throbber
Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 1 of 47 PageID #: 3594
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`
`IN RE: TAASERA LICENSING LLC,
`PATENT LITIGATION
`
`THIS DOCUMENT RELATES TO ALL
`ACTIONS
`








`
`Case No. 2:22-md-03042-JRG
`
`JURY TRIAL DEMANDED
`
`TAASERA LICENSING LLC’S
`OPENING CLAIM CONSTRUCTION BRIEF
`
`IPR2024-00027
`CrowdStrike Exhibit 1009 Page 1
`
`

`

`Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 2 of 47 PageID #: 3595
`
`
`I.
`
`II.
`
`TABLE OF CONTENTS
`
`Page(s)
`
`INTRODUCTION .............................................................................................................. 1
`
`CLAIM CONSTRUCTION STANDARD OF REVIEW .................................................. 1
`
`A.
`
`B.
`
`GOVERNING LAW ............................................................................................... 1
`
`LEVEL OF ORDINARY SKILL IN THE ART .................................................... 2
`
`III.
`
`DISPUTED CLAIM TERMS ............................................................................................. 2
`
`1.
`
`2.
`
`3.
`
`4.
`
`
`
`5.
`
`6.
`
`
`
`7.
`
`8.
`
`“regularly identifiable expression” / “regular expression” (Claim
`1, ’796 Patent) ............................................................................................. 2
`
`“if the new program is validated, permitting the new program to
`continue loading and to execute in connection with the computing
`device” (Claims 6, 13, 14, and 24, ’137 Patent) ......................................... 4
`
`“an execution module coupled to the detection module and
`operable for monitoring, at the operating system kernel of the
`computing device, the program in response to the trigger
`intercepted by the detection module” (Claim 1, ’137 Patent) ..................... 5
`
`“network administration traffic” (Claims 1, 2, 9, 10, 13, 14, 17, and
`18, ’356 Patent) ........................................................................................... 7
`
`“[third/fourth] program instructions to determine if the packet is
`network administration traffic” (Claims 1, 9, 10, 13, and 17, ’356
`Patent) ......................................................................................................... 7
`
`“attestation” (Claims 1, 2, 3, 5, and 7, ’441 Patent; Claim 1, ’616
`Patent) ....................................................................................................... 11
`
`“runtime” (Claim 1, ’616 Patent) .............................................................. 13
`
`“at runtime” (Claim 1, ’616 Patent) .......................................................... 13
`
`“a computing platform comprising a network trust agent” (Claim
`1, ’616 Patent) ........................................................................................... 14
`
`“at runtime receiving … a runtime execution context indicating
`attributes of the application at runtime, wherein the attributes
`comprise one or more executable file binaries of the application
`and loaded components of the application” (Claims 1 and 4, ’441
`Patent) ....................................................................................................... 16
`
`i
`
`IPR2024-00027
`CrowdStrike Exhibit 1009 Page 2
`
`

`

`Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 3 of 47 PageID #: 3596
`
`9.
`
`10.
`
`11.
`
`12.
`
`13.
`
`14.
`
`
`
`15.
`
`16.
`
`17.
`
`18.
`
`“a security context providing security information about the
`application” (Claims 1, 4, and 5, ’441 Patent) .......................................... 18
`
`“an application artifact” (Claim 2, ’441 Patent) ....................................... 20
`
`“introspective security context” (Claims 4 and 5, ’441 Patent) ................ 21
`
`“the application of the restriction of the user's transaction” (Claim
`11, ’441 Patent) ......................................................................................... 22
`
`“return URL” (Claims 1, 3, 4, 6, 7, 9, 10, 12, 13, 15, 16, and 19,
`’419 Patent; Claims 1, 3, 4, 5, 6, and 8, ’634 Patent; Claims 1, 2,
`3, 4, 5, 6, 8, 9, and 10, ’251 Patent; and Claims 1, 5, 6, 10, 11, 12,
`16, 17, and 18, ’453 Patent) ...................................................................... 24
`
`“evaluating[, by the computer,] the URL to determine whether
`encryption of [none, part, or all of ]the URL is required” (Claims
`1, 4, 10, 13, and 17, ’419 Patent; Claims 1 and 4, ’634 Patent)................ 25
`
`“determining, by the computer, whether encryption is required for
`none, part, or all of a return URL” / “determining[, by the
`computer,] [whether/that] encryption of [a/the] return URL [of the
`requested resource] is required” / “determining by the computer,
`[whether/that] encryption of the contained URL [is/is not]
`required” / “determine that encryption of the URL is not required”
`(Claims 1, 4, 13, and 19, ’419 Patent; Claims 1 and 4, ’634 Patent;
`Claims 1, 2, 3, 4, 5, 6, 8, 9, and 10, ’251 Patent; Claims 1, 4, 6, 7,
`8, 9, 10, 11, 12, 13, 14, 15, 16, 17, and 18, ’453 Patent) .......................... 25
`
`“determining whether encryption of none, part, or all of a return
`URL of the requested resource that is to be returned to a location
`of the resource request” (Claim 10, ’419 Patent) ...................................... 27
`
`“determining[, by the computer,] whether the URL of the
`requested resource is required” (Claims 2 and 11, ’419 Patent;
`Claim 2, ’634 Patent) ................................................................................ 29
`
`“compliance state of the endpoint” (Claims 1, 12, and 23, ’038
`Patent; Claims 1, 11, and 21, ’997 Patent; Claims 1, 9, and 17, ’918
`Patent) ....................................................................................................... 30
`
`“compliance polic[y/ies]” (Claims 1, 12, and 23, ’038 Patent;
`Claims 1, 11, and 21, ’997 Patent; Claims 1, 9, and 17, ’918 Patent)
`................................................................................................................... 30
`
`
`
`
`
`ii
`
`IPR2024-00027
`CrowdStrike Exhibit 1009 Page 3
`
`

`

`Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 4 of 47 PageID #: 3597
`
`19.
`
`“real-time” / “real time” (Claims 1 and 2, ’948 Patent) ............................ 31
`
`
`
`20.
`
`21.
`
`22.
`
`23.
`
`24.
`
`25.
`
`26.
`
`27.
`
`“substantially real time”/ “substantially real-time data” (Claims 1,
`10, and 17, ’518 Patent) ............................................................................ 31
`
`“which includes a network analyzer, an integrity processor, an
`event correlation matrix, a risk correlation matrix, and a trust
`supervisor” (Claim 1, ’948 Patent) ........................................................... 35
`
`“operational integrity of the application” (Claim 1, ’948 Patent) ............. 35
`
`“an event correlation matrix” (Claim 1, ’948 Patent) ............................... 36
`
`“a risk correlation matrix” (Claim 1, ’948 Patent) .................................... 37
`
`“correlating, by the event and risk correlation matrix” (Claim 1,
`’948 Patent) ............................................................................................... 38
`
`“the event and behavior correlation engine” (Claim 3, ’948 Patent)
`................................................................................................................... 38
`
`“formatting the status information”/ “the … data is formatted”
`(Claims 1, 10, and 17, ’518 Patent) .......................................................... 38
`
`“initiating… at least one action” / “initiate an action” (Claims 1,
`10, and 17, ’518 Patent) ............................................................................ 39
`
`IV.
`
`CONCLUSION ................................................................................................................. 39
`
`
`
`iii
`
`IPR2024-00027
`CrowdStrike Exhibit 1009 Page 4
`
`

`

`Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 5 of 47 PageID #: 3598
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Cases
`CAE Screenplates Inc., v. Heinrich Fiedler GmbH & Co. KG,
`224 F.3d 1308 (Fed. Cir. 2000)................................................................................................26
`
`Exxon Chem. Pats., Inc. v. Lubrizol Corp.,
`64 F.3d 1553 (Fed. Cir. 1995)..................................................................................................12
`
`Goldenberg v. Cytogen, Inc.,
`373 F.3d 1158 (Fed. Cir. 2004)..................................................................................................3
`
`Grp. One, Ltd. v. Hallmark Cards, Inc.,
`407 F.3d 1297 (Fed. Cir. 2005)..................................................................................................1
`
`Interval Licensing LLC v. AOL, Inc.,
`766 F.3d 1364 (Fed. Cir. 2014)................................................................................................35
`
`Invitrogen Corp. v. Biocrest Mfg., L.P.,
`424 F.3d 1374 (Fed. Cir. 2005)................................................................................................34
`
`Irdeto Access, Inc. v. Echostar Satellite Corp.,
`383 F. 3d 1295 (Fed. Cir. 2004).................................................................................................2
`
`Jawbone Innovations, LLC v. Samsung Elecs. Co., Ltd. et al.,
`No. 2:21-CV-00186-JRG-RSP, Dkt. 119 (E.D. Tex., Aug. 16, 2022) ......................................1
`
`Kinik Co. v. Int’l Trade Comm’n,
`362 F.3d 1359 (Fed. Cir. 2004)................................................................................................26
`
`Novo Indus., L.P. v. Micro Molds Corp.,
`350 F.3d 1348 (Fed. Cir. 2003)............................................................................................1, 22
`
`Omega Eng’g, Inc, v. Raytek Corp.,
`334 F.3d 1314 (Fed. Cir. 2003)................................................................................................18
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005)............................................................................................9, 19
`
`Shire Dev., LLC v. Watson Pharms., Inc.,
`787 F.3d 1359 (Fed. Cir. 2015)................................................................................................18
`
`UltimatePointer, L.L.C. v. Nintendo Co.,
`816 F.3d 816 (Fed. Cir. 2016)..................................................................................................12
`
`iv
`
`IPR2024-00027
`CrowdStrike Exhibit 1009 Page 5
`
`

`

`Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 6 of 47 PageID #: 3599
`
`Ultimax Cement Mfg. Corp. v. CTS Cement Mfg. Corp.,
`587 F.3d 1339 (Fed. Cir. 2009)..................................................................................................2
`
`Ultravision Techs., LLC v. Holophane Eur. Ltd.,
`No. 2:19-cv-00291-JRG-RSP, 2020 WL 6271231 (E.D. Tex. Oct. 26, 2020) ......34, 36, 37, 38
`
`
`
`v
`
`IPR2024-00027
`CrowdStrike Exhibit 1009 Page 6
`
`

`

`Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 7 of 47 PageID #: 3600
`
`I.
`
`INTRODUCTION
`
`Pursuant to P.R. 4-5(a) and the Court’s Sixth Amended Docket Control Order of June 27,
`
`2023 (Dkt. 239), Plaintiff Taasera Licensing LLC (“Taasera” or “Plaintiff”) hereby submits its
`
`Opening Claim Construction Brief. The asserted patents are U.S. Patent Nos. 6,842,796 (“the ’796
`
`Patent,” Ex. A); 7,673,137 (“the ’137 Patent,” Ex. B); 8,127,356 (“the ’356 Patent,” Ex. C);
`
`8,327,441 (“the ’441 Patent,” Ex. D); 8,819,419 (“the ’419 Patent,” Ex. E); 8,850,517 (“the ’517
`
`Patent,” Ex. F); 8,955,038 (“the ’038 Patent,” Ex. G); 8,990,948 (“the ’948 Patent,” Ex. H);
`
`9,071,518 (“the ’518 Patent,” Ex. I); 9,092,616 (“the ’616 Patent,” Ex. J); 9,118,634 (“the ’634
`
`Patent,” Ex. K); 9,608,997 (“the ’997 Patent,” Ex. L); 9,628,453 (“the ’453 Patent,” Ex. M);
`
`9,860,251 (“the ’251 Patent,” Ex. N); and 9,923,918 (“the ’918 Patent,” Ex. O) (together, the
`
`“Asserted Patents”). This brief is supported by the Expert Declaration of Dr. Eric Cole Regarding
`
`Claim Construction (Ex. P).
`
`II.
`
`CLAIM CONSTRUCTION STANDARD OF REVIEW
`
`A.
`
`GOVERNING LAW
`
`The governing legal standards relating to claim construction are described in the Court’s
`
`opinion in Jawbone Innovations, LLC v. Samsung Elecs. Co., Ltd. et al., No. 2:21-CV-00186-JRG-
`
`RSP, Dkt. 119, at 1–3 (E.D. Tex., Aug. 16, 2022), and are incorporated herein by reference.
`
`“[The Federal Circuit] ha[s] assumed that courts can continue to correct obvious minor
`
`typographical and clerical errors in patents. . .A district court can correct a patent only if (1) the
`
`correction is not subject to reasonable debate based on consideration of the claim language and the
`
`specification and (2) the prosecution history does not suggest a different interpretation of the
`
`claims.” Novo Indus., L.P. v. Micro Molds Corp., 350 F.3d 1348, 1357 (Fed. Cir. 2003). The error
`
`must be “evident from the face of the patent,” Grp. One, Ltd. v. Hallmark Cards, Inc., 407 F.3d
`
`1297, 1303 (Fed. Cir. 2005), and the determination “must be made from the point of view of one
`
`
`
`IPR2024-00027
`CrowdStrike Exhibit 1009 Page 7
`
`

`

`Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 8 of 47 PageID #: 3601
`
`skilled in the art,” Ultimax Cement Mfg. Corp. v. CTS Cement Mfg. Corp., 587 F.3d 1339, 1353
`
`(Fed. Cir. 2009).
`
`B.
`
`LEVEL OF ORDINARY SKILL IN THE ART
`
`The “Field of the Invention” is described generally as related to the field of map-based
`
`applications executed on smartphone devices and communication among operators of the map-
`
`based applications. The detailed descriptions of the inventions and the claims of the Asserted
`
`Patents draw on a combination of skills from the computer science and engineering arts. Taasera
`
`submits that a person of ordinary skill in the art (“POSITA”) would have a bachelor’s degree in
`
`computer science or computer engineering with one to two years of experience in the field of
`
`computer programming for communications systems, or the equivalent education and work
`
`experience. Ex. P, Cole Decl., ¶¶ 43-45. Extensive experience and technical training might
`
`substitute for educational requirements, while advanced degrees might substitute for experience.
`
`Id.
`
`III. DISPUTED CLAIM TERMS
`
`1.
`
`“regularly identifiable expression” / “regular expression” (Claim 1,
`’796 Patent)
`
`Taasera’s Proposed Construction
`“matchable pattern”
`
`Defendants’ Proposed Construction
`Plain and ordinary meaning of “regular
`expression.”
`
`
`
`
`The parties disagree to the extent over which the term “regular expression” would be
`
`known to a POSITA. Taasera maintains that, because “regularly identifiable expression” or
`
`“regular expression” has no plain or established meaning to one of ordinary skill in the art, and
`
`Defendants presented no intrinsic evidence or extrinsic evidence to the contrary, a construction is
`
`required as broadly as provided for by the patent. Irdeto Access, Inc. v. Echostar Satellite Corp.,
`
`383 F. 3d 1295, 1300 (Fed. Cir. 2004) (“where a disputed term lacks an accepted meaning in the
`
`2
`
`IPR2024-00027
`CrowdStrike Exhibit 1009 Page 8
`
`

`

`Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 9 of 47 PageID #: 3602
`
`art …, we construe a claim term only as broadly as provided for by the patent itself. The duty thus
`
`falls on the patent applicant to provide a precise definition for the disputed term.”); Goldenberg v.
`
`Cytogen, Inc., 373 F.3d 1158, 1164 (Fed. Cir. 2004) (as claim term “has no accepted meaning to
`
`one of ordinary skill in the art, … we construe it only as broadly as is provided for by the patent
`
`itself”).
`
`These phrases are terms of art in the software field, and the jury would benefit from
`
`Taasera’s construction in order to understand the term. The ’796 Patent’s independent claims
`
`explicitly describe that regularly identifiable expressions “represent a pattern that is matchable.”
`
`The specification of the ’796 Patent is just as explicit. Ex. A, 3:22-26 (“the term ‘regular
`
`expression’ is taken to mean any form of pattern that is matchable.”).
`
`In one embodiment, “stereotypical phrases that people commonly use to convey particular
`
`information” are referred to as regular expressions. Id. at 2:1-15. “[F]or example, in a phone call,
`
`the caller is likely to identify himself in one of just a few ways, e.g., ‘Hi <recipient-name>, it’s
`
`<caller-name>’ (e.g., ‘Hi John, it’s Bob’) or ‘-recipient-name>, <caller-name> here’ (e.g., ‘John,
`
`Bob here’). Or in a cover letter, a job applicant is likely to express his interest with a phrase like
`
`‘I am looking for a job in <field>’ (e.g., ‘I am looking for a job in electrical engineering’).” Id.
`
`In other particular embodiments, a regular expression may be a trigger prefix or trigger
`
`suffix. Id. at 3:41-50 (“A trigger prefix is a characteristic phrase that typically precedes a piece of
`
`information, for example, in a voice mail message, ‘give me a call back at’ is a trigger phrase that
`
`precedes a phone number. A trigger suffix is a phrase that typically follows a key piece of
`
`information, even when a trigger prefix is not present. For example, the phrase ‘talk to you later
`
`bye’ is often a post-facto signal that a phone number has been provided, when the words
`
`immediately preceding the phrase are a sequence of numbers.”).
`
`3
`
`IPR2024-00027
`CrowdStrike Exhibit 1009 Page 9
`
`

`

`Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 10 of 47 PageID #: 3603
`
`Defendants provide no intrinsic or extrinsic evidence indicating that a POSITA would
`
`include the disclosed exemplary embodiments of stereotypical phrases, trigger prefixes, and trigger
`
`suffixes, among other matchable patterns from the plain and ordinary meaning of the term. Thus
`
`Plaintiff’s construction is warranted.
`
`2.
`
`“if the new program is validated, permitting the new program to continue
`loading and to execute in connection with the computing device” (Claims 6, 13,
`14, and 24, ’137 Patent)
`
`Taasera’s Proposed Construction
`Plain and ordinary meaning.
`
`
`Defendants’ Proposed Construction
`If the new program is [validated, claims 6, 13]
`/ [the same as the allowed program, claims 14,
`24], then it is not monitored while it [loads
`and executes in connection with the
`computing device, claims 6, 13] / [executes on
`the computing device, claims 14 and 24)]
`
`
`Most of Defendants’ proposed construction is duplicative of the claim language itself. For
`
`example, Claims 6 and 13 recite “if the new program is validated, permitting the new program to
`
`continue loading and to execute in connection with the computing device” while Defendants’
`
`proposed construction for this claim limitation is: “if the new program is validated, then it is not
`
`monitored while it loads and executes in connection with the computing device.”
`
`Claims 14 and 24 recite “if the new program is the same as the allowed program, permitting
`
`the new program to execute on the computing device” while Defendants’ proposed construction
`
`for this claim limitation is: “if the new program is the same as the allowed program, then it is not
`
`monitored while it executes on the computing device.”
`
`In both Defendants’ proposed constructions, the only change to the claim language that
`
`Defendants propose is “then it is not monitored…,” which is not the same as the claim language,
`
`“permitting the new program to [continue]…” and contradicts the claim language in view of the
`
`specification. The specification is explicit that a program may still be monitored (either minimally
`
`4
`
`IPR2024-00027
`CrowdStrike Exhibit 1009 Page 10
`
`

`

`Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 11 of 47 PageID #: 3604
`
`or not at all), as it continues loading and executes:
`
`Once a program is validated in the pre-execution phase, little or
`no additional security monitoring needs to be performed on the
`new program while it is executing. If the new program is not
`validated, the program can continue to load and execute, but other
`execution security modules are
`responsible
`for detecting,
`monitoring, and responding to suspicious activities. For example,
`the execution security modules can control access to certain files or
`registry settings, or limit network access. The execution security
`modules can also consider whether a new program was previously
`permitted to execute on the computing device.
`
`
`Ex. B, 3:49-62. The claim language is clear on its face and no construction is necessary. Thus,
`
`the plain and ordinary meaning is the proper construction of this term.
`
`3.
`
` “an execution module coupled to the detection module and operable
`for monitoring, at the operating system kernel of the computing
`device, the program in response to the trigger intercepted by the
`detection module” (Claim 1, ’137 Patent)
`
`Taasera’s Proposed Construction
`Subject to 112 ¶ 6.
`
`Structure: Software algorithm that performs
`the steps of FIG. 6.
`
`Function: monitoring, at the operating system
`kernel of the computing device, the program
`in response to the trigger intercepted by the
`detection module.
`
`Defendants’ Proposed Construction
`Means plus function.
`
`Algorithm: Indefinite.
`
`Function: monitoring, at the operating system
`kernel of the computing device, the program
`in response to the trigger intercepted by the
`detection module.
`
`Alternatively: If the program was not
`validated, then monitor the non-validated
`program in response to triggers while the
`program is executing.
`
`
`The parties agree that the term is subject to § 112 ¶ 6. The parties also agree that the
`
`function that should be accorded to this term is “monitoring, at the operating system kernel of the
`
`computing device, the program in response to the trigger intercepted by the detection module.”
`
`Ex. P, Cole Decl. at ¶¶ 47-48. The parties dispute the structure that should be accorded to this term.
`
`Id. at ¶ 49.
`
`5
`
`IPR2024-00027
`CrowdStrike Exhibit 1009 Page 11
`
`

`

`Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 12 of 47 PageID #: 3605
`
`A POSITA would understand that Figure 6 and its supporting text are clearly linked to the
`
`“execution module,” and that the steps of this algorithm should be construed to be the
`
`corresponding structure. Id. at ¶ 50. The execution module monitors the program while it is
`
`executing, in contrast to the pre-execution module, which monitors the program before it is
`
`installed or executed. Id. (citing Ex. B, 3:20-4:18); see also Claim 1 (“an execution module coupled
`
`to the detection module and operable for monitoring.”)
`
`Figure 6, according to the patent, discloses “a logic flow diagram illustrating a non-
`
`validated execution process using the protector system in accordance with an exemplary
`
`embodiment of the present invention. Id. at ¶ 51 (citing Ex. B, at 4:40-42). The algorithm in Figure
`
`6 occurs “after the pre-execution process and concern[s] executable files that the binary execution
`
`monitor 125 could not validate in the pre-execution phase. Referring to FIG. 6, an exemplary
`
`process 600 is illustrated for executing an executable file that has not been validated.” Id. (citing
`
`Ex. B, 9:38-43).
`
`Fig. 6, shown here, discloses the steps performed by the
`
`“execution module” when a non-validated program is running. Id.
`
`at ¶ 52 (citing Ex. B, Fig. 6).
`
`A POSITA reading the specification would understand that
`
`the execution module refers to the non-validated execution
`
`process of Fig. 6, which is implemented through the structure of a
`
`software algorithm because one of the explicit benefits of the
`
`claimed invention is performing a validation step during the pre-
`
`execution process (i.e., not the execution process) to minimize
`
`unnecessary monitoring and false positives of security alarms
`
`6
`
`IPR2024-00027
`CrowdStrike Exhibit 1009 Page 12
`
`

`

`Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 13 of 47 PageID #: 3606
`
`during program execution. Id. at ¶ 53 (citing Ex. B, 10:49-61 (“The pre-execution process provides
`
`an efficient method for determining whether an uncorrupted program is allowed to execute. By
`
`validating certain programs during the pre-execution process, the protector system minimizes the
`
`amount of work that must be done in monitoring and controlling programs during the execution
`
`phase. The validation step also reduces the number of false positive alarms, thereby reducing
`
`security interruptions for the user.”)).
`
`4.
`
`“network administration traffic” (Claims 1, 2, 9, 10, 13, 14, 17, and 18, ’356
`Patent)
`“[third/fourth] program instructions to determine if the packet is network
`administration traffic” (Claims 1, 9, 10, 13, and 17, ’356 Patent)
`
`Term
`
`Taasera’s Proposed
`Construction
`
`“network administration
`traffic”
`
`Plain and ordinary meaning.
`
`Defendants’ Proposed
`Construction
`Indefinite.
`
`“[third/fourth] program
`instructions to determine
`if the packet is network
`administration traffic”
`
`Subject to 112 ¶ 6.
`
`Structure: Software algorithm that
`performs the steps of FIG. 7.
`
`Function: determine if the packet
`is network administration traffic.
`
`Subject to 112(6).
`
`Structure: indefinite.
`
`Function: determine if the packet
`is network administration traffic.
`
`
`Plaintiff and Defendants agree that “[third/fourth] program instructions to determine if the
`
`packet is network administration traffic” is subject to § 112 ¶ 6 and agree that the function that
`
`should be accorded to this term is “determine if the packet is network administration traffic.”
`
`Plaintiff contends that “[third/fourth] program instructions to determine if the packet is
`
`network administration traffic” should be construed to have the following structure: “Software
`
`algorithm that performs the steps of FIG. 7.” Defendants’ expert, Dr. Black, citing to this patent’s
`
`prosecution history in his declaration (Ex. Q, Black Decl.), also acknowledges that “the Applicant
`
`and Board both agreed during prosecution that this claim referred to ‘algorithmic functions.’” Ex.
`
`7
`
`IPR2024-00027
`CrowdStrike Exhibit 1009 Page 13
`
`

`

`Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 14 of 47 PageID #: 3607
`
`Q, ¶ 46. However, Defendants incorrectly contend that the term lacks sufficient structure for two
`
`reasons: (1) Figure 7 “does not disclose an algorithm adequate to perform the entire recited claim
`
`function”; and (2) the term “network administration traffic” is allegedly indefinite. Id. at ¶ 47.
`
`a.
`
`Fig. 7 Adequately Discloses the Claimed Algorithm
`
`The specification of the ’356 Patent clearly and unambiguously links Fig. 7 to the
`
`determination of whether the packet is network administration traffic and, therefore, is the
`
`algorithmic structure that should be accorded to this term:
`
`FIG. 7 is a flow chart illustrating a program function within the
`honeypot packet filtering program of FIG. 2 which determines if the
`current packet is harmless network administration traffic.
`
`Ex. C, 4:1-4; Ex. P, ¶ 66.
`
`
`FIG. 7 illustrates in more detail decision 110 of FIG. 2 (i.e.
`determining if the current packet is network administration traffic
`presumed to be harmless)…If there is a match (decision 502, yes
`branch), then the current packet is deemed harmless network
`administration traffic…
`
`Ex. C, 8:21-37; Ex. P, ¶ 66.
`
`A POSITA would have understood this algorithm to adequately perform the multi-step
`
`determination of whether the packet is network administration traffic. For example, the
`
`specification clearly teaches the POSITA that the first step is to determine the IP protocol and IP
`
`address of the packet by parsing the header. Ex. P, ¶ 67 (citing Ex. C, 8:31-37). Then, the second
`
`step is to compare that information to a list. Id. Third, if there is a match between the header info
`
`and the list, the packet is deemed to be network administration traffic that is presumed to be
`
`harmless. Id.
`
`Defendants’ expert creates a false dichotomy regarding whether Fig. 7 is an algorithm for
`
`determining network administrators versus network administration traffic. Ex. Q, ¶ 49. The two
`
`are inextricably linked since network administration traffic is traffic generated by harmless
`
`8
`
`IPR2024-00027
`CrowdStrike Exhibit 1009 Page 14
`
`

`

`Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 15 of 47 PageID #: 3608
`
`network administration activities (i.e., traffic from network administrators). Defendants’ expert’s
`
`argument that Fig. 7 and its related text “would not identify SSH or VNC traffic, because SSH and
`
`VNC of traffic can be delivered over multiple IP protocols (such as TCP or UDP) and from
`
`multiple IP addresses” is also inapposite. Id. The main benefit of this claim limitation is efficient
`
`resource allocation by not unnecessarily analyzing traffic (including unnecessarily determining
`
`whether network administration traffic is specifically SSH or VNC) from bona fide network
`
`administrators with known IP protocols and IP addresses. Ex. P, ¶ 59 (citing Ex. C, 2:38-3:5 (“the
`
`shear [sic] number of packets received by [such a] honeypot delays the detection of new computer
`
`attacks, viruses, computer worms and exploitation code.”)).
`
`b.
`
`“Network Administration Traffic” is Not Indefinite
`
`As a preliminary matter, Plaintiff has changed its proposed construction of “network
`
`administration traffic” to its plain and ordinary meaning because the term comprises commonly
`
`understood words with widely accepted meanings. Phillips v. AWH Corp., 415 F.3d 1303, 1314
`
`(Fed. Cir. 2005) (“[T]he ordinary meaning of claim language as understood by a person of skill in
`
`the art may be readily apparent even to lay judges, and claim construction in such cases involves
`
`little more than the application of the widely accepted meaning of commonly understood words.”).
`
`The specification provides a non-limiting list of examples of traffic generated by network
`
`administrators (i.e., network administration traffic), including “secure shell (“SSH”) traffic to
`
`remotely install a patch or change configuration or virtual network computing (“VNC”) traffic
`
`or terminal services traffic to create a remote server desktop to remotely add a userID, or install a
`
`patch or change configuration (decision 110).” Ex. C, 5:54-59; Ex. P, ¶ 58. On the other hand,
`
`such traffic (e.g., SSH or VNC) is not harmless network administration traffic when it is not
`
`generated by known network administrators. See Ex. C, 1:67-2:2 (“Hacking can also be facilitated
`
`if there is an improper configuration to a server which allows unknown third parties to gain
`
`9
`
`IPR2024-00027
`CrowdStrike Exhibit 1009 Page 15
`
`

`

`Case 2:22-md-03042-JRG Document 256 Filed 08/04/23 Page 16 of 47 PageID #: 3609
`
`administrative authority to a program or data base.”). Defendants’ expert, Dr. Black, states that
`
`“simply because a command is issued by a network administrator does not mean it is ‘network
`
`administration traffic,’ such as the example of an administrator checking her personal email via
`
`SSH.” Ex. Q, ¶ 53. Not only is that understanding at odds with the patent specification, which
`
`makes a clear delineation between traffic by network administrators and traffic by hackers or
`
`unknown third parties to gain administrative authority, as noted above, but checking email is not
`
`traffic and the patent specification does not contain such an example because that would defy the
`
`basic understanding of the word, “traffic.”
`
`Dr. Black’s manufactured requirement that the specification determine whether the traffic
`
`is SSH or VNC traffic in addition to providing examples of network administration traffic (Ex. Q,
`
`¶¶ 48-51) is irrelevant to the claim language and also obfuscates the fundamental question that the
`
`claim limitation seeks to address, which is whether traffic originates from trusted network
`
`administrators (i.e., determine if the packet is network administration traffic) such that the system
`
`can avoid wasting resources and computing power by not monitoring benign network
`
`administration traffic. Ex. P, ¶ 59. It is time consuming to parse every network packet for known
`
`attacks, where each packet must have a purpose or explanation before they are discounted as
`
`known or harmless. Id. As noted above, “the shear [sic] number of packets received by [such a]
`
`honeypot delays the detection of new computer attacks, viruses, computer worms and exploitation
`
`code.” Id. (citing Ex. C, 2:38-3:5).
`
`The patent explains how it achieves that benefit through the use of a list of IP
`
`protocol/address combinations that correspond to bona fide ne

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket