throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`Juniper Networks, Inc. & Palo Alto Networks, Inc.
`Petitioners,
`
`
`v.
`
`Packet Intelligence LLC,
`Patent Owner.
`
`Case IPR2020-00337
`U.S. Patent No. 6,771,646
`
`PATENT OWNER’S SURREPLY
`
`
`
`
`
`
`
`Mail Stop “PATENT BOARD”
`Patent Trial and Appeal Board
`U.S. Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`PATENT OWNER’S EXHIBIT LIST
`
`
`
`2003
`
`2004
`2005
`
`Exhibit No. Description
`2001
`Withdrawn
`2002
`Packet Intelligence LLC v. Sandvine Corp., No. 2:16-cv-00147, Dkt.
`No. 17 (E.D. Tex. June 1, 2017) (order consolidating cases)
`File History for U.S. Patent No. 6,771,646 – Feb. 10, 2004,
`Response to Office Action (annotated version of Ex. 1020)
`Reserved
`Palo Alto Networks, Inc. v. Packet Intelligence LLC (No. 19-cv-
`02471-WHO) and Packet Intelligence LLC v. Juniper Networks, Inc.
`(No. 19-cv-04741-WHO), Transcript of Case Management
`Conference on January 7, 2020
`Palo Alto Networks, Inc. v. Packet Intelligence LLC, No. 19-cv-
`02471-WHO, Dkt. No. 62 (May 15, 2020) (Order Granting Palo
`Alto Networks’ Proposed Modification to the Scheduling Order)
`Packet Intelligence LLC v. Juniper Networks, Inc., No. 3:19-cv-
`04741-WHO, Dkt. No. 48 (March 29, 2020) (Stipulated First
`Amended Scheduling Order)
`PAN Contentions A5 – (Riddle)
`PAN Contentions A13 – (Yu)
`JUN Contentions A6 - (Riddle and Ferdinand)
`JUN Contentions A7 - (Riddle and Ferdinand and Yu)
`JUN Contentions A8 - (Riddle and Ferdinand and Baker)
`JUN Contentions A9 - (Riddle and Ferdinand and Baker and Yu)
`JUN Contentions A10 - (Riddle and Ferdinand and RFC1945)
`JUN Contentions A11 - (Riddle and Ferdinand and Baker and
`RFC1945)
`JUN Contentions B6 - (Riddle and Baker)
`JUN Contentions B7 - (Riddle and Baker and Yu)
`JUN Contentions B8 - (Riddle and Baker and RFC1945)
`JUN Contentions C6 - (Riddle and Ferdinand and Wakeman)
`
`2006
`
`2007
`
`2008
`2009
`2010
`2011
`2012
`2013
`2014
`2015
`
`2016
`2017
`2018
`2019
`
`ii
`
`

`

`2020
`
`2021
`
`2022
`2023
`2024
`2025
`2026
`2027
`2028
`2029
`
`2030
`2031
`2032
`2033
`
`2034
`2035
`2036
`
`2037
`2038
`2039
`2040
`2041
`
`2042
`
`2043
`2044
`
`2045
`
`IPR2020-00337
`U.S. Pat. No. 6,771,646
`JUN Contentions C7 - (Riddle and Ferdinand and Wakeman and
`Yu)
`JUN Contentions C8 - (Riddle and Ferdinand and Wakeman and
`RFC1945)
`JUN Contentions D6 - (Riddle and Ferdinand)
`JUN Contentions D7 - (Riddle and Ferdinand and Yu)
`JUN Contentions D8 - (Riddle and Ferdinand and RFC1945)
`JUN Contentions E6 - (Riddle and Ferdinand)
`JUN Contentions E7 - (Riddle and Ferdinand and Yu)
`JUN Contentions E8 - (Riddle and Ferdinand and Wakeman)
`JUN Contentions E9 - (Riddle and Ferdinand and Wakeman and Yu)
`JUN Contentions E10 - (Riddle and Ferdinand and Wakeman and
`RFC1945)
`JUN Contentions E11 - (Riddle and Ferdinand and Baker)
`JUN Contentions E12 - (Riddle and Ferdinand and Baker and Yu)
`JUN Contentions E13 - (Riddle and Ferdinand and RFC1945)
`JUN Contentions E14 - (Riddle and Ferdinand and Baker and
`RFC1945)
`JUN Contentions E15 - (Riddle and Ferdinand and Hasani)
`JUN Contentions E16 - (Riddle and Ferdinand and Hasani and Yu)
`JUN Contentions E17 - (Riddle and Ferdinand and Hasani and
`RFC1945)
`U.S. Patent No. 7,748,002 (“Beser”)
`File History for USPN 7,748,002 - October 3, 2006 Office Action
`U.S. Patent No. 7,706,357 (“Dyckerhoff”)
`File History for USPN 7,706,357 - June 30, 2009 Office Action
`January 18, 2019 Letter to Palo Alto Networks re Notice of
`Infringement
`January 18, 2019 Letter to Juniper Networks Inc re Notice of
`Infringement
`Withdrawn
`Complaint in Palo Alto Networks, Inc. v. Packet Intelligence LLC,
`No. 3:19-cv-02471-WHO (N.D. Cal.)
`Petition in IPR2019-01289
`
`iii
`
`

`

`2046
`2047
`2048
`2049
`2050
`
`2051
`
`2052
`
`2053
`2054
`2055
`2056
`2057
`2058
`2059
`
`2060
`
`2061
`2062
`2063
`2064
`2065
`2066
`
`2067
`
`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`Petition in IPR2019-01290
`Petition in IPR2019-01291
`Petition in IPR2019-01292
`Petition in IPR2019-01293
`Stay Order in Uniloc 2017 LLC v. Apple, Inc., No. 19-cv-01904-
`WHO (N.D. Cal.)
`Joint Motion to Amend the Scheduling Order in Palo Alto Networks,
`Inc. v. Packet Intelligence LLC, No. 3:19-cv-02471-WHO (N.D.
`Cal.)
`Order Granting PAN’s Proposed Modification to the Scheduling
`Order in Palo Alto Networks, Inc. v. Packet Intelligence LLC, No.
`3:19-cv-02471-WHO (N.D. Cal.)
`Petition in IPR2017-00450
`Petition in IPR2017-00451
`Petition in IPR2017-00629
`Petition in IPR2017-00630
`Petition in IPR2017-00769
`Petition in IPR2017-00869
`Final Judgment in Packet Intelligence LLC v. NetScout Systems,
`Inc. et. al., No. 2:16-cv-00230-JRG (E.D. Tex.)
`Packet Intelligence LLC v. NetScout Systems, Inc., et al, No. 2019-
`2041 (Fed. Cir. July 14, 2020) Decision
`Declaration of Cathleen T. Quigley
`CV of Cathleen T. Quigley
`Reserved
`RFC 768 - User Datagram Protocol
`RFC 1340 - Assigned Numbers
`Palo Alto Networks, Inc. v. Packet Intelligence LLC, No. 19-cv-
`02471-WHO, Dkt. No. 63 (June 4, 2020) (Packet Intelligence LLC’s
`Opening Claim Construction Brief)
`Palo Alto Networks, Inc. v. Packet Intelligence LLC, No. 19-cv-
`02471-WHO, Dkt. No. 67 (July 2, 2020) (Palo Alto Networks’
`Responsive Claim Construction Brief)
`
`iv
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`Palo Alto Networks, Inc. v. Packet Intelligence LLC, No. 19-cv-
`02471-WHO, Dkt. No. 68 (July 21, 2020) (Packet Intelligence
`LLC’s Reply Claim Construction Brief)
`Packet Intelligence LLC v. Juniper Networks, Inc., No. 19-cv-
`04741-WHO, Dkt. No. 57 (June 4, 2020) (Packet Intelligence LLC’s
`Opening Claim Construction Brief)
`Packet Intelligence LLC v. Juniper Networks, Inc., No. 19-cv-
`04741-WHO, Dkt. No. 62 (July 2, 2020) (Juniper’s Responsive
`Claim Construction Brief)
`Packet Intelligence LLC v. Juniper Networks, Inc., No. 19-cv-
`04741-WHO, Dkt. No. 68 (July 21, 2020) (Packet Intelligence
`LLC’s Reply Claim Construction Brief)
`Packet Intelligence LLC v. Juniper Networks, Inc., No. 19-cv-
`04741-WHO, Dkt. No. 71 (August 5, 2020) (Juniper’s Sur-Reply
`Claim Construction Brief)
`U.S. Patent No. 5,917,821 - Gobuyan
`U.S. Patent No. 5,850,388 - Anderson
`
`
`
`2068
`
`2069
`
`2070
`
`2071
`
`2072
`
`2073
`2074
`
`
`
`
`v
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`
`
`TABLE OF CONTENTS
`Introduction ....................................................................................................... 1 
`I. 
`II.  Argument .......................................................................................................... 1 
`A.  The Construction of “Conversational Flow” ............................................ 1 
`1.  A Network Activity Occurs Between Specific Entities ..................... 2 
`2.  Specification Embodiments Teach That Conversational
`Flows Occur Between Specific Entities ............................................. 5 
`B.  PI Addressed Each Ground Under the Board’s Preliminary
`Construction ............................................................................................ 12 
`C.  Riddle Fails to Disclose “Conversational Flows” ................................... 13 
`1.  Riddle Does Not Classify Activities Based on a Particular
`Client ................................................................................................. 13 
`2.  Riddle Categorizes Inbound and Outbound Traffic
`Separately .......................................................................................... 15 
`3.  Riddle Fails to Distinguish between Different Activities of
`the Same Type .................................................................................. 16 
`D.  Yu Fails to Teach Conversational Flows ................................................ 16 
`E.  RFC1945 Fails to Teach or Render Obvious Conversational Flows ...... 17 
`F.  Petitioner Fails to Prove that Yu is Prior Art .......................................... 17 
`G.  There is No Reason to Combine Yu with Riddle ................................... 17 
`H.  The Asserted Grounds Fail to Teach the State-Based Limitations ......... 18 
`I.  The Asserted Grounds Fail to Teach the Flow-Entry Database
`Limitations .............................................................................................. 20 
`J.  The Asserted Grounds Fail to Render the Associative Cache
`Limitations Obvious ................................................................................ 22 
`K.  The Board Should Limit Its Analysis to the Petition .............................. 23 
`III.  Conclusion ...................................................................................................... 23 
`
`
`
`
`
`vi
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`TABLE OF AUTHORITIES
`
`Cases 
`Arctic Cat Inc. v. Bombardier Rec. Prods.,
`876 F.3d 1350 (Fed. Cir. 2017) ......................................................................... 22
`Eon Corp. IP Holdings LLC v. Silver Spring Networks, Inc.,
`815 F.3d 1314 (Fed. Cir. 2016) ........................................................................... 3
`Koninklijke Philips N.V. v. Google LLC,
`948 F.3d 1330 (Fed. Cir. 2020) ......................................................................... 21
`Polaris Indus. v. Arctic Cat, Inc.,
`882 F.3d 1056 (Fed. Cir. 2018) ......................................................................... 18
`Realtime Data, LLC v. Stanley,
`554 F. App’x 923 (Fed. Cir. 2014) ...................................................................... 4
`Realtime Data, LLC v. Stanley,
`875 F. Supp. 2d 276 (S.D.N.Y. 2012) ................................................................. 4
`
`
`
`vii
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`I. Introduction
`Nothing in Petitioner’s Reply overcomes the deficiencies identified in Packet
`Intelligence’s (“PI”) Response (“POR”). Petitioner relies on art that categorizes
`network packet traffic into broad categories depending on the type of activity that
`generates a packet. This sort of generalized grouping does not teach the claimed
`conversational flow, which recognizes packets corresponding to a related
`conversation activity involving the same parties. Petitioner’s attempts to address the
`other shortcomings in its grounds (such as Riddle’s unidirectional nature of traffic
`classes) conflict with the express teachings of those references. Petitioner also failed
`to satisfy its burdens of proving that Yu is prior art, that a POSITA would have
`modified Riddle in view of Yu, or that the asserted grounds teach the state-based,
`flow-entry database, or associative cache limitations. Finally, Petitioner fails to
`justify why the Board should permit the use of Petitioner’s 525-page expert
`declaration to circumvent word limits.
`
`II. Argument
`A. The Construction of “Conversational Flow”
`A critical aspect of “conversational flows” is that each conversational flow
`relates to an activity. When read in the context of the specification, that “activity”
`occurs between specific entities, as explained by express language of the patent and
`as understood by a POSITA from embodiments disclosed in the specification. This
`is further confirmed by the specification’s teachings that a flow is understood within
`the context of its endpoint participants.
`
`1
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`1. A Network Activity Occurs Between Specific Entities
`Contrary to Petitioner’s assertion, PI does not seek to “narrow” the meaning
`of conversational flow. Reply at 2. Rather, PI clarifies that an activity implicates
`specific network devices (e.g., a client and server) and does not include all packet
`exchanges of a generic activity type as Petitioner proposes. The specification’s
`definitional language explains that an activity is, “for instance, the running of an
`application on a server as requested by a client….” EX1001 at 2:39-40; see also id.
`at 9:14-19 (“Any network activity—for example an application program run by the
`client 104 (CLIENT 1) communicating with another running on the server 110
`(SERVER 2)—will produce an exchange of a sequence of packets over network 102
`that is characteristic of the respective programs and of the network protocols.”). The
`invention background describes network activity monitors and information obtained
`by such monitors, including “who is using [network services.]” Id. at 1:57; see also
`id. at 3:23-25 (“What is needed, therefore, is a network monitor that makes it
`possible to continuously analyze all user sessions on a heavily trafficked
`network.”);1 id. at 3:34-35 (describing need to determine “an end user’s pattern of
`use within each application”); id. at 4:45-47 (object and advantage of the invention
`to “Recognize and classify all packets that are exchanges between a client and
`server into respective client/server applications”).
`The specification repeatedly teaches that flows occur in the context of
`communication between particular devices—not all communication of a particular
`
`
`1 All emphases added unless otherwise noted.
`
`2
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`type. See id. at 12:4-5 (“A flow is a stream of packets being exchanged between any
`two addresses in the network.”); id. at 6:37-38 (discussing “client/server
`conversational flow”). Flows are typically recognized based on a signature that
`includes information about the endpoint devices (client/server) involved in the
`packet communication. See, e.g., id. at 4:34-36 (“[A] signature is built for every flow
`such that future packets of the flow are easily recognized.”); id. at 32:43-47 (“A
`source and destination network address occupy the first two fields of each packet,
`and…the flow signature…will also contain these two fields…”); id. at 13:22-29
`(explaining that most flow signatures rely on source and destination addresses). To
`the extent an endpoint is not identified in a particular protocol (e.g., an application
`layer protocol), that information is embedded within lower-layer protocols (e.g.,
`Ethernet, TCP, IP). See id. at 9:54-57.
`Conversational flow must be interpreted in the context of the specification.
`See Eon Corp. IP Holdings LLC v. Silver Spring Networks, Inc., 815 F.3d 1314,
`1320-23 (Fed. Cir. 2016) (rejecting constructions “untethered to the context of the
`invention” even though they could, “in the abstract, be given such a broad
`meaning”). And the specification teaches that flows, flow signatures, and network
`activities (which result in flows) involve specific endpoints (client and server). To
`remove this aspect of a conversational flow, as Petitioner proposes, eliminates the
`notion of a flow, which is communication between two devices. See EX1001 at 12:4-
`5 (“A flow is a stream of packets being exchanged between any two addresses in the
`network.”). This understanding of conversational flow and network activity
`
`3
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`(corresponding to a client request) tracks how a POSITA would have understood
`these terms within the context of the specification. See EX2061 ¶¶41, 43-44, 47.
`Even if the language clarifying the scope of an activity were “exemplary,”
`that language must still be considered in determining the meaning of the term
`“conversational flow.” See Realtime Data, LLC v. Stanley, 554 F. App’x 923, 932-
`33 (Fed. Cir. 2014). The district court in Realtime Data construed the term “data
`field type” as “[c]ategorization of the data in the field (or block) as one of ASCII,
`image data, multimedia data, signed and unsigned integers, pointers, or other data
`type”, consistent with the examples provided in the specification. See Realtime
`Data, LLC v. Stanley, 875 F. Supp. 2d 276, 290-91, 296 (S.D.N.Y. 2012)
`(construing “data field type” from U.S. Patent No. 7,417,568, which enumerates the
`exemplary types at 14:6-8 as “data types (e.g., ASCII, image data, multimedia data,
`signed and unsigned integers, pointers, etc.)”). The Federal Circuit affirmed the
`construction, finding “[t]he district court was correct in concluding that, based on
`the specifications of the patents, the ‘data field/block type’ term…must be tied to
`some analysis of the content of the data field or block and cannot simply encompass
`any characteristic or attribute of data.” Realtime, 554 F. App’x at 933. The clarifying
`language regarding “an activity” is important here for the same reason—in the
`context of the specification, no reasonable person, let alone a POSITA, would
`interpret the use of “an activity” to include all packets related to the same type of
`activity.
`Despite Petitioner’s assertions otherwise (see Reply at 3), Ms. Quigley’s
`declaration extensively
`reinforces
`that a POSITA would understand a
`
`4
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`conversational flow to relate to a specific activity as requested by a client. Ms.
`Quigley analyzed, inter alia, the ’646 and ’099 Patent disclosures, and explained
`that the sequence of packets occurs “as requested by a client,” and noted that related
`connection flows are identified “based on an underlying activity involving
`particular network devices (users, clients, or servers).” EX2061 ¶¶41, 43-44; see
`id. ¶47 (describing conversational flow in the context of launching an application),
`¶50 (giving the analogy of conversations involving particular people—the
`users/clients/servers involved with a given action), ¶51 (noting that conversational
`flows are used to identify which applications are running and who is using them—
`i.e., which client requested them), ¶52 (“Applying the concept of conversational
`flows as taught by the Challenged Patents allows a monitor to understand the
`context of the application and the causal relationship of the launch to the creation
`of the multiple connections, and to capture all the relevant information needed to
`identify and monitor the individual calls.”), ¶54 (“A Zoom or Webex call ‘activity’
`is started by a user…”), ¶56 (same).
`
`2. Specification Embodiments Teach That Conversational Flows
`Occur Between Specific Entities
`Petitioner’s claim that “certain disclosed embodiments describe that different
`clients may be part of the same conversational flow” is incorrect. Reply at 3-4.
`Petitioner states that the SAP (Service Advertising Protocol) example “describes
`identifying packets as part of a conversational flow when those packets originate
`from different clients.” Id.
`
`5
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`Petitioner misreads the SAP example, which teaches two critical points. First,
`the SAP example
`teaches recognizing disjointed connection flows as a
`conversational flow because they relate to the same network activity. This first point
`is explained in PI’s Response. See POR at 10-11, 35-38. In short: an SAP Request
`is sent, and the server responds with an SAP Reply, which identifies the address (or
`port) for the print service. EX1001 at 2:52-56; EX1016 at 135:6-10. Later, a print
`request is sent to the address (or port) previously identified. EX1001 at 2:61-64. If
`the sender of the print request is the same client that sent the SAP request, that print
`request connection flow is recognized as related to the earlier SAP Request
`connection flow, thus belonging to the same conversational flow. If not, the print
`request connection flow (from a different client) is recognized as a different
`conversational flow.
`Second, the SAP example explains how to determine the type of a network
`activity based on previously observed communications, despite a protocol’s
`reliance on dynamic port allocation (such as server announcement protocols like
`SAP). This second point relates to the network monitor’s ability to recognize
`subsequent print requests from different clients as being “print request” activities.
`Because SAP uses a dynamic addressing scheme in which service addresses are
`determined by the server and then announced (or advertised) to the network, clients
`(and a network monitor) learn of the address correlation by intercepting a server
`announcement involving that address. EX1016 at 28:8-16, 30:4-15.
`
`6
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`Petitioner relies on the quote below to purportedly show how the same type
`of activity by different clients is considered a single conversational flow. But the
`language simply illustrates the scenario explained above:
`
`The two packet exchanges would then be correctly identified as being
`part of the same flow if the clients were the same. They would even be
`recognized if the clients were not the same.
`EX1016 at 3:28-30 (quoted by Reply at 4). The first sentence of this quote merely
`illustrates PI’s first point (above) about how disjointed connection flows can be
`recognized as related. The second sentence illustrates how a later print request by a
`different client can also be recognized as a print request activity because it uses the
`now known address of the print service.
`Petitioner also ignores an important detail: the location of SAP services can
`be acquired by means other than an SAP request, such as SAP advertising messages
`broadcast to the network. This is why it is possible for other clients who did not send
`the request to still know the server’s address. EX1016 at 3:18-21, 28:8-16 (“In the
`server announcement mode there are messages which are put out onto the network,
`in either a broadcast or multicast approach which, all stations in the network
`receive…There are several examples for this type of server announcement
`implementation…[including] SAP”), 135:12-13 (“SAP periodically broadcasts
`services that are in its advertising database.”). Thus, the passage quoted by Petitioner
`does not say that every exchange of SAP packets is part of a single conversational
`flow regardless of the clients involved. Instead, it addresses a case specific to
`dynamic addressing technology, in which the invention can still correctly identify
`
`7
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`the second conversational flow exchange as being associated with a print service
`even though the second client never issued its own SAP Request to the server.
`Ms. Quigley addressed the SAP example and reached the same conclusion.
`EX2061 ¶¶58-60. As she notes, the print request from the second client is part of a
`different conversational flow, and because the invention can recognize it as such it
`can “provide accurate monitoring data of service usage by individual users, rather
`than aggregating together all usage of a service by multiple users.” Id. Thus, a
`POSITA would understand the SAP example to reinforce that a conversational flow
`relates to a specific activity as requested by a client.
`Petitioner’s argument that “[Ms. Quigley] agrees that communications from
`different clients may be associated into a single ‘conversational flow’” is supported
`only by Petitioner stringing together statements from two different parts of Ms.
`Quigley’s declaration: “a conversational flow may include ‘other client-server
`connections’ related based on ‘servers.’” Reply at 5-6 (quoting EX2061 at p. 23
`¶51, then ¶43). This misquotation is misleading at best—the first portion of Ms.
`Quigley’s testimony explains that multiple connection flows (including “other
`client-server connections”) can be associated with a conversational flow. EX2061
`¶51. One way the specification reflects this concept is by the SAP example, which
`associates a first client-server connection (the SAP request) with another client-
`server connection (the print request). Id. ¶59. The second portion of Petitioner’s
`manufactured quote from Ms. Quigley is a snippet from the following: “This
`technique uses novel methods including inspecting and tracking connection flows
`and identifying whether connection flows are related based on an underlying
`
`8
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`activity involving particular network devices (users, clients, or servers).” EX2061
`¶43. Petitioner’s suggestion that Ms. Quigley agrees that a conversational flow
`includes all packets related to the same type of network activity is a gross
`misrepresentation of the actual language in her declaration.
`Additionally, Petitioner’s expert provides no testimony supporting its
`assertion that the SAP example describes different clients as being part of the same
`conversational flow. Dr. Weissman’s declaration mentions “SAP” in 24 paragraphs,
`and never once provides an opinion on how the SAP exchanges relate to
`conversational flows. See EX1006 ¶¶83-84 (noting the prosecution history
`statement that the flows are linked “[i]f the clients were the same”), ¶¶113, 943
`(discussing unrelated “service access point” SAP), ¶¶278, 330, 361, 388, 396, 560,
`675, 678, 694, 722, 726, 747, 785, 807, 815, 829, 951 (listing SAP as a protocol
`type), ¶¶307, 332, 638 (listing registered SAP as a “well-known” traffic type). Nor
`did Petitioner include any other evidence to support its new SAP theory with its
`Reply. Thus, the record contains no evidentiary support for Petitioner’s theory that
`SAP recognizes network activities initiated by different clients as part of the same
`conversational flow.
`reflects a similar
`the RPC protocol
`Petitioner’s argument about
`misunderstanding. See Reply at 5. Like SAP, RPC is another “server announcement
`protocol” that advertises the “appropriate connection point for communicating for
`[a] particular application.” EX1016 at 30:4-19. Typically, with RPC, specific
`programs or applications are available from a server. Id. at 30:16-21, 31:7-15. The
`’903 Provisional describes an example in the context of Figure 1:
`
`9
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`If Client 3 wants to identify the connection point for a specific application, it sends
`an RPC Bind Lookup Request to Server 2 requesting a version of that program. Id.
`at 31:7-11. Server 2 responds with an RPC Bind Lookup Reply “contain[ing] the
`specific Port number…on which future transactions will be accepted for the specific
`RPC program.” Id. at 31:12-20. Other clients may see this reply and therefore not
`need to make a similar request to initiate a network activity with the specific
`application being announced. Id. at 32:1-5. The network monitor can use this same
`information to identify the application implicated by later communications with the
`identified server and port. Id. at 31:23-26, 32:5-7. Yet nowhere in the disclosure
`
`10
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`does it say that RPC call flows initiating network activity with a specific application
`from different clients should be grouped into a single conversational flow.
`Petitioner’s arguments about SAP and RPC stem from either a
`misunderstanding or misrepresentation of server announcement protocols and how
`they announce (or advertise) the connection point for an application. If the
`connection point for a print application becomes known to multiple clients (either
`through individual requests, broadcasting, or some other means), those clients do
`not then have to make the same request to use the application that was previously
`announced. Instead, they can initiate network activity with those applications based
`on the previously obtained announcement information. Likewise, the network
`monitor can rely on the same announcement information to properly recognize such
`subsequent network activities as relating to the service or application that was
`announced. And Dr. Weissman’s declaration provides no support for Petitioner’s
`assertion that RPC describes different clients as being part of the same
`conversational flow. See generally EX1006.2
`In short, Petitioner provides no evidence supporting its theory that the
`claimed invention teaches that exchanges as a result of the same-type activities from
`multiple clients are grouped into the same conversational flow. Rather than submit
`evidence on this point, Petitioner proposes a convoluted read of the specification’s
`
`
`2 Dr. Weissman mentions RPC twice, neither of which supports Petitioner’s
`assertion all network activities of the same type are grouped into a single
`conversational flow. See EX1006 ¶¶83, 529.
`
`11
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`teachings and manufactures quotations from disparate portions of Ms. Quigley’s
`declaration to support its new theory.
`Finally, Petitioner states that “no tribunal has construed ‘conversational flow’
`as limited to ‘application activity involving the same client.’” Reply at 7. This issue
`has not been raised—despite multiple challenges to the validity of the patent—
`because no prior challenger has ever suggested that a conversational flow is
`completely independent of the participants in the conversation and instead only
`conglomerates all network activity of a certain type. As detailed above, this
`argument ignores the specification’s teachings about flows and network activities—
`the client and server participating in a conversation are part of the nature of a
`conversational
`flow. Petitioner’s
`last-resort argument conflicts with
`the
`specification and must be rejected.
`
`B. PI Addressed Each Ground Under the Board’s Preliminary Construction
`Petitioner’s claims that PI did not analyze the asserted grounds under the
`Board’s preliminary construction are false. Reply at 1-2, 10-11, 21 n.77. PI
`extensively discussed why Riddle does not teach conversational flows involving
`sequences of packets exchanged as a result of an activity. See POR at 34-43. PI also
`explained why Riddle does not teach “packets that are exchanged in any direction.”
`Id. at 44-45. And, PI explained that Yu cannot teach conversational flows at least
`because “it merely discloses treating similar types of connection flows according to
`the same policy” and cannot distinguish between different activities. Id. at 48-50; id.
`at 52-53 (addressing RFC1945). Finally, the Board determined that PI’s proposed
`
`12
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`construction is no different from the Board’s preliminary construction. See Paper 27
`at 4 (suggesting that the proposed clarifying language would be “non-limiting”).
`
`C. Riddle Fails to Disclose “Conversational Flows”
`Petitioner’s analysis of conversational flows and Riddle once again glosses
`over the requirement that the sequence of packets be exchanged as a result of an
`activity. Reply at 8-14. Petitioner points out that “Riddle teaches applying ‘policies’
`to control traffic classified as to type of service required.” Id. at 8 (internal quotes
`omitted). PI agrees that Riddle’s monitoring is limited to identifying traffic based
`only on the type of service being used. It does not teach identifying specific instances
`of service usage (activities) as required to teach conversational flows. Not only does
`Riddle not disclose the claimed limitation, it also does not even identify a need to
`classify specific activities; it is concerned with “classifying packet flows for use in
`allocating bandwidth resources.” EX1008 at Abstract; POR at 16-18, 40, 43. Riddle
`gives examples of a network operator dividing bandwidth between FTP and web
`traffic. EX1008 at 10:18-51. In the examples given, it is unnecessary to identify
`specific instances of FTP activity or specific instances of web activity to allocate
`bandwidth between the traffic classes.
`
`1. Riddle Does Not Classify Activities Based on a Particular Client
`Petitioner suggests that a service aggregate can distinguish between the same
`type of activity between different clients. Reply at 11-12. But Petitioner’s
`explanation hinges on an extrapolation of how a single connection example is
`classified that is not supported by the rest of the specification. In Riddle, service
`aggregates are a “common traffic class” that are “created with a plurality of traffic
`
`13
`
`

`

`IPR2020-00337
`U.S. Pat. No. 6,771,646
`
`specifications.” EX1008 at 11:15-23. Riddle notes “[a] traffic class is broadly
`defined as traffic between one or more clients and one or more servers.” Id. at 8:48-
`49, 14:18-20 (“[A]nother method of identifying an individual traffic class is to detect
`simultaneous connections to the same host port from different clients.”). Thus,
`Riddle does not classify traffic per user, but by the type of traffic based on properties
`such as the ports being used. This understanding reflects Riddle’s stated purpose—
`bandwidth management.
`Petitioner also suggests that, because a traffic class can be defined in terms of
`a specific source or destination IP address, that Riddle discloses “classifying traffic
`into client-specific conversational flows.” Reply at 11-12 (citing Riddle at 8:5

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket