throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`_______________
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________
`
`SPLUNK INC.
`Petitioner,
`v.
`SABLE NETWORKS, INC.
`Patent Owner.
`
`Patent No. 8,243,593
`_______________
`
`Inter Partes Review No. IPR2022-00228
`____________________________________________________________
`PETITION FOR INTER PARTES REVIEW
`
`UNDER 35 U.S.C. §§ 311-319 AND 37 C.F.R. § 42.100 et seq.
`
`

`

`Inter Partes Review of USP 8,243,593
`
`TABLE OF CONTENTS
`
`Page
`
`V.
`
`B.
`
`C.
`
`D.
`
`INTRODUCTION .......................................................................................... 1
`I.
`II. GROUNDS FOR STANDING ....................................................................... 2
`III. TECHNICAL BACKGROUND .................................................................... 2
`IV. THE CHALLENGED PATENT .................................................................... 7
`A. Overview of the ’593 Patent ................................................................. 7
`B.
`Prosecution History .............................................................................. 9
`Person of Ordinary Skill in the Art .................................................... 11
`C.
`CLAIM CONSTRUCTION ......................................................................... 11
`A.
`“means for maintaining a set of behavioral statistics for the
`flow…” (claims 25 and 29) ................................................................ 12
`“means for determining…whether the flow is exhibiting
`undesirable behavior” (claim 25) ....................................................... 12
`“means for enforcing…[a/the] penalty on the flow” (claims 25
`and 32) ................................................................................................ 12
`“means for computing…a badness factor for the flow” (claim
`29) ....................................................................................................... 13
`“means for determining…a penalty to impose on the flow”
`(claim 31) ........................................................................................... 13
`“means for determining an increased drop rate to impose on one
`or more information packets belonging to the flow” (claim 37) ....... 13
`“means for imposing [an/the] increased drop rate on the flow”
`(claims 27 and 38) .............................................................................. 14
`“means for receiving a particular information packet belonging
`to the flow” (claims 43 and 44) .......................................................... 14
`“means for determining whether to forward the particular
`information packet to a destination” (claim 43) ................................. 14
`
`E.
`
`F.
`
`G.
`
`H.
`
`I.
`
`sf-4592262
`
`i
`
`

`

`Inter Partes Review of USP 8,243,593
`TABLE OF CONTENTS
`(continued)
`
`Page
`
`J.
`
`“means for updating […] the set of behavioral statistics to
`reflect processing of the particular information packet” (claims
`43 and 44) ........................................................................................... 15
`VI. OVERVIEW OF THE PRIOR ART ............................................................ 15
`VII. GROUNDS OF UNPATENTABILITY ....................................................... 17
`A.
`Ground 1: Claims 1, 2, 4-7, 17, 18, 25-27, 37, and 38 Are
`Obvious Over Yung ........................................................................... 17
`1.
`Overview: Yung Discloses a System for Classifying and
`Controlling Flows Using Behavioral Statistics ........................ 17
`Independent Claim 1 ................................................................ 19
`a.
`Yung Discloses the Preamble of Claim 1 ...................... 19
`b.
`Yung Discloses the “Creating” Limitation .................... 21
`c.
`Yung Stores Payload-Content-Agnostic Behavioral
`Statistics Regardless of the Presence or Absence of
`Congestion ..................................................................... 25
`Yung Discloses the “Updating” Limitation ................... 27
`Yung Discloses the “Determining” Limitation ............. 29
`Yung Discloses the “Enforcing” Limitation ................. 32
`Yung Discloses Performing the Steps on a Router
`Without Requiring Use of Inter-Router Data ................ 33
`Independent Claim 2 ................................................................ 35
`a.
`Yung Discloses the Preamble of Claim 2 ...................... 35
`b.
`Yung Discloses the Limitations of Claim 2 .................. 36
`Independent Claims 4 and 5 ..................................................... 37
`Independent Claim 25 .............................................................. 38
`a.
`Yung Discloses the Preamble of Claim 25 .................... 38
`b.
`Yung Discloses the “Means for Maintaining”
`Limitation ...................................................................... 38
`
`2.
`
`d.
`e.
`f.
`g.
`
`3.
`
`4.
`5.
`
`sf-4592262
`
`ii
`
`

`

`Inter Partes Review of USP 8,243,593
`TABLE OF CONTENTS
`(continued)
`
`Page
`
`c.
`
`d.
`
`c.
`
`Yung Discloses the “Means for Determining”
`Limitation ...................................................................... 39
`Yung Discloses the “Means for Enforcing”
`Limitation. ..................................................................... 40
`Dependent Claims 6 and 26 ..................................................... 40
`6.
`Dependent Claims 7 and 27 ..................................................... 41
`7.
`Dependent Claims 17 and 37 ................................................... 41
`8.
`Dependent Claims 18 and 38 ................................................... 42
`9.
`Ground 2: Claims 9-13, 19-24, 29-33, and 39-44 Are Obvious
`Over Yung and Copeland ................................................................... 42
`1.
`Overview: Yung Discloses a System for Classifying and
`Controlling Flows Using Behavioral Statistics, and
`Copeland Calculates a Flow-Based Concern Index ................. 42
`2. Motivation to Combine ............................................................ 45
`3.
`Independent Claim 9 ................................................................ 47
`a.
`Yung Discloses the Preamble of Claim 9 ...................... 47
`Yung Discloses the “Maintaining” Limitation .............. 47
`b.
`c.
`Yung in View of Copeland Discloses the
`“Computing” Limitation ................................................ 48
`Independent Claim 29 .............................................................. 50
`Yung Discloses the Preamble of Claim 29 .................... 50
`a.
`b.
`Yung Discloses the “Means for Maintaining”
`Limitation ...................................................................... 50
`Yung Discloses the “Means for Computing”
`Limitation ...................................................................... 51
`Dependent Claims 10 and 30 ................................................... 51
`Dependent Claims 11 and 31 ................................................... 52
`Dependent Claims 12 and 32 ................................................... 52
`Dependent Claims 13 and 33 ................................................... 53
`
`B.
`
`4.
`
`5.
`6.
`7.
`8.
`
`sf-4592262
`
`iii
`
`

`

`Inter Partes Review of USP 8,243,593
`TABLE OF CONTENTS
`(continued)
`
`Page
`
`Dependent Claims 19 and 39 ................................................... 53
`9.
`10. Dependent Claims 20 and 40 ................................................... 54
`11. Dependent Claims 21 and 41 ................................................... 54
`12. Dependent Claims 22 and 42 ................................................... 55
`13. Dependent Claims 23 and 43 ................................................... 56
`14. Dependent Claims 24 and 44 ................................................... 57
`Ground 3: Claim 3 Is Obvious Over Yung and Four-Steps
`Whitepaper ......................................................................................... 59
`1.
`Overview: Yung Discloses a System for Classifying and
`Controlling Flows Using Behavioral Statistics, and Four-
`Steps Whitepaper Discloses Tracking Dropped Packets ......... 59
`2. Motivation to Combine ............................................................ 59
`3.
`Independent Claim 3 ................................................................ 61
`a.
`Yung Discloses the Preamble of Claim 3 ...................... 61
`b.
`Yung Discloses a Medium Storing a Data
`Structure ......................................................................... 62
`Yung Discloses the “First Field” ................................... 63
`Yung in View of Four-Steps Whitepaper Discloses
`the “Second Field” ......................................................... 63
`Yung Discloses the “Third Field” ................................. 64
`e.
`Yung Discloses the “Fourth Field” ................................ 65
`f.
`Yung Discloses the “Fifth Field” .................................. 65
`g.
`Ground 4: Claims 8, 14-16, 28, and 34-36 Are Obvious Over
`Yung and Copeland in View of Ye .................................................... 66
`Overview: Yung-Copeland Discloses a System for
`1.
`Classifying Flows Using Behavioral Statistics, and Ye
`Describes a Congestion Condition ........................................... 66
`2. Motivation to Combine ............................................................ 67
`3.
`Dependent Claims 8, 14, 28, and 34 ........................................ 69
`
`c.
`d.
`
`C.
`
`D.
`
`sf-4592262
`
`iv
`
`

`

`Inter Partes Review of USP 8,243,593
`TABLE OF CONTENTS
`(continued)
`
`Page
`
`Dependent Claims 15 and 35 ................................................... 71
`4.
`Dependent Claims 16 and 36 ................................................... 72
`5.
`VIII. DISCRETIONARY DENIAL WOULD BE INAPPROPRIATE AND
`INEQUITABLE ............................................................................................ 72
`IX. GROUNDS FOR STANDING (37 C.F.R. § 42.104(a)) .............................. 76
`X. NOTICES AND STATEMENTS ................................................................. 76
`XI. CONCLUSION ............................................................................................. 78
`
`sf-4592262
`
`v
`
`

`

`Inter Partes Review of USP 8,243,593
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`Apple Inc. v. Fintiv, Inc.,
`IPR2020-00019, Paper 11 (PTAB Mar. 20, 2020) ....................................... 72, 75
`Apple Inc. v. Parus Holdings, Inc.,
`IPR2020-00686, Paper 9 (PTAB Sept. 23, 2020) ............................................... 73
`Cisco Sys., Inc. v. Ramot at Tel Aviv Univ. Ltd.,
`IPR2020-00122, Paper 15 (P.T.A.B. May 15, 2020) ......................................... 75
`Cloudflare Inc. v. Sable Networks, Inc.,
`IPR2021-00909, Paper 16 (P.T.A.B. Nov. 19, 2021) ................................... 75, 76
`Ericsson v. Uniloc,
`IPR2020-00376, Paper 16 (P.T.A.B. May 22, 2020) ........................................... 1
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2015) (en banc) .................................................... 11, 12
`Sable Networks, Inc. v. Splunk Inc.,
`No. 5:21-cv-00040-RWS, Dkt. No. 65 (E.D. Tex. Sept. 21, 2021) ................... 73
`Sable Networks, Inc. v. Splunk Inc.,
`No. 5:21-cv-00040-RWS, Dkt. No. 77 (E.D. Tex. Nov. 1, 2021) ...................... 73
`Sand Revolution II, LLC v. Cont’l Intermodal Grp. – Trucking LLC,
`IPR2019-01393, Paper 24 (PTAB June 16, 2020) ....................................... 73, 74
`Sotera Wireless, Inc. v. Masimo Corp.,
`IPR2020-01019, Paper 12 (P.T.A.B. Dec. 1, 2020) ........................................... 74
`Williamson v. Citrix Online, LLC,
`792 F.3d 1339 (Fed. Cir. 2015) .......................................................................... 11
`Statutes
`35 U.S.C. § 102(a) ................................................................................................... 15
`35 U.S.C. § 102 (b) .................................................................................................. 15
`
`sf-4592262
`
`vi
`
`

`

`Inter Partes Review of USP 8,243,593
`
`35 U.S.C. § 102 (e) ............................................................................................ 15, 17
`35 U.S.C. § 112(6) ................................................................................................... 11
`35 U.S.C. § 314 ........................................................................................................ 72
`35 U.S.C. § 315(b) ................................................................................................... 76
`Other Authorities
`37 C.F.R. § 42.8(b)(1) .............................................................................................. 76
`37 C.F.R. § 42.8(b)(2) .............................................................................................. 77
`37 C.F.R. § 42.8(b)(3) .............................................................................................. 77
`37 C.F.R. § 42.8(b)(4) .............................................................................................. 77
`37 C.F.R. § 42.15(a) ................................................................................................. 78
`37 C.F.R. § 42.100(b) .............................................................................................. 11
`37 C.F.R. § 42.104(a) ............................................................................................... 76
`157 Cong. Rec. S5429 (daily ed. Sept. 8, 2011). ..................................................... 76
`
`sf-4592262
`
`vii
`
`

`

`Inter Partes Review of USP 8,243,593
`
`EXHIBIT LIST
`
`Exhibit Description
`
`U.S. Patent No. 8,243,593 (the “’593 Patent”)
`
`Prosecution history of U.S. Application No. 11/022,599, which led
`to the issuance of the ’593 Patent (“File History”)
`
`Declaration of Kevin Jeffay, Ph.D. in Support of Petition for Inter
`Partes Review of U.S. Patent No. 8,243,593
`
`Curriculum Vitae of Kevin Jeffay
`
`U.S. Patent No. 7,664,048 (“Yung”)
`
`“Four Steps to Application Performance Across the Network with
`Packeteer’s PacketShaper®,” archived by web.archive.org on
`March 17, 2003, with Affidavit of Elizabeth Rosenberg attached
`(“Four-Steps Whitepaper”)
`
`U.S. Patent No. 7,185,368 (“Copeland”)
`
`U.S. Patent No. 7,295,516 (“Ye”)
`
`U.S. Patent Publication No. 2004/0090923 (“Kan”)
`
`Gerber, A., et al., “P2P, the Gorilla in the Cable,” Proceedings of
`National Cable & Telecommunications Association, NCTA, 2003
`(“Gerber”)
`
`U.S. Patent No. 7,225,271 (“DiBiasio”)
`
`U.S. Patent No. 7,561,515 (“Ross”)
`
`Ben-Nun, M., “Taming the Peer to Peer Monster Using Service
`Control,” Fall Technical Forum (2003) (“Ben-Nun”)
`
`U.S. Patent No. 6,839,321 (“Chiruvolu”)
`
`U.S. Patent No. 7,088,678 (“Freed”)
`
`sf-4592262
`
`viii
`
`Exhibit #
`
`EX-1001
`
`EX-1002
`
`EX-1003
`
`EX-1004
`
`EX-1005
`
`EX-1006
`
`EX-1007
`
`EX-1008
`
`EX-1009
`
`EX-1010
`
`EX-1011
`
`EX-1012
`
`EX-1013
`
`EX-1014
`
`EX-1015
`
`

`

`Inter Partes Review of USP 8,243,593
`
`Exhibit Description
`
`“NetEnforcerTM, QoS/SLA Enforcement for Service Providers,”
`Allot Communications (2001)
`
`“PacketShaper® Features for PacketWise 5.2,” Packeteer, Inc.
`
`U.S. Patent No. 7,366,101 (“Varier”)
`
`Andrikopoulos, I., Pavlou, G., “Supporting Differentiated Services
`in MPLS Networks,” 1999 Seventh International Workshop on
`Quality of Service, including Declaration from Rachel J. Watters,
`Librarian and Director of Wisconsin TechSearch (“Andrikopoulos”)
`
`U.S. Patent No. 7,385,924 (“Riddle-924”)
`
`U.S. Patent No. 7,660,248 (“Duffield”)
`
`Sen, S., et al., “Accurate, Scalable In-Network Identification of P2P
`Traffic Using Application Signatures,” Proceedings of the 13th
`International Conference on World Wide Web (2004) (“Sen”)
`
`U.S. Patent No. 7,313,100 (“Turner”)
`
`U.S. Patent Publication No. 2002/0186661 (“Santiago”)
`
`U.S. Patent Publication No. 2003/0118029 (“Maher”)
`
`U.S. Patent No. 7,296,288 (“Hill”)
`
`U.S. Patent No. 6,904,529 (“Swander”)
`
`U.S. Patent No. 6,385,170 (“Chiu”)
`
`U.S. Patent No. 6,934,256 (“Jacobson”)
`
`U.S. Patent No. 7,342,929 (“Bremler-Barr”)
`
`PacketShaper® System Datasheet
`
`sf-4592262
`
`ix
`
`Exhibit #
`
`EX-1016
`
`EX-1017
`
`EX-1018
`
`EX-1019
`
`EX-1020
`
`EX-1021
`
`EX-1022
`
`EX-1023
`
`EX-1024
`
`EX-1025
`
`EX-1026
`
`EX-1027
`
`EX-1028
`
`EX-1029
`
`EX-1030
`
`EX-1031
`
`

`

`Inter Partes Review of USP 8,243,593
`
`Exhibit Description
`
`Boniforti, C., “Securing a University’s Bandwidth with
`PacketShaper,” SANS Institute (2003) (“Boniforti”)
`
`Braden, R., Postel, J., “RFC 1009 – Requirements for Internet
`Gateways” (1987) (“Braden”)
`
`Roughan, M., et al., “Class-of-Service Mapping for QoS: A
`Statistical Signature-based Approach to IP Traffic Classification,”
`Proceedings of the 4th ACM SIGCOMM Conference on Internet
`Measurement (2004) (“Roughan”)
`
`U.S. Patent No. 7,027,393 (“Cheriton”)
`
`U.S. Patent No. 7,433,304 (“Galloway”)
`
`U.S. Patent No. 6,115,357 (“Packer”)
`
`Exhibit #
`
`EX-1032
`
`EX-1033
`
`EX-1034
`
`EX-1035
`
`EX-1036
`
`EX-1037
`
`Szigeti, T., “QoS Best Practices,” Cisco Systems (2004) (“Szigeti”)
`
`EX-1038
`
`U.S. Patent No. 6,412,000 (“Riddle-000”)
`
`Long L., et al., “Differential Congestion Notification: Taming the
`Elephants,” Proceedings of the 12th IEEE International Conference
`on Network Protocols (Oct. 2004) (“Long”)
`
`Parris M., et al., “Lightweight Active Router-Queue Management
`for Multimedia Networking,” Multimedia Computing and
`Networking” (Jan. 1999) (“Parris”)
`
`U.S. Patent Publication No. 2002/0023168 (“Bass”)
`
`U.S. Application Publication No. 2002/0097719 (“Chaskar”)
`
`Bernaille, L., et al, “Traffic Classification on the Fly,” ACM
`SIGCOMM Computer Communication Review (2006) (“Bernaille”)
`
`U.S. Patent No. 7,782,793 (“Olesinski”)
`
`U.S. Patent No. 8,693,348 (“Wei”)
`
`sf-4592262
`
`x
`
`EX-1039
`
`EX-1040
`
`EX-1041
`
`EX-1042
`
`EX-1043
`
`EX-1044
`
`EX-1045
`
`EX-1046
`
`

`

`Inter Partes Review of USP 8,243,593
`
`Exhibit Description
`
`Karagiannis, T., et al, “Transport Layer Identification of P2P
`Traffic,” IMC 04: Proceedings of the 4th ACM SIGCOMM
`conference on Internet measurement, October 2004 (“Karagiannis”)
`
`Supplemental Order Regarding Court Operations Under the Exigent
`Circumstances Created by the COVID-19 Pandemic, United States
`District Court for the Western District of Texas dated May 8, 2020
`
`Supplemental Order Regarding Court Operations Under the Exigent
`Circumstances Created by the COVID-19 Pandemic, United States
`District Court for the Western District of Texas dated June 18, 2020
`
`Supplemental Order Regarding Court Operations Under the Exigent
`Circumstances Created by the COVID-19 Pandemic, United States
`District Court for the Western District of Texas dated July 2, 2020
`
`Seventh Supplemental Order Regarding Court Operations Under the
`Exigent Circumstances Created by the COVID-19 Pandemic, United
`States District Court for the Western District of Texas dated
`August 6, 2020
`
`Eighth Supplemental Order Regarding Court Operations Under the
`Exigent Circumstances Created by the COVID-19 Pandemic, United
`States District Court for the Western District of Texas dated
`September 21, 2020
`
`Ninth Supplemental Order Regarding Court Operations Under the
`Exigent Circumstances Created by the COVID-19 Pandemic, United
`States District Court for the Western District of Texas dated October
`14, 2020
`
`Tenth Supplemental Order Regarding Court Operations Under the
`Exigent Circumstances Created by the COVID-19 Pandemic, United
`States District Court for the Western District of Texas dated
`November 18, 2020
`
`Exhibit #
`
`EX-1047
`
`EX-1048
`
`EX-1049
`
`EX-1050
`
`EX-1051
`
`EX-1052
`
`EX-1053
`
`EX-1054
`
`sf-4592262
`
`xi
`
`

`

`Inter Partes Review of USP 8,243,593
`
`Exhibit Description
`
`Eleventh Supplemental Order Regarding Court Operations Under
`the Exigent Circumstances Created by the COVID-19 Pandemic,
`United States District Court for the Western District of Texas dated
`December 10, 2020
`
`Twelfth Supplemental Order Regarding Court Operations Under the
`Exigent Circumstances Created by the COVID-19 Pandemic, United
`States District Court for the Western District of Texas dated
`January 7, 2021
`
`Thirteenth Supplemental Order Regarding Court Operations Under
`the Exigent Circumstances Created by the COVID-19 Pandemic,
`United States District Court for the Western District of Texas dated
`February 2, 2021
`
`Fourteenth Supplemental Order Regarding Court Operations Under
`the Exigent Circumstances Created by the COVID-19 Pandemic,
`United States District Court for the Western District of Texas dated
`March 17, 2021
`
`Exhibit #
`
`EX-1055
`
`EX-1056
`
`EX-1057
`
`EX-1058
`
`U.S. Patent No. 6,038,216 (“Packer-216”)
`
`EX-1059
`
`
`
`sf-4592262
`
`xii
`
`

`

`Inter Partes Review of USP 8,243,593
`
`I.
`
`INTRODUCTION
`Petitioner Splunk Inc. petitions for inter partes review of claims 1-44
`
`(“challenged claims”) of U.S. Patent No. 8,243,593 (“the ’593 Patent” (EX1001)).1
`
`The challenged claims are directed to identifying and controlling network traffic
`
`using behavioral statistics of packets in the flows, which was known in the art as
`
`evidenced by this petition and the supporting declaration of Kevin Jeffay, Ph.D.
`
`(EX1003). The challenged claims are unpatentable as obvious based on the
`
`following grounds:
`
`Ground
`
`Claim(s)
`
`Prior Art
`
`1
`
`2
`
`1, 2, 4-7, 17, 18, 25-27, 37, 38 Yung (EX1005)
`
`9-13, 19-24, 29-33, 39-44
`
`Yung and Copeland (EX1007)
`
`1 Petitioner is concurrently filing a Motion for Joinder (Paper 3) to the petition
`
`in Cloudflare Inc. v. Sable Networks, Inc., IPR2021-00909, Paper 1 (P.T.A.B. May
`
`7, 2021), along with this “me-too” or “copycat” petition. Ericsson v. Uniloc,
`
`IPR2020-00376, Paper 16 at 13 (P.T.A.B. May 22, 2020) (granting motion for
`
`joinder where “me-too” petition was “substantively identical” to the instituted
`
`petition because “[i]t is not unexpected, given Petitioner’s ‘understudy role’ and
`
`the joinder nature of the Petition, that the first filed petition serves as a roadmap for
`
`the joinder petition.”).
`
`sf-4592262
`
`1
`
`

`

`Inter Partes Review of USP 8,243,593
`
`Ground
`
`Claim(s)
`
`Prior Art
`
`3
`
`4
`
`3
`
`Yung and Four-Steps Whitepaper
`(EX1006)
`
`8, 14-16, 28, 34-36
`
`Yung, Copeland, and Ye (EX1008)
`
`II. GROUNDS FOR STANDING
`Petitioner certifies that the ’593 Patent is available for inter partes review
`
`and that Petitioner is not barred or estopped from requesting review.
`
`III. TECHNICAL BACKGROUND
`By the early 2000s, the ever-increasing popularity of online applications and
`
`services brought significantly increased network traffic on the Internet and other
`
`computer networks. The Internet provided an “exploding amount of remote
`
`information” to users worldwide and enabled a variety of new applications (e.g.,
`
`e-mail, e-commerce, file-transfer, remote database access, etc.) that added load to
`
`existing networks already strained by increasing levels of network traffic.
`
`(EX1042, [0019]-[0020].) The problem of quickly-growing demand for the
`
`limited existing bandwidth was exacerbated by the widespread emergence of
`
`peer-to-peer (P2P) applications (EX1010, 1-2; EX1013, 1-2), growing use of
`
`voice-over-IP (VOIP) systems (EX1011, 1:62-2:21), and increase in
`
`denial-of-service attacks against network infrastructures (EX1012, 1:12-18). (See
`
`also EX1003, ¶¶32-37.)
`
`sf-4592262
`
`2
`
`

`

`Inter Partes Review of USP 8,243,593
`
`Because existing networks had finite capacity for ever-increasing network
`
`traffic, it became necessary to monitor network performance and to employ
`
`corrective measures when performance fell. (EX1009, [0004].) Various
`
`techniques were developed to identify network traffic and handle it appropriately
`
`in an effort to efficiently allocate existing bandwidth. (EX1021, 2:43-3:6;
`
`EX1003, ¶¶38-40.) For example, a network administrator might prioritize database
`
`transactions over external web-browsing or ensure low latency for interactive
`
`applications and high throughput for file downloads. (EX1021, 1:9-29.)
`
`One way to understand network traffic was to identify (i.e., classify)
`
`network “flows.” The concept of a flow would have been well-known to a person
`
`of ordinary skill in the art. (EX1003, ¶40.) A flow is essentially a sequence of
`
`related packets; for example, packets sent from the same application or packets
`
`sent on the same network connection. (Id.; see also EX1001, 5:15-19 (describing a
`
`flow as “a series of packets that are related in some manner” and stating that
`
`“packets are grouped into a flow if they share a sufficient amount of header
`
`information”).) Network elements, such as routers, track network flows using flow
`
`tables to record the existence of the flow and to capture information about it.
`
`(EX1043, [0002]-[0006], [0013].)
`
`By 2004, when the ’593 Patent was filed, various prior art approaches had
`
`been developed for classifying flows. Given a flow classification, an administrator
`
`sf-4592262
`
`3
`
`

`

`Inter Partes Review of USP 8,243,593
`
`could apply rules to take action on the packets of the flow to adhere to desired
`
`policies (e.g., priority, security, rate control, etc.). (EX1003, ¶45.) For example,
`
`network congestion and delays could be addressed by “shaping” network traffic,
`
`which could include dropping packets or using other quality of service (“QoS”)
`
`measures (e.g., prioritizing certain flows, re-routing flows, etc.). (EX1014, 1:6-32;
`
`EX1029, 2:21-40.)
`
`Industry participants offered various products (i.e., network appliances)
`
`providing traffic management capabilities. (EX1003, ¶¶41-43; EX1016; EX1017.)
`
`For example, Packeteer, Inc. was an industry leader and offered a network
`
`appliance called PacketShaper® that allowed network administrators to “control
`
`traffic to ensure that latency-sensitive, customer-critical applications get the
`
`bandwidth they need to perform at their peak.” (EX1031, 3; see also id., 1
`
`(“Seventy-four percent of the world’s largest companies rely on Packeteer®
`
`innovation to solve their WAN application performance problems.”); EX1032
`
`(“Securing a University’s Bandwidth with PacketShaper”).) For reasons of trust
`
`and scalability of administration and management, however, traffic management
`
`functionality was typically implemented in network routers. (EX1021, 3:19-24;
`
`see also EX1029, 2:21-40; EX1020, 16:37-40; EX1023, 2:41-54; EX1015, 1:58-
`
`2:3; EX1018, Abstract; EX1028, Abstract; EX1030, 20:9-12; EX1036, 21:1-7;
`
`EX1037, 5:3-6; EX1003, ¶44.)
`
`sf-4592262
`
`4
`
`

`

`Inter Partes Review of USP 8,243,593
`
`Network practitioners recognized, by the early 2000s, that better
`
`classification techniques (i.e., improved mechanisms for identifying the type of
`
`traffic represented by particular network flows) would lead to wider adoption of
`
`QoS-based traffic shaping. (EX1021, 2:31-39.) It had become particularly
`
`important to accurately identify peer-to-peer traffic because it had come to
`
`monopolize a large portion of available network bandwidth. (EX1022, 512; see
`
`also EX1003, ¶45.)
`
`Some traffic classification techniques examined packet header information,
`
`such as the port number, or scanned packet payloads (i.e., data carried by the
`
`packet) in an effort to identify a “signature” for a particular type of network traffic.
`
`(EX1022, 512; EX1045, 1:31-42; EX1046, 1:42-50; EX1005, 4:51-55; EX1001,
`
`1:19-45; EX1003, ¶46.) Because some applications, such as peer-to-peer
`
`applications, sought to avoid identification through encryption, dynamic port-
`
`hopping, and other means, traffic classification techniques were developed that
`
`focused on the flow’s behavioral statistics and empirically observable flow data.
`
`(EX1021, Abstract; EX1045, 2:51-3:30; EX1007, Abstract; EX1047, 121-122;
`
`EX1034, 139-140 (§4.2); EX1005, Abstract; EX1003, ¶47.) For example, some
`
`prior art techniques considered packet sizes, number of packets, inter-packet
`
`arrival delay, and so forth in classifying network flows. (EX1045, 6:29-35
`
`(“Beside flow durations, traffic flows can be characterized based on statistical
`
`sf-4592262
`
`5
`
`

`

`Inter Partes Review of USP 8,243,593
`
`traffic flow parameters such as: average/median packet size, packet size variance,
`
`root-means-square packet size, largest packet sampled so far, shortest packet
`
`sampled so far, average/median inter-packet arrival delay, inter-packet arrival
`
`delay variance, bytes per flow, packets per flow, etc.”); EX1021, 6:28-32, 7:18-20
`
`(“A simple example is the statistics of the inter-arrival times between packets in
`
`flows.”); EX1047, 134 (“We also want to consider additional heuristics that use
`
`knowledge of specific packet sizes that may reflect control traffic of P2P
`
`protocols.”).) These approaches did not rely on packet headers or payload
`
`contents. EX1047, 121-122 (“We develop a systematic methodology for P2P
`
`traffic profiling by identifying flow patterns and characteristics of P2P behavior,
`
`without examination of user payload.”).) Instead, they applied heuristics to map
`
`measured statistics onto established classes (e.g., P2P). (Id., 125 (“These two
`
`simple heuristics efficiently classify most pairs as P2P or nonP2P.”).)
`
`After classifying the flow as a particular type of traffic, network traffic
`
`management devices could enforce policies on packets in the flow as appropriate.
`
`(EX1025, [0008]-[0010], [0059]; EX1005, 24:27-25:8.) For instance, packets
`
`could be prioritized, delayed, or dropped depending on the type of traffic and the
`
`particular rules adopted by network administrators. Flow identification and
`
`management of this type could be implemented in various network devices
`
`including IP routers, as noted above. (EX1003, ¶48.)
`
`sf-4592262
`
`6
`
`

`

`Inter Partes Review of USP 8,243,593
`
`IV. THE CHALLENGED PATENT
`A. Overview of the ’593 Patent
`The ’593 Patent is entitled “Mechanism for Identifying and Penalizing
`
`Misbehaving Flows in a Network.” (EX1001.) It describes identifying network
`
`data flows based on behavioral statistics and penalizing “misbehaving” flows such
`
`as peer-to-peer traffic. (Id., Abstract, 1:53-2:51.) As others in the industry had
`
`already recognized (e.g., EX1021, 2:31-39; EX1045, 1:31-42), then-existing
`
`systems were inadequate for classifying traffic as applications became more
`
`sophisticated and elusive. (EX1001, 1:7-49.) The named-inventor addressed the
`
`problem—again as others in the industry already had (e.g., EX1021, 6:23-7:40;
`
`EX1045, 6:18-35)—by identifying flows based on their observed, empirical
`
`behavior. (EX1001, 1:58-59, 2:4-5.) The specification explains that “because their
`
`behavior cannot be hidden, misbehaving flows cannot avoid detection. . . .
`
`regardless of which protocols they use, or how those protocols try to
`
`hide/obfuscate their nature. . . .” (Id., 1:61-66.) “Once identified/detected, they
`
`can be controlled and/or penalized.” (Id., 1:66-67.)
`
`The ’593 Patent describes a “misbehaving flow manager (MFM) 210 for
`
`keeping track of flows, determining whether the flows are exhibiting undesirable
`
`behavior, and enforcing a penalty on the flows if they are exhibiting undesirable
`
`behavior.” (EX1001, 5:44-48.) The misbehaving flow manager empirically tracks
`
`behavioral statistics such as byte count, life duration, flow rate, average packet
`7
`
`sf-4592262
`
`

`

`Inter Partes Review of USP 8,243,593
`
`size, etc. and stores these statistics in a “flow block.” (Id., 2:4-5, 2:63-64, 6:5-19,
`
`Fig. 4.)
`
`(EX1001, Fig. 4.)
`As each packet in the flow is processed, the behavioral statistics in the flow
`
`block are updated to “provide an up[-]to[-]date reflection of the flow’s behavior.”
`
`
`
`(Id., 6:20- 24.)
`
`Legacy systems classified flows using heuristic methods, and it was typical
`
`to calculate gradients, ranges, or other quantitative indicators of a degree of
`
`misbehavior. (See, e.g., EX1007, Abstract; EX1030, 7:2-5.) Similarly, the
`
`’593 Patent computes a “badness factor” used to determine whether a flow exhibits
`
`undesirable behavior and indicating a degree of misbehavior. EX1001, 2:18-26,
`
`6:25-33.) Figure 5 illustrates one function for computing the badness factor
`
`sf-4592262
`
`8
`
`

`

`Inter Partes Review of USP 8,243,593
`
`considering flow rate, duration, total bytes, and average packet size as compared to
`
`thresholds. (Id., 2:65-67, 7:51-67.)
`
`
`
`(EX1001, Fig. 5.)
`After identifying an undesirable flow, the misbehaving flow manager applies
`
`standard techniques for flow control (e.g., increasing drop rate). (EX1001, 2:28-
`
`30, 6:34-43, 9:7-14.) The flow manager then updates the statistics to reflect the
`
`processing. (Id., 7:37-45.)
`
`B.
`Prosecution History
`The application that issued as the ’593 Patent was filed on December 22,
`
`2004. In an initial Office Action, the Examiner rejected all a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket