Centripetal Networks, Inc. v. Cisco Systems, Inc. ( 2021 )


Menu:
  • Case: 20-1635   Document: 49     Page: 1   Filed: 03/10/2021
    NOTE: This disposition is nonprecedential.
    United States Court of Appeals
    for the Federal Circuit
    ______________________
    CENTRIPETAL NETWORKS, INC.,
    Appellant
    v.
    CISCO SYSTEMS, INC.,
    Appellee
    ______________________
    2020-1635, 2020-1636
    ______________________
    Appeals from the United States Patent and Trademark
    Office, Patent Trial and Appeal Board in Nos. IPR2018-
    01436, IPR2018-01437.
    ______________________
    Decided: March 10, 2021
    ______________________
    JAMES R. HANNAH, Kramer Levin Naftalis & Frankel
    LLP, Menlo Park, CA, for appellant. Also represented by
    PAUL J. ANDRE; JEFFREY PRICE, New York, NY.
    PATRICK D. MCPHERSON, Duane Morris LLP, Washing-
    ton, DC, for appellee. Also represented by CHRISTOPHER
    JOSEPH TYSON; MATTHEW CHRISTOPHER GAUDET, Atlanta,
    GA; JOSEPH POWERS, Philadelphia, PA.
    ______________________
    Case: 20-1635    Document: 49      Page: 2    Filed: 03/10/2021
    2          CENTRIPETAL NETWORKS, INC.   v. CISCO SYSTEMS, INC.
    Before MOORE, SCHALL, and TARANTO, Circuit Judges.
    TARANTO, Circuit Judge.
    Centripetal Networks, Inc. owns U.S. Patent Nos.
    9,124,552 and 9,160,713, which address cybersecurity tech-
    niques for filtering encrypted packets passing between a
    secured and an unsecured network. In July 2018, Cisco
    Systems, Inc. filed petitions for inter partes reviews of the
    ’552 and ’713 patents. For all claims of both patents, Cisco
    asserted unpatentability under 
    35 U.S.C. § 103
     for obvious-
    ness based on a user manual for an earlier security sys-
    tem—a manual that Cisco asserted was a prior-art “printed
    publication.” 
    35 U.S.C. § 311
    (b). The Patent Trial and Ap-
    peal Board instituted both requested inter partes reviews
    and, in its final written decisions, agreed with Cisco about
    the printed-publication status of the user manual and
    about unpatentability of all claims. Cisco Systems, Inc. v.
    Centripetal Networks, Inc., IPR2018-01436, 
    2020 WL 402817
     (P.T.A.B. Jan. 23, 2020) (’552 Decision); Cisco Sys-
    tems, Inc. v. Centripetal Networks, Inc., IPR2018-01437,
    
    2020 WL 402317
     (P.T.A.B. Jan. 23, 2020) (’713 Decision).
    We affirm.
    I
    A
    The patents address aspects of the now-common pro-
    cess of sending messages across networks, specifically
    across the Internet, using protocols that split up a mes-
    sage’s content into packets for transmission. J.A. 6682
    ¶ 47; J.A. 6823. When packets arrive at their destination,
    they are assembled to recreate the original message. See
    J.A. 2064. Two common preexisting protocols, which allow
    encryption of the transmitted data, are relevant here: Hy-
    pertext Transfer Protocol Secure (HTTPS) and Transport
    Layer Security (TLS). See ’552 patent, col. 7, lines 53–60.
    Because the ’713 patent issued from a continuation of
    the application that issued as the ’552 patent, the patents
    Case: 20-1635     Document: 49      Page: 3     Filed: 03/10/2021
    CENTRIPETAL NETWORKS, INC.    v. CISCO SYSTEMS, INC.          3
    share a specification, and when citing that specification, we
    will generally cite only the ’552 patent. The patents are
    concerned with “filtering network data transfers” and the
    passage of information between a secured network (e.g., a
    private company’s network) and an unsecured network
    (e.g., the larger Internet). ’552 patent, Abstract; ’713 pa-
    tent, Abstract; see also ’552 patent, col. 1, lines 62–64. The
    specification focuses, in particular, on preventing a type of
    cyberattack known as an “exfiltration,” which involves
    stealing information (extracting it without authorization)
    as it exits a secure network, using “popular network data
    transfer protocols” to disguise the theft “as normal network
    behavior.” 
    Id.,
     col. 1, lines 15–23. Previous cybersecurity
    systems, the patents say, inadequately protected against
    such attacks because they tended to interpret the exfiltra-
    tion as ordinary network behavior and did not account for
    vulnerabilities in the conventional version of TLS, i.e., TLS
    version 1.0. 
    Id.,
     col. 1, lines 23–25; 
    id.,
     col. 6, lines 40–47.
    The patents describe a solution in which packets enter-
    ing or exiting a secure network are first received at a
    packet secure gateway, which may include “one or more
    computing devices configured to receive packets.” 
    Id.,
     col.
    3, lines 42–44. The gateway also receives a “dynamic secu-
    rity policy” from a “security policy management server,”
    
    id.,
     col. 4, lines 53–55, which provides the “packet filter” in
    the gateway with “one or more rules” to determine where
    (to which “operators”) packets “having specified infor-
    mation” should be sent, 
    id.,
     col. 5, lines 6–16. The specified
    information gathered from a packet may include a “five-tu-
    ple,” which may comprise “one or more values selected
    from”: the protocol type of the packet, the Internet Protocol
    (IP) address of the source of the packet, “one or more source
    port values,” the IP address(es) of the destination(s) of the
    packet, and “one or more destination ports.” 
    Id.,
     col. 5,
    lines 34–42. Based on the information collected from the
    packet, the gateway system “determines” which operator to
    direct the packet to, 
    id.,
     col. 5, lines 9–16, and the operator
    Case: 20-1635     Document: 49      Page: 4    Filed: 03/10/2021
    4         CENTRIPETAL NETWORKS, INC.    v. CISCO SYSTEMS, INC.
    then applies one or more filtering rules to the packet to “al-
    low” or “block” the packet, see, e.g., 
    id.
     col. 5, lines 62–67;
    
    id.
     col. 6, lines 11–16. For example, a rule may require that
    a packet use “version 1.1 or 1.2 of the Transport Layer Se-
    curity (TLS) protocol” in order to be allowed to continue,
    because “the popular TLS version 1.0 protocol has a known
    security vulnerability that attackers may exploit to decrypt
    HTTPS sessions.” 
    Id.,
     col. 6, lines 27–47.
    Independent claim 1 of the ’552 patent recites:
    1. A method, comprising:
    at a computing device comprising at least one pro-
    cessor, a memory, and a communication interface:
    receiving, via the communication interface,
    a plurality of hypertext transfer protocol
    secure (HTTPS) packets;
    responsive to a determination by the at
    least one processor that at least a portion
    of the plurality of HTTPS packets have
    packet-header-field values corresponding
    to a packet filtering rule stored in the
    memory, applying, by the at least one pro-
    cessor, an operator specified by the packet-
    filtering rule to the at least a portion of the
    plurality of HTTPS packets, wherein the
    operator specifies one or more application-
    header-field-value criteria identifying one
    or more transport layer security (TLS)-
    version values for which packets should be
    blocked from continuing toward their re-
    spective destinations;
    and
    responsive to a determination by the at
    least one processor that one or more pack-
    ets, of the at least a portion of the plurality
    Case: 20-1635     Document: 49      Page: 5    Filed: 03/10/2021
    CENTRIPETAL NETWORKS, INC.   v. CISCO SYSTEMS, INC.          5
    of HTTPS packets, have one or more appli-
    cation-header-field values corresponding to
    one or more TLS-version values of the one
    or more TLS-version values for which pack-
    ets should be blocked from continuing to-
    ward     their    respective   destinations,
    applying, by the at least one processor, at
    least one packet-transformation function
    specified by the operator to the one or more
    packets to block each packet of the one or
    more packets from continuing toward its
    respective destination.
    
    Id.,
     col. 11, lines 5–35. Claims 8 and 15 are the only other
    independent claims in the ’552 patent. Claim 8 claims an
    “apparatus” that performs the claim 1 method and claim
    15 claims “non-transitory computer-readable media” con-
    taining instructions that, when executed, perform the
    claim 1 method. 
    Id.,
     col. 12, line 54 through col. 13, line 15;
    
    id.
     col. 13, lines 39–67. No additional limitations in the
    dependent claims of the ’552 patent are relevant to Cen-
    tripetal’s appeal.
    Claim 1 of the ’713 patent recites:
    1. A method comprising:
    receiving, by a computing system provisioned with
    a plurality of packet-filtering rules, a first packet
    and a second packet;
    responsive to a determination by the computing
    system that the first packet comprises data corre-
    sponding to a transport layer security (TLS)-
    version value for which one or more packet-filter-
    ing rules of the plurality of packet-filtering rules
    indicate packets should be forwarded toward their
    respective destinations, forwarding, by the compu-
    ting system, the first packet toward its destination;
    and
    Case: 20-1635    Document: 49      Page: 6    Filed: 03/10/2021
    6         CENTRIPETAL NETWORKS, INC.   v. CISCO SYSTEMS, INC.
    responsive to a determination by the computing
    system that the second packet comprises data cor-
    responding to a TLS-version value for which the
    one or more packet-filtering rules indicate packets
    should be blocked from continuing toward their re-
    spective destinations, dropping, by the computer
    system, the second packet.
    ’713 patent, col. 11, lines 8–25. Independent claims 8 and
    15 of the ’713 patent are substantially similar to claim 1;
    for present purposes, they are system and non-transitory
    computer-readable media forms of method claim 1. See 
    id.,
    col. 12, lines 29–47; 
    id.,
     col. 13, lines 44–61.
    B
    In July 2018, Cisco filed petitions for inter partes re-
    views of all claims (claims 1–21) of the ’552 patent and all
    claims (claims 1–20) of the ’713 patent. Cisco argued that
    the claimed inventions of all claims would have been obvi-
    ous to a relevant artisan in view of the User Guide for the
    Sourcefire 3D System—a manual referred to in the matters
    before us as “Sourcefire.”
    Sourcefire describes a system that monitors network
    activity with packet-filtering devices called “3D-Sensors”
    that record network activity and identify (and call atten-
    tion to) “intrusion events” based on an “intrusion policy ap-
    plied to a detection engine on the sensor that is monitoring
    a specific network segment.” J.A. 1460, 1683. In this sys-
    tem, packets traveling through the network pass through
    three layers that decode them, J.A. 1683, 1685, then pass
    through preprocessors that “normalize traffic at the appli-
    cation layer and detect protocol anomalies,” J.A. 1685, and
    finally arrive at a “rules engine” that “inspects the packet
    headers” and “determine[s] whether they trigger any of the
    shared object rules or standard text rules,” J.A. 1685–86.
    At any of these steps, a packet could cause the system “to
    generate an event, which is an indication that the packet
    or its contents” may be a security risk. J.A. 1687.
    Case: 20-1635     Document: 49      Page: 7     Filed: 03/10/2021
    CENTRIPETAL NETWORKS, INC.    v. CISCO SYSTEMS, INC.          7
    When packets arrive at Sourcefire’s rules engine, the
    engine determines whether values in the packet header
    trigger one or more “intrusion rules.” J.A. 1686, 1940,
    2188. Intrusion rules may have two parts: (1) the rule
    header, which includes the five-tuple values (protocol,
    source and destination IP addresses, source and destina-
    tion ports), the rule’s action (e.g., drop, alert and allow, ig-
    nore and allow), and direction indicators; and (2) the rule
    options part, which contains, e.g., keywords and their ar-
    guments and event messages. J.A. 2189; see also J.A.
    2188–96. Keywords in intrusion rules can be used by the
    preprocessor (called the Secure Sockets Layer (SSL) pre-
    processor) and by the rules engine to filter packets accord-
    ing to their encryption protocol version (for example, their
    TLS version). J.A. 2252. Sourcefire permits users to write
    their own custom intrusion rules, J.A. 2188–96, so a user
    could use a keyword like “ssl_version” in an intrusion rule
    to cause the SSL preprocessor to match the protocol version
    information contained in the application headers of the
    packets against the protocol of the assembled packets for
    an encrypted session (a reassembled stream of messages
    known as a handshake), J.A. 2254–55; see also J.A. 1918,
    2024–28, 2127.
    In its petitions for inter partes reviews, Cisco argued
    that the claims of the ’552 and ’713 patents recite subject
    matter that would have been obvious in view of Sourcefire
    because Sourcefire describes a cybersecurity system that
    can be configured to meet every limitation in the claims.
    ’552 Decision, 
    2020 WL 402817
    , at *8; ’713 Decision, 
    2020 WL 402317
    , at *6–7.          Specifically, Cisco relied on
    Sourcefire as disclosing, to a relevant artisan, the idea of
    writing custom intrusion rules that would permit the
    Sourcefire system to determine the TLS-version values of
    the packets it received based on keywords and to use the
    rules engine as an operator to apply packet-filtering rules
    based on those determinations. ’552 Decision, 2020 WL
    Case: 20-1635    Document: 49      Page: 8    Filed: 03/10/2021
    8         CENTRIPETAL NETWORKS, INC.   v. CISCO SYSTEMS, INC.
    402817, at *15–16; ’713 Decision, 
    2020 WL 402317
    , at *6–
    7.
    After the Board instituted the requested inter partes
    reviews, Centripetal argued that Sourcefire was not a
    “printed publication” at the priority date for the patents at
    issue, see 
    35 U.S.C. § 102
    (a)(1); 
    35 U.S.C. § 102
    (b) (2006),
    as required for non-patent prior art in IPRs under 
    35 U.S.C. § 311
    (b). J.A. 434–38; see also ’713 Decision, 
    2020 WL 402317
    , at *3. 1 Centripetal contended that Sourcefire
    (the document) was costly and was distributed only to those
    who bought certain products from Sourcefire (the company)
    and, therefore, the document was not publicly accessible
    because a relevant artisan could not have obtained it with
    reasonable diligence. J.A. 434–38.
    In IPR-1436 (addressing the ’552 patent), Centripetal
    did not dispute that Sourcefire teaches a processor,
    memory, and communication interface; nor did it dispute
    that Sourcefire teaches “receiving, via the communication
    interface a plurality of [HTTPS] packets.” ’552 Decision,
    
    2020 WL 402817
    , at *14–15. Centripetal argued, however,
    that Sourcefire does not teach the “determination” limita-
    tions of the claims, specifically the requirements of (1) a
    “determination” that a plurality of HTTPS packets “have
    packet-header-field values corresponding to a packet-filter-
    ing rule” and (2) a “determination” that some of those pack-
    ets “have one or more application-header-field values
    corresponding to one or more TLS-version values.” See J.A.
    456, 458. According to Centripetal, Sourcefire teaches
    1   The version of 
    35 U.S.C. § 102
     pre-dating the
    amendments made in 2011 (effective March 16, 2013) ap-
    plies in both of these matters, given that the application
    that issued as the ’552 patent was filed March 12, 2013,
    and the ’713 patent is the child of the ’552 patent. See ’552
    Decision, 
    2020 WL 402817
    , at *4 n.1. The current version
    of § 102 continues to use the phrase “printed publication.”
    Case: 20-1635    Document: 49      Page: 9    Filed: 03/10/2021
    CENTRIPETAL NETWORKS, INC.   v. CISCO SYSTEMS, INC.        9
    extracting version information from a reassembled stream
    of packets (“handshake and key exchange messages,” J.A.
    2025), whereas the claims require a determination of ver-
    sion information to be made for individual packets. J.A.
    461–62.
    Centripetal alleged an additional deficiency in
    Sourcefire’s teaching of the claim limitations. It contended
    that Sourcefire does not teach the claimed “operator,” be-
    cause the claims require that the operator specify both “ap-
    plication-header-field-value criteria” and “a packet
    transformation function,” and the Sourcefire system is “not
    capable of designing a packet-filtering rule specifying an
    operator that applies different packet transformation func-
    tions based on different application-layer-packet-header
    criteria.” J.A. 471–73. Centripetal further argued that
    Cisco had not shown that a relevant artisan would have
    been motivated to modify the teachings of Sourcefire to ar-
    rive at the claims. J.A. 481. And Centripetal advanced
    what it urged were objective indicia of nonobviousness, in-
    cluding praise for its product addressing TLS vulnerabili-
    ties. J.A. 494–95.
    In IPR-1437 (addressing the ’713 patent), Centripetal
    made similar arguments. See J.A. 7394–99, 7403–06.
    C
    In IPR-1436, the Board first determined that Cisco had
    met its burden to show that Sourcefire was a printed pub-
    lication. ’552 Decision, 
    2020 WL 402817
    , at *8–12. Specif-
    ically, the Board found that Sourcefire, a user guide, was
    publicly accessible in that it was available to purchasers of
    Sourcefire 3D Systems and was, in fact, distributed on CD-
    ROM to 586 system purchasers between April 2011 and
    March 2013, 
    id.
     at *9–10; no confidentiality restrictions
    prevented purchasers from reproducing and distributing
    the document “for non-commercial use,” 
    id.
     at *10 (citing
    J.A. 1429); and Sourcefire advertised its products and their
    accompaniment by extensive documentation, 
    id. at *11
    ;
    Case: 20-1635    Document: 49     Page: 10    Filed: 03/10/2021
    10        CENTRIPETAL NETWORKS, INC.   v. CISCO SYSTEMS, INC.
    J.A. 4695–99. The Board rejected Centripetal’s argument
    that the cost of obtaining Sourcefire (the document) was
    prohibitive; the Board found that it could be acquired by
    purchasing products that cost between $1,385 and £25,000,
    that 586 customers actually acquired it, and that Centrip-
    etal had not shown that an interested relevant artisan was
    not reasonably able to obtain the material. 
    Id.
     at *12 &
    n.9.
    After determining that Sourcefire qualified as prior
    art, the Board addressed the disputed limitations in claim
    1 (and claims 8 and 15). 
    Id.
     at *14–22. Regarding the de-
    termination limitations, the Board explained that nothing
    in the claims requires that each individual packet be in-
    spected or that TLS (or SSL) version information be ex-
    tracted from application-header-values of individual
    packets, rather than a reassembled stream (handshake
    message). 
    Id. at *17
    . Reassembled streams of messages,
    the Board continued, themselves consist of individual pack-
    ets, and a relevant artisan would have known that the
    TLS-version information is always contained in the packet
    header of the first packet in the message, as Centripetal
    acknowledged. 
    Id. at *18
    . Accordingly, the Board found
    that a relevant artisan would have understood Sourcefire,
    even in describing the extraction of version information
    from the reassembled message, as teaching the claim re-
    quirement of extraction from the first packet. 
    Id.
     at *18–
    19.
    Regarding the claimed “operator,” the Board adopted
    Centripetal’s claim construction, construing the term to re-
    fer to “a function specified by a packet-filtering rule that
    specifies one or more application-header-field criteria and
    a packet transformation to apply to the packet for each of
    the application-header-field criteria.” 
    Id.
     at *5–6. Apply-
    ing that construction, the Board found that Sourcefire’s
    keyword and argument functions (in particular, ssl_ver-
    sion keywords) permitted the system to (1) indicate appli-
    cation-header-field-value criteria (e.g., the version of TLS)
    Case: 20-1635    Document: 49      Page: 11    Filed: 03/10/2021
    CENTRIPETAL NETWORKS, INC.   v. CISCO SYSTEMS, INC.        11
    and (2) apply a “packet transformation function,” e.g.,
    blocking the packets, as specified by the claims. 
    Id. at *19
    .
    The Board also rejected Centripetal’s argument that
    Sourcefire could not teach an operator because the “rule ac-
    tion” was specified in the “rule header,” so that Sourcefire
    could apply only “one rule action” per rule (e.g., could only
    allow certain packets, rather than allow and block some).
    
    Id. at *20
    . The Board found that Centripetal had presented
    no evidence to support this argument and that Cisco had
    shown support in Sourcefire for using different ssl_version
    keywords to “allow,” “pass,” or “drop” packets. 
    Id.
    Finally, the Board found that Cisco had met its burden
    to show that a relevant artisan would have been motivated
    to modify Sourcefire to meet the ’552 patent’s claim limita-
    tions. 
    Id.
     at *21–22. Citing the declaration from Cisco’s
    expert (Dr. Staniford), the Board found that the known vul-
    nerabilities of early versions of protocols like TLS, along
    with the ordinary creativity of a relevant artisan, would be
    sufficient to motivate that artisan to use Sourcefire to write
    rules blocking packets with a vulnerability like that of TLS
    1.0. 
    Id.
     The Board also found that Centripetal’s objective
    indicia of nonobviousness—particularly the praise for its
    RuleGATE product—were not entitled to much weight,
    noting the lack of a persuasive basis for finding the nexus
    of cited objective indicia to the claims of the ’552 patent.
    
    Id.
     at *22–24. The Board then addressed the additional
    limitations in the remaining dependent claims and found
    obviousness as to those claims as well. 
    Id.
     at *24–26.
    In IPR-1437, the Board’s finding and reasoning were
    similar to those in IPR-1436. See ’713 Decision, 
    2020 WL 402317
    , at *3–13.
    The Board issued its final written decisions as to both
    IPR-1436 and IPR-1437 on January 23, 2020. Centripetal
    timely appealed both decisions. We have jurisdiction under
    
    28 U.S.C. § 1295
    (a)(4)(A) and 
    35 U.S.C. §§ 141
    (c), 319.
    Case: 20-1635     Document: 49       Page: 12   Filed: 03/10/2021
    12        CENTRIPETAL NETWORKS, INC.     v. CISCO SYSTEMS, INC.
    II
    We review the Board’s final written decisions under the
    Administrative Procedure Act, “hold[ing] unlawful and
    set[ting] aside agency action, findings, and conclusions
    found to be . . . arbitrary, capricious, an abuse of discretion,
    or otherwise not in accordance with law . . . [or] unsup-
    ported by substantial evidence.” 
    5 U.S.C. § 706
    ; Dickinson
    v. Zurko, 
    527 U.S. 150
    , 164–65 (1999). We review the
    Board’s legal conclusions de novo and factual findings for
    substantial evidence. Nobel Biocare Services AG v. Instra-
    dent USA, Inc., 
    903 F.3d 1365
    , 1374 (Fed. Cir. 2018).
    Whether a reference qualifies as a “printed publication” is
    a legal conclusion based on factual findings. Jazz Pharms.,
    Inc. v. Amneal Pharms., LLC, 
    895 F.3d 1347
    , 1356 (Fed.
    Cir. 2018). “The underlying factual findings [in a printed-
    publication analysis] include whether a reference was pub-
    licly accessible.” Nobel, 903 F.3d at 1375. Similarly, the
    ultimate determination of whether a claimed invention
    would have been obvious is a legal one reviewed de novo,
    but underlying factual determinations are reviewed for
    substantial-evidence support. PersonalWeb Techs., LLC v.
    Apple, Inc., 
    917 F.3d 1376
    , 1381 (Fed. Cir. 2019).
    On appeal, Centripetal argues that: (1) the Board erred
    by concluding that Sourcefire is a printed publication, see
    Centripetal Opening Br. 15–21; (2) Sourcefire does not
    teach a “determination” that a packet includes a specified
    TLS-version value, 
    id.
     at 21–24; (3) Cisco did not show a
    motivation to modify Sourcefire and the Board overlooked
    important objective indicia of nonobviousness, 
    id.
     at 24–31;
    and (4) Sourcefire does not disclose the operator described
    in the ’552 patent, 
    id.
     at 31–34. 2 We reject these chal-
    lenges.
    2In making their respective arguments on appeal,
    the parties do not distinguish between the Board’s
    Case: 20-1635    Document: 49      Page: 13    Filed: 03/10/2021
    CENTRIPETAL NETWORKS, INC.   v. CISCO SYSTEMS, INC.        13
    A
    Centripetal first contends that Sourcefire was not a
    printed publication because it was available only to those
    willing to pay $25,000 for the accompanying product and
    was kept password-protected on Sourcefire’s website, pre-
    venting access to the relevant public. Centripetal Opening
    Br. 15–16. We reject this argument.
    Whether a reference is a printed publication “involves
    a case-by-case inquiry into the facts and circumstances sur-
    rounding the reference’s disclosure to members of the pub-
    lic.” In re Klopfenstein, 
    380 F.3d 1345
    , 1350 (Fed. Cir.
    2004). “Because there are many ways in which a reference
    may be disseminated to the interested public, public acces-
    sibility has been called the touchstone in determining
    whether a reference constitutes a printed publication.”
    Blue Calypso, LLC v. Groupon, Inc., 
    815 F.3d 1331
    , 1348
    (Fed. Cir. 2016) (cleaned up). For a reference to be publicly
    accessible, it must be “‘disseminated or otherwise made
    available to the extent that persons interested and ordinar-
    ily skilled in the subject matter or art, exercising reasona-
    ble diligence, can locate it.’” Acceleration Bay, LLC v.
    Activision Blizzard Inc., 
    908 F.3d 765
    , 772 (Fed. Cir. 2018)
    (quoting Jazz Pharms., 895 F.3d at 1355–56); see also Kyoc-
    era Wireless Corp. v. Int’l Trade Comm’n, 
    545 F.3d 1340
    ,
    1350 (Fed. Cir. 2008). A reference need not be catalogued
    or indexed to be a printed publication; “a printed publica-
    tion need not be easily searchable after publication if it was
    sufficiently disseminated at the time of its publication.”
    Suffolk Techs., LLC v. AOL Inc., 
    752 F.3d 1358
    , 1365 (Fed.
    Cir. 2014); see also In re Lister, 
    583 F.3d 1307
    , 1312 (Fed.
    Cir. 2009); Klopfenstein, 
    380 F.3d at 1348
    . Limited distri-
    butions of a reference may suffice. Samsung Elecs. Co. v.
    decisions in IPR-1436 and IPR-1437, except where rele-
    vant. Centripetal Opening Br. 3; Cisco Response Br. 6 n.1.
    We consider the decisions together unless otherwise noted.
    Case: 20-1635    Document: 49      Page: 14    Filed: 03/10/2021
    14        CENTRIPETAL NETWORKS, INC.    v. CISCO SYSTEMS, INC.
    Infobridge Pte. Ltd., 
    929 F.3d 1363
    , 1374 (Fed. Cir. 2019).
    In determining whether interested persons could have ac-
    cessed the publication, we consider factors such as the ex-
    pertise of the target audience, the avenues of distribution
    (e.g., at a trade show), the duration of dissemination, and
    expectations of confidentiality or restrictions on recipients’
    sharing of the information. GoPro, Inc. v. Contour IP Hold-
    ing LLC, 
    908 F.3d 690
    , 694–95 (Fed. Cir. 2018). 3
    3   See, e.g., GoPro, 908 F.3d at 694–95 (catalog dis-
    tributed at a trade show that was only open to “dealers” of
    action sports vehicles and related accessories was a printed
    publication because there were no restrictions on the cata-
    log’s distribution, there were over 1,000 attendees, and
    there was no evidence that one interested in the art of dig-
    ital cameras could not have obtained the catalog with rea-
    sonable diligence); Jazz Pharms., 895 F.3d at 1357–59
    (Affordable Care Act materials available on the FDA’s web-
    site and published via constructive notice in the Federal
    Register were printed publications because the materials
    were “widely disseminated to persons of ordinary skill for
    a substantial time with no reasonable expectation of confi-
    dentiality”); Klopfenstein, 
    380 F.3d at 1350
     (slideshow dis-
    played at a conference for three days was a printed
    publication because the slide was displayed for a matter of
    days, the attendees included interested persons of skill in
    the art, there was no reasonable expectation that the slide
    would not be copied, and the slide could be copied with rel-
    ative simplicity); Massachusetts Inst. of Tech. v. AB Fortia
    (MIT), 
    774 F.2d 1104
    , 1108–09 (Fed. Cir. 1985) (paper
    orally presented at a conference and distributed to only six
    persons who requested the paper was a printed publica-
    tion, because “between 50 and 500 persons interested and
    of ordinary skill in the subject matter were told of the ex-
    istence of the paper . . . and the document itself was
    Case: 20-1635    Document: 49      Page: 15    Filed: 03/10/2021
    CENTRIPETAL NETWORKS, INC.   v. CISCO SYSTEMS, INC.        15
    Here, the Board found, based on testimony from a
    Sourcefire company employee, that each of the 586 custom-
    ers who purchased a range of Sourcefire products over a
    relevant two-year period received a CD-ROM containing
    the user guide, which explicitly stated that users were per-
    mitted to “use, print out, save on a retrieval system, and
    otherwise copy and distribute” the reference for noncom-
    mercial use. ’552 Decision; 
    2020 WL 402817
    , at *9–10 (cit-
    ing J.A. 1429); ’713 Decision, 
    2020 WL 402317
    , at *4
    (same). Further, Centripetal presented no evidence to the
    Board showing that—despite the CD-ROM distribution—
    an interested person using reasonable diligence would not
    have been able to access Sourcefire either by purchasing
    the product or by receiving a copy of the user guide from
    another customer. See ’552 Decision, 
    2020 WL 402817
    , at
    *10. Substantial evidence, including advertisements, re-
    views, and testimony from a Sourcefire company employee,
    supports the Board’s finding that those interested and of
    skill in the art actually purchased Sourcefire. 
    Id. at *11
    ;
    see also J.A. 822. In sum, the large number of Sourcefire
    product customers, the number of years the product was
    available, the advertisements targeting those interested
    and of skill in the art, and the lack of confidentiality re-
    strictions on copying or distributing Sourcefire support a
    finding of public accessibility. See GoPro, 908 F.3d at 694.
    The Board properly rejected Centripetal’s argument
    that In re Bayer, 
    568 F.2d 1357
     (CCPA 1978), and Med-
    tronic, Inc. v. Barry, 
    891 F.3d 1368
     (Fed. Cir. 2018), require
    a different result. ’552 Decision, 
    2020 WL 402817
    , at *11–
    12. In Bayer, we held that actual dissemination of a stu-
    dent’s thesis to members of a graduate committee did not
    render the thesis publicly accessible. 568 F.2d at 1361–62.
    We recently explained in Samsung that the student’s
    actually disseminated without restriction to at least six
    persons”).
    Case: 20-1635    Document: 49     Page: 16    Filed: 03/10/2021
    16        CENTRIPETAL NETWORKS, INC.   v. CISCO SYSTEMS, INC.
    thesis in Bayer was not publicly accessible because “the
    only people who kn[e]w how to find it [were] the ones who
    created it,” and thus it could not be obtained with reasona-
    ble diligence by those interested and of skill in the art.
    Samsung, 929 F.3d at 1371–72.            Here, in contrast,
    Sourcefire was publicly advertised and obtained by at least
    586 customers.
    In Medtronic, a video relating to spinal surgery was
    distributed at three separate meetings (two for surgeons,
    one for a private organization), and slides were distributed
    at two of the meetings. 891 F.3d at 1379. After the Board
    found lack of public accessibility of either the video or the
    slides, without distinguishing between the open and the
    closed meetings, or whether there was an expectation of
    confidentiality, we vacated and remanded. Id. at 1382–83.
    We instructed the Board to consider the “size and nature of
    the meetings,” as well as whether an “expectation of confi-
    dentiality” existed, noting that these are “important con-
    siderations” in assessing public accessibility. Id. at 1382.
    In this case, the Board did exactly that. Far from finding
    Sourcefire to be a printed publication merely because the
    CD-ROMs were actually distributed to customers, the
    Board considered the size and nature of the group receiving
    the CD-ROMs and the absence of confidentiality re-
    strictions. ’552 Decision, 
    2020 WL 402817
    , at *10–12.
    Contrary to Centripetal’s contention, the Board’s con-
    clusion regarding public accessibility is not undermined by
    the fact that, unlike some of the cases, this case does not
    involve “free distribution of academic documents to confer-
    ence and meeting attendees whose express purpose for at-
    tending the conference was to hear lectures regarding
    those same documents.” Centripetal Opening Br. 18–19
    (cleaned up). Public accessibility is not limited to circum-
    stances of free or academic distributions; “commercial dis-
    tribution” can qualify. Garrett Corp. v. United States, 
    422 F.2d 874
    , 877–78 (Ct. Cl. 1970) (distribution of 80 copies of
    a government report, including 6 to commercial companies,
    Case: 20-1635     Document: 49      Page: 17    Filed: 03/10/2021
    CENTRIPETAL NETWORKS, INC.    v. CISCO SYSTEMS, INC.         17
    constituted a printed publication because the report was
    “unclassified and unrestricted in its use”). The Board also
    reasonably found that Centripetal had not shown the cost
    of Sourcefire—which it found ranged from $1,385 to
    £25,000, ’552 Decision, 
    2020 WL 402817
    , at *12 n.9; see also
    J.A. 4695, 4700—to be prohibitive to those interested and
    of skill in the art, given, e.g., the evidence that at least 586
    customers, at least some of them relevant artisans, pur-
    chased the product, ’552 Decision, 
    2020 WL 402817
    , at *12;
    ’713 Decision, 
    2020 WL 402317
    , at *5.
    On this record, we agree with the Board that Sourcefire
    was publicly accessible and therefore qualifies as a printed
    publication.
    B
    We reject Centripetal’s challenges to the Board’s obvi-
    ousness determination.
    1
    The Board found that Sourcefire teaches what is re-
    quired by the determination claims. Centripetal argues
    otherwise by pointing to language in Sourcefire stating
    that the preprocessor “collects and reassembles all the
    packets” and inspects the stream as a “single, reassembled
    entity” rather than as “individual packets.” J.A. 2064–65;
    see also Centripetal Opening Br. 22. This argument does
    not undermine the Board’s finding.
    As the Board reasoned, how Sourcefire obtains TLS-
    version values is irrelevant to the claims’ scope. ’552 Deci-
    sion, 
    2020 WL 402817
    , at *17–18, ’713 Decision, 
    2020 WL 402317
    , at *8. The claims in the ’552 and ’713 patents do
    not require that each individual packet is inspected for the
    TLS-version value, but only that a determination is made
    as to what that value is. See ’552 patent, col. 11, lines 5–
    35 (claims require “a determination . . . that one or more
    packets, of the at least a portion of the plurality of HTTPS
    packets, have one or more application-header-field-values
    Case: 20-1635     Document: 49      Page: 18     Filed: 03/10/2021
    18        CENTRIPETAL NETWORKS, INC.     v. CISCO SYSTEMS, INC.
    corresponding to one or more TLS-version values”); ’713 pa-
    tent, col. 11, lines 8–25 (claims require “a determination
    . . . that [a packet received first or a packet received second]
    comprises data corresponding to a transport layer security
    TLS-version value”).
    Further, Centripetal’s expert, Dr. Orso, acknowledged
    that the TLS-version value in a reassembled handshake is
    virtually always identical to the value for the individual
    packets associated with that handshake. J.A. 4647–48
    (171:6–174:16). And substantial evidence established that
    relevant artisans would have understood that the TLS-
    version value is found in the first packet of a message. J.A.
    809–10; J.A. 4653. Thus, the Board reasonably found that
    Sourcefire teaches determining this exact value because
    the information it obtains from the handshake will be iden-
    tical to the first packet’s header. See J.A. 2252 (“The SSL
    preprocessor extracts state and version information from
    specific handshake fields. Two fields within the handshake
    indicate the version of SSL or TLS used to encrypt the ses-
    sion and the stage of the handshake.”). Substantial evi-
    dence thus supports the Board’s finding that Sourcefire
    teaches the “determination” limitations of the patent
    claims.
    2
    Centripetal argues that the Board erred by finding a
    motivation to modify Sourcefire based on “common sense,”
    Centripetal Opening Br. 24–27, and by not properly consid-
    ering objective indicia of nonobviousness that negate any
    motivation a relevant artisan would have had to modify
    Sourcefire, 
    id.
     at 27–31.
    Centripetal’s motivation argument substantially over-
    laps with its arguments that Sourcefire does not teach the
    “determination” limitations required by the claims. Specif-
    ically, Centripetal argues that the Board found that a rele-
    vant artisan would have been motivated to modify
    Sourcefire to include the “missing” claim limitations—the
    Case: 20-1635    Document: 49     Page: 19     Filed: 03/10/2021
    CENTRIPETAL NETWORKS, INC.   v. CISCO SYSTEMS, INC.       19
    “determination” limitations—and that such a finding was
    error because Sourcefire makes determinations from a re-
    assembled packet stream, and a relevant artisan would not
    be motivated to modify that system to inspect individual
    packets. Centripetal Opening Br. 24–27. But the Board
    did not find that these limitations were “missing”; it found
    that Sourcefire taught the “determination” limitations be-
    cause such limitations were not limited to systems that in-
    spect individual packets. See ’552 Decision, 
    2020 WL 402817
    , at *17–19; ’713 Decision, 
    2020 WL 402317
    , at *8.
    And, as discussed above, nothing in either patent’s claims
    requires individual packets to be inspected in order to de-
    termine their TLS-version value.
    We also reject Centripetal’s argument that the Board
    failed to properly weigh objective indicia of nonobviousness
    (specifically, long-felt but unmet need, industry praise, and
    commercial success/licensing). “In order to accord substan-
    tial weight to secondary considerations in an obviousness
    analysis, ‘the evidence of secondary considerations must
    have a “nexus” to the claims, i.e., there must be “a legally
    and factually sufficient connection” between the evidence
    and the patented invention.’” Fox Factory, Inc. v. SRAM,
    LLC, 
    944 F.3d 1366
    , 1373 (Fed. Cir. 2019) (quoting Henny
    Penny Corp. v. Frymaster LLC, 
    938 F.3d 1324
    , 1332 (Fed.
    Cir. 2019) (citing Demaco Corp. v. F. Von Langsdorff Li-
    censing Ltd., 
    851 F.2d 1387
    , 1392 (Fed. Cir. 1988)).
    Here, Centripetal presented several articles praising
    its RuleGATE product as evidence of industry praise and
    long-felt but unmet need, including a paper (the ESG pa-
    per), J.A. 6900–08, and a Gartner article, J.A. 6909–18.
    But the RuleGATE product contains far more than what is
    claimed in the patent claims at issue here. And as the
    Board found, nothing in those articles ties the praise of
    RuleGATE, its alleged filling of an unmet need, or its suc-
    cess to the limitations in the claims. See ’552 Decision,
    
    2020 WL 402817
    , at *22–24; ’713 Decision, 
    2020 WL 402317
    , at *10–12; see also Polaris, 882 F.3d at 1072.
    Case: 20-1635    Document: 49      Page: 20    Filed: 03/10/2021
    20        CENTRIPETAL NETWORKS, INC.    v. CISCO SYSTEMS, INC.
    Indeed, Centripetal’s expert did not even create a claim-
    construction chart to map the products to each limitation.
    J.A. 4615–16. On this record, we agree with the Board that
    the objective indicia of nonobviousness were not entitled to
    substantial weight.
    3
    Finally, Centripetal challenges the Board’s finding
    that Sourcefire teaches the operator required by the ’552
    patent. Centripetal argues that Sourcefire relies on “Snort
    rules” that include a “Rule Header” with a single specified
    “rule action” that can be taken only “‘if the packet data
    matches all the conditions specified in a rule.’” Centripetal
    Opening Br. 32–33 (quoting J.A. 2188). For that reason,
    Centripetal urges, Sourcefire cannot disclose the required
    operator because its rules cannot “apply different packet
    transformation functions for different TLS-version values.”
    Id.
    But the ’552 patent’s claims do not require that a rule
    provide for more than one action. See, e.g., ’552 patent, col.
    11, lines 5–35. Moreover, even under Centripetal’s con-
    struction of “operator,” the Board found, Sourcefire teaches
    an operator that meets both criteria required by that con-
    struction—that is, Sourcefire (1) determines “application-
    header-field-value criteria” through its keyword function
    (e.g., identifies the packets’ TLS-version value) and (2) ap-
    plies a “packet transformation function” by using its Rule
    Action function to either block, alert, or allow packets
    matching the application-header-field-value criteria corre-
    sponding to the rule. ’552 Decision, 
    2020 WL 402817
    , at
    *19–21; J.A. 2189–92, 2196. The language of the claims
    and of Sourcefire provide substantial evidence for the
    Board’s finding that Sourcefire teaches the operator in the
    ’552 patent’s claims.
    Case: 20-1635   Document: 49        Page: 21   Filed: 03/10/2021
    CENTRIPETAL NETWORKS, INC.   v. CISCO SYSTEMS, INC.       21
    III
    We have considered the remainder of Centripetal’s ar-
    guments and find them to be unpersuasive.
    For the foregoing reasons, the decisions of the Patent
    Trial and Appeal Board in IPR-1436 and IPR-1437 are af-
    firmed.
    AFFIRMED