throbber
Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`
`
`Paper No. _______
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`___________________
`
`
`
`Apple Inc.,
`Petitioner,
`v.
`
`
`
`VirnetX, Inc. and Science Application International Corporation,
`Patent Owner
`
`
`
`
`Patent No. 7,490,151
`Issued: Feb. 10, 2009
`Filed: Sep. 30, 2002
`Inventors: Edmund C. Munger, et al
`Title: Establishment of a Secure Communication Link Based Domain Name
`Service (DNS) Request
`____________________
`
`Inter Partes Review No. IPR2013-00354
`__________________________________________________________________
`
`PETITION FOR INTER PARTES REVIEW
`
`
`
`
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`TABLE OF CONTENTS
`
`Compliance With Requirements For A Petition For Inter
`
`I.
`Partes Review ...................................................................................................... 1
`A. Certification the ’151 Patent May Be Contested by Petitioner ....... 1
`B.
`Fee for Inter Partes Review (§ 42.15(a)) ........................................... 3
`II. Mandatory Notices (37 CFR § 42.8(b)) ........................................................ 3
`A. Real Party in Interest (§ 42.8(b)(1)) ................................................... 3
`B. Other Proceedings (§ 42.8(b)(2)) ........................................................ 3
`C. Designation of Lead and Backup Counsel ........................................ 4
`D.
`Service Information (§42.8(b)(4)) ...................................................... 4
`E.
`Proof of Service (§§ 42.6(e) and 42.105(a)) ....................................... 5
`III.
`Identification of Claims Being Challenged (§ 42.104(b)) ..................... 5
`IV. Relevant Information Concerning the Contested Patent ...................... 6
`A.
`Effective Filing Date and Prosecution History of the ’151 patent .. 6
`B.
`Person of Ordinary Skill in the Art ................................................... 7
`C. Construction of Terms Used in the Claims ....................................... 8
`1.
`Domain Name (Claims 1-16) ...................................................... 8
`2.
`Domain Name Server (Claims 1-16) .......................................... 9
`3.
`Domain Name Server (DNS) Proxy Module (Claims 1, 7) ........ 9
`4.
`Secure Server (Claims 1-16) ..................................................... 10
`5.
`IP Address Hopping Scheme (Claims 5 and 11) ...................... 10
`Precise Reasons for Relief Requested ...................................................... 11
`A. Claims 1-16 Are Anticipated By Aventail (Ex. 1007) .................... 11
`1.
`Aventail Anticipates Claim 1 .................................................... 11
`2.
`Aventail Anticipates Claim 7 .................................................... 14
`3.
`Aventail Anticipates Claim 13 .................................................. 18
`4.
`Aventail Anticipates Claim 2, 8 and 14 .................................... 19
`
`V.
`
`i
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`Aventail Anticipates Claim 3, 9 and 15 .................................... 20
`5.
`Aventail Anticipates Claims 4, 10 and 16 ................................ 22
`6.
`Aventail Anticipates Claim 5 and 11 ........................................ 22
`7.
`Aventail Anticipates Claim 6 and 12 ........................................ 23
`8.
`B.
`Aventail and RFC 1035 Render Claims 3, 9 and 15 Obvious ....... 23
`C. Aventail In View of Reed I Renders Claims 5 and 11 Obvious .... 25
`D. Claims 1-16 Are Anticipated By BinGO (Ex. 1008). ...................... 27
`1.
`BinGO Anticipates Claim 1 ...................................................... 27
`2.
`BinGO Anticipates Claim 7 ...................................................... 30
`3.
`BinGO Anticipates Claim 13 .................................................... 33
`4.
`BinGO Anticipates Claims 2, 8 and 14 ..................................... 34
`5.
`BinGO Anticipates Claims 3, 9 and 15 ..................................... 35
`6.
`BinGO Anticipates Claim 4, 10, and 16 ................................... 36
`7.
`BinGO Anticipates Claim 5 and 11 .......................................... 36
`8.
`BinGO Anticipates Claims 6 and 12 ......................................... 37
`BinGO In View of Reed Renders Claims 5 and 11 Obvious ......... 38
` 39
`1.
`Beser Anticipates Claim 1 ........................................................ 39
`2.
`Beser Anticipates Claim 7 ........................................................ 41
`3.
`Beser Anticipates Claim 13 ...................................................... 43
`4.
`Beser Anticipates Claims 2, 8, and 14 ...................................... 44
`5.
`Beser anticipates Claims 3, 9, and 15 ....................................... 46
`6.
`Beser Anticipates Claims 4, 10 and 16 ..................................... 47
`7.
`Beser Anticipates Claims 5 and 11 ........................................... 47
`8.
`Beser Anticipates Claims 6 and 12 ........................................... 48
`Beser Considered with RFC 2401 Renders Obvious Claims 1-16 49
`1.
`Claims 1, 7, and 13 Would Have Been Obvious ...................... 50
`2.
`Dependent Claims 2-6, 8-12, and 14-16 ................................... 52
`
`Claims 1-16 Are Anticipated by U.S. Patent No. 6,496,867 (Beser)
`
`E.
`F.
`
`G.
`
`ii
`
`

`

`Dependent Claims 5 and 11 ...................................................... 53
`3.
`Beser in View of Blum Renders Obvious Claims 1-16 ................... 54
`H.
`1.
`Claims 1, 7, and 13 Would Have Been Obvious ...................... 54
`2.
`Claims 2-6, 8-12, and 14-16 Would Have Been Obvious ........ 56
`Beser in view of Hoke Renders Claims 1-16 Obvious .................... 57
`I.
`1.
`Claims 1, 7, and 13 Would Have Been Obvious ...................... 57
`2.
`Claims 2-6, 8-12, and 14-16 Would Have Been Obvious ........ 58
`J.
`Claims 1-16 Obvious ......................................................................... 59
`K.
`Claims 1-16 Obvious ......................................................................... 60
`CONCLUSION ..................................................................................................... 60
`
`Beser in View of RFC 2401, and Further in View of Blum Renders
`
`Beser in View of Hoke, and Further in View of Blum Renders
`
`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`VI.
`
`
`
`Attachment A. Proof of Service of the Petition
`
`Attachment B. List of Evidence and Exhibits Relied Upon in Petition
`
`
`
`
`
`iii
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`I.
`
`Compliance With Requirements For A Petition For Inter Partes Review
`A. Certification the ’151 Patent May Be Contested by Petitioner
`Petitioner certifies it is not barred or estopped from requesting inter partes
`
`review of U.S. Patent No. 7,490,151 (the ’151 patent) (Ex. 1001). Neither
`
`Petitioner, nor any party in privity with Petitioner, has filed a civil action
`
`challenging the validity of any claim of the ’151 patent. The ’151 patent has not
`
`been the subject of a prior inter partes review by Petitioner or a privy of Petitioner.
`
`Petitioner also certifies this petition for inter partes review is filed within
`
`one year of the date of service of a complaint alleging infringement of a patent.
`
`Petitioner was served with a complaint alleging infringement of the ’151 patent on
`
`December 31, 2012, which led to Civil Action No. 6:12-cv-00855-LED in the
`
`Eastern District of Texas. Ex. 1050. Because the date of this petition is less than
`
`one year from December 31, 2012, this petition complies with 35 U.S.C. § 315(b).
`
`Petitioner notes it was previously served with a complaint asserting
`
`infringement of the ’151 patent in August of 2010, which led to Civil Action No:
`
`6:10-cv-417. During that action, the District Court established an additional civil
`
`action, Civil Action No. 6:13-cv-00211-LED, on February 26, 2013 (also pending
`
`in the Eastern District of Texas). The August 2010 complaint does not foreclose
`
`the present petition, as Patent Owner served a new complaint on Petitioner
`
`asserting infringement of the ’151 patent in December of 2012.
`
`
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`Petitioner submits this conclusion is compelled by the plain language of
`
`§ 315(b). Notably, § 315(b) does not specify a one-year deadline that runs from
`
`the date of the first complaint served on a petitioner. Rather, it states “[a]n inter
`
`partes review may not be instituted if the petition requesting the proceeding is filed
`
`more than 1 year after the date on which the petitioner, real party in interest, or
`
`privy of the petitioner is served with a complaint alleging infringement of the
`
`patent.” Thus, a petition filed within 1 year of the date any complaint alleging
`
`infringement of the patent is served on a petitioner is timely under the plain
`
`statutory language of § 315(b). This is also the only reading of § 315(b) consistent
`
`with the statutory design. Congress designed the IPR authority to be option to
`
`contest validity of a patent concurrently with district court proceedings involving
`
`the same patent. A timely filed IPR proceeding in any action a patent owner elects
`
`to commence is perfectly consistent with this statutory design.
`
`Reading § 315(b) in this manner also is the only way to effectively foreclose
`
`gaming of the system by a Patent Owner. Indeed, if § 315(b) were read to
`
`foreclose IPR proceedings in a second, independent action for infringement a
`
`patent owner elected to commence, it would unfairly foreclose use of the IPR
`
`system. For example, a patent owner could assert irrelevant claims in a first action,
`
`wait a year, and then assert different claims in a new action that do present risks to
`
`a third party. In this scenario, the patent owner would foreclose legitimate use of
`
`2
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`an IPR to contest validity of the patent claims asserted in the second action based
`
`on the third party’s reasonable business decision to not dispute validity of
`
`irrelevant claims in the first action. Rather than attempting to decipher which
`
`scenarios would be improper, the Board should follow the plain meaning of
`
`§ 315(b), and find a petition timely if it is filed within 1 year of the date any
`
`complaint alleging infringement of the patent is served on a Petitioner.
`
`Finally, reading §315(b) to foreclose this petition based on the August 2010
`
`complaint would be particularly unjust in this case. The 1-year period following
`
`service of the August 2010 complaint expired before it was possible to submit an
`
`IPR petition – petitions could only be filed on or after September 16, 2012.
`
`Fee for Inter Partes Review (§ 42.15(a))
`
`B.
`The Director is authorized to charge the fee specified by 37 CFR § 42.15(a)
`
`to Deposit Account No. 50-1597.
`
`II. Mandatory Notices (37 CFR § 42.8(b))
`A. Real Party in Interest (§ 42.8(b)(1))
`The real party of interest of this petition pursuant to § 42.8(b)(1) is Apple
`
`Inc. (“Apple”) located at One Infinite Loop, Cupertino, CA 95014.
`
`B. Other Proceedings (§ 42.8(b)(2))
`The ’151 patent is the subject of a number of civil actions including: (i) Civ.
`
`Act. No. 6:13-cv-00211-LED (E.D. Tex.), filed February 26, 2013; (ii) Civ. Act.
`
`No. 6:12-cv-00855-LED (E.D. Tex.), filed November 6, 2012; (iii) Civ. Act. No.
`
`3
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`6:10-cv-00417-LED (E.D. Tex.), filed August 11, 2010 (the “2010 litigation), (iv)
`
`Civ. Act. No. 6:13-cv-00351-LED (E.D. Tex), filed April 22, 2013. Actions (i) to
`
`(iii) name Petitioner as a defendant.
`
`The ’151 patent is also the subject of merged inter partes reexamination
`
`Nos. 95/001,697 and 95/001,714. Petitioner is the real party of interest in the ’697
`
`proceeding. In the merged proceedings, the Office issued a Non-Final Action on
`
`April 20, 2012 rejecting all 16 claims of the ‘151 patent, including rejections based
`
`on several prior art references relied upon in this Petition. In sum, the Office has
`
`rejected each of claims 1-16 as being anticipated or obvious based on Ex. 1007
`
`(Aventail), Ex. 1008 (BinGO), and Ex. 1009 (Beser), as well as over several other
`
`prior art references. Petitioner recognizes it is appropriate for the Panel to merge,
`
`join or take other steps to manage these proceedings.
`
`C. Designation of Lead and Backup Counsel
`
`Lead Counsel
`Jeffrey P. Kushan
`Reg. No. 43,401
`jkushan@sidley.com
`(202) 736-8914
`D.
`Service on Petitioner may be made by mail or hand delivery to: Sidley
`
`Backup Lead Counsel
`Joseph A. Micallef
`Reg. No. 39,772
`jmicallef@sidley.com
`(202) 736-8492
`
`Service Information (§42.8(b)(4))
`
`Austin LLP, 1501 K Street, N.W., Washington, D.C. 20005. The fax number for
`
`lead and backup counsel is (202) 736-8711.
`
`4
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`E.
`Proof of Service (§§ 42.6(e) and 42.105(a))
`Proof of service of this petition is provided in Attachment A.
`
`III.
`
`Identification of Claims Being Challenged (§ 42.104(b))
`Claims 1-16 of the ’151 patent are unpatentable for the following reasons:
`
`(i)
`
`Claims 1-16 are anticipated under § 102(b) by Aventail (Ex. 1007);
`
`(ii) Claims 3, 9 and 15 are obvious under § 103 based on Aventail (Ex.
`1007) in view of RFC 1035 (Ex. 1017);
`
`(iii) Claims 5 and 11 are obvious under § 103 based on Aventail (Ex.
`1007) in view of Reed (Ex. 1014);
`
`(iv) Claims 1-16 are anticipated under § 102(a) by BinGO (Ex. 1008);
`
`(v) Claims 5 and 11 are obvious under § 103 based on BinGO (Ex. 1008)
`in view of Reed I (Ex. 1014);
`
`(vi) Claims 1-16 are anticipated under § 102(e) by Beser (Ex. 1009);
`
`(vii) Claims 1-16 are obvious under § 103 based on Beser (Ex. 1009) in
`view of RFC 2401 (Ex. 1010);
`
`(viii) Claims 1-16 are obvious under § 103 based on Beser (Ex. 1009) in
`view of Blum (Ex. 1011);
`
`(ix) Claims 1-16 are obvious under § 103 based on Beser (Ex. 1009) in
`view Hoke (Ex. 1012);
`
`(x) Claims 1-16 are obvious under § 103 based on Beser (Ex. 1009) in
`view of RFC 2401 (Ex. 1010), further in view of Blum (Ex. 1011);
`
`(xi) Claims 1-16 are obvious under § 103 based on Beser (Ex. 1009) in
`view of Hoke (Ex. 1012), further in view of Blum (Ex. 1011).
`
`5
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`Petitioner’s proposed construction of the contested claims, the evidence relied
`
`upon, and the precise reasons why the claims are unpatentable are provided in
`
`§ IV, below. The evidence relied upon in support of this petition is listed in
`
`Attachment B.
`
`IV. Relevant Information Concerning the Contested Patent
`A. Effective Filing Date and Prosecution History of the ’151 patent
`The ’151 patent issued from U.S. Application No. 10/259,494, filed
`
`September 30, 2002. The ’494 application is a division of U.S. Application No.
`
`09/504,783, filed on February 15, 2000, now U.S. Patent No. 6,502,135, which is a
`
`continuation-in-part of U.S. Application No. 09/429,653, filed on October 29,
`
`1999, now U.S. Patent No. 7,010,604. The ’494, ’783 and ’653 applications each
`
`claim priority under 35 U.S.C. 119(e) to Provisional Application Nos. 60/106,261,
`
`filed October 30, 1998 and 60/137,704, filed June 7, 1998.
`
`Claims 1, 7 and 13 of the ’151 patent are independent claims. Claims 2-6
`
`depend from claim 1, claims 8-12 depend from claim 7, and claims 14-16 depend
`
`from claim 13. Consequently, claims 2-6, 8-12, and 14-16 cannot enjoy an
`
`effective filing date earlier than that of claims 1, 7 and 13, respectively, from
`
`which they depend.
`
`Claims 1, 7 and 13 of the ’151 patent rely on information first presented in
`
`the ‘783 application. For example, claim 1 of the ’151 patent specifies
`
`6
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`“determining whether the intercepted DNS request corresponds to a secure server”
`
`and subsequent steps involving the DNS request. Similarly, claims 7 and 13
`
`include limitations involving DNS requests (e.g., “intercepting a DNS request
`
`sent by a client . . .” and “determining whether the intercepted DNS request
`
`corresponds to a secure server . . .”, respectively). The first application that even
`
`recited the term “DNS” was the ’783 application. Because none of the ’653, ’261
`
`application or ’704 applications disclose or even suggest use in any manner of
`
`DNS requests or proxy servers, these earlier filed applications do not describe or
`
`enable the subject matter defined by at least claims 1, 7 and 13 of the ’151 patent.
`
`Accordingly, the effective filing date of claims 1-16 of the ’151 patent is no earlier
`
`than February 15, 2000.
`
`Person of Ordinary Skill in the Art
`
`B.
`A person of ordinary skill in the art in the field of the ’151 patent would
`
`have been someone with a good working knowledge of networking protocols,
`
`including those employing security techniques, as well as computer systems that
`
`support these protocols and techniques. The person also would be very familiar
`
`with Internet standards related to communications and security, and with a variety
`
`of client-server systems and technologies. The person would have gained this
`
`knowledge either through education and training, several years of practical
`
`working experience, or through a combination of these. Ex. 1003 at ¶66.
`
`7
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`C. Construction of Terms Used in the Claims
`In this proceeding, claims must be given their broadest reasonable
`
`construction in light of the specification. 37 CFR 42.100(b). The broadest
`
`reasonable construction should encompass subject matter that Patent Owner
`
`contends infringes the claims, and should reflect constructions proposed by Patent
`
`Owner in past or concurrent litigation. Also, if Patent Owner contends terms in the
`
`claims should be read to have a special meaning in this proceeding, those
`
`contentions should be disregarded unless Patent Owner amends the claims
`
`compliant with 35 U.S.C. § 112 to make them expressly correspond to those
`
`contentions. See 77 Fed. Reg. 48764 at II.B.6 (August 14, 2012). Cf., In re
`
`Youman, 679 F.3d 1335, 1343 (Fed. Cir. 2012). In the proposed constructions
`
`below, Petitioner identifies subject matter which falls within the scope of the
`
`claims, read in their broadest reasonable construction, which Petitioner submits is
`
`sufficient for the purposes of this proceeding.
`
`Domain Name (Claims 1-16)
`
`1.
`The ’151 patent does not explicitly define the term “domain name.” Patent
`
`Owner has asserted a “domain name” means “a name corresponding to an IP
`
`address.” Ex. 1046 at 14-15. The broadest reasonable construction of this
`
`“domain name” should include Patent Owner’s proposed definition.
`
`8
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`2.
`Domain Name Server (Claims 1-16)
`The ’151 patent does not explicitly define the term “Domain Name
`
`Server.” The ’151 patent indicates that when this term is used, it is being used
`
`generally as a “server” that returns an IP address in response to a request
`
`containing a domain name. See Ex. 1003 at ¶¶195-197. A domain name server
`
`performs domain name resolution according to Internet standards, namely, RFC
`
`1034 (Ex. 1016 ) and RFC 1035 (Ex. 1017). Pursuant to those standards, a domain
`
`name server will not always return an IP address – an error also may be returned.
`
`Ex. 1003 at ¶¶114-123. The broadest reasonable construction of “Domain Name
`
`Server” thus includes “a computer or computer-based process that will return an IP
`
`address or an error code in response to a domain name resolution request.”
`
`3.
`Domain Name Server (DNS) Proxy Module (Claims 1, 7)
`The ‘151 patent does not define the term “DNS Proxy Module.” Indeed,
`
`only claims 1, 7 and 13 recite this term. The disclosure does discuss features of a
`
`“DNS Proxy.” For example, it explains a DNS proxy may distribute its functions
`
`across multiple computers and processes. See Ex. 1003 at ¶202 (citing to Ex. 1001
`
`at 37:60-38:21). Patent Owner also has asserted a “DNS proxy server” means “a
`
`computer or program that responds to a domain name inquiry in place of a DNS.”
`
`Ex. 1046 at 16-17. Given the absence of any description of a “DNS proxy
`
`module” in the ’151 disclosure, this term appears to be indisguishable from a
`
`9
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`“DNS proxy server.” The broadest reasonable construction of a “DNS Proxy
`
`Module” thus includes “one or more computers or processes that individually or
`
`collectively respond to a domain name inquiry in place of a DNS server.”
`
`4.
`Secure Server (Claims 1-16)
`The ’151 patent does not define the term “secure server.” Patent Owner has
`
`asserted that a “secure server” means “a server that requires authorization for
`
`access and that can communicate in an encrypted channel.” Ex. 1046 at 24. The
`
`broadest reasonable construction of these terms should include Patent Owner’s
`
`proposed constructions for this term. Also, several claims recite a “secure sewer.”
`
`While Petitioner believes this is a typographical error, Patent Owner has not, as of
`
`the date of this petition, corrected this error in the claims.
`
`IP Address Hopping Scheme (Claims 5 and 11)
`
`5.
`The ’151 patent does not define the term “IP address hopping scheme.” It
`
`does refer to a variety of schemes that route traffic through intermediary network
`
`devices according to a pre-defined scheme as “IP hopping schemes.” See, e.g., Ex.
`
`1001 at 5:36-6:3, 14:39-63. These schemes use a wide variety of routing concepts
`
`and strategies. Based on this, the broadest reasonable construction of “IP address
`
`hopping scheme” encompasses any type of scheme for routing IP traffic from a
`
`client to a destination through intermediary devices. Also, claim 5 recites an “IF”
`
`10
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`hopping scheme, which the Petitioner understands to be a typographical error.
`
`Patent Owner has not, as of the date of this petition, corrected this error.
`
`V.
`
`Precise Reasons for Relief Requested
`A. Claims 1-16 Are Anticipated By Aventail (Ex. 1007)
`Aventail (Ex. 1007) is a printed publication that was publicly distributed no
`
`later than January 31, 1999. Ex. 1003 at ¶¶ 215-222; Ex. 1005 at ¶¶ 11-36; Ex.
`
`1006 at ¶¶ 11-24. Aventail is prior art to the ’151 patent at least under 35 U.S.C.
`
`§§ 102(a) and (b). A concise summary of the systems and processes described in
`
`Aventail is provided at ¶¶ 262 to 356 of Ex. 1003 and at ¶¶14 to 78 of Ex. 1005.
`
`Aventail Anticipates Claim 1
`
`1.
`Aventail shows a client computer running Aventail Connect will intercept
`
`each connection request made on the client. Ex. 1003 at ¶¶ 266-272, 276. This is
`
`the same technique described in the ’151 patent. See Ex. 1001 at 37:60-38:10; see
`
`also Ex. 1007 (Aventail) at ¶ 277. The request can be evaluated at the client
`
`computer or at a DNS proxy server (e.g., the Aventail Extranet Server or “AES”).
`
`Ex. 1003 at ¶¶ 267, 272, 280-287 (client computer); ¶¶ 286-287, 296-297 (Extranet
`
`Server). For example, the client computer could be configured to proxy all
`
`connection requests to a DNS proxy server for handling and resolution by enabling
`
`the “DNS Proxy Option” in the Aventail Connect client. Ex. 1003 at ¶¶ 286-287,
`
`296-297, 303, 311, 315, 321. The Aventail Connect client also could evaluate
`
`connection requests locally. Ex. 1003 at ¶¶ 279-284, 289-295, 307. A “DNS
`
`11
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`Proxy Module” per claim 1 can reside on the same or a different computer as the
`
`one where the DNS request originates. See § IV.C.3. It also can be a “process”
`
`performed on a single computer or by computers working together. Id. Thus, a
`
`client computer running Aventail Connect, the server computer running AES, or
`
`both, comprise “a DNS proxy module.” Aventail thus describes “[a] data
`
`processing device, comprising memory storing a domain name server (DNS) proxy
`
`module that intercepts DNS requests sent by a client and, for each intercepted DNS
`
`request, performs the steps.” Ex. 1003 at ¶¶ 357-360; see id. at ¶¶75-78.
`
`Aventail explains redirection rules are used to identify DNS requests made
`
`on a client computer containing a domain name or IP address on a private network
`
`requiring secure communications. Ex. 1003 at ¶¶ 267-268, 274, 279-282, 284-287,
`
`303-317, 321. If a domain name in a request matches a domain name in a
`
`redirection rule, Aventail Connect would flag that request to be proxied to the
`
`proxy server for handling. Ex. 1003 at ¶¶ 267-268, 274, 279-282, 284-287, 303-
`
`317, 321. Aventail thus describes a data processing device that performs the step
`
`of “determining whether the intercepted DNS request corresponds to a secure
`
`server.” Ex. 1003 at ¶¶ 361-370.
`
`Aventail shows that if a DNS request containing a domain name or an IP
`
`address does not match a local name resolution rule or a redirection rule, it will be
`
`handed off to client operating system for handling, which will perform a DNS
`
`12
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`lookup and returns the IP address “as if Aventail Connect were not running.” Ex.
`
`1003 at ¶ 267, 272-273, 283-281, 314. Domain names and IP addresses that match
`
`a redirection rule are “secure” destinations (e.g., hosts on a private network), while
`
`other domains are “non-secure” (e.g., public websites). Ex. 1003 at ¶ 313.
`
`Aventail also shows Aventail Connect can be configured to perform local name
`
`resolution on domain names in a request. Ex. 1003 at ¶¶ 279-284, 289-295, 307.
`
`Locally resolved domain name are not secure destinations because requests
`
`containing them will not be forwarded to the proxy server (AES). Ex. 1003 at ¶¶
`
`279-284, 289-295, 307. Aventail thus shows a data processing device that
`
`performs the step of “(ii) when the intercepted DNS request does not correspond to
`
`a secure server, forwarding the DNS request to a DNS function that returns an IP
`
`address of a nonsecure computer, and.” Ex. 1003 at ¶¶ 371-377.
`
`In the Aventail systems, if an intercepted DNS request contained a domain
`
`name that matched a redirection rule, the request would trigger a sequence of steps
`
`that would establish a VPN between the client computer and the secure destination.
`
`Ex. 1003 at ¶¶ 263, 267-269, 274, 304, 317-318, 322, 323, 343-350. Specifically,
`
`the request would flagged for special handling by by the Aventail Connect client
`
`by inserting a false entry (“HOSTENT”) into it. Ex. 1003 at ¶¶ 278-279, 303, 311-
`
`313. Then, after the name resolution step, the request would be evaluated – if it
`
`contained the false entry or an IP address matching a redirection rule, the client
`
`13
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`would know the request would have to be sent (“proxied”) to the proxy server
`
`(AES) specified in the redirection rule for that domain name or IP address. Ex.
`
`1003 at ¶¶ 267-268, 274, 278-287, 296-299, 303-317, 321. To do that, the client
`
`computer would open a connection to the proxy server and authenticate the user.
`
`Ex. 1003 at ¶¶ 264, 267, 269, 271-273, 286, 300, 302, 307, 319, 320, 323-332. If
`
`authentication was successful, the original request would be sent to the server, and
`
`communications would proceed. Id. Aventail explains that communications
`
`between the client and the private network are automatically encrypted/decrypted.
`
`Ex. 1003 at ¶¶ 263, 267-269, 274, 304, 317-318, 322, 323, 343-350. Aventail thus
`
`shows a data processing device wherein “(iii) when the intercepted DNS request
`
`corresponds to a secure server, automatically initiating an encrypted channel
`
`between the client and the secure server.” Because it describes a device having all
`
`the elements in claim 1, Aventail anticipates claim 1. Ex. 1003 at ¶¶ 378-379.
`
`Aventail Anticipates Claim 7
`
`2.
`Claim 7 is closely analogous to claim 1, and consequently Aventail
`
`anticipates claim 7 for essentially the same reasons it anticipates claim 1. See §1,
`
`above. Aventail explains that Aventail Connect and Aventail Extranet Server are
`
`software products that run on client or server computers. Ex. 1003 at ¶ 263.
`
`Aventail thus describes “a computer readable medium… comprised of computer
`
`14
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`readable instructions that, when executed cause a data processing device to
`
`perform the steps” specified by the software. Ex. 1003 at ¶¶ 434-440.
`
`Aventail shows a client computer running Aventail Connect will intercept
`
`each connection request made on that client. Ex. 1003 at ¶¶ 266-272, 276. This is
`
`the same technique described in the ‘151 patent. See Ex. 1001 at 37:60-38:10; See
`
`also Ex. 1007 (Aventail) at ¶ 277. The request can be evaluated at the client
`
`computer or at a DNS proxy server (e.g., the AES). Ex. 1003 at ¶¶ 267, 272, 280-
`
`287 (client computer); ¶¶ 286-287, 296-297 (Extranet Server). A “DNS Proxy
`
`Module” per claim 1 can reside on the same or a different computer as the one
`
`where the DNS request originates, and can be a “process” performed on a single
`
`computer or by computers working together. See § IV.C.3. A client computer
`
`running Aventail Connect, a server computer running AES or both may comprise
`
`“a DNS proxy module.” Ex. 1003 at ¶¶ 286-287, 296-297, 303, 311, 315, 321
`
`Aventail thus describes a computer readable medium comprising instructions that
`
`will cause a computer to perform the step of “(i) intercepting a DNS request sent
`
`by a client.” Ex. 1003 at ¶¶ 441-442.
`
`Aventail explains redirection rules are used to identify DNS requests made
`
`on a client computer containing a domain name or IP address on a private network
`
`requiring secure communications. Ex. 1003 at ¶¶ 267-268, 274, 279-282, 284-287,
`
`303-317, 321. If a domain name in a request matches a domain name in a
`
`15
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`redirection rule, Aventail Connect would flag that request to be proxied to the
`
`proxy server for handling. Ex. 1003 at ¶¶ 267-268, 274, 279-282, 284-287, 303-
`
`317, 321. Aventail thus describes a data processing device that performs the step
`
`of “determining whether the intercepted DNS request corresponds to a secure
`
`server.” Ex. 1003 at ¶¶ 443-452.
`
`Aventail shows that if a DNS request containing a domain name or an IP
`
`address does not match a local name resolution rule or a redirection rule, it will be
`
`handed off to client operating system for handling, which will perform a DNS
`
`lookup and returns the IP address “as if Aventail Connect were not running.” Ex.
`
`1003 at ¶¶ 267, 272-273, 283-281, 314. Domain names and IP addresses that
`
`match a redirection rule are “secure” destinations (e.g., hosts on a private network),
`
`while other domains are “non-secure” (e.g., public websites). Ex. 1003 at ¶ 313.
`
`Aventail also shows Aventail Connect can be configured to perform local name
`
`resolution on domain names in a request. Ex. 1003 at ¶¶ 279-284, 289-295, 307.
`
`Locally resolved domain name are not secure destinations because requests
`
`containing them will not be forwarded to the proxy server (AES). Id. Aventail
`
`thus shows a data processing device that performs the step of “(ii) when the
`
`intercepted DNS request does not correspond to a secure server, forwarding the
`
`DNS request to a DNS function that returns an IP address of a nonsecure
`
`computer.” Ex. 1003 at ¶¶ 453-454.
`
`16
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`In the Aventail systems, if an intercepted DNS request contained a domain
`
`name that matched a redirection rule, the request would trigger a sequence of steps
`
`that would establish a VPN between the client computer and the secure destination.
`
`Ex. 1003 at ¶¶ 263, 267-269, 274, 304, 317-318, 322, 323, 343-350. Specifically,
`
`the request would flagged for special handling by by the Aventail Connect client
`
`by inserting a false entry (“HOSTENT”) into it. Ex. 1003 at ¶¶ 278-279, 303, 311-
`
`313. Then, after the name resolution step, the request would be evaluated – if it
`
`contained the false entry or an I

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket