Finjan, Inc. v. Cisco Systems, Inc.

Case: 19-2074 Document: 56 Page: 1 Filed: 12/30/2020 NOTE: This disposition is nonprecedential. United States Court of Appeals for the Federal Circuit ______________________ FINJAN, INC., Appellant v. CISCO SYSTEMS, INC., Cross-Appellant ______________________ 2019-2074, 2019-2146 ______________________ Appeals from the United States Patent and Trademark Office, Patent Trial and Appeal Board in No. IPR2018- 00391. ______________________ Decided: December 30, 2020 ______________________ JAMES R. HANNAH, Kramer Levin Naftalis & Frankel LLP, Menlo Park, CA, for appellant. Also represented by PAUL J. ANDRE; JEFFREY PRICE, New York, NY. PATRICK D. MCPHERSON, Duane Morris LLP, Washing- ton, DC, for cross-appellant. Also represented by PATRICK C. MULDOON; MATTHEW CHRISTOPHER GAUDET, Atlanta, GA; JOSEPH POWERS, Philadelphia, PA. ______________________ Case: 19-2074 Document: 56 Page: 2 Filed: 12/30/2020 2 FINJAN, INC. v. CISCO SYSTEMS, INC. Before LOURIE, REYNA, and WALLACH, Circuit Judges. WALLACH, Circuit Judge. Cisco Systems, Inc. (“Cisco”) sought inter partes review (“IPR”) of claims 1–4, 8, and 11–14 (“the Challenged Claims”) of Finjan, Inc.’s (“Finjan”) U.S. Patent No. 7,647,633 (“the ’633 patent”). The U.S. Patent and Trademark Office’s Patent Trial and Appeal Board (“PTAB”) issued a final written decision concluding that Cisco “ha[d] shown by a preponderance of the evidence that claims 1–4, 8, and 11–13 of the ’633 patent are unpatenta- ble” as obvious, but “ha[d] not shown by a preponderance of the evidence that [independent] claim 14 of the ’633 pa- tent is unpatentable” as obvious. Cisco Sys., Inc. v. Finjan, Inc., No. IPR2018-00391, 2019 WL 2237141, at *1 (P.T.A.B. May 23, 2019). Finjan appeals and Cisco cross-appeals. We have ju- risdiction pursuant to 28 U.S.C. § 1295(a)(4)(A). We affirm. BACKGROUND I. The ’633 Patent Entitled “Malicious Mobile Code Runtime Monitoring System and Methods,” the ’633 patent “relates generally to computer networks, and more particularly” to “a system and methods for protecting network-connectable devices from undesirable downloadable operation.” ’633 patent col. 1 ll. 30–33. The ’633 patent “provides protection sys- tems and methods capable of protecting . . . network acces- sible devices or processes,” such as personal computers, “from harmful, undesirable, suspicious or other ‘malicious’ operations that might otherwise be effectuated by remotely operable code,” such as computer viruses. Id. col. 2 ll. 20– 25; see id. col. 1 ll. 40–44 (noting that “the Internet and other public networks have . . . become a major source of potentially system-fatal or otherwise damaging computer code commonly referred to as ‘viruses’”). The ’633 patent discloses “embodiments” that first “determin[e], within one Case: 19-2074 Document: 56 Page: 3 Filed: 12/30/2020 FINJAN, INC. v. CISCO SYSTEMS, INC. 3 or more network ‘servers’ . . . whether received information includes executable code”—referred to as a “Down- loadable”—then, based on that determination, “deliver[] static, configurable, and/or extensible remotely operable protection [code or] policies” to the location of the Down- loadable, and “caus[e] the mobile protection code to be exe- cuted within a Downloadable-destination in a manner that enables various Downloadable operations to be detected, intercepted or further responded to via protection opera- tions.” Id. col. 2 ll. 39–55; see id. col. 1 ll. 60–66 (providing that “[d]ownloadable information” may include “distribut- able components (e.g.[,] Java™ applets and JavaScript scripts, ActiveX™ controls, Visual Basic, add-ins and/or others)” and “application programs, Trojan horses, multi- ple compressed programs such as zip or meta files, among others”), col. 2 ll. 28–33 (similar). Independent claims 1 and 14, and claims 2 and 3 of the ’633 patent, are illustrative. Independent claim 1 recites: A computer processor-based method, comprising: receiving, by a computer, downloadable-in- formation; determining, by the computer, whether the downloadable-information includes execut- able code; and based upon the determination, transmit- ting from the computer mobile protection code to at least one information-destination of the downloadable-information, if the downloadable-information is determined to include executable code. Id. col. 20 ll. 54–62. Claim 2 depends from independent claim 1, and provides that “receiving includes monitoring received information of an information re-communicator.” Id. col. 20 ll. 63–65. Claim 3, which depends from claim 2, Case: 19-2074 Document: 56 Page: 4 Filed: 12/30/2020 4 FINJAN, INC. v. CISCO SYSTEMS, INC. provides that claim 2’s “information re-communicator is a network server.” Id. col. 20 ll. 66–67. Independent claim 14 recites: A computer program product, comprising a com- puter usable medium having a computer readable program code therein, the computer readable pro- gram code adapted to be executed for computer se- curity, the method comprising: providing a system, wherein the system comprises distinct software modules, and wherein the distinct software modules com- prise an information re-communicator and a mobile code executor; receiving, at the information re-communi- cator, downloadable-information including executable code; and causing mobile protection code to be exe- cuted by the mobile code executor at a downloadable-information destination such that one or more operations of the ex- ecutable code at the destination, if at- tempted, will be processed by the mobile protection code. Id. col. 21 l. 58–col. 22 l. 5. II. The Prior Art A. Hanson Entitled “Reverse Proxy Server,” WIPO Pub. No. WO 98/31124 (“Hanson”) is an international application published under the Patent Cooperation Treaty, and “re- lates to client/server computer communications over an in- ternetwork system and, more particularly, to improved access of firewall protected servers.” J.A. 833; see J.A. 831– Case: 19-2074 Document: 56 Page: 5 Filed: 12/30/2020 FINJAN, INC. v. CISCO SYSTEMS, INC. 5 52 (Hanson). 1 Hanson discloses “a method and system for securely accessing servers” over a network by providing “secure bi-directional data packet communication between” an external “client . . . and [internal] servers,” with the servers “protected by a firewall . . . and bastion server.” J.A. 835–36. The bastion server “includes a processor and memory like typical servers, but also includes an internal [IP] address file . . . and a rules file . . . stored in memory.” J.A. 836. 2 Hanson teaches that its bastion server uses its address and rule files to limit “external access to [the internal serv- ers] through the firewall,” J.A. 837, specifically, by check- ing both outgoing and incoming “data packet[s]” against its internal address file and rules file, J.A. 838. Data packets are routed through the bastion server. J.A. 838. Incoming data packets are addressed to an internal server name. J.A. 838. The bastion server receives the data packet and, first, “determines whether a match exists between the server name and an internal address located in the inter- nal address file.” J.A. 838. “If no match is found, the bas- tion” server notifies the client that the “packet cannot be delivered.” J.A. 838. If the address is found, the bastion server then “check[s]” “the received packet . . . against [the] rules contained within the rules file.” J.A. 838. If the data packet “fails to pass” any of the rules, the bastion server notifies the client and does not deliver the packet. J.A. 838. “[I]f the received packet passes all the rules contained within the rules file, a connection is made between the cli- ent and the [addressed internal] server” and the packet is delivered. J.A. 838. “The rule checks include certain 1 Hanson defines “internetwork” as “the joining of multiple computer networks, both similar and dissimilar, by means of gateways or routers that facilitate data trans- fer and conversion from various networks.” J.A. 833. 2 A “bastion server” is “a special-purpose computer on a network . . . specifically designed and configured to protect against unauthorized access.” J.A. 775. Case: 19-2074 Document: 56 Page: 6 Filed: 12/30/2020 6 FINJAN, INC. v. CISCO SYSTEMS, INC. security [check] programs that operate upon received data packets and, particularly, data packets that are or include programs.” J.A. 838; see J.A. 842–43 (providing that these programs may be “J[ava™] applets” or “ActiveX[™] pro- grams which are intended to be run on the destination cli- ent or server”). Hanson explains that the “security check program” does this by “tagging” or “attaching itself to the [executable code] being sent in the data packet,” such that, when the executable code is “run at the destination client or server,” the security check program “runs simultane- ously” and “performs [the necessary] security operations.” J.A. 842, 845. Outgoing packets undergo a similar check through the bastion server. J.A. 840. B. Hyppönen Entitled “Computer Virus Screening,” U.S. Patent No. 6,577,920 (“Hyppönen”) “relates to the screening of computer data for viruses and more particularly to the screening of computer data for macro viruses.” J.A. 857; see J.A. 854–61 (Hyppönen). Hyppönen defines “macros” as “small executable programs written in a simple high level language” that provide, for example, “customized menu bars” or “document templates” in word processing programs. J.A. 857. Hyppönen discloses a “method of screening a software file for viral infection” using three databases—one “of known macro virus signatures, a second . . . of known and certified commercial macro signatures, and a third . . . of known and certified local macro signatures.” J.A. 854. Hyppönen teaches that a software file may be “scanned to determine whether or not [it] contains a macro.” J.A. 854. “If [it does] contain[] a macro,” then the method determines “a signature for the macro” such that it may be “screened against the signatures contained in [the three] databases” of known signatures. J.A. 854. If the macro is a known virus, the file system event is suspended and the user alerted. J.A. 859. If the macro is a known legitimate Case: 19-2074 Document: 56 Page: 7 Filed: 12/30/2020 FINJAN, INC. v. CISCO SYSTEMS, INC. 7 program, it is allowed to proceed. J.A. 859. If the macro is unknown and unverifiable, the file system event is sus- pended and “a report is sent to the network manager” with “a copy of the [unknown] macro.” J.A. 859. The databases may be updated as more macros are encountered or become available. J.A. 857. Hyppönen suggests that its system may be modified “to screen files for viruses other than macro viruses.” J.A. 859. DISCUSSION Finjan argues that the PTAB made a series of claim construction errors, and that, under the proper construc- tion, claims 1–4, 8, and 11–13 of the ’633 patent are not obvious over Hanson and Hyppönen. Appellant’s Br. 20– 36. On cross-appeal, Cisco argues that the PTAB’s conclu- sion that independent claim 14 of the ’633 patent is not ob- vious over Hanson and Hyppönen is unsupported by substantial evidence. Cross-appellant’s Br. 40. We ad- dress each argument in turn. I. Standard of Review “We review the PTAB’s factual findings for substantial evidence and its legal conclusions de novo.” Redline Detec- tion, LLC v. Star Envirotech, Inc., 811 F.3d 435, 449 (Fed. Cir. 2015) (citation omitted). “Substantial evidence is something less than the weight of the evidence but more than a mere scintilla of evidence,” meaning that “[i]t is such relevant evidence as a reasonable mind might accept as ad- equate to support a conclusion.” In re NuVasive, Inc., 842 F.3d 1376, 1379–80 (Fed. Cir. 2016) (internal quotation marks and citations omitted). “If two inconsistent conclu- sions may reasonably be drawn from the evidence in rec- ord, the PTAB’s decision to favor one conclusion over the other is the epitome of a decision that must be sustained upon review for substantial evidence.” Elbit Sys. of Am., LLC v. Thales Visionix, Inc., 881 F.3d 1354, 1356 (Fed. Cir. 2018) (internal quotation marks, brackets, and cita- tion omitted). Case: 19-2074 Document: 56 Page: 8 Filed: 12/30/2020 8 FINJAN, INC. v. CISCO SYSTEMS, INC. II. Claim Construction A. Legal Standard “[C]laim construction must begin with the words of the claims themselves.” Amgen Inc. v. Hoechst Marion Rous- sel, Inc., 457 F.3d 1293, 1301 (Fed. Cir. 2006) (citation omitted). “[W]ords of a claim are generally given their or- dinary and customary meaning,” i.e., “the meaning that the term would have to a person of ordinary skill in the art [(‘PHOSITA’)] in question at the time of the invention[.]” Phillips v. AWH Corp., 415 F.3d 1303, 1312–13 (Fed. Cir. 2005) (en banc) (internal quotation marks and citation omitted). 3 “The words used in the claims are interpreted in light of the intrinsic evidence of record, including the written description, the drawings, and the prosecution his- tory[.]” Teleflex, Inc. v. Ficosa N. Am. Corp., 299 F.3d 1313, 1324 (Fed. Cir. 2002) (citation omitted). The PHOSITA “is deemed to read [a] claim term not only in the context of the particular claim in which [it] appears, but in the context of the entire patent, including the specification.” Phillips, 415 F.3d at 1313. 4 Prosecution history may also be looked 3 Because the ’633 patent expired between conclu- sion of the IPR and this appeal, see Appellant’s Br. 20 (not- ing that the ’633 patent expired in November 2019); see generally Cross-appellant’s Br. (discussing neither expira- tion of the ’633 patent nor the appropriate claim construc- tion standard), we construe the Challenged Claims in accordance with the standard set forth in Phillips, 415 F.3d at 1312–13, rather than the broadest reasonable interpre- tation (“BRI”) as applied by the PTAB, Cisco, 2019 WL 2237141, at *2; see In re Rambus, Inc., 753 F.3d 1253, 1256 (Fed. Cir. 2014) (providing that, once a patent has expired, “we apply the Phillips claim construction standards”). 4 The “specification includes both the written de- scription and the claims of the patent.” Cisco Sys., Inc. v. TQ Delta, LLC, 928 F.3d 1359, 1362 (Fed. Cir. 2019) (inter- nal quotation marks and citation omitted). Case: 19-2074 Document: 56 Page: 9 Filed: 12/30/2020 FINJAN, INC. v. CISCO SYSTEMS, INC. 9 to in order to supply additional evidence of a claim term’s intended meaning. See Home Diagnostics, Inc. v. Lifescan, Inc., 381 F.3d 1352, 1356 (Fed. Cir. 2004). 5 “A patent’s specification, together with its prosecution history, consti- tutes intrinsic evidence to which the PTAB gives priority when it construes claims.” Knowles Elecs. LLC v. Cirrus Logic, Inc., 883 F.3d 1358, 1361−62 (Fed. Cir. 2018) (cita- tion omitted). We review the PTAB’s assessment of the in- trinsic evidence de novo and extrinsic evidence for substantial evidence. See id. at 1362. B. The PTAB Properly Construed the Term “Information Re-Communicator” The PTAB concluded that the “information re-commu- nicator” as recited in claims 2 and 3 “is not limited to re- ceiving downloadable-information from an external network.” Cisco, 2019 WL 2237141, at *4. Finjan argues that, by not requiring that the received downloadable in- formation come “from an external network,” the PTAB’s construction is “overbroad and inconsistent with the speci- fication and [expert] testimony.” Appellant’s Br. 33–34. 6 We disagree with Finjan. The PTAB properly construed the term “information re-communicator.” Consistent with claim construction principles, we look first to the language of the claims, 5 A patent’s prosecution history “consists of the com- plete record of the proceedings before the [US]PTO,” providing “evidence of how the [US]PTO and the inventor understood the patent.” Phillips, 415 F.3d at 1317 (citation omitted). 6 Finjan refers to the recited “information re-commu- nicator” as the “information re-communicator/monitor.” See, e.g., Appellant’s Br. 34. Finjan does not raise any ar- guments specific to the term “monitor.” See generally Ap- pellant’s Br. Consistent with the PTAB, we discuss this term as the “information re-communicator.” See, e.g., Cisco, 2019 WL 2237141, at *4. Case: 19-2074 Document: 56 Page: 10 Filed: 12/30/2020 10 FINJAN, INC. v. CISCO SYSTEMS, INC. followed by the language of the specification and prosecu- tion history. See Phillips, 415 F.3d at 1315–17. Independ- ent claim 1 recites “[a] computer processor based method” in which “a computer” “receiv[es] . . . downloadable infor- mation.” ’633 patent col. 20 ll. 54–56. Dependent claims 2 and 3 further provide that this “receiving” may be done by an “information re-communicator” within the computer, id. col. 20 ll. 63–65, and the “information re-communicator” may be a “network server,” id. col. 20 ll. 66–67. The claim language does not, however, specify from where the “down- loadable information” is “receiv[ed].” See id. col. 20 ll. 64– 67. This indicates that the “information re-communicator” is not limited to receiving “downloadable information” from an external network. See Phillips, 415 F.3d at 1314 (“[T]he claims themselves provide substantial guidance as to the meaning of particular claim terms.”). Accordingly, the PTAB properly concluded that the “claims are silent as to the source of the ‘downloadable-information,’” and, as such, the plain meaning of the claim language” does not require that source be “an external network.” Cisco, 2019 WL 2237141, at *4. We next turn to the specification. See Phillips, 415 F.3d at 1315 (“[C]laims must be read in view of the specifi- cation, of which they are a part.” (internal quotation marks and citation omitted)). The specification repeatedly de- scribes the “re-communicator” as a “server” or “firewall.” See, e.g., ’633 patent, Abstract (disclosing embodiments with “a server, firewall or other suitable ‘re-communica- tor’”); id. col. 5 ll. 34–36 (“Embodiments provide, within one or more ‘servers’ (e.g.[,] firewalls, resources, gateways, email relays or other information re-communicating de- vices)[.]”). The specification provides that “re-communica- tors” include “one or more network servers, firewalls or other network connectable information re-communicating devices.” Id. col. 2 ll. 58–62. Thus, based on the specifica- tion, “information re-communicators” are devices that re- communicate received information, regardless of whether Case: 19-2074 Document: 56 Page: 11 Filed: 12/30/2020 FINJAN, INC. v. CISCO SYSTEMS, INC. 11 that information comes from an external network or other source. The specification does not narrow the term “infor- mation re-communicator,” and instead, supports the con- clusion that the “information re-communicator” is not limited to receiving “downloadable information” from an external network. Accordingly, the PTAB properly con- cluded that the specification “does not restrict” the “infor- mation re-communicator” to “processing the downloadable- information solely” from “external networks.” Cisco, 2019 WL 2237141, at *4. 7 Finjan’s primary counterargument is unpersuasive. Finjan “does not disagree” that “(1) the claims are silent as to the source of the downloadable-information and (2) the [s]pecification describes consistently a server or a firewall as a re-communicator.” Appellant’s Br. 33 (internal quota- tion marks and citation omitted). Finjan nonetheless urges us to adopt an additional limitation to the term because, based on expert testimony, “a P[H]OS[IT]A would under- stand . . . ‘information re-communicator’” to require it. Id.; see id. at 34 (citing J.A. 2302 (Finjan’s expert testimony), 2369 (Cisco’s expert deposition)). This argument is without merit. First, while “extrinsic evidence,” such as expert tes- timony, “can shed useful light on the relevant art,” “it is less significant than the intrinsic record[.]” Phillips, 415 F.3d at 1317. Finjan agrees that the claims are silent as to whether “downloadable-information” must come from an external network and that the specification does not re- quire it. Appellant’s Br. 33. Where, as here, “an analysis of the intrinsic evidence alone will resolve any ambiguity in [the] disputed claim term,” it is “improper to rely on ex- trinsic evidence,” such as expert testimony, to introduce 7 Neither party argues that the prosecution history illuminates the meaning of “information re-communica- tor.” Accordingly, we do not consider it here. See Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996) (providing that we will consider the prosecution history “if in evidence”). Case: 19-2074 Document: 56 Page: 12 Filed: 12/30/2020 12 FINJAN, INC. v. CISCO SYSTEMS, INC. ambiguity. Vitronics, 90 F.3d at 1583; see Phillips, 415 F.3d at 1318 (“[A] court should discount any expert testi- mony that is clearly at odds with the claim construction mandated by the claims themselves, the written descrip- tion, and the prosecution history[.]”). Second, Finjan’s proffered expert testimony does not persuasively support its argument that the term “infor- mation re-communicator” must be narrowed to receiving “downloadable-information from” only “an external net- work.” Appellant’s Br. 33. Finjan’s expert testimony is premised on exemplary embodiments of the ’633 patent. J.A. 2302–04. Finjan’s expert explains that the ’633 pa- tent’s “information re-communicator” receives “down- loadable-information from an external network” because “the ’633 patent describes” an exemplary embodiment with “a network that includes subsystems . . . , which are sepa- rated via [an] external network . . . from resource serv- ers[.]” J.A. 2302–03 (citing ’633 patent col. 5 l. 63–col. 6 l. 33, Figs. 1a, 1b, 1c); see ’633 patent col. 5 ll. 57–62 (ex- plaining that “F[igs]. 1a through 1c illustrate a computer network system . . . according to an embodiment of the in- vention. F[ig]. 1a broadly illustrates [a] system . . . , while F[igs]. 1b and 1c illustrate exemplary protectable subsys- tem implementations[.]”), col. 5 l. 63–col. 6 l. 33 (describing Figs. 1a, 1b, and 1c). That is, Finjan’s expert seeks to im- properly read “limitations from the specification . . . into the patent claims.” Bell Atl. Network Servs., Inc. v. Covad Commc’ns Grp., Inc., 262 F.3d 1258, 1270 (Fed. Cir. 2001). Finjan also asserts that Cisco’s expert “agreed that the claimed ‘information re-communicator . . .’ must receive downloadable information over an external network.” Ap- pellant’s Br. at 18; see id. at 34 (similar). Finjan is incor- rect. Cisco’s expert declined to “construe any terms,” but noted, when asked “[w]hat problem the ’633 patent” tries to “solve,” that he “underst[oo]d from reading the patent that the re[-]communicator receives the downloadable in- formation from the external network,” with Case: 19-2074 Document: 56 Page: 13 Filed: 12/30/2020 FINJAN, INC. v. CISCO SYSTEMS, INC. 13 “downloadables” only “usually” “downloaded from an exter- nal network.” J.A. 2368–69 (without citation or specific ref- erence). Even if we were to interpret this statement as requiring “an external network” as Finjan urges, “[w]here the patent documents are unambiguous, expert testimony regarding the meaning of a claim is entitled to no weight.” Texas Digital Sys., Inc. v. Telegenix, Inc., 308 F.3d 1193, 1212 (Fed. Cir. 2002); Vitronics, 90 F.3d at 1584 (“[E]xpert testimony . . . often only indicates what a particular expert believes a term means[.]”). The PTAB, therefore, properly construed the term “information re-communicator” as “not limited to receiving downloadable-information from an ex- ternal network.” Cisco, 2019 WL 2237141, at *4; see In re CSB-Sys. Int’l, Inc., 832 F.3d 1335, 1341 (Fed. Cir. 2016) (“In many cases, the claim construction will be the same under the Phillips and BRI standards.”). 8 II. Obviousness A. Legal Standard A patent claim is invalid “if the differences between the subject matter sought to be patented and the prior art are such that the subject matter as a whole would have been obvious at the time the invention was made to a 8 Finjan’s argument that Hanson “does not disclose an ‘information re-communicator,’” is predicated on us adopting Finjan’s construction of “information re-commu- nicator.” Appellant’s Br. 36 (arguing that Hanson “does not disclose an ‘information re-communicator . . .’ under the proper construction”). Because we do not adopt Fin- jan’s construction, we need not address Finjan’s conditional argument. See Knowles Elecs. LLC v. Iancu, 886 F.3d 1369, 1373 n.3 (Fed. Cir. 2018) (“Because we conclude that the PTAB did not err in its construction of the disputed limitation, we need not address the appellant’s conditional arguments as to the PTAB’s unpatentability determina- tions.” (internal quotation marks, brackets, and citation omitted)). Case: 19-2074 Document: 56 Page: 14 Filed: 12/30/2020 14 FINJAN, INC. v. CISCO SYSTEMS, INC. [PHOSITA].” 35 U.S.C. § 103(a) (2006). 9 Obviousness “is a question of law based on underlying findings of fact.” See In re Gartside, 203 F.3d 1305, 1316 (Fed. Cir. 2000). Those underlying findings of fact include: (1) “the scope and con- tent of the prior art,” (2) “differences between the prior art and the claims at issue,” (3) “the level of ordinary skill in the pertinent art,” and (4) the presence of objective indicia of nonobviousness such “as commercial success, long felt but unsolved needs, failure of others,” and unexpected re- sults. Graham v. John Deere Co. of Kan. City, 383 U.S. 1, 17 (1966); see United States v. Adams, 383 U.S. 39, 50–52 (1966). In assessing the prior art, the PTAB also “con- sider[s] whether a PHOSITA would have been motivated to combine the prior art to achieve the claimed invention and whether there would have been a reasonable expecta- tion of success in doing so.” In re Warsaw Orthopedic, Inc., 832 F.3d 1327, 1333 (Fed. Cir. 2016) (internal quotation marks, brackets, and citation omitted). “What a prior art reference teaches and whether a [PHOSITA] would have been motivated to combine references are questions of fact.” Apple Inc. v. Samsung Elecs. Co., Ltd., 839 F.3d 1034, 1051 (Fed. Cir. 2016) (en banc). B. Substantial Evidence Supports the PTAB’s Finding that Hanson Discloses “Downloadable-Information” as Recited in Independent Claim 1 The PTAB concluded that it “need not construe the term” “downloadable-information,” because even if it 9 Congress amended § 103 when it enacted the Leahy-Smith America Invents Act (“AIA”). Pub. L. No. 112-29, § 3(c), 125 Stat. 284, 287 (2011). However, be- cause the application that led to the ’633 patent never con- tained (1) a claim having an effective filing date on or after March 16, 2013, or (2) a reference under 35 U.S.C. §§ 120, 121, or 365(c) to any patent or application that ever con- tained such a claim, the pre-AIA § 103 applies. See AIA, § 3(n)(1), 125 Stat. at 293; ’633 patent, Cover Page. Case: 19-2074 Document: 56 Page: 15 Filed: 12/30/2020 FINJAN, INC. v. CISCO SYSTEMS, INC. 15 adopted Finjan’s proposed construction, Cisco “ha[d] shown that prior art teaches the limitation.” Cisco, 2019 WL 2237141, at *5; see id. (noting that Finjan defined the term “downloadable-information” as “information which is downloaded from a source computer which may or may not include executable code” (quoting J.A. 305 (Patent Owner’s Response)). The PTAB then found that “Hanson’s bastion server receives ‘downloadable-information’” and, therefore, Hanson teaches “receiving . . . downloadable-information” as recited in independent claim 1. Id. at *13. Finjan ar- gues that the PTAB’s construction of “downloadable-infor- mation” was “premised on a very clear misinterpretation of Finjan’s argument.” Appellant’s Br. 29. Finjan asserts that the PTAB’s “failure to address Finjan’s actual argu- ment means that” the PTAB’s finding that Hanson teaches “receiving . . . downloadable-information” is unsupported by substantial evidence. Id. at 31. We disagree with Fin- jan. Substantial evidence supports the PTAB’s finding that Hanson teaches “receiving . . . downloadable-information.” Independent claim 1 recites a “computer processor-based method,” in which “a computer” first “receiv[es] . . . down- loadable-information,” then “determin[es] . . . whether the downloadable-information includes executable code,” and last, “if the downloadable-information is determined to in- clude executable code,” “transmit[s] . . . [a] mobile protec- tion code to [an] information-destination of the downloadable-information.” ’633 patent col. 20 ll. 54–62. “Downloadable-information” is “information which is downloaded from a source computer which may or may not include executable code.” Cisco, 2019 WL 2237141, at *5 (quoting J.A. 305); see Appellant’s Br. 27–28 (offering the same definition); J.A. 305 (same). Hanson discloses, in relevant part, that its bastion server—a computer, J.A. 836; see J.A. 775—receives both incoming (“received”) and outgoing (“reply”) data packets for and from a client and checks these data packets against Case: 19-2074 Document: 56 Page: 16 Filed: 12/30/2020 16 FINJAN, INC. v. CISCO SYSTEMS, INC. address and rules files, J.A. 838. Hanson explains that, for received packets, its bastion server runs “rule checks” that “include certain security [check] programs that operate upon received data packets and, particularly, data packets that are or include programs.” J.A. 838. These programs may be, for example, “J[ava™] applets” or “ActiveX[™] pro- grams which are intended to be run on the destination cli- ent or server.” J.A. 842–43. The bastion server performs “[s]imilar” checks on “outgoing” or “reply data packet[s].” J.A. 840. Both Java™ applets and ActiveX™ programs are “downloadable” information. J.A. 842–43; see ’633 patent col. 1 ll. 60–63, col. 2 ll. 28–33. Hanson, therefore, teaches “a computer,” specifically its bastion server, that “re- ceive[s] . . . downloadable-information,” such as Java™ ap- plets and ActiveX™ programs, in both incoming and outgoing data packets. ’633 patent col. 20 ll. 54–62; J.A. 842–43. Accordingly, substantial evidence supports the PTAB’s finding that Hanson discloses “the transmit- ting step” of independent claim 1, “a computer” that “re- ceive[s] . . . downloadable-information.” Cisco, 2019 WL 2237141, at *12–13; see NuVasive, 842 F.3d at 1380 (“[Substantial evidence] is such relevant evidence as a rea- sonable mind might accept as adequate to support a con- clusion.” (internal quotation marks and citations omitted)). Finjan’s counterarguments are unpersuasive. First, to the extent Finjan tries to alter its proposed construction of “downloadable-information” on appeal, see Appellant’s Br. 27 (arguing that the PTAB’s “construction of ‘down- loadable-information’ is overbroad”), its argument is waived, see Conoco, Inc. v. Energy & Envtl. Int’l, L.C., 460 F.3d 1349, 1358–59 (Fed. Cir. 2006) (“[A] party may not in- troduce new claim construction arguments on appeal or al- ter the scope of the claim construction positions it took below.”). To the extent Finjan argues that the PTAB mis- understood its proposed claim construction, Appellant’s Br. 31 (suggesting that the PTAB was “confused”), 32 (sug- gesting that the PTAB “set up a strawman”), its argument Case: 19-2074 Document: 56 Page: 17 Filed: 12/30/2020 FINJAN, INC. v. CISCO SYSTEMS, INC. 17 is without merit. Finjan argued, and continues to argue, that “downloadable-information” is “information which is downloaded from a source computer which may or may not include executable code.” Appellant’s Br. 27–28; see J.A. 305 (same). The PTAB adopted this construction ver- batim. Cisco, 2019 WL 2237141, at *5. Any issue Finjan takes with the PTAB’s understanding of what the prior art teaches in light of its claim construction is a substantial evidence challenge—“[w]hat is disclosed by a prior art ref- erence is a question of fact.” Mettler-Toledo, Inc. v. B-Tek Scales, LLC, 671 F.3d 1291, 1297 (Fed. Cir. 2012); see Ap- pellant’s Br. 27 (arguing that the PTAB “ignored . . . evi- dence” about the definition of downloadable information, when it concluded Hanson “does not disclose ‘receiving downloadable information’”). Second, Finjan argues that the PTAB’s finding that Hanson teaches “downloadable-information” is unsup- ported by substantial evidence because the PTAB “con- fused Finjan’s arguments regarding” what Hanson discloses. Appellant’s Br. 31. The PTAB stated that Finjan “characterizes [Hanson’s] reply data packets as a request for server resources.” Cisco, 2019 WL 2237141, at *13 (cit- ing J.A. 318 (Patent Owner’s Response)). Finjan asserts that it actually argued that Hanson’s incoming, request data packets are “requests for server resources and, conse- quently, are not data that can be downloaded,” Appellant’s Br. 30 (citing J.A. 318), while Hanson’s outgoing, reply data packets are “outgoing” and therefore “are not . . . down- loaded,” id. at 31 (citing J.A. 319). Finjan asserts that the PTAB’s “failure to address Finjan’s actual argument means that there is not even a scintilla of evidence supporting the [PTAB’s] finding.” Id. at 31 (internal quotation marks and citation omitted). Finjan is mistaken. The PTAB did in- deed consider Finjan’s argument—it simply found it unper- suasive. See Cisco, 2019 WL 2237141, at *13 (explaining that, while Finjan had argued that “Hanson’s bastion server does not receive ‘downloadable-information’ Case: 19-2074 Document: 56 Page: 18 Filed: 12/30/2020 18 FINJAN, INC. v. CISCO SYSTEMS, INC. because . . . requests are not data that can be downloaded,” this argument failed because “Hanson’s bastion server re- ceives data packets . . . that may include executable pro- grams,” and executable programs are examples of “downloadable information”); see also id. (explaining that Finjan’s arguments concerning Hanson’s reply data pack- ets also failed because Hanson “describes the outgoing re- ply data packets in the same vein as describing the incoming data packet,” “plac[ing] emphasis” on “secure two-way data communication,” not on differences between incoming and outgoing packets). Further, that the PTAB may have misstated that Finjan characterized Hanson’s “reply data packets” as “a request,” does not alter the PTAB’s finding that “Hanson’s bastion server receives data packets . . . that may include executable programs,” both incoming and outgoing, or undermine the substantial evi- dence that supports that conclusion. Id.; see In re Watts, 354 F.3d 1362, 1369 (Fed. Cir. 2004) (“[T]he harmless error rule applies to appeals from the [PTAB].”); Munoz v. Strahm Farms, Inc., 69 F.3d 501, 504 (Fed. Cir. 1995) (“The correction of an error must yield a different result in order for that error to have been harmful and thus prejudice a substantial right of a party.”). Accordingly, the PTAB’s finding that Hanson teaches “downloadable information” is supported by substantial evidence. 10 10Finjan also argues “Hanson in view of Hyppönen does not disclose” “determining . . . whether the down- loadable-information includes executable code.” Appel- lant’s Br. 23; see ’633 patent col. 20 ll. 56–57 (independent claim 1). While Finjan raised this argument in its prelim- inary response, J.A. 237–38, it abandoned it in its Patent Owner’s Response, J.A. 287–343; see Appellant’s Reply & Resp. 7 (arguing that it was sufficient to raise the argu- ment in its sur-reply below (citing J.A. 508–11)). Finjan was on notice that such an omission would result in waiver. J.A. 268 (PTAB Scheduling Order) (“The patent owner is cautioned that any arguments for patentability not raised Case: 19-2074 Document: 56 Page: 19 Filed: 12/30/2020 FINJAN, INC. v. CISCO SYSTEMS, INC. 19 C. Substantial Evidence Supports the PTAB’s Finding that Hanson Does Not Disclose “Executable Code” as Recited in Independent Claim 14 The PTAB concluded that Cisco “ha[d] not shown by a preponderance of the evidence that [independent] claim 14 would have been obvious over Hanson.” Cisco, 2019 WL 2237141, at *17. The PTAB explained that Cisco had failed to establish that Hanson discloses “causing mobile protec- tion code to be executed . . . at a downloadable-information destination such that one or more operations of the execut- able code . . . , if attempted, will be processed by the mobile protection code,” ’633 patent col. 22 ll. 1–5, because Cisco had failed to show that Hanson teaches, as the ’633 patent requires, that its “executable code” be “not modified” when processed by its “bastion server,” Cisco, 2019 WL 2237141, at *17. Cisco argues that the PTAB’s finding is unsup- ported by substantial evidence because Hanson “does not require [its] executable code to be modified,” Cross-appel- lant’s Br. 41, and substantial evidence does not support the conclusion Hanson’s executable code is “modified,” id. at 45. We disagree with Cisco. Substantial evidence supports the PTAB’s finding that Hanson does not disclose “executable code” as recited in in- dependent claim 14. Independent claim 14 recites “causing mobile protection code to be executed . . . at a down- loadable-information destination such that one or more op- erations of the executable code . . . , if attempted, will be processed by the mobile protection code.” ’633 patent col. 22 ll. 1–5. The PTAB concluded, and the parties do not contest, that this limitation requires that “the executable in the response will be deemed waived.”). The argument is, accordingly, waived. See NuVasive, 842 F.3d at 1380– 81 (providing that an argument raised in a preliminary re- sponse, but omitted in the patent owner’s response, despite the PTAB’s “warn[ing] . . . that this would result in waiver,” is “abandoned” and deemed “waived”). Case: 19-2074 Document: 56 Page: 20 Filed: 12/30/2020 20 FINJAN, INC. v. CISCO SYSTEMS, INC. code whose operations are processed by the mobile protec- tion code at the destination is the same as the executable code received, i.e., it undergoes no modification.” Cisco, 2019 WL 2237141, at *15; see Cross-appellant’s Br. 40; Ap- pellant’s Reply & Resp. 16. Cisco argued that a PHOSITA would have understood Hanson alone to teach this limita- tion, J.A. 126 (Petition), 435–38 (Petitioner’s Reply); it has not, however, proven that to be true, Cisco, 2019 WL 2237141, at *17. Hanson provides that its “bastion server” has “security check program[s]” that “execute if the bastion receives” executable code “as or in a data packet.” J.A. 842; see J.A. 845. These security check programs “ensure[] that the data within the data packet . . . is not destructive for the intended recipient.” J.A. 842. The “security check pro- gram” does this by “tagging” or “attaching itself to the [ex- ecutable code] being sent in the data packet,” such that, when the executable code is “run at the destination client or server,” the security check program “runs simultane- ously” and “performs [the necessary] security operations[.]” J.A. 842; see J.A. 845. Cisco’s expert stated that Hanson’s “tagging” or “attaching” were “well[-]known” “concatena- tion methods, in which two items may be interleaved or sent together in a packet or series of packets.” J.A. 1554– 55. In contrast, Finjan’s expert stated that a PHOSITA would have understood Hanson’s “attaching” or “tagging” to result in “modification” of the executable code.” J.A. 2314; see J.A. 2317. Finjan’s expert explained that in Hanson’s specific “attaching” process, a security check pro- gram is “inserted” into “the data packet carrying” the exe- cutable code, modifying it such that, when the executable code is run, the security check program “alter[s] [the] oper- ations” of the executable code and “override[s]” any de- structive operations. J.A. 2314–15 (citing J.A. 844); see J.A. 1761–62 (Cisco’s expert deposition) (explaining that “concatenation” is “a logical term” meaning two packets “go together,” that is, “are transferred as a pair,” and “[t]here are many different ways you can do that”). The PTAB cred- ited Finjan’s expert and found that Cisco had not Case: 19-2074 Document: 56 Page: 21 Filed: 12/30/2020 FINJAN, INC. v. CISCO SYSTEMS, INC. 21 established that Hanson discloses running executable code that was “not modified.” Cisco, 2019 WL 2237141, at *17. The PTAB “was within its discretion to weigh the credibil- ity of expert testimony.” Shoes by Firebug LLC v. Stride Rite Children’s Grp., LLC, 962 F.3d 1362, 1372 (Fed. Cir. 2020). Accordingly, substantial evidence supports the PTAB’s finding that Hanson does not teach processing “not modified” executable code. See Celgene Corp. v. Peter, 931 F.3d 1342, 1352 (Fed. Cir. 2019) (“[S]ubstantial evidence supports the [PTAB’s] assessment and weighing of this ev- idence, and we decline to reweigh the evidence on appeal.”). Cisco’s primary counterargument is unpersuasive. Cisco argues that the PTAB erred because it “held Cisco to a higher standard” than other petitioners, requiring “Cisco . . . prove [a] negative—that [Hanson’s] executable [code] was not modified[,] even though Hanson does not disclose any modification[.]” Cross-appellant’s Br. 40. This argument is without merit. The PTAB required that Cisco prove what it pled—that Hanson teaches what independ- ent claim 14 recites, “executable code” that “is not modi- fied.” Cisco, 2019 WL 2237141, at *15. The PTAB did not err by requiring that Cisco “have the burden of proving . . . unpatentability by a preponderance of the evidence.” 35 U.S.C. § 316(e); see Novo Nordisk A/S v. Caraco Pharm. Labs., Ltd., 719 F.3d 1346, 1352 (Fed. Cir. 2013) (“[A] party challenging [a patent’s] validity bears the burden of prov- ing the factual elements of invalidity[.]”). Cisco argues that, because Hanson’s plain language “does not require the executable code to be modified,” it discloses running ex- ecutable code that is “not modified.” Appellant’s Br. 41. This is insufficient. “Mere speculation is not substantial evidence.” OSI Pharm., LLC v. Apotex Inc., 939 F.3d 1375, 1382 (Fed. Cir. 2019) (internal quotation marks and cita- tion omitted). Accordingly, the PTAB’s conclusion that Cisco failed to establish that independent claim 14 of the ’633 patent would have been obvious over Hanson, is sup- ported by substantial evidence. Case: 19-2074 Document: 56 Page: 22 Filed: 12/30/2020 22 FINJAN, INC. v. CISCO SYSTEMS, INC. CONCLUSION We have considered the parties’ remaining arguments and find them unpersuasive. 11 Accordingly, the Final 11 Finjan also proposes a construction of “mobile pro- tection code” as recited in independent claim 1. Appellant’s Br. 20. Finjan did not, however, raise this argument before the PTAB. J.A. 305–06 (Patent Owner’s Response). It is therefore waived. See Conoco, 460 F.3d at 1358. Finjan argues we should nonetheless consider its new construc- tion, asserting that “the circumstances . . . warrant deviat- ing from th[e] [general] principle” of waiver. Appellant’s Br. 22. Finjan has not, however, shown any “exceptional circumstances” to warrant consideration of its untimely ar- gument. In re Baxter Int’l, Inc., 678 F.3d 1357, 1362 (Fed. Cir. 2012). First, Finjan asserts that Cisco “would not be preju- diced” because Cisco “advocated” for the same “construc- tion” in parallel district court proceedings. Appellant’s Br. 21. Finjan’s assertion is, at best, inaccurate. J.A. 2957 (Cisco’s Responsive Supplemental Claim Construction Brief) (arguing, before the district court, that construction of “mobile protection code” was “unnecessary,” but stipulat- ing to Finjan’s construction “in th[at] case to eliminate the dispute”). Further, whatever construction Cisco subse- quently stipulated to in other proceedings, Finjan must have “timely present[ed] [its] arguments to the [PTAB].” Baxter, 678 F.3d at 1362. Second, Finjan argues that we should consider its waived claim construction because, in effect, we owe no def- erence to the PTAB. Appellant’s Br. 22–23; see id. at 22 (noting our de novo standard of review for claim construc- tion), 22–23 (noting that, because the ’633 patent expired between the PTAB’s decision and our review, our analysis shifts from BRI to Phillips), 23 (noting the “strange circum- stances” of the PTAB’s decision—specifically, that the PTAB changed its mind about the efficacy of Finjan’s argu- ments between institution and its final written decision). Case: 19-2074 Document: 56 Page: 23 Filed: 12/30/2020 FINJAN, INC. v. CISCO SYSTEMS, INC. 23 Written Decision of the U.S. Patent and Trademark Of- fice’s Patent Trial and Appeal Board, is AFFIRMED COSTS Each party to bear its own costs. This argument is without merit. “No matter how inde- pendent an appellate court’s review of an issue may be, it is still no more than that—a review.” Sage Prod., Inc. v. Devon Indus., Inc., 126 F.3d 1420, 1426 (Fed. Cir. 1997). A de novo standard of review is not an exceptional circum- stance, Conoco, 460 F.3d at 1358 (“[L]egal issues in patent infringement suits are not immune to the doctrine of waiver on appeal[.]”), neither is a tribunal’s change in its appraisal of the merits following full consideration of the evidence, see Trivascular, Inc. v. Samuels, 812 F.3d 1056, 1068 (Fed. Cir. 2016) (“[T]he [PTAB] is not bound by any findings made in its Institution Decision. . . . The [PTAB] is free to change its view of the merits after further devel- opment of the record, and should do so if convinced its ini- tial inclinations were wrong.” (emphasis original)). Accordingly, we decline to consider Finjan’s waived claim construction argument.