Finjan, Inc. v. Cisco Systems, Inc. ( 2020 )


Menu:
  • Case: 19-2074    Document: 56    Page: 1   Filed: 12/30/2020
    NOTE: This disposition is nonprecedential.
    United States Court of Appeals
    for the Federal Circuit
    ______________________
    FINJAN, INC.,
    Appellant
    v.
    CISCO SYSTEMS, INC.,
    Cross-Appellant
    ______________________
    2019-2074, 2019-2146
    ______________________
    Appeals from the United States Patent and Trademark
    Office, Patent Trial and Appeal Board in No. IPR2018-
    00391.
    ______________________
    Decided: December 30, 2020
    ______________________
    JAMES R. HANNAH, Kramer Levin Naftalis & Frankel
    LLP, Menlo Park, CA, for appellant. Also represented by
    PAUL J. ANDRE; JEFFREY PRICE, New York, NY.
    PATRICK D. MCPHERSON, Duane Morris LLP, Washing-
    ton, DC, for cross-appellant. Also represented by PATRICK
    C. MULDOON; MATTHEW CHRISTOPHER GAUDET, Atlanta,
    GA; JOSEPH POWERS, Philadelphia, PA.
    ______________________
    Case: 19-2074    Document: 56      Page: 2      Filed: 12/30/2020
    2                          FINJAN, INC.   v. CISCO SYSTEMS, INC.
    Before LOURIE, REYNA, and WALLACH, Circuit Judges.
    WALLACH, Circuit Judge.
    Cisco Systems, Inc. (“Cisco”) sought inter partes review
    (“IPR”) of claims 1–4, 8, and 11–14 (“the Challenged
    Claims”) of Finjan, Inc.’s (“Finjan”) 
    U.S. Patent No. 7,647,633
     (“the ’633 patent”). The U.S. Patent and
    Trademark Office’s Patent Trial and Appeal Board
    (“PTAB”) issued a final written decision concluding that
    Cisco “ha[d] shown by a preponderance of the evidence that
    claims 1–4, 8, and 11–13 of the ’633 patent are unpatenta-
    ble” as obvious, but “ha[d] not shown by a preponderance
    of the evidence that [independent] claim 14 of the ’633 pa-
    tent is unpatentable” as obvious. Cisco Sys., Inc. v. Finjan,
    Inc., No. IPR2018-00391, 
    2019 WL 2237141
    , at *1 (P.T.A.B.
    May 23, 2019).
    Finjan appeals and Cisco cross-appeals. We have ju-
    risdiction pursuant to 
    28 U.S.C. § 1295
    (a)(4)(A). We affirm.
    BACKGROUND
    I. The ’633 Patent
    Entitled “Malicious Mobile Code Runtime Monitoring
    System and Methods,” the ’633 patent “relates generally to
    computer networks, and more particularly” to “a system
    and methods for protecting network-connectable devices
    from undesirable downloadable operation.” ’633 patent
    col. 1 ll. 30–33. The ’633 patent “provides protection sys-
    tems and methods capable of protecting . . . network acces-
    sible devices or processes,” such as personal computers,
    “from harmful, undesirable, suspicious or other ‘malicious’
    operations that might otherwise be effectuated by remotely
    operable code,” such as computer viruses. 
    Id.
     col. 2 ll. 20–
    25; see 
    id.
     col. 1 ll. 40–44 (noting that “the Internet and
    other public networks have . . . become a major source of
    potentially system-fatal or otherwise damaging computer
    code commonly referred to as ‘viruses’”). The ’633 patent
    discloses “embodiments” that first “determin[e], within one
    Case: 19-2074       Document: 56         Page: 3   Filed: 12/30/2020
    FINJAN, INC.   v. CISCO SYSTEMS, INC.                          3
    or more network ‘servers’ . . . whether received information
    includes executable code”—referred to as a “Down-
    loadable”—then, based on that determination, “deliver[]
    static, configurable, and/or extensible remotely operable
    protection [code or] policies” to the location of the Down-
    loadable, and “caus[e] the mobile protection code to be exe-
    cuted within a Downloadable-destination in a manner that
    enables various Downloadable operations to be detected,
    intercepted or further responded to via protection opera-
    tions.” 
    Id.
     col. 2 ll. 39–55; see 
    id.
     col. 1 ll. 60–66 (providing
    that “[d]ownloadable information” may include “distribut-
    able components (e.g.[,] Java™ applets and JavaScript
    scripts, ActiveX™ controls, Visual Basic, add-ins and/or
    others)” and “application programs, Trojan horses, multi-
    ple compressed programs such as zip or meta files, among
    others”), col. 2 ll. 28–33 (similar).
    Independent claims 1 and 14, and claims 2 and 3 of the
    ’633 patent, are illustrative. Independent claim 1 recites:
    A computer processor-based method, comprising:
    receiving, by a computer, downloadable-in-
    formation;
    determining, by the computer, whether the
    downloadable-information includes execut-
    able code; and
    based upon the determination, transmit-
    ting from the computer mobile protection
    code to at least one information-destination
    of the downloadable-information, if the
    downloadable-information is determined to
    include executable code.
    
    Id.
     col. 20 ll. 54–62. Claim 2 depends from independent
    claim 1, and provides that “receiving includes monitoring
    received information of an information re-communicator.”
    
    Id.
     col. 20 ll. 63–65. Claim 3, which depends from claim 2,
    Case: 19-2074       Document: 56      Page: 4      Filed: 12/30/2020
    4                             FINJAN, INC.   v. CISCO SYSTEMS, INC.
    provides that claim 2’s “information re-communicator is a
    network server.” 
    Id.
     col. 20 ll. 66–67.
    Independent claim 14 recites:
    A computer program product, comprising a com-
    puter usable medium having a computer readable
    program code therein, the computer readable pro-
    gram code adapted to be executed for computer se-
    curity, the method comprising:
    providing a system, wherein the system
    comprises distinct software modules, and
    wherein the distinct software modules com-
    prise an information re-communicator and
    a mobile code executor;
    receiving, at the information re-communi-
    cator, downloadable-information including
    executable code; and
    causing mobile protection code to be exe-
    cuted by the mobile code executor at a
    downloadable-information       destination
    such that one or more operations of the ex-
    ecutable code at the destination, if at-
    tempted, will be processed by the mobile
    protection code.
    
    Id.
     col. 21 l. 58–col. 22 l. 5.
    II. The Prior Art
    A. Hanson
    Entitled “Reverse Proxy Server,” WIPO Pub. No.
    WO 98/31124 (“Hanson”) is an international application
    published under the Patent Cooperation Treaty, and “re-
    lates to client/server computer communications over an in-
    ternetwork system and, more particularly, to improved
    access of firewall protected servers.” J.A. 833; see J.A. 831–
    Case: 19-2074       Document: 56         Page: 5   Filed: 12/30/2020
    FINJAN, INC.   v. CISCO SYSTEMS, INC.                          5
    52 (Hanson). 1 Hanson discloses “a method and system for
    securely accessing servers” over a network by providing
    “secure bi-directional data packet communication between”
    an external “client . . . and [internal] servers,” with the
    servers “protected by a firewall . . . and bastion server.”
    J.A. 835–36. The bastion server “includes a processor and
    memory like typical servers, but also includes an internal
    [IP] address file . . . and a rules file . . . stored in memory.”
    J.A. 836. 2
    Hanson teaches that its bastion server uses its address
    and rule files to limit “external access to [the internal serv-
    ers] through the firewall,” J.A. 837, specifically, by check-
    ing both outgoing and incoming “data packet[s]” against its
    internal address file and rules file, J.A. 838. Data packets
    are routed through the bastion server. J.A. 838. Incoming
    data packets are addressed to an internal server name.
    J.A. 838. The bastion server receives the data packet and,
    first, “determines whether a match exists between the
    server name and an internal address located in the inter-
    nal address file.” J.A. 838. “If no match is found, the bas-
    tion” server notifies the client that the “packet cannot be
    delivered.” J.A. 838. If the address is found, the bastion
    server then “check[s]” “the received packet . . . against [the]
    rules contained within the rules file.” J.A. 838. If the data
    packet “fails to pass” any of the rules, the bastion server
    notifies the client and does not deliver the packet. J.A. 838.
    “[I]f the received packet passes all the rules contained
    within the rules file, a connection is made between the cli-
    ent and the [addressed internal] server” and the packet is
    delivered. J.A. 838. “The rule checks include certain
    1   Hanson defines “internetwork” as “the joining of
    multiple computer networks, both similar and dissimilar,
    by means of gateways or routers that facilitate data trans-
    fer and conversion from various networks.” J.A. 833.
    2   A “bastion server” is “a special-purpose computer
    on a network . . . specifically designed and configured to
    protect against unauthorized access.” J.A. 775.
    Case: 19-2074    Document: 56     Page: 6      Filed: 12/30/2020
    6                         FINJAN, INC.   v. CISCO SYSTEMS, INC.
    security [check] programs that operate upon received data
    packets and, particularly, data packets that are or include
    programs.” J.A. 838; see J.A. 842–43 (providing that these
    programs may be “J[ava™] applets” or “ActiveX[™] pro-
    grams which are intended to be run on the destination cli-
    ent or server”). Hanson explains that the “security check
    program” does this by “tagging” or “attaching itself to the
    [executable code] being sent in the data packet,” such that,
    when the executable code is “run at the destination client
    or server,” the security check program “runs simultane-
    ously” and “performs [the necessary] security operations.”
    J.A. 842, 845. Outgoing packets undergo a similar check
    through the bastion server. J.A. 840.
    B. Hyppönen
    Entitled “Computer Virus Screening,” 
    U.S. Patent No. 6,577,920
     (“Hyppönen”) “relates to the screening of
    computer data for viruses and more particularly to the
    screening of computer data for macro viruses.” J.A. 857;
    see J.A. 854–61 (Hyppönen). Hyppönen defines “macros”
    as “small executable programs written in a simple high
    level language” that provide, for example, “customized
    menu bars” or “document templates” in word processing
    programs. J.A. 857.
    Hyppönen discloses a “method of screening a software
    file for viral infection” using three databases—one “of
    known macro virus signatures, a second . . . of known and
    certified commercial macro signatures, and a third . . . of
    known and certified local macro signatures.” J.A. 854.
    Hyppönen teaches that a software file may be “scanned to
    determine whether or not [it] contains a macro.” J.A. 854.
    “If [it does] contain[] a macro,” then the method determines
    “a signature for the macro” such that it may be “screened
    against the signatures contained in [the three] databases”
    of known signatures. J.A. 854. If the macro is a known
    virus, the file system event is suspended and the user
    alerted. J.A. 859. If the macro is a known legitimate
    Case: 19-2074       Document: 56         Page: 7   Filed: 12/30/2020
    FINJAN, INC.   v. CISCO SYSTEMS, INC.                          7
    program, it is allowed to proceed. J.A. 859. If the macro is
    unknown and unverifiable, the file system event is sus-
    pended and “a report is sent to the network manager” with
    “a copy of the [unknown] macro.” J.A. 859. The databases
    may be updated as more macros are encountered or become
    available. J.A. 857. Hyppönen suggests that its system
    may be modified “to screen files for viruses other than
    macro viruses.” J.A. 859.
    DISCUSSION
    Finjan argues that the PTAB made a series of claim
    construction errors, and that, under the proper construc-
    tion, claims 1–4, 8, and 11–13 of the ’633 patent are not
    obvious over Hanson and Hyppönen. Appellant’s Br. 20–
    36. On cross-appeal, Cisco argues that the PTAB’s conclu-
    sion that independent claim 14 of the ’633 patent is not ob-
    vious over Hanson and Hyppönen is unsupported by
    substantial evidence. Cross-appellant’s Br. 40. We ad-
    dress each argument in turn.
    I. Standard of Review
    “We review the PTAB’s factual findings for substantial
    evidence and its legal conclusions de novo.” Redline Detec-
    tion, LLC v. Star Envirotech, Inc., 
    811 F.3d 435
    , 449 (Fed.
    Cir. 2015) (citation omitted). “Substantial evidence is
    something less than the weight of the evidence but more
    than a mere scintilla of evidence,” meaning that “[i]t is such
    relevant evidence as a reasonable mind might accept as ad-
    equate to support a conclusion.” In re NuVasive, Inc., 
    842 F.3d 1376
    , 1379–80 (Fed. Cir. 2016) (internal quotation
    marks and citations omitted). “If two inconsistent conclu-
    sions may reasonably be drawn from the evidence in rec-
    ord, the PTAB’s decision to favor one conclusion over the
    other is the epitome of a decision that must be sustained
    upon review for substantial evidence.” Elbit Sys. of Am.,
    LLC v. Thales Visionix, Inc., 
    881 F.3d 1354
    , 1356 (Fed.
    Cir. 2018) (internal quotation marks, brackets, and cita-
    tion omitted).
    Case: 19-2074     Document: 56     Page: 8      Filed: 12/30/2020
    8                          FINJAN, INC.   v. CISCO SYSTEMS, INC.
    II. Claim Construction
    A. Legal Standard
    “[C]laim construction must begin with the words of the
    claims themselves.” Amgen Inc. v. Hoechst Marion Rous-
    sel, Inc., 
    457 F.3d 1293
    , 1301 (Fed. Cir. 2006) (citation
    omitted). “[W]ords of a claim are generally given their or-
    dinary and customary meaning,” i.e., “the meaning that the
    term would have to a person of ordinary skill in the art
    [(‘PHOSITA’)] in question at the time of the invention[.]”
    Phillips v. AWH Corp., 
    415 F.3d 1303
    , 1312–13 (Fed.
    Cir. 2005) (en banc) (internal quotation marks and citation
    omitted). 3 “The words used in the claims are interpreted
    in light of the intrinsic evidence of record, including the
    written description, the drawings, and the prosecution his-
    tory[.]” Teleflex, Inc. v. Ficosa N. Am. Corp., 
    299 F.3d 1313
    ,
    1324 (Fed. Cir. 2002) (citation omitted). The PHOSITA “is
    deemed to read [a] claim term not only in the context of the
    particular claim in which [it] appears, but in the context of
    the entire patent, including the specification.” Phillips,
    415 F.3d at 1313. 4 Prosecution history may also be looked
    3    Because the ’633 patent expired between conclu-
    sion of the IPR and this appeal, see Appellant’s Br. 20 (not-
    ing that the ’633 patent expired in November 2019); see
    generally Cross-appellant’s Br. (discussing neither expira-
    tion of the ’633 patent nor the appropriate claim construc-
    tion standard), we construe the Challenged Claims in
    accordance with the standard set forth in Phillips, 415 F.3d
    at 1312–13, rather than the broadest reasonable interpre-
    tation (“BRI”) as applied by the PTAB, Cisco, 
    2019 WL 2237141
    , at *2; see In re Rambus, Inc., 
    753 F.3d 1253
    , 1256
    (Fed. Cir. 2014) (providing that, once a patent has expired,
    “we apply the Phillips claim construction standards”).
    4    The “specification includes both the written de-
    scription and the claims of the patent.” Cisco Sys., Inc. v.
    TQ Delta, LLC, 
    928 F.3d 1359
    , 1362 (Fed. Cir. 2019) (inter-
    nal quotation marks and citation omitted).
    Case: 19-2074       Document: 56         Page: 9   Filed: 12/30/2020
    FINJAN, INC.   v. CISCO SYSTEMS, INC.                          9
    to in order to supply additional evidence of a claim term’s
    intended meaning. See Home Diagnostics, Inc. v. Lifescan,
    Inc., 
    381 F.3d 1352
    , 1356 (Fed. Cir. 2004). 5 “A patent’s
    specification, together with its prosecution history, consti-
    tutes intrinsic evidence to which the PTAB gives priority
    when it construes claims.” Knowles Elecs. LLC v. Cirrus
    Logic, Inc., 
    883 F.3d 1358
    , 1361−62 (Fed. Cir. 2018) (cita-
    tion omitted). We review the PTAB’s assessment of the in-
    trinsic evidence de novo and extrinsic evidence for
    substantial evidence. See 
    id. at 1362
    .
    B. The PTAB Properly Construed the Term
    “Information Re-Communicator”
    The PTAB concluded that the “information re-commu-
    nicator” as recited in claims 2 and 3 “is not limited to re-
    ceiving downloadable-information from an external
    network.” Cisco, 
    2019 WL 2237141
    , at *4. Finjan argues
    that, by not requiring that the received downloadable in-
    formation come “from an external network,” the PTAB’s
    construction is “overbroad and inconsistent with the speci-
    fication and [expert] testimony.” Appellant’s Br. 33–34. 6
    We disagree with Finjan.
    The PTAB properly construed the term “information
    re-communicator.” Consistent with claim construction
    principles, we look first to the language of the claims,
    5    A patent’s prosecution history “consists of the com-
    plete record of the proceedings before the [US]PTO,”
    providing “evidence of how the [US]PTO and the inventor
    understood the patent.” Phillips, 415 F.3d at 1317 (citation
    omitted).
    6    Finjan refers to the recited “information re-commu-
    nicator” as the “information re-communicator/monitor.”
    See, e.g., Appellant’s Br. 34. Finjan does not raise any ar-
    guments specific to the term “monitor.” See generally Ap-
    pellant’s Br. Consistent with the PTAB, we discuss this
    term as the “information re-communicator.” See, e.g.,
    Cisco, 
    2019 WL 2237141
    , at *4.
    Case: 19-2074    Document: 56      Page: 10      Filed: 12/30/2020
    10                        FINJAN, INC.   v. CISCO SYSTEMS, INC.
    followed by the language of the specification and prosecu-
    tion history. See Phillips, 415 F.3d at 1315–17. Independ-
    ent claim 1 recites “[a] computer processor based method”
    in which “a computer” “receiv[es] . . . downloadable infor-
    mation.” ’633 patent col. 20 ll. 54–56. Dependent claims 2
    and 3 further provide that this “receiving” may be done by
    an “information re-communicator” within the computer, id.
    col. 20 ll. 63–65, and the “information re-communicator”
    may be a “network server,” id. col. 20 ll. 66–67. The claim
    language does not, however, specify from where the “down-
    loadable information” is “receiv[ed].” See id. col. 20 ll. 64–
    67. This indicates that the “information re-communicator”
    is not limited to receiving “downloadable information” from
    an external network. See Phillips, 415 F.3d at 1314 (“[T]he
    claims themselves provide substantial guidance as to the
    meaning of particular claim terms.”). Accordingly, the
    PTAB properly concluded that the “claims are silent as to
    the source of the ‘downloadable-information,’” and, as such,
    the plain meaning of the claim language” does not require
    that source be “an external network.”           Cisco, 
    2019 WL 2237141
    , at *4.
    We next turn to the specification. See Phillips, 415
    F.3d at 1315 (“[C]laims must be read in view of the specifi-
    cation, of which they are a part.” (internal quotation marks
    and citation omitted)). The specification repeatedly de-
    scribes the “re-communicator” as a “server” or “firewall.”
    See, e.g., ’633 patent, Abstract (disclosing embodiments
    with “a server, firewall or other suitable ‘re-communica-
    tor’”); id. col. 5 ll. 34–36 (“Embodiments provide, within one
    or more ‘servers’ (e.g.[,] firewalls, resources, gateways,
    email relays or other information re-communicating de-
    vices)[.]”). The specification provides that “re-communica-
    tors” include “one or more network servers, firewalls or
    other network connectable information re-communicating
    devices.” Id. col. 2 ll. 58–62. Thus, based on the specifica-
    tion, “information re-communicators” are devices that re-
    communicate received information, regardless of whether
    Case: 19-2074       Document: 56     Page: 11   Filed: 12/30/2020
    FINJAN, INC.   v. CISCO SYSTEMS, INC.                      11
    that information comes from an external network or other
    source. The specification does not narrow the term “infor-
    mation re-communicator,” and instead, supports the con-
    clusion that the “information re-communicator” is not
    limited to receiving “downloadable information” from an
    external network. Accordingly, the PTAB properly con-
    cluded that the specification “does not restrict” the “infor-
    mation re-communicator” to “processing the downloadable-
    information solely” from “external networks.” Cisco, 
    2019 WL 2237141
    , at *4. 7
    Finjan’s primary counterargument is unpersuasive.
    Finjan “does not disagree” that “(1) the claims are silent as
    to the source of the downloadable-information and (2) the
    [s]pecification describes consistently a server or a firewall
    as a re-communicator.” Appellant’s Br. 33 (internal quota-
    tion marks and citation omitted). Finjan nonetheless urges
    us to adopt an additional limitation to the term because,
    based on expert testimony, “a P[H]OS[IT]A would under-
    stand . . . ‘information re-communicator’” to require it. Id.;
    see 
    id.
     at 34 (citing J.A. 2302 (Finjan’s expert testimony),
    2369 (Cisco’s expert deposition)). This argument is without
    merit. First, while “extrinsic evidence,” such as expert tes-
    timony, “can shed useful light on the relevant art,” “it is
    less significant than the intrinsic record[.]” Phillips, 415
    F.3d at 1317. Finjan agrees that the claims are silent as to
    whether “downloadable-information” must come from an
    external network and that the specification does not re-
    quire it. Appellant’s Br. 33. Where, as here, “an analysis
    of the intrinsic evidence alone will resolve any ambiguity
    in [the] disputed claim term,” it is “improper to rely on ex-
    trinsic evidence,” such as expert testimony, to introduce
    7   Neither party argues that the prosecution history
    illuminates the meaning of “information re-communica-
    tor.” Accordingly, we do not consider it here. See Vitronics
    Corp. v. Conceptronic, Inc., 
    90 F.3d 1576
    , 1582 (Fed.
    Cir. 1996) (providing that we will consider the prosecution
    history “if in evidence”).
    Case: 19-2074    Document: 56      Page: 12       Filed: 12/30/2020
    12                         FINJAN, INC.   v. CISCO SYSTEMS, INC.
    ambiguity. Vitronics, 
    90 F.3d at 1583
    ; see Phillips, 415
    F.3d at 1318 (“[A] court should discount any expert testi-
    mony that is clearly at odds with the claim construction
    mandated by the claims themselves, the written descrip-
    tion, and the prosecution history[.]”).
    Second, Finjan’s proffered expert testimony does not
    persuasively support its argument that the term “infor-
    mation re-communicator” must be narrowed to receiving
    “downloadable-information from” only “an external net-
    work.” Appellant’s Br. 33. Finjan’s expert testimony is
    premised on exemplary embodiments of the ’633 patent.
    J.A. 2302–04. Finjan’s expert explains that the ’633 pa-
    tent’s “information re-communicator” receives “down-
    loadable-information from an external network” because
    “the ’633 patent describes” an exemplary embodiment with
    “a network that includes subsystems . . . , which are sepa-
    rated via [an] external network . . . from resource serv-
    ers[.]” J.A. 2302–03 (citing ’633 patent col. 5 l. 63–col. 6
    l. 33, Figs. 1a, 1b, 1c); see ’633 patent col. 5 ll. 57–62 (ex-
    plaining that “F[igs]. 1a through 1c illustrate a computer
    network system . . . according to an embodiment of the in-
    vention. F[ig]. 1a broadly illustrates [a] system . . . , while
    F[igs]. 1b and 1c illustrate exemplary protectable subsys-
    tem implementations[.]”), col. 5 l. 63–col. 6 l. 33 (describing
    Figs. 1a, 1b, and 1c). That is, Finjan’s expert seeks to im-
    properly read “limitations from the specification . . . into
    the patent claims.” Bell Atl. Network Servs., Inc. v. Covad
    Commc’ns Grp., Inc., 
    262 F.3d 1258
    , 1270 (Fed. Cir. 2001).
    Finjan also asserts that Cisco’s expert “agreed that the
    claimed ‘information re-communicator . . .’ must receive
    downloadable information over an external network.” Ap-
    pellant’s Br. at 18; see id. at 34 (similar). Finjan is incor-
    rect. Cisco’s expert declined to “construe any terms,” but
    noted, when asked “[w]hat problem the ’633 patent” tries
    to “solve,” that he “underst[oo]d from reading the patent
    that the re[-]communicator receives the downloadable in-
    formation      from     the     external    network,”      with
    Case: 19-2074       Document: 56     Page: 13   Filed: 12/30/2020
    FINJAN, INC.   v. CISCO SYSTEMS, INC.                      13
    “downloadables” only “usually” “downloaded from an exter-
    nal network.” J.A. 2368–69 (without citation or specific ref-
    erence). Even if we were to interpret this statement as
    requiring “an external network” as Finjan urges, “[w]here
    the patent documents are unambiguous, expert testimony
    regarding the meaning of a claim is entitled to no weight.”
    Texas Digital Sys., Inc. v. Telegenix, Inc., 
    308 F.3d 1193
    ,
    1212 (Fed. Cir. 2002); Vitronics, 
    90 F.3d at 1584
     (“[E]xpert
    testimony . . . often only indicates what a particular expert
    believes a term means[.]”). The PTAB, therefore, properly
    construed the term “information re-communicator” as “not
    limited to receiving downloadable-information from an ex-
    ternal network.” Cisco, 
    2019 WL 2237141
    , at *4; see In re
    CSB-Sys. Int’l, Inc., 
    832 F.3d 1335
    , 1341 (Fed. Cir. 2016)
    (“In many cases, the claim construction will be the same
    under the Phillips and BRI standards.”). 8
    II. Obviousness
    A. Legal Standard
    A patent claim is invalid “if the differences between the
    subject matter sought to be patented and the prior art are
    such that the subject matter as a whole would have been
    obvious at the time the invention was made to a
    8    Finjan’s argument that Hanson “does not disclose
    an ‘information re-communicator,’” is predicated on us
    adopting Finjan’s construction of “information re-commu-
    nicator.” Appellant’s Br. 36 (arguing that Hanson “does
    not disclose an ‘information re-communicator . . .’ under
    the proper construction”). Because we do not adopt Fin-
    jan’s construction, we need not address Finjan’s conditional
    argument. See Knowles Elecs. LLC v. Iancu, 
    886 F.3d 1369
    , 1373 n.3 (Fed. Cir. 2018) (“Because we conclude that
    the PTAB did not err in its construction of the disputed
    limitation, we need not address the appellant’s conditional
    arguments as to the PTAB’s unpatentability determina-
    tions.” (internal quotation marks, brackets, and citation
    omitted)).
    Case: 19-2074    Document: 56      Page: 14      Filed: 12/30/2020
    14                        FINJAN, INC.   v. CISCO SYSTEMS, INC.
    [PHOSITA].” 
    35 U.S.C. § 103
    (a) (2006). 9 Obviousness “is
    a question of law based on underlying findings of fact.” See
    In re Gartside, 
    203 F.3d 1305
    , 1316 (Fed. Cir. 2000). Those
    underlying findings of fact include: (1) “the scope and con-
    tent of the prior art,” (2) “differences between the prior art
    and the claims at issue,” (3) “the level of ordinary skill in
    the pertinent art,” and (4) the presence of objective indicia
    of nonobviousness such “as commercial success, long felt
    but unsolved needs, failure of others,” and unexpected re-
    sults. Graham v. John Deere Co. of Kan. City, 
    383 U.S. 1
    ,
    17 (1966); see United States v. Adams, 
    383 U.S. 39
    , 50–52
    (1966). In assessing the prior art, the PTAB also “con-
    sider[s] whether a PHOSITA would have been motivated
    to combine the prior art to achieve the claimed invention
    and whether there would have been a reasonable expecta-
    tion of success in doing so.” In re Warsaw Orthopedic, Inc.,
    
    832 F.3d 1327
    , 1333 (Fed. Cir. 2016) (internal quotation
    marks, brackets, and citation omitted). “What a prior art
    reference teaches and whether a [PHOSITA] would have
    been motivated to combine references are questions of
    fact.” Apple Inc. v. Samsung Elecs. Co., Ltd., 
    839 F.3d 1034
    , 1051 (Fed. Cir. 2016) (en banc).
    B. Substantial Evidence Supports the PTAB’s Finding
    that Hanson Discloses “Downloadable-Information” as
    Recited in Independent Claim 1
    The PTAB concluded that it “need not construe the
    term” “downloadable-information,” because even if it
    9 Congress amended § 103 when it enacted the
    Leahy-Smith America Invents Act (“AIA”).             Pub. L.
    No. 112-29, § 3(c), 
    125 Stat. 284
    , 287 (2011). However, be-
    cause the application that led to the ’633 patent never con-
    tained (1) a claim having an effective filing date on or after
    March 16, 2013, or (2) a reference under 
    35 U.S.C. §§ 120
    ,
    121, or 365(c) to any patent or application that ever con-
    tained such a claim, the pre-AIA § 103 applies. See AIA,
    § 3(n)(1), 125 Stat. at 293; ’633 patent, Cover Page.
    Case: 19-2074       Document: 56     Page: 15   Filed: 12/30/2020
    FINJAN, INC.   v. CISCO SYSTEMS, INC.                      15
    adopted Finjan’s proposed construction, Cisco “ha[d] shown
    that prior art teaches the limitation.”        Cisco, 
    2019 WL 2237141
    , at *5; see 
    id.
     (noting that Finjan defined the
    term “downloadable-information” as “information which is
    downloaded from a source computer which may or may not
    include executable code” (quoting J.A. 305 (Patent Owner’s
    Response)). The PTAB then found that “Hanson’s bastion
    server receives ‘downloadable-information’” and, therefore,
    Hanson teaches “receiving . . . downloadable-information”
    as recited in independent claim 1. 
    Id. at *13
    . Finjan ar-
    gues that the PTAB’s construction of “downloadable-infor-
    mation” was “premised on a very clear misinterpretation of
    Finjan’s argument.” Appellant’s Br. 29. Finjan asserts
    that the PTAB’s “failure to address Finjan’s actual argu-
    ment means that” the PTAB’s finding that Hanson teaches
    “receiving . . . downloadable-information” is unsupported
    by substantial evidence. 
    Id. at 31
    . We disagree with Fin-
    jan.
    Substantial evidence supports the PTAB’s finding that
    Hanson teaches “receiving . . . downloadable-information.”
    Independent claim 1 recites a “computer processor-based
    method,” in which “a computer” first “receiv[es] . . . down-
    loadable-information,” then “determin[es] . . . whether the
    downloadable-information includes executable code,” and
    last, “if the downloadable-information is determined to in-
    clude executable code,” “transmit[s] . . . [a] mobile protec-
    tion code to [an] information-destination of the
    downloadable-information.” ’633 patent col. 20 ll. 54–62.
    “Downloadable-information” is “information which is
    downloaded from a source computer which may or may not
    include executable code.” Cisco, 
    2019 WL 2237141
    , at *5
    (quoting J.A. 305); see Appellant’s Br. 27–28 (offering the
    same definition); J.A. 305 (same).
    Hanson discloses, in relevant part, that its bastion
    server—a computer, J.A. 836; see J.A. 775—receives both
    incoming (“received”) and outgoing (“reply”) data packets
    for and from a client and checks these data packets against
    Case: 19-2074    Document: 56      Page: 16      Filed: 12/30/2020
    16                        FINJAN, INC.   v. CISCO SYSTEMS, INC.
    address and rules files, J.A. 838. Hanson explains that, for
    received packets, its bastion server runs “rule checks” that
    “include certain security [check] programs that operate
    upon received data packets and, particularly, data packets
    that are or include programs.” J.A. 838. These programs
    may be, for example, “J[ava™] applets” or “ActiveX[™] pro-
    grams which are intended to be run on the destination cli-
    ent or server.” J.A. 842–43. The bastion server performs
    “[s]imilar” checks on “outgoing” or “reply data packet[s].”
    J.A. 840. Both Java™ applets and ActiveX™ programs are
    “downloadable” information. J.A. 842–43; see ’633 patent
    col. 1 ll. 60–63, col. 2 ll. 28–33. Hanson, therefore, teaches
    “a computer,” specifically its bastion server, that “re-
    ceive[s] . . . downloadable-information,” such as Java™ ap-
    plets and ActiveX™ programs, in both incoming and
    outgoing data packets. ’633 patent col. 20 ll. 54–62;
    J.A. 842–43. Accordingly, substantial evidence supports
    the PTAB’s finding that Hanson discloses “the transmit-
    ting step” of independent claim 1, “a computer” that “re-
    ceive[s] . . . downloadable-information.”        Cisco, 
    2019 WL 2237141
    , at *12–13; see NuVasive, 842 F.3d at 1380
    (“[Substantial evidence] is such relevant evidence as a rea-
    sonable mind might accept as adequate to support a con-
    clusion.” (internal quotation marks and citations omitted)).
    Finjan’s counterarguments are unpersuasive. First, to
    the extent Finjan tries to alter its proposed construction of
    “downloadable-information” on appeal, see Appellant’s
    Br. 27 (arguing that the PTAB’s “construction of ‘down-
    loadable-information’ is overbroad”), its argument is
    waived, see Conoco, Inc. v. Energy & Envtl. Int’l, L.C., 
    460 F.3d 1349
    , 1358–59 (Fed. Cir. 2006) (“[A] party may not in-
    troduce new claim construction arguments on appeal or al-
    ter the scope of the claim construction positions it took
    below.”). To the extent Finjan argues that the PTAB mis-
    understood its proposed claim construction, Appellant’s
    Br. 31 (suggesting that the PTAB was “confused”), 32 (sug-
    gesting that the PTAB “set up a strawman”), its argument
    Case: 19-2074       Document: 56     Page: 17   Filed: 12/30/2020
    FINJAN, INC.   v. CISCO SYSTEMS, INC.                      17
    is without merit. Finjan argued, and continues to argue,
    that “downloadable-information” is “information which is
    downloaded from a source computer which may or may not
    include executable code.” Appellant’s Br. 27–28; see
    J.A. 305 (same). The PTAB adopted this construction ver-
    batim. Cisco, 
    2019 WL 2237141
    , at *5. Any issue Finjan
    takes with the PTAB’s understanding of what the prior art
    teaches in light of its claim construction is a substantial
    evidence challenge—“[w]hat is disclosed by a prior art ref-
    erence is a question of fact.” Mettler-Toledo, Inc. v. B-Tek
    Scales, LLC, 
    671 F.3d 1291
    , 1297 (Fed. Cir. 2012); see Ap-
    pellant’s Br. 27 (arguing that the PTAB “ignored . . . evi-
    dence” about the definition of downloadable information,
    when it concluded Hanson “does not disclose ‘receiving
    downloadable information’”).
    Second, Finjan argues that the PTAB’s finding that
    Hanson teaches “downloadable-information” is unsup-
    ported by substantial evidence because the PTAB “con-
    fused Finjan’s arguments regarding” what Hanson
    discloses. Appellant’s Br. 31. The PTAB stated that Finjan
    “characterizes [Hanson’s] reply data packets as a request
    for server resources.” Cisco, 
    2019 WL 2237141
    , at *13 (cit-
    ing J.A. 318 (Patent Owner’s Response)). Finjan asserts
    that it actually argued that Hanson’s incoming, request
    data packets are “requests for server resources and, conse-
    quently, are not data that can be downloaded,” Appellant’s
    Br. 30 (citing J.A. 318), while Hanson’s outgoing, reply data
    packets are “outgoing” and therefore “are not . . . down-
    loaded,” 
    id.
     at 31 (citing J.A. 319). Finjan asserts that the
    PTAB’s “failure to address Finjan’s actual argument means
    that there is not even a scintilla of evidence supporting the
    [PTAB’s] finding.” 
    Id. at 31
     (internal quotation marks and
    citation omitted). Finjan is mistaken. The PTAB did in-
    deed consider Finjan’s argument—it simply found it unper-
    suasive. See Cisco, 
    2019 WL 2237141
    , at *13 (explaining
    that, while Finjan had argued that “Hanson’s bastion
    server does not receive ‘downloadable-information’
    Case: 19-2074    Document: 56     Page: 18       Filed: 12/30/2020
    18                        FINJAN, INC.   v. CISCO SYSTEMS, INC.
    because . . . requests are not data that can be downloaded,”
    this argument failed because “Hanson’s bastion server re-
    ceives data packets . . . that may include executable pro-
    grams,” and executable programs are examples of
    “downloadable information”); see also 
    id.
     (explaining that
    Finjan’s arguments concerning Hanson’s reply data pack-
    ets also failed because Hanson “describes the outgoing re-
    ply data packets in the same vein as describing the
    incoming data packet,” “plac[ing] emphasis” on “secure
    two-way data communication,” not on differences between
    incoming and outgoing packets). Further, that the PTAB
    may have misstated that Finjan characterized Hanson’s
    “reply data packets” as “a request,” does not alter the
    PTAB’s finding that “Hanson’s bastion server receives data
    packets . . . that may include executable programs,” both
    incoming and outgoing, or undermine the substantial evi-
    dence that supports that conclusion. Id.; see In re Watts,
    
    354 F.3d 1362
    , 1369 (Fed. Cir. 2004) (“[T]he harmless error
    rule applies to appeals from the [PTAB].”); Munoz v.
    Strahm Farms, Inc., 
    69 F.3d 501
    , 504 (Fed. Cir. 1995) (“The
    correction of an error must yield a different result in order
    for that error to have been harmful and thus prejudice a
    substantial right of a party.”). Accordingly, the PTAB’s
    finding that Hanson teaches “downloadable information” is
    supported by substantial evidence. 10
    10Finjan also argues “Hanson in view of Hyppönen
    does not disclose” “determining . . . whether the down-
    loadable-information includes executable code.” Appel-
    lant’s Br. 23; see ’633 patent col. 20 ll. 56–57 (independent
    claim 1). While Finjan raised this argument in its prelim-
    inary response, J.A. 237–38, it abandoned it in its Patent
    Owner’s Response, J.A. 287–343; see Appellant’s Reply &
    Resp. 7 (arguing that it was sufficient to raise the argu-
    ment in its sur-reply below (citing J.A. 508–11)). Finjan
    was on notice that such an omission would result in waiver.
    J.A. 268 (PTAB Scheduling Order) (“The patent owner is
    cautioned that any arguments for patentability not raised
    Case: 19-2074       Document: 56     Page: 19   Filed: 12/30/2020
    FINJAN, INC.   v. CISCO SYSTEMS, INC.                       19
    C. Substantial Evidence Supports the PTAB’s Finding
    that Hanson Does Not Disclose “Executable Code” as
    Recited in Independent Claim 14
    The PTAB concluded that Cisco “ha[d] not shown by a
    preponderance of the evidence that [independent] claim 14
    would have been obvious over Hanson.” Cisco, 
    2019 WL 2237141
    , at *17. The PTAB explained that Cisco had failed
    to establish that Hanson discloses “causing mobile protec-
    tion code to be executed . . . at a downloadable-information
    destination such that one or more operations of the execut-
    able code . . . , if attempted, will be processed by the mobile
    protection code,” ’633 patent col. 22 ll. 1–5, because Cisco
    had failed to show that Hanson teaches, as the ’633 patent
    requires, that its “executable code” be “not modified” when
    processed by its “bastion server,” Cisco, 
    2019 WL 2237141
    ,
    at *17. Cisco argues that the PTAB’s finding is unsup-
    ported by substantial evidence because Hanson “does not
    require [its] executable code to be modified,” Cross-appel-
    lant’s Br. 41, and substantial evidence does not support the
    conclusion Hanson’s executable code is “modified,” 
    id. at 45
    . We disagree with Cisco.
    Substantial evidence supports the PTAB’s finding that
    Hanson does not disclose “executable code” as recited in in-
    dependent claim 14. Independent claim 14 recites “causing
    mobile protection code to be executed . . . at a down-
    loadable-information destination such that one or more op-
    erations of the executable code . . . , if attempted, will be
    processed by the mobile protection code.” ’633 patent
    col. 22 ll. 1–5. The PTAB concluded, and the parties do not
    contest, that this limitation requires that “the executable
    in the response will be deemed waived.”). The argument
    is, accordingly, waived. See NuVasive, 842 F.3d at 1380–
    81 (providing that an argument raised in a preliminary re-
    sponse, but omitted in the patent owner’s response, despite
    the PTAB’s “warn[ing] . . . that this would result in
    waiver,” is “abandoned” and deemed “waived”).
    Case: 19-2074    Document: 56      Page: 20      Filed: 12/30/2020
    20                        FINJAN, INC.   v. CISCO SYSTEMS, INC.
    code whose operations are processed by the mobile protec-
    tion code at the destination is the same as the executable
    code received, i.e., it undergoes no modification.” Cisco,
    
    2019 WL 2237141
    , at *15; see Cross-appellant’s Br. 40; Ap-
    pellant’s Reply & Resp. 16. Cisco argued that a PHOSITA
    would have understood Hanson alone to teach this limita-
    tion, J.A. 126 (Petition), 435–38 (Petitioner’s Reply); it has
    not, however, proven that to be true, Cisco, 
    2019 WL 2237141
    , at *17. Hanson provides that its “bastion server”
    has “security check program[s]” that “execute if the bastion
    receives” executable code “as or in a data packet.” J.A. 842;
    see J.A. 845. These security check programs “ensure[] that
    the data within the data packet . . . is not destructive for
    the intended recipient.” J.A. 842. The “security check pro-
    gram” does this by “tagging” or “attaching itself to the [ex-
    ecutable code] being sent in the data packet,” such that,
    when the executable code is “run at the destination client
    or server,” the security check program “runs simultane-
    ously” and “performs [the necessary] security operations[.]”
    J.A. 842; see J.A. 845. Cisco’s expert stated that Hanson’s
    “tagging” or “attaching” were “well[-]known” “concatena-
    tion methods, in which two items may be interleaved or
    sent together in a packet or series of packets.” J.A. 1554–
    55. In contrast, Finjan’s expert stated that a PHOSITA
    would have understood Hanson’s “attaching” or “tagging”
    to result in “modification” of the executable code.”
    J.A. 2314; see J.A. 2317. Finjan’s expert explained that in
    Hanson’s specific “attaching” process, a security check pro-
    gram is “inserted” into “the data packet carrying” the exe-
    cutable code, modifying it such that, when the executable
    code is run, the security check program “alter[s] [the] oper-
    ations” of the executable code and “override[s]” any de-
    structive operations. J.A. 2314–15 (citing J.A. 844); see
    J.A. 1761–62 (Cisco’s expert deposition) (explaining that
    “concatenation” is “a logical term” meaning two packets “go
    together,” that is, “are transferred as a pair,” and “[t]here
    are many different ways you can do that”). The PTAB cred-
    ited Finjan’s expert and found that Cisco had not
    Case: 19-2074       Document: 56     Page: 21   Filed: 12/30/2020
    FINJAN, INC.   v. CISCO SYSTEMS, INC.                      21
    established that Hanson discloses running executable code
    that was “not modified.” Cisco, 
    2019 WL 2237141
    , at *17.
    The PTAB “was within its discretion to weigh the credibil-
    ity of expert testimony.” Shoes by Firebug LLC v. Stride
    Rite Children’s Grp., LLC, 
    962 F.3d 1362
    , 1372 (Fed. Cir.
    2020). Accordingly, substantial evidence supports the
    PTAB’s finding that Hanson does not teach processing “not
    modified” executable code. See Celgene Corp. v. Peter, 
    931 F.3d 1342
    , 1352 (Fed. Cir. 2019) (“[S]ubstantial evidence
    supports the [PTAB’s] assessment and weighing of this ev-
    idence, and we decline to reweigh the evidence on appeal.”).
    Cisco’s primary counterargument is unpersuasive.
    Cisco argues that the PTAB erred because it “held Cisco to
    a higher standard” than other petitioners, requiring
    “Cisco . . . prove [a] negative—that [Hanson’s] executable
    [code] was not modified[,] even though Hanson does not
    disclose any modification[.]” Cross-appellant’s Br. 40. This
    argument is without merit. The PTAB required that Cisco
    prove what it pled—that Hanson teaches what independ-
    ent claim 14 recites, “executable code” that “is not modi-
    fied.” Cisco, 
    2019 WL 2237141
    , at *15. The PTAB did not
    err by requiring that Cisco “have the burden of proving . . .
    unpatentability by a preponderance of the evidence.” 
    35 U.S.C. § 316
    (e); see Novo Nordisk A/S v. Caraco Pharm.
    Labs., Ltd., 
    719 F.3d 1346
    , 1352 (Fed. Cir. 2013) (“[A] party
    challenging [a patent’s] validity bears the burden of prov-
    ing the factual elements of invalidity[.]”). Cisco argues
    that, because Hanson’s plain language “does not require
    the executable code to be modified,” it discloses running ex-
    ecutable code that is “not modified.” Appellant’s Br. 41.
    This is insufficient. “Mere speculation is not substantial
    evidence.” OSI Pharm., LLC v. Apotex Inc., 
    939 F.3d 1375
    ,
    1382 (Fed. Cir. 2019) (internal quotation marks and cita-
    tion omitted). Accordingly, the PTAB’s conclusion that
    Cisco failed to establish that independent claim 14 of the
    ’633 patent would have been obvious over Hanson, is sup-
    ported by substantial evidence.
    Case: 19-2074    Document: 56     Page: 22       Filed: 12/30/2020
    22                        FINJAN, INC.   v. CISCO SYSTEMS, INC.
    CONCLUSION
    We have considered the parties’ remaining arguments
    and find them unpersuasive. 11 Accordingly, the Final
    11 Finjan also proposes a construction of “mobile pro-
    tection code” as recited in independent claim 1. Appellant’s
    Br. 20. Finjan did not, however, raise this argument before
    the PTAB. J.A. 305–06 (Patent Owner’s Response). It is
    therefore waived. See Conoco, 
    460 F.3d at 1358
    . Finjan
    argues we should nonetheless consider its new construc-
    tion, asserting that “the circumstances . . . warrant deviat-
    ing from th[e] [general] principle” of waiver. Appellant’s
    Br. 22. Finjan has not, however, shown any “exceptional
    circumstances” to warrant consideration of its untimely ar-
    gument. In re Baxter Int’l, Inc., 
    678 F.3d 1357
    , 1362 (Fed.
    Cir. 2012).
    First, Finjan asserts that Cisco “would not be preju-
    diced” because Cisco “advocated” for the same “construc-
    tion” in parallel district court proceedings. Appellant’s
    Br. 21. Finjan’s assertion is, at best, inaccurate. J.A. 2957
    (Cisco’s Responsive Supplemental Claim Construction
    Brief) (arguing, before the district court, that construction
    of “mobile protection code” was “unnecessary,” but stipulat-
    ing to Finjan’s construction “in th[at] case to eliminate the
    dispute”). Further, whatever construction Cisco subse-
    quently stipulated to in other proceedings, Finjan must
    have “timely present[ed] [its] arguments to the [PTAB].”
    Baxter, 678 F.3d at 1362.
    Second, Finjan argues that we should consider its
    waived claim construction because, in effect, we owe no def-
    erence to the PTAB. Appellant’s Br. 22–23; see id. at 22
    (noting our de novo standard of review for claim construc-
    tion), 22–23 (noting that, because the ’633 patent expired
    between the PTAB’s decision and our review, our analysis
    shifts from BRI to Phillips), 23 (noting the “strange circum-
    stances” of the PTAB’s decision—specifically, that the
    PTAB changed its mind about the efficacy of Finjan’s argu-
    ments between institution and its final written decision).
    Case: 19-2074       Document: 56     Page: 23   Filed: 12/30/2020
    FINJAN, INC.   v. CISCO SYSTEMS, INC.                      23
    Written Decision of the U.S. Patent and Trademark Of-
    fice’s Patent Trial and Appeal Board, is
    AFFIRMED
    COSTS
    Each party to bear its own costs.
    This argument is without merit. “No matter how inde-
    pendent an appellate court’s review of an issue may be, it
    is still no more than that—a review.” Sage Prod., Inc. v.
    Devon Indus., Inc., 
    126 F.3d 1420
    , 1426 (Fed. Cir. 1997). A
    de novo standard of review is not an exceptional circum-
    stance, Conoco, 
    460 F.3d at 1358
     (“[L]egal issues in patent
    infringement suits are not immune to the doctrine of
    waiver on appeal[.]”), neither is a tribunal’s change in its
    appraisal of the merits following full consideration of the
    evidence, see Trivascular, Inc. v. Samuels, 
    812 F.3d 1056
    ,
    1068 (Fed. Cir. 2016) (“[T]he [PTAB] is not bound by any
    findings made in its Institution Decision. . . . The [PTAB]
    is free to change its view of the merits after further devel-
    opment of the record, and should do so if convinced its ini-
    tial inclinations were wrong.” (emphasis original)).
    Accordingly, we decline to consider Finjan’s waived claim
    construction argument.