Centripetal Networks, Inc. v. Cisco Systems, Inc.

Case: 20-1635 Document: 49 Page: 1 Filed: 03/10/2021 NOTE: This disposition is nonprecedential. United States Court of Appeals for the Federal Circuit ______________________ CENTRIPETAL NETWORKS, INC., Appellant v. CISCO SYSTEMS, INC., Appellee ______________________ 2020-1635, 2020-1636 ______________________ Appeals from the United States Patent and Trademark Office, Patent Trial and Appeal Board in Nos. IPR2018- 01436, IPR2018-01437. ______________________ Decided: March 10, 2021 ______________________ JAMES R. HANNAH, Kramer Levin Naftalis & Frankel LLP, Menlo Park, CA, for appellant. Also represented by PAUL J. ANDRE; JEFFREY PRICE, New York, NY. PATRICK D. MCPHERSON, Duane Morris LLP, Washing- ton, DC, for appellee. Also represented by CHRISTOPHER JOSEPH TYSON; MATTHEW CHRISTOPHER GAUDET, Atlanta, GA; JOSEPH POWERS, Philadelphia, PA. ______________________ Case: 20-1635 Document: 49 Page: 2 Filed: 03/10/2021 2 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. Before MOORE, SCHALL, and TARANTO, Circuit Judges. TARANTO, Circuit Judge. Centripetal Networks, Inc. owns U.S. Patent Nos. 9,124,552 and 9,160,713, which address cybersecurity tech- niques for filtering encrypted packets passing between a secured and an unsecured network. In July 2018, Cisco Systems, Inc. filed petitions for inter partes reviews of the ’552 and ’713 patents. For all claims of both patents, Cisco asserted unpatentability under 35 U.S.C. § 103 for obvious- ness based on a user manual for an earlier security sys- tem—a manual that Cisco asserted was a prior-art “printed publication.” 35 U.S.C. § 311(b). The Patent Trial and Ap- peal Board instituted both requested inter partes reviews and, in its final written decisions, agreed with Cisco about the printed-publication status of the user manual and about unpatentability of all claims. Cisco Systems, Inc. v. Centripetal Networks, Inc., IPR2018-01436, 2020 WL 402817 (P.T.A.B. Jan. 23, 2020) (’552 Decision); Cisco Sys- tems, Inc. v. Centripetal Networks, Inc., IPR2018-01437, 2020 WL 402317 (P.T.A.B. Jan. 23, 2020) (’713 Decision). We affirm. I A The patents address aspects of the now-common pro- cess of sending messages across networks, specifically across the Internet, using protocols that split up a mes- sage’s content into packets for transmission. J.A. 6682 ¶ 47; J.A. 6823. When packets arrive at their destination, they are assembled to recreate the original message. See J.A. 2064. Two common preexisting protocols, which allow encryption of the transmitted data, are relevant here: Hy- pertext Transfer Protocol Secure (HTTPS) and Transport Layer Security (TLS). See ’552 patent, col. 7, lines 53–60. Because the ’713 patent issued from a continuation of the application that issued as the ’552 patent, the patents Case: 20-1635 Document: 49 Page: 3 Filed: 03/10/2021 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. 3 share a specification, and when citing that specification, we will generally cite only the ’552 patent. The patents are concerned with “filtering network data transfers” and the passage of information between a secured network (e.g., a private company’s network) and an unsecured network (e.g., the larger Internet). ’552 patent, Abstract; ’713 pa- tent, Abstract; see also ’552 patent, col. 1, lines 62–64. The specification focuses, in particular, on preventing a type of cyberattack known as an “exfiltration,” which involves stealing information (extracting it without authorization) as it exits a secure network, using “popular network data transfer protocols” to disguise the theft “as normal network behavior.” Id., col. 1, lines 15–23. Previous cybersecurity systems, the patents say, inadequately protected against such attacks because they tended to interpret the exfiltra- tion as ordinary network behavior and did not account for vulnerabilities in the conventional version of TLS, i.e., TLS version 1.0. Id., col. 1, lines 23–25; id., col. 6, lines 40–47. The patents describe a solution in which packets enter- ing or exiting a secure network are first received at a packet secure gateway, which may include “one or more computing devices configured to receive packets.” Id., col. 3, lines 42–44. The gateway also receives a “dynamic secu- rity policy” from a “security policy management server,” id., col. 4, lines 53–55, which provides the “packet filter” in the gateway with “one or more rules” to determine where (to which “operators”) packets “having specified infor- mation” should be sent, id., col. 5, lines 6–16. The specified information gathered from a packet may include a “five-tu- ple,” which may comprise “one or more values selected from”: the protocol type of the packet, the Internet Protocol (IP) address of the source of the packet, “one or more source port values,” the IP address(es) of the destination(s) of the packet, and “one or more destination ports.” Id., col. 5, lines 34–42. Based on the information collected from the packet, the gateway system “determines” which operator to direct the packet to, id., col. 5, lines 9–16, and the operator Case: 20-1635 Document: 49 Page: 4 Filed: 03/10/2021 4 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. then applies one or more filtering rules to the packet to “al- low” or “block” the packet, see, e.g., id. col. 5, lines 62–67; id. col. 6, lines 11–16. For example, a rule may require that a packet use “version 1.1 or 1.2 of the Transport Layer Se- curity (TLS) protocol” in order to be allowed to continue, because “the popular TLS version 1.0 protocol has a known security vulnerability that attackers may exploit to decrypt HTTPS sessions.” Id., col. 6, lines 27–47. Independent claim 1 of the ’552 patent recites: 1. A method, comprising: at a computing device comprising at least one pro- cessor, a memory, and a communication interface: receiving, via the communication interface, a plurality of hypertext transfer protocol secure (HTTPS) packets; responsive to a determination by the at least one processor that at least a portion of the plurality of HTTPS packets have packet-header-field values corresponding to a packet filtering rule stored in the memory, applying, by the at least one pro- cessor, an operator specified by the packet- filtering rule to the at least a portion of the plurality of HTTPS packets, wherein the operator specifies one or more application- header-field-value criteria identifying one or more transport layer security (TLS)- version values for which packets should be blocked from continuing toward their re- spective destinations; and responsive to a determination by the at least one processor that one or more pack- ets, of the at least a portion of the plurality Case: 20-1635 Document: 49 Page: 5 Filed: 03/10/2021 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. 5 of HTTPS packets, have one or more appli- cation-header-field values corresponding to one or more TLS-version values of the one or more TLS-version values for which pack- ets should be blocked from continuing to- ward their respective destinations, applying, by the at least one processor, at least one packet-transformation function specified by the operator to the one or more packets to block each packet of the one or more packets from continuing toward its respective destination. Id., col. 11, lines 5–35. Claims 8 and 15 are the only other independent claims in the ’552 patent. Claim 8 claims an “apparatus” that performs the claim 1 method and claim 15 claims “non-transitory computer-readable media” con- taining instructions that, when executed, perform the claim 1 method. Id., col. 12, line 54 through col. 13, line 15; id. col. 13, lines 39–67. No additional limitations in the dependent claims of the ’552 patent are relevant to Cen- tripetal’s appeal. Claim 1 of the ’713 patent recites: 1. A method comprising: receiving, by a computing system provisioned with a plurality of packet-filtering rules, a first packet and a second packet; responsive to a determination by the computing system that the first packet comprises data corre- sponding to a transport layer security (TLS)- version value for which one or more packet-filter- ing rules of the plurality of packet-filtering rules indicate packets should be forwarded toward their respective destinations, forwarding, by the compu- ting system, the first packet toward its destination; and Case: 20-1635 Document: 49 Page: 6 Filed: 03/10/2021 6 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. responsive to a determination by the computing system that the second packet comprises data cor- responding to a TLS-version value for which the one or more packet-filtering rules indicate packets should be blocked from continuing toward their re- spective destinations, dropping, by the computer system, the second packet. ’713 patent, col. 11, lines 8–25. Independent claims 8 and 15 of the ’713 patent are substantially similar to claim 1; for present purposes, they are system and non-transitory computer-readable media forms of method claim 1. See id., col. 12, lines 29–47; id., col. 13, lines 44–61. B In July 2018, Cisco filed petitions for inter partes re- views of all claims (claims 1–21) of the ’552 patent and all claims (claims 1–20) of the ’713 patent. Cisco argued that the claimed inventions of all claims would have been obvi- ous to a relevant artisan in view of the User Guide for the Sourcefire 3D System—a manual referred to in the matters before us as “Sourcefire.” Sourcefire describes a system that monitors network activity with packet-filtering devices called “3D-Sensors” that record network activity and identify (and call atten- tion to) “intrusion events” based on an “intrusion policy ap- plied to a detection engine on the sensor that is monitoring a specific network segment.” J.A. 1460, 1683. In this sys- tem, packets traveling through the network pass through three layers that decode them, J.A. 1683, 1685, then pass through preprocessors that “normalize traffic at the appli- cation layer and detect protocol anomalies,” J.A. 1685, and finally arrive at a “rules engine” that “inspects the packet headers” and “determine[s] whether they trigger any of the shared object rules or standard text rules,” J.A. 1685–86. At any of these steps, a packet could cause the system “to generate an event, which is an indication that the packet or its contents” may be a security risk. J.A. 1687. Case: 20-1635 Document: 49 Page: 7 Filed: 03/10/2021 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. 7 When packets arrive at Sourcefire’s rules engine, the engine determines whether values in the packet header trigger one or more “intrusion rules.” J.A. 1686, 1940, 2188. Intrusion rules may have two parts: (1) the rule header, which includes the five-tuple values (protocol, source and destination IP addresses, source and destina- tion ports), the rule’s action (e.g., drop, alert and allow, ig- nore and allow), and direction indicators; and (2) the rule options part, which contains, e.g., keywords and their ar- guments and event messages. J.A. 2189; see also J.A. 2188–96. Keywords in intrusion rules can be used by the preprocessor (called the Secure Sockets Layer (SSL) pre- processor) and by the rules engine to filter packets accord- ing to their encryption protocol version (for example, their TLS version). J.A. 2252. Sourcefire permits users to write their own custom intrusion rules, J.A. 2188–96, so a user could use a keyword like “ssl_version” in an intrusion rule to cause the SSL preprocessor to match the protocol version information contained in the application headers of the packets against the protocol of the assembled packets for an encrypted session (a reassembled stream of messages known as a handshake), J.A. 2254–55; see also J.A. 1918, 2024–28, 2127. In its petitions for inter partes reviews, Cisco argued that the claims of the ’552 and ’713 patents recite subject matter that would have been obvious in view of Sourcefire because Sourcefire describes a cybersecurity system that can be configured to meet every limitation in the claims. ’552 Decision, 2020 WL 402817, at *8; ’713 Decision, 2020 WL 402317, at *6–7. Specifically, Cisco relied on Sourcefire as disclosing, to a relevant artisan, the idea of writing custom intrusion rules that would permit the Sourcefire system to determine the TLS-version values of the packets it received based on keywords and to use the rules engine as an operator to apply packet-filtering rules based on those determinations. ’552 Decision, 2020 WL Case: 20-1635 Document: 49 Page: 8 Filed: 03/10/2021 8 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. 402817, at *15–16; ’713 Decision, 2020 WL 402317, at *6– 7. After the Board instituted the requested inter partes reviews, Centripetal argued that Sourcefire was not a “printed publication” at the priority date for the patents at issue, see 35 U.S.C. § 102(a)(1); 35 U.S.C. § 102(b) (2006), as required for non-patent prior art in IPRs under 35 U.S.C. § 311(b). J.A. 434–38; see also ’713 Decision, 2020 WL 402317, at *3. 1 Centripetal contended that Sourcefire (the document) was costly and was distributed only to those who bought certain products from Sourcefire (the company) and, therefore, the document was not publicly accessible because a relevant artisan could not have obtained it with reasonable diligence. J.A. 434–38. In IPR-1436 (addressing the ’552 patent), Centripetal did not dispute that Sourcefire teaches a processor, memory, and communication interface; nor did it dispute that Sourcefire teaches “receiving, via the communication interface a plurality of [HTTPS] packets.” ’552 Decision, 2020 WL 402817, at *14–15. Centripetal argued, however, that Sourcefire does not teach the “determination” limita- tions of the claims, specifically the requirements of (1) a “determination” that a plurality of HTTPS packets “have packet-header-field values corresponding to a packet-filter- ing rule” and (2) a “determination” that some of those pack- ets “have one or more application-header-field values corresponding to one or more TLS-version values.” See J.A. 456, 458. According to Centripetal, Sourcefire teaches 1 The version of 35 U.S.C. § 102 pre-dating the amendments made in 2011 (effective March 16, 2013) ap- plies in both of these matters, given that the application that issued as the ’552 patent was filed March 12, 2013, and the ’713 patent is the child of the ’552 patent. See ’552 Decision, 2020 WL 402817, at *4 n.1. The current version of § 102 continues to use the phrase “printed publication.” Case: 20-1635 Document: 49 Page: 9 Filed: 03/10/2021 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. 9 extracting version information from a reassembled stream of packets (“handshake and key exchange messages,” J.A. 2025), whereas the claims require a determination of ver- sion information to be made for individual packets. J.A. 461–62. Centripetal alleged an additional deficiency in Sourcefire’s teaching of the claim limitations. It contended that Sourcefire does not teach the claimed “operator,” be- cause the claims require that the operator specify both “ap- plication-header-field-value criteria” and “a packet transformation function,” and the Sourcefire system is “not capable of designing a packet-filtering rule specifying an operator that applies different packet transformation func- tions based on different application-layer-packet-header criteria.” J.A. 471–73. Centripetal further argued that Cisco had not shown that a relevant artisan would have been motivated to modify the teachings of Sourcefire to ar- rive at the claims. J.A. 481. And Centripetal advanced what it urged were objective indicia of nonobviousness, in- cluding praise for its product addressing TLS vulnerabili- ties. J.A. 494–95. In IPR-1437 (addressing the ’713 patent), Centripetal made similar arguments. See J.A. 7394–99, 7403–06. C In IPR-1436, the Board first determined that Cisco had met its burden to show that Sourcefire was a printed pub- lication. ’552 Decision, 2020 WL 402817, at *8–12. Specif- ically, the Board found that Sourcefire, a user guide, was publicly accessible in that it was available to purchasers of Sourcefire 3D Systems and was, in fact, distributed on CD- ROM to 586 system purchasers between April 2011 and March 2013, id. at *9–10; no confidentiality restrictions prevented purchasers from reproducing and distributing the document “for non-commercial use,” id. at *10 (citing J.A. 1429); and Sourcefire advertised its products and their accompaniment by extensive documentation, id. at *11; Case: 20-1635 Document: 49 Page: 10 Filed: 03/10/2021 10 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. J.A. 4695–99. The Board rejected Centripetal’s argument that the cost of obtaining Sourcefire (the document) was prohibitive; the Board found that it could be acquired by purchasing products that cost between $1,385 and £25,000, that 586 customers actually acquired it, and that Centrip- etal had not shown that an interested relevant artisan was not reasonably able to obtain the material. Id. at *12 & n.9. After determining that Sourcefire qualified as prior art, the Board addressed the disputed limitations in claim 1 (and claims 8 and 15). Id. at *14–22. Regarding the de- termination limitations, the Board explained that nothing in the claims requires that each individual packet be in- spected or that TLS (or SSL) version information be ex- tracted from application-header-values of individual packets, rather than a reassembled stream (handshake message). Id. at *17. Reassembled streams of messages, the Board continued, themselves consist of individual pack- ets, and a relevant artisan would have known that the TLS-version information is always contained in the packet header of the first packet in the message, as Centripetal acknowledged. Id. at *18. Accordingly, the Board found that a relevant artisan would have understood Sourcefire, even in describing the extraction of version information from the reassembled message, as teaching the claim re- quirement of extraction from the first packet. Id. at *18– 19. Regarding the claimed “operator,” the Board adopted Centripetal’s claim construction, construing the term to re- fer to “a function specified by a packet-filtering rule that specifies one or more application-header-field criteria and a packet transformation to apply to the packet for each of the application-header-field criteria.” Id. at *5–6. Apply- ing that construction, the Board found that Sourcefire’s keyword and argument functions (in particular, ssl_ver- sion keywords) permitted the system to (1) indicate appli- cation-header-field-value criteria (e.g., the version of TLS) Case: 20-1635 Document: 49 Page: 11 Filed: 03/10/2021 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. 11 and (2) apply a “packet transformation function,” e.g., blocking the packets, as specified by the claims. Id. at *19. The Board also rejected Centripetal’s argument that Sourcefire could not teach an operator because the “rule ac- tion” was specified in the “rule header,” so that Sourcefire could apply only “one rule action” per rule (e.g., could only allow certain packets, rather than allow and block some). Id. at *20. The Board found that Centripetal had presented no evidence to support this argument and that Cisco had shown support in Sourcefire for using different ssl_version keywords to “allow,” “pass,” or “drop” packets. Id. Finally, the Board found that Cisco had met its burden to show that a relevant artisan would have been motivated to modify Sourcefire to meet the ’552 patent’s claim limita- tions. Id. at *21–22. Citing the declaration from Cisco’s expert (Dr. Staniford), the Board found that the known vul- nerabilities of early versions of protocols like TLS, along with the ordinary creativity of a relevant artisan, would be sufficient to motivate that artisan to use Sourcefire to write rules blocking packets with a vulnerability like that of TLS 1.0. Id. The Board also found that Centripetal’s objective indicia of nonobviousness—particularly the praise for its RuleGATE product—were not entitled to much weight, noting the lack of a persuasive basis for finding the nexus of cited objective indicia to the claims of the ’552 patent. Id. at *22–24. The Board then addressed the additional limitations in the remaining dependent claims and found obviousness as to those claims as well. Id. at *24–26. In IPR-1437, the Board’s finding and reasoning were similar to those in IPR-1436. See ’713 Decision, 2020 WL 402317, at *3–13. The Board issued its final written decisions as to both IPR-1436 and IPR-1437 on January 23, 2020. Centripetal timely appealed both decisions. We have jurisdiction under 28 U.S.C. § 1295(a)(4)(A) and 35 U.S.C. §§ 141(c), 319. Case: 20-1635 Document: 49 Page: 12 Filed: 03/10/2021 12 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. II We review the Board’s final written decisions under the Administrative Procedure Act, “hold[ing] unlawful and set[ting] aside agency action, findings, and conclusions found to be . . . arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law . . . [or] unsup- ported by substantial evidence.” 5 U.S.C. § 706; Dickinson v. Zurko, 527 U.S. 150, 164–65 (1999). We review the Board’s legal conclusions de novo and factual findings for substantial evidence. Nobel Biocare Services AG v. Instra- dent USA, Inc., 903 F.3d 1365, 1374 (Fed. Cir. 2018). Whether a reference qualifies as a “printed publication” is a legal conclusion based on factual findings. Jazz Pharms., Inc. v. Amneal Pharms., LLC, 895 F.3d 1347, 1356 (Fed. Cir. 2018). “The underlying factual findings [in a printed- publication analysis] include whether a reference was pub- licly accessible.” Nobel, 903 F.3d at 1375. Similarly, the ultimate determination of whether a claimed invention would have been obvious is a legal one reviewed de novo, but underlying factual determinations are reviewed for substantial-evidence support. PersonalWeb Techs., LLC v. Apple, Inc., 917 F.3d 1376, 1381 (Fed. Cir. 2019). On appeal, Centripetal argues that: (1) the Board erred by concluding that Sourcefire is a printed publication, see Centripetal Opening Br. 15–21; (2) Sourcefire does not teach a “determination” that a packet includes a specified TLS-version value, id. at 21–24; (3) Cisco did not show a motivation to modify Sourcefire and the Board overlooked important objective indicia of nonobviousness, id. at 24–31; and (4) Sourcefire does not disclose the operator described in the ’552 patent, id. at 31–34. 2 We reject these chal- lenges. 2In making their respective arguments on appeal, the parties do not distinguish between the Board’s Case: 20-1635 Document: 49 Page: 13 Filed: 03/10/2021 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. 13 A Centripetal first contends that Sourcefire was not a printed publication because it was available only to those willing to pay $25,000 for the accompanying product and was kept password-protected on Sourcefire’s website, pre- venting access to the relevant public. Centripetal Opening Br. 15–16. We reject this argument. Whether a reference is a printed publication “involves a case-by-case inquiry into the facts and circumstances sur- rounding the reference’s disclosure to members of the pub- lic.” In re Klopfenstein, 380 F.3d 1345, 1350 (Fed. Cir. 2004). “Because there are many ways in which a reference may be disseminated to the interested public, public acces- sibility has been called the touchstone in determining whether a reference constitutes a printed publication.” Blue Calypso, LLC v. Groupon, Inc., 815 F.3d 1331, 1348 (Fed. Cir. 2016) (cleaned up). For a reference to be publicly accessible, it must be “‘disseminated or otherwise made available to the extent that persons interested and ordinar- ily skilled in the subject matter or art, exercising reasona- ble diligence, can locate it.’” Acceleration Bay, LLC v. Activision Blizzard Inc., 908 F.3d 765, 772 (Fed. Cir. 2018) (quoting Jazz Pharms., 895 F.3d at 1355–56); see also Kyoc- era Wireless Corp. v. Int’l Trade Comm’n, 545 F.3d 1340, 1350 (Fed. Cir. 2008). A reference need not be catalogued or indexed to be a printed publication; “a printed publica- tion need not be easily searchable after publication if it was sufficiently disseminated at the time of its publication.” Suffolk Techs., LLC v. AOL Inc., 752 F.3d 1358, 1365 (Fed. Cir. 2014); see also In re Lister, 583 F.3d 1307, 1312 (Fed. Cir. 2009); Klopfenstein, 380 F.3d at 1348. Limited distri- butions of a reference may suffice. Samsung Elecs. Co. v. decisions in IPR-1436 and IPR-1437, except where rele- vant. Centripetal Opening Br. 3; Cisco Response Br. 6 n.1. We consider the decisions together unless otherwise noted. Case: 20-1635 Document: 49 Page: 14 Filed: 03/10/2021 14 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. Infobridge Pte. Ltd., 929 F.3d 1363, 1374 (Fed. Cir. 2019). In determining whether interested persons could have ac- cessed the publication, we consider factors such as the ex- pertise of the target audience, the avenues of distribution (e.g., at a trade show), the duration of dissemination, and expectations of confidentiality or restrictions on recipients’ sharing of the information. GoPro, Inc. v. Contour IP Hold- ing LLC, 908 F.3d 690, 694–95 (Fed. Cir. 2018). 3 3 See, e.g., GoPro, 908 F.3d at 694–95 (catalog dis- tributed at a trade show that was only open to “dealers” of action sports vehicles and related accessories was a printed publication because there were no restrictions on the cata- log’s distribution, there were over 1,000 attendees, and there was no evidence that one interested in the art of dig- ital cameras could not have obtained the catalog with rea- sonable diligence); Jazz Pharms., 895 F.3d at 1357–59 (Affordable Care Act materials available on the FDA’s web- site and published via constructive notice in the Federal Register were printed publications because the materials were “widely disseminated to persons of ordinary skill for a substantial time with no reasonable expectation of confi- dentiality”); Klopfenstein, 380 F.3d at 1350 (slideshow dis- played at a conference for three days was a printed publication because the slide was displayed for a matter of days, the attendees included interested persons of skill in the art, there was no reasonable expectation that the slide would not be copied, and the slide could be copied with rel- ative simplicity); Massachusetts Inst. of Tech. v. AB Fortia (MIT), 774 F.2d 1104, 1108–09 (Fed. Cir. 1985) (paper orally presented at a conference and distributed to only six persons who requested the paper was a printed publica- tion, because “between 50 and 500 persons interested and of ordinary skill in the subject matter were told of the ex- istence of the paper . . . and the document itself was Case: 20-1635 Document: 49 Page: 15 Filed: 03/10/2021 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. 15 Here, the Board found, based on testimony from a Sourcefire company employee, that each of the 586 custom- ers who purchased a range of Sourcefire products over a relevant two-year period received a CD-ROM containing the user guide, which explicitly stated that users were per- mitted to “use, print out, save on a retrieval system, and otherwise copy and distribute” the reference for noncom- mercial use. ’552 Decision; 2020 WL 402817, at *9–10 (cit- ing J.A. 1429); ’713 Decision, 2020 WL 402317, at *4 (same). Further, Centripetal presented no evidence to the Board showing that—despite the CD-ROM distribution— an interested person using reasonable diligence would not have been able to access Sourcefire either by purchasing the product or by receiving a copy of the user guide from another customer. See ’552 Decision, 2020 WL 402817, at *10. Substantial evidence, including advertisements, re- views, and testimony from a Sourcefire company employee, supports the Board’s finding that those interested and of skill in the art actually purchased Sourcefire. Id. at *11; see also J.A. 822. In sum, the large number of Sourcefire product customers, the number of years the product was available, the advertisements targeting those interested and of skill in the art, and the lack of confidentiality re- strictions on copying or distributing Sourcefire support a finding of public accessibility. See GoPro, 908 F.3d at 694. The Board properly rejected Centripetal’s argument that In re Bayer, 568 F.2d 1357 (CCPA 1978), and Med- tronic, Inc. v. Barry, 891 F.3d 1368 (Fed. Cir. 2018), require a different result. ’552 Decision, 2020 WL 402817, at *11– 12. In Bayer, we held that actual dissemination of a stu- dent’s thesis to members of a graduate committee did not render the thesis publicly accessible. 568 F.2d at 1361–62. We recently explained in Samsung that the student’s actually disseminated without restriction to at least six persons”). Case: 20-1635 Document: 49 Page: 16 Filed: 03/10/2021 16 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. thesis in Bayer was not publicly accessible because “the only people who kn[e]w how to find it [were] the ones who created it,” and thus it could not be obtained with reasona- ble diligence by those interested and of skill in the art. Samsung, 929 F.3d at 1371–72. Here, in contrast, Sourcefire was publicly advertised and obtained by at least 586 customers. In Medtronic, a video relating to spinal surgery was distributed at three separate meetings (two for surgeons, one for a private organization), and slides were distributed at two of the meetings. 891 F.3d at 1379. After the Board found lack of public accessibility of either the video or the slides, without distinguishing between the open and the closed meetings, or whether there was an expectation of confidentiality, we vacated and remanded. Id. at 1382–83. We instructed the Board to consider the “size and nature of the meetings,” as well as whether an “expectation of confi- dentiality” existed, noting that these are “important con- siderations” in assessing public accessibility. Id. at 1382. In this case, the Board did exactly that. Far from finding Sourcefire to be a printed publication merely because the CD-ROMs were actually distributed to customers, the Board considered the size and nature of the group receiving the CD-ROMs and the absence of confidentiality re- strictions. ’552 Decision, 2020 WL 402817, at *10–12. Contrary to Centripetal’s contention, the Board’s con- clusion regarding public accessibility is not undermined by the fact that, unlike some of the cases, this case does not involve “free distribution of academic documents to confer- ence and meeting attendees whose express purpose for at- tending the conference was to hear lectures regarding those same documents.” Centripetal Opening Br. 18–19 (cleaned up). Public accessibility is not limited to circum- stances of free or academic distributions; “commercial dis- tribution” can qualify. Garrett Corp. v. United States, 422 F.2d 874, 877–78 (Ct. Cl. 1970) (distribution of 80 copies of a government report, including 6 to commercial companies, Case: 20-1635 Document: 49 Page: 17 Filed: 03/10/2021 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. 17 constituted a printed publication because the report was “unclassified and unrestricted in its use”). The Board also reasonably found that Centripetal had not shown the cost of Sourcefire—which it found ranged from $1,385 to £25,000, ’552 Decision, 2020 WL 402817, at *12 n.9; see also J.A. 4695, 4700—to be prohibitive to those interested and of skill in the art, given, e.g., the evidence that at least 586 customers, at least some of them relevant artisans, pur- chased the product, ’552 Decision, 2020 WL 402817, at *12; ’713 Decision, 2020 WL 402317, at *5. On this record, we agree with the Board that Sourcefire was publicly accessible and therefore qualifies as a printed publication. B We reject Centripetal’s challenges to the Board’s obvi- ousness determination. 1 The Board found that Sourcefire teaches what is re- quired by the determination claims. Centripetal argues otherwise by pointing to language in Sourcefire stating that the preprocessor “collects and reassembles all the packets” and inspects the stream as a “single, reassembled entity” rather than as “individual packets.” J.A. 2064–65; see also Centripetal Opening Br. 22. This argument does not undermine the Board’s finding. As the Board reasoned, how Sourcefire obtains TLS- version values is irrelevant to the claims’ scope. ’552 Deci- sion, 2020 WL 402817, at *17–18, ’713 Decision, 2020 WL 402317, at *8. The claims in the ’552 and ’713 patents do not require that each individual packet is inspected for the TLS-version value, but only that a determination is made as to what that value is. See ’552 patent, col. 11, lines 5– 35 (claims require “a determination . . . that one or more packets, of the at least a portion of the plurality of HTTPS packets, have one or more application-header-field-values Case: 20-1635 Document: 49 Page: 18 Filed: 03/10/2021 18 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. corresponding to one or more TLS-version values”); ’713 pa- tent, col. 11, lines 8–25 (claims require “a determination . . . that [a packet received first or a packet received second] comprises data corresponding to a transport layer security TLS-version value”). Further, Centripetal’s expert, Dr. Orso, acknowledged that the TLS-version value in a reassembled handshake is virtually always identical to the value for the individual packets associated with that handshake. J.A. 4647–48 (171:6–174:16). And substantial evidence established that relevant artisans would have understood that the TLS- version value is found in the first packet of a message. J.A. 809–10; J.A. 4653. Thus, the Board reasonably found that Sourcefire teaches determining this exact value because the information it obtains from the handshake will be iden- tical to the first packet’s header. See J.A. 2252 (“The SSL preprocessor extracts state and version information from specific handshake fields. Two fields within the handshake indicate the version of SSL or TLS used to encrypt the ses- sion and the stage of the handshake.”). Substantial evi- dence thus supports the Board’s finding that Sourcefire teaches the “determination” limitations of the patent claims. 2 Centripetal argues that the Board erred by finding a motivation to modify Sourcefire based on “common sense,” Centripetal Opening Br. 24–27, and by not properly consid- ering objective indicia of nonobviousness that negate any motivation a relevant artisan would have had to modify Sourcefire, id. at 27–31. Centripetal’s motivation argument substantially over- laps with its arguments that Sourcefire does not teach the “determination” limitations required by the claims. Specif- ically, Centripetal argues that the Board found that a rele- vant artisan would have been motivated to modify Sourcefire to include the “missing” claim limitations—the Case: 20-1635 Document: 49 Page: 19 Filed: 03/10/2021 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. 19 “determination” limitations—and that such a finding was error because Sourcefire makes determinations from a re- assembled packet stream, and a relevant artisan would not be motivated to modify that system to inspect individual packets. Centripetal Opening Br. 24–27. But the Board did not find that these limitations were “missing”; it found that Sourcefire taught the “determination” limitations be- cause such limitations were not limited to systems that in- spect individual packets. See ’552 Decision, 2020 WL 402817, at *17–19; ’713 Decision, 2020 WL 402317, at *8. And, as discussed above, nothing in either patent’s claims requires individual packets to be inspected in order to de- termine their TLS-version value. We also reject Centripetal’s argument that the Board failed to properly weigh objective indicia of nonobviousness (specifically, long-felt but unmet need, industry praise, and commercial success/licensing). “In order to accord substan- tial weight to secondary considerations in an obviousness analysis, ‘the evidence of secondary considerations must have a “nexus” to the claims, i.e., there must be “a legally and factually sufficient connection” between the evidence and the patented invention.’” Fox Factory, Inc. v. SRAM, LLC, 944 F.3d 1366, 1373 (Fed. Cir. 2019) (quoting Henny Penny Corp. v. Frymaster LLC, 938 F.3d 1324, 1332 (Fed. Cir. 2019) (citing Demaco Corp. v. F. Von Langsdorff Li- censing Ltd., 851 F.2d 1387, 1392 (Fed. Cir. 1988)). Here, Centripetal presented several articles praising its RuleGATE product as evidence of industry praise and long-felt but unmet need, including a paper (the ESG pa- per), J.A. 6900–08, and a Gartner article, J.A. 6909–18. But the RuleGATE product contains far more than what is claimed in the patent claims at issue here. And as the Board found, nothing in those articles ties the praise of RuleGATE, its alleged filling of an unmet need, or its suc- cess to the limitations in the claims. See ’552 Decision, 2020 WL 402817, at *22–24; ’713 Decision, 2020 WL 402317, at *10–12; see also Polaris, 882 F.3d at 1072. Case: 20-1635 Document: 49 Page: 20 Filed: 03/10/2021 20 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. Indeed, Centripetal’s expert did not even create a claim- construction chart to map the products to each limitation. J.A. 4615–16. On this record, we agree with the Board that the objective indicia of nonobviousness were not entitled to substantial weight. 3 Finally, Centripetal challenges the Board’s finding that Sourcefire teaches the operator required by the ’552 patent. Centripetal argues that Sourcefire relies on “Snort rules” that include a “Rule Header” with a single specified “rule action” that can be taken only “‘if the packet data matches all the conditions specified in a rule.’” Centripetal Opening Br. 32–33 (quoting J.A. 2188). For that reason, Centripetal urges, Sourcefire cannot disclose the required operator because its rules cannot “apply different packet transformation functions for different TLS-version values.” Id. But the ’552 patent’s claims do not require that a rule provide for more than one action. See, e.g., ’552 patent, col. 11, lines 5–35. Moreover, even under Centripetal’s con- struction of “operator,” the Board found, Sourcefire teaches an operator that meets both criteria required by that con- struction—that is, Sourcefire (1) determines “application- header-field-value criteria” through its keyword function (e.g., identifies the packets’ TLS-version value) and (2) ap- plies a “packet transformation function” by using its Rule Action function to either block, alert, or allow packets matching the application-header-field-value criteria corre- sponding to the rule. ’552 Decision, 2020 WL 402817, at *19–21; J.A. 2189–92, 2196. The language of the claims and of Sourcefire provide substantial evidence for the Board’s finding that Sourcefire teaches the operator in the ’552 patent’s claims. Case: 20-1635 Document: 49 Page: 21 Filed: 03/10/2021 CENTRIPETAL NETWORKS, INC. v. CISCO SYSTEMS, INC. 21 III We have considered the remainder of Centripetal’s ar- guments and find them to be unpersuasive. For the foregoing reasons, the decisions of the Patent Trial and Appeal Board in IPR-1436 and IPR-1437 are af- firmed. AFFIRMED