 494 F. Supp. 2d 54, 60–61 (D. Mass.
`
`2007) (holding when the Federal Circuit has already construed claims, that Court’s construction is
`
`binding and district courts may not modify its holding); Pass & Seymour, Inc. v. Hubbell Inc., No.
`
`5:07-CV-945 (NAM/DEP), 2011 U.S. Dist. LEXIS 1135, at *4 (N.D.N.Y. Jan. 5, 2011) (“[D]istrict
`
`courts are bound to apply the Federal Circuit’s claim constructions, even as against non-parties to
`
`the initial litigation.”). For these reasons, the Court should adopt Packet Intelligence’s proposed
`
`construction.
`
`C.
`
`“the flow” / “new flow” / “existing flow”
`
`PI’s Construction
`No construction necessary
`
`Juniper’s Construction
`“the conversational flow” /
`“existing conversational
`flow” / “new conversational
`flow”
`
`Claim Term
`“the flow” / “new flow” /
`“existing flow”
`
`’099 claims 1, 2
`’725 claims 16
`’646 claims 1, 7, 16;
`’751 claims 1, 5, 10, 15, 17;
`’789 claims 1, 13, 14, 16, 19,
`44
`
`The Federal Circuit resolved this dispute when it addressed the flow-entry database terms.
`
`See supra Section II.B. As detailed above, the Federal Circuit held that the claimed “memory
`
`storing a flow-entry database” need not include already correlated connection flow entries. See
`
`NetScout Appeal, No. 2019-2041, slip op. at 8 (“[A] limitation requiring memory for storing flow
`
`entries for previously encountered conversational flows does not require the added action of
`
`correlating connection flow entries into conversational flows.” (emphasis omitted)). Juniper’s
`
`proposed construction is inconsistent with the Federal Circuit’s holding.
`
`Relying on Claim 19 of the ’789 Patent, as the Federal Circuit did, illustrates the issue. First,
`
`the claim includes “a memory for storing a database comprising none or more flow-entries for
`
`
`previously encountered conversational flows . . . .” ECF No. 63-6 [hereinafter ’789 Patent] at
`
`36:45-47. Then, it requires “a lookup engine . . . to lookup whether the particular packet . . . has a
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`7
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 10 of 18
`
`
`
`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 11 of 18
`
`
`
`matching flow-entry, the looking up using at least some of the selected packet portions and
`
`determining if the packet is of an existing flow . . . .” Id. at 36:49-55 (emphasis added). Finally, the
`
`claim recites:
`
`a flow insertion engine . . . configured to create a flow-entry in the flow-entry
`database, the flow-entry including identifying information for future packets to be
`identified with the new flow-entry, the lookup engine configured such that if the
`packet is of an existing flow, the monitor classifies the packet as belonging to the
`found existing flow; and if the packet is of a new flow, the flow insertion engine
`stores a new flow-entry for the new flow in the flow-entry database…
`
`Id. at 36:56-65 (emphasis added). Notably, if the packet is of “a new flow,” then a flow entry for
`
`that new flow is stored in the flow-entry database. And the Federal Circuit confirmed that the flow-
`
`entry database can comprise connection flow entries. For this reason, Juniper’s arguments that the
`
`“a new flow” and “an existing flow” terms must specify a “conversational flow” should be rejected.
`
`D.
`
`“base protocol”
`
`Claim Term
`
`“base protocol”
`
`’725 claims 1, 17
`
`
`Packet Intelligence’s
`Construction
`No construction necessary
`
`Juniper’s Construction
`
`“frame transmission protocol,
`such as the data link layer
`protocol”
`
`Defendant contends its proposed construction is permissible because it says its construction
`
`merely provides an example, and “does not limit the meaning of this term.” ECF 62 (Response) at
`
`20. For this reason alone, the Court should reject the construction. See U.S. Surgical Corp. v.
`
`Ethicon, Inc., 103 F.3d 1554, 1568 (Fed. Cir. 1997) (“Claim construction is a matter of resolution
`
`of disputed meanings and technical scope, to clarify and when necessary to explain what the
`
`patentee covered by the claims, for use in the determination of infringement. It is not an obligatory
`
`exercise in redundancy.”).
`
`Here, the claims are readily understandable on their face, because they define the meaning
`
`of a “base protocol”—it is the base (or lowest level) protocol “of the packet.” See, e.g., ECF No.
`
`57-3 (ʼ725 Pat.) at cl. 1(c) (“the set of protocol descriptions based on the base protocol of the
`
`
`packet.” (emphasis added)). Indeed, Defendant says the concepts addressed here are all “well-
`
`known” and “both parties will refer to and explain these well-known models before the jury.” ECF
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`8
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 11 of 18
`
`
`
`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 12 of 18
`
`
`
`No. 62 (Response) at 19-20.
`
`Put simply: Defendant concedes the lack of any disclaimer and both Defendant and its
`
`expert concede the term “base protocol” often refers to layers other than the “data link layer.”
`
`Accepting Defendant’s argument that these concepts are “well-known,” there is no reason to
`
`provide a construction of this term identifying a single example—even if it is an “inclusive”
`
`example as Defendant contends. Any attempt to do so is more likely to lead to gamesmanship than
`
`clarity. Because Defendant identifies no disputed matter of scope or meaning, the Court should
`
`reject Defendant’s proposal.
`
`E.
`
`“slicer”
`
`Claim Term
`
`“slicer”
`
`’789 claims 19
`
`
`Packet Intelligence’s
`Construction
`Component or process that
`performs extraction
`operations on a packet
`
`Juniper’s Construction
`
`No construction necessary
`
`To the extent the Court
`requires a construction,
`Juniper proposes:
`
`“a component that performs
`extraction operations on a
`packet”
`
`Defendant contends requiring that the slicer be a “component” does not limit it to “a
`
`hardware component.” ECF 62 (Response) at 21. Instead, Defendant says, it “could be a discrete
`
`software component.” Id. Defendant’s new inclusion of the word “discrete” here is telling—though
`
`Defendant says it does not intend “component” to refer to hardware (the common meaning of the
`
`term), Defendant still promotes a construction that would limit a “slicer” to an independent,
`
`standalone item.
`
`There is no support to inject such a limitation into the claims. To the contrary—both the
`
`claims and the specification show that the slicer is a component or process that is part of the
`
`extraction engine to enable the system to extract certain portions of a packet. See, e.g., ECF No.
`
`57-6 (ʼ789 Pat.) at 22:30-41 (“the extraction engine (also called a ‘slicer’) … The commands are
`
`
`sent from PRE 1006 to slicer 1007 in the form of extraction instruction pointers which tell the
`
`extraction engine 1007 where to a find the instructions in the extraction operations database
`
`PI’S REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`9
`
`
`
`
`
`
`
` CASE NO. 3:19-CV-04741-WHO
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence LLC Exh 2071
`Juniper Networks, Inc., et al v. Packet Intelligence LLC
`IPR2020-00337
`Page 12 of 18
`
`
`
`Case 3:19-cv-04741-WHO Document 68 Filed 07/21/20 Page 13 of 18
`
`
`
`memory (i.e., slicer instruction database) 1002.”) And Juniper studiously avoids addressing the
`
`specification’s teaching that the entire flow can be implemented on a single piece of hardware. See
`
`id. at 21:35-40 (“the flow of FIG. 3 may alternatively be implemented in software running on
`
`one or more general-purpose processors, or only partly implemented in hardware.”)
`
`(emphasis added)).
`
`The specification also contradicts Defendant’s suggestion that the slicer cannot be
`
`implemented as a process, because it shows the extractor (slicer) receiving instructions to carry out
`
`a process. See id. at 22:42-48 (“Thus, when the PRE 1006 recognizes a protocol it outputs both the
`
`protocol identifier and a process code to the extractor [slicer]. The protocol identifier is added to
`
`the flow signature and the process code is used to fetch the first instruction from