PTAB
IPR2013-00100
Oracle Corp v. Clouding IP LLC
Key Events
Petition
Table of Contents
petition
1. Case Identification
- Patent #: 5,825,891
- Filed: December 21, 2012
- Petitioner(s): Oracle Corporation
- Patent Owner(s): Clouding IP, LLC
- Challenged Claims: 1-8
2. Patent Overview
- Title: Key Management for Network Communication
- Brief Description: The ’891 patent discloses methods for key management in secure network communications. The challenged claims cover two primary embodiments: one for using a temporary password provided by a firewall administrator to encrypt and transmit VPN tunnel information (claims 1-5), and a second for a firewall computer to update its database of user-specific tunnels to reflect a user's new IP address after authentication (claims 6-8).
3. Grounds for Unpatentability
Ground 1: Claims 1-5 are obvious over Aziz in view of Stallings
- Prior Art Relied Upon: Aziz (Patent 5,416,842) and Stallings (Network and Internetwork Security, 1995).
- Core Argument for this Ground:
- Prior Art Mapping: Petitioner argued that Aziz, which was before the examiner but not applied, taught a foundational method for creating a secure tunnel between firewalls. However, the claims were allowed based on the limitation of "sending tunnel records encrypted in accordance with a temporary configuration password." Petitioner asserted that Stallings, a 1995 security textbook not considered during prosecution, explicitly taught this missing element. Stallings described a key distribution technique where parties who have "previously and recently used a key" can transmit a new key encrypted by the old key. Petitioner contended this "old key" is equivalent to the claimed "temporary configuration password" used to secure the new key, which is the "tunnel record information."
- Motivation to Combine: Petitioner contended that a person of ordinary skill in the art (POSITA) would have been motivated to combine Stallings' well-known key distribution technique with Aziz's firewall tunneling system. The stated rationale was that secure key distribution is a fundamental and critical component of any cryptographic system, making its inclusion a logical and desirable step to enhance the security of the Aziz architecture.
- Expectation of Success: A POSITA would have had a reasonable expectation of success in this combination, as it involved applying a standard, established security principle (key wrapping) to a known network application (firewall tunneling) to achieve the predictable result of enhanced security.
Ground 2: Claims 6-8 are obvious over Aziz in view of Rodwin
- Prior Art Relied Upon: Aziz (Patent 5,416,842) and Rodwin (Patent 5,812,819).
- Core Argument for this Ground:
- Prior Art Mapping: This ground addressed the second embodiment of the ’891 patent, focused on updating a tunnel record for a user with a dynamic IP address. Petitioner argued that claims were allowed after being amended to include "authenticating the first computer" before "updating a tunnel record." While Aziz taught updating tunnel information, Petitioner asserted that Rodwin, which was not before the examiner, supplied the missing authentication step. Rodwin disclosed a remote access system where a user authenticates to a remote access device (e.g., via username/password), which then grants network access and can assign an IP address. The combination allegedly taught authenticating a user before updating their network address information in the system.
- Motivation to Combine: A POSITA would have been motivated to integrate Rodwin's authentication mechanism into Aziz's dynamic tunneling system to provide essential security. It would have been obvious to require authentication before allowing a remote computer to modify critical firewall tunnel records, thereby preventing unauthorized changes to the network configuration.
- Expectation of Success: The combination was presented as predictable. Integrating user authentication into a remote access system was a conventional practice at the time, and a POSITA would expect it to function successfully with the tunneling system of Aziz.
Ground 3: Claims 1-5 are obvious over Aziz in view of Kaufman
Prior Art Relied Upon: Aziz (Patent 5,416,842) and Kaufman (Network Security: Private Communication in a Public World, 1995).
Core Argument for this Ground:
- Prior Art Mapping: As an alternative to Stallings, Petitioner argued that the Kaufman textbook also rendered claims 1-5 obvious when combined with Aziz. Kaufman described a key distribution technique where a user's "master key," derived from their password, is used to encrypt a new session key transmitted from a key distribution center. Petitioner equated Kaufman's temporary "master key" with the claimed "temporary configuration password."
- Motivation to Combine: The motivation was identical to the Stallings combination: to implement a well-understood, secure key distribution technique from a standard textbook (Kaufman) into a known firewall tunneling system (Aziz) to achieve improved, predictable security. The core argument was that such security enhancements were common design choices for a POSITA.
Additional Grounds: Petitioner asserted additional obviousness challenges based on combinations of Aziz with Stallings and Aziz with Kaufman for claims 6-8, relying on similar theories that combining known authentication and key distribution techniques with a base tunneling system was obvious to a POSITA.
4. Key Claim Construction Positions
- "Temporary Configuration Password": Petitioner proposed this term should be interpreted to include any non-permanent code used during a configuration process. This broad construction was argued to be consistent with the patent’s description of a "one time pad" and necessary to encompass the prior art's disclosure of using recently used keys or master keys to encrypt new session keys.
- "Authenticating": Petitioner argued this term should be construed broadly to include any process that uniquely identifies a device or user. This interpretation was central to its argument for combining Rodwin, which taught user authentication via username, to meet the claim limitation.
- "Tunnel Record Information": Petitioner proposed this term includes records containing either encryption information (e.g., a secret key) or a network address. This construction was based on different descriptions within the patent's specification for the two distinct embodiments.
5. Relief Requested
- Petitioner requests institution of an inter partes review and cancellation of claims 1-8 of the ’891 patent as unpatentable.
Analysis metadata