throbber

`Case 6:07—cv—00080—LED
`Document 246
`Filed 07/30/2009
`Page 1 of 35
`
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`
`TYLER DIVISION
`
`
`
`§ §
`
`VIRNETX, INC.
`
`Plaintiff
`
`
`§ §
`
`vs.
`
`CASE NO. 6:07 CV 80


`PATENT CASE
`
`MICROSOFT CORPORATION
`
`
`§ §
`
`§ §
`
`Defendant
`
`
`
`MEMORANDWI OPTNION
`
`
`This claim construction opinion interprets the disputed terms in US. Patent Nos. 6,502,135
`
`
`(“the ‘ 135 patent”); 6,839,759 (“the ‘759 patent”); and 7,188,180 (“the ‘180 patent”). Appendix A
`
`contains the disputed terms, as they appear in the asserted claims of these patents. Appendix B
`
`contains a chart summarizing the Court’s constructions.
`
`BACKGROUND
`
`PlaintiffVimetX, Inc. (‘Wimet ”) accuses Microsoft Corporation (“Microsoft”) of infringing
`
`
`claims of the T35, 75?, and T80 patents. The ”T35 patent discloses a method or transparently
`
`creating a Virtual private network between a client computer and a target computer. The ‘759 patent
`
`mscbsesamemodferefiawghingaWNMmQMauseremefingwerflenfificafiwW
`
`The ‘75 9 patent is related to the ‘ 135 patent through other continuation-in-part applications/patents.
`
`
`The ‘ 180 patent discloses a method for establishing a VPN using a secure domain name service. The
`
`
`—‘180_pammmmlmedmme‘B5patemfiamxisjond_patem_oLconfimaflmfinqlart—
`
`
`applications/patents of the ‘135 patent. The ‘759 and ‘180 patents share the same specification.
`
`
`
`
`
`
`New Bay Capital, LLC
`W-Page 1 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 1 of 35
`
`

`

`
`Case 6:07—cv—00080—LED
`Document 246
`Filed 07/30/2009
`Page 2 of 35
`
`
`APPLICABLE LAW
`
`“It is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention to
`
`
`which thepatentee isentitledtherightteexclude.” P1441119: HWHCmay, 445 F.3d1303,134°
`
`(Fed. Cir. 2005) (en banc) (quoting [Imam/Pure Water Inc. v. Safari Wczlc/‘Flllrallon S131, Inc, 381
`
`
`F .3d 1111, 1115 (Fed. Cir. 2004)).
`
`1n claim construction, courts examine the patent’s intrinsic
`
`evidence to define the patented invention’s scope. See id; C.R. Bard, Inc. v. US. Surgical Corp,
`
`
`
`
`388 F.3d 858, 861 (Fed. Cir. 2004);Bcfl741‘l. i’V‘cfimfifim‘vfimflvadGmm’ns Group, Inc,
`
`
`262 F.3d 1258, 1267 (Fed. Cir. 2001). This intrinsic evidence includes the claims themselves, the
`
`
`specification, and the prosecution history. See Phillips, 415 F .3d at 1314; CR. Bard, Inc, 3 88 F .3d
`
`
`at861. CeurfigivcchimersttherWandmcfiemcdmcMgasundcrstwdbyemef
`
`ordinary skill in the art at the time of the invention in the context of the entire patent. Phillips, 415
`
`
`F.3d at 1312—13;Alloc, Inc. v. Int’l Trade Comm ’n, 342 F.3d 1361, 1368 (Fed. Cir. 2003).
`
`The claims themselves provide substantial guidance in determining the meaning ofparticular
`
`
`claim terms.
`
`1977777717303, 4d5 F.3d at 13M. First, a Wmfittexfiffimmtemmmy—
`
`instructive. Id. Other asserted or unasserted claims can also aid in determining the claim’s meaning
`
`
`because claim terms are typically used consistently throughout the patent. Id. Differences among
`
`the claim terms can also assist in understanding a term’s meaning. Id. For example, when a
`
`
`
`dependent claim adds a lim1tation to an independent claim, it is presumed that the independent claim
`
`
`does not include the limitation. Id. at 1314—15.
`
`
`“[C]laims ‘must be read in View of the specification, of which they are a part.m Id. (quoting
`
`
`Ma—rkman v. Widen} WS, Inc., 52 F.3d 967, 979 (Fed. Cir. 1995) (en barfcj). “[TIhe
`
`specification ‘is always highly relevant to the claim construction analysis. Usually, it is dispositive;
`
`
`
`
`New Bay Capital, LLC
`W-Page 2 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 2 of 35
`
`

`

`Page 3 of 35
`Filed 07/30/2009
`Document 246
`Case 6:07—cv—00080—LED
`
`
`
`
`it is the single best guide to the meaning of a disputed term.”’ Id. (quoting Vitronics Corp. v.
`
`Conceptronic, Inc. , 90 F.3d 1576, 1582 (Fed. Cir. 1996)); Teleflex, Inc. v. Ficosa N. Am. Corp, 299
`
`
`F.3d1313,1325 (Fed. Cir. 2002). "HM is truebeeause apatentee maydefine Mew terms, give
`
`a claim term a different meaning than the term would otherwise possess, or disclaim or disavow the
`
`
`claim scope. Phillips, 415 F.3d at 1316. In these situations, the inventor’s lexicography governs.
`
`Id. Also, the specification may resolve ambiguous claim terms “Where the ordinary and accustomed
`
`
`
`ascertained from the words alone.” Tcleflex, Inc., 299 F .3d at 1325. But, “‘[a]1though the
`
`
`specification may aid the court in interpreting the meaning of disputed claim language, particular
`
`
`wmmmemswpemgmmewecificafiwMMgemmlbbemmteme
`
`claims.”’ Comark Commc ’ns, Inc. v. Harris Corp, 156 F.3d 1182, 1187 (Fed. Cir. 1998) (quoting
`
`
`Constant v. Advanced Micro-Devices, Inc., 848 F.2d 1560, 1571 (Fed. Cir. 1988)); see also Phillips,
`
`415 F.3d at 1323. The prosecution history is another tool to supply the proper context for claim
`
` tchpatcnt.
`
`Ifinne
`
`Diagnostics, Inc., v. Lifescan, Inc., 381 F.3d 1352, 1356 (Fed. Cir. 2004) (“As in the case of the
`
`
`specification, a patent applicant may define a tem1 in prosecuting a patent").
`
`Although extrinsic evidence can be useful, it is “‘less significant than the intrinsic record in
`
`
`determining the legally operative meaning ot claim language. ”‘ P711777ps, 41 5 F.3d at
`
`3
`
`7 (quoting
`
`C.R. Bard, Inc., 388 F.3d at 862). Technical dictionaries and treatises may help a court understand
`
`
`the underlying technology and the manner in which one skilled in the art might use claim terms, but
`
` " y b'ovc-
`
`indicative of how the term is used in the patent. Id. at 1318. Similarly, expert testimony may aid
`
`
`
`
`
`
`New Bay Capital, LLC
`m-Page 3 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 3 of 35
`
`

`

`
`Case 6:07—cv—00080—LED
`Document 246
`Filed 07/30/2009
`Page 4 of 35
`
`
`
`a court in understanding the underlying technology and determining the particular meaning of a term
`
`in the pertinent field, but an expert’s conclusory, unsupported assertions as to a term’s definition is
`
`
`entirelynnheipfirl tea court. Id. Generally, extrinsic evidence is “less reliable than the patent and
`
`its prosecution history in determining how to read claim terms.” [(1.
`
`
`CONSTRUCTION OF DISPUTED TERMS IN THE ‘135 PATENTI’ 2
`
`“virtual private network”
`
`
`The‘l36patent,claimslandl0;the‘759patent,claimslandl63andthe‘l80patent,
`
`
`claims 1, l7, and 33 contain the term “virtual private networ ” (“VPN”). VirnetX contends that
`
`
`“virtual private network” means “a network ofcomputers capable ofprivately communicating with
`
`
`cachethcr by encryptmgtrat‘fieeninseeureeemniunieatienpathsbctwecnthc cenrputcrs, and which
`
`7)
`is capable of expanding to include additional computers and communication paths. Microsoft
`
`
`contends that “virtual private network” means “a network implemented by encapsulating an
`
`tunneling) over a shared networking
`encrypted IP packet within another 1P packet (that is,
`
`
`infrastructure.” The parties dispute whefirwfirfi‘FrCchWlLdicfitmmy may be used tcrconstrue
`
`“virtual private network,” whether VimetX’s proposed construction is overly broad, Whether “virtual
`
`
`private network” requires anonymity, and whether IP tunneling is a limitation on “virtual private
`
`network.” In light of intrinsic and extrinsic evidence, the Court construes “Virtual private network”
`
`
`as “a network of computers which prrvately communicate With each other by encryptrng traffic on
`
`
`insecure communication paths between the computers.”
`
`lVUiileJhis heading states—‘Cnrnsnlujnm ofmspnterl Leunsin (he ‘lii Parr/burr," Thfllaim Terms addressed—
`rthi hain ma
`a1
`f ninth thra rt
`at nt
`Thi
`a1
`a
`1i
`t
`ntha in
`
`n
`
`2Citations to the patents will not include the US. patent numbers to maintain brevity. Unless otherwise
`
`stated. these citations are of the US. patent numbers indicated in the heading that the citation falls under.
`
` 4
`
`
`
`
`New Bay Capital, LLC
`W-Page 4 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 4 of 35
`
`

`

`
`Case 6:07—cv—00080—LED
`Document 246
`Filed 07/30/2009
`Page 5 of 35
`
`
`
`The ‘135 patent does not provide an explicit definition for “virtual private networ .”
`
`However, the ‘ 135 patent uses “virtual private network” in ways that are consistent with a “virtual
`
`private network” being “a network ofcomputem which privatelycommnnicate with each other by
`
`encrypting traffic on insecure communication paths between the computers.” The specification
`
`
`discusses a VPN in the context ofconnecting and communicating between nodes. For instance, the
`
`specification states. “In a second mode referred to as ‘promiscuous per VPN’ mode, a small set of
`
`
`~
`fixedhardware -
`
`
`
`nodes communicating over a virtual private network.” Col. 23: 1 1-14. This excerpt shows that the
`
`
`‘135 invention includes nodes (computers) communicating over a virtual private network.
`
`
`Furthermore, the claims and specification discuss a VLF—N in the context ofpriwate
`
`
`communication on insecure communication paths. Claim 1 states “A method of transparently
`
`
`creating a virtual private network (VPN) between a client computer and a target computer” and then
`
`states the steps of accomplishing this method including “requesting access to a secure web site.”
`
`
`Col. 47:20-22, 36-3l. Thus, claim l associates a““virtaa1 prixate notwork” with “seoarrtyi’ofirlso—
`
`the specification states, “If the user is not authorized to access the secure site, then a ‘host unknown”
`
`
`message is returned (step 2705). If the user has sufficient security privileges, then in step 2706 a
`
`secure VPN is established between the user’s computer and the secure target site.” Col. 39:21:25.
`
`
`This excerpt shows how a “Virtual private network” establishes a secure connection between nodes
`
`
`where security may not otherwise exist. Thus. the claim language and the specification are
`
`
`consistent with construing a “virtual private network” as “a network of computers which privately
`
`
`
`computers.”
`
`
`
`
`
`New Bay Capital, LLC
`m-Page 5 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 5 of 35
`
`

`

`
`Case 6:07—cv—00080—LED
`Document 246
`Filed 07/30/2009
`Page 6 of 35
`
`
`
`Extrinsic evidence also supports this construction. The Wiley Electrical and Electronics
`
`Engineering Dictionary defines a “virtual private networ ” as
`
`
`A networkWWWWWQW netwotk,
`but whichIs configured within a public network, such as the Internet. The use of a
`public infrastructure while ensuring privacy using measures such as encryption and
`
`tunneling protocols, helps provide the security of a private network at a cost similar
`to that ofa public network.
`
`WILEY ELECTRICAL AND ELECTRONICS ENGINEERING DICTIONARY 842 (2004) (published by the
`
`
` . -sofaprivatenetwork
`
`
`but runs on a public network. The dictionary definition further states that encryption may be used
`
`
`to achieve privacy. The Court’s construction is in line with this definition. All pertinent aspects of
`
`
`the Court’s construction are explicitb found in the dictionany definition exeept for “insecure
`
`communication paths,” which simply corresponds to the dictionary defmition’s reference to “a public
`
`
`network.” Thus, the Court’s construction is in accord with the dictionary definition.
`
`Also,
`
`the ‘135 patent refers to the “FreeS/WAN” project in the specification. The
`
`
`—specificatiotrexplains that the “FreeS'W” prtject is devehrpihgwrmventional scheme that
`
`provides secure virtual private networks over the Internet. Col. 37:50-58. The “FreeS/WAN”
`
`
`project defines “virtual private network” as “a network which can safely be used as if it were private,
`
`even though some of its communication uses insecure connections. All traffic on those connections
`
`
`1s encrypted.”
`
`“FreeSTWAN‘” Glossary 24-25, Pl. Br. (Docket No. [94) EX. 0. The Court’s
`
`
`construction is consistent with this definition.3
`
`
`3The Court’s construction largely adopts VirnetX’s proposal. However. this construction excludes
`
`
`
`private network. Pl.’s Br. 6. The Court’s construction does not limit a “virtual private network" to any particular
`number of computers or communication paths. Thus, VirnetX’s proposed language is superfluous. Accordingly. the
`
`Court‘s construction accounts for the possibility of additional computers or communication paths.
`
` 6
`
`
`
`
`New Bay Capital, LLC
`m-Page 6 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 6 of 35
`
`

`

`
`Case 6:07—cv—00080—LED
`Document 246
`Filed 07/30/2009
`Page 7 of 35
`
`
`
`Microsoft contends that the “FreeS/WAN” glossary is not an explicit definition of “virtual
`
`private networ ” and thus is not persuasive. Microsoft argues that the ‘ 135 patent’s reference to the
`
`
`“Frees/WAN” preject is made only te describe the pnienantnand net to define “finned private
`
`network.” However, the specification explains that the “FreeS/WAN” project has been developing
`
`
`an implementation of one conventional scheme that provides secure virtual private networks over
`
`the Internet. Col. 37:50-58. Also, the applicant disclosed the “FreeS/WAN” project as prior art.
`
`
`SeeDef’s Br. fDocke’rNo. 201) Exs. M—O. Wethesereferencesto the “FreeS’W”project do
`
`
`not explicitly define “virtual private network,” they at least point to extrinsic evidence that can be
`
`
`considered in construing “virtual private network.” Thus, the Court mayconsider the “FreeS/WAN ”
`
`—pfejeet%glessafi as extrinsic evidence for construing “Virtual pniynte netwenk.”
`
`Microsoft also contends that even if the “FreeS/WAN” glossary offers an acceptable
`
`
`definition for “virtual private network,” portions of the “FreeS/WAN” glossary definition show that
`
`VirnetX’s proposed construction is overly broad. Microsoft cites the portion of the “FreeS/WAN”
`
`
`—glossary1tefimtr(m fofi‘v'ntual pr'nate netwmks”that states “WSEC finterrre‘rProtocoi Security] is
`
`not the only technique available for building VPNs, but it is the only method defined by RFCs
`
`[Request for Comments, Internet documents—some of which are informative while others are
`
`standards] and supported by many vendors. VPNs [Virtual private networks] are by no means the
`
`
`only thlng you can do With IPSEC, but they may be the most important applicat1on for many users.”
`
`
`Def/”s Br. (Docket No. 201) at 10; “FreeS/WAN” Glossary 25, Pl. Br. (Docket No. 194) Ex. 6.
`
`
`Microsoft points out that IPSEC is the only method defined by RFCs and supported by many
`
`
`
`identify Secure Sockets Layer (“SSL”) or Transport Layer Security (“TLS”) as methods for building
`
`
`
`
`
`New Bay Capital, LLC
`W-Page 7 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 7 of 35
`
`

`

`
`
`Filed 07/30/2009Document 246Case 6:07—cv—00080—LED Page 8 of 35
`
`
`
`
`
`“virtual private networks.” Microsoft then argues that VirnetX’s proposed construction is overly
`
`broad because it allows for a network using SSL and TLS. However, Microsoft’s cited excerpt is
`
`—an4neflampe¢enfi$e“vfluflpfiv%em%rk”definifienamd$mtapaflmmfiemm
`
`paragraph from the primary portion of the definition. See “FreeS/WAN” Glossary 24—25, P1. Br.
`
`
`(Docket N o. 194) EX. 6. Also, Microsoft selectively asserts that lPSEC is the only method defined
`
`by RFCs and supported by many vendors and ignores that its cited excerpt states that “IPSEC is not
`
`
`—fliepnlytechmqtreavaflalaleforbtuldmg VPNs.” Thus, MicrOsoft’scited excerpt does not support
`
`
`that the “FreeS/WAN ” glossary restricts “virtual private networ ” to lPSEC.
`
`
`Microsoft also contends that VimetX’s proposed construction suggests that the “virtual
`
`
`privatenctwerk”achievesenlydatasecuritywhenitsheuldincludebethdatasecurityand
`
`anonymity. Microsoft is correct that “private” in “virtual private networks” means both data security
`
`
`and anonymity. The specification supports this interpretation. The Background of the Invention
`
`section states “[a] tremendous variety of methods have been proposed and implemented to provide
`
`
`
`security and anonymity fimrrrrnrun'rcat'mns ovefljrre Internet.” Col. H647. Thrsseet'rmrfurtlrer—
`
`describes data security as being “immune to eavesdropping” and states “[d]ata security is usually
`
`
`tackled using some form of data encryption” and anonymity as “preventing[ing] an eavesdropper
`
`from discovering that terminal 100 is in communication with terminal 110.” Col. 1:23-25, 38-39,
`
`
`27-28. This language suggests that the claimed invention will achieve both data security and
`
`anonymity because it prefaces the Detailed Description of the Invention section. which describes a
`
`method of creating a virtual private network.
`
`Indeed,the
`
`network” means data security and anonymity. The Detailed Description of the Invention, Further
`
`
`
`
`
`
`New Bay Capital, LLC
`m-Page 8 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 8 of 35
`
`

`

`
`Case 6:07—cv—00080—LED
`Document 246
`Filed 07/30/2009
`Page 9 of 35
`
`
`
`Extensions section describes a mode of the invention as being able to “reduce the amount of
`
`overhead involved in checking for valid frames” while allowing “IP addresses .
`
`.
`
`. [to] Still be hopped
`
`
`
`as before for secure communication within the VPN.” Col. 73:20-75 (Em-344W
`
`“anonymity” feature of a VPN can be handled by the Tunneled Agile Routing Protocol (“TARP”),
`
`
`which executes “address hopping.” See C 01. 2:66—3:17; see Col. 5:49—64. Thus, the language “still
`
`be hopped” indicates that the modifications of the invention retain the anonymity feature of the
`
`
`“virtual privatesiretwork.”4 AccordinglyfiheGourfconstrues “virtual privatenetwork” asrequiring—
`
`
`both data security and anonymity.
`
`
`Finally, Microsoft contends that “virtual private network” requires 1P tunneling. Microsoft
`
`WmmmcvmchWMWWWWWnymfiy—
`
`in a virtual private network. Microsoft then argues that tunneling is required to achieve anonymity
`
`
`when TARP, IPSEC, or any other means is employed to achieve anonymity. The Court first and
`
`foremost considers the intrinsic evidence. The claims do not assert “tunneling” as a limitation nor
`
`’5 Citations to l'lTC
`
`Background ofthe Invention section only state explanations ofhow TARP works and does not use
`
`
`any limiting language. See Col. 315-18, 19-20, 58-60. Furthermore, Microsoft’s citation to the
`
`Detailed Description of the Invention, Further Extensions section only refers to a preferred
`
`
`implementation of the Virtual private network, stating “The VPN is preferably implemented usmg
`
`
`
`
`. compromises the anonymity
`.
`4While the specification states that this mode ofthe invention “[o]fcoiirse .
`ofthe VPNs,” this only means that those outside the VPN can discover the VPN and does not mean that the
`
`anonymity of the users within the VPN is compromised. This is clear from the example that follows the
`
`“compromising anonymity of the VPN” statement: “(i.e., an outsider can easily tell what traffic belongs in which
`VPN,t/10ug/1 he cannot correlate it to a Specific I;1ac/1ine/pers0n).” Col. 23:25—28 (emphasis added). Thus, the
`specification is consistent with construing a “virtual private network” as achieving both data security and anonymity.
`
`
` 9
`
`
`
`
`New Bay Capital, LLC
`m-Page 9 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 9 of 35
`
`

`

`
`Case 6:07—cv—00080—LED Document 246
`Filed 07/30/2009
`Page 10 of 35
`
`
`
`the IP address ‘hopping’ features of the basic invention described above, such that the true identity
`
`of the two nodes cannot be determined even if packets during the communication are intercepted.”
`
`—C91484—6—Aga+n, thisexcerpt does not include anvhmmngJanguage and in fact expresslyLuses
`
`the non—limiting language “preferably.” Accordingly, “virtual private network” is not limited to IP
`
`
`tunneling, and the Court construes “virtual private network” as “a network of computers which
`
`privately communicate with each other by encrypting traffic on insecure communication paths
`
`
`—betweerrthecomputers.”
`
`
`“transparently creating [creates] a virtual private network”
`
`
`The ‘ 135 patent, claims 1 and 10 contain the phrase “transparently creating [creates] a virtual
`
`
`privatcnctwerk.” Thcparticsdisputewhetheiitraasparcntb creating aVirtualprivatc network” in
`
`the preamble is limiting and whether “transparently” refers to not involving a user or not involving
`
`
`the client and target computers in creating a virtual private network. VirnetX contends that this
`
`phrase means “a user need not be involved in creating a virtual private networ .” Microsoft
`
`
`Wsmmmtmsmmmmmmmfimmmpimms
`
`“creating a virtual private network (VPN) without the client or target computer involved in
`
`
`requesting such creation.”
`
`“Transparently creating a virtual private network” in the preamble is not a limitation because
`
`
`“transparently” does not add meaning to claims 1 and [0. “A preamble limlts the invention 1t 1t
`
`
`recites essential structure or steps. or if it is ‘necessary to give life, meaning, and vitality” to the
`
`
`claim. Convorscly, a prcamblc is not limiting ‘whcrc a patcntcc dcfincs a structurally complctc
`
`
`
` ‘ inyu.’c"'
`
`invention.”’ Catalina Mktg. Int ’1, Inc. v. Coolsavings.com, Inc, 289 F.3d 801, 808 (Fed. Cir. 2002)
`
`
`10
`
`
`
`
`New Bay Capital, LLC
`MODS-Page T0 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 10 of 35
`
`

`

`
`
`
`
`Filed 07/30/2009Case 6:07—cv—00080—LED Document 246 Page 11 of 35
`
`
`
`(citations omitted). If a preamble “is reasonably susceptible to being construed to be merely
`
`duplicative of the limitations in the body of the claim (and was not clearly added to overcome a
`
`
`re}ect—ien9,wedenetcenstrueittebeaseparate'
`
`1111’], Inc, 522 F.3d 1279, 1288—89 (Fed. Cir. 2008). “Transparently” is merely descriptive ofwhat
`
`
`is found in steps (2) and (3) of claim 1. As discussed below, those steps require that a user is not
`
`involved in creating a VPN. This requirement corresponds to the meaning of “transparently” as
`
`
`
`
`transparently to the user (i.e., the user need not be involved in creating the secure link).” C 01. 39:28—
`
`
`29. Thus, “transparently” is merely duplicative ofwhat is found in the body ofclaim 1. As a result,
`
`
`, “ ntly” does not require construction.
`
`
`
`“Domain Name Service”
`
`
`The ‘ 135 patent, claims 1 and 10 and the ‘180 patent, claims 1, l7, and 33 contain the term
`
`“Domain Name Service” (“DNS”). VirnetX contends that “Domain Name Service” means “a
`
`
`
`servicethat receives requests fwconqruterrretwwlradc’rressemmespondmgto dm’rra'm names, and
`a
`
`which provides responses.’ Microsoft contends that “Domain Name Service” means “the
`
`
`conventional lookup service defined by the Internet Engineering Task Force (“IETF”) that returns
`
`the IP address of a requested computer or host.” The parties dispute whether “Domain Name
`
`
`Servrce” is limited by the definition given in the TETF that defines Domain Name Serv1ce as the
`
`conventional scheme or if it more broadly includes both conventional and modified Domain Name
`
`Service that is described in the specification.
`
`
`
`I
`.fi.
`..
`:2
`.
`W.|
`'Dfismtooknp
`
`service that returns an IP address for a requested domain name.” The specification states
`
`
`
`ll
`
`
`
`
`New Bay Capital, LLC
`woos-Page 11 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 11 of 35
`
`

`

`
`Case 6:07—cv—00080—LED Document 246
`Filed 07/30/2009
`Page 12 of 35
`
`
`
`Conventional Domain Name Servers (DNSs) provide a look-up function that returns
`the IP address of a requested computer or host. For example, when a computer user
`types in the web name “Yahoo.com,” the user’s web browser transmits a request to
`a DNS, which converts the name into a four-part IP address that is returned to the
`
`user’sbtewserandthen usedbythebtewsertoeentactthedestinatienweb site.
`
`C01. 37:22—29. According to this excerpt, a DNS “provides a look-up function” and “returns the 1P
`
`
`address of a requested computer or host.” A “computer or host” includes domain names as
`
`exemplified by the speeification’s reference to “Yahoo.com” and “destination web site” as “a
`
` “DNS” as “a loolxup service that
`
`
`returns an IP address for a requested domain name.”5
`
`
`“domain name”
`
`
`The‘l35patent,claintslandl0andthe‘l80patent,claims l, l7,and33 centainthetern—t
`9
`66
`“domain name.’ VimetX contends that “domain name” means
`
`a series of characters that
`
`
`corresponds to an address of a computer or group of computers that is to be sent to a domain name
`
`service (DNS).” Microsoft contends that “domain name” means “a hierarchical name for a computer
`
`
`(suctras wwvx .mmmmeVcflb inttran W55.” "Fire parties
`
`dispute whether “domain name” can correspond to a group of computers or only a single computer,
`
`
`whether “domain name” is a hierarchical name for a computer, whether “domain name” is limited
`
`to web site names, and whether “domain name” is limited to a computer name being converted into
`
`
`an IP address.
`
`
`The claims themselves describe “domain name.” Claim 1 states “a Domain Name Service
`
`
`(DNS) request that requests an IP address corresponding to a domain name associated with the target
`
`—cornfmter.” Col. 47123-26. Arse, cfairn IOWWWWW
`
`..
`.
`h
`-
`‘
`~
`5
`See below tor the Court s construction of domain name.
`
`
`l2
`
`
`
`
`New Bay Capital, LLC
`woos-Page T2 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 12 of 35
`
`

`

`Page 13 of 35
`Filed 07/30/2009
`Case 6:07—cv—00080—LED Document 246
`
`
`the client computer to look up an IP address for a domain name.” Col. 48:6-7. In both claim 1 and
`
`claim 10 an IP address corresponds to a domain name. Thus, the domain name corresponds to an
`
`
`
`1P address—Accordingly, the Cour—t censtmes “domain name” asia name conesponding4manJP—
`
`address.”
`
`
`
`VirnetX proposes that “domain name” corresponds to a group ofcomputers (IP addresses)
`
`or a single computer because claims 1 and 10 of the ‘135 patent refer to IP address using the
`
`
`—indefinite article “an.” The FederalCircuithas stated,
`
`
`An indefinite article ‘a’ or ‘an’ in patent parlance carries the meaning of ‘one or
`more’ in open-ended claims containing the transitional phrase ‘comprising.’” That
`‘ a” or an” can mean “one or more” is best described as a rule, rather than merely as
`a presumption or even a convention. The exceptions to [the “indefinite article”] rule
`
`
`areextremeb iimited: apntentecmnst CVi—HCC [ ] arciear intent” to Limit“a” or an”
`—We%tmmmeWemmmW” 'rn erclaim to refer
`back to the same claim term does not change the general plural rule, but simply
`reinvokes that non— singular meaning. An exception to thegeneral rule that “a” or
`“an” means more than one only arises where the language of the claims themselves,
`the specification, or the prosecution history necessitate a departure from the rule,
`
`Baldwin Graphic Sys., Inc. v. Siebert, 1110., 512 F.3d 1338, 1342-43 (Fed. Cir. 2008) (citations
`
`omitted). Claims 1 and 10 of the ‘ 135 patent are open-ended construction claims using the word
`
`“comprising” and use the indefinite article “an” to refer to “IP address.” See Col. 47:20-26; see Col.
`
`4823-7. By the “one or more” rule, these claims allow for one or more IP addresses. Any subsequent
`
`
`
`address” and thus reinvokes the non-singular meaning. See Col. 47:39-40; see Col. 48:8. Microsoft
`
`
`—doesnotassefimyevidmmetoshommatmxeepflrmmjheimwmme”nfleexists Thusthere
`
`may be more than one IP address, and thus more than one computer, that corresponds with the
`
`doma1n name. Th1s would allow tor a s1tuat1on where the IP address that corresponds to the doma1n
`
`
`
`
`l3
`
`
`
`
`New Bay Capital, LLC
`MODS-Page T3 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 13 of 35
`
`

`

`Page 14 of 35
`Filed 07/30/2009
`Case 6:07—cv—00080—LED Document 246
`
`
`name is not the IP address of the target computer. See Col. 38:23-42. Accordingly, “domain name”
`
`can correspond to more than one computer.
`
`
`MicmsoflceMendthhepatentshnfit“doma#name”mahkramMealnamefora
`
`computer under traditional hierarchical DNS format. However, Microsoft relies largely on extrinsic
`
`
`evidence—including expert testimony and Microsoft’s own technology tutorial—to support its
`
`contentions, which does not carry great weight in light of the fact that claim language provides
`
`
`—gtridaneeprrthemeaning of“domain name.” Also, wherel‘vficrosoffiusefintrinsic evidence for
`
`support, Microsoft only refers to non-limiting language from the specification. For instance,
`
`
`Microsoft suggests that the examples used in the specification for domain names, which include
`
`
`“Yaheefiem” ahd “Targetcem,” shew that the patents use “demaflfl—Haifi%’ifl—i-ts—EF&€h-Heflal—
`
`hierarchical DNS format. Microsoft further suggests that “domain name” is limited to a traditional
`
`hierarchical name because the patents do not provide a single example of “domain name” that is not
`
`written in traditional hierarchical DNS format. However, Microsoft argues only the presence and
`
`
`
`disclosure or omission of examples does not create limitations on claims. Accordingly, Microsoft
`
`
`does not offer sufficient support for limiting “domain name” to a hierarchical name for a computer.
`
`Microsoft also contends that the patents limit “domain name” to web site names. However,
`
`
`no such fim1tat1on is found in the claims, and Microsoft merely references 1ts arguments on
`
`construing “web site” without showing how “domain name” is necessarily linked to web site names.
`
`
`Accordingly, “domain name” is not limited to web site names.
`
`
`
`converted into an IP address. Microsoft supports this proposed limitation by arguing that a “domain
`
`
`
`l4
`
`
`
`
`New Bay Capital, LLC
`woos-Page 14 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 14 of 35
`
`

`

`
`Case 6:07—cv—00080—LED Document 246
`Filed 07/30/2009
`Page 15 of 35
`
`
`
`name” has the capacity to be converted by DNS into an IP address and that the specification
`
`emphasizes this point by describing that identical DNS requests may result in conventional domain
`
`
`on whether
`
`
`something is a “domain name” but on what type of web site was requested. However, Microsoft
`
`
`incorrectly argues that a “capacity” to be converted by DN S into an IP address demonstrates a
`
`required limitation. A mere capacity to perform an act does not make that act necessary. Thus,
`
`
`MtCl‘OsOfi has not ‘ namebeing
`
`
`converted into an IP address. Accordingly, the Court construes “domain name” as “a name
`
`
`corresponding to an IP address.”
`
`
`
`
`The ‘135 patent, claims 1 and 10 contain the term “web site.” VirnetX contends that
`
`
`construing “secure web site” as addressed below sufficiently addresses the meaning of “web site”
`
`and that “web site” does not require further construction. Alternatively, VirnetX contends that “web
`
`
`
`Microsoft contends that “web site” means “one or more related web pages at a location on the World
`
`
`Wide Web.” The parties dispute Whether “web site” should be given a construction separate from
`
`“secure web site” and whether “web site” is limited to web pages on the World Wide Web.
`
`
`VirnetX argues that “web Site” should not be construed separately from “secure web s1te”
`
`
`because the “135 patent claims never state “web site” without the preceding word “secure.”
`
`
`7
`Howcvcr “sccurc” is sc arablc from “wcb site” as a modifier of “web site.” The claims show that
`
`
`“secm’e”canbe7eplaccctbyothermrdrfierstc“welrsrfe.” Clairnsd and ffiofthe ‘13fpatenfrefcr—
`
`to “web site” preceded by “non-secure” and “secure target.” Col. 47:28, 30; C01. 48:10, 14. This
`
`
`
`15
`
`
`
`
`New Bay Capital, LLC
`MODS-Page T5 of35
`
`New Bay Capital, LLC
`Ex.1008-Page 15 of 35
`
`

`

`
`Case 6:07—cv—00080—LED Document 246
`Filed 07/30/2009
`Page 16 of 35
`
`
`
`demonstrates that “web site” can be separated from its modifier and thus is its own term separate
`
`from “secure.” Thus, “web site” may be construed as its own claim term.
`
`
`The Court adeptsMeresef—tiseenstruettenandcenstrues “web site” as “one or more related
`
`web pages at a location on the World Wide Web.” The patent does not state a definition for “web
`
`77
`site. However, the term itself is instructive. “Web site” on its face refers to a “web” Internet
`
`resource, which is a web page on the World Wide Web. The specification is consistent with
`
`
`—constrtrnrg“website”asavvebpageontheWorldWideWeb. Examplesofwebs'rtesinthe
`
`
`specification are “Yahoo.com” and “Target.com.” Col. 37:25, 45. “Yahoo.com” and “Target.com”
`
`
`are well—known web pages on the World Wide Web. See Yahoo! Home Page, www.Yahoo.com;
`
`—seel&rget Home Page, WWW. Targetcern. Also, the spec'tfieatien states thata “web brewser” can
`
`be used to access a “web site.” Col. 39:48, 50-51, 55; C01. 40:1, 38. It is well—known that a “web
`
`
`browser” is used to navigate “web pages” on the World Wide Web. Thus, the intrinsic evidence
`
`supports Microsoft’s proposed construction.
`
`
`.HwWWfichb
`
`C onsortium, an industry standards-setting organization for the World Wide Web, defined web site
`
`as “[a] collection of interlinked Web pages, including a host page, residing at the same network
`9
`location.’ Brian

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket