Filed on behalf of: Wiz, Inc.
`By: Matthew A. Argenti (margenti@wsgr.com)
`
`Michael T. Rosato (mrosato@wsgr.com)
`Wesley E. Derryberry (wderryberry@wsgr.com)
`Tasha M. Thomas (tthomas@wsgr.com)
`Joseph M. Baillargeon (jbaillargeon@wsgr.com)
`WILSON SONSINI GOODRICH & ROSATI
`650 Page Mill Road
`Palo Alto, CA 94304
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`————————————————
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`————————————————
`
`WIZ, INC.,
`Petitioner,
`
`v.
`
`ORCA SECURITY LTD.,
`Patent Owner.
`
`————————————————
`Case IPR2025-00095
`Patent No. 11,637,855
`————————————————
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 11,637,855
`
`

`

`TABLE OF CONTENTS
`
`V.
`
`INTRODUCTION ........................................................................................... 1
`I.
`II. MANDATORY NOTICES UNDER 37 C.F.R. §42.8 .................................... 2
`III. CERTIFICATIONS ......................................................................................... 3
`IV.
`IDENTIFICATION OF CHALLENGE; STATEMENT OF PRECISE
`RELIEF REQUESTED ................................................................................... 3
`THE ’855 PATENT ......................................................................................... 4
`A.
`Prosecution History ............................................................................... 5
`VI. NO BASIS EXISTS FOR DENIAL UNDER 35 U.S.C. §325(D) ................. 7
`VII. LEVEL OF ORDINARY SKILL .................................................................... 8
`VIII. CLAIM CONSTRUCTION ............................................................................ 9
`IX. BACKGROUND ............................................................................................. 9
`A. Virtualization and Cloud Computing .................................................... 9
`B.
`Cyber Security ..................................................................................... 10
`PRIOR ART ................................................................................................... 15
`A.
`Elder (U.S. Pub. No. 2014/0189873, EX1005) ................................... 15
`B.
`Kim (U.S. Pub. No. 2016/0092679, EX1006) .................................... 16
`C.
`Hufsmith (U.S. Pub. No. 2020/0097662, EX1007) ............................ 17
`XI. GROUND 1: CLAIMS 1-6, 8-9, AND 11-18 WERE OBVIOUS
`OVER ELDER AND KIM ............................................................................ 19
`A.
`Reasons to Combine Elder and Kim ................................................... 20
`B.
`Independent Claims ............................................................................. 27
`1.
`Preambles .................................................................................. 27
`2.
`Element 1.i ................................................................................ 28
`3.
`Elements 1.1, 12.1, and 18.1 ..................................................... 29
`4.
`Elements 1.2, 12.2, and 18.2 ..................................................... 32
`5.
`Elements 1.3, 12.3, and 18.3 ..................................................... 33
`6.
`Elements 1.4, 12.4, and 18.4 ..................................................... 36
`
`X.
`
`-i-
`
`

`

`
`
`C.
`
`Elements 1.5 and 12.5 ............................................................... 37
`7.
`Elements 1.6, 12.6, and 18.5 ..................................................... 38
`8.
`Dependent Claims ............................................................................... 45
`1.
`Claims 2-3 and 13-14 ................................................................ 45
`2.
`Claims 4 and 15......................................................................... 46
`3.
`Claims 5 and 16......................................................................... 49
`4.
`Claims 6 and 17......................................................................... 50
`5.
`Claim 8 ...................................................................................... 51
`6.
`Claim 9 ...................................................................................... 52
`7.
`Claim 11 .................................................................................... 52
`XII. GROUND 2: CLAIMS 1-18 WERE OBVIOUS OVER ELDER,
`KIM, AND HUFSMITH ............................................................................... 53
`A.
`Reasons to Combine Elder, Kim, and Hufsmith ................................. 53
`B.
`Claims 1, 12, and 18 ............................................................................ 59
`C.
`Claims 4 and 5 ..................................................................................... 60
`D.
`Claim 7 ................................................................................................ 62
`E.
`Claim 10 .............................................................................................. 63
`XIII. CONCLUSION .............................................................................................. 65
`
`
`
`
`
`-ii-
`
`

`

`
`
`LISTING OF CHALLENGED CLAIMS
`
`1. A cyber security system for a cloud environment, the system comprising:
`
`[1.i] at least one processor configured to:
`
`[1.1] using a cloud provider API, access a block storage volume of a
`workload maintained in a cloud storage environment;
`
`[1.2] identify an installed software application in the accessed block
`storage volume;
`
`[1.3] analyze the identified installed software application to determine
`an associated software version;
`
`[1.4] access a data structure of known software vulnerabilities for a
`plurality of versions of software applications;
`
`[1.5] perform a lookup of the identified installed software version in
`the data structure to identify known vulnerabilities; and
`
`[1.6] use network accessibility information and at least one port to
`identify one or more of the known and identified vulnerabilities
`susceptible to attack from outside the workload, wherein the network
`accessibility information includes at least one of: data from an
`external data source, cloud provider information, or at least one
`network capture log.
`
`2. The system of claim 1, wherein the at least one processor is further
`configured to implement a remedial action in response to the identified one
`or more vulnerabilities.
`
`3. The system of claim 2, wherein the remedial action includes transmitting
`an alert to a device associated with an administrator.
`
`4. The system of claim 1, wherein the at least one processor is further
`configured to:
`
`query the cloud provider API to determine network accessibility
`information related to the workload further comprises examining data
`sources associated with the workload; and
`
`-iii-
`
`

`

`
`
`determine the network accessibility information based on the
`examined data sources.
`
`5. The system of claim 1, wherein to identify the installed software
`application, the at least one processor is configured to:
`
`extract data from at least one of operating system packages, libraries,
`or program language libraries; and
`
`identify the installed software application based on the extracted data.
`
`6. The system of claim 1, wherein the at least one processor is further
`configured to identify a version of the installed software application.
`
`7. The system of claim 1, wherein the identified installed software
`application includes one or more scripts.
`
`8. The system of claim 1, wherein the data structure includes aggregated
`vulnerability data.
`
`9. The system of claim 8, wherein the aggregated vulnerability data includes
`data from one or more third-party vendors.
`
`10. The system of claim 8, wherein the aggregated vulnerability data
`includes data collected by a scanner.
`
`11. The system of claim 8, wherein the aggregated vulnerability data
`includes at least one of an advisory, an exploit, a security announcement, or
`a known bug.
`
`12. A method, comprising:
`
`[12.1] using a cloud provider API, accessing a block storage volume
`of a workload maintained in a cloud storage environment;
`
`[12.2] identifying an installed software application in the accessed
`block storage volume;
`
`[12.3] analyzing the identified installed software application to
`determine an associated software version;
`
`-iv-
`
`

`

`
`
`[12.4] accessing a data structure of known software vulnerabilities for
`a plurality of versions of software applications;
`
`[12.5] performing a lookup of the identified installed software version
`in the data structure to identify known vulnerabilities; and
`
`[12.6] use network accessibility information and at least one port to
`identify one or more of the known and identified vulnerabilities
`susceptible to attack from outside the workload, wherein the network
`accessibility information includes at least one of: data from an
`external data source, cloud provider information, or at least one
`network capture log.
`
`13. The method of claim 12, further comprising implementing a remedial
`action in response to the identified one or more vulnerabilities.
`
`14. The method of claim 13, wherein the remedial action includes
`transmitting an alert to a device associated with an administrator.
`
`15. The method of claim 12, wherein the method further comprises query the
`cloud provider API to determine network accessibility information related to
`the workload, by
`
`examining data sources associated with the workload; and
`
`determining the network accessibility information based on the
`examined data sources.
`
`16. The method of claim 12, wherein identify the installed software
`application comprises:
`
`extracting data from at least one of OS packages, libraries, or program
`language libraries; and
`
`identifying the installed software application based on the extracted
`data.
`
`17. The method of claim 16, wherein the at least one processor is further
`configured to identify a version of the installed software application.
`
`-v-
`
`

`

`
`
`18. A non-transitory computer-readable medium storing instructions that,
`when executed by at least one processor, are configured to cause the at least
`one processor to perform operations comprising:
`
`[18.1] using a cloud provider API, accessing a block storage volume
`of a workload maintained in a cloud storage environment;
`
`[18.2] identifying an installed software application in the accessed
`block storage volume;
`
`[18.3] analyzing the identified installed software application to
`determine an associated software version;
`
`[18.4] accessing a data structure of known software vulnerabilities for
`a plurality of versions of software applications; and
`
`[18.5] use network accessibility information and at least one port to
`identify one or more of the known and identified vulnerabilities
`susceptible to attack from outside the workload, wherein the network
`accessibility information includes at least one of: data from an
`external data source, cloud provider information, or at least one
`network capture log.
`
`
`
`-vi-
`
`

`

`I.
`
`INTRODUCTION
`
`Petitioner Wiz, Inc. (“Wiz”) respectfully requests review of U.S. Patent No.
`
`11,637,855 (“the ’855 patent”), currently assigned to Orca Security Ltd. (“Orca”).
`
`This petition demonstrates claims 1-18 are unpatentable.
`
`The ’855 claims describe well-known techniques for identifying software-
`
`specific vulnerabilities present on a workload in a cloud environment and
`
`analyzing the risk that the identified vulnerabilities are susceptible to attack from
`
`outside the workload. The techniques involve using a cloud provider API to access
`
`a block storage volume of a workload to identify software applications that are
`
`installed on the workload, analyzing those applications to determine an associated
`
`software version, and accessing a data structure of known software vulnerabilities
`
`to perform a lookup of the identified installed software version in the data structure
`
`to identify known vulnerabilities applicable to the workload. Network accessibility
`
`information and at least one port is then used to identify the known and identified
`
`vulnerabilities that are susceptible to attack from outside the workload.
`
`This type of software-matching vulnerability identification and subsequent
`
`attack risk analysis was already well known prior to the ’855 patent’s priority date,
`
`as demonstrated by the combination of Elder and Kim. Elder discloses most
`
`aspects of the independent claims, though it does not expressly discuss using cloud
`
`provider APIs for its approach or using at least one port to identify vulnerabilities
`
`-1-
`
`

`

`
`
`that are susceptible to outside attack. However, these techniques were well known
`
`as shown by Kim, which builds on Elder by referring to it as a background
`
`reference. A third reference, Hufsmith, further demonstrates that the techniques
`
`described by the ’855 patent claims were routine in the art by disclosing the use of
`
`additional types of network accessibility information in an analysis assessing the
`
`attack risk of identified software vulnerabilities. Furthermore, the dependent
`
`claims describe other well-known features, as demonstrated below.
`
`Accordingly, Wiz respectfully requests institution.
`
`II. MANDATORY NOTICES UNDER 37 C.F.R. §42.8
`
`Real Party-in-Interest (37 C.F.R. §42.8(b)(1)): Petitioner Wiz is the real
`
`party-in-interest.
`
`Related Matters (37 C.F.R. § 42.8(b)(2)): Wiz is involved in litigation
`
`involving Orca patents from a different patent family than those of the ’855 patent
`
`in Orca Security Ltd. v. Wiz, Inc., No. 1-23-cv-00758 (DDE), filed and served on
`
`July 12, 2023. Wiz has also filed the following IPR petitions challenging Orca
`
`patents unrelated to the ’855 patent: IPR2024-00220, IPR2024-00863, IPR2024-
`
`00864, IPR2024-00865, IPR2024-01109, IPR2024-01191, IPR2024-01190.
`
`Lead and Back-Up Counsel (37 C.F.R. §42.8(b)(3)):
`
`Lead Counsel: Matthew A. Argenti (Reg. No. 61,836)
`
`-2-
`
`

`

`
`
`Back-Up Counsel: Michael T. Rosato (Reg. No. 52,182); Wesley E.
`
`Derryberry (Reg. No. 71,594); Tasha M. Thomas (Reg. No. 73,207); Joseph M.
`
`Baillargeon (Reg. No. 79,685).
`
`Service Information–37 C.F.R. §42.8(b)(4): Wiz consents to electronic
`
`service. Please direct all correspondence to lead and back-up counsel at the
`
`contact information below. A power of attorney accompanies this petition.
`
`E-mail: margenti@wsgr.com; mrosato@wsgr.com; wderryberry@wsgr.com;
`
`tthomas@wsgr.com; jbaillargeon@wsgr.com
`
`Post: WILSON SONSINI GOODRICH & ROSATI, 650 Page Mill Road,
`
`Palo Alto, CA 94304
`
`Tel.: 650-354-4154
`
`
`
`Fax: 650-493-6811
`
`III. CERTIFICATIONS
`
`The ’855 patent is available for IPR, and Wiz is not barred or estopped from
`
`requesting IPR on these grounds.
`
`IV.
`
`IDENTIFICATION OF CHALLENGE; STATEMENT OF PRECISE RELIEF
`REQUESTED
`
`Wiz seeks cancellation of the challenged claims for the reasons stated below,
`
`which are supported with exhibits, including the Declaration of Dr. Angelos
`
`Stavrou (EX1002). The claims are unpatentable under 35 U.S.C. §311 and AIA §6
`
`based on at least the following grounds:
`
`-3-
`
`

`

`
`
`Ground
`
`1
`
`2
`
`Claims
`1-6, 8-9, and 11-
`18
`
`Basis
`§103(a): obviousness over Elder and Kim.
`
`1-18
`
`§103(a): obviousness over Elder, Kim, and
`Hufsmith.
`
`V. THE ’855 PATENT
`
`The ’855 patent issued from U.S. Application No. 17/657,972 (“the ’972
`
`Application”), filed April 5, 2022. EX1001, Face. The ’972 application claims
`
`priority to Provisional Application No. 63/180,048, filed April 26, 2021. The ’855
`
`patent thus has an effective filing date no earlier than April 26, 2021, and is subject
`
`to AIA §102 and §103. Id.; EX1002, ¶20.
`
`The ’855 patent describes techniques for securing a cloud infrastructure,
`
`including “a method of operating a cybersecurity system performing a side
`
`scanning function to protect against potential vulnerabilities.” EX1001, 1:15-18,
`
`22:31-33, Fig. 5; EX1002, ¶46. The specification describes well-known software-
`
`matching techniques in which software installed on a workload, along with the
`
`installed software’s version, is identified and the information is then compared
`
`against a list of known software vulnerabilities. EX1001, 22:55-60, 23:56-24:18;
`
`EX1002, ¶¶40, 47. The specification also describes the well-known concept of
`
`determining the risk that a vulnerability can be exploited by explaining that
`
`network accessibility information and at least one port may be used to identify one
`
`-4-
`
`

`

`
`
`or more vulnerabilities “susceptible to attack from outside the workload.” Id.,
`
`32:12-26; see also id., 22:60-67 (determining “an avenue for potential vulnerability
`
`513 to access and infiltrate” the workload), 24:19-35, 24:47-62; EX1002, ¶¶42-45,
`
`47.
`
`The ’855 patent includes 18 claims. Claims 1, 12, and 18 are independent.
`
`Claims 12 and 18 essentially mirror claim 1, but whereas claim 1 is written as a
`
`system claim, independent claim 12 is directed to a method, and independent claim
`
`18 is directed to a computer-readable medium. The dependent claims add other
`
`conventional aspects of cybersecurity and cloud computing. EX1002, ¶¶48-49.
`
`A.
`
`Prosecution History
`
`During prosecution, the claims of the ’972 application faced rejections under
`
`§§102 and 103. The last limitation of the independent claims originally recited
`
`that at least one of three actions were performed as part of the claimed
`
`cybersecurity analysis: (1) “query the cloud provider API to determine network
`
`accessibility information related to the workload”; (2) “identify at least one port on
`
`which the vulnerable application is accessible”; or (3) “use network accessibility
`
`information and at least one port to identify one or more vulnerabilities susceptible
`
`to attack from outside the workload.” EX1004, 770-71, 1234; EX1002, ¶50.
`
`In an Office Action, the Examiner rejected the claims as anticipated by Dye
`
`(U.S. Pub. No. 2020/0389482), asserting that Dye disclosed the first of the three
`
`-5-
`
`

`

`
`
`recited actions (i.e., “query the cloud provider API to determine network
`
`accessibility information related to the workload”). EX1004, 580-82, 1030-31;
`
`EX1002, ¶50. The applicant amended the claims to remove recitation of the first
`
`action, but the Examiner responded, in an Advisory Action, that Stopel (U.S. Pub.
`
`No. 2019/0116199) taught the second recited action (i.e., “identify at least one port
`
`through which an application is accessible”). EX1004, 548, 563 (claim
`
`amendment).
`
`The applicant then removed the second recited action from the claims,
`
`resulting in only the third action—which recited “network accessibility
`
`information” rather than “network accessibility information related to the
`
`workload” recited in the first action—remaining in the claims. Id., 461-62. The
`
`applicant also amended the third action to further recite “use network accessibility
`
`information and at least one port to identify one or more of the known and
`
`identified vulnerabilities susceptible to attack from outside the workload, wherein
`
`the network accessibility information includes at least one of: data from an external
`
`data source, cloud provider information, or at least one network capture log.” Id.
`
`The applicant distinguished Stopel by arguing “Stopel teaches a host device using
`
`an at least one port to attempt to access an application to determine whether a
`
`vulnerability exists based on an application’s misconfiguration, … rather than
`
`identifying ‘one or more of the known and identified vulnerabilities’ from a ‘data
`
`-6-
`
`

`

`
`
`structure of known software vulnerabilities.’” Id., 468. The Examiner
`
`subsequently allowed the claims. Id., 16-25; EX1002, ¶51.
`
`VI. NO BASIS EXISTS FOR DENIAL UNDER 35 U.S.C. §325(D)
`
`Under the two-part Advanced Bionics framework, §325(d) analysis considers
`
`several factors to determine:
`
`(1) whether the same or substantially the same art previously was
`presented to the Office or whether the same or substantially the
`same arguments previously were presented to the Office; and (2) if
`either condition of [the] first part of the framework is satisfied,
`whether the petitioner has demonstrated that the Office erred in a
`manner material to the patentability of challenged claims.
`
`Advanced Bionics, LLC v. Med-El Elektromedizinische Geräte GmbH, IPR2019-
`
`01469, Paper 6 at 8 (precedential); 35 U.S.C. §325(d).
`
`Elder and Kim were not presented to the Office and Hufsmith, while
`
`disclosed by the applicant in an IDS, was not discussed by the Examiner. See
`
`EX1001, (56); EX1004, 618. The references are also not cumulative of references
`
`considered during prosecution. The Office thus did not consider any of the
`
`grounds presented herein. The Office also lacked additional evidence discussed
`
`herein, including the declaration provided by Wiz’s expert, Dr. Stavrou.
`
`Allowance of the claims also constituted material error under part two of the
`
`Advanced Bionics test. The Examiner allowed the claims of the ’855 patent
`
`-7-
`
`

`

`
`
`because the applicant distinguished a reference as not disclosing identifying
`
`network accessible vulnerabilities that first were identified from a data structure of
`
`known software vulnerabilities. See EX1004, 468; supra, §V.A. However, as
`
`discussed in more detail below, Elder teaches first identifying software
`
`vulnerabilities present on a workload using a data structure of known
`
`vulnerabilities and then assessing each of those vulnerabilities for susceptibility to
`
`outside attack by using network accessibility information related to the
`
`vulnerability. Infra, §XI. Moreover, Kim and Hufsmith describe the well-known
`
`practices of also using port status information and workload-specific network
`
`accessibility information as part of a security risk analysis. Infra, §§XI, XII. The
`
`claims therefore should not have issued, and they would not have issued if the
`
`Examiner had considered the present grounds.
`
`VII. LEVEL OF ORDINARY SKILL
`
`For purposes of this petition, Wiz assumes a priority date of April 26, 2021.
`
`A POSA as of April 2021 would have held at least a bachelor’s degree in computer
`
`science, computer engineering, electrical engineering, or a related field, and would
`
`also have 2-3 years of professional experience working with cyber security
`
`analysis and virtualization. Additional experience could compensate for less
`
`education and vice versa. Relevant work experience includes, for example,
`
`malware analysis, security analysis of cloud computing systems, and security
`
`-8-
`
`

`

`
`
`analysis of VMs. EX1002, ¶¶21-22. Dr. Stavrou meets these requirements and is
`
`qualified to credibly opine on the state of the art and the POSA’s perspective. Id.,
`
`¶¶1-19; see also id., ¶¶2-5 (qualifications); EX1003 (Stavrou CV). Section IX
`
`below summarizes the state of the art, including background knowledge that would
`
`have informed a POSA’s understanding of the references’ teachings applied herein.
`
`VIII. CLAIM CONSTRUCTION
`
`Claim terms are given their ordinary and customary meaning, consistent with
`
`the specification, as a POSA understood them. 37 CFR §42.100(b); Phillips v. AWH
`
`Corp., 415 F.3d 1303, 1312-13 (Fed. Cir. 2005) (en banc). This petition applies the
`
`ordinary and customary meaning of the claim terms. See also EX1002, ¶52.
`
`IX. BACKGROUND
`A. Virtualization and Cloud Computing
`
`Cloud computing and virtualization technology were well known long
`
`before 2021. EX1002, ¶¶23-24; EX1008, 1; EX1009, xxiii; EX1010, 2; EX1011,
`
`35. The physical infrastructure for cloud computing was often provided by data
`
`centers that included large collections of physical resources. EX1002, ¶29;
`
`EX1008, 19; EX1016, 229.
`
`Cloud systems typically used a “virtualization” layer that abstracts the
`
`underlying resources to efficiently manage the operation of multiple applications
`
`across multiple physical servers. EX1002, ¶¶25-29. Each physical server could
`
`-9-
`
`

`

`
`
`emulate multiple physical computers, called a “virtual machine” (VM), running
`
`their own operating system/applications. EX1002, ¶25; EX1009, xxiii; EX1010, 2.
`
`Software containers were another form of virtualization known and widely used at
`
`the time. EX1002, ¶25; EX1012, ii; EX1013, 1:16-35. Desktop, server, cloud, and
`
`datacenter providers routinely used many different virtualization solutions and
`
`products. EX1002, ¶25; see also id., ¶¶26-29 (detailing three-layered framework
`
`of cloud computing) (citing EX1008, 18-19, 94-95; EX1014, 29; EX1015, 55-58,
`
`62-66, 118, 138, 164-66; EX1016, 229).
`
`Off-the-shelf virtualization tools (e.g., VMWare® VirtualCenter) routinely
`
`used APIs to query information about a cloud-based resource, such as a VM.
`
`EX1002, ¶30. These tools allowed users to select a particular VM to obtain more
`
`detailed information about the VM based on API calls. Id.; EX1017, 445-46;
`
`EX1018, ¶¶21, 42. Moreover, common cloud/virtualization platforms included
`
`APIs that were routinely used for querying information about virtual resources and
`
`used as building blocks for more complex tasks, such as performing scans of the
`
`virtual disks of a target VM. EX1002, ¶31; EX1019, 13, 23, 32-33, 53-56, 68-69;
`
`EX1017, 445-46.
`
`B. Cyber Security
`
`Traditional security systems sought to improve security by identifying
`
`security risks including vulnerabilities present on the resource. EX1002, ¶¶32-33,
`
`-10-
`
`

`

`
`
`37. Security scans commonly searched for known risks—e.g., those in published
`
`lists such as the Common Vulnerabilities and Exposures (“CVEs”)—and unknown
`
`risks that might be indicated, for example, by behavioral abnormalities. EX1002,
`
`¶¶33-34; EX1020, 1-3; EX1021, 1; EX1022, 12; EX1023, 9. Virtual machines
`
`were known to be subject to at least the same security risks as nonvirtualized
`
`machines. EX1002, ¶¶35-36; EX1024, ES-2, 3-1, 4-1, 4-3; EX1025, 8; EX1026,
`
`171-72; EX1008, 45-46; EX1027, 321.
`
`A POSA would have been familiar with a variety of scanning techniques.
`
`EX1002, ¶37; EX1028, 116; EX1029, 22; EX1030, ¶¶27, 43; EX1033, 2; EX1032,
`
`¶43. Both agent-based techniques—in which a security application, or agent, scans
`
`the same computer in which it has been installed—and agentless techniques were
`
`well-known and commonly used. EX1002, ¶¶38-39; EX1034, 5643; EX1033, 1;
`
`EX1032, ¶¶5-6. For example, virtual machine introspection (“VMI”) is an
`
`agentless technique that was commonly used in virtualized environments and
`
`known to have several advantages (e.g., increasing efficiency and keeping the
`
`security software isolated from the potentially compromised guest VM). EX1002,
`
`¶39; EX1033, 1; EX1034, 5643-44; EX1035, 389; EX1036, 3:56-65; EX1024, 3-3;
`
`EX1037, 10:9-10; EX1038, 133-34.
`
`Security systems typically evaluated the computer system to identify
`
`different types of vulnerabilities, such as checking the configuration files of
`
`-11-
`
`

`

`
`
`operating systems and installed applications to identify out-of-date software that
`
`needed to be patched. EX1002, ¶40; EX1039, 3:50-54, 5:28-32; EX1040, 31-36.
`
`Matching system data against public repositories of known vulnerabilities was a
`
`common way to detect security issues such as applications (or versions of
`
`applications) known to be vulnerable or files infected with malware, and various
`
`types of matching techniques were well known and routinely used. EX1002, ¶40;
`
`EX1041, 2:24-67; EX1042, 2:45-51; EX1059, ¶¶41-51, 56; EX1047, 1-5, 7;
`
`EX1043, 14:58-15:18; EX1044, 3:56-4:24, 11:27-47.
`
`Security systems also commonly identified and prioritized risks based on
`
`multiple factors, including factors based on the network accessibility of a
`
`vulnerability present on an asset. EX1002, ¶41; EX1039, 6:9-18; EX1045, 1:5-42,
`
`4:24-6:44, Figs. 2-4; EX1046, ¶¶48, 75-77. For example, it was known that
`
`vulnerabilities often existed in software applications installed on an asset and
`
`identifying such vulnerabilities was important due to the risk that the vulnerability
`
`could be exploited by an outside attacker, resulting in unauthorized access into the
`
`asset. EX1002, ¶42; EX1048, ¶¶3, 37, 44, 53, 60, 79-80; EX1039, 1:18-31, 3:50-
`
`57. Thus, well before 2021, POSAs appreciated that identifying ways in which an
`
`attacker could exploit an existing software vulnerability over a network allowed
`
`administrators to understand the most at-risk vulnerabilities and assets, which
`
`-12-
`
`

`

`
`
`would help guide remediation efforts. EX1002, ¶42; EX1048, ¶¶21, 29; EX1045,
`
`3:28-42.
`
`Information known to be useful in providing insight into the risk that an
`
`existing software vulnerability was susceptible to outside attack was the type of
`
`network accessibility needed to exploit a known vulnerability. EX1002, ¶43. For
`
`example, risk analysis systems often used the Common Vulnerability Scoring
`
`System (“CVSS”), which was “an open framework for communicating the
`
`characteristics and severity of software vulnerabilities.” EX1049, 3; see also
`
`EX1002, ¶43; EX1048, ¶55; EX1045, 4:36-50; EX1045, 3:50-54; EX1007, ¶¶116-
`
`17; EX1056, 2. Each known software vulnerability (identified by a given CVE
`
`identifier) was associated with a CVSS score that included a numerical score and a
`
`vector string used to derive the numerical score, with the vector string being
`
`comprised of a number of metrics regarding the exploitability characteristics of the
`
`associated vulnerability. EX1002, ¶43; EX1049, 3-5, Fig. 1; EX1031, 1; EX1050,
`
`7. For example, the base metrics of a CVSS score provided information as to the
`
`network conditions needed to exploit a vulnerability, such as the type of network
`
`access required to exploit the vulnerability (e.g., whether an attacker needed local
`
`access or could exploit the vulnerability remotely), the types of access conditions
`
`needed, and the privileges required to successfully exploit the vulnerability.
`
`EX1002, ¶43; EX1049, 6-7, Tables 1-3; EX1050, 7-9; EX1007, ¶117.
`
`-13-
`
`

`

`
`
`Another type of information known to be useful in accessing the risk of a
`
`successful attack was the network port settings for the asset having the
`
`vulnerability. EX1002, ¶44; EX1048, ¶37; EX1006, ¶15; EX1056, 2. For
`
`instance, it was known that software applications commonly communicated
`
`through open ports to receive data, but open ports represented a point of entry for
`
`an outside attacker to exploit vulnerable applications communicating through those
`
`ports. EX1002, ¶44; EX1051, ¶¶5-8; EX1052, ¶6; EX1057, ¶¶39, 57; EX1058,
`
`4:10-36, Fig. 4; EX1048, ¶22. Thus, it was appreciated that the status of a port
`
`(e.g., open or closed) on an asset provided information relevant to assessing
`
`whether a software vulnerability was susceptible to outside attack. EX1002, ¶44.
`
`It was also commonplace for security systems to use additional
`
`environment-specific information in determining whether a vulnerable application
`
`could be attacked, such as the location and accessibility in the network
`
`environment of the asset containing the vulnerable software. EX1002, ¶45;
`
`EX1048, ¶¶15, 22, 55-56; EX1045, 3:43-47, 5:16-6:1. For example, whether the
`
`asset has Web-connectivity or the asset’s placement relative to other resources in
`
`the network were considerations known to provide additional contextual
`
`information of the risk that a particular software vulnerability was susceptible to
`
`attack. EX1002, ¶45; EX1045, 4:41-46, 8:47-50; EX1048, ¶¶59; EX1039, 5:4-22,
`
`8:46-9:3; EX1007, ¶¶92, 140-41; EX1059, ¶¶76-81.
`
`-14-
`
`

`

`
`
`X.
`
`PRIOR ART
`A. Elder (U.S. Pub. No. 2014/0189873, EX1005)
`
`Elder was filed May 21, 2010, and published July 3, 2014. It is therefore
`
`prior art under 35 U.S.C. §§102(a)(1)-(2).
`
`Elder describes systems and methods for automated risk analysis that
`
`identifies and prioritizes vulnerabilities found in host devices located in a network
`
`environment, which can be a cloud computing environment. EX1005, Abstract,
`
`¶¶5-6, 27, Fig. 1. As summarized in Kim, Elder “discloses technology related to
`
`an automation system which collects the configuration information of a host,
`
`analyzes the collected information based on information stored in a vulnerability
`
`database (DB), and calculates vulnerability scores.” EX1006, ¶10; EX1002, ¶53.
`
`Elder’s risk analysis system first accesses host configuration information of
`
`a host, which includes “configuration details regarding hardware, operating
`
`system, patches, hotfixes, applications, and associated versions of each.” EX1005,
`
`¶¶7, 28, 33-34, 37-38, Fig. 3. Using the host configuration information, the system
`
`then queries a vulnerability d

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.

We are unable to display this document.

PTO Denying Access

Refresh this Document
Go to the Docket