throbber

`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`__________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`__________
`
`
`JUNIPER NETWORKS, INC.,
`“Petitioner” or “Juniper”
`
`v.
`
`HUAWEI DIGITAL TECHNOLOGIES (CHENG DU) CO., LIMITED.,
`“Patent Owner” or “Huawei”
`___________
`
`U.S. Patent No. 10,027,693
`
`Issued: July 17, 2018
`
`
`Named Inventor:
`Wu JIANG
`
`
`Title:
`Method, Device and for Alerting Against Unknown Malicious Codes within a
`Network Environment
`___________
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 10,027,693
`
`
`
`
`Mail Stop: PATENT BOARD
`Patent Trial and Appeal Board
`U.S. Patent & Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`10832643
`
`
`
`
`

`

`TABLE OF CONTENTS
`
`Page
`INTRODUCTION ........................................................................................ 1
`
`STATE OF THE ART .................................................................................. 3
`
`I.
`
`II.
`
`III. BACKGROUND AND OVERVIEW OF THE CHALLENGED
`PATENT ....................................................................................................... 5
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`The Specification of the Parent ’206 Patent ....................................... 6
`
`Prosecution History of the Parent ’206 Patent ................................... 8
`
`The Specification of the ’693 Patent ................................................ 11
`
`Prosecution History of the ’693 Patent ............................................ 13
`
`The Challenged Claims of the ’693 Patent ...................................... 15
`
`IV. PRIORITY DATE OF THE CHALLENGED CLAIMS ........................... 16
`
`A.
`
`B.
`
`Legal Standard for Claiming the Benefit of an Earlier Filed
`Application ....................................................................................... 16
`
`Summary of Unsupported Subject Matter Added to the
`Specification of the ’693 Patent ....................................................... 19
`
`i.
`
`ii.
`
`iii.
`
`Huawei Expanded the ’693 Patent to Include New
`Types of File Requests not Supported by the ’206
`Patent ...................................................................................... 19
`
`Huawei Expanded the ’693 Patent to Cover FTP
`Communications .................................................................... 26
`
`The Claimed Network Device is Unsupported by the
`’206 Patent ............................................................................. 30
`
`iv.
`
`Conclusion ............................................................................. 32
`
`V. DISCRETIONARY FACTORS ................................................................. 33
`
`10832643
`
`
`- i -
`
`

`

`Page
`§ 325(d) Does Not Favor Denial ...................................................... 33
`
`§ 314(a) Does Not Favor Denial ...................................................... 37
`
`A.
`
`B.
`
`VI.
`
`IDENTIFICATION OF CHALLENGE AND GROUNDS ....................... 39
`
`VII. LEVEL OF ORDINARY SKILL IN THE ART ........................................ 39
`
`VIII. CLAIM CONSTRUCTION ....................................................................... 40
`
`A.
`
`“detecting the [executable] file” (Claims 1, 3, 5)............................. 40
`
`IX. GROUND 1: THE CHALLENGED CLAIMS ARE OBVIOUS
`OVER THE ’691 PUBLICATION ............................................................ 41
`
`A. Overview of Ground 1 ...................................................................... 41
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`G.
`
`H.
`
`I.
`
`J.
`
`Claim 1 ............................................................................................. 41
`
`Claim 2 ............................................................................................. 53
`
`Claim 3 ............................................................................................. 54
`
`Claim 4 ............................................................................................. 56
`
`Claim 5 ............................................................................................. 56
`
`Claim 6 ............................................................................................. 59
`
`Claim 7 ............................................................................................. 60
`
`Claim 8 ............................................................................................. 60
`
`Claim 9 ............................................................................................. 61
`
`X.
`
`STATUTORY REQUIREMENTS ............................................................ 61
`
`A. Notice of Real Party-In-Interest (37 C.F.R. § 42.8(b)(1)) ............... 61
`
`B.
`
`Notice of Related Matters (37 C.F.R. § 42.8(b)(2)) ......................... 61
`
`10832643
`
`
`- ii -
`
`

`

`Page
`
`C.
`
`D.
`
`E.
`
`F.
`
`Designation of Lead And Back-Up Counsel (37 C.F.R.
`§ 42.8(b)(3)) ..................................................................................... 62
`
`Service Information (37 C.F.R. § 42.8(b)(4)) .................................. 62
`
`Fees ................................................................................................... 62
`
`Grounds for Standing ....................................................................... 62
`
`XI. CONCLUSION ........................................................................................... 62
`
`
`
`10832643
`
`
`- iii -
`
`

`

`
`
`EXHIBIT LIST
`
`Exhibit Description
`EX1001 U.S. Patent No. 10,027,693 (“the ’693 patent”)
`
`EX1002 File History of the ’693 patent
`
`EX1003 U.S. Patent No. 9,674,206 (“the ’206 patent”)
`
`EX1004 File History of the ’206 patent
`
`Declaration of Dr. Seth Nielson (“Nielson”)
`
`EX1005
`Nielson
`
`EX1006 Redline of changes to specification of the ’206 patent
`
`EX1007-
`EX1020
`
`Reserved
`
`EX1021 Huawei’s Preliminary Infringement Contentions, Huawei
`Technologies Co., Ltd et al. v. Verizon Communications, Inc. et al.,
`Case No. 6:20-CV-00090 (W.D. Tex.) (“Huawei’s Infringement
`Contentions)
`
`EX1022 Exhibit C to Huawei’s Infringement Contentions
`
`EX1023 Robert J. Shimonski et al., The Best Damn Firewall Book Period,
`Syngress Publishing (2003) (the “Best Firewall Book”)
`EX1024 R. Hunt, Internet/Intranet firewall security – policy, architecture and
`transaction services, Computer Communications 21 (1998) 1107-
`1123
`EX1025 Stipulation Regarding Case Schedule and Discovery Limits, May
`13, 2020
`EX1026 Order Governing Proceedings – Patent Case, April 7 2020
`EX1027 US Pub. No. 2012/0233691 (“the ’691 publication”)
`EX1028 US Pub. No. 2003/0009699 (“Gupta”)
`EX1029 RFC 2616, Hypertext Transfer Protocol -- HTTP/1.1, June 1999
`
`10832643
`
`
`- iv -
`
`

`

`
`
`EX1030 National Institute of Science and Technology, Special Publication
`800-127: Information Security Continuous Monitoring (ISCM) for
`Federal Information Systems and Organizations (2011), B-9.
`EX1031 National Institute of Science and Technology, Special Publication
`800-82: Guide to Industrial Control Systems (ICS) Security (2015),
`B-18.
`EX1032 Nwokedi Idika and Aditya P. Mathur, A Survey of Malware
`Detection Techniques (2007)
`EX1033 U.S. Patent No. 5,440,723 issued to William C. Arnold, et al.,
`Automatic immune system for computers and computer networks
`(1995).
`EX1034 Wikimedia user Meilani.conley, File: Uniform Resource Locator
`(URL) example.PNG.
`EX1035 Olivier Bonaventure, Computer Networking: Principles, Protocols,
`and Practice (2011)
`James Turnball, Hardening Linux (2005)
`EX1036
`EX1037 RFC 1812
`EX1038 Bobbi Sandberg, Networking: The Complete Reference (2015)
`EX1039 National Institute of Science and Technology, Supplemental
`Information for the Interagency Report on Strategic U.S.
`Government Engagement in International Standardization to
`Achieve U.S. Objectives for Cybersecurity (2015)
`EX1040 Gene Spafford, Director, Computer Operations, Audit, and Security
`Technology (COAST) Project, Purdue University
`EX1041 Elahi, Golnaz and Yu, Eric, “Modeling and Analysis of Security
`Trade-Offs – A Goal Oriented Approach.” Data & Knowledge
`Engineering (2009)
`EX1042 Ho, Yui Chi & Zhao, Qianchuan & Pepyne, David. (2003). “The no
`free lunch theorems: Complexity and security.” Automatic Control,
`IEEE Transactions on. 48. 783 - 793. 10.1109/TAC.2003.811254
`EX1043 Eisenbarth, Thomas, Sandeep Kumar, Christof Paar, Axel
`Poschmann, and Leif Uhsadel. "A survey of lightweight-
`cryptography implementations." IEEE Design & Test of Computers
`24, no. 6 (2007)
`EX1044 Certified Translation of WO 2011/063729 (PCT/CO2010/07895),
`filed on November 22, 2010
`EX1045 Check Point FireWall-1 Guide, September 2002
`
`10832643
`
`
`- v -
`
`

`

`
`
`CLAIM LISTING
`
`Claim
`Element
`1pre A method for alerting against unknown malicious codes, the method
`comprising:
`
`LIMITATION
`
`1(a)
`
`1(b)
`
`1(c)
`
`1(d)
`
`1(e)
`
`1(f)
`
`2
`
`10832643
`
`
`receiving, by a network device, a request sent by a terminal for
`obtaining a file from a network entity and a data stream carrying the
`file;
`
`recording, by the network device, a source path carried in the
`request, wherein the network entity provides the file on the source
`path;
`
`judging, by the network device, whether the file is an executable file
`according to at least one of: the request and the data stream carrying
`the file;
`
`when the network device judges the file is an executable file,
`sending, by the network device, first alert information that carries
`the source path to a monitoring device;
`
`receiving, by the network device, second alarm information sent by
`the monitoring device after further detecting the file downloaded
`according to the source path by the monitoring device; and
`
`intercepting, by the network device, a) the executable file according
`to the second alarm information comprising a maliciousness of the
`executable file; or b) the executable file and packets transmitted in a
`Botnet according to the second alarm information comprising the
`maliciousness of the executable file and Botnet topology
`information.
`
`The method according to claim 1, wherein the judging, by the
`network device, whether the file is the executable file according to at
`least one of: the request and the data stream carrying the file
`comprises at least one of: detecting, by the network device, whether
`a string which indicates a name of the executable file exists in the
`request; and detecting, by the network device, whether a file header
`
`- vi -
`
`

`

`
`
`of the executable file exists in the data stream-returned by the
`network entity.
`
`3pre A network device comprising computing hardware and a non-
`transitory computer-readable storage medium including computer-
`executable instructions executed by the computing hardware to
`perform, on the network device, operations comprising:
`
`3(a)
`
`3(b)
`
`3(c)
`
`3(d)
`
`3(e)
`
`3(f)
`
`4
`
`receiving a request sent by a terminal for obtaining a file from a
`network entity and receiving a data stream carrying the file;
`
`recording a source path carried in the request, wherein the network
`entity provides the file on the source path;
`
`judging the file is an executable file according to at least one of: the
`request and the data stream carrying the file;
`
`when the network device judges the file is the executable file,
`sending first alert information that carries the source path to a
`monitoring device;
`
`receiving second alarm information sent by the monitoring device
`sent by the monitoring device after further detecting the file
`downloaded according to the source path by the monitoring device,
`wherein the second alarm information includes (a) a maliciousness
`of the executable file or (b) the maliciousness of the executable file
`and Botnet topology information; and
`the
`to one of
`intercepting
`i.
`the executable file according
`maliciousness of the executable file; or ii. the executable file and
`packets transmitted in a Botnet according to the second alarm
`information comprising the maliciousness of the executable file and
`Botnet topology information.
`The network device according to claim 3, wherein the judging
`whether the file is an executable file according to at least one of: the
`request and the data stream carrying the file comprises at least one
`of: detecting whether a string which indicates a name of the
`executable file exists in the request; and detecting whether a file
`header of the executable file exists in the data stream received from
`the network entity.
`
`10832643
`
`
`- vii -
`
`

`

`5pre2
`
`
`
`5pre1 A system for alerting against unknown malicious codes comprising a
`network device and a monitoring device:
`the network device comprising a first computing hardware and a first
`non-transitory computer-readable storage medium including a first
`set of computer-executable instructions executed by the first
`computing hardware to perform, on the network device, operations
`comprising:
`a) receiving a request sent by a terminal for obtaining a file from a
`network entity and receiving a data stream carrying the file;
`
`5(a)
`
`5(b)
`
`5(c)
`
`5(d)
`
`5(e)
`
`5(f)
`
`5(g)
`
`5(g1)
`
`5(g2)
`
`5(g3)
`
`10832643
`
`
`b) recording a source path carried in the request, wherein the
`network entity provides the file on the source path;
`
`c) determining the file is an executable file according to at least one
`of (a) the received request and (b) the data stream carrying the file;
`
`d) sending first alert information that carries the source path to a
`monitoring device when the network device determines the file is an
`executable file;
`
`e) receiving second alarm information sent by the monitoring device
`after detecting the executable file downloaded according to the
`source path; and
`the
`to one of
`the executable file according
`intercepting
`i.
`maliciousness of the executable file; or ii. the executable file and
`packets transmitted in a Botnet according to the second alarm
`information comprising the maliciousness of the executable file and
`Botnet topology information; and
`the monitoring device comprising a second computing hardware and
`a second non-transitory computer-readable storage medium
`including a second set of computer-executable instructions executed
`by the second computing hardware to perform, on the monitoring
`device, operations comprising:
`a) receiving the first alert information from the network device;
`
`b) downloading an executable file according to the source path;
`
`c) detecting the executable file to confirm maliciousness of the
`executable file; and
`
`- viii -
`
`

`

`5(g4)
`
`6
`
`7
`
`
`
`d) sending the second alarm information to the network device,
`wherein the second alarm information comprises one of:
`maliciousness of the executable file, and both the maliciousness of
`the executable file and Botnet topology information.
`The system for alerting against unknown malicious codes according
`to claim 5, wherein the operations performed on the monitoring
`device further comprise at least one of: detecting maliciousness of
`the executable file by characteristics detection; and detecting
`maliciousness of the executable file by sandbox test.
`The system for alerting against unknown malicious codes according
`to claim 5, wherein determining the file is an executable file
`according to at least one of: the request sent by the terminal and the
`data stream carrying the file, and determining the file is an
`executable file includes at least one of: a) detecting whether a string
`which indicates a name of the executable file exists in the request;
`and b) detecting whether a file header of the executable file exists in
`the data stream received from the network entity.
`8pre A non-transitory computer readable medium storing instructions for
`execution by a processor, the instructions causing the processor to be
`configured to provide the following:
`receive a request sent by a terminal for obtaining a file from a
`network entity and receive a data stream carrying the file;
`record a source path carried in the request, wherein the network
`entity provides the file on the source path;
`determine whether the file is an executable file according to (a) the
`request or (b) the data stream carrying the file;
`send first alert information that carries the source path to a
`monitoring device, if the network device judges the file is the
`executable file;
`receive second alarm information that includes (a) a maliciousness
`of the executable file or (b) the maliciousness of the executable file
`and Botnet topology information; and
`intercepting a) the executable file according to one of the
`maliciousness of the executable file; or b) the executable file and
`packets transmitted in a Botnet according to the second alarm
`information comprising the maliciousness of the executable file and
`Botnet topology information.
`The network device according to claim 8, wherein determining the
`file is an executable file according to the request or the data stream
`carrying the file comprises: detecting whether a string which
`
`8(a)
`
`8(b)
`
`8(c)
`
`8(d)
`
`8(e)
`
`8(f)
`
`9
`
`10832643
`
`
`- ix -
`
`

`

`
`
`indicates the name of the executable file exists in the request; and/or
`detecting whether a file header of the executable file exists in the
`data, which is transmitted by the data stream returned by the network
`entity.
`
`
`
`
`
`
`
`
`
`10832643
`
`
`- x -
`
`

`

`
`
`I.
`
`INTRODUCTION
`Huawei’s prosecution of US 9,674,206 (“the ’206 patent) was lengthy and
`
`contentious. After five years and a failed appeal, Huawei agreed to significantly limit
`
`the claims of the ’206 patent to get an allowance. Apparently unhappy with that
`
`result, Huawei decided to file another application seeking broader protection for its
`
`invention. However, rather than file a continuation with broader claims, as typically
`
`would be the case, Huawei decided to file the application with broader claims and
`
`with a broader disclosure. That application, filed as a continuation-in-part (CIP) of
`
`the ’206 patent, issued as the US 10,027,693 (“the ’693 patent”).
`
`The claims of the ’693 patent include limitations that are based on and indeed
`
`incorporate features from the newly-broadened disclosure. As a result, the claims
`
`of the ’693 patent are not entitled to claim an earlier priority date as they contain
`
`subject matter not supported under 35 U.S.C 112 by the parent ’206 patent (or by
`
`the disclosures of the earlier priority documents). While filing CIPs is a well-
`
`established practice, here Huawei waited entirely too long to expand its invention in
`
`delaying filing the ’693 patent for almost 4 years after the parent ’206 patent had
`
`published as U.S. Publication No. 2012/0233691 (“the ’691 publication). That delay
`
`is fatal to the ’693 patent. By expanding its invention beyond what was originally
`
`disclosed, thereby introducing new and unsupported subject matter to the disclosure
`
`10832643
`
`
`- 1 -
`
`

`

`U.S. Patent No. 10,225,378
`
`and to the claims of the ’693 patent, the ’691 publication is now prior art to the ’693
`
`patent under 35 U.S.C. 102(a)(1).
`
`The written description requirement was designed to protect the public against
`
`this very situation. Specifically, Section 112 “ensur[es] that the scope of the right to
`
`exclude, as set forth in the claims, does not overreach the scope of the inventor’s
`
`contribution to the field of art as described in the patent specification.” Univ. of
`
`Rochester v. G.D. Searle & Co., 358 F.3d 916, 920 (Fed. Cir. 2004) (quoting Reiffin
`
`v. Microsoft Corp., 214 F.3d 1342, 1345 (Fed. Cir. 2000)) (internal citations and
`
`punctuation omitted). Here, Huawei overreached its original contribution to art by
`
`disclosing and claiming an invention in the ’693 patent that is significantly broader
`
`than anything it had previously demonstrated was in its possession. Huawei now
`
`seeks to capitalize on its overreaching by asserting the ’693 patent (but not the
`
`narrower parent ’206 patent) in a litigation in which it has taken the positon that the
`
`’693 patent is entitled to the very earliest possible priority date—a date which is over
`
`6 years before Huawei finally filed an application in which it could demonstrate
`
`possession of the invention of the ’693 patent.1
`
`Because Huawei should not be permitted to expand its right to exclude by
`
`manipulating the CIP practice to obtain a significantly broadened patent, while
`
`
`1 See EX1021 (Huawei’s Preliminary Infringement Contentions) at 14.
`
`10832643
`
`
`- 2 -
`
`

`

`U.S. Patent No. 10,225,378
`
`professing the same early invention date, Juniper requests inter partes review of ’693
`
`patent and cancelation of its claims as being obvious in view of the publication of
`
`the parent ’206 patent.
`
`II.
`
`STATE OF THE ART
`Computer networks provide immense benefits, but they also represent a direct
`
`path by which nefarious actors can gain access to personal data. ‘Malicious code’ or
`
`‘malware’ refers to a set of computer instructions that carry out one or more
`
`computer operations in an unauthorized manner or by an unauthorized party. See
`
`EX1005 (Nielson) at ¶¶15-16. For example, malicious code can be used to gain
`
`access to a computer system or network to steal or destroy information stored
`
`therein.
`
`Given the proliferation of malware, well before the ’683 patent computer
`
`security practitioners had been inserting security components into network
`
`components. See id. at ¶¶21-25. For example, it was realized early on that
`
`gateways—a computing device that connects different networks—were natural
`
`choke points for data going in or out. A gateway that determines whether data is
`
`permitted to enter or leave a given network is called a “firewall.” See id. at ¶25, 52.
`
`While the earliest firewalls simply examined packet metadata, such as source and
`
`destination addresses, by the late 1990’s firewalls included scanners that examined
`
`10832643
`
`
`- 3 -
`
`

`

`U.S. Patent No. 10,225,378
`
`the contents of packets to determine if the packets represented some kind of threat
`
`or otherwise unauthorized activity. See id. at ¶25, 55.
`
`One of the earliest scanners were “antivirus scanners,” which would scan
`
`computer programs to determine if the program had been infected by a ‘virus.’ See
`
`id. at ¶26, 55-56. A virus is a type of malicious code designed to write itself into
`
`existing programs, most often to carry out some unauthorized activity. See id. at
`
`¶¶16, 26. While the first antivirus scanners were largely run on individual computers,
`
`this antivirus functionality was soon introduced at the gateway level (i.e., in a
`
`firewall) such that malicious code could be intercepted before ever reaching a user’s
`
`computer. See id. at ¶¶26-27.
`
`Just as scanners expanded from protecting individual computers to residing
`
`on firewalls to protect networks, so too did they expand from the gateway level to
`
`more centralized locations, often referred to as the “cloud.” See id. at ¶¶27-28. With
`
`cloud-based scanners, malware identification updates were much quicker and
`
`efficient because an attack on one party could result in defenses for many. See id.
`
`Meanwhile, just as the network architecture for antivirus scanners was
`
`expanding, so were the methods used to detect viruses. See id. at ¶30. By 2009,
`
`antivirus scanners could identified malware based on signature or behavior. See id.
`
`at ¶¶26, 31-32, 56. For example, well before 2009 there were firewall-based
`
`antivirus scanners that, in addition to looking at the malicious code directly, used
`
`10832643
`
`
`- 4 -
`
`

`

`U.S. Patent No. 10,225,378
`
`“URL filtering” to preemptively prevent malware infections. See id. A URL
`
`(Uniform Resource Locator) represents a network location that network protocols,
`
`such as HTTP (Hyper-Text Transfer Protocol), use to direct network traffic. See id.
`
`at ¶31. HTTP is a protocol used by web browsers to access data on websites. When
`
`a web browser requests a resource (a file) using HTTP, the request includes a URL
`
`that describes the location of the resource (file), and is used to route the request to
`
`the correct server. The HTTP response will include the resource (file) associated
`
`with the requested path. See id. at ¶¶31-32.
`
`For computers behind a firewall, both the HTTP request and response would
`
`pass through the firewall, where they could undergo scanning. This could include
`
`scanning the resource (file) to see if it contains a virus or other malware, as well as
`
`scanning the request to see if it corresponds to a path or file known to be bad. See
`
`id. at ¶¶25, 29, 55-56. In either case, firewall would block the exchange either at the
`
`requesting stage or at the response stage based on the scanner’s findings. See id. at
`
`¶56.
`
`III. BACKGROUND AND OVERVIEW OF THE CHALLENGED
`PATENT
`The ’693 patent was filed on March 25, 2016 as a CIP of the ’206 patent filed
`
`on May 25, 2012, which in turn was filed as a by-pass continuation of PCT
`
`application no. PCT/CN2010/078951, filed on November 22, 2010, which claims
`
`the benefit of CN 200910247172.8, filed November 26, 2009. See EX1002 (’693
`
`10832643
`
`
`- 5 -
`
`

`

`U.S. Patent No. 10,225,378
`
`File History) at 265-266. For the reasons set forth in Section IV, the claims of the
`
`’693 patent are not entitled to a priority date any earlier than the filing date of the
`
`’693 patent.
`
`A. The Specification of the Parent ’206 Patent
`
`The parent ’206 patent relates to a network device that detects characteristics
`
`of a packet and judges whether any suspicious code exists in the packet. See e.g.,
`
`EX1003 (’206 patent), 1:60-65. Fig. 1, reproduced below, describes “a method for
`
`alerting against unknown malicious codes according to an embodiment of the
`
`present invention.” Id. at 3:5-7.
`
`
`
`10832643
`
`
`- 6 -
`
`

`

`U.S. Patent No. 10,225,378
`
`
`The method of Fig. 1 is performed by a “network device.” See id. at 3:16-17.
`
`After detecting characteristics of a packet at step 105, the network device “Judge[s]
`
`whether any suspicious code exists in the packet . . .,” “Record[s] a source address
`
`of the suspicious code . . . ,” and “Send[s] alert information that carries the source
`
`address to a monitoring device.” Id. at 3:9-15.
`
`Fig. 2 of the ’206 patent describes “an embodiment of the present invention”
`
`which includes the above steps of Fig. 1, but further adds that the network device
`
`“Receive[s] alarm information sent by the monitoring device,” where the “alarm
`
`information includes maliciousness of the suspicious code, or includes both the
`
`maliciousness of the suspicious code and the Botnet topology information.” Id. at
`
`4:24-27.
`
`After receiving the alarm information, the network device either “Intercept[s]
`
`suspicious codes that are malicious according to [the] maliciousness of the
`
`suspicious codes,” or “Intercept[s] the suspicious codes that are malicious and the
`
`
`
`10832643
`
`
`- 7 -
`
`

`

`U.S. Patent No. 10,225,378
`
`packets in the Botnet corresponding to the Botnet topology information according
`
`to [the] maliciousness of the suspicious codes and the Botnet topology information.”
`
`Id. at 5:19-24.
`
`B.
`
`Prosecution History of the Parent ’206 Patent
`
`The parent ’206 patent was filed on May 25, 2012 as application no.
`
`13/481,273 (“the ’273 application”). The ’206 patent published on September 13,
`
`2012 as U.S. Pub. No., 2012/0233691 (“the ’691 publication”) (EX1027).
`
`The ’273 application was filed as a ‘bypass’ continuation of the PCT
`
`application instead of as a national stage application under 37 U.S.C. § 371. See
`
`MPEP 1895. In response to a first office action rejecting the originally-filed claims,
`
`the applicant amended the claims of the ’273 application to additionally recite,
`
`among other things, that a “source address” of suspicious code “appears in the URL
`
`after a get * string . . . .” EX1004 (’206 File History) at 227. A subsequent final
`
`office action again rejected the claims, this time relying on Gupta et al. (US
`
`2003/0009699) (EX1028) for most of the claim limitations, including the
`
`10832643
`
`
`- 8 -
`
`

`

`U.S. Patent No. 10,225,378
`
`previously-added feature of the suspicious code’s “source address appear[ing] in the
`
`URL after a get* string.”2 EX1004 (’206 File History) at 207.
`
`In response to the final office action, the applicant took the position that Gupta
`
`does not disclose the above “source address” limitation, but “merely identifies
`
`generic ‘Parameters’ after a GET * string.” EX1004 (’206 File History) at 195.
`
`While the applicant acknowledged that Gupta “describes identifying an attack based,
`
`in part, upon an analysis of parameters specified after a GET request and specified
`
`file,” the applicant attempted to distinguish Gupta by arguing that there was “no
`
`description of any ‘source address’ in the set of parameters following the GET
`
`request identifying the file ‘/dirl/dir2/dvwssr.dll’,” as disclosed in Gupta. Id. at 197.
`
`The examiner disagreed clarifying that “the address ‘/dir1/dir2/dvwssr.dll’ is what
`
`examiner is interpreting as the ‘source address’ because it appears after GET and
`
`also because it identifies the directory and the subdirectory of the code ‘dvwssr.dll’.”
`
`EX1004 (’206 File History) at 188. The actual GET request disclosed in Gupta is
`
`as follows:
`
`
`2 Each of the independent claims was rejected under 35 U.S.C. § 103 as
`
`being obvious over Gupta et al. (US 2003/0009699) (EX1028) in view of Bates et
`
`al. (US 2004/0148281).
`
`10832643
`
`
`- 9 -
`
`

`

`U.S. Patent No. 10,225,378
`
`
`EX1028 (Gupta) at [0102].
`
`
`
`Ultimately, the applicant appealed the rejection of the claims, primarily
`
`focusing on the argument that Gupta’s “directory/file name does not, and cannot,
`
`identify a network source of identified malicious code,” and therefore is not the
`
`claimed “source address.” EX1004 (’206 File History) at 143, 144-145.
`
`In its Decision on Appeal, the Board affirmed the examiner’s rejection,
`
`finding
`
`that
`
`the
`
`“Examiner’s
`
`interpretation
`
`is
`
`reasonable
`
`because
`
`‘/dir1/dir2/dvwssr.dll’ is an address that identifies the source, which is the directory
`
`dir1 and subdirectory dir2.” EX1004 (’206 File History) at 105 (internal citations
`
`omitted). The Board further found “Appellant’s assertion that the term must specify
`
`a networked source or actual physical source of the suspicious code is not
`
`commensurate with the scope of the claim and therefore, unpersuasive.” Id. at 107
`
`(internal citations omitted).
`
`In a Request for Rehearing, the applicant doubled down on the notion that
`
`“the term ‘source address’ [] specifies a physical server – as opposed to a file name
`
`contained in a directory tree,”3 and that this interpretation is supported by the
`
`
`3 Emphasis added unless otherwise indicated.
`
`10832643
`
`
`- 10 -
`
`

`

`U.S. Patent No. 10,225,378
`
`specification. EX1004 (’206 File History) at 89; see also id. at 91 (“The claimed
`
`source address is used to identify a networked source (e.g. a server) of suspicious
`
`code.”); 93 (“a ‘source address’ that identifies an address of a file’s source (network
`
`location of a server) ….”). Huawei further argued that “Gupta’s directory path
`
`("/dirl/dir2") merely specifies a location of the file within a directory tree of a file
`
`source at some unspecified location much like the specification of a floor/room in
`
`an unidentified home.” Id. at 94-95 (original emphasis included).
`
`The Board maintained the rejection, after which the applicant filed a Request
`
`for Continuing Examination to amend the claims to include a series of additional
`
`limitations not previously at issue during prosecution (see id. at 67-77), which led to
`
`a Notice of Allowance. See id. at 29-35.
`
`C. The Specification of the ’693 Patent
`
`The disclosure of the ’693 patent is similar in many respects to the ’206 patent,
`
`but also differs in important respects, as detailed below in Section IV.B.
`
`While the parent ’206 patent focused on a network device that detects
`
`characteristics of a packet in order to judge whether any suspicious code exists in
`
`the packet, the ’693 patent instead focuses on that network device receiving a
`
`“request” sent by a terminal for obtaining a file from a “network entity” over a
`
`“source path.” (Step 101 of FIG. 1). See e.g., EX1001 (’693 patent) at 4:63-65. The
`
`“network entity” is described as being a server, such as a Web server or an FTP
`
`10832643
`
`
`- 11 -
`
`

`

`U.S. Patent No. 10,225,378
`
`server, and the “request” is “an HTTP get request or an FTP request ….” Id. at 3:51-
`
`58.
`
`
`
`The source path, whi

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket