throbber

`
`
`
`Paper No. 1
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`___________________
`
`
`APPLE INC.
`Petitioner,
`
`v.
`
`VIRNETX, INC. AND SCIENCE APPLICATION INTERNATIONAL
`CORPORATION,
`Patent Owner
`
`Patent No. 8,504,697
`Issued: August 6, 2013
`Filed: December 28, 2011
`Inventors: Victor Larson, et al.
`Title: SYSTEM AND METHOD EMPLOYING AN AGILE NETWORK
`PROTOCOL FOR SECURE COMMUNICATIONS USING SECURE DOMAIN
`NAMES
`____________________
`
`Inter Partes Review No. IPR2014-00238
`__________________________________________________________________
`
`PETITION FOR INTER PARTES REVIEW
`
`
`
`
`
`
`
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`TABLE OF CONTENTS
`
`I.
`
`II.
`
`COMPLIANCE WITH REQUIREMENTS FOR A PETITION FOR
`INTER PARTES REVIEW ............................................................................ 1
`A.
`Certification the ’697 Patent May Be Contested by Petitioner ............ 1
`B.
`Fee for Inter Partes Review (§ 42.15(a)) .............................................. 2
`C. Mandatory Notices (37 CFR § 42.8(b)) ............................................... 2
`1.
`Real Party in Interest (§ 42.8(b)(1)) ........................................... 2
`2.
`Other Proceedings (§ 42.8(b)(2)) ............................................... 2
`3.
`Designation of Lead and Backup Counsel ................................. 2
`4.
`Service Information (§ 42.8(b)(4)) ............................................ 2
`Proof of Service (§§ 42.6(e) and 42.105(a)) ........................................ 2
`D.
`IDENTIFICATION OF CLAIMS BEING CHALLENGED
`(§ 42.104(B)) .................................................................................................. 2
`III. RELEVANT INFORMATION CONCERNING THE CONTESTED
`PATENT ......................................................................................................... 3
`A.
`Effective Filing Date and Prosecution History of the ’697 patent ....... 3
`B.
`Person of Ordinary Skill in the Art ...................................................... 5
`C.
`Construction of Terms Used in the Claims .......................................... 5
`1.
`Domain Name (Claims 1-11, 14-25, and 28-30) ....................... 6
`2.
`Secure Communication Link (Claims 1-11, 14-25, 28-30) ....... 7
`3.
`Secure Communications Service (Claims 1-11, 14-25,
`28-30) ......................................................................................... 9
`Intercepting . . . a request (Claims 1-11, 14-25, and 28-
`30) ............................................................................................ 11
`5. Modulation (Claims 6-7 and 20-21) ........................................ 15
`IV. PRECISE REASONS FOR RELIEF REQUESTED ................................... 15
`A.
`Claims 1 and 16 Are Anticipated by Wesinger .................................. 15
`1. Wesinger Anticipates Claim 1 ................................................. 16
`2. Wesinger Anticipates Claim 16 ............................................... 21
`3.
`Patent Owner’s Comments About Wesinger ........................... 21
`
`4.
`
`i
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`B.
`
`C.
`
`D.
`
`E.
`
`2.
`
`Dependent Claims 2-4, 8-11, 14-15, 21-25, and 28-30 Are
`Anticipated by Wesinger .................................................................... 23
`1. Wesinger Anticipates Claim 2 and 24 ..................................... 23
`2. Wesinger Anticipates Claims 3 and 17 .................................... 24
`3. Wesinger Anticipates Claims 8 and 22 .................................... 24
`4. Wesinger Anticipates Claims 9 and 23 .................................... 25
`5. Wesinger Anticipates Claims 10 and 29 .................................. 25
`6. Wesinger Anticipates Claims 11 and 25 .................................. 27
`7. Wesinger Anticipates Claims 14 and 28 .................................. 27
`8. Wesinger Anticipates Claims 15 and 30 .................................. 28
`Claims 4-7 and 18-21 Are Obvious in View of Wesinger ................. 29
`1.
`Claims 4 and 18 Would Have Been Obvious from
`Wesinger in View of RFC 2543............................................... 29
`Claims 5-7 and 19-21 Claims 4 and 18 Would Have Been
`Obvious Based on Wesinger in View of RFC 2543 ................ 30
`Claims 1-11, 14-25, and 28-30 Are Anticipated by Aventail ............ 32
`1.
`Aventail Anticipates Claim 1 ................................................... 33
`2.
`Aventail Anticipates Claim 16 ................................................. 38
`3.
`Aventail Anticipates Claims 2 and 24 ..................................... 38
`4.
`Aventail Anticipates Claims 3 and 17 ..................................... 39
`5.
`Aventail Anticipates Claims 8 and 22 ..................................... 40
`6.
`Aventail Anticipates Claims 9 and 23 ..................................... 40
`7.
`Aventail Anticipates Claims 10 and 29 ................................... 41
`8.
`Aventail Anticipates Claims 11 and 25 ................................... 42
`9.
`Aventail Anticipates Claims 14 and 28 ................................... 43
`10. Aventail Anticipates Claims 15 and 30 ................................... 44
`Claims 4-7 and 18-21 Are Rendered Obvious by Aventail ............... 45
`1.
`Aventail Renders Claims 4 and 18 Obvious ............................ 45
`2.
`Aventail Renders Claims 5-7 and 19-21 Obvious ................... 47
`
`ii
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`F.
`
`Claims 1-4, 8-11, 14-16, 21-25, and 28-30 Are Anticipated by
`Kiuchi ................................................................................................. 49
`1.
`Kiuchi Anticipates Claim 1 ...................................................... 49
`2.
`Kiuchi Anticipates Claim 16 .................................................... 54
`3.
`Kiuchi Anticipates Claim 2 and 24 .......................................... 55
`4.
`Kiuchi Anticipates Claims 3 and 17 ........................................ 55
`5.
`Kiuchi Anticipates Claims 8 and 22 ........................................ 56
`6.
`Kiuchi Anticipates Claims 9 and 23 ........................................ 56
`7.
`Kiuchi Anticipates Claims 10 and 29 ...................................... 57
`8.
`Kiuchi Anticipates Claims 11 and 25 ...................................... 58
`9.
`Kiuchi Anticipates Claims 14 and 28 ...................................... 58
`10. Kiuchi Anticipates Claims 15 and 30 ...................................... 59
`CONCLUSION ............................................................................................. 60
`
`
`V.
`
`Attachment A. Proof of Service of the Petition
`
`Attachment B. List of Evidence and Exhibits Relied Upon in Petition
`
`
`
`
`
`iii
`
`

`

`
`
`I.
`
`COMPLIANCE WITH REQUIREMENTS FOR A PETITION FOR
`INTER PARTES REVIEW
`A. Certification the ’697 Patent May Be Contested by Petitioner
`Petitioner certifies that U.S. Patent No. 8,504,697 (the ’697 patent) (Ex.
`
`1001) is available for inter partes review. Petitioner certifies that it is not barred or
`
`estopped from requesting inter partes review of the claims of the ’697 patent on
`
`the grounds identified in this Petition. Neither Petitioner, nor any party in privity
`
`with Petitioner, has filed a civil action challenging the validity of any claim of the
`
`’697 patent. The ’697 patent has not been the subject of a prior inter partes review
`
`by Petitioner or a privy of Petitioner.
`
`Petitioner also certifies this petition for inter partes review is filed within
`
`one year of the date of service of a complaint alleging infringement of a patent. On
`
`August 5, 2013, VirnetX filed a complaint in the Eastern District of Texas
`
`asserting the ’697 patent in case No. 6:13-cv-00581. The case was dismissed
`
`without prejudice. On August 27, 2013, VirnetX amended its complaint in the
`
`6:12:cv-00855 proceeding to add the ’697 patent. Because the date of this petition
`
`is less than one year from August 27, 2013, this petition complies with 35 U.S.C.
`
`§ 315(b). Petitioner also notes that the timing provisions of 35 U.S.C. § 311(c) and
`
`37 C.F.R. § 42.102(a) do not apply to the ’697 patent, as it pre-dates the first-to-
`
`file system. See Pub. L. 112-274 § 1(n), 126 Stat. 2456 (Jan. 14, 2013).
`
`
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`Fee for Inter Partes Review (§ 42.15(a))
`
`B.
`The Director is authorized to charge the fee specified by 37 CFR § 42.15(a)
`
`to Deposit Account No. 50-1597.
`
`C. Mandatory Notices (37 CFR § 42.8(b))
`Real Party in Interest (§ 42.8(b)(1))
`1.
`The real party of interest of this petition pursuant to § 42.8(b)(1) is Apple
`
`Inc. (“Apple”) located at One Infinite Loop, Cupertino, CA 95014.
`
`2. Other Proceedings (§ 42.8(b)(2))
`The ’697 patent is not subject to any other proceedings. The ’697 patent is
`
`also the subject of IPR2014-00237 being filed concurrently by Petitioner.
`
`Designation of Lead and Backup Counsel
`
`3.
`Lead Counsel
`Jeffrey P. Kushan
`Reg. No. 43,401
`jkushan@sidley.com
`(202) 736-8914
`4.
`Service on Petitioner may be made by mail or hand delivery to: Sidley
`
`Backup Lead Counsel
`Joseph A. Micallef
`Reg. No. 39,772
`jmicallef@sidley.com
`(202) 736-8492
`Service Information (§ 42.8(b)(4))
`
`Austin LLP, 1501 K Street, N.W., Washington, D.C. 20005. The fax number for
`
`lead and backup counsel is (202) 736-8711.
`
`Proof of Service (§§ 42.6(e) and 42.105(a))
`D.
`Proof of service of this petition is provided in Attachment A.
`
`II.
`
`Identification of Claims Being Challenged (§ 42.104(b))
`Claims 1-11, 14-25, and 28-30 of the ’697 patent are unpatentable as being
`
`2
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`anticipated under 35 U.S.C. § 102(a) & (e), and/or for being obvious over the prior
`
`art under 35 U.S.C. § 103. Specifically:
`
`(i)
`
`Claims 1-11, 14-25, and 28-30 are anticipated under § 102(e) by U.S.
`Patent No. 830 to Wesinger (“Wesinger”) (Ex. 1008);
`
`(ii) Claims 4-7 and 18-21 are obvious under § 103 based on Wesinger
`(Ex. 1008) in view of RFC 2543 (Ex. 1012);
`
`(iii) Claims 1-11, 14-25, and 28-30 are anticipated under § 102(a) by
`Aventail (Ex. 1007);
`
`(iv) Claims 4-7 and 18-21 are obvious under § 103 based on Aventail (Ex.
`1007) in view of RFC 2543 (Ex. 1012);
`
`(v) Claims 1-3, 8-11, 14-17, 22-25, and 28-30 are anticipated by Kiuchi
`(Ex. 1011).
`
`Petitioner’s proposed construction of the claims, the evidence relied upon, and the
`
`precise reasons why the claims are unpatentable are provided in § IV, below. The
`
`evidence relied upon in support of this petition is listed in Attachment B.
`
`III. Relevant Information Concerning the Contested Patent
`A. Effective Filing Date and Prosecution History of the ’697 patent
`The ’697 patent issued from U.S. Ser. No. 13/339,257. The ’257 application
`
`claims the benefit as a continuation of the following applications: (i) 13/049,552
`
`(issued as U.S. Patent No. 8,572,247); 11/840,560 (issued as U.S. Patent No.
`
`7,921,211); 10/714,849 (issued as U.S. Patent No. 7,418,504); and 09/558,210. It
`
`also is designated a continuation-in-part of 09/504,783, filed on February 15,
`
`2000, which is a continuation-in-part of 09/429,643, filed on October 29, 1999.
`
`The ’210, ’783 and ’643 applications also claim priority to 60/106,261, filed
`
`3
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`October 30, 1998 and 60/137,704, filed June 7, 1998.
`
`Claims 1 and 16 of the ’697 patent are independent claims. Claims 2-11 and
`
`14-15 depend directly or indirectly from claim 1, and claims 17-25 and 28-30
`
`depend directly or indirectly from claim 16. Claims 2-11, 14-15, 17-25, and 28-30
`
`cannot enjoy an effective filing date earlier than that of claims 1 and 16,
`
`respectively, from which they depend (i.e., no earlier than February of 2000).
`
`Claims 1 and 16 of the ’697 patent rely on information found only in the
`
`’783 application. For example, claim 1 of the ’697 patent specifies “intercepting . .
`
`. a request to look up an internet protocol (IP) address . . . based on a domain
`
`name . . . .” Claim 16 specifies “[a] system . . . including one or more servers
`
`configured to intercept . . . a request to look up an internet protocol (IP) address . . .
`
`based on a domain name . . . .” No application filed prior to the ’783 application
`
`even mentions the term “domain name,” much less provides a written description
`
`of systems or processes corresponding to the ’697 patent claims. In proceedings
`
`involving the related ’135, ’151, ’211 and ’504 patents, Patent Owner has not
`
`disputed that claims reciting a “domain name” are not entitled to an effective filing
`
`date prior to February 15, 2000. See, e.g., Patent Owner Preliminary Oppositions
`
`in IPR2013-00348, -00349, -00354, -00375, -00376, -00377, -00378, -00393, -
`
`00394, -00397, and -00398. See also inter partes reexamination nos. 95/001,682,
`
`95/001,679, 95/001,697, 95/001,714, 95/001,788, and 95/001,789. Also, while
`
`4
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`claims 1 and 16 recite a “secure communications service,” there is no mention,
`
`whether explicit or implicit, of this term anywhere in the disclosure of the ’697
`
`patent, nor in any application filed prior to the ’783 application. Thus, the effective
`
`filing date of claims 1-11, 14-25, and 28-30 of the ’697 patent is not earlier than
`
`February 15, 2000.
`
`Person of Ordinary Skill in the Art
`
`B.
`A person of ordinary skill in the art in the field of the ’697 patent would
`
`have been someone with a good working knowledge of networking protocols,
`
`including those employing security techniques, as well as computer systems that
`
`support these protocols and techniques. The person also would be very familiar
`
`with Internet standards related to communications and security, and with a variety
`
`of client-server systems and technologies. The person would have gained this
`
`knowledge either through education and training, several years of practical
`
`working experience, or through a combination of these. Ex. 1003 ¶ 63.
`
`C. Construction of Terms Used in the Claims
`In this proceeding, claims must be given their broadest reasonable
`
`construction in light of the specification. 37 CFR § 42.100(b). The broadest
`
`reasonable construction should take account of Patent Owner’s contentions as to
`
`what the claims literally encompass and constructions Patent Owner has advanced
`
`in litigation. The ’697 patent shares a common disclosure and uses several of the
`
`5
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`same terms as the ’135, ’151, ’504 and ’211 patents, in respect of which Patent
`
`Owner has advanced constructions. Also, if Patent Owner contends terms in the
`
`claims should be read as having a special meaning, those contentions should be
`
`disregarded unless Patent Owner also amends the claims compliant with 35 U.S.C.
`
`§ 112 to make them expressly correspond to those contentions. See 77 Fed. Reg.
`
`48764 at II.B.6 (August 14, 2012); cf. In re Youman, 679 F.3d 1335, 1343 (Fed.
`
`Cir. 2012). In the constructions below, Petitioner identifies representative subject
`
`matter within the scope of the claims, read with their broadest reasonable
`
`interpretation. Petitioner expressly reserves its right to advance different
`
`constructions in district court litigation, which employs a different claim
`
`construction standard.
`
`Domain Name (Claims 1-11, 14-25, and 28-30)
`1.
`The ’697 patent does not define the term “domain name.” A person of
`
`ordinary skill would understand that the ordinary meaning of a “domain name” is a
`
`hierarchical sequence of words in decreasing order of specificity that corresponds
`
`to a numerical IP address. Ex. 1003 ¶¶ 89-91; see generally ¶¶ 86-94. Patent
`
`Owner, however, has asserted a “domain name” is simply “a name corresponding
`
`to an IP address.” Ex. 1046 at 14-15. The broadest reasonable construction of
`
`“domain name” should encompass Patent Owner’s contention that it can be “a
`
`name corresponding to an IP address.” See Ex. 1003 ¶¶ 199-201.
`
`6
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`Secure Communication Link (Claims 1-11, 14-25, 28-30)
`
`2.
`The broadest reasonable construction of the phrase “secure communication
`
`link” can include communications over a virtual private network (VPN), would
`
`encompass communications that are encrypted or not encrypted, and would
`
`encompass direct communications between computers involved in the secure
`
`communications link that are transported via intermediary computers or devices.
`
`First, the ’697 patent explains a “secure communication link” is “a virtual
`
`private communication link over the computer network.” Ex. 1001 at 6:63-65. A
`
`“secure communication link” therefore must encompass virtual private networks.
`
`Ex. 1003 ¶¶ 202-210; see Ex. 1001 at claims 3 and 17. It also suggests that a
`
`“secure communication link” is one that permits computers to privately
`
`communicate with each other over a public network – a communication link would
`
`be “secure” if it protects the anonymity of the computers involved in the
`
`communications. See, e.g., Ex. 1001 at 39:49-58.
`
`Second, dependent claims 2 and 24 of the ’697 patent specify that data being
`
`sent over a “secure communication link” must be encrypted. See, e.g., Ex. 1001 at
`
`claim 2 (“…wherein at least one of the video data and the audio data is encrypted
`
`over the secure communication link.”). By contrast, claims 1 and 16 specify only
`
`that the “secure communication link [be used] to communicate at least one of video
`
`data and audio data” between the two network devices. Under the doctrine of
`
`7
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`claim differentiation, the broadest reasonable construction of a “secure
`
`communication link” means that data being sent over the secure communication
`
`link may or may not be encrypted.1
`
`
`1
`In proceedings involving the ’135,’504, and ’211 patents, Patent Owner has
`
`contended a VPN requires network traffic to be encrypted, a contention that is
`
`inconsistent with the common disclosure of the ’135, ’504, ’211, and ’697 patents.
`
`See, e.g., Ex. 1001 at 1:57-59 (“Data security is usually tackled using some form of
`
`data encryption”); 2:44-54 (referring to technique that does not use encryption to
`
`protect the anonymity of the VPN); see also Ex. 1003 ¶¶ 200-208. In addition,
`
`while the ’697 patent shows use of TARP routers that do encrypt all network
`
`traffic (Ex. 1001 at 3:16-3:46), it does not state that TARP routers are required for
`
`the disclosed DNS-based VPN scheme. See, e.g., Ex. 1001 at 40:10-14 (“The VPN
`
`is preferably implemented using the IP address “hopping” features of the basic
`
`invention described above…” (emphasis added)). The ’697 patent also does not
`
`show any encryption steps in the DNS-related VPN scheme it describes. See Ex.
`
`1001 at 39:28-42:16. Also, in February of 2000, it was understood that a VPN
`
`could be established without encryption (e.g., by using “obfuscation” techniques to
`
`ensure the security and anonymity of the network traffic over a public network).
`
`See Ex. 1003 ¶ 208; Ex. 1073 at 2.
`
`8
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`Third, based on Patent Owner’s representations in other proceedings
`
`involving related patents, the broadest reasonable construction of a “secure
`
`communication link” would encompass direct communications between computers
`
`that are transmitted via intermediary computers and devices. For example, one
`
`district court has found, based on the disclosure of the common disclosure of the
`
`’697 and ’135 patents, that the “…routers, firewalls, and similar servers that
`
`participate in typical network communication do not impede ‘direct’
`
`communication between a client and target computer.” Ex. 1049 at 8 (FN2).
`
`The broadest reasonable construction of “secure communication link” thus
`
`encompasses “a communication link in which computers privately and directly
`
`communicate with each other on insecure paths between the computers where the
`
`communication is both secure and anonymous, and where the data transferred may
`
`or may not be encrypted.”2 See Ex. 1003 ¶¶ 202-210.
`
`3.
`
`Secure Communications Service (Claims 1-11, 14-25, 28-30)
`
`
`2
`In the grandparent of the present patent (i.e., the ’504 patent), Patent Owner
`
`unequivocally disclaimed secure communication links that did not employ
`
`encryption. See Ex. 1056 at 25. This disclaimer limits the scope of the claims,
`
`including the ’697 claims, that use this term in district court proceedings, which do
`
`not employ the broadest reasonable construction used in these proceedings.
`
`9
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`The ’697 patent does not expressly define the term “secure
`
`communications service.” Instead, its manner of use of this phrase in the two
`
`places in the disclosure where it appears (excluding the abstract) indicates that a
`
`“secure communications service” is simply referring to the capacity of two
`
`computers to participate in secure communications link. For example, the ’697
`
`patent states:
`
`The method comprises: receiving, from the first network device, a
`request to look up a network address of the second network device
`based on an identifier associated with the second network device;
`determining, in response to the request, whether the second network
`device is available for a secure communications service; and
`initiating a secure communication link between the first network
`device and the second network device based on a determination that
`the second network device is available for the secure
`communications service; wherein the secure communications
`service uses the secure communication link to communicate at
`least one of video data and audio data between the first network
`device and the second network device.
`
`Ex. 1001 at 8:9-24; see also id. at 40:4-9 (“a specialized DNS server traps DNS
`
`requests and, if the request is from a special type of user (e.g., one for which
`
`secure communication services are defined), the server . . . automatically sets up
`
`a virtual private network between the target node and the user”).
`
`The capacity of two computers to participate in a secure communications
`
`10
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`link means that the computers must be configured to enable them to handle the
`
`communications that are required for that secure communications link. The term
`
`“service” is often used by persons of ordinary skill in the art to refer to the
`
`configuration of a computer that provides the computer with some functional
`
`capability. Ex. 1003 ¶ 214. The ’697 patent, however, provides no description of
`
`any software or logic that confers on computers the ability to participate in a secure
`
`communications link. The broadest reasonable construction of the term “secure
`
`communications service” thus refers to the functional configuration of a computer
`
`that enables it to participate in a secure communications link with another
`
`computer.
`
`Intercepting . . . a request (Claims 1-11, 14-25, and 28-30)
`4.
`The broadest reasonable construction of “intercepting … a request” would
`
`include a proxy computer or device receiving and acting on a request sent by a first
`
`computer that was intended for another computer.3 This interpretation is consistent
`
`with the use of the term “intercepting” in the independent and dependent claims, in
`
`the specification, and in its conventional meaning.
`
`
`3
`Claim 1 uses the phrase “intercepting … a request” while claim 16 uses the
`
`term “intercept … a request.” There is no substantive distinction apparent from the
`
`tense of the word “intercept.” See Ex. 1003 ¶ 218.
`
`11
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`The ’697 patent does not expressly define the phrase “intercepting ... a
`
`request.” Also, as used in the claims, the term “intercepting” refers to a single
`
`event – receiving a particular type of request (i.e., a request to look up an IP
`
`address of a second network device based on a domain name of that device).
`
`Dependent claims 10 and 29 also specify that “intercepting” must necessarily
`
`encompass “receiving” a request. For example, claim 10 specifies the step of
`
`“intercepting … the request” in claim 1 consists of “receiving the request to
`
`determine whether the second network device is available for the secure
`
`communications service.” Similarly, claim 29 provides that the servers of claim 16
`
`are configured to “intercept the request by receiving the request to determine
`
`whether the second network device is available for the secure communications
`
`service.”
`
`The specification uses the term “intercepting” in a consistent manner. For
`
`example, the specification describes a process where a proxy server will
`
`“intercept” a request instead of a DNS server, and then act on the request. See,
`
`e.g., Ex. 1001 at 40:31-33 (“According to one embodiment, DNS proxy 2610
`
`intercepts all DNS lookup functions from client 2605 and determines whether
`
`access to a secure site has been requested.” (emphasis added)). The specification
`
`also shows the network configuration will send all DNS requests to the DNS proxy
`
`server – it is pre-configured to route the traffic to a known destination (i.e., the
`
`12
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`DNS proxy server) instead of a DNS server, which ordinarily would receive and
`
`resolve the domain name in the request. Id. This use of “intercept” in the
`
`specification as meaning receipt of a message by a proxy server instead of the
`
`intended destination is consistent with the ordinary meaning of the term “intercept”
`
`– which is to receive a message intended for another. See Ex. 1079 at 3 (“…to
`
`obtain covertly (a message, etc. intended for another)…”).
`
`The prosecution history of the ’697 patent is relevant to what the claims in
`
`their broadest reasonable interpretation encompass. Claims 1 and 16 originally
`
`recited “receiving … a request to look up a network address.” These claims were
`
`rejected as being obvious over Wesinger (Ex. 1008). Rather than arguing the
`
`claims were not obvious, Patent Owner amended claims 1 and 16 to: (i) recite
`
`“intercepting … a request” instead of “receiving … a request”; and (ii) changing
`
`“network address” to “Internet Protocol (IP) address.” Patent Owner also added
`
`new claims 10 and 29, which depend from claims 1 and 16, respectively.
`
`Following the amendments, the Examiner found the claims allowable, explaining
`
`in the Notice of Allowance that the prior art “may not clearly disclose the feature
`
`of ‘intercepting a request to look up an IP address based on a domain name of a
`
`secure web site (i.e., the second network device) and determining whether or not to
`
`establish a secure connection.’” Ex. 1002 (FH) at 1034 (emphasis in original).
`
`The file history demonstrates that the Examiner failed to appreciate the
`
`13
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`impact of Patent Owner’s newly added dependent claims 10 and 29; namely, that
`
`they caused the broadest reasonable interpretation of independent claims 1 and 16
`
`to necessarily encompass “receiving” a request. 4 This is notable because the
`
`claims employing the “receiving … the request” language had previously been
`
`found unpatentable over Wesinger by the Examiner, and that the Patent Owner
`
`acquiesced to that finding by amending the claims rather than arguing that the
`
`“receiving” claims were not obvious. Given that the claims, in their broadest
`
`reasonable construction must necessarily encompass “receiving … a request”
`
`pursuant to claims 10 and 29, they are clearly unpatentable over Wesinger, and
`
`Patent Owner cannot now dispute otherwise, given its acquiescence to this finding
`
`of unpatentability by the Examiner.5
`
`
`4
`The Examiner also appears to have used the incorrect legal standard (i.e.,
`
`anticipation) to assess obviousness when he found the claims patentable (i.e.,
`
`because the prior art “may not clearly disclose the feature of ‘intercepting a request
`
`…’”). Ex. 1002 (FH) at 1034.
`
`5
`
`See, e.g., Sciele Pharma Inc. v. Lupin Ltd., 684 F.3d 1253, 1261 (Fed. Cir.
`
`2012) (Federal Circuit vacated grant of a preliminary injunction, finding a
`
`“substantial question of invalidity” was raised in part by the Examiner’s overt error
`
`in the prosecution history, and that “[o]ther than recognizing that the prosecution
`(Footnote continued)
`
`14
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`5. Modulation (Claims 6-7 and 20-21)
`The ’697 patent does not define the term “modulation.” A person of
`
`ordinary skill would understand that the term “modulation” refers to the process of
`
`encoding data for transmission over a physical medium by varying or
`
`“modulating” a carrier signal. Ex. 1003 ¶¶ 235-239. Any data transmitted via a
`
`modem (i.e., a “modulator-demodulator” device) would be transmitted using
`
`modulation. Ex. 1003 ¶¶ 235-239. Similarly, any data transmitted via a cellular
`
`network would be transmitted using modulation. Ex. 1003 ¶¶ 235-239. The
`
`broadest reasonable interpretation of “modulation” thus would encompass the
`
`process of encoding data for transmission over a physical or electromagnetic
`
`medium by varying a carrier signal.
`
`IV. Precise Reasons for Relief Requested
`A. Claims 1 and 16 Are Anticipated by Wesinger
`Wesinger was filed on October 17, 1996, issued on April 27, 1999, and is
`
`prior art under at least under §§ 102(a) & (e). Claims 1-11, 14-25, and 28-30 of
`
`the ’697 patent are unpatentable in view of Ex. 1008 (Wesinger), considered alone
`
`history was ‘puzzling,’ the district court did not discuss the prosecution history,
`
`which demonstrates that the examiner concluded that the claims with an upper
`
`Tmax limit of 7.5 were not patentable in view of Cheng and that the applicant
`
`acquiesced in that conclusion and cancelled those claims.”)
`
`15
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`or in conjunction Ex. 1012 (RFC 2543) and knowledge in the field of the ’697
`
`patent, for the reasons set forth below, as supported by ¶¶ 261-410 of Ex. 1003.
`
`1. Wesinger Anticipates Claim 1
`Wesinger describes systems and processes for establishing a secure
`
`connection between a client and a remote destination. Ex. 1003 ¶¶262-265, 269,
`
`275, 278, 282-294, 305-306. Wesinger shows a firewall computer that contains a
`
`set of virtual hosts for processing connection requests and a “DNS/DDNS module”
`
`for resolving host names into IP addresses. Ex. 1003 ¶¶ 267-274. The
`
`DNS/DDNS module contains conventional DNS and a Dynamic DNS (DDNS) for
`
`mapping remote hosts to virtual hosts. Ex. 1003 ¶¶ 276-279. Whenever a
`
`connection across the firewall is made, which Wesinger calls an “envoy,” a set of
`
`DDNS entries is created to associate the virtual host with the destination. Ex. 1003
`
`¶¶ 267, 275-279, 285.
`
`Wesinger shows that when a client tries to connect to a remote destination, it
`
`will send out a request to establish a connection. Ex. 1003 ¶¶ 282-298. The
`
`request will be intercepted by a firewall, which will spawn a virtual host to process
`
`the request. Ex. 1003 ¶¶ 279, 284-286, 290. The virtual host checks a
`
`configuration database to determine whether the connection is to be allowed and
`
`whether it needs special processing. Ex. 1003 ¶¶ 282-288, 292, 299. The firewall
`
`then sends the hostname in the request to a DNS/DDNS module, which will
`
`16
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`resolve the host name into an IP address for the destination. Ex. 1003 ¶¶ 275-280,
`
`284, 288-290. The IP address of the destination is returned to the virtual host,
`
`which automatically establishes a connection across the firewall to the destination.
`
`Ex. 1003 ¶¶ 275-279, 290-291. The firewall then will return the IP address of the
`
`virtual host to the client. Ex. 1003 ¶¶ 275-280. The clien

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket