`Case 6:07—cv—00080—LED
`Document 246
`Filed 07/30/2009
`Page 1 of 35
`
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`
`TYLER DIVISION
`
`
`
`§ §
`
`VIRNETX, INC.
`
`Plaintiff
`
`
`§ §
`
`vs.
`
`CASE NO. 6:07 CV 80
`§
`§
`PATENT CASE
`
`MICROSOFT CORPORATION
`
`
`§ §
`
`§ §
`
`Defendant
`
`
`
`MEMORANDWI OPTNION
`
`
`This claim construction opinion interprets the disputed terms in US. Patent Nos. 6,502,135
`
`
`(“the ‘ 135 patent”); 6,839,759 (“the ‘759 patent”); and 7,188,180 (“the ‘180 patent”). Appendix A
`
`contains the disputed terms, as they appear in the asserted claims of these patents. Appendix B
`
`contains a chart summarizing the Court’s constructions.
`
`BACKGROUND
`
`PlaintiffVimetX, Inc. (‘Wimet ”) accuses Microsoft Corporation (“Microsoft”) of infringing
`
`
`claims of the T35, 75?, and T80 patents. The ”T35 patent discloses a method or transparently
`
`creating a Virtual private network between a client computer and a target computer. The ‘759 patent
`
`mscbsesamemodferefiawghingaWNMmQMauseremefingwerflenfificafiwW
`
`The ‘75 9 patent is related to the ‘ 135 patent through other continuation-in-part applications/patents.
`
`
`The ‘ 180 patent discloses a method for establishing a VPN using a secure domain name service. The
`
`
`—‘180_pammmmlmedmme‘B5patemfiamxisjond_patem_oLconfimaflmfinqlart—
`
`
`applications/patents of the ‘135 patent. The ‘759 and ‘180 patents share the same specification.
`
`
`
`
`
`
`New Bay Capital, LLC
`W-Page 1 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 1 of 35
`
`
`
`
`Case 6:07—cv—00080—LED
`Document 246
`Filed 07/30/2009
`Page 2 of 35
`
`
`APPLICABLE LAW
`
`“It is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention to
`
`
`which thepatentee isentitledtherightteexclude.” P1441119: HWHCmay, 445 F.3d1303,134°
`
`(Fed. Cir. 2005) (en banc) (quoting [Imam/Pure Water Inc. v. Safari Wczlc/‘Flllrallon S131, Inc, 381
`
`
`F .3d 1111, 1115 (Fed. Cir. 2004)).
`
`1n claim construction, courts examine the patent’s intrinsic
`
`evidence to define the patented invention’s scope. See id; C.R. Bard, Inc. v. US. Surgical Corp,
`
`
`
`
`388 F.3d 858, 861 (Fed. Cir. 2004);Bcfl741‘l. i’V‘cfimfifim‘vfimflvadGmm’ns Group, Inc,
`
`
`262 F.3d 1258, 1267 (Fed. Cir. 2001). This intrinsic evidence includes the claims themselves, the
`
`
`specification, and the prosecution history. See Phillips, 415 F .3d at 1314; CR. Bard, Inc, 3 88 F .3d
`
`
`at861. CeurfigivcchimersttherWandmcfiemcdmcMgasundcrstwdbyemef
`
`ordinary skill in the art at the time of the invention in the context of the entire patent. Phillips, 415
`
`
`F.3d at 1312—13;Alloc, Inc. v. Int’l Trade Comm ’n, 342 F.3d 1361, 1368 (Fed. Cir. 2003).
`
`The claims themselves provide substantial guidance in determining the meaning ofparticular
`
`
`claim terms.
`
`1977777717303, 4d5 F.3d at 13M. First, a Wmfittexfiffimmtemmmy—
`
`instructive. Id. Other asserted or unasserted claims can also aid in determining the claim’s meaning
`
`
`because claim terms are typically used consistently throughout the patent. Id. Differences among
`
`the claim terms can also assist in understanding a term’s meaning. Id. For example, when a
`
`
`
`dependent claim adds a lim1tation to an independent claim, it is presumed that the independent claim
`
`
`does not include the limitation. Id. at 1314—15.
`
`
`“[C]laims ‘must be read in View of the specification, of which they are a part.m Id. (quoting
`
`
`Ma—rkman v. Widen} WS, Inc., 52 F.3d 967, 979 (Fed. Cir. 1995) (en barfcj). “[TIhe
`
`specification ‘is always highly relevant to the claim construction analysis. Usually, it is dispositive;
`
`
`
`
`New Bay Capital, LLC
`W-Page 2 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 2 of 35
`
`
`
`Page 3 of 35
`Filed 07/30/2009
`Document 246
`Case 6:07—cv—00080—LED
`
`
`
`
`it is the single best guide to the meaning of a disputed term.”’ Id. (quoting Vitronics Corp. v.
`
`Conceptronic, Inc. , 90 F.3d 1576, 1582 (Fed. Cir. 1996)); Teleflex, Inc. v. Ficosa N. Am. Corp, 299
`
`
`F.3d1313,1325 (Fed. Cir. 2002). "HM is truebeeause apatentee maydefine Mew terms, give
`
`a claim term a different meaning than the term would otherwise possess, or disclaim or disavow the
`
`
`claim scope. Phillips, 415 F.3d at 1316. In these situations, the inventor’s lexicography governs.
`
`Id. Also, the specification may resolve ambiguous claim terms “Where the ordinary and accustomed
`
`
`
`ascertained from the words alone.” Tcleflex, Inc., 299 F .3d at 1325. But, “‘[a]1though the
`
`
`specification may aid the court in interpreting the meaning of disputed claim language, particular
`
`
`wmmmemswpemgmmewecificafiwMMgemmlbbemmteme
`
`claims.”’ Comark Commc ’ns, Inc. v. Harris Corp, 156 F.3d 1182, 1187 (Fed. Cir. 1998) (quoting
`
`
`Constant v. Advanced Micro-Devices, Inc., 848 F.2d 1560, 1571 (Fed. Cir. 1988)); see also Phillips,
`
`415 F.3d at 1323. The prosecution history is another tool to supply the proper context for claim
`
` tchpatcnt.
`
`Ifinne
`
`Diagnostics, Inc., v. Lifescan, Inc., 381 F.3d 1352, 1356 (Fed. Cir. 2004) (“As in the case of the
`
`
`specification, a patent applicant may define a tem1 in prosecuting a patent").
`
`Although extrinsic evidence can be useful, it is “‘less significant than the intrinsic record in
`
`
`determining the legally operative meaning ot claim language. ”‘ P711777ps, 41 5 F.3d at
`
`3
`
`7 (quoting
`
`C.R. Bard, Inc., 388 F.3d at 862). Technical dictionaries and treatises may help a court understand
`
`
`the underlying technology and the manner in which one skilled in the art might use claim terms, but
`
` " y b'ovc-
`
`indicative of how the term is used in the patent. Id. at 1318. Similarly, expert testimony may aid
`
`
`
`
`
`
`New Bay Capital, LLC
`m-Page 3 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 3 of 35
`
`
`
`
`Case 6:07—cv—00080—LED
`Document 246
`Filed 07/30/2009
`Page 4 of 35
`
`
`
`a court in understanding the underlying technology and determining the particular meaning of a term
`
`in the pertinent field, but an expert’s conclusory, unsupported assertions as to a term’s definition is
`
`
`entirelynnheipfirl tea court. Id. Generally, extrinsic evidence is “less reliable than the patent and
`
`its prosecution history in determining how to read claim terms.” [(1.
`
`
`CONSTRUCTION OF DISPUTED TERMS IN THE ‘135 PATENTI’ 2
`
`“virtual private network”
`
`
`The‘l36patent,claimslandl0;the‘759patent,claimslandl63andthe‘l80patent,
`
`
`claims 1, l7, and 33 contain the term “virtual private networ ” (“VPN”). VirnetX contends that
`
`
`“virtual private network” means “a network ofcomputers capable ofprivately communicating with
`
`
`cachethcr by encryptmgtrat‘fieeninseeureeemniunieatienpathsbctwecnthc cenrputcrs, and which
`
`7)
`is capable of expanding to include additional computers and communication paths. Microsoft
`
`
`contends that “virtual private network” means “a network implemented by encapsulating an
`
`tunneling) over a shared networking
`encrypted IP packet within another 1P packet (that is,
`
`
`infrastructure.” The parties dispute whefirwfirfi‘FrCchWlLdicfitmmy may be used tcrconstrue
`
`“virtual private network,” whether VimetX’s proposed construction is overly broad, Whether “virtual
`
`
`private network” requires anonymity, and whether IP tunneling is a limitation on “virtual private
`
`network.” In light of intrinsic and extrinsic evidence, the Court construes “Virtual private network”
`
`
`as “a network of computers which prrvately communicate With each other by encryptrng traffic on
`
`
`insecure communication paths between the computers.”
`
`lVUiileJhis heading states—‘Cnrnsnlujnm ofmspnterl Leunsin (he ‘lii Parr/burr," Thfllaim Terms addressed—
`rthi hain ma
`a1
`f ninth thra rt
`at nt
`Thi
`a1
`a
`1i
`t
`ntha in
`
`n
`
`2Citations to the patents will not include the US. patent numbers to maintain brevity. Unless otherwise
`
`stated. these citations are of the US. patent numbers indicated in the heading that the citation falls under.
`
` 4
`
`
`
`
`New Bay Capital, LLC
`W-Page 4 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 4 of 35
`
`
`
`
`Case 6:07—cv—00080—LED
`Document 246
`Filed 07/30/2009
`Page 5 of 35
`
`
`
`The ‘135 patent does not provide an explicit definition for “virtual private networ .”
`
`However, the ‘ 135 patent uses “virtual private network” in ways that are consistent with a “virtual
`
`private network” being “a network ofcomputem which privatelycommnnicate with each other by
`
`encrypting traffic on insecure communication paths between the computers.” The specification
`
`
`discusses a VPN in the context ofconnecting and communicating between nodes. For instance, the
`
`specification states. “In a second mode referred to as ‘promiscuous per VPN’ mode, a small set of
`
`
`~
`fixedhardware -
`
`
`
`nodes communicating over a virtual private network.” Col. 23: 1 1-14. This excerpt shows that the
`
`
`‘135 invention includes nodes (computers) communicating over a virtual private network.
`
`
`Furthermore, the claims and specification discuss a VLF—N in the context ofpriwate
`
`
`communication on insecure communication paths. Claim 1 states “A method of transparently
`
`
`creating a virtual private network (VPN) between a client computer and a target computer” and then
`
`states the steps of accomplishing this method including “requesting access to a secure web site.”
`
`
`Col. 47:20-22, 36-3l. Thus, claim l associates a““virtaa1 prixate notwork” with “seoarrtyi’ofirlso—
`
`the specification states, “If the user is not authorized to access the secure site, then a ‘host unknown”
`
`
`message is returned (step 2705). If the user has sufficient security privileges, then in step 2706 a
`
`secure VPN is established between the user’s computer and the secure target site.” Col. 39:21:25.
`
`
`This excerpt shows how a “Virtual private network” establishes a secure connection between nodes
`
`
`where security may not otherwise exist. Thus. the claim language and the specification are
`
`
`consistent with construing a “virtual private network” as “a network of computers which privately
`
`
`
`computers.”
`
`
`
`
`
`New Bay Capital, LLC
`m-Page 5 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 5 of 35
`
`
`
`
`Case 6:07—cv—00080—LED
`Document 246
`Filed 07/30/2009
`Page 6 of 35
`
`
`
`Extrinsic evidence also supports this construction. The Wiley Electrical and Electronics
`
`Engineering Dictionary defines a “virtual private networ ” as
`
`
`A networkWWWWWQW netwotk,
`but whichIs configured within a public network, such as the Internet. The use of a
`public infrastructure while ensuring privacy using measures such as encryption and
`
`tunneling protocols, helps provide the security of a private network at a cost similar
`to that ofa public network.
`
`WILEY ELECTRICAL AND ELECTRONICS ENGINEERING DICTIONARY 842 (2004) (published by the
`
`
` . -sofaprivatenetwork
`
`
`but runs on a public network. The dictionary definition further states that encryption may be used
`
`
`to achieve privacy. The Court’s construction is in line with this definition. All pertinent aspects of
`
`
`the Court’s construction are explicitb found in the dictionany definition exeept for “insecure
`
`communication paths,” which simply corresponds to the dictionary defmition’s reference to “a public
`
`
`network.” Thus, the Court’s construction is in accord with the dictionary definition.
`
`Also,
`
`the ‘135 patent refers to the “FreeS/WAN” project in the specification. The
`
`
`—specificatiotrexplains that the “FreeS'W” prtject is devehrpihgwrmventional scheme that
`
`provides secure virtual private networks over the Internet. Col. 37:50-58. The “FreeS/WAN”
`
`
`project defines “virtual private network” as “a network which can safely be used as if it were private,
`
`even though some of its communication uses insecure connections. All traffic on those connections
`
`
`1s encrypted.”
`
`“FreeSTWAN‘” Glossary 24-25, Pl. Br. (Docket No. [94) EX. 0. The Court’s
`
`
`construction is consistent with this definition.3
`
`
`3The Court’s construction largely adopts VirnetX’s proposal. However. this construction excludes
`
`
`
`private network. Pl.’s Br. 6. The Court’s construction does not limit a “virtual private network" to any particular
`number of computers or communication paths. Thus, VirnetX’s proposed language is superfluous. Accordingly. the
`
`Court‘s construction accounts for the possibility of additional computers or communication paths.
`
` 6
`
`
`
`
`New Bay Capital, LLC
`m-Page 6 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 6 of 35
`
`
`
`
`Case 6:07—cv—00080—LED
`Document 246
`Filed 07/30/2009
`Page 7 of 35
`
`
`
`Microsoft contends that the “FreeS/WAN” glossary is not an explicit definition of “virtual
`
`private networ ” and thus is not persuasive. Microsoft argues that the ‘ 135 patent’s reference to the
`
`
`“Frees/WAN” preject is made only te describe the pnienantnand net to define “finned private
`
`network.” However, the specification explains that the “FreeS/WAN” project has been developing
`
`
`an implementation of one conventional scheme that provides secure virtual private networks over
`
`the Internet. Col. 37:50-58. Also, the applicant disclosed the “FreeS/WAN” project as prior art.
`
`
`SeeDef’s Br. fDocke’rNo. 201) Exs. M—O. Wethesereferencesto the “FreeS’W”project do
`
`
`not explicitly define “virtual private network,” they at least point to extrinsic evidence that can be
`
`
`considered in construing “virtual private network.” Thus, the Court mayconsider the “FreeS/WAN ”
`
`—pfejeet%glessafi as extrinsic evidence for construing “Virtual pniynte netwenk.”
`
`Microsoft also contends that even if the “FreeS/WAN” glossary offers an acceptable
`
`
`definition for “virtual private network,” portions of the “FreeS/WAN” glossary definition show that
`
`VirnetX’s proposed construction is overly broad. Microsoft cites the portion of the “FreeS/WAN”
`
`
`—glossary1tefimtr(m fofi‘v'ntual pr'nate netwmks”that states “WSEC finterrre‘rProtocoi Security] is
`
`not the only technique available for building VPNs, but it is the only method defined by RFCs
`
`[Request for Comments, Internet documents—some of which are informative while others are
`
`standards] and supported by many vendors. VPNs [Virtual private networks] are by no means the
`
`
`only thlng you can do With IPSEC, but they may be the most important applicat1on for many users.”
`
`
`Def/”s Br. (Docket No. 201) at 10; “FreeS/WAN” Glossary 25, Pl. Br. (Docket No. 194) Ex. 6.
`
`
`Microsoft points out that IPSEC is the only method defined by RFCs and supported by many
`
`
`
`identify Secure Sockets Layer (“SSL”) or Transport Layer Security (“TLS”) as methods for building
`
`
`
`
`
`New Bay Capital, LLC
`W-Page 7 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 7 of 35
`
`
`
`
`
`Filed 07/30/2009Document 246Case 6:07—cv—00080—LED Page 8 of 35
`
`
`
`
`
`“virtual private networks.” Microsoft then argues that VirnetX’s proposed construction is overly
`
`broad because it allows for a network using SSL and TLS. However, Microsoft’s cited excerpt is
`
`—an4neflampe¢enfi$e“vfluflpfiv%em%rk”definifienamd$mtapaflmmfiemm
`
`paragraph from the primary portion of the definition. See “FreeS/WAN” Glossary 24—25, P1. Br.
`
`
`(Docket N o. 194) EX. 6. Also, Microsoft selectively asserts that lPSEC is the only method defined
`
`by RFCs and supported by many vendors and ignores that its cited excerpt states that “IPSEC is not
`
`
`—fliepnlytechmqtreavaflalaleforbtuldmg VPNs.” Thus, MicrOsoft’scited excerpt does not support
`
`
`that the “FreeS/WAN ” glossary restricts “virtual private networ ” to lPSEC.
`
`
`Microsoft also contends that VimetX’s proposed construction suggests that the “virtual
`
`
`privatenctwerk”achievesenlydatasecuritywhenitsheuldincludebethdatasecurityand
`
`anonymity. Microsoft is correct that “private” in “virtual private networks” means both data security
`
`
`and anonymity. The specification supports this interpretation. The Background of the Invention
`
`section states “[a] tremendous variety of methods have been proposed and implemented to provide
`
`
`
`security and anonymity fimrrrrnrun'rcat'mns ovefljrre Internet.” Col. H647. Thrsseet'rmrfurtlrer—
`
`describes data security as being “immune to eavesdropping” and states “[d]ata security is usually
`
`
`tackled using some form of data encryption” and anonymity as “preventing[ing] an eavesdropper
`
`from discovering that terminal 100 is in communication with terminal 110.” Col. 1:23-25, 38-39,
`
`
`27-28. This language suggests that the claimed invention will achieve both data security and
`
`anonymity because it prefaces the Detailed Description of the Invention section. which describes a
`
`method of creating a virtual private network.
`
`Indeed,the
`
`network” means data security and anonymity. The Detailed Description of the Invention, Further
`
`
`
`
`
`
`New Bay Capital, LLC
`m-Page 8 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 8 of 35
`
`
`
`
`Case 6:07—cv—00080—LED
`Document 246
`Filed 07/30/2009
`Page 9 of 35
`
`
`
`Extensions section describes a mode of the invention as being able to “reduce the amount of
`
`overhead involved in checking for valid frames” while allowing “IP addresses .
`
`.
`
`. [to] Still be hopped
`
`
`
`as before for secure communication within the VPN.” Col. 73:20-75 (Em-344W
`
`“anonymity” feature of a VPN can be handled by the Tunneled Agile Routing Protocol (“TARP”),
`
`
`which executes “address hopping.” See C 01. 2:66—3:17; see Col. 5:49—64. Thus, the language “still
`
`be hopped” indicates that the modifications of the invention retain the anonymity feature of the
`
`
`“virtual privatesiretwork.”4 AccordinglyfiheGourfconstrues “virtual privatenetwork” asrequiring—
`
`
`both data security and anonymity.
`
`
`Finally, Microsoft contends that “virtual private network” requires 1P tunneling. Microsoft
`
`WmmmcvmchWMWWWWWnymfiy—
`
`in a virtual private network. Microsoft then argues that tunneling is required to achieve anonymity
`
`
`when TARP, IPSEC, or any other means is employed to achieve anonymity. The Court first and
`
`foremost considers the intrinsic evidence. The claims do not assert “tunneling” as a limitation nor
`
`’5 Citations to l'lTC
`
`Background ofthe Invention section only state explanations ofhow TARP works and does not use
`
`
`any limiting language. See Col. 315-18, 19-20, 58-60. Furthermore, Microsoft’s citation to the
`
`Detailed Description of the Invention, Further Extensions section only refers to a preferred
`
`
`implementation of the Virtual private network, stating “The VPN is preferably implemented usmg
`
`
`
`
`. compromises the anonymity
`.
`4While the specification states that this mode ofthe invention “[o]fcoiirse .
`ofthe VPNs,” this only means that those outside the VPN can discover the VPN and does not mean that the
`
`anonymity of the users within the VPN is compromised. This is clear from the example that follows the
`
`“compromising anonymity of the VPN” statement: “(i.e., an outsider can easily tell what traffic belongs in which
`VPN,t/10ug/1 he cannot correlate it to a Specific I;1ac/1ine/pers0n).” Col. 23:25—28 (emphasis added). Thus, the
`specification is consistent with construing a “virtual private network” as achieving both data security and anonymity.
`
`
` 9
`
`
`
`
`New Bay Capital, LLC
`m-Page 9 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 9 of 35
`
`
`
`
`Case 6:07—cv—00080—LED Document 246
`Filed 07/30/2009
`Page 10 of 35
`
`
`
`the IP address ‘hopping’ features of the basic invention described above, such that the true identity
`
`of the two nodes cannot be determined even if packets during the communication are intercepted.”
`
`—C91484—6—Aga+n, thisexcerpt does not include anvhmmngJanguage and in fact expresslyLuses
`
`the non—limiting language “preferably.” Accordingly, “virtual private network” is not limited to IP
`
`
`tunneling, and the Court construes “virtual private network” as “a network of computers which
`
`privately communicate with each other by encrypting traffic on insecure communication paths
`
`
`—betweerrthecomputers.”
`
`
`“transparently creating [creates] a virtual private network”
`
`
`The ‘ 135 patent, claims 1 and 10 contain the phrase “transparently creating [creates] a virtual
`
`
`privatcnctwerk.” Thcparticsdisputewhetheiitraasparcntb creating aVirtualprivatc network” in
`
`the preamble is limiting and whether “transparently” refers to not involving a user or not involving
`
`
`the client and target computers in creating a virtual private network. VirnetX contends that this
`
`phrase means “a user need not be involved in creating a virtual private networ .” Microsoft
`
`
`Wsmmmtmsmmmmmmmfimmmpimms
`
`“creating a virtual private network (VPN) without the client or target computer involved in
`
`
`requesting such creation.”
`
`“Transparently creating a virtual private network” in the preamble is not a limitation because
`
`
`“transparently” does not add meaning to claims 1 and [0. “A preamble limlts the invention 1t 1t
`
`
`recites essential structure or steps. or if it is ‘necessary to give life, meaning, and vitality” to the
`
`
`claim. Convorscly, a prcamblc is not limiting ‘whcrc a patcntcc dcfincs a structurally complctc
`
`
`
` ‘ inyu.’c"'
`
`invention.”’ Catalina Mktg. Int ’1, Inc. v. Coolsavings.com, Inc, 289 F.3d 801, 808 (Fed. Cir. 2002)
`
`
`10
`
`
`
`
`New Bay Capital, LLC
`MODS-Page T0 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 10 of 35
`
`
`
`
`
`
`
`Filed 07/30/2009Case 6:07—cv—00080—LED Document 246 Page 11 of 35
`
`
`
`(citations omitted). If a preamble “is reasonably susceptible to being construed to be merely
`
`duplicative of the limitations in the body of the claim (and was not clearly added to overcome a
`
`
`re}ect—ien9,wedenetcenstrueittebeaseparate'
`
`1111’], Inc, 522 F.3d 1279, 1288—89 (Fed. Cir. 2008). “Transparently” is merely descriptive ofwhat
`
`
`is found in steps (2) and (3) of claim 1. As discussed below, those steps require that a user is not
`
`involved in creating a VPN. This requirement corresponds to the meaning of “transparently” as
`
`
`
`
`transparently to the user (i.e., the user need not be involved in creating the secure link).” C 01. 39:28—
`
`
`29. Thus, “transparently” is merely duplicative ofwhat is found in the body ofclaim 1. As a result,
`
`
`, “ ntly” does not require construction.
`
`
`
`“Domain Name Service”
`
`
`The ‘ 135 patent, claims 1 and 10 and the ‘180 patent, claims 1, l7, and 33 contain the term
`
`“Domain Name Service” (“DNS”). VirnetX contends that “Domain Name Service” means “a
`
`
`
`servicethat receives requests fwconqruterrretwwlradc’rressemmespondmgto dm’rra'm names, and
`a
`
`which provides responses.’ Microsoft contends that “Domain Name Service” means “the
`
`
`conventional lookup service defined by the Internet Engineering Task Force (“IETF”) that returns
`
`the IP address of a requested computer or host.” The parties dispute whether “Domain Name
`
`
`Servrce” is limited by the definition given in the TETF that defines Domain Name Serv1ce as the
`
`conventional scheme or if it more broadly includes both conventional and modified Domain Name
`
`Service that is described in the specification.
`
`
`
`I
`.fi.
`..
`:2
`.
`W.|
`'Dfismtooknp
`
`service that returns an IP address for a requested domain name.” The specification states
`
`
`
`ll
`
`
`
`
`New Bay Capital, LLC
`woos-Page 11 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 11 of 35
`
`
`
`
`Case 6:07—cv—00080—LED Document 246
`Filed 07/30/2009
`Page 12 of 35
`
`
`
`Conventional Domain Name Servers (DNSs) provide a look-up function that returns
`the IP address of a requested computer or host. For example, when a computer user
`types in the web name “Yahoo.com,” the user’s web browser transmits a request to
`a DNS, which converts the name into a four-part IP address that is returned to the
`
`user’sbtewserandthen usedbythebtewsertoeentactthedestinatienweb site.
`
`C01. 37:22—29. According to this excerpt, a DNS “provides a look-up function” and “returns the 1P
`
`
`address of a requested computer or host.” A “computer or host” includes domain names as
`
`exemplified by the speeification’s reference to “Yahoo.com” and “destination web site” as “a
`
` “DNS” as “a loolxup service that
`
`
`returns an IP address for a requested domain name.”5
`
`
`“domain name”
`
`
`The‘l35patent,claintslandl0andthe‘l80patent,claims l, l7,and33 centainthetern—t
`9
`66
`“domain name.’ VimetX contends that “domain name” means
`
`a series of characters that
`
`
`corresponds to an address of a computer or group of computers that is to be sent to a domain name
`
`service (DNS).” Microsoft contends that “domain name” means “a hierarchical name for a computer
`
`
`(suctras wwvx .mmmmeVcflb inttran W55.” "Fire parties
`
`dispute whether “domain name” can correspond to a group of computers or only a single computer,
`
`
`whether “domain name” is a hierarchical name for a computer, whether “domain name” is limited
`
`to web site names, and whether “domain name” is limited to a computer name being converted into
`
`
`an IP address.
`
`
`The claims themselves describe “domain name.” Claim 1 states “a Domain Name Service
`
`
`(DNS) request that requests an IP address corresponding to a domain name associated with the target
`
`—cornfmter.” Col. 47123-26. Arse, cfairn IOWWWWW
`
`..
`.
`h
`-
`‘
`~
`5
`See below tor the Court s construction of domain name.
`
`
`l2
`
`
`
`
`New Bay Capital, LLC
`woos-Page T2 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 12 of 35
`
`
`
`Page 13 of 35
`Filed 07/30/2009
`Case 6:07—cv—00080—LED Document 246
`
`
`the client computer to look up an IP address for a domain name.” Col. 48:6-7. In both claim 1 and
`
`claim 10 an IP address corresponds to a domain name. Thus, the domain name corresponds to an
`
`
`
`1P address—Accordingly, the Cour—t censtmes “domain name” asia name conesponding4manJP—
`
`address.”
`
`
`
`VirnetX proposes that “domain name” corresponds to a group ofcomputers (IP addresses)
`
`or a single computer because claims 1 and 10 of the ‘135 patent refer to IP address using the
`
`
`—indefinite article “an.” The FederalCircuithas stated,
`
`
`An indefinite article ‘a’ or ‘an’ in patent parlance carries the meaning of ‘one or
`more’ in open-ended claims containing the transitional phrase ‘comprising.’” That
`‘ a” or an” can mean “one or more” is best described as a rule, rather than merely as
`a presumption or even a convention. The exceptions to [the “indefinite article”] rule
`
`
`areextremeb iimited: apntentecmnst CVi—HCC [ ] arciear intent” to Limit“a” or an”
`—We%tmmmeWemmmW” 'rn erclaim to refer
`back to the same claim term does not change the general plural rule, but simply
`reinvokes that non— singular meaning. An exception to thegeneral rule that “a” or
`“an” means more than one only arises where the language of the claims themselves,
`the specification, or the prosecution history necessitate a departure from the rule,
`
`Baldwin Graphic Sys., Inc. v. Siebert, 1110., 512 F.3d 1338, 1342-43 (Fed. Cir. 2008) (citations
`
`omitted). Claims 1 and 10 of the ‘ 135 patent are open-ended construction claims using the word
`
`“comprising” and use the indefinite article “an” to refer to “IP address.” See Col. 47:20-26; see Col.
`
`4823-7. By the “one or more” rule, these claims allow for one or more IP addresses. Any subsequent
`
`
`
`address” and thus reinvokes the non-singular meaning. See Col. 47:39-40; see Col. 48:8. Microsoft
`
`
`—doesnotassefimyevidmmetoshommatmxeepflrmmjheimwmme”nfleexists Thusthere
`
`may be more than one IP address, and thus more than one computer, that corresponds with the
`
`doma1n name. Th1s would allow tor a s1tuat1on where the IP address that corresponds to the doma1n
`
`
`
`
`l3
`
`
`
`
`New Bay Capital, LLC
`MODS-Page T3 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 13 of 35
`
`
`
`Page 14 of 35
`Filed 07/30/2009
`Case 6:07—cv—00080—LED Document 246
`
`
`name is not the IP address of the target computer. See Col. 38:23-42. Accordingly, “domain name”
`
`can correspond to more than one computer.
`
`
`MicmsoflceMendthhepatentshnfit“doma#name”mahkramMealnamefora
`
`computer under traditional hierarchical DNS format. However, Microsoft relies largely on extrinsic
`
`
`evidence—including expert testimony and Microsoft’s own technology tutorial—to support its
`
`contentions, which does not carry great weight in light of the fact that claim language provides
`
`
`—gtridaneeprrthemeaning of“domain name.” Also, wherel‘vficrosoffiusefintrinsic evidence for
`
`support, Microsoft only refers to non-limiting language from the specification. For instance,
`
`
`Microsoft suggests that the examples used in the specification for domain names, which include
`
`
`“Yaheefiem” ahd “Targetcem,” shew that the patents use “demaflfl—Haifi%’ifl—i-ts—EF&€h-Heflal—
`
`hierarchical DNS format. Microsoft further suggests that “domain name” is limited to a traditional
`
`hierarchical name because the patents do not provide a single example of “domain name” that is not
`
`written in traditional hierarchical DNS format. However, Microsoft argues only the presence and
`
`
`
`disclosure or omission of examples does not create limitations on claims. Accordingly, Microsoft
`
`
`does not offer sufficient support for limiting “domain name” to a hierarchical name for a computer.
`
`Microsoft also contends that the patents limit “domain name” to web site names. However,
`
`
`no such fim1tat1on is found in the claims, and Microsoft merely references 1ts arguments on
`
`construing “web site” without showing how “domain name” is necessarily linked to web site names.
`
`
`Accordingly, “domain name” is not limited to web site names.
`
`
`
`converted into an IP address. Microsoft supports this proposed limitation by arguing that a “domain
`
`
`
`l4
`
`
`
`
`New Bay Capital, LLC
`woos-Page 14 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 14 of 35
`
`
`
`
`Case 6:07—cv—00080—LED Document 246
`Filed 07/30/2009
`Page 15 of 35
`
`
`
`name” has the capacity to be converted by DNS into an IP address and that the specification
`
`emphasizes this point by describing that identical DNS requests may result in conventional domain
`
`
`on whether
`
`
`something is a “domain name” but on what type of web site was requested. However, Microsoft
`
`
`incorrectly argues that a “capacity” to be converted by DN S into an IP address demonstrates a
`
`required limitation. A mere capacity to perform an act does not make that act necessary. Thus,
`
`
`MtCl‘OsOfi has not ‘ namebeing
`
`
`converted into an IP address. Accordingly, the Court construes “domain name” as “a name
`
`
`corresponding to an IP address.”
`
`
`
`
`The ‘135 patent, claims 1 and 10 contain the term “web site.” VirnetX contends that
`
`
`construing “secure web site” as addressed below sufficiently addresses the meaning of “web site”
`
`and that “web site” does not require further construction. Alternatively, VirnetX contends that “web
`
`
`
`Microsoft contends that “web site” means “one or more related web pages at a location on the World
`
`
`Wide Web.” The parties dispute Whether “web site” should be given a construction separate from
`
`“secure web site” and whether “web site” is limited to web pages on the World Wide Web.
`
`
`VirnetX argues that “web Site” should not be construed separately from “secure web s1te”
`
`
`because the “135 patent claims never state “web site” without the preceding word “secure.”
`
`
`7
`Howcvcr “sccurc” is sc arablc from “wcb site” as a modifier of “web site.” The claims show that
`
`
`“secm’e”canbe7eplaccctbyothermrdrfierstc“welrsrfe.” Clairnsd and ffiofthe ‘13fpatenfrefcr—
`
`to “web site” preceded by “non-secure” and “secure target.” Col. 47:28, 30; C01. 48:10, 14. This
`
`
`
`15
`
`
`
`
`New Bay Capital, LLC
`MODS-Page T5 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 15 of 35
`
`
`
`
`Case 6:07—cv—00080—LED Document 246
`Filed 07/30/2009
`Page 16 of 35
`
`
`
`demonstrates that “web site” can be separated from its modifier and thus is its own term separate
`
`from “secure.” Thus, “web site” may be construed as its own claim term.
`
`
`The Court adeptsMeresef—tiseenstruettenandcenstrues “web site” as “one or more related
`
`web pages at a location on the World Wide Web.” The patent does not state a definition for “web
`
`77
`site. However, the term itself is instructive. “Web site” on its face refers to a “web” Internet
`
`resource, which is a web page on the World Wide Web. The specification is consistent with
`
`
`—constrtrnrg“website”asavvebpageontheWorldWideWeb. Examplesofwebs'rtesinthe
`
`
`specification are “Yahoo.com” and “Target.com.” Col. 37:25, 45. “Yahoo.com” and “Target.com”
`
`
`are well—known web pages on the World Wide Web. See Yahoo! Home Page, www.Yahoo.com;
`
`—seel&rget Home Page, WWW. Targetcern. Also, the spec'tfieatien states thata “web brewser” can
`
`be used to access a “web site.” Col. 39:48, 50-51, 55; C01. 40:1, 38. It is well—known that a “web
`
`
`browser” is used to navigate “web pages” on the World Wide Web. Thus, the intrinsic evidence
`
`supports Microsoft’s proposed construction.
`
`
`.HwWWfichb
`
`C onsortium, an industry standards-setting organization for the World Wide Web, defined web site
`
`as “[a] collection of interlinked Web pages, including a host page, residing at the same network
`9
`location.’ Brian