throbber
IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`TYLER DIVISION
`
`Page 1
`
`VIRNETX, INC.
`
` -vs-
`
`APPLE, INC.
`
`)
`
`)
`
`DOCKET NO. 6:10cv417
`
`Tyler, Texas
`) 12:42 p.m.
`November 2, 2012
`
`TRANSCRIPT OF TRIAL
`AFTERNOON SESSION
`BEFORE THE HONORABLE LEONARD DAVIS,
` UNITED STATES CHIEF DISTRICT JUDGE, AND A JURY
`
`A P P E A R A N C E S
`
`FOR THE PLAINTIFFS:
`
`MR. DOUGLAS CAWLEY
`MR. BRADLEY W. CALDWELL
`MR. JASON D. CASSADY
`MR. JOHN AUSTIN CURRY
`McKOOL SMITH
`300 Crescent Court, Ste. 1500
`Dallas, TX 75201
`
`COURT REPORTERS:
`
`MS. JUDITH WERLINGER
`MS. SHEA SLOAN
`shea_sloan@txed.uscourts.gov
`
`Proceedings taken by Machine Stenotype; transcript was
`produced by a Computer.
`
`Smartflash - Exhibit 2082
`Apple v. Smartflash
`CBM2015-00121
`
`1
`
`2
`3
`
`4
`
`5
`
`6
`
`78
`
`9
`
`10
`11
`12
`13
`14
`15
`
`16
`
`17
`
`18
`
`19
`20
`21
`
`22
`23
`24
`
`25
`
`

`
`Page 2
`
`Page 3
`
`1
` P R O C E E D I N G S
`2
` (Jury out.)
`3
` COURT SECURITY OFFICER: All rise.
`4
` THE COURT: You may be seated while we
`5
`wait for the jury.
`6
` (Pause in proceedings.)
`7
` COURT SECURITY OFFICER: All rise for the
`8
`jury.
`9
` (Jury in.)
`10
` THE COURT: Please be seated.
`11
` All right. Ladies and Gentlemen, hope
`12
`you had a good lunch, and we're ready to go for this
`13
`afternoon.
`14
` Before we go back with the previous
`15
`witness, we have Dr. Weinstein back on the phone (sic).
`16
` We had a question from the jury, Dr.
`17 Weinstein, for you that I'd like for you to answer at
`18
`this time, and the question is: Why is VirnetX not
`19
`selling this product?
`20
` THE WITNESS: Yes, Your Honor. Thank
`21
`you.
`22
` My answer is: VirnetX is selling this
`23
`product. It has sold this product. It licensed its
`24
`product to Microsoft. It licensed its product to other
`25
`entities. We saw all those license agreements.
`Page 5
` Q. The products you're talking about right then
`are products that are made, manufactured, marketed, and
`sold by companies -- by Microsoft or Aastra, not by
`VirnetX. Correct?
` A. Right. And they are made and sold pursuant to
`the VirnetX license.
` Q. And the product that VirnetX has is called
`Gabriel. You heard that testimony?
` A. Yes, sir, I did.
` Q. And they have never sold Gabriel to anybody,
`correct?
` A. As far as I know, that's true.
` MR. ALBRITTON: Pass the witness, Your
`Honor.
` THE COURT: All right. Any follow-up?
` MR. CASSADY: Just a little bit, Your
`Honor.
` REDIRECT EXAMINATION
`BY MR. CASSADY:
` Q. Mr. Weinstein, why hasn't VirnetX sold
`Gabriel?
` A. Well, my understanding is that VirnetX has
`been heavily engaged in licensing its intellectual
`property to entities like Microsoft, and it's here to
`try and license its intellectual property to Apple, and
`
`2
`
`1
`FOR THE PLAINTIFF:
`2 MR. ROBERT M. PARKER
`MR. ROBERT CHRISTOPHER BUNT
`3
`PARKER BUNT & AINSWORTH
`100 East Ferguson, Ste. 1114
`4
`Tyler, TX 75702
`
`5678
`
`FOR THE DEFENDANT:
`
`9
`MR. DANNY L. WILLIAMS
`10 MR. TERRY D. MORGAN
`MR. RUBEN S. BAINS
`11 MR. CHRIS CRAVEY
`MR. MATT RODGERS
`12 MR. DREW KIM
`MR. SCOTT WOLOSON
`13 WILLIAMS, MORGAN & AMERSON, P.C.
`10333 Richmond, Ste. 1100
`14
`Houston, TX 77042
`15
`MR. ERIC ALBRITTON
`16 MR. STEPHEN E. EDWARDS
`MS. DEBRA COLEMAN
`17 MR. MATTHEW C. HARRIS
`ALBRITTON LAW FIRM
`18
`P.O. Box 2649
`Longview, TX 75606
`19
`20 MR. JOHN M. DESMARAIS
`MR. MICHAEL P. STADNICK
`21
`DESMARAIS, LLP - NEW YORK
`230 Park Avenue
`22
`New York, NY 10169
`23
`24
`25
`
`
`
`Page 4
`
`1
`So that's my -- that's my short answer, sir.
`2
` THE COURT: All right. Thank you.
`3
` Any follow-up questions from Plaintiff's
`4
`counsel?
`5
` MR. CASSADY: No, Your Honor.
`6
` THE COURT: All right.
`7
` From the Defendants' counsel?
`8
` MR. ALBRITTON: Yes. Thank you, Your
`9
`Honor.
`10
` ROY WEINSTEIN, PLAINTIFF'S WITNESS, PREVIOUSLY SWORN
`11
` RECROSS-EXAMINATION
`12
`BY MR. ALBRITTON:
`13
` Q. The products that you just referred to are not
`14
`VirnetX products; the products you're referring to are
`15
`products that are made, manufactured, marketed, and sold
`16
`by Microsoft or one of these other companies?
`17
` A. Actually, what I was referring to is VirnetX
`18
`patents, so I was referring to VirnetX products.
`19
` Q. The products that you're referencing, those
`20
`are not products that are manufactured and sold by
`21
`VirnetX, correct?
`22
` A. The products that are covered by the license
`23
`agreements are made and manufactured by others, but I
`24
`understood the question to involve VirnetX, and VirnetX
`25
`has been licensing its patents.
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`

`
`Page 6
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`1
`it's done so with respect to others.
`2
` So that's my general understanding. That's a
`3
`time-consuming process.
`4
` Q. Okay. And what about others in the
`5 marketplace would affect whether or not Gabriel could be
`6
`sold?
`7
` A. Well, the ability to sell Gabriel depends, at
`8
`least in part, on VirnetX's ability to protect its
`9
`intellectual property. If others are using its
`10
`intellectual property, it's going to make it difficult
`11
`for VirnetX to sell Gabriel or any other product that
`12
`involves that intellectual property until others have
`13
`taken a license.
`14
` Q. Okay.
`15
` MR. CASSADY: Thank you, Mr. Weinstein.
`16
` THE COURT: All right. Thank you.
`17
` Anything further?
`18
` MR. ALBRITTON: Yes, Your Honor.
`19
` RECROSS-EXAMINATION
`20
`BY MR. ALBRITTON:
`21
` Q. Now, Mr. Weinstein, you gave an expert report
`22
`in this case?
`23
` A. Yes, sir.
`24
` Q. And in that report, you said that VirnetX has
`25 met with representatives from Google, for instance, and
`Page 8
`JOHN KELLY, Ph.D., DEFENDANT'S WITNESS, PREVIOUSLY SWORN
` DIRECT EXAMINATION (CONTINUED)
`BY MR. WILLIAMS:
` Q. Good afternoon, Dr. Kelly.
` A. Good afternoon, Mr. Williams.
` Q. Now, where we left off was at the end of VPN
`On Demand. Before we jump right into FaceTime, I have a
`couple of questions I want to follow up with you on.
` With Apple's VPN On Demand function, would it
`be fair to say that the user can actually provide
`security in situations where the VirnetX technology
`would not provide security?
` A. Yes, I think that is fair.
` Q. And with sort of a -- but in what situation
`would that be, for example?
` A. Well, if you want to initiate a VPN, a secure
`connection to an unsecure website, you can't do that
`with the VirnetX patents, because it only will initiate
`a VPN for secure websites.
` But if you wanted to protect the
`communications, the anonymity, the privacy of the
`communications, you could set up a VPN to an unsecure
`website. So that's increased security in that
`situation.
` Q. Now, earlier I asked you if there would be
`
`Page 7
`1
`companies like Samsung and Motorola. Correct?
`2
` A. I said that, yes.
`3
` Q. Yes. Paragraph 139 on Page 47 of your report.
`4
` A. Okay.
`5
` Q. Those companies were approached by VirnetX
`6
`about these patents in this case, correct?
`7
` A. As far as I know.
`8
` Q. And VirnetX's technology, correct?
`9
` A. Yes, sir.
`10
` Q. And those companies have not incorporated
`11
`VirnetX's technology into any of its products, correct?
`12
` A. I don't know the answer to that.
`13
` Q. If they had, you would know that, wouldn't
`14
`you?
`15
` A. No. Actually, I don't think I would.
`16
` Q. Okay.
`17
` MR. ALBRITTON: Pass the witness.
`18
` THE COURT: Anything further?
`19
` MR. CASSADY: Nothing further.
`20
` THE COURT: All right. Thank you.
`21
` You may step down.
`22
` THE WITNESS: Thank you, sir.
`23
` THE COURT: All right, Mr. Williams. You
`24 may continue with your witness.
`25
` MR. WILLIAMS: Thank you, Your Honor.
`Page 9
`reasons why someone, a user, would, in fact, put a
`non-secure website into their configuration file for VPN
`On Demand. Right?
` A. Yes.
` Q. And are you aware of, in fact, someone who has
`put a non-secure website in their VPN On Demand file?
` A. Yes, I am.
` Q. Now, this is some testimony from Mr.
`Christophe Allie. Do you know who he is?
` A. Yes. He's an Apple engineer.
` Q. And Mr. Allie was one who basically
`designed -- he and a team member designed VPN On Demand,
`right?
` A. That's correct.
` Q. And what does Mr. Allie say? And starting, if
`we could, about almost halfway -- a little over halfway
`down where it says: Why don't you configure...
` Can you read that for us, questions and
`answers?
` A. Sure. He's being asked: Why don't you
`configure your VPN On Demand to trigger a VPN based on
`the host name ebay.com instead of using, say,
`web.apple.com?
` And the answer is: Sometimes I do.
` And the lawyer asking the question said:
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`3
`
`

`
`Page 10
`
`You do?
` Answer: Uh-huh.
` Question: And you actually configure
`your VPN On Demand to trigger a VPN to Apple's private
`network based on ebay.com?
` And his answer is: Sometimes I do.
` Q. Now, going beyond the unsecure name or
`non-secure name in the file, in some of your examples --
`one of your examples in particular, you used a made-up
`name, the notarealdomain.com name?
` A. I did.
` Q. Now, are you saying users will actually set up
`their files using a fake name?
` A. Well, you can't say exactly what users would
`do. Perhaps they would. But I'm not suggesting that
`that would be a routine occurrence.
` Q. Okay. Well, then what was the reason for
`using that illustration?
` A. Just to show how VPN On Demand actually works.
`It doesn't determine whether or not the website being
`requested is secure. A fake domain name can cause a VPN
`to be initiated.
` Q. Okay. Now, you're aware, aren't you,
`Dr. Kelly, that Dr. Jones says that the -- there are a
`number of different connection types that are used in
`Page 12
`
` A. That's correct.
` Q. You've heard that phrase batted around this
`courtroom a fair amount the last couple of days?
` A. I certainly have.
` Q. Now, you understand, right, that VirnetX and
`Dr. Jones say that Apple's FaceTime servers infringe two
`of their patents, namely, the '504 and '211 patents.
`Right?
` A. Yes. I know that they have alleged that.
` Q. Do you agree?
` A. I do not agree.
` Q. Now, I want to make sure that we're clear that
`what they're saying is that it's the Apple FaceTime
`servers that are infringing the patent. Is that
`correct?
` A. That's correct.
` Q. And the operation of those servers?
` A. Yes, that's correct.
` Q. Now, Dr. Jones is not saying that it's the
`Apple iPhones or the iPods or the iPads that themselves
`are actually infringing these two patents. Isn't that
`right?
` A. That is correct.
` Q. Nevertheless, you heard Mr. Weinstein, their
`damages expert, on the stand yesterday. Right?
`
`Page 11
`1
`the VPN On Demand feature with the Apple products.
`2
`Right?
`3
` A. Yes, I am.
`4
` Q. And in particular, he lists -- listed on the
`5
`stand Cisco AnyConnect, Juniper SSL, F5 SSL, SonicWALL
`6 Mobile Connect, and Aruba VIA as connections that are
`7
`used with the Apple iPhone that he says uses VirnetX
`8
`patents. Is that correct?
`9
` A. Yes.
`10
` Q. Do you agree with that?
`11
` A. I do not agree with that.
`12
` Q. Why not?
`13
` A. Well, for all the same reasons that I
`14
`discussed with respect to the Cisco IPsec, which was the
`15
`one we were talking about before. And those same
`16
`reasons apply to all of these other connection types as
`17
`well.
`18
` Q. Now, what I'd like to do is, I'd like to move
`19
`on to the FaceTime feature. All right?
`20
` Now, this is a different feature. It's
`21
`completely separate from VPN On Demand, right?
`22
` A. Yes, it is.
`23
` Q. Okay. Now, this is the feature in the Apple
`24
`products that -- when we discussed this notion of direct
`25
`communication, right?
`
`Page 13
`
`1
` A. I was here. I heard him.
`2
` Q. And you heard him calculate damages based on
`3
`iPhone and iPod and iPad, right, including for the
`4
`FaceTime patents. Right?
`5
` A. Yes, he did.
`6
` Q. Okay. So there's no misunderstanding, VirnetX
`7
`is actually not saying that those devices infringe;
`8
`they're saying it's the Apple servers that are back up
`9
`in the corner. Right?
`10
` A. That is correct.
`11
` Q. Now, why do you disagree with Dr. Jones'
`12
`opinion that the Apple FaceTime servers and their
`13
`operation infringe these two VirnetX patents?
`14
` A. The VirnetX patents require direct
`15
`communication, and there is no direct communication in
`16
`Apple's FaceTime.
`17
` Q. Now, Dr. Kelly, I want to use an analogy that
`18 may help us understand what it means to have direct
`19
`communication.
`20
` And, by the way, the direct communication
`21
`language comes from His Honor, Judge Davis. Correct?
`22
` A. Yes, it does.
`23
` Q. Okay. So Judge Davis has told us -- and I
`24
`think we will see this shortly -- that the secure
`25
`communication link that the VirnetX technology is
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`4
`
`

`
`Page 14
`supposed to support is this secure communication link,
`and it must have a direct communication between the
`devices. Right?
` A. That is correct, yes.
` Q. So the direct communication that we're looking
`at in the FaceTime context is the communication between
`the two FaceTiming devices, for example, two iPhones.
`Is that correct?
` A. That's correct.
` Q. And I think we all agree in the courtroom that
`the connections can be made in two -- at least two
`different ways, right, the two ways we've talked about?
` A. Right.
` Q. One is referred to sometimes as a peer-to-peer
`connection.
` A. Correct.
` Q. And the other is sometimes referred to as the
`relay connection?
` A. That's correct.
` Q. And we all agree, I believe, as Dr. Jones told
`us yesterday, that the connection through the relays,
`when the -- when the FaceTime calls are routed through
`the relays, that that's not infringing VirnetX's
`patents. Correct?
` A. Yes, that's correct.
`
`Page 16
` So that's the scenario that's an analogy of
`the indirect addressing.
` Q. (By Mr. Williams) So because, although the
`card was intended for the niece and ultimately got
`there, but because it was actually in an envelope
`addressed to the sister and it didn't even have the
`niece's address, that's indirect communication. Is that
`correct?
` A. Correct.
` Q. Now, how does the analogy apply to direct
`communication?
` A. Well, in that case, you'd have direct
`addressing. So it's a direct communication from the man
`to the niece.
` Now, it may well be that the man sends an
`envelope to the sister.
` THE WITNESS: Let's proceed.
` A. But then when you open this up, you see that
`there is a letter inside it, and that letter is indeed
`directly addressed to the niece. So it's got the
`niece's address on it.
` Q. (By Mr. Williams) So in this case, there was
`direct communication with her, because he directly
`addressed that to her, notwithstanding that it went
`through some intermediary. Is that correct?
`
`Page 15
`1
` Q. So the fight that we have going on here is
`2
`about the connection -- the NAT-to-NAT or peer-to-peer
`3
`connection. Is that right?
`4
` A. Correct.
`5
` Q. Okay. Now, let's look at this analogy, and I
`6
`want to ask you, generally, can you describe this
`7
`analogy?
`8
` A. Certainly. The idea here is that there is a
`9 man who wants to address a letter or a card to his
`10
`niece, wants to deliver something to his niece; and what
`11
`he's going to do is, he's going to send it first to his
`12
`sister. And there are two possible ways of doing this.
`13
` THE WITNESS: Let's back up just for a
`14 moment.
`15
` A. The first way is what we'll call indirect
`16
`addressing. And in this scenario, the man addresses an
`17
`envelope to his sister.
`18
` THE WITNESS: Continue, please.
`19
` A. And then his sister opens this, and there is a
`20
`letter inside that for his niece, but there's no address
`21
`on that. It's not addressed to his niece.
`22
` So his sister is going to deliver it to the
`23
`niece. That's indirect. It's intended for the niece.
`24
`It's going to get to the niece. But the niece's address
`25
`is not on the letter.
`
`Page 17
`
` A. Correct.
` Q. Okay. Now, how does this analogy apply to the
`FaceTime communications?
` A. Well, we can consider simply that the man is
`one iPhone, say, and the niece is the other iPhone.
` And the question is: Does the -- does the
`FaceTime call go -- is it a direct communication with
`the niece, or does it go through some intermediary that
`causes it to be indirect communication?
` And we'll -- we'll -- in this example, the
`sister is the NAT that we've been talking about.
` Q. Now, before we go further, let me ask you,
`have you seen anything from Dr. Jones where he's --
`pardon me -- where he's commented on this direct
`communication, what it refers to?
` A. Yes. In his expert report --
` MR. WILLIAMS: 39.
` A. -- he told us that directly -- that's the
`directly in direct communication -- refers to direct
`addressability.
` Q. (By Mr. Williams) Okay. And do you agree with
`that?
` A. I do.
` Q. Well, let's look specifically at how
`communications in the FaceTime situation are
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`5
`
`

`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`Page 18
`
`communicated or addressed.
` And can you use Mr. Gates' illustration that
`we saw him talk about this morning to explain how the
`communications in FaceTime are indirect communication?
` A. Yes, I can.
` This is a situation in which -- we've seen
`this one already -- there's a black iPhone that's going
`to -- there's going to be a FaceTime call between the
`black iPhone and the white iPhone; and that's why you
`see the picture of the woman on the left and the picture
`of the man on the right.
` The idea here is that the packets of
`information -- these are IP packets -- that leave the
`black iPhone are addressed to the red NAT. They are not
`addressed to the white iPhone.
` So you can see that the -- each packet has an
`address and a payload. That's the information in the
`packet. And these packets that come from the black
`iPhone go to the red NAT, and they have the address of
`the red NAT on them.
` Q. What happens to the packets and the address
`when they get to the NAT 2?
` A. The NAT 2 does network address translation.
`It changes the address. And you can see that it
`re-addresses the packet -- we'll blow it up here. It
`Page 20
`
`1
`it's a private IP address.
`2
` Similarly, the white iPhone's address can't be
`3
`handled out between NAT 1 and NAT 2. That's the nature
`4
`of this type of communication.
`5
` And that's exactly what the network address
`6
`translator is doing. It's -- it's allowing -- it's
`7
`compensating for the fact that the address of the black
`8
`iPhone cannot be sent between NAT 1 and NAT 2.
`9
` Q. Now, looking at this picture we have in front
`10
`of us right now where the white iPhone is sending
`11
`packets to the black iPhone, what would happen if the
`12
`white iPhone sent its packet -- the one we see on the
`13
`right blown up -- but instead of having the NAT 1
`14
`address in there, it had the black iPhone address in it?
`15
` What would happen to that packet?
`16
` A. Well, the packet would -- would get to the NAT
`17
`2 on the way out, and it wouldn't know what to do with
`18
`it. So it couldn't be sent. It wouldn't get anywhere
`19
`in the Internet.
`20
` Q. And why would the NAT not know what to do?
`21 Why is it that the Internet wouldn't know what to do
`22
`with this packet?
`23
` A. Because the -- the black iPhone address is
`24
`what's called a private address, and that private
`25
`address can't be moved around on the Internet. We call
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`Page 19
`comes in with the red NAT 2 address, and it goes out
`with the white iPhone address. It's been re-addressed.
` Q. Now, how does the -- how does it get from the
`white iPhone to the black iPhone? In like manner?
` A. In very like manner, yes. It's just going
`back in the other direction.
` In that direction, the packets from the white
`iPhone are addressed to the blue NAT. They're not
`addressed to the black iPhone. They're addressed to the
`blue NAT.
` And the blue NAT takes that packet -- and
`you'll see here in the animation, it takes the blue NAT
`address, and it replaces it, it re-addresses it with the
`black iPhone's address.
` Q. And each packet that comes down the trail in
`that direction undergoes the same change as the NAT 1?
` A. Yes, it does.
` Q. Well, why can't the black iPhone address the
`packets directly to the white iPhone and vice versa;
`that is, the white iPhone directly addresses packets to
`the black iPhone?
` A. The black iPhone's address is not routable.
`It's not -- it doesn't make sense on the Internet.
`Between NAT 1 and NAT 2, that communication link can't
`handle the IP address that the black iPhone has because
`Page 21
`that routing. It can't be routed from -- from one
`device to another out on the Internet.
` Q. So does this mean that the white iPhone cannot
`directly communicate or communicate directly, either
`way, with the black iPhone?
` A. Yes, it does.
` Q. And does it also mean that the black iPhone
`cannot communicate directly with the white iPhone?
` A. Yes, it does.
` Q. Now, you mentioned this a while ago, but I
`want to talk about this a minute.
` What does N-A-T stand for?
` A. Network address translation.
` Q. And so is this a name like lawnmower that
`is -- the name tells us what the thing does?
` A. Exactly.
` Q. So what does a NAT do?
` A. It translates addresses. And what type of
`addresses? They're network addresses. And it's going
`to translate these IP network addresses from one IP
`address to another IP address. One of them is the
`address of the NAT, and the other is the address of the
`iPhone.
` MR. WILLIAMS: Now, Mr. Sadowitz, could
`we move back to that previous slide? I want to see the
`
`6
`
`

`
`Page 22
`
`Page 23
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`blown-up packets. Okay. Here we go.
` Q. (By Mr. Williams) I want to take a look at --
`I want to take a closer look at the NAT and then have
`you explain to the jury how it is that this -- these
`addresses are changed when you're coming from the
`Internet into the private network where the iPhone is.
` A. Yes. The -- the packet here coming in,
`this -- this -- it has the payload. It's got the
`address, NAT 2. It's actually -- it's actually the
`address of the NAT itself.
` So the packet arrives at the NAT because it's
`addressed to the NAT. And then what the network address
`translator does is takes that address and replaces it
`with the white iPhone address and then sends it on to
`the white iPhone.
` Q. Okay. Well, does it work the same way in the
`other direction?
` A. Yes, it does.
` Q. Explain to us how that works.
` A. Well, again, the packets coming in -- these IP
`packets coming in have the address on -- the address on
`the packet is, in fact, the address of the NAT.
` And then the NAT takes its own address out and
`puts the black iPhone address in, it re-addresses the
`packet, and then sends it on to the -- to the black
`Page 24
`iPhone cannot use -- cannot put the other iPhone's
`address on the packet. Right?
` A. That's correct.
` Q. So that's different from the -- from the
`direct communication.
` A. It is.
` Q. Now, I understand that FaceTime doesn't use
`the direct communication, but why is that important in
`this case?
` A. It's important because all of the claims of
`the patents that VirnetX is alleging Apple is using
`require direct communication.
` Q. Okay.
` MR. WILLIAMS: Let's look at Slide 50, if
`we could.
` Q. (By Mr. Williams) Now, this slide shows Claim
`1 of VirnetX's '504 patent. Can you show me where it is
`that requires -- or that direct communication is
`required?
` A. Sure. The -- the words of the claim include a
`secure communication link. And now, Judge Davis has
`told us what a secure communication link means, and,
`that is, a direct communication link that provides data
`security.
` So in order to meet this claim, you need a
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`iPhone.
` Q. Now, can you apply the mail analogy that we
`started off with to the FaceTime communication?
` A. Yes.
` Q. Please do that.
` A. The -- what's -- what's happening here is, you
`can think of this as the letter is being sent from one
`of the iPhone devices. That's the man. And the man
`wants to send a letter to the -- this -- this woman
`here, would be the niece, and NAT 2 would be the sister.
` So what he's doing is, he can't address the
`letter directly to the niece, so he has to address it to
`his sister, NAT 2, instead. And his sister then will
`deliver it to the niece.
` Q. All right. So this is a situation where
`the -- he cannot use the niece's address, so he sends it
`to his sister. That's -- who delivers it to the niece.
`That's indirect communication.
` A. That is indirect communication, because the
`niece's address is not on that -- that letter.
` Q. Now, in the analogy, we had a situation of
`direct communication where the -- the letter to the
`niece actually had her address on it. Right?
` A. Correct.
` Q. And you're saying, in this situation, one
`Page 25
`secure communication link; and in order to have a secure
`communication link, you must have a direct communication
`link that provides data security.
` Q. Now, Judge Davis, I believe, then construed
`later -- said why -- he provided more information about
`the secure communication link, and he says that the data
`security is through encryption. Right?
` A. Through encryption, correct.
` Q. But that part of the -- of his definition is
`not what we're focused on at this point, correct?
` A. Correct. We are focusing on the direct
`communication link.
` Q. The direct communication link.
` Well, where does -- we've talked about
`addresses changing. Where does that -- that concept
`come from?
` A. Well, if we -- if we look at, for example, Dr.
`Jones' expert report on the next slide, this is one in
`which he says: The word directly refers to direct
`addressability.
` Q. Okay.
` A. So in order to have direct communications, we
`require direct addressability.
` Q. And there's no dispute about that in this
`case?
`
`7
`
`

`
`Page 26
`
` A. Correct.
` Q. We all agree, then, direct communication
`refers to direct addressability, right?
` A. Yes.
` Q. So where the claims of the '504 and '211
`patents talk about a secure communication link that must
`be supported, one of the requirements of that is that it
`be a direct communication link. Correct?
` A. That's correct.
` Q. Now, Mr. Gates mentioned in his testimony
`earlier that there are two different types of
`connections that can be set up, and I referenced that
`earlier. Right?
` A. Yes, indeed.
` Q. One we've been referring to from time to time
`is the peer-to-peer connection, which is the one that
`we've been showing in some of these illustrations.
`Right?
` A. That's right.
` Q. And the other is through the relay servers?
` A. That's right.
` Q. Now, again, there's -- there's no disagreement
`on the relay server connection, that there's
`non-infringement -- there's no infringement by FaceTime
`when they use the relay servers. Correct?
`
`Page 28
`communication or direct addressing, does the relay
`server perform when it's involved in this connection?
` A. Well, what it's going to do is, just like the
`NATs, it's going to readdress the IP packets. It's
`going to take one address out, and it's going to put
`another one in. And this is what I'm showing here.
` Now, the black iPhone wants to ultimately
`communicate with the white iPhone, and what it does is
`it sends its packets addressed to the green relay
`server, and that's the first one up on top here. It
`says the address is the address of the relay.
` The relay server changes, takes that address
`out, the green address out, re-addresses it to the red
`NAT 2, and that sends the packet on to NAT 2 with the
`red address, and then NAT 2 does what we've already
`seen.
` It takes the red -- its own red NAT 2 address
`out, and it puts the address of the iPhone and sends it
`out. So there's re-addressing occurring in the relay
`server and in the red NAT in this direction.
` Q. All right. So in a situation where NAT 1
`can't talk to NAT 2 and vice versa -- obvious situation
`where two people are not talking, right -- then NAT 1
`instead will just say send it to relay server and say
`this needs to go to NAT 2. Right?
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`
`Page 27
` A. That's correct. We've all agreed to that.
` Q. Okay. Now, FaceTime can use either type of
`connection, right?
` A. It can.
` Q. Okay. Now, I'd like to talk about the relay
`server connection just a little bit so that we can
`better understand the peer-to-peer connection. Is that
`all right?
` A. That would be fine, yes.
` Q. Okay. So we're going to start with the
`scenario -- that everyone agrees -- does not use
`VirnetX's technology.
` I'd like to take a look at an animation and
`have you explain to us how it is that the relay servers
`work with respect to this notion of direct communication
`or direct addressability.
` A. Yes.
` Q. Now, first of all, why would a relay server --
`can you give us an example of why the relay server would
`become involved in the first place?
` A. Well, sometimes the two NATs can't talk to
`each other without going through a relay server. Some
`NATs can, and some NATs can't. So in the case that they
`can't, you require a relay server.
` Q. Now, what function, in terms of direct
`Page 29
`
`1
` A. Yes.
`2
` Q. Okay. So then it will do this re-addressing.
`3
`So this is an example that we all agree is not direct
`4
`communication. Right?
`5
` A. Correct.
`6
` Q. Okay. And that's why it would not infringe,
`7
`right, not direct communication?
`8
` A. Correct

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket