PTAB
IPR2020-00586
Juniper Networks Inc v. Implicit LLC
Key Events
Petition
Table of Contents
petition
1. Case Identification
- Patent #: 9,270,790
- Filed: February 13, 2020
- Petitioner(s): Juniper Networks, Inc.
- Patent Owner(s): Implicit, LLC.
- Challenged Claims: 1, 3-5, 7-10, and 12-19
2. Patent Overview
- Title: Method and System for Data Demultiplexing
- Brief Description: The ’790 patent relates to a system for data demultiplexing in packet-based networks. The disclosed invention purports to "dynamically" identify a processing path for incoming packets by using a key within a packet to select a specific sequence of processing routines for a given message.
3. Grounds for Unpatentability
Ground 1: Claims 1, 3-5, 7-10, and 12-19 are obvious over Smith in view of Decasper.
- Prior Art Relied Upon: Smith (a 1997 article from Digital Technical Journal describing the AltaVista Firewall) and Decasper (a 1998 article from ACM SIGCOMM Computer Communication Review describing a software architecture for routers).
- Core Argument for this Ground:
- Prior Art Mapping: Petitioner argued that Smith taught an application gateway firewall (AGF) that acts as an endpoint for TCP connections, processing packets through multiple protocol layers. Decasper taught a modular and extensible "plugin" architecture for dynamically building a processing path for packet "flows" based on a "tuple" of header fields (including IP address and port numbers). Petitioner asserted that the combination would apply Decasper's flexible plugin framework to Smith's firewall. In this combined system, a TCP connection would be a "message," and its "flow" would be identified using the header tuple as the "key" to dynamically select a "path," or sequence of plugins (routines). Crucially, Petitioner argued that Smith's firewall, by acting as a TCP endpoint to process application-layer data, inherently must "execute TCP" and "convert" the packet format by stripping the TCP header to access the payload. This, Petitioner contended, met the key limitation of independent claim 1, which was added during prosecution to distinguish the invention from Decasper alone.
- Motivation to Combine: A Person of Ordinary Skill in the Art (POSITA) would combine the references because Decasper explicitly stated its framework was "very well suited to Application Layer Gateways (ALGs), and to security devices like Firewalls," which precisely describes the Smith reference. Further motivation arose from the recognized need for extensibility; Decasper's plugin architecture provided a known and superior solution for updating protocols and adding new features (such as IPv6 and VPNs, which Smith listed as future enhancements) compared to the monolithic systems of the time.
- Expectation of Success: Petitioner asserted a POSITA would have a high expectation of success, as the combination involved the straightforward application of Decasper's well-defined architectural framework to organize Smith's existing protocol-processing functions into modular plugins.
Ground 2: Claims 1, 3-5, 7-10, and 12-19 are obvious over CheckPoint in view of Decasper.
- Prior Art Relied Upon: CheckPoint (1998 website materials describing the FireWall-1 product) and Decasper (the same 1998 article).
- Core Argument for this Ground:
- Prior Art Mapping: Petitioner argued that CheckPoint taught an "industry-leading" firewall, FireWall-1, that used "stateful inspection" and application-layer "Security Servers" to perform services like anti-virus scanning. To perform this scanning, FireWall-1 must first reassemble files transmitted over TCP. Petitioner contended this reassembly process necessarily requires executing the TCP protocol and stripping the TCP headers from the constituent packets to access the underlying file content, thereby converting the packets to a different format. This provided an alternative basis for the same key TCP limitation as in Ground 1. Applying Decasper's framework to CheckPoint's firewall would allow for the dynamic management of a sequence of processing routines, including packet inspection, TCP handling, and application-layer services like anti-virus checking, based on the packet flow.
- Motivation to Combine: The motivation was analogous to Ground 1. Decasper expressly recommended its framework for firewalls like CheckPoint. A POSITA would have been motivated to use Decasper's efficient, flow-based architecture to manage the various security services offered by CheckPoint and to provide a more convenient and less costly method for handling periodic protocol updates, including for CheckPoint's own Content Vectoring Protocol (CVP).
- Expectation of Success: Petitioner claimed a POSITA would have a reasonable expectation of success in combining the references, as it involved implementing the known benefits of Decasper's flexible architecture in a well-understood firewall system.
4. Key Claim Construction Positions
- Petitioner argued for constructions of several key terms that were central to mapping the prior art, particularly regarding limitations added during prosecution to overcome Decasper.
- "execute ... a Transmission Control Protocol (TCP)": Proposed construction was "operate/operable on one or more packets whose outermost header is a TCP header." This was important to show that firewalls acting as protocol endpoints (like Smith and CheckPoint) inherently perform this step.
- "convert one or more packets ... into a different format": Proposed construction was to "convert the outermost header structure of the packet(s) from TCP to another type of header structure." This construction supported the argument that stripping a TCP header during protocol processing constitutes the claimed "conversion."
- "key [value]": Proposed construction was "information that can be used to identify the session of the protocol." This allowed Petitioner to equate the "tuple" of header fields used in Decasper to identify a flow with the claimed "key."
5. Arguments Regarding Discretionary Denial
- Petitioner argued that discretionary denial under 35 U.S.C. §325(d) would be inappropriate. Petitioner acknowledged that Decasper was presented to the examiner during prosecution of a parent patent. However, it argued that the Patent Owner mischaracterized Decasper as being limited to the IP layer and incapable of TCP processing. The petition asserted that the new combinations with Smith and CheckPoint were never considered by the Office and that these references remedy the alleged deficiency by explicitly teaching the TCP processing that the Patent Owner argued was missing from Decasper. Therefore, the presented grounds were substantially different from what the examiner previously considered.
6. Relief Requested
- Petitioner requests institution of an inter partes review and cancellation of claims 1, 3-5, 7-10, and 12-19 of Patent 9,270,790 as unpatentable.
Analysis metadata