PTAB
IPR2026-00088
Amazon Web Services Inc v. Headwater Research LLC
Key Events
Petition
1. Case Identification
- Case #: IPR2026-00088
- Patent #: 9,615,192
- Filed: November 10, 2025
- Petitioner(s): Amazon.com Services LLC and Amazon Web Services, Inc.
- Patent Owner(s): Headwater Research LLC
- Challenged Claims: 1-15
2. Patent Overview
- Title: Message Link Server for Wireless End-User Devices
- Brief Description: The ’192 patent describes a "message link server" that establishes and maintains a secure message link with a "device link agent" on wireless devices. The server uses a buffer system to store messages received from network elements and delivers them to the devices upon the occurrence of specific message delivery triggers.
3. Grounds for Unpatentability
Ground 1: Claims 1, 5-7, 9, and 11-15 are obvious over TS-23.140
- Prior Art Relied Upon: 3GPP TS 23.140 v6.9.0 (“TS-23.140”), a technical specification for Multimedia Messaging Service (MMS).
- Core Argument for this Ground:
- Prior Art Mapping: Petitioner argued that TS-23.140, which standardizes MMS, discloses every limitation of the challenged independent claims. The MMS Relay/Server in TS-23.140 was asserted to be the claimed "message link server." Petitioner mapped the transport stack using TLS for secure communication to the "secure message link" and the end-user device's "User Agent" to the "device link agent." The specification's description of storing messages in a "Persistent Network-Based Storage" or "MMBox" until delivery conditions are met was argued to teach the claimed "message buffer system."
- Motivation to Combine (for §103 grounds): This ground relies on a single reference, arguing it inherently discloses or suggests all elements. Petitioner contended a POSITA would have understood that the various components and functions described in the comprehensive TS-23.140 specification would work together as claimed. For example, the Relay/Server's logic for delivering messages based on conditions like manual retrieval requests, timer expirations, or device availability was argued to directly teach the claimed "message delivery triggers."
- Expectation of Success (for §103 grounds): Petitioner asserted success was expected because TS-23.140 is a functional standard designed to ensure interoperability of these very features.
Ground 2: Claims 1, 5-7, and 9-15 are obvious over Houghton in view of Munson
- Prior Art Relied Upon: Houghton (WO 2006/077283) and Munson (Application # 2009/0240807).
- Core Argument for this Ground:
- Prior Art Mapping: Petitioner asserted that Houghton discloses a push messaging system with a push server (the "message link server") that sends messages to a push client (the "device link agent") on a mobile terminal over a secure connection (the "secure message link") using protocols like HTTPS or IP-Sec. However, Petitioner argued that Houghton only contemplates push messaging, without explicitly teaching the robust store-and-forward buffering recited in the claims. Munson was introduced to supply this feature, as it discloses a method for pushing content that involves buffering received messages before sending them to multiple devices.
- Motivation to Combine (for §103 grounds): A POSITA would combine Houghton and Munson to improve the reliability and flexibility of Houghton’s push system. Incorporating Munson’s store-and-forward (buffering) functionality would ensure messages are not lost if a device is unreachable at the time of transmission and would provide users with greater control over delivery timing, a known technique to improve push messaging systems.
- Expectation of Success (for §103 grounds): Success was expected because Munson provides implementation details for store-and-forward systems, and the required modifications to Houghton’s server—adding memory and logic for storing and forwarding messages—were considered routine.
Ground 3: Claims 2-3 and 12 are obvious over TS-23.140 and Houghton-Munson, respectively, in view of Shen
- Prior Art Relied Upon: TS-23.140, Houghton, Munson, and Shen (Application # 2005/0207379).
- Core Argument for this Ground:
- Prior Art Mapping: This ground targets claims requiring message encryption. Petitioner argued that while the primary combinations (TS-23.140 or Houghton-Munson) teach encrypting the communication link (e.g., via TLS), they do not explicitly teach encrypting the messages themselves, which are stored on the server. Shen addresses this exact security vulnerability in store-and-forward systems like MMS, teaching an authentication and key management module to encrypt the message content itself to protect privacy. Claim 12’s “heartbeat message” trigger was also mapped to Shen, which discloses sending periodic heartbeat signals to determine device reachability.
- Motivation to Combine (for §103 grounds): A POSITA would be motivated to add Shen’s teachings to the base systems of TS-23.140 or Houghton-Munson to improve security. Protecting stored message content from unauthorized access on the server is a logical and necessary security enhancement. Similarly, using Shen's well-known heartbeat mechanism to trigger message delivery when a device becomes available is a more efficient way to implement a delivery trigger than simply waiting for a user action.
- Expectation of Success (for §103 grounds): Petitioner argued success was predictable because Shen was designed to work with MMS-like architectures. The combination involved applying a known technique (content encryption, heartbeat signals) to improve a known system (MMS/push messaging) to achieve a predictable result (enhanced security and reliable delivery).
- Additional Grounds: Petitioner asserted numerous other obviousness challenges. These grounds followed a similar pattern, combining either TS-23.140 or Houghton-Munson with secondary references to add specific functionality recited in dependent claims, such as Ellison for providing a secure execution environment (claim 4), Rakic for adding secure authorization signatures (claim 8), Adamczyk for user-scheduled periodic delivery (claim 9), and Gellens for triggering delivery based on network data usage (claim 14).
4. Arguments Regarding Discretionary Denial
- Petitioner argued discretionary denial would be improper. It noted a prior IPR filed by a different party (Samsung) on the ’192 patent was terminated by the parties after institution but before a Final Written Decision (FWD). Therefore, the Board has not previously issued a final merits decision on the patentability of the challenged claims. Petitioner also noted that a co-pending district court case was dismissed with prejudice before any ruling on invalidity, suggesting that Fintiv factors would weigh against denial.
5. Relief Requested
- Petitioner requests institution of an inter partes review and cancellation of claims 1-15 of the ’192 patent as unpatentable.