Apple Inc. v. Mph Technologies Oy ( 2022 )


Menu:
  • Case: 21-1387    Document: 31    Page: 1     Filed: 01/25/2022
    NOTE: This disposition is nonprecedential.
    United States Court of Appeals
    for the Federal Circuit
    ______________________
    APPLE INC.,
    Appellant
    v.
    MPH TECHNOLOGIES OY,
    Appellee
    ______________________
    2021-1387
    ______________________
    Appeal from the United States Patent and Trademark
    Office, Patent Trial and Appeal Board in No. IPR2019-
    00821.
    ______________________
    Decided: January 25, 2022
    ______________________
    SETH W. LLOYD, Morrison & Foerster LLP, Washing-
    ton, DC, argued for appellant. Also represented by BRIAN
    ROBERT MATSUI, JOSEPH R. PALMORE, MICHAEL QIAN;
    RICHARD HUNG, San Francisco, CA; BITA RAHEBI, Los An-
    geles, CA.
    BRIAN ERIK HAAN, Lee Sheikh Megley & Haan LLC,
    Chicago, IL, argued for appellee. Also represented by
    ASHLEY E. LAVALLEY, CHRISTOPHER LEE, RICHARD BURNS
    Case: 21-1387     Document: 31      Page: 2     Filed: 01/25/2022
    2                          APPLE INC.   v. MPH TECHNOLOGIES OY
    MEGLEY, JR.; JAMES CARMICHAEL, STEPHEN TERRY
    SCHREINER, Carmichael IP, PLLC, Tysons Corner, VA.
    ______________________
    Before LOURIE, HUGHES, and CUNNINGHAM, Circuit
    Judges.
    LOURIE, Circuit Judge.
    Apple Inc. (“Apple”) appeals from the final written de-
    cision of the Patent Trial and Appeal Board (the “Board”)
    holding that Apple failed to demonstrate that claims 1–16
    of U.S. Patent 8,037,302 (the “’302 patent”) were unpatent-
    able. See Apple Inc. v. MPH Technologies Oy, No. IPR2019-
    00821, 
    2020 WL 5900607
     (P.T.A.B. Oct. 5, 2020) (“Deci-
    sion”). For the reasons provided below, we affirm.
    BACKGROUND
    MPH Technologies Oy (“MPH”) owns the ’302 patent,
    which relates to providing secure connections in telecom-
    munication networks. The specification explains that IP
    security protocols (“IPSec”) provide the capability to secure
    connections through encryption and authentication. ’302
    patent, col. 1 ll. 38–49. A security association is a relation-
    ship between a sender and receiver that offers security ser-
    vices to the traffic carried on it. 
    Id.
     at col. 1 ll. 62–67. The
    specification states that IPSec was designed for use with
    hosts that are relatively static. 
    Id.
     at col. 2 ll. 19–49. IP
    routing for telecommunication is based on fixed IP ad-
    dresses, so IPSec may not work well with mobile devices.
    
    Id.
     If a mobile host moves from one network to another, a
    time-consuming IPSec connection set up is required. 
    Id.
    The patent discloses avoiding the need to set up an IPSec
    connection when a mobile terminal changes networks by
    relying on a security association that is already estab-
    lished. See, 
    id.,
     at col. 10 ll. 39–43; col. 10 ll. 51–56.
    Claim 1, the sole independent claim, reads as follows:
    Case: 21-1387      Document: 31    Page: 3    Filed: 01/25/2022
    APPLE INC.   v. MPH TECHNOLOGIES OY                        3
    1. A method for ensuring secure forwarding of a
    message in a telecommunication network, compris-
    ing:
    providing a first terminal from which the message
    is sent and a second terminal to which the message
    is sent,
    a) establishing a first secure connection as
    being an active connection and extending
    between a first network address of the first
    terminal and an original network address
    of the second terminal, establishing a sec-
    ond secure connection extending between a
    second network address of the first termi-
    nal and the original network address of the
    second terminal,
    b) the first terminal changing from the first
    network address to the second network ad-
    dress,
    the first terminal checking whether the
    second secure connection already exists,
    and
    c) when the second secure connection al-
    ready exists, the second terminal register-
    ing the already established second secure
    connection as being the active connection
    without having to reestablish the second
    secure connection.
    ’302 patent, col. 12 ll. 15–34 (emphasis added).
    Apple filed a petition for inter partes review of
    claims 1–16 of the ’302 patent.        Apple argued that
    claims 1–13 and 16 would have been obvious over Int’l Pa-
    tent Pub. WO 01/54379 A1 (“Ahonen”) in view of U.S. Pa-
    tent 6,904,466 (“Ishiyama”). J.A. 38, 44. Apple also argued
    that claims 14 and 15 would have been obvious over
    Case: 21-1387     Document: 31      Page: 4    Filed: 01/25/2022
    4                         APPLE INC.   v. MPH TECHNOLOGIES OY
    Ahonen and Ishiyama in view of a conference proceeding
    publication titled “Complete Computing” (“Gupta”). 1 Id. at
    45.
    The parties initially identified the term “establishing a
    . . . secure connection” for construction. Decision, 
    2020 WL 5900607
    , at *4 (the “establishing limitation”). MPH sug-
    gested that the establishing limitation should be construed
    to require forming or creating a new secure connection, and
    Apple agreed. Id.; J.A. 320. Specifically, Apple stated that
    the parties agreed on the claim construction for the estab-
    lishing limitation but disputed its application to the prior
    art references. J.A. 319–20.
    Although Apple agreed to MPH’s proposal, MPH noted
    the possibility that construction of the establishing limita-
    tion was still in dispute. Specifically, MPH argued that es-
    tablishing a security association does not include
    modifying or activating a security association. J.A. 352–
    61. During the hearing on July 17, 2020, the Board asked
    Apple to explain its position regarding construction of the
    establishing limitation. Apple’s counsel reaffirmed its be-
    lief that the plain and ordinary meaning, “forming or cre-
    ating a new secure connection,” should apply. J.A. 416–17.
    The Board thus construed “establishing a . . . secure con-
    nection” as meaning “forming or creating a new secure con-
    nection.” Decision, 
    2020 WL 5900607
    , at *4.
    The Board’s determination regarding obviousness
    hinged on whether Ahonen taught the establishing limita-
    tion. Id. at *6, *9. During its analysis, the Board stated
    that the establishing limitation has two requirements:
    “that the secure connection is established (i) as ‘extending
    between a first network address of the first terminal and
    1   Vipul Gupta, et al., Complete Computing,
    WWCA ’98 Proc. 2D Int’l Conf. on Worldwide Computing
    and Its Applications (Mar. 4–5, 1998).
    Case: 21-1387      Document: 31      Page: 5     Filed: 01/25/2022
    APPLE INC.   v. MPH TECHNOLOGIES OY                             5
    an original network address of the second terminal’ and
    (ii) ‘as being an active connection.’” Id. at *6. “[T]he first
    requirement is met by ‘forming or creating a new secure
    connection’ between the claimed addresses.” Id. For the
    second requirement, the Board analyzed the ’302 patent
    and determined that “the claim language requires that
    when the first secure connection is established, it is regis-
    tered as being an active connection.” Id. The Board con-
    cluded that “a secure connection [is] established as an
    active connection (i.e., being available for immediate use
    when the secure connection is formed) [but] does not re-
    quire immediate use.” Id. at *7.
    The Board agreed with MPH that Ahonen fails to teach
    the establishing limitation. The Board determined that
    “Ahonen fails to teach that the first secure connection is
    registered as being an active connection when the first se-
    cure connection is formed.” Id. at *8. The Board explained
    that Ahonen teaches creating a security association during
    a preparations stage and that a remote mobile user may
    remotely activate the preexisting connection during a re-
    mote control stage. Id. Thus, when the Ahonen secure con-
    nection is formed, it is not active.
    In making this determination, the Board relied in part
    on Ahonen’s teachings about remote control flag operation.
    Ahonen explains that information about each of the secu-
    rity associations can include a remote control flag indicat-
    ing whether the security association has been activated by
    a mobile host from outside the intranet. Id. at *9 (citing
    ’302 patent, col. 15 ll. 15–16; col. 15 l. 31–col. 16 l. 2). A re-
    mote control flag is initially set to “Off” during the prepa-
    rations stage and is changed to “On” when remotely
    activated by a mobile user. Id. An “Off” flag means that
    the security association has not been activated by the re-
    mote control function. Id. The flag is set to “On” after the
    firewall receives a valid control authorization certificate
    from the mobile host. Id. (citing ’302 patent, col. 17 ll. 1–
    32).
    Case: 21-1387     Document: 31     Page: 6     Filed: 01/25/2022
    6                         APPLE INC.   v. MPH TECHNOLOGIES OY
    The Board credited MPH’s expert’s opinion, which
    stated that a person of skill in the art would understand
    the establishing limitation “to mean that the first secure
    connection is established as an active connection for imme-
    diate use, as opposed to an inactive connection reserved for
    later use.” Id. at *6. MPH’s expert stated that “the term
    not only requires creating or forming a new secure connec-
    tion, but also creating or forming a new secure connection
    as being an active connection.” Id. The Board found MPH’s
    expert’s opinion “consistent with the plain and ordinary
    meaning of the limitation’s claim language and the ’302 pa-
    tent’s [s]pecification.” Id. at *7. In contrast, the Board
    gave Apple’s expert’s opinion little weight, finding that tes-
    timony “contrary to the plain claim language and the
    [s]pecification’s teachings,” “contrary to Ahonen’s teach-
    ings,” and “without sufficient factual corroboration.” Id.
    at *8, *9.
    The Board concluded that Apple failed to show by a pre-
    ponderance of the evidence that claims 1–16 of the ’302 pa-
    tent are unpatentable. Id. at *9. Apple appealed. We have
    jurisdiction under 
    28 U.S.C. § 1295
    (a)(4)(A).
    DISCUSSION
    We review the Board’s legal determinations de novo, In
    re Elsner, 
    381 F.3d 1125
    , 1127 (Fed. Cir. 2004), but we re-
    view the Board’s factual findings underlying those deter-
    minations for substantial evidence, In re Gartside, 
    203 F.3d 1305
    , 1316 (Fed. Cir. 2000). A finding is supported by sub-
    stantial evidence if a reasonable mind might accept the ev-
    idence as adequate to support the finding. Consol. Edison
    Co. v. NLRB, 
    305 U.S. 197
    , 229 (1938).
    Apple raises two challenges on appeal. First, Apple
    contends that the Board erred in construing the establish-
    ing limitation. Second, Apple argues that the Board’s de-
    termination that Ahonen fails to disclose the establishing
    limitation is unsupported by substantial evidence.
    Case: 21-1387      Document: 31    Page: 7   Filed: 01/25/2022
    APPLE INC.   v. MPH TECHNOLOGIES OY                       7
    I
    We first consider Apple’s claim construction challenge.
    Claim construction is a matter of law that we review de
    novo. See Poly-America, L.P. v. API Indus., Inc., 
    839 F.3d 1131
    , 1135–36 (Fed. Cir. 2016).
    Apple argues that the Board erred in construing the es-
    tablishing limitation. Apple contends that the Board im-
    properly narrowed the establishing limitation by including
    a timing restriction and by excluding embodiments where
    a new connection is created by modifying an existing con-
    nection. Apple argues that the claims do not restrict when
    or how a secure connection becomes active. Apple contends
    that activating a secure connection can take place sepa-
    rately in time from when a connection is first formed and
    that an existing connection can be modified to establish a
    connection as active.
    MPH responds that Apple failed to raise its claim con-
    struction arguments before the Board. MPH contends that
    Apple informed the Board that the only dispute before it
    was the application of the agreed-upon construction to the
    prior art. MPH thus argues that Apple’s failure to raise its
    claim construction arguments before the Board compels a
    finding of forfeiture. See In re Google Tech. Holdings LLC,
    
    980 F.3d 858
    , 862–63 (Fed. Cir. 2020) (interpreting the
    U.S.P.T.O.’s waiver argument as a forfeiture argument).
    Additionally, MPH argues that the Board did not impose
    unnecessary restrictions into the establishing limitation.
    MPH contends that the Board properly adopted the parties’
    agreed-upon construction of the establishing limitation,
    analyzed and applied the plain and ordinary meaning of
    the limitation, and found that Ahonen’s remote activation
    of a preexisting and inactive security association does not
    meet the establishing limitation of claim 1.
    We agree with MPH that, contrary to Apple’s position
    on appeal, Apple only disputed the application of the
    agreed construction to the prior art. In its reply brief to
    Case: 21-1387    Document: 31      Page: 8    Filed: 01/25/2022
    8                        APPLE INC.   v. MPH TECHNOLOGIES OY
    MPH’s response, Apple stated that construction of the es-
    tablishing limitation was not at issue–only the factual ap-
    plication of the construction to Ahonen’s teachings. In
    response to questioning at the hearing concerning whether
    claim construction was in dispute, Apple maintained that
    the parties agreed on the construction of the establishing
    limitation and argued only about the application of the con-
    struction to Ahonen. Furthermore, Apple does not argue
    that the Board engaged in sua sponte construction or that
    there are exceptional circumstances that justify departing
    from the forfeiture principle.
    It is clear from the record that Apple chose not to char-
    acterize its dispute concerning the establishing limitation
    as a claim construction issue before the Board. Apple at-
    tempts here, in contrast, to recharacterize that same dis-
    pute as a construction issue deserving of de novo review.
    MPH’s expert’s declaration put Apple on notice that MPH
    was taking the position that a person of skill would under-
    stand the establishing limitation “to mean that the first se-
    cure connection is established as an active connection for
    immediate use, as opposed to an inactive connection re-
    served for later use.” See Decision, 
    2020 WL 5900607
    ,
    at *6–7; J.A. 2028. With the knowledge of MPH’s position,
    Apple continued to maintain that there was no further dis-
    pute concerning construction of the establishing limitation.
    After the Board agreed with MPH and MPH’s expert, how-
    ever, Apple changed its strategy and characterized the is-
    sue as a claim construction dispute. We do not encourage
    “suggesting or permitting, for strategic reasons, that [the
    Board] pursue a certain course, and later—if the outcome
    is unfavorable—claiming that the course followed was re-
    versible error.” Google, 980 F.3d at 864 (internal quotation
    marks omitted).
    We conclude that Apple forfeited its arguments as to
    the construction of the establishing limitation because Ap-
    ple failed to raise these legal arguments before the Board.
    In the absence of exceptional circumstances, we decline to
    Case: 21-1387      Document: 31     Page: 9    Filed: 01/25/2022
    APPLE INC.   v. MPH TECHNOLOGIES OY                          9
    address the merits of Apple’s proposed constructions. See
    id. at 862–63.
    II
    We next consider Apple’s assertion that the Board’s de-
    termination was unsupported by substantial evidence. Ap-
    ple first argues that, under its proposed construction of the
    establishing limitation, the Board’s finding that Ahonen
    fails to disclose the establishing limitation is unsupported
    by substantial evidence. But since we do not consider Ap-
    ple’s new claim construction arguments on appeal, we need
    not consider the merits of arguments that depend on the
    adoption of those constructions.
    Apple also contends that the Board erred by using a
    truncated obviousness analysis. Apple argues that the
    Board merely identified a timing difference between Aho-
    nen and the claims and ended its analysis without consid-
    ering whether that difference was a predictable variation.
    Apple argues that the claims were a trivial variation of the
    prior art, the result of a routine design choice, and a choice
    between two well-known options. Apple states that “a pa-
    tent can be obvious in light of a single prior art reference if
    it would have been obvious to modify that reference to ar-
    rive at the patented invention.” Appellant’s Br. at 38 (cit-
    ing Monsanto Tech. LLC v. E.I. DuPont de Nemours & Co.,
    
    878 F.3d 1336
    , 1346 (Fed. Cir. 2018)). MPH counters that
    Apple failed to raise these obviousness theories before the
    Board.
    We agree with MPH. First, Apple’s underdeveloped ar-
    gument that the Board erred by conducting a truncated
    analysis is not persuasive. Apple fails to identify any par-
    ticular error made by the Board in considering the differ-
    ences between the claims and the prior art. The Board
    determined that the claim language “tethers the timing of
    registering the connection as an active connection to when
    the secure connection is formed,” Decision, 
    2020 WL 5900607
    , at *7, and that “Ahonen fails to teach that the
    Case: 21-1387    Document: 31     Page: 10     Filed: 01/25/2022
    10                       APPLE INC.   v. MPH TECHNOLOGIES OY
    first secure connection is registered as being an active con-
    nection when the first secure connection is formed,” id. at
    *8. Although Apple argues that the Board did not suffi-
    ciently consider differences between the claims and the
    prior art, Apple’s generalized accusations are not enough
    to identify reversible error. Apple’s disagreement with the
    Board’s interpretation of Ahonen does not amount to a
    demonstration that the Board failed to conduct a proper
    obviousness analysis.
    Second, Apple argues for the first time that it would
    have been trivial to modify Ahonen to incorporate the
    claimed activation timing. Before the Board, Apple argued
    that Ahonen “explicitly teaches” the establishing limita-
    tion. See id. In its petition, Apple stated that “[t]he ’302
    patent presents a trivial solution to [a] problem that was
    already well-known,” but argued that “Ahonen . . . explic-
    itly disclosed this approach.” J.A. 42–43 (emphasis
    added). Apple did not present a single reference obvious-
    ness ground to the Board; thus, Apple’s arguments are un-
    timely. Again, we decline to consider obviousness theories
    that are raised for the first time on appeal.
    CONCLUSION
    We have considered Apple’s remaining arguments, but
    we find them unpersuasive. Accordingly, we affirm the
    Board’s final written decision upholding the patentability
    of the claims of the challenged patent.
    AFFIRMED