Case: 21-1355 Document: 43 Page: 1 Filed: 09/08/2022
NOTE: This disposition is nonprecedential.
United States Court of Appeals
for the Federal Circuit
______________________
APPLE INC.,
Appellant
v.
MPH TECHNOLOGIES OY,
Appellee
______________________
2021-1355, 2021-1356
______________________
Appeals from the United States Patent and Trademark
Office, Patent Trial and Appeal Board in Nos. IPR2019-
00819, IPR2019-00820.
______________________
Decided: September 8, 2022
______________________
BRIAN ROBERT MATSUI, Morrison & Foerster LLP,
Washington, DC, argued for appellant. Also represented
by SETH W. LLOYD, JOSEPH R. PALMORE; RICHARD HUNG,
San Francisco, CA; BITA RAHEBI, Los Angeles, CA.
BRIAN ERIK HAAN, Lee Sheikh & Haan LLC, Chicago,
IL, argued for appellee. Also represented by ASHLEY E.
LAVALLEY, CHRISTOPHER LEE; JAMES CARMICHAEL,
STEPHEN TERRY SCHREINER, Carmichael IP, PLLC, Tysons
Corner, VA.
Case: 21-1355 Document: 43 Page: 2 Filed: 09/08/2022
2 APPLE INC. v. MPH TECHNOLOGIES OY
______________________
Before LOURIE, HUGHES, and CUNNINGHAM, Circuit
Judges.
CUNNINGHAM, Circuit Judge.
Apple Inc. appeals the final written decisions issued in
two Patent Trial and Appeal Board inter partes reviews
concerning
U.S. Patent No. 7,620,810 and
U.S. Patent No.
7,937,581 (collectively, the “Challenged Patents”), both
owned by MPH Technologies Oy. Apple Inc. v. MPH Techs.
Oy, IPR2019-00819,
2020 WL 5735595 (P.T.A.B. Sept. 24,
2020) (Decision I); Apple Inc. v. MPH Techs. Oy, IPR2019-
00820,
2020 WL 5735601 (P.T.A.B. Sept. 24, 2020) (Deci-
sion II). Because the Board adopted an erroneous claim
construction of “encrypted” messages in both decisions, we
vacate the Board’s unpatentability determinations based
on that construction and remand for further consideration.
Because we further hold that the Board properly found that
Apple’s petition failed to demonstrate the unpatentability
of dependent claims 6–8 of the ’581 patent, we affirm as to
those claims.
I. BACKGROUND
A. The Challenged Patents
The Challenged Patents are both entitled “Method and
Network for Ensuring Secure Forwarding of Messages.”
They share a specification in all aspects relevant to this ap-
peal. Each is directed to a method of facilitating a secure
connection in a telecommunication network. See, e.g., ’810
Patent Abstract; ’581 Patent Abstract. Each describes the
prior art IP security protocols (“IPSec”) as “provid[ing] the
capability to secure communications between arbitrary
hosts.” ’810 Patent, col. 1 ll. 57–58; ’581 Patent, col. 1 ll.
59–60. The patents explain that “IPSec is intended to work
with static network topology, where hosts are fixed to cer-
tain subnetworks” and can be “problematic” if used with
Case: 21-1355 Document: 43 Page: 3 Filed: 09/08/2022
APPLE INC. v. MPH TECHNOLOGIES OY 3
mobile hosts. ’810 Patent, col. 4 ll. 10–54; ’581 Patent, col.
4 ll. 13–65.
The ’810 patent has seven claims. Claim 1 requires:
1. A method for ensuring secure forwarding of a
message in a telecommunication network, hav-
ing at least one mobile terminal and another ter-
minal and a security gateway therebetween, the
method comprising:
a) establishing a secure connection be-
tween a first address of the mobile terminal
and an address of the security gateway, the
secure connection defined by at least the
addresses of the mobile terminal and the
security gateway,
b) the mobile terminal changing from the
first address to a second address,
c) while at the second address, the mobile
terminal sending a request message to the
address of the security gateway to request
the security gateway to change the secure
connection to be defined between the sec-
ond address and the address of the security
gateway,
in response to the request message from
the mobile terminal, the security gateway
changing an address definition of the se-
cure connection from the first address to
the second address, the mobile terminal
sending a secure message in the secure con-
nection from the second address of the mo-
bile terminal to the other terminal via the
security gateway,
the secure connection being established by
forming a Security Association (SA) using
Case: 21-1355 Document: 43 Page: 4 Filed: 09/08/2022
4 APPLE INC. v. MPH TECHNOLOGIES OY
IPSec protocols, and the request message
and/or a reply message being encrypted
and/or authenticated by using the same SA
already established.
’810 Patent, col. 10 l. 48–col. 11 l. 8 (emphasis added).
Claim 7, the ’810 patent’s only other independent claim, is
similar to claim 1 but does not require a “request message
and/or a reply message being encrypted and/or authenti-
cated.”
Id. col. 12 ll. 1–22.
The ’581 patent is a continuation of the ’810 patent. It
includes nine claims, several of which are at issue in this
appeal. Claim 1 of the ’581 patent requires:
1. A method for ensuring secure forwarding of a
message in a telecommunication network, hav-
ing at least one mobile terminal and another ter-
minal and a security gateway therebetween, the
method comprising:
a) establishing a secure connection having
a first address of the mobile terminal as a
first end-point and a gateway address of
the security gateway as a second end-point,
b) the mobile terminal changing from the
first address to a second address,
c) while at the second address, the mobile
terminal sending a request message to the
gateway address of the security gateway to
request the security gateway to change the
secure connection to be defined between
the second address and the gateway ad-
dress of the security gateway,
in response to the request message from
the mobile terminal, the security gateway
changing an address definition of the
Case: 21-1355 Document: 43 Page: 5 Filed: 09/08/2022
APPLE INC. v. MPH TECHNOLOGIES OY 5
secure connection from the first address to
the second address, and
the mobile terminal sending a secure mes-
sage in the secure connection from the sec-
ond address of the mobile terminal to the
other terminal via the security gateway.
’581 Patent, col. 10 l. 50–col. 11 l. 3. Relevant here, claim 4
further requires an “encrypted and/or authenticated” re-
quest or reply message, and dependent claims 5–8 add ad-
ditional limitations to claims 1 and 5:
4. The method of claim 1, wherein the request mes-
sage and/or a reply message is encrypted and/or
authenticated.
5. The method of claim 1 wherein the method fur-
ther comprises the security gateway sending
back a reply message to the mobile terminal at
the second address to confirm the address
change.
6. The method of claim 5, wherein the mobile termi-
nal and the other terminal form an end-to-end
connection whereby the secure connection is an
IPSec transport connection or IPSec tunnel con-
nection.
7. The method of claim 5, wherein a tunneling pro-
tocol is used for the secure connection between
the mobile terminal and the security gateway.
8. The method of claim 5, wherein the other termi-
nal is a mobile terminal.
Id. col. 11 ll. 9–23 (emphasis added).
B. Procedural History
In 2018, MPH sued Apple for infringement of eight pa-
tents in the Northern District of California. MPH Techs.
Oy v. Apple Inc., No. 4:18-cv-05935-PJH (N.D. Cal.); J.A. 3.
Case: 21-1355 Document: 43 Page: 6 Filed: 09/08/2022
6 APPLE INC. v. MPH TECHNOLOGIES OY
Apple then filed multiple IPR petitions, two of which are at
issue in this appeal. J.A. 154–229, 3258–329.
For IPR 2019-00819, the Board instituted review of the
’810 patent on three grounds, each based on obviousness
under
35 U.S.C. § 103(a). 1 Decision I at *3. Ground 1 chal-
lenged claims 1, 4–5, and 7 based on
U.S. Patent No.
6,904,466 to Ishiyama et al. (“Ishiyama”) and
U.S. Patent
No. 7,028,337 to Murakawa (“Murakawa”).
Id. Ground 2
challenged claims 2 and 3 based on Ishiyama, Murakawa,
and
U.S. Patent No. 6,976,177 to Ahonen (“Ahonen”).
Id.
Ground 3 challenged claim 6 based on Ishiyama, Mura-
kawa, and
U.S. Patent No. 6,954,790 to Forslöw (“For-
slöw”).
Id.
For IPR 2019-00820, the Board instituted IPR as to the
’581 patent on three grounds. Decision II at *3. Ground 1
challenged claims 1–2, 4, 6–7, and 9 based on Ishiyama and
Murakawa.
Id. Ground 2 challenged claims 3 and 5 based
on Ishiyama, Murakawa, and Ahonen.
Id. Ground 3 chal-
lenged claim 8 based on Ishiyama, Murakawa, and For-
slöw.
Id.
In IPR 2019-00819, the Board agreed with Apple that
Ishiyama and Murakawa rendered unpatentable claim 7 of
the ’810 patent. Decision I at *22. In IPR 2019-00820, the
Board agreed that Ishiyama and Murakawa rendered un-
patentable claims 1, 2, and 9 of the ’581 patent, and that
Ishiyama, Murakawa, and Ahonen rendered unpatentable
claims 3 and 5 of the ’581 patent. Decision II at *27.
1 Congress amended § 103. See Leahy-Smith Amer-
ica Invents Act,
Pub. L. No. 112-29, § 3(c),
125 Stat. 284,
287–88 (2011) (“AIA”). Because the applications that led
to the Challenged Patents were filed before March 16,
2013, the pre-AIA § 103(a) applies. See AIA § 3(n), 125
Stat. at 293.
Case: 21-1355 Document: 43 Page: 7 Filed: 09/08/2022
APPLE INC. v. MPH TECHNOLOGIES OY 7
Relevant to this appeal, the Board’s interpretation of an
“encrypted” request and/or reply message led it to conclude
that Apple failed to demonstrate that claims 1–6 of the ’810
patent and claim 4 of the ’581 patent would have been ob-
vious. Decision I at *8, 22; Decision II at *18–20. In its
petitions, Apple argued that all terms should receive their
ordinary and customary meaning. J.A. 169, 3273. MPH
proposed a construction of “security gateway,” but the
Board did not base its decision on that claim term. Decision
I at *4–5; Decision II at *4. Thus, the Board determined
that “no express claim construction [was] necessary.” De-
cision I at *5; Decision II at *4. The Board then interpreted
the “plain words” of “request message and/or a reply mes-
sage being encrypted” to require “that the message is en-
crypted—not that a portion of the message is encrypted.”
Decision I at *8; Decision II at *19. Based on its interpre-
tation, the Board concluded that Ishiyama could not meet
this limitation because its request message “includ[ed] the
outer packet, and that packet is unencrypted.” Decision I
at *8–9; Decision II at *18–19.
The Board also concluded that Apple failed to meet its
burden as to claims 6–8 of the ’581 patent because Grounds
1 and 3 in IPR 2019-00820 did not address the intervening
limitations of claim 5, from which claims 6–8 depend. De-
cision II at *20, 27. The Board accepted that the combina-
tion of Ishiyama and Murakawa rendered claim 1 of the
’581 patent obvious. Id. at *6, 11. The Board further ac-
cepted that adding Ahonen to that combination taught the
additional limitation of dependent claim 5, i.e., “the secu-
rity gateway sending back a reply message to the mobile
terminal at the second address to confirm the address
change.” Id. at *26–27. Because Apple did not include Aho-
nen in Ground 1 addressing claims 6 and 7 or Ground 3
addressing claim 8, the Board held that Apple did not carry
its burden as to those claims. Id. at *20, 27.
Apple timely appealed. We have jurisdiction under
28 U.S.C. § 1295(a)(4)(A).
Case: 21-1355 Document: 43 Page: 8 Filed: 09/08/2022
8 APPLE INC. v. MPH TECHNOLOGIES OY
II. DISCUSSION
Apple presents two arguments on appeal. First, Apple
argues that the Board adopted an erroneous claim con-
struction of “request message and/or a reply message being
encrypted” that excludes messages sent using packets with
unencrypted address information. Appellant’s Br. 15–17,
18–29. Second, Apple argues that the Board should have
considered Apple’s arguments for the unpatentability of
’581 patent claim 5 in evaluating its arguments regarding
claims 6–8. Appellant’s Br. 17–18, 37–46. We address each
argument in turn.
A. Claim Construction
“We review the Board’s claim construction de novo and
any underlying factual findings for substantial evidence.”
Kaken Pharm. Co. v. Iancu,
952 F.3d 1346, 1350 (Fed. Cir.
2020) (citing Teva Pharms. USA, Inc. v. Sandoz, Inc.,
574
U.S. 318, 331–33 (2015)). “The words of a claim are gener-
ally given their ordinary and customary meaning as under-
stood by a person of ordinary skill in the art when read in
the context of the specification and prosecution history.”
Thorner v. Sony Comput. Ent. Am. LLC,
669 F.3d 1362,
1365 (Fed. Cir. 2012) (citing Phillips v. AWH Corp.,
415
F.3d 1303, 1312–13 (Fed. Cir. 2005) (en banc)).
Apple contends the Board erroneously construed “en-
crypted” to exclude packets with unencrypted address in-
formation. Appellant’s Br. 20. According to Apple,
“encrypted” messages must rely on packets with unen-
crypted addressing information, and the Challenged Pa-
tents teach that encrypted messages use such packets.
Appellant’s Br. 25–26. MPH argues that the claims require
the request message to “cause the changing of the address
definition,” and that “Apple admitted below that it is the
outer header of Ishiyama’s packet,” which is unencrypted,
“that alone is responsible for changing the address defini-
tion to the second address.” Appellee’s Br. 32 (emphasis in
original). We agree with Apple that the Board’s
Case: 21-1355 Document: 43 Page: 9 Filed: 09/08/2022
APPLE INC. v. MPH TECHNOLOGIES OY 9
construction of an “encrypted” request and/or reply mes-
sage is erroneous and contradicts the intrinsic record.
Before addressing the substantive claim construction
dispute, we first address certain preliminary arguments
raised by MPH. MPH argues that the Board did not issue
a claim construction at all, but instead made a factual find-
ing that the Ishiyama reference fails to teach an encrypted
request message. Appellee’s Br. 14, 30–31, 40. MPH also
argues that Apple waived its claim construction arguments
by not presenting them to the Board. Appellee’s Br. 34.
We agree with Apple that the Board performed a claim
construction. The Board stated that “the plain words of the
claim state that the message is encrypted—not that a por-
tion of the message is encrypted. . . . Simply put, claim 1
requires that the request message (not just a portion
thereof) is encrypted . . . .” Decision I at *8 (emphasis
added); see also Decision II at *19 (same regarding claim
4). In doing so, the Board “establish[ed] the scope and
boundaries of the subject matter that is patented.” Net-
word, LLC v. Centraal Corp.,
242 F.3d 1347, 1350 (Fed. Cir.
2001); see also HTC Corp. v. Cellular Commc’ns Equip.,
LLC,
877 F.3d 1361, 1367 (Fed. Cir. 2017) (“Despite no ex-
press construction of [claim term] below, Board findings es-
tablishing the scope of the patented subject matter may fall
within the ambit of claim construction.”). This is not an
“application of the claim terms ‘encrypted’ and ‘request
message’ to prior art,” as MPH contends, Appellee’s Br.
45–46, but a construction as to what the claims mean.
We also reject MPH’s argument that Apple waived or
forfeited 2 any claim construction arguments by not
2 While MPH argues Apple “waived” its claim con-
struction arguments, Appellee’s Br. 34, we interpret MPH
to argue Apple forfeited its arguments. See In re Google
Case: 21-1355 Document: 43 Page: 10 Filed: 09/08/2022
10 APPLE INC. v. MPH TECHNOLOGIES OY
presenting them to the Board. Appellee’s Br. 34. Neither
Apple nor MPH proposed construing “encrypted,” and the
Board did not suggest a construction in its initial determi-
nation. J.A. 10, 66, 346–47, 3452–53. Instead, the Board
appears to have created a dispute as to the meaning of “en-
crypted” during its questioning at oral argument. J.A.
742:18–20 (“[I]f the outer portion [of the packet] is not en-
crypted, then why wouldn’t only a portion of the request
message be encrypted?”); see also
id. at 742:21–748:2. We
decline to find forfeiture where neither party disputed the
construction of a term and the Board nevertheless issued a
sua sponte construction in its final written decision that di-
verged from the parties’ understanding of the claim. See,
e.g., Lifestyle Enter., Inc. v. United States,
751 F.3d 1371,
1377 (Fed. Cir. 2014) (“[A] party may raise on appeal any
issue that was . . . actually decided below.”); Hollmer v. Ha-
rari,
681 F.3d 1351, 1356 n.3 (Fed. Cir. 2012) (declining to
find party waived arguments regarding applicability of ear-
lier decision where Board “sua sponte” applied that deci-
sion in its ruling without briefing or comment); see also
Qualcomm Inc. v. Intel Corp.,
6 F.4th 1256, 1263 (Fed. Cir.
2021) (“[U]nlike with disputed terms, it is unreasonable to
expect parties to brief or argue agreed-upon matters of
claim construction.”).
“When construing claim terms, we first look to, and pri-
marily rely on, the intrinsic evidence, including the claims
themselves, the specification, and the prosecution history
of the patent, which is usually dispositive.” Sunovion
Pharms., Inc. v. Teva Pharms. USA, Inc.,
731 F.3d 1271,
Tech. Holdings LLC,
980 F.3d 858, 862 (Fed. Cir. 2020)
(“[F]orfeiture is the failure to make the timely assertion of
a right”). We recognize that our precedent has “not always
been precise” in distinguishing waiver and forfeiture, and
we do not fault a party that, understandably, has done just
the same.
Id. at 862–63.
Case: 21-1355 Document: 43 Page: 11 Filed: 09/08/2022
APPLE INC. v. MPH TECHNOLOGIES OY 11
1276 (Fed. Cir. 2013). “The specification is always highly
relevant to the claim construction analysis and is, in fact,
the single best guide to the meaning of a disputed term.”
Trs. of Columbia Univ. v. Symantec Corp.,
811 F.3d 1359,
1363 (Fed. Cir. 2016) (cleaned up); Phillips, 415 F.3d at
1315 (“[T]he specification . . . is the single best guide to the
meaning of a disputed term.”).
Here, the claims require that a “request message
and/or a reply message” is “encrypted.” ’810 Patent, col. 10
l. 48–col. 11 l. 8; ’581 Patent, col. 11 ll. 9–10. The Board
placed significant emphasis on the patents’ statement that
“signal[ ] 10a . . .can be encrypted and/or authenticated.”
Decision I at *8 (emphasis added); Decision II at *19 (em-
phasis added). But this statement alone does not speak to
whether the patents consider signals (or messages) trans-
mitted using packets with certain unencrypted addressing
information to be “encrypted.” ’810 Patent, col. 9, l. 66–col.
10 l. 5; ’581 Patent, col. 9 l. 63–col. 10 l. 2. The very next
sentence from the specifications states that “encryption . . .
is preferably performed by using IPSec,” suggesting IPSec
protocols inform when a message is or is not encrypted.
’810 Patent, col. 10 ll. 5–8; ’581 Patent, col. 10 ll. 2–5. Con-
sistent with this discussion, claim 1 of the ’810 patent re-
quires that the message is encrypted “by using the same
[Security Association] already established,” where that Se-
curity Association is established “using IPSec protocols.”
’810 Patent, col. 10 l. 48–col. 11 l. 8; see also Hockerson-
Halberstadt, Inc. v. Converse Inc.,
183 F.3d 1369, 1374
(Fed. Cir. 1999) (“Proper claim construction, however, de-
mands interpretation of the entire claim in context, not a
single element in isolation.”). Thus, we turn to the specifi-
cations’ discussion of IPSec to determine when messages
are encrypted.
Mirroring the claims’ requirement of “encrypted and/or
authenticated,” the specifications discuss two protocols
used within IPSec to provide security: “Authentication
Header (AH)” and “Encapsulating Security Payload
Case: 21-1355 Document: 43 Page: 12 Filed: 09/08/2022
12 APPLE INC. v. MPH TECHNOLOGIES OY
(ESP),” both of which “operat[e] by adding a protocol
header.” ’810 Patent, col. 2 ll. 11–17; ’581 Patent, col. 2 ll.
13–19. Both AH and ESP support “transport mode”—
which “provides protection primarily for upper layer proto-
cols and extends to the payload of an IP packet”—and “tun-
nel mode”—which “provides protection to the entire IP
packet.” ’810 Patent, col. 3 ll. 4–19; ’581 Patent, col. 3 ll.
6–22. Tunnel mode is generally used to send messages
“through more than two components,” such that packets
are “tunnelled [sic] through external networks.” ’810 Pa-
tent, col. 3 ll. 16–19, col. 3 ll. 24–27; ’581 Patent, col. 3 ll.
19–22, col. 3 ll. 27–30. The specifications describe that in-
itial ESP fields are added to an “original, or inner, packet,”
and “the entire packet plus security fields” is “treated as
the payload of a new outer IP packet with a new outer IP
header.” ’810 Patent, col. 3 ll. 28–33; ’581 Patent, col. 3 ll.
31–36. The resulting packet is described as “IP | ESP | IP
| payload,” where the outermost “IP” applies to the “new
larger packet” and “may have totally different source and
destination addresses,” while the inner packet—“IP | pay-
load”—is protected by the ESP fields. ’810 Patent, col. 3 ll.
31–42; ’581 Patent, col. 3 ll. 34–45. With this arrangement,
the “inner IP packet” can be tunneled so that “no routers
along the way are able to examine the inner IP packet,”
while “intermediate routers” examine “only the outer IP
header.” ’810 Patent, col. 3 ll. 31–33, col. 3 ll. 55–57; ’581
Patent, col. 3 ll. 34–36, col. 3 ll. 58–60.
Accordingly, the specifications contemplate that “en-
crypted” messages can be sent using outer packets with
certain unencrypted addressing information, contrary to
the Board’s construction. As discussed in both patents, the
outer packet’s “IP” information is not protected by ESP
fields, allowing intermediate routers to examine that infor-
mation. Messages are still secure because the ESP fields
protect the inner packet’s IP information and payload.
Consistent with this analysis, MPH appears to agree
that a message with certain unencrypted addressing
Case: 21-1355 Document: 43 Page: 13 Filed: 09/08/2022
APPLE INC. v. MPH TECHNOLOGIES OY 13
information can meet the claims. First, MPH did not raise
or dispute the construction of the term “encrypted” to the
Board. Decision I at *4; Decision II at *4. Instead, MPH
argued to the Board that the unencrypted “outer header it-
self” cannot serve as the “request message.” Appellee’s Br.
14–15 (emphasis added); see also id. at 31(arguing the
same before us). The Board agreed with Apple and con-
cluded that “Ishiyama’s entire transmitted packet (i.e., the
encapsulated packet plus the outer packet, which has the
changed source address) is the claimed request message.”
Decision I at *7; Decision II at *8. Second, at oral argument
on appeal, MPH’s counsel twice refused to concede that a
message sent using a packet with unencrypted addressing
information could not infringe the claims. Oral Arg. at
22:01–23:00, 28:50–29:21, available at https://oralargu-
ments.cafc.uscourts.gov/default.aspx?fl=21-1355_1207202
1.mp3; see 01 Communique Lab’y, Inc. v. Citrix Sys., Inc.,
889 F.3d 735, 743 (Fed. Cir. 2018) (“[C]laim terms must be
‘construed the same way for both invalidity and infringe-
ment.’”).
We hold that the Board adopted an erroneous claim
construction of “request message and/or a reply message
being encrypted” within claim 1 of the ’810 patent and
claim 4 of the ’581 patent that excludes “encrypted” mes-
sages because those messages are sent using packets with
certain unencrypted addressing information. The Chal-
lenged Patents contemplate that a message can still be con-
sidered “encrypted” if its packet has unencrypted “outer IP
header” information. We vacate the portions of the Board’s
final written decisions relying on that erroneous claim con-
struction and remand for further proceedings. 3
3 Apple alternatively argues that the Board’s deci-
sion should be remanded because the Board’s sua sponte
claim construction violated the Administrative Procedure
Case: 21-1355 Document: 43 Page: 14 Filed: 09/08/2022
14 APPLE INC. v. MPH TECHNOLOGIES OY
B. Apple’s Petition
Next, we address Apple’s argument that the Board
erred in declining to consider its unpatentability argu-
ments for dependent claims 6–8 of the ’581 patent under
Grounds 1 and 3, despite finding claim 5 of that patent un-
patentable under Ground 2. Appellant’s Br. 41.
Apple argues that where a challenger proves a claim
unpatentable, courts can only sustain dependent claims
based on “the language of the dependent claims them-
selves.” Appellant’s Br. 38. Because the Board found
claim 5 of the ’581 patent to be unpatentable, Apple urges
that the Board only needed to consider prior art to the ex-
tent necessary to address the remaining limitations added
in dependent claims 6–8. Appellant’s Br. 39.
MPH responds that Ground 1 of Apple’s petition relies
solely on Ishiyama in view of Murakawa to address claims
6–7 and omits the Ahonen reference that Apple relied upon
to address claim 5. Appellee’s Br. 52. Similarly, Ground 3
of Apple’s petition relies on Ishiyama, Murakawa, and For-
slöw to address claim 8, but, again, omits the Ahonen ref-
erence.
Id. Because claims 6–8 depend from claim 5, MPH
argues that the Board correctly found that Apple failed to
carry its burden to address all of the relevant limitations
by not discussing Ahonen. 4 Appellee’s Br. 53–54; see
Act. Appellant’s Br. 29–37. Because we vacate the portions
of the Board’s decision relying on its erroneous claim con-
struction and remand for additional proceedings, we do not
reach this alternative argument.
4 MPH argues that we can nevertheless affirm the
Board’s determination as to claims 4–6 of the ’810 patent
because Apple relied on Ahonen to meet the intervening
limitations in claim 3 and did not include Ahonen in its
grounds challenging those claims. Appellee’s Br. 57–58.
Case: 21-1355 Document: 43 Page: 15 Filed: 09/08/2022
APPLE INC. v. MPH TECHNOLOGIES OY 15
Koninklijke Philips N.V. v. Google LLC,
948 F.3d 1330,
1335–37 (Fed. Cir. 2020).
We agree with MPH that the Board did not err in deny-
ing Apple’s petitions as to claims 6–8 of the ’581 patent. As
the Supreme Court has held, “in an inter partes review the
petitioner is master of its complaint and normally entitled
to judgment on . . . the claims it raises, not just those the
decisionmaker might wish to address.” SAS Inst., Inc. v.
Iancu,
138 S. Ct. 1348, 1355 (2018) (emphasis added); see
also Intuitive Surgical, Inc. v. Ethicon LLC,
25 F.4th 1035,
1041 (Fed. Cir. 2022) (“[A]s the master of its own petition,
Intuitive could have made its challenges more pointed and
specific . . . .”). This holding is consistent with the statu-
tory framework that requires a petition to identify “the
grounds on which the challenge to each claim is based.”
35
U.S.C. § 312(a)(3); see also
37 C.F.R. § 42.104(b) (requiring
petitioner to identify “the patents or printed publications
relied upon for each ground” and “where each element of
the claim is found in the prior art patents or printed publi-
cations relied upon”).
The Board is not limited by the “exact language of the
petition,” but it does not “enjoy[] a license to depart from
the petition and institute a different inter partes review of
his own design.” Koninklijke Philips, 948 F.3d at 1336
(quoting SAS,
138 S. Ct. at 1356); see also Sirona Dental
Sys. GmbH v. Institut Straumann AG,
892 F.3d 1349, 1358
(Fed. Cir. 2018) (finding “no error” in Board’s decision “not
to decide grounds of unpatentability not raised in the peti-
tion”). In Koninklijke Philips, Google’s petition included
The Board did not reach this issue because it found Apple
did not demonstrate claim 1 to be unpatentable. Decision
I at *9, 22. Because we vacate the portions of the Board’s
decisions based on its construction of an “encrypted” re-
quest or reply message in claim 1, the Board should decide
whether to consider this issue on remand.
Case: 21-1355 Document: 43 Page: 16 Filed: 09/08/2022
16 APPLE INC. v. MPH TECHNOLOGIES OY
two grounds: (1) anticipation based on Synchronized Mul-
timedia Integration Language 1.0 Specification (“SMIL
1.0”), and (2) obviousness based on “SMIL 1.0 in light of the
general knowledge of the [skilled artisan] regarding distrib-
uted multimedia presentation systems as of the priority
date.” 948 F.3d at 1333–34. Google relied on a prior art
reference referred to as “Hua” to demonstrate the state of
the art. Id. at 1334. The Board instituted on three grounds:
the two identified in Google’s petition and a third present-
ing obviousness based on SMIL 1.0 and Hua. Id. at 1334.
Although we found it proper for the Board to institute
Ground 2 based on SMIL 1.0 and the “general knowledge”
of a person of skill in the art, we held the Board erred in
instituting a ground based on SMIL 1.0 and Hua “because
Google did not advance such a combination of references in
its petition.” Id. at 1337.
Here, we agree the Board properly declined to consider
Ahonen in Grounds 1 and 3 of the ’581 patent’s IPR. See
Decision II at *20, 27. Apple only raised Ahonen in Ground
2, which challenged claims 3 and 5 of the ’581 patent. Id.
at *3. Even though claims 6–8 depend from claim 5, Apple
did not include Ahonen in Grounds 1 and 3 challenging
those claims, nor did it address or reference Ahonen in its
substantive analysis. J.A. 3312–16, 3323–26. The Board
did not err by declining to consider arguments that Apple
did not make. See Koninklijke Philips, 948 F.3d at 1337.
Apple contends the Board exalted “form over sub-
stance” by requiring Apple to include Ahonen in Grounds 1
and 3, Appellant’s Br. 46, but these requirements have a
practical impact as well. For example, Apple’s Ground 3
relies on Ishiyama, Murakawa, and Forslöw. J.A. 3323–26.
Apple presented no argument as to why a skilled artisan
would be inclined to combine the teachings of Ishiyama,
Murakawa, Forslöw, and Ahonen. J.A. 3323, 3326. We
have previously reversed Board decisions that found a mo-
tivation to combine where the petitioner presented only
threadbare arguments to support its combination, let alone
Case: 21-1355 Document: 43 Page: 17 Filed: 09/08/2022
APPLE INC. v. MPH TECHNOLOGIES OY 17
where a party entirely failed to address one of the refer-
ences it sought to combine. See, e.g., TQ Delta, LLC v. Cisco
Sys., Inc.,
942 F.3d 1352, 1359 (Fed. Cir. 2019) (“[A] con-
clusory assertion with no explanation is inadequate to sup-
port a finding that there would have been a motivation to
combine.”).
Apple cites several cases for the general proposition
that where a parent claim is invalid, its dependent claims
may be similarly invalid. Appellant’s Br. 38–39. Those
cases are distinguishable because they do not address the
situation at hand, i.e., where a petitioner did not address
all of a claim’s limitations in its petition. In Ormco Corp.
v. Align Technology, Inc., we explained that invalidating
one claim can inform the patentability of other claims that
lack “patentably significant” differences.
498 F.3d 1307,
1320 (Fed. Cir. 2007). In Soverain Software LLC v. Victo-
ria’s Secret Direct Brand Management, LLC, we applied
collateral estoppel regarding the invalidity of a dependent
claim because “transmitting a hypertext statement over the
internet, rather than over a generic network” did not mate-
rially alter the invalidity analysis.
778 F.3d 1311, 1319–20
(Fed. Cir. 2015) (emphases added). And in MaxLinear, Inc.
v. CF CRESPE LLC, we explained that collateral estoppel
often “requires the invalidation of related claims that pre-
sent identical issues of patentability.”
880 F.3d 1373, 1374,
1377 (Fed. Cir. 2018). But these cases do not involve a pe-
titioner who did not address each of a dependent claim’s
intervening limitations in a single ground.
Apple’s citation to Soverain Software LLC v. Newegg
Inc.,
728 F.3d 1332, 1335 (Fed. Cir. 2013), is similarly in-
apposite. See Appellant’s Br. 40–41. There, we explained
that if the parties do not “separately argue” or distinguish
a dependent claim and the independent claim it incorpo-
rates, “the claims rise or fall together.” Newegg, 728 F.3d
at 1335. By contrast, here Apple separately argued the pa-
tentability of claims 6–8 in Grounds 1 and 3 from claim 5
Case: 21-1355 Document: 43 Page: 18 Filed: 09/08/2022
18 APPLE INC. v. MPH TECHNOLOGIES OY
in Ground 2, such that we cannot say the claims of Grounds
1, 2, and 3 necessarily rise and fall together.
CONCLUSION
We vacate the Board’s patentability determinations for
claims 1–6 of the ’810 patent and claim 4 of the ’581 patent
based on its erroneous claim construction of “encrypted.”
We affirm the Board’s patentability determination that Ap-
ple failed to meet its burden as to claims 6–8 of the ’581
patent. We remand to the Board for further proceedings
consistent with this opinion.
AFFIRMED-IN-PART, VACATED-IN-PART, AND
REMANDED
COSTS
No costs.