throbber
Trials@uspto.gov
`571-272-7822
`
`
` Paper 41
`
`Date: September 28, 2022
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`__________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`__________
`
`CLOUDFLARE, INC., and SPLUNK, INC.,
`Petitioners,
`v.
`SABLE NETWORKS, INC.,
`Patent Owner.
`__________
`
`IPR2021-00909
`Patent 8,243,593 B2
`__________
`
`Record of Oral Hearing
`Held: September 7, 2022
`__________
`
`
`Before STACEY G. WHITE, GARTH D. BAER, and
`JULIET MITCHELL DIRBA, Administrative Patent Judges.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`IPR2021-00909
`Patent 8,243,593 B2
`
`APPEARANCES:
`
`ON BEHALF OF THE PETITIONER:
`
`
`DANIEL CALLAWAY, ESQ.
`JAMES L. DAY, ESQ.
`of: Farella Braun & Martel, LLP
`Russ Building
`235 Montgomery Street
`17th Floor
`San Francisco, California 94104
`(415) 954-4414
`dcallaway@fbm.com
`jday@fbm.com
`
`MEHRAN ARJOMAND, ESQ.
`ALEX S. YAP, ESQ.
`of: Morrison & Foerster, LLP
`707 Wilshire Boulevard
`Los Angeles, California, 90017-3543
`(213) 892-5200
`ayap@mofo.com
`marjomand@mofo.com
`
`
`ON BEHALF OF THE PATENT OWNER:
`
`
`DANIEL LOWENSTEIN, ESQ.
`KENNETH J. WEATHERWAX, ESQ.
`of: Lowenstein & Weatherwax, LLP
`1016 Pico Boulevard
`Santa Monica, California 90405
`(310) 307-4500
`dlowenstein@lowensteinweatherwax.com
`kweatherwax@lowensteinweatherwax.com
`
`
`
`
`The above-entitled matter came on for hearing Wednesday,
`September 7, 2022, commencing at 10:00 a.m. EDT, via Videoconference.
`
`
`
`2
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`
`
`
`
`P-R-O-C-E-E-D-I-N-G-S
`
`
`
`10:00 a.m.
`JUDGE DIRBA: Good morning. This is the oral hearing for
`IPR2021-00909, relating to U.S. Patent 8,243,593. My name is Judge Dirba
`and I'm joined today by my colleagues, Judges White and Baer. We'll begin
`with appearances. Petitioner.
`MR. DAY: This is James Day on behalf of Petitioner, Cloudflare.
`And I'd like to mention my colleague, Dan Callaway is here with me, also on
`behalf of Cloudflare. And I understand the Counsel for Splunk, Petitioner
`Splunk, is on the public line. And that is Alex Yap and Mehran Arjomand,
`Morrison Foerster.
`JUDGE DIRBA: And Mr. Day, who will be presenting on
`Petitioner's behalf, today? Is that just you, or will that be your colleague,
`Mr. Callaway as well?
`MR. DAY: Just me, Your Honor.
`JUDGE DIRBA: Okay. And Patent Owner.
`MR. WEATHERWAX: Can you hear me, Your Honor?
`JUDGE DIRBA: I can, not very well.
`MR. WEATHERWAX: All right. Just let me know if I'm too soft,
`because I am hard of hearing. And so, I do my best to modulate my own
`volume. But if I'm not, please remind me. This is Kenneth Weatherwax, for
`the Patent Owner. Patent Owner is also appeared at this meeting, by Daniel
`Epstein and Erin McCracken.
`(Simultaneous speaking.)
`JUDGE DIRBA: And Mr. Weather -- I apologize.
`MR. WEATHERWAX: I will --
`
`
`
`
`3
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`
`
`
`
`
`JUDGE DIRBA: Go ahead, Mr. Weatherwax. I'll let you finish
`your appearances.
`MR. WEATHERWAX: That was all my appearances, Your Honor.
`JUDGE DIRBA: Excellent, and Mr. Weatherwax, will anyone other
`than you be presenting on Patent Owner's behalf today?
`MR. WEATHERWAX: No, Your Honor.
`JUDGE DIRBA: All right. I'll begin with a few general reminders
`for the hearing today. The hearing order provided that each party will have
`45 minutes of total argument time. Petitioner will open the hearing by
`presenting its arguments regarding the alleged unpatentability of the
`challenged claims. Petitioner may reserve rebuttal time, but no more than
`half of its total argument time.
`Thereafter, Patent Owner will response to Petitioner's arguments.
`Patent Owner may reserve surrebuttal time of no more than half of its total
`argument time to respond to Petitioner's rebuttal. Each side's rebuttal must
`respond to the arguments presented by the other side, but otherwise, each
`side may use its allotted time to discuss the case as it chooses.
`No new arguments may be presented at this hearing that have not
`been argued in the briefs. Counsel should hold any objections regarding the
`other side's arguments until it is their turn to speak. Also, I'll note that we've
`received Petitioner's objection to Slide 12 of Patent Owner's demonstrative.
`We will not rule on that objection at this time. But if Patent Owner presents
`that slide, we will ask Counsel to specifically identify where in the briefs the
`objected to argument was made.
`A few reminders for video. Please mute your microphone when
`you're not presenting. We may have an unexpected interruption in the
`
`
`
`4
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`
`
`
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`connection. If that happens to one of the video participants, or the Court
`Reporter, we will pause the argument and resume once the connection can
`be reestablished.
`If it is your connection that is lost, please spend up to five or so
`minutes attempting to reestablish the connection. If attempts are
`unsuccessful, at that point, please rejoin the hearing by audio, or reach out to
`one of the hearing staff.
`Are there any questions before we begin? Petitioner?
`MR. DAY: No, Your Honor.
`JUDGE DIRBA: Patent Owner?
`MR. WEATHERWAX: No, Your Honor.
`JUDGE DIRBA: Very well. We'll begin with Petitioner's
`presentation. Mr. Day, how long would you like to reserve for your
`rebuttal?
`MR. DAY: I'd like to save 10 minutes for rebuttal, Your Honor.
`JUDGE DIRBA: And you may begin when you're ready.
`MR. DAY: Well, good morning, Your Honors. We are here today
`to discuss the 593 Patent. I've provided a set of slides. And I'd refer you to
`Slide 2 to begin. And you'll see that this 593 Patent is entitled, Mechanism
`for Identifying and Penalizing Misbehaving Flows in a Network.
`And what the patent is talking about, is you have these flows of data
`packets going through a network. And you want to identify the type of
`traffic, so you can manage it. And in some cases, you can drop some of the
`packets. You can discard the flow entirely. And what the patent talks about
`is, at the time, there were existing techniques that looked for signatures. In
`
`
`
`5
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`
`
`
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`different techniques, but including looking for signatures in the data, in the
`packets, or in the flow, and using that to identify the type of traffic.
`But there were problems with that approach. And so, the 593 Patent
`says, what you should do to address those problems, is instead collect
`behavioral statistics. Look at the behavior of the flow. Look at how it acts.
`Look at what it does, and use that information to determine what type of
`traffic it is.
`Well, we filed our IPR petition. I'm now going to look at Slide
`Number 3. Filed an IPR petition, it was based on a primary reference to the
`patent, called Yung. And Yung discloses and describes a bandwidth
`management device that similarly analyzes flows of data packets through a
`network. Identifies the type of traffic and then, can applies things that Yung
`called, polices, to the flow, including a discard policy that would allow you
`to drop some or all of the packets in a flow.
`And like the 593, Yung talks about how there were existing
`techniques, including signature-based techniques. And that there were
`problems with those, they could, the signature changed. The signature could
`be encrypted. And so, it's better to look at what Yung's called, behavior
`patterns of the flow. And use those behavior patterns, what the flow does,
`how it acts, use that to identify the type of traffic.
`It's -- the review was instituted, and the Patent Owner voluntarily
`disclaims all the claims that we had challenged under Yung alone, plus some
`others. And what we're left with are the grounds on Slide 3.
`Ground 2 addresses Independent Claim 9, and Independent Claim
`29, and their dependents. And then Ground 3, is limited just to Independent
`
`
`
`6
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`
`
`
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`Claim 3. Of course, there is a dispute about a few of these dependent claims
`that I show in Ground 2, and I will get to that dispute.
`But first, and we can sort of skip over Slide 4, which just presents
`the topics I want to talk about. I want to start by talking about the Ground 2,
`and the combination of Yung and Copeland. And how Copeland discloses
`the badness factor recited in Claim 9 and 29.
`And Slides 5, 6, and 7, I'm going to move through very quickly,
`because the point of those is just that Yung alone, discloses the preamble of
`Claim 9 and the step of maintaining a set of behavioral statistics for the flow.
`That's undisputed, so we can move quickly to Slide 8, which focuses on the
`last step of Claim 9. Computing, based at least partially upon that set of
`behavioral statistics, a badness factor for the flow.
`And we identified, in Copeland, in the secondary reference,
`something that Copeland called a concern index, as disclosing what's recited
`here in Claim 9, in the last, in the computing step. And if you look on Slide
`8, we pulled out a few of the quotes from Copeland.
`On the upper right, it says, Copeland says, statistics are collected for
`each determined flow. And you analyze the flow. If the flow is a value,
`referred to as a concern index, it's assigned to each flow that appears
`suspicious. What Copeland is talking about, is identifying network probes,
`and network attacks. And so, we identified that.
`In response, what the Patent Owner has said is, well, you don't have
`any evidence supporting that. You're just relying on the ipse dixit of your
`expert. So, if you look at Slide 9. It shows some of our expert's declaration.
`And I've underlined the sentence that Patent Owner points to, and says, that's
`
`
`
`7
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`
`
`
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`the only evidence you have, which of course ignores all of the other
`evidence that we have.
`So, our expert, Dr. Jeffay, talked about what the concern index is,
`immediately after the sentence that they focus in on. He compares the
`concern index of Copeland to the disclosures in the 593 Patent, and what is
`says about this badness factor. If you move onto Slide 10, he, our expert
`continues. And he works with the Claim language, and I've highlighted and
`underlined on the left here, on Slide 10, that the claim actually tells us
`something about this badness factor. And it says that the badness factor
`provides an indication of whether the flow is exhibiting undesirable
`behavior.
`And our expert said, that's exactly what Copeland's concern index
`value is doing. Copeland identifies suspicious activity with the concern
`index. In other words, it provides an indication of whether the flow is
`exhibiting undesirable behavior. Our expert explains, that network probes
`and network attacks are undesirable behavior. He didn't just discern it. He
`explained why that is so.
`On Slide 11, we just show a little more of his testimony, and I'll
`move quickly ahead to Slide 12. And the point really, of his testimony is,
`that on Slide 12 we've got some of the language where the 593 Patent
`describes a badness factor. It's a factor that provides an indication of
`undesirable behavior. And then some quotes from Copeland on the right,
`that describe the concern index that does the same thing. It indicates
`suspicious flows that may be undesirable behavior, network probes, and
`network attacks.
`
`
`
`8
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`
`
`
`
`
`But I want to address here, Patent Owner's argument that Cloudflare,
`Petitioner, has taken the position in district court, that this term, badness
`factor, is indefinite. And we cited a number of cases in our reply brief,
`explaining that, that issue is not before the Board. That, you know, unless
`it's impossible to apply Copeland to the claim language, it just doesn't come
`up in this proceeding. It's not an issue in this proceeding.
`Theirs, was their response to that case law in the sur-reply, and really
`the argument, is essentially that our expert, Professor Jeffay, doesn't know
`what the term means.
`Well, first of all, Professor Jeffay did not offer any opinion in the
`district court. So, it's not as though he has said at one time, this term is
`indefinite, and now is not saying that. His testimony has been clear. And
`you'll see in Patent Owner's slides, they quote him as saying two things
`about the badness factor. One, it's not a term of art. It's not disputed. And
`two, that a person of ordinary skill reading the 593, would not understand
`the bounds. So, that the full scope, the outer bounds of the term. And the
`problem with this term is that at the outer bounds, there may be some
`ambiguity in what is bad, and what is not bad.
`But he also testified, that whatever, you know, there may be some
`ambiguity at the margins, but Copeland describes exactly what the 593
`Patent is talking about, when it describes both in the specification, and the
`claims, that a badness factor is an indication of whether the flow is
`exhibiting undesirable behavior.
`That's exactly what the concern index is doing. So, if there's a
`question at the margins, we're not talking about the margins, we're right,
`Copeland is dead center in the claim language.
`
`
`
`9
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`
`
`
`
`
`Now, I want to ask you to look at Slide Number 13, which has
`Figure 1 from Copeland. And it's, there's a lot going on here, so I want to
`take just a minute to orient you. If you look, it's Figure 1 from Copeland,
`Slide 13. In the upper left there's a picture of a hacker. So, this a guy sitting
`at computer, doing bad things. And directly below, is a legitimate user.
`Both of them are sending flows across a network. Not surprisingly the
`legitimate user is sending legitimate normal packet flows. And the hacker is
`sending what Figure 1, what Copeland refers to as bad flows. And he used
`the concern index to identify those bad flows.
`So, if there's some, again, if there is some ambiguity about what
`someone might consider bad or not, Copeland is very clear, that the concern
`index is about, intended to identify the bad flows. It corresponds to the
`badness factor.
`When you look at Slide 14, Patent Owner tries to distinguish the
`concern index by saying, well -- and I quoted on the left side of Slide 14,
`some passages from the sur-reply. Patent Owner says, the concern index
`doesn't work because it's not, the calculation of a badness factor, it does not
`calculate the badness factor for each flow, as recited in the claim. So, the
`argument is, the claims say you have to calculate the badness factor for each
`flow, which is simply inconsistent with what the claims actually say.
`And here on Slide 14, we've highlighted that Claim 9 is, recites a
`method for processing a flow. And down in the computing stuff, you
`compute a badness factor for the flow. This method is fully performed, as
`soon as you operate on one flow. There's nothing in the claim that says you
`have to repeat it once. There's certainly nothing that says you have to repeat
`it for every flow you may come across.
`
`
`
`10
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`
`
`
`
`
`Now, in the slides, in Patent Owner's slides, it invites while, that we
`objected to, you see what I think, and what we said in the new argument, and
`that is, they try to distinguish the concern index by saying that it's not stored,
`as to individual flows. So, we object to that, the new argument.
`But in any event, if you look at Slide 16, which again, shows us the
`language of Claim 9. Claim 9 doesn't require storing the concern -- or the
`badness factor. It doesn't require that. What is says is, in the first step
`you're maintaining a set of behavioral statistics. So, arguably, you store
`those. But then all you have to do is compute the badness factor. Copeland
`discloses computing a concern index. And that matches the claim language.
`And the next Slides, 17 and 18, simply make the point that Claims 9
`and 29 are highly paralleled. And so, the arguments regarding 9, also apply
`to 29. So, let's move ahead. We can go to Slide 20 and talk a little bit about
`the reasons for combining Yung and Copeland. On Slide 20, I've underlined
`some language that the Patent Owner focuses in on.
`Patent Owner says, the entire basis for your motivation to combine,
`comes from one quotation in Yung. Where we cite Yung, as saying -- and
`Yung provides a number of different exemplary patterns of behavior to look
`for. And then says, the application behavior pattern can incorporate other
`factors as well. And our expert, Dr. Jeffay said, yes, and a person that's
`skilled in the art, would be motivated to look at the concern index in Yung,
`and apply it as another factor. He did, he does say that.
`But the Patent Owner says, this is the entire basis, which again
`requires you to ignore, in this case, five pages of detailed analysis from Dr.
`Jeffay, explaining exactly how, and why a person of ordinary skill in the art,
`would take the concern index from Copeland, and apply it in Yung's
`
`
`
`11
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`
`
`
`
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`bandwidth management device. It would improve Yung. It would make life
`easier on network administrators. Dr. Jeffay also explains just how you
`could do that. How this would work.
`And I have a few slides here, 20 and 21, and 22, where we pull out
`some of that language, but I think we can move ahead to the next argument
`and look at Slide 23.
`So, one of the arguments that Patent Owner makes, and if -- I've
`quoted on Slide 23, on the left side, language from the sur-reply, where it's
`challenging our motivation to combine evidence. And it says, Copeland
`concern index value, is not a behavioral attribute of a flow that there is any
`preponderant evidence that the POSITA would have been motivated to
`combine with Yung. Copeland's concern index value is reflective of packet
`header information, not the behavior of a flow.
`Kind of a mouthful, but there are a couple of points to make here.
`Seems to be that Patent Owner is saying, Copeland only uses behavioral
`statistics from packet headers. And that, that somehow causes a problem
`with motivation to combine. Well, there's a few problems there.
`One, if you look back at the language of Claim 9 and 29, there's no
`mention anywhere of behavioral statistics excluding packet header data. It
`doesn't say, you know, maintain a set of behavioral statistics obtained, you
`know, from some source other than packet headers. It doesn't say that.
`Patent Owner hasn't suggested any sort of a claim construction that would
`require that. So, the premise, the implicit premise here, is not supported by
`the claim. That's problem one.
`Problem two, is this argument appears to presume that Copeland
`only uses packet header data as behavioral statistics, which is not correct.
`
`
`
`12
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`
`
`
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`And again, if we're looking as Slide 23, our expert, Professor Jeffay, said,
`Copeland computes the concern index based at least upon a set of behavioral
`statistics. He says how Copeland does that.
`And then as highlighted at the bottom, on the right-hand side of Slide
`23, one of the examples that he pulls from Copeland Figure 6. And it is,
`Copeland uses the number of packets in the flow as the concern index. And
`the packet header data, does not include a number that is the total number of
`packets in a flow. That is not packet header data. That's data that's
`aggregated as you analyze the flow and as you analyze the packet.
`And we, so it's, Copeland is not using packet header data in this
`instance. And if you look at Slide 24, we know that this data, the number of
`packets that Copeland is using for the concern index, qualifies as a
`behavioral statistic, because the 593 Patent tells us it does. So, on Slide 24,
`we have two excerpts from the 593 Patent. And in both cases, it says, the
`number of packets in the flow is a behavioral statistic. So, Copeland is not
`limited merely to packet header data for its behavioral statistics. That's
`problem two with this argument.
`Third, if the idea here, is that Copeland wants its packet header data,
`but Yung does not, and so you wouldn't, you know, want to combine those
`two. That fails both because Copeland is not limited just to packet header
`data. But also, because Yung does not, does use packet header data, as well
`as other behavioral data to analyze packets.
`And on Slide 25, I cited one example where Yung explicitly says,
`here's a pattern you can look for, and the information that will show you that
`pattern, is in the header of packets.
`
`
`
`13
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`
`
`
`
`
`And if we move ahead to Slide 28, I think the main point here is,
`Yung and Copeland are both looking at the same types of data. And with
`regard to the packet count, the number of packets in a flow, and the total
`bytes, so the full size of the flow, both Yung and Copeland are identifying
`exactly the same thing. And we know those are behavioral statistics
`because, and if you look at the bottom of Slide 28, the 593 Patent tells us
`they are.
`So, wherever that data is coming from, the packet header or
`somewhere else, those are behavioral statistics. They're collected by Yung
`and Copeland. That this argument offers no reason why you would not
`combine. And I guess there's a final point, that I'll also note. There's no
`evidence behind any argument in response to our motivation to combine
`evidence. There's no contrary expletive or other evidence.
`So now, I want to move ahead. And if you look at Slide 29, I want
`to move onto this Four-Steps Whitepaper. And the question about whether it
`was publicly accessible? If you look at Slide 30, the point there is simply
`that Yung discloses most of Claim 3. So, we're now talking about Grounds
`3. It applies only to Claim 3. Yung discloses most of the claim, that's
`undisputed.
`If you go to Slide 31, this Four-Steps Whitepaper discloses the one
`limitation, the one other limitation, that's also undisputed. If you look at
`Slide 32, we put in evidence with our petition, from the Internet Archive. A
`declaration from the Archive, authenticating and showing that this document
`was on the Packeteer website no later than, as of March 17th, 2003. That's
`undisputed.
`
`
`
`14
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`
`
`
`
`
`If we move to Slide 33, now, we put in a fair amount of additional
`evidence with our reply brief, and I'll get to that. But I want to start with just
`the evidence that was submitted with our petition. And what do we know
`about this Four-Steps Whitepaper, and whether it was publicly accessible?
`Well, on Slide 33, we know that Yung, our primary reference, is a
`Packeteer patent, and it explicitly identifies Packeteer and its PacketShaper
`product. Now, the Whitepaper is a technical product overview of
`Packeteer's PacketShaper product. And Yung not only identifies it, but says
`this is exactly the type of device you can use to implement this invention I'm
`describing to you.
`What else do we know? On Slide 34, our expert explained that
`Packeteer was known in the industry. That was based on his personal
`experience in the 2000s. He at one time bought and used a PacketShaper in
`his lab. He also cited a few documents to support the fact that Packeteer was
`known, and that the PacketShaper product was on the market.
`Now, if we move ahead to Slide 35, I want to talk about what
`looking at the Four-Steps Whitepaper itself, tells us. And the point is, it tells
`us it's a marketing document. This was a marketing document put on the
`Packeteer website in order to promote the PacketShaper product. How do
`we know that?
`Well, if we read on Slide 35 it says, you know, if you have, or do
`any of these problems sound familiar to you? And then it lists off a few
`problems that network administrators might have. Says, if you do,
`PacketShaper, you know, can solve these problems. And the paper has
`underlined some language at the bottom, explicitly says, this paper is
`
`
`
`15
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`
`
`
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`intended for system and network administrators. It's intended for customers
`who might want to buy this product.
`If you look at Slide 36, there's more marketing language. Ease of
`deployment, you can deploy PacketShaper all at once, or you can do it in
`phases. There are a variety of models to choose from. If there was any
`question at all, on the last page it says, for more information, you know, call
`us. Or if you want to buy this product, call us or go to our website. It's a
`marketing piece that was on the website at least, well, well over a year
`before the priority date.
`Okay. If you look at Slide 38, now, what happened is, after the
`Institution Decision, the Patent Owner objected to the Four-Steps
`Whitepaper, saying it was not authenticated. And that it was, had not been
`shown to be prior art. So, we sent them a bunch of supplemental evidence,
`authenticating and showing that in fact, it was publicly accessible.
`One of the things we did, is we asked our expert, Dr. Jeffay, to use
`the Internet Archives' Wayback machine, and go to an archive page from
`early 2003 of the Packeteer website. Go to the Home Page, and try to
`navigate through the Home Page, to find this Whitepaper. And we've cited a
`little, some snippets from his supplemental declaration here on Slide 38. He
`says, that's what I did.
`On Slide 39, he walks through, first you click the link to the
`Product's Page. On Slide 40, he says, on the Product's Page there's a link
`that takes you to the PacketShaper product. Slide 41, he says on the
`PacketShaper Product Page, under the heading, Whitepapers, the very first
`thing you see is a link to the Four-Steps Whitepaper. And when you click
`
`
`
`16
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`
`
`
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`that link, Slide 42, confirms that it is the same document we submitted as
`Exhibit 1006. All right.
`JUDGE DIRBA: Counsel, I have a tangential question about the
`Whitepaper. You mentioned that this evidence was provided to Patent
`Owner shortly after the Institution Decision, after they objected to the
`evidence, the Whitepaper itself, and before Patent Owner's response. Is
`there any evidence in the record about when that information was provided
`to Patent Owner?
`MR. DAY: Yes, we included the service email evidencing when that
`was sent. I will have to look up the exhibit number, but I recall we put the
`service email in with our reply brief.
`JUDGE DIRBA: I see, helpful. If you could give me that, during
`your reply presentation.
`MR. DAY: Will do. Thank you, Your Honor.
`Okay, if we move ahead to Slide 45. The other thing we did is with
`our, this supplemental evidence that we provided in December, months
`before the Patent Owner deposed Dr. Jeffay, and months before the Patent
`Owner's response, in addition to his supplemental declaration, we also gave
`them a number of other documents, including what's shown on Slide 45.
`Which is an IBM Patent based on an application that was filed back in 2003,
`that cites to the same Four-Steps Whitepaper.
`
`Again, in our reply brief, we gave them the supplemental evidence in
`December. We added it to the record in this proceeding with our reply brief.
`At that time, we explained and we cited cases, saying that, that was timely.
`There's been no response. There was no response in the sur-reply. There
`
`
`
`17
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`
`
`
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`was no mention of this evidence in Patent Owner's response. So, it had it,
`for months in advance.
`So, if you go to Slide 46, we added a couple of other things with our
`reply brief.
`JUDGE DIRBA: Counsel.
`JUDGE BAER: Mr. Day.
`MR. DAY: Yes.
`JUDGE BAER: Mr. Day, can you hear me?
`MR. DAY: Yes.
`JUDGE BAER: This is Judge Baer. A question about your
`statement that all of this was timely. Is this an evidentiary issue, or is this an
`issue that you needed to establish as part of your principal case?
`MR. DAY: Yes, I would -- well, the answer to that is the Federal
`Circuit has told us that when the Patent Owner challenges public
`acceptability, it is appropriate and timely for the Petitioner to add evidence
`of public accessibility with their reply. And I, so here I would refer you to
`Slide 52. First of all, we made, I think a wholesome presentation of this in
`our reply brief. And there's no response to that in the sur-reply.
`But Slide 52, cites two Federal Circuit cases that are the dead-on
`point. The Valve v. Ironburg case says, you know, Petitioner may provide
`evidence of public accessibility of a reference after the petition stage. And
`there it was put in with the reply. And the Federal Circuit was okay in that.
`Then cites to the VidStream case, where the exact same thing
`happened. A bunch of evidence comes in with the reply, and the Federal
`Circuit says, yes, that's timely. So, the Federal Circuit has told us, that this
`
`
`
`18
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`
`
`
`
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`is an appropriate way for us to bring in evidence, establishing public
`accessibility.
`JUDGE BAER: And are those cases, do those cases stand for the
`proposition that it is permissible that we allow it, or that it is mandatory that
`we allow it? In other words, is it error for us to hold otherwise, or is it just
`permissive? We could go either way?
`MR. DAY: I don't believe that the decisions draw a distinction.
`They, in both cases, they reject the argument that it's untimely. I suspect if
`the question was presented, it could be an error, because the Federal Circuit
`has rejected the argument, that the Board might be relying on. But that, I
`didn't read that distinction from these cases, Your Honor.
`JUDGE BAER: Thank you, that's helpful.
`MR. DAY: So, let me talk about just the last two pieces of evidence
`that came in with our reply. We do that by going back to Slide 46. One of
`the things that the Patent Owner did, is put in a declaration from Patent
`Owner's Counsel, saying, if you look at the Internet Archives, using the
`Wayback machine, looking for archived versions of the Four-Steps
`Whitepaper, after March 17th, 2003, she got some error messages. We think
`what happened is if you, that Packeteer changed to a different version of this
`document. So, that was leading to some error messages.
`What we did, in response, is instead of looking after March 17th,
`2003, we looked from the period beginning in September 2002, which is the
`date on the face of the document, through early 2003. And my colleague,
`Mr. Callaway, went to the -- he repeated the process that Dr. Jeffay had
`employed in his supplemental declaration. Start with an archive Home Page,
`from Packeteer's Home Page and use that to click to the Product Page, the
`
`
`
`19
`
`

`

`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`
`
`
`
`
`IPR2021-00909
`Patent 8,243,593 B2
`
`PacketShap

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket