throbber
Trials@uspto.gov
`571-272-7822
`
`
`
`Paper No. 41
`Entered: May 18, 2015
`
`RECORD OF ORAL HEARING
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`- - - - - -
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`- - - - - -
`
`
`
`APPLE, INC.,
`
`Petitioner,
`
`v.
`
`VIRNETX, INC.,
`
`Patent Owner.
`
`- - - - - - -
`
`
`
`Cases IPR2014-00403 and IPR2014-00404
`
`U.S. Patent 7,987,274
`
`Technology Center 2400
`
`- - - - - - -
`
`Oral Hearing Held on Tuesday, April 28, 2015
`
`- - - - - - -
`
`
`Before: MICHAEL TIERNEY, STEPHEN SIU, and KARL
`
`EASTHOM, Administrative Patent Judges.
`
`The above-entitled matter came on for hearing on Tuesday, April 28,
`
`2015, at 10:00 a.m., in Hearing Room A, taken at the U.S. Patent and
`Trademark Office, 600 Dulany Street, Alexandria, Virginia.
`
`

`

`
`
`
`
`
`
`
`
`JEFFREY P. KUSHAN, ESQ.
`THOMAS A. BROUGHAN, III, ESQ.
`HERMAN F. WEBLEY, ESQ.
`Sidley Austin LLP
`1501 K Street, N.W.
`Washington, D.C. 20005
`202-736-8000
`
`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`
`APPEARANCES:
`
`ON BEHALF OF THE PETITIONER:
`
`
`
`
`
`
`
`
`
`ON BEHALF OF THE PATENT OWNER:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`JOSEPH E. PALYS, ESQ.
`NAVEEN MODI, ESQ.
`Paul Hastings LLP
`875 15th Street, N.W.
`Washington, D.C. 20005
`202-551-17000
`
`JASON E. STACH, ESQ.
`Finnegan, Henderson, Farabow,
`Garrett & Dunner, LLP
`3500 Suntrust Plaza
`303 Peachtree Street, NE
`Atlanta, Georgia 30308-3263
`404-653-6400
`
`
`
`2
`
`

`

`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`
`P R O C E E D I N G S
`
`(10:00 a. m. )
`
`JUDGE TI ER NEY: Wel co me to t he hearing toda y
`
`for IP R2014 -00403, and joined with it 00483, and al so
`
`consolidated for hearing purposes with IPR2014 -00404 and
`
`which was joined with 00484 today.
`
`We have both par ties here I see . B efore I begin
`
`today, do the part ies have an y ques tions or co mments before
`
`we begin with the argu ments toda y?
`
`I will start with P etitioner.
`
`MR. KUS HAN: No, Your Honor.
`
`JUDGE TI ER NEY: An ything we need to be awa re
`
`of?
`
`MR. PALYS: No , Your Honor.
`
`JUDGE TI ER NEY: Well , for toda y's hearing we
`
`have an hour e ach side. We will go toda y with the P etitioner
`
`starting, followed b y Patent Owner , rebuttal b y the P etitioner,
`
`and we would all ow for a closing state ment should Patent
`
`Owne r wish to re serve so me ti me f or that.
`
`MR. PALYS: Ye s, Your Honor.
`
`JUDGE TI ER NEY: Thank you. Would the parties
`
`like to reserve some ti me toda y jus t before we begin so I a m
`
`awar e? Petitione r, would you like to reserve so me ti me toda y
`
`for rebuttal?
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`
`
`3
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`
`MR. KUS HAN: Yes. I a m going to atte mpt to
`
`reserve about 20 to 30 minutes dep ending on when I ter minate
`
`the opening, if th at's all r ight.
`
`JUDGE TI ER NEY: 20 or 30 minutes. Oka y. And ,
`
`Patent Owner , wh at would you like to do toda y?
`
`MR. PALYS: Yo ur Honor, we req uest about 15
`
`minutes.
`
`JUDGE TI ER NEY: 15. Sounds good. And then,
`
`Petitioner, an y ti me you ar e r ead y, please proce ed t o the
`
`podium.
`
`MR. KUS HAN: Your Honor, ma y I approach to
`
`provide de monstr atives?
`
`JUDGE TI ER NEY: Please do.
`
`MR. KUS HAN: Good mo rning, Your Honors. As
`
`you explained, Ju dge Tierne y, the t wo proceedings i n each of
`
`these proceedings are organized in two sets, 403 and 483 and
`
`404 and 484.
`
`If you go to slide 2, the 403/483 proceedings are
`
`based on a refer e nce called Provino, which is Exhibit 1003,
`
`and there a re grounds of both anticipation and obviousness.
`
`And in the 404 an d 484 the pri mar y ref erence the re i s Kiuchi.
`
`So what I would l ike to do is talk a bout some
`
`co mmon issues re lating to clai m co nstruction and then dive
`
`into Provino and then address Kiuc hi. Addresses an d then
`
`address the ke y is sues.
`
`
`
`4
`
`

`

`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`
`Go to clai m 3 -- I ' m sorr y, slide 3 . This is the
`
`independent claim in the patent , t he '274 patent, an d as you
`
`can see it has thr ee steps r ecited. It is a method for accessing
`
`a secure network address. The firs t step involves sending a
`
`quer y message f r o m a first networ k device to a secu re do main
`
`service, the quer y message requesting fro m the secur e do main
`
`service a secure n etwork address fo r a second networ k device.
`
`The se cond step is receiving at that first net work
`
`device a response message fro m th e secure do main s ervice
`
`which contains the secure netwo rk address for that second
`
`network device. And then once th at's done, then it sends an
`
`access r equest me ssage fro m the fir st network device to the
`
`secure net work a ddress that it rec e ived using a VP N link or
`
`virtual private co mmunication link.
`
`As you can see fr o m the language of the clai m,
`
`there ar e not a lot of constraints put on each of these
`
`operational steps or the f eatures or ele ments that ar e addressed
`
`in the m, and we will go into that i n so me detail.
`
`Go to slide 10. S o one issue was t o deter mine
`
`what the meaning of secur e net wor k address is. And based on
`
`the position of the parties you con strued that ter m t o be "an
`
`address that requi res authorization for ac cess." We believe
`
`that is consistent with the r ecord. There doesn't see m to be
`
`much of a dispute about that.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`
`
`5
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`
`If you can go to s lide 20, please . The next t er m
`
`that we see in the clai m l anguage is the virtual co mmunication
`
`-- Virtual P rivate Net work co mmu nication link. An d here
`
`because both of t he ref erences that we provided as a basis for
`
`the proceedings e mplo ys co mmunic ation links that use
`
`encr yption, we ad dressed that parti cular e mbodi ment but, as
`
`you pointed out in your construction, the VP N co mmunication
`
`link can cover me ans of preventing access to the tr a ns mission
`
`of the infor matio n or infor mation t hat's being transmitted b y a
`
`variet y of techniq ues, which can include encr yption,
`
`authentication or address hopping.
`
`If you go to slide 32, and that is co nsistent with
`
`another point which we have addre ssed which is that the
`
`virtual co mmunic ation link is so me thing which can just exist
`
`between t wo points and a path .
`
`So as we see in the declar ation provided by P atent
`
`Owne r's expert, Dr . Monrose, he is describing a VP N
`
`co mmunication li nk in refe rence to figure 33 of the patent and
`
`he is pointi ng out that a VPN co mmunication link c an connect
`
`the device 3301 a nd the ulti mate d evice 3320, whic h is a
`
`point-to-point typ e of inter action, a nd that is described b y
`
`their expert as a virtual co mmunic ation link.
`
`If you go to slide 34, another ter m that's used in
`
`so me of the depe ndent clai ms is tunneling and tunneling
`
`packeting, or tun nel packeting. And, again, this is so mething
`
`
`
`6
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`which you found a construction. You construed it to be
`
`"tunnel packeting means placing da ta or infor mation in one
`
`protocol for ma t ( or packet portion), into another pro tocol
`
`for mat (or portion) of a packet ." And that is consistent with
`
`the general me ani ng of tunneling. It is a technique or an
`
`inco ming packet either in its entir et y or in its porti on is put
`
`into another packet to pr ovide the secure trans mission of that
`
`packet to the next destination. And that is a conventional
`
`tunneling concept which both exper ts see m to acknowledge.
`
`If you could go t o slide 36, this is an illustration of
`
`a tunneling exa mple fro m the '274 patent. It takes a n
`
`encr ypted TARP packet and wraps it into another packet with
`
`an IP header , and that is portra yed as tunneling. We asked
`
`their expert so me questions about that and it is consi stent with
`
`his description that that wrapping technique of a pac ket i n its
`
`entiret y can be a tunneling technique.
`
`Another wa y of doing it, of course , is to take a
`
`pa yload or a he ader or a portion of the inco ming pac ket and
`
`wrap that , or put that into the next packet.
`
`The last ter m I want to mention, g o to slide 20, is
`
`the access request message. And h ere, based on you r anal ysis
`
`of the parties' positions in the patent disclosure, you found
`
`that the broadest reasonable construction of an ac ce ss request
`
`message is "a signal in a pa cket or other message fo r mat that
`
`signifies that the first network devi ce seeks co mmunication,
`
`
`
`7
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`infor mation, or se rvices with a seco nd network devic e
`
`associated with t he secure networ k address."
`
`And that's logical . That 's essential l y once you
`
`have set up this c onnection, the se cure co mmunicati on , the
`
`first network devi ce is going to sen d so me t ype of a
`
`co mmunication which sa ys we wou ld like to retrieve
`
`infor mation or da ta fro m that other destination site.
`
`If you go to slide 19. And that cor responds to that
`
`last step of the cl ai m, the sending o f the ac cess r equest
`
`message fro m the first net work dev ice to the s ecure network
`
`address using the VP N co mmunicat ion link.
`
`Now, I would like to shift over into Provino, if you
`
`could go to slide 3 again. As I sai d, the clai m has three
`
`pri ma r y ele ments . These steps are fairl y straightforward and I
`
`would like to kee p those in the for efront of our minds as we go
`
`through the Provino s yste m.
`
`Go to slide 4 . In Provino, and this is the depiction
`
`of the P rovino s yste m in figure 1 o f Exhibit 1003. As you can
`
`see, the re are several ele ments of t his but one thing to keep in
`
`mind is that Provi no portra ys this s yste m as its invention.
`
`And that involves both the co mponent which is on
`
`the left c alled de vice 12 -M or 12 - 1 as well as the e le ments that
`
`are making up t his virtual private n etwork 15 on the far right,
`
`and that has both the fire wall 30 as well as the serve r 31 -S ,
`
`31-1, and i mporta ntly the VP N na me server 32.
`
`
`
`8
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`
`It is also i mporta nt to keep in min d that the design
`
`and purpose of Pr ovino is to enable those de vices 12 -M to
`
`co mmunicate wit h the server 31 -S . That's what this s yste m is
`
`all about, is finding a wa y to enable those interactio ns to
`
`occur.
`
`Go to slide 5 . Pr ovino explains that in its
`
`invention there ar e two phases. The first phase involves the
`
`12-M establishing a se cure tunnel with the fi rewall 30 which
`
`gives access to th e resources behind that fire wall. And as it
`
`points out, this first phase involves having the device 12 -M
`
`establish a secure tunnel with the p rivate network via the
`
`interaction of t he fire wall 30 and t he 12 -M device .
`
`The 12 -M device is provided an ID of the secure
`
`na me serve r 32 as part of this trans action. So the de vice 12 -M
`
`is getting the identity and location of where to go to resolve
`
`na mes , se cure na mes that a re inside the pri vate network.
`
`JUDGE EASTHOM: So when that happens, is that
`
`what you ar e cont ending is using a VP N link, in other words,
`
`is a secur e tunnel essentiall y a VP N link in this r ec ord?
`
`MR. KUS HAN: So this first phas e sets up the VPN
`
`link.
`
`JUDGE EASTHOM: S et ting up a t unnel is setting
`
`up a VP N link?
`
`MR. KUS HAN: Right, and so that basicall y gives
`
`the device 12 -M like the encr yption ke y, the algorith m that is
`
`
`
`9
`
`

`

`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`supposed to be used and so me othe r resources to ena ble the m
`
`to co mmunicate i n a secur e wa y.
`
`JUDGE EASTHOM: In the a rt is t here t ypic all y
`
`an y diff erence be tween a tunnel an d a VP N link?
`
`MR. KUS HAN: I think a tunnel is kind of a
`
`broader concept a s used in the a rt t o be roughl y equivalent to a
`
`VP N. It is a co mmon te chnique for enabling or pro viding
`
`VP N.
`
`JUDGE EASTHOM: So it is a little broader . In
`
`what sense is it b roader, if you know?
`
`MR. KUS HAN: You know, if I lo ok at the wa y
`
`that the experts h ave addressed it, tunneling see ms t o be
`
`so me what of an i nfor mal ter m the y use in an active sense to
`
`sa y, well, we will set up a tunnel fr o m point A to point B. A
`
`virtual private ne twork is an e mbo di ment or i mple mentation
`
`that uses tunneling to do interactions between t wo p oints.
`
`And under the sc he me of the paten t the y are using
`
`it as a VPN co mmunication link. I don't know that t here is an
`
`actual substantive differenc e bet we en a tunnel set up betwe en
`
`point A and point B and a virtual c o mmunication link set up
`
`between point A and point B in th e patent sche me .
`
`JUDGE EASTHOM: Oka y. Thank you.
`
`MR. KUS HAN : So at this point we have set up
`
`this tunnel which enables the devic e 12 -M to co mmu nicate
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`
`
`10
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`with these r esources that a re behin d the fire wall in t he virtual
`
`private network 1 5.
`
`Now, in this proc ess the 12 -M devi ce gets
`
`authenticated. That's an integral part of the setting up of this
`
`sche me . And it a lso then is given these provisioned resources
`
`which include the encr yption ke ys and also infor mat ion that
`
`enables it to do t he interactions wi th the devices be hind the
`
`firewall .
`
`Go to slide 6 . On ce the tun nel is s et up, that then
`
`allows for the possibility of the 12 - M device to send in a
`
`request to interac t or to retrieve re sources fro m one of the
`
`servers, 31 -S. And in the Provino sche me this can be done b y
`
`specif ying the na me of that device.
`
`So under P r ovino's sche me, the dev ice 12 -M will
`
`generate a reques t message back fo r trans mission to the na me
`
`server 32 through the fir ewall 30 a nd over the secur e tunnel.
`
`And what that is doing is it is taking a request with a na me in
`
`it, sending it to t he VPN na me ser ver 32 which has been given
`
`the infor mation to co mmunicat e with, and that allo ws the next
`
`step to occur, whi ch is in slide 7, which is a r eturn b y the VPN
`
`na me serve r of the resolved I P add ress of that na me back to
`
`the 12 -M device through the tunnel.
`
`And as Provino e xplains, that is la id out ver y
`
`clearl y. I f the na me serve r 32 has an integer Interne t address
`
`associated with t he hu man -readabl e Internet address in the
`
`
`
`11
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`request message packet fro m 12 - M , it will then prov ide the
`
`integer, that integ er addre ss in a manner si milar to what is
`
`described above e xcept that the int eger address is going to be
`
`provided by the n a me se rver 32.
`
`I mportantl y, the na me serve r 32 is storing
`
`infor mation whic h isn't going to be found in a public or
`
`conventional DNS server . It will only have infor mation that
`
`associates secure na mes , se cure de vice na mes with s ecure IP
`
`addresses.
`
`JUDGE EASTHOM: P atent Owner has argued that
`
`the access request message co mes a fter this point that you
`
`have just desc ribed wherein the tunnel is se t up and you get
`
`the secure IP address for a device , a server , 31 -S I t hink it is.
`
`Do you concede that point, that tha t is corre ct that
`
`we probabl y mad e an error in the decision to institute?
`
`MR. KUS HAN: Well, there are two points and --
`
`JUDGE EASTHO M: Not that point, I ' m sor r y, let
`
`me be more clear . But there was a nother alternative rationale
`
`that reall y setting up the r equest was sufficient to c r eate an
`
`access r equest me ssage.
`
`MR. KUS HAN: Yeah, you had ex plained that there
`
`is an interaction, whi ch I walked through, which sets up the
`
`VP N, and in that process I think yo u probably infer r ed that the
`
`request that's bei ng made b y the or iginal device 12 -M ma y
`
`have had a na me in it that needed r esolution.
`
`
`
`12
`
`

`

`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`
`And what we are tr ying to show yo u here is that
`
`there is an additional step that it must pre cede, the setting up
`
`of that tunnel. The 12 -M device has to set up the tunnel. It
`
`has to be given th e identit y or the l ocation of the sec ure na me
`
`server 32. And o nce it has that inf or mation it can th en send
`
`the request to the na me server 32 f or resolution.
`
`But in the flo w of the P rovino scheme , it does
`
`track precisel y wi th the clai m l anguage wher e ther e is first
`
`setting up of a VPN link and then there is a trans mi ssion of a
`
`request which get s resolved. That na me is then -- the integer
`
`address is sent ba ck to the r equesting device 12 -M, and then
`
`that is used in the last step of the c lai m to co mmunic ate with
`
`the destination. That would be the server 31 -S.
`
`JUDGE EASTHOM: And I think P atent Owner's
`
`argu ment i s, no , i t is co mmunicating with the fire wal l and not
`
`necessaril y sending it to the destination server 31 -S .
`
`MR. KUS HAN: So if you go back to slide 6, I
`
`think that might b e a strained re ading of what Provino is
`
`teaching. In so me context the fi re wall is e nabling the secure
`
`tunnel to be established.
`
`But what you se e in Provino is that it's taking its
`
`device 12 -M and it is charact erized in its co mmunica tion
`
`with not -- the fi r ewall, it is sa ying through the fire wall to
`
`na me serve r 32.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`
`
`13
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`
`And that makes s ense because it has been given the
`
`wa y to co mmunicate with the na me server 32 when it sets up
`
`the tunnel.
`
`JUDGE EASTHOM: That's the whole point of the
`
`Provino s yste m, c orrect?
`
`MR. KUS HAN: Yes. You need to get ac cess to
`
`na me serve r 32 in order to find the IP addresses of th e secure
`
`servers that you want to co mmuni cate with. And in the patent
`
`itself that also, if you can pull up s lide 33, I think, f igure 12,
`
`I' m sor r y, yes . This is out of their patent.
`
`JUDGE EASTHOM: I ' m sor r y, slide 32?
`
`MR. KUS HAN: This is slide 32.
`
`JUDGE EASTHOM: Thanks.
`
`MR. KUS HAN: This is figure 33 of the '274
`
`patent. And as you can see , this is ver y analogous to Provino.
`
`It has a secure portal 3310, and be hind it, and it's e quivalent
`
`to the fire wall 30 in Provino, and you s ee down in the botto m
`
`left is a secure domain na me server 3313, which is a nalogous
`
`to the secure na me server in the Pr ovino sche me.
`
`And you see that the device 3301 is going to have
`
`to get to the secu re na me serve r, the S DNS in their p atent
`
`sche me , to ge t th e infor mation nee ded to co mmunicate with
`
`the ulti mate destination, which is 3 320.
`
`JUDGE EASTHOM: So the y ar e u sing the link
`
`3319, is that corr ect?
`
`
`
`14
`
`

`

`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`
`MR. KUS HAN: So the y ar e using -- yes, 3319
`
`co mes and routes that down to the s ecure portal , which i s the
`
`firewall equivalent in the Provino sche me .
`
`JUDGE EASTHOM: I ' m sor r y, oka y, 3321, one of
`
`those. Wh y is th at a VP N link in t he patent? What makes that
`
`a VPN link?
`
`MR. KUS HAN: Well, so what we understand is
`
`that once you have had this initial i n teraction, just like in
`
`Provino, the devi ce 3301 is going to have the creden tials,
`
`encr yption ke y, a nd the other infor mation it needs to set up an
`
`encr ypted co mmu nication link to the ulti mate destination
`
`which is 3320.
`
`And it also is going to set up in i ts process a
`
`secure connection to the secur e por tal. I believe in c olu mn 46
`
`of the patent ther e is an explanation. I don't have it on a --
`
`well, if you look at colu mn 46, lin e 59 or 60, ther e i s a
`
`description of this initial step of s etting up an ad mi nis trative
`
`VP N co mmunicat ion link with a se cure portal.
`
`And that's that initial exchange tha t gives it acc ess
`
`to the secure do main na me se rver . And once that is done, then
`
`it has retrieved the infor mation it n eeds to go to the
`
`destination it wants to co mmu nicate with .
`
`Go back to slide 8. I don't know i f you wanted to
`
`ask an y more questions?
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`
`
`15
`
`

`

`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`
`JUDGE EASTHOM: No, thank yo u. I appreciate
`
`that.
`
`MR. KUS HAN: So once the information, the
`
`integer Internet a ddress of the se rver 31 -S has been given to
`
`device 12 -M, the n that 12 -M devic e can use it to cre ate
`
`message packets f or trans mission to the server 31 -S which is
`
`associated with t he hu man -readabl e Internet address. And so
`
`that's creating the sche me which we think is precisel y
`
`analogous to what the patent clai ms specif y.
`
`If you go to slide 9, as we saw in P rovino, it
`
`sends -- 12-M sends a quer y me ssa ge fro m a first ne twork
`
`device, which is 12 -M, which is se cure do main servi ce, which
`
`is the na me serve r 32. That quer y message has in it the secure
`
`do main na me o f s erver 31 -S it wishes to co mmunicat e with .
`
`And then what is returned b y the se cure do main
`
`na me serve r 32 in Provino is the IP address, the secu re
`
`network address of the second net work device . So those are
`
`your fi rst two steps.
`
`And then the final ste p, the sending of the access
`
`request message, occurs after the 1 2 -M device has re ceived the
`
`IP address of the server 31 -S .
`
`If you go to slide 17, and as I walk through this,
`
`just to be clear , the second networ k address that is being
`
`provided in Provino i s the address which the secu re do main
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`
`
`16
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`server has associated with the secur e device 31 -S . That's a
`
`correlation which it maintains and uses.
`
`There is so me question about when that correlation
`
`gets established. It is ver y clear fr o m Provino that i t is
`
`created and is stored in the se cure do main na me serv er 32,
`
`which then gives it the abilit y to re spond to those queries.
`
`Slide 18. And that's illustrated, for exa mple , in --
`
`and this should be Exhibit 1003 at 11, 5 to 23, descr ibing how
`
`the na me se rver 32 a ctuall y car ries out this function.
`
`Go to slide 19. This last step I wa nt to make a
`
`brief mention abo ut. And if you go to slide 22, one of the
`
`questions that has been r aised in th e Patent Owner 's response
`
`is whether the co mmunication that goes fro m 12 -M to the
`
`server 31 -S is so mething which qualifies as an acc e ss request
`
`message?
`
`In our view it absolutely is. The whole point of
`
`the 12 -M co mmu nication through the VP co mmunica tion link
`
`at that point is to obtain resources, infor mation, serv ices fro m
`
`that server 31 -S .
`
`So what -- wh y is it sending? It's s ending packets
`
`so it can intera ct with that serve r 3 1 -S. And in your
`
`description of wh at an a ccess request message is, th at is an
`
`illustration of one of the things that can be done.
`
`So if you go to 2 4, one of the things that Provino
`
`illustrates is that the -- this should be Exhibit 1003 - - the
`
`
`
`17
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`server that's being addressed here can be a storage server.
`
`And that would be, for exa mple , a file server that would be
`
`responding to requests for a file. I t could be other i nfor mation
`
`being sent.
`
`And in -- go to 2 6, please . The ot her thing to keep
`
`in mind is that all of the co mmunic ations that are oc curring,
`
`all of the co mmu nications on the left side of this picture
`
`between 12 -M an d the fire wall are encr ypt ed co mmu nications.
`
`Those ar e over a public network such as the Internet . Those
`
`are se cured b y th at technique.
`
`And then as the fi gure 1 illustrates, all of the
`
`devices within or behind the firewa ll are also part o f a VP N,
`
`so virtual private network 15 t hat i s being depicted indicating
`
`that's a se cure net work environ men t.
`
`And if you go to slide 27. Our expert Dr. Guerin
`
`explains that once you have set up the secure tunnel that goes
`
`over the Internet , the public portion, that allo ws the
`
`trans mission sec urel y of the infor mation, both set up the VP N
`
`and also the requ est, to its ulti mat e destination which is
`
`trans mitted once it is inside the se cure VP N portion without
`
`necessaril y using encr yption.
`
`All right. So if you go to slide 35, one of the
`
`questions , and this goes to the ques tion of tunneling, Provino
`
`makes it cle ar tha t as part of its t ec hnique it is going to tunnel
`
`packets. And the re a re a couple in stances mentioned here.
`
`
`
`18
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`One instance, it i s explaining that the packet that it has
`
`received is goin g to be put into, in an encr ypted for m, another
`
`packet for t rans mission. And that' s a classic exa mp le of
`
`tunneling.
`
`The other thing that Provino notes is that in its
`
`kind of general d escription of how you might i mple ment the
`
`invention, you ca n modif y, p rocess , message packets to
`
`confor m to a part icular protocol, a nd that suggests also the
`
`protocol confir ma tion point of your construction, illustrating
`
`that you c an take a message packet in one protocol for mat and
`
`put it into the Internet protocol for trans mission.
`
`Just to kind of wr ap up on a couple points on
`
`anticipation, we note that there we r en't separate grou nds
`
`advanced for clai ms 7, 8, 10 , 12, 1 3 and 15 relative to clai m 1,
`
`so we think those more or less stan d or fall with the outco me
`
`you have on an ticipation over claim 1.
`
`Go to slide 42. The next ground we addressed was
`
`looking at these d ependent clai ms 2 to 5 of the '274 patent,
`
`and basicall y we ' ve explained that a person of skill would have
`
`found i mple menta tion of these tech niques, which a re al l
`
`i mple mentations of the secur e net work service , to be obvious
`
`variations at the t i me of the invention.
`
`Go to slide 42. I' m sorr y, slide 43. And what we
`
`provided to support this was a ref er ence called Kosiu r, which
`
`is Exhibit 1006. And Dr. Guerin e xpl ained that the Kosiur
`
`
`
`19
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`referenc e is basic all y desc ribing how you might tak e and appl y
`
`VP N s yste ms to v arious applications. And when he v iewed
`
`Kosiur in conjunc tion with Provino he thought it obvious to
`
`i mpl y the VP N te chnique in Provino in a manner tha t wo uld
`
`address ever y one of those li mitati ons of 2 to 5.
`
`And then finall y, there was an additional ground --
`
`go to 46, please - - which we advan ced on clai m 18, and the y
`
`have rested their position on anticipation of clai m 1 8 which
`
`depends fro m clai m 1. So l et me t a lk briefl y about Kiuchi.
`
`JUDGE EASTHOM: C an you just su mmariz e real
`
`quickly the conte ntion about the secure net work and have the y
`
`distinguished, Patent Owner distinguished in their patent
`
`between the regul ar do main na me a nd the argu ment a bout tha t
`
`not being disclosed in Provino bec ause it is doing re gular
`
`do main na me fun ctions, please?
`
`MR. KUS HAN: Sure. If you put up slide 3, I want
`
`to have this discussion with the cla i m in front of us because it
`
`is i mportant to appreciate a couple things abou t their
`
`argu ments.
`
`The first one is th e y cited a case , Abbott, which
`
`was a gre at exa mple of so mething where the clai m l anguage
`
`co mpelled reading the clai m li mita tion to be so mething
`
`specificall y desc r ibed in the patent. And in Abbott, for
`
`exa mple , the y found attributes of how that sensor wa s going to
`
`be configured and interact with other things. That t hen
`
`
`
`20
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Cases IPR2014-00403 and IPR2014-00404
`U.S. Patent 7,987,274
`
`mapped to the des cription in the Ab bott invention or Abbott
`
`disclosure. And f ro m that the y found it was appropriate to
`
`constrain that li mitation to t he e mb odi ment in the invention.
`
`Another part that is i mportant about Abbott that
`
`isn't found in this is that the Abbott patent had onl y one
`
`e mbodi ment, ther e is onl y one wa y of doing it, and t here
`
`wasn't a bunch of options that are envisioned for that
`
`e mbodi ment. It was one option.
`
`In this environ me nt there is no constraint. Ther e is
`
`no hook that is compar able to Abbott's invention where there
`
`is a r equire ment f or special process ing. But at the e nd of the
`
`da y when you loo k at both the P rovino sche me and th e Kosiur
`
`sche me - - I ' m sor r y, and the Kiuchi sche me, neither of those
`
`are conventional DNS serve rs. Th e y perfor m these additional
`
`functions precisely as the clai ms sp ecifies the y would.
`
`JUDGE EASTHOM: In other word s, the y provide a
`
`secure na me , is that the onl y additional?
`
`MR. KUS HAN: The y provide a se cure na me . Fo r
`
`exa mple , in the Kiuchi and Provino sche mes ther e is also a
`
`setting up of a VPN. The re is the use of the VP N to trans mit
`
`the message. The re is also a correl ation that's maintained b y
`
`the special server of the two dif fer ent -- the secure na me and
`
`the secure IP address.
`
`If you go to -- I want to bring up slide 16. This is,
`
`I think, so me of t heir argu ment tha t the y advanced a bout this
`
`
`
`21
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`1

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket